• Title/Summary/Keyword: IS요구도

Search Result 25,663, Processing Time 0.045 seconds

Developing the requirements of "National Important Facilities" according to the certification criteria of (ISO) (국제표준화기구(ISO)의 인증기준에 준하는 「국가중요시설」의 요구사항 개발)

  • Yim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.65-71
    • /
    • 2017
  • "National important facilities" refers to facilities that have a great influence on national security and people's live s if enemy occupation, destruction, or functional paralysis is imposed by the Ministry of Defense Directive. In view of the case of nuclear plant hacking and the attack on the government building "National important facilities" could be the target of anti-social crimes. In the meantime, the "National important facilities" check is limited to the facilit y survey. so The purpose of this study is to develop generalized requirements. Therefore, comparing the requiremen ts of ISO 9001:2015 and ISO 27001:2013. There are only 8 differences(operating) out of 1-10. And the rest are used in common. In addition, we confirmed that the results of comparing the cases of domestic and foreign CPTED are within the "Six Principles". In Chapter 8, the principle of application of CPTED was inserted and the certification re quirements of the "National important facilities" management system were derived.

Target Level of Safety Analysis in Airworthiness Certification for Military UAV (군용무인기의 감항인증 목표안전수준 분석)

  • Lee, Narae;Jeon, Byung-Il;Chang, Young-Keun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.10
    • /
    • pp.840-848
    • /
    • 2013
  • Airworthiness certification of military aircraft is a government's certification that it must have airworthiness and ability to demonstrate its requested function and performance. NATO released STANAG-4671 to establish the minimum airworthiness requirements for UAVs between 150kg and 20,000kg MTOW in 2009. Up to now, there are no clear airworthiness certification criteria and guideline for small UAV which is less than 150kg. STANAG-4671 is used for military UAV airworthiness certification in Korea as Other Airworthiness Certification Criteria. However, since STANAG-4671 requires the same Target Level of Safety without regard to MTOW, excessive Target Level of Safety or design requirements could be applied to relatively small-medium UAV. In this paper, classification and criteria of airworthiness certification for military UAV were investigated and a Target Level of Safety was analyzed based on MTOW using ground victim criteria.

Executive coaching competency model development and needs analysis (경영자의 코칭역량모델 개발 및 요구분석)

  • Woo, Soomuyung;Chang, Youngchul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5530-5540
    • /
    • 2013
  • The paper is aimed to develop coaching competency model for executives and analyze their needs. For better outcome, we take coaching experts and executives and managers with business coaching experience as the target and conduct Delphi survey three times. According to the 3 surveys, we derived 5 coaching competency clusters and 34 individual competency items. The next thing, we have designed 102 survey questions which measure the 43 competency items and verified the validity for 272 respondents composed of managers and executives participated. As a result, the Analysis is secured with the validity at the 26 competency items. To investigate the competency that is important to executives, we carry needs analysis into execution. Borich's needs to utilize executive coaching competencies results conducted on 5 priority groups that belong to the competence of the 26 sub-competencies have business acumen the needs of high-capacity was analyzed. followed by motivation inspiring, organizational management, conflict management, strategic thinking and negotiation skills.

How to Derive the Autonomous Driving Function Level of Unmanned Ground Vehicles - Focusing on Defense Robots - (무인지상차량의 자율주행 기능수준 도출 방법 - 국방로봇을 중심으로 -)

  • Kim, Yull-Hui;Choi, Yong-Hoon;Kim, Jin-Oh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.205-213
    • /
    • 2017
  • This paper is a study on the method to derive the functional level required for autonomous unmanned ground vehicle, one of the defense robots. Conventional weapon systems are not significantly affected by the operating environment, while defense robots exhibit different performance depending on the operating environment, even if they are on the same platform. If the performance of defense robot is different depending on operational environment, results of mission performance will be vary significantly. Therefore, it is necessary to clarify the level of function required by the military in order to research and develop most optimal defense robots. In this thesis, we propose a method to derive the required function level of unmanned ground vehicles, focusing on autonomous driving, one of the most vital functions of defense robots. Our results showed that the autonomous driving function depending intervention levels and evaluated functional sensitivity for autonomous driving of the unmanned vehicle using climate and topography as variables.

Approximate 3D Localization Mechanism in Wireless Sensor Network (무선 센서 네트워크 환경에서 3차원 근사 위치추적 기법)

  • Shim, Jaeseok;Lim, Yujin;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.9
    • /
    • pp.614-619
    • /
    • 2014
  • In WSN (Wireless Sensor Networks) based surveillance system, it needs to know the occurrence of events or objects and their locations, because the data have no meaning without location information. Using traditional 2D localization mechanisms provide good accuracy where altitude is fixed. But the mapping the position estimated by 2D localization to the real world can cause an error. Even though 3D localization mechanisms provide better accuracy than 2D localization, they need four reference nodes at least and high processing overhead. In our surveillance system, it is needed to estimate the height of the detected object in order to determine if the object is human. In this paper, we propose a height estimation mechanism which does not require many reference nodes and high complexity. Finally, we verify the performance of our proposed mechanism through various experiments.

Design Process Suggestion of Vibrotactile Interface applying Haptic Perception Factor Analysis (햅틱 인지 요인 분석을 적용한 진동 촉감 인터페이스 설계 프로세스 제안)

  • Heo, Yong-Hae;Kim, Seung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.79-87
    • /
    • 2021
  • This study suggests a design process for vibrotactile interface that can apply haptic perception factors reflecting human tactile mechanisms. This process consists of 4 stages: the haptic sense requirement analysis stage, the haptic element analysis stage, the haptic perception factor analysis stage, the haptic requirement detailed design, and the prototype implementation stage. The advantage of this design process is that unnecessary tasks can be excluded in deriving and implementing user requirements, by applying haptic perception factor analysis, and the biggest feature is that research results on ergonomic mechanisms can be reflected in the haptic design, completes prototype development simultaneously while determining the haptic requirements statement by performing user evaluation, usability testing, and haptic feature optimization tasks simultaneously. This design process includes all stages from user requirements to haptic function detailed design and prototype implementation, so it is expected that general developers who lack expertise in haptic will also be able to design user-centered designs, enabling design and implementation of haptic functions at a certain level.

Secure Storage and Management of Vaccination Records Allowing Restrictive Access upon Users' Consent (사용자 동의로 제한적 접근을 허용하는 백신 접종 기록의 안전한 보관 및 관리)

  • Park, Jun-Cheol
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.100-109
    • /
    • 2021
  • As the COVID-19 vaccination begins, it is necessary to safely store and manage the vaccination history for vaccinated people, as well as provide only the minimal information for the requested purpose, not in the form of all or nothing, to the institution requesting vaccination personal information. This paper proposes a scheme to safely store and manage the people's vaccination records in a non-forgeable blockchain, and to ensure that users provide only the minimal information necessary to the verifier from their vaccination personal information. A user authorizes the verifier to access the information he has consented with by entering the fingerprint on his smartphone, and in this process, no personal information or secrets can be exposed to an attacker. In addition, it is guaranteed that it is neither possible to impersonate the user nor to steal user personal information even in the case of theft or loss of the smartphone, or leakage of information from the vaccination history management institution. Using the scheme, users have no fear on external exposure of personal information and follow-up damage due to excessive information provision by giving out only the minimal information suited to the verifier.

Analysis of Security Requirements for Secure Update of IVI(In-Vehicle-Infotainment) Using Threat Modeling and Common Criteria (위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석)

  • Kang, Soo-young;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.613-628
    • /
    • 2019
  • In-Vehicle Infotainment provides navigation and various functions through the installation of the application. And infotainment is very important to control the entire vehicle by sending commands to the ECU. Infotainment supports a variety of wireless communication protocols to install and update applications. So Infotainment is becoming an attack surface through wireless communcation protocol for hacker's access. If malicious software is installed in infotainment, it can gain control of the vehicle and send a malicious purpose command to the ECU, affecting the life of the driver. Therefore, measures are needed to verify the security and reliability of infotainment software updates, and security requirements must be derived and verified. It must be developed in accordance with SDL to provide security and reliability, and systematic security requirements must be derived by applying threat modeling. Therefore, this paper conducts threat modeling to derive infotainment update security requirements. Also, the security requirements are mapped to the Common Criteria to provide criteria for updating infotainment software.

A Study on the Relationship between Teachers' Information Need about Guidance and Perception regarding Educational Guidelines to Improve Teachers' Perception of Educational Instruction (교사들의 교육지침 인식 개선을 위한 생활지도 정보요구와 교육지침 변화에 대한 인식 간 관계 연구)

  • Kim, Jinmyung;Lee, Jee Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.2
    • /
    • pp.131-157
    • /
    • 2022
  • This study aims to present the relationship between the teachers' information needs regarding guidance and the perception of educational guidelines issued by the Office of Education. The research design was conducted based on the reviewing theoretical background studies, and questionnaires were found in in-depth semi-structured interviews in a pilot study. Gyeonggi Province is divided into four regions, which is the target of the survey. Teachers of three schools in each region were surveyed, and eventually 217 copies of the survey were used for the final analysis. The result shows that the role of school libraries in caring for teachers' information needs ultimately influences the improvement of teachers' guidance. Based on this result, the study suggests ways to improve information services provided by school libraries. In particular, the study is meaningful in that it has presented a potential service plan that can be performed by school libraries to help address teachers' information needs about guidance in schools.

GTS-Visual Logic: Visual Logic and Tool for Analysis and Verification of Secure Requirements in Smart IoT Systems (GTS-VL: 스마트 IoT에서 안전 요구사항 분석과 검증을 위한 시각화 논리 언어 및 도구)

  • Lee, SungHyeon;Lee, MoonKun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.289-304
    • /
    • 2022
  • It is necessary to apply process algebra and logic in order to analyze and verify safety requirements for Smart IoT Systems due to distributivity and mobility of the systems over some predefined geo-temporal space. However the analysis and verification cannot be fully intuitive over the space due to the fact that the existing process algebra and logic are very limited to express the distributivity and the mobility. In order to overcome the limitations, the paper presents a new logic, namely for GTS-VL (Geo-Temporal Space-Visual Logic), visualization of the analysis and verification over the space. GTS-VL is the first order logic that deals with relations among the different types of blocks over the space, which is the graph that visualizes the system behaviors specified with the existing dTP-Calculus. A tool, called SAVE, was developed over the ADOxx Meta-Modeling Platform in order to demonstrate the feasibility of the approach, and the advantages and practicality of the approach was shown with the comparative analysis of PBC (Producer-Buffer-Consumer) example between the graphical analysis and verification method over the textual method with SAVE tool.