• Title/Summary/Keyword: Managed Security

Search Result 277, Processing Time 0.032 seconds

A Study on Cybersecurity Risk Assessment in Maritime Sector (해상분야 사이버보안 위험도 분석)

  • Yoo, Yun-Ja;Park, Han-Seon;Park, Hye-Ri;Park, Sang-Won
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.11a
    • /
    • pp.134-136
    • /
    • 2019
  • The International Maritime Organization (IMO) issued 2017 Guidelines on maritime cyber risk management. In accordance with IMO's maritime cyber risk management guidelines, each flag State is required to comply with the Safety Management System (SMS) of the International Safety Management Code (ISM) that the cyber risks should be integrated and managed before the first annual audit following January 1, 2021. In this paper, to identify cyber security management targets and risk factors in the maritime sector and to conduct vulnerability analysis, we catagorized the cyber security sector in management, technical and physical sector in maritime sector based on the industry guidelines and international standards proposed by IMO. In addition, the Risk Matrix was used to conduct a qualitative risk assessment according to risk factors by cyber security sector.

  • PDF

A Trusted Sharing Model for Patient Records based on Permissioned Blockchain

  • Kim, Kyoung-jin;Hong, Seng-phil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.75-84
    • /
    • 2017
  • As there has been growing interests in PHR-based personalized health management project, various institutions recently explore safe methods of recording personal medical and health information. In particular, innovative medical solution can be realized when medical researchers and medical service institutes can generally get access to patient data. As EMR data is extremely sensitive, there has been no progress in clinical information exchange. Moreover, patients cannot get access to their own health data and exchange it with researchers or service institutions. It can be operated in terms of technology, yet policy environment are affected by state laws as well as Privacy and Security Policy. Blockchain technology-independent, in transaction, and under test-is introduced in the medical industry in order to settle these problems. In other words, medical organizations can grant preliminary approval on patient information exchange by using the safely encrypted and distributed Blockchain ledger and can be managed independently and completely by individuals. More apparently, medical researchers can gain access to information, thereby contributing to the scientific advance in rare diseases or minor groups in the world. In this paper, we focused on how to manage personal medical information and its protective use and proposes medical treatment exchange system for patients based on a permissioned Blockchain network for the safe PHR operation. Trusted Model for Sharing Medical Data (TMSMD), that is proposed model, is based on exchanging information as patients rely on hospitals as well as among hospitals. And introduce medical treatment exchange system for patients based on a permissioned Blockchain network. This system is a model that encrypts and records patients' medical information by using this permissioned Blockchain and further enhances the security due to its restricted counterfeit. This provides service to share medical information uploaded on the permissioned Blockchain to approved users through role-based access control. In addition, this paper presents methods with smart contracts if medical institutions request patient information complying with domestic laws by using the distributed Blockchain ledger and eventually granting preliminary approval for sharing information. This service will provide an independent information transaction and the Blockchain technology under test will be adopted in the medical industry.

Security Vulnerability and Countermeasures in Smart Farm (스마트 팜에서의 보안 취약점 및 대응 방안에 관한 연구)

  • Chae, Cheol-Joo;Han, Sang-Kyun;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.313-318
    • /
    • 2016
  • Recently, the smart farm development using a PC and smart phone to manag the farm for improving competitiveness is in progress. In the smart farm, by using the various ICT technology including RFID, Wi-Fi, ZigBee, Wireless LAN, and etc., the growing environment of the crop and animals can be managed with the remote. By using the network including not only the TCP/IP based wired network but also ZigBee, Wireless LAN, and etc., each of the devices installed in the smart farm transmits the growing environment data to the server. So, smart farms have information and network security vulnerability. Therefore, we propose the method that analyzes the security vulnerability which can begenerated in the smart farm and user authentication method.

Integration of Secure Distributed Object-Oriented Database Schemas (보안 분산 객체지향 데이타베이스 스키마의 통합)

  • Park, U-Geun;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.645-654
    • /
    • 1995
  • A distributed DBMS integrates local schemas that are independently designed, maintained, and managed by different users at each site providing a global virtual schema. This global schema supports users at a specific site to transparently utilize local database at different sites. The security features of the local schema should also not be changed in the global schema integrating security features of each local schema. Researches on the integration of security features into local schema in distributed DBMS environment, however, are very rate. This pater using the multilevel secure object-oriented database model(as the model for the definition of a local schema in distributed environment) which is an extension of the object-oriented models. It also suggests eight integration methods that can maintain the security features of local schemas. The eight methods are classified by the object classes and by relationships among them.

  • PDF

Access Control of XML Object Using Role Hierarchy and Cryptographic Key Assignment Scheme (역할 계층과 암호학적인 키 할당 기법을 이용한 XML 객체의 접근제어)

  • Bae Kyoung-Man;Kim Jong-Hoon;Ban Yong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.93-103
    • /
    • 2005
  • As the usage of XML documents increases the requirement of security for XML documents is growing. Especially it is very important to solve the problem of access control to XML object which shares in the environment where various users connect to each others. In this paper, we propose the access control model and mechanism which is combined with role hierarchy in the RBAC and hierarchical key derivation/assign method for the access to XML object. So we implement the access control mechanism by including hierarchical key derivation method. The technique, we proposed, gives not only the benefit in management which RBAC provides in access control to XML objects, but also it ran help derive a lower layer key from the higher layer user's. This feature decrease the number of keys managed in each role hierarchy in comparison with previous methods.

Blockchain-based Smart Meter Authentication Protocol in Smart Grid Environment (스마트 그리드 환경에서 블록체인 기반 스마트 미터 인증 프로토콜)

  • Jonghyun Kim;Myeonghyun Kim;Youngho Park
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.5
    • /
    • pp.41-54
    • /
    • 2023
  • Smart grid that supports efficient energy production and management is used in various fields and industries. However, because of the environment in which services are provided through open networks, it is essential to resolve trust issues regarding security vulnerabilities and privacy preservation. In particular, the identification information of smart meter is managed by a centralized server, which makes it vulnerable to security attacks such as device stolen, data forgery, alteration, and deletion. To solve these problems, this paper proposes a blockchain based authentication protocol for a smart meter. The proposed scheme issues an unique decentralized identifiers (DIDs) for individual smart meter through blockchain and utilizes a random values based on physical unclonable function (PUF) to strengthen the integrity and reliability of data. In addition, we analyze the security of the proposed scheme using informal security analysis and AVISPA simulation, and show the efficiency of the proposed scheme by comparing with related work.

The effect of job insecurity, employment type and monthly income on depressive symptom: analysis of Korean Longitudinal Study on Aging data

  • Myeong-Hun Lim;Jong-Uk Won;Won-Tae Lee;Min-Seok Kim;Seong-Uk Baek;Jin-Ha Yoon
    • Annals of Occupational and Environmental Medicine
    • /
    • v.34
    • /
    • pp.24.1-24.13
    • /
    • 2022
  • Background: In modern society, depression is serious issue that causes socioeconomic and family burden. To decrease the incidence of depression, risk factors should be identified and managed. Among many risk factors for depression, this study examined socioeconomic risk factors for depression. Methods: We utilized first (2006), second (2008), and third (2010)-wave data from the Korean Longitudinal Study of Aging (KLoSA). Depressive symptom was measured with the 10-item Center for Epidemiological Studies Depression Scale, Short Form (CES-D-10) in the survey in 2008 and 2010. Three risk factors including job security, employment type and monthly income were measured in the survey in 2006. The association between risk factors and depressive symptom was analyzed by Cox proportional-hazard model. Results: We analyzed data from 1,105 workers and hazard ratios (HRs) for 3 risk factors were significant entirely. In addition, regular worker with high income group is the most vulnerable group of poor job insecurity on depression among male workers (HR: 1.73; 95% confidence interval [CI]: 1.07-2.81). Finally, HRs for 7 groups who had at least 1 risk factor had higher HRs compared to groups who had no risk factors after stratifying 3 risk factors. In the analysis, significantly vulnerable groups were total 5 groups and the group who had highest HR was temporary/daily workers with poor job security (HR: 2.51; 95% CI: 1.36-4.64). The results concerning women, regardless of job type, were non-significant. Conclusions: This study presented one or more risk factors among poor job security, low income, temporary/daily employment type increase hazard for depressive symptom in 2 or 4 years after the exposure. These results inform policy to screen for and protect against the risk of depression in vulnerable groups.

The Study on the Security Requirement at Aeronautical Telecommunication Network (항공통신망에서의 보안 요구사항에 관한 연구)

  • Kim, Do-Woo;Lee, Seoung-Hyeon;Lee, Deok-Gyu;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.628-631
    • /
    • 2008
  • The information transfer between the ground facilities and the ground facilities and exchange are necessary for an aircraft and ground facilities so that it is safe, it is economic, an aircraft tan operate an aircraft to the high efficiency until it arrives at the destination location from the stand-by for the fly. Presently, by using the AFTN which is closed network, a communication is made. However, by applying the leading edge communication technology, the aeronautical telecommunication network of the next generation is constructed and it is planning to be managed. Due to this, the ground facilities connected to the foreign network has the security vulnerability by an attack. Therefore, the vulnerability analysis for the safe operational environment build-up at the aeronautical telecommunication network and sorority requirement research are needed.

  • PDF

Proposed of Intrusion detection model using the Mobile agent (이동에이전트를 이용한 침입탐지 모델의 제안)

  • 황인선;박경우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.55-62
    • /
    • 2004
  • The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using mobile agent computing paradigms have been Proposed. These advantages include : overcoming network latency, reducing network load, executing asynchronously and autonomously, adapting dynamically, and operating in heterogeneous environments. Many information security models have been proposed to mitigate agent-to-agent. agent-to-platform, and platform-to-agent element risks . In these paper, We have an object which is that through intrusion detection system development, the mobile agent is managed and through the analysis of performance data. the best environment is served.

  • PDF

Theoretical Approach to the Family Business Management (가족기업(Family Business) 경영에 관한 이론적 논의)

  • 문숙재
    • Journal of the Korean Home Economics Association
    • /
    • v.35 no.6
    • /
    • pp.317-334
    • /
    • 1997
  • The purpose of this Study is to theoretically discuss the Family Business. Family Business means a business that is owned and managed by one or more family members. Family Businesses are seen as an avenue to achieve economic security, as motivations for a productive society, and as a method for individuals to receive a monetary return for their talents and initiative. The presence of family business as a predominant business structure in the all of country's economy and their association economic contributions have been documented elsewhere. The overall objectives of this study are to introduce in the Home economics and Home Management field what the Family Business is, concretely to identify the definition of Family Business and related concepts-Home Based Business & Home Based work-, to study the interface of family and business functions within a single family. This study is to examine a clear understanding of the relationship between family functioning and business viability in families who own and operate businesses. Such understanding will be helpful in enhancing the stability and security of families who own and operate business and in developing policies and programs that foster Family Business and assist in their contributions to community and economic development. Also to understand the family and business environments and their interaction can enhance the opportunities and satisfactions for family members who are involved in business together. Results from this study will allow researchers a unique view of the Family business management and will contribute to individual and group well-being in both family and work settings.

  • PDF