• Title/Summary/Keyword: NSA

Search Result 124, Processing Time 0.031 seconds

CSfC Network Security Architecture Analysis for the Assurance of Commercial Security Solutions in Defense Area (국방 상용보안제품 도입을 위한 CSfC(Commercial Solutions for Classified Program) 네트워크 보안 아키텍처 분석)

  • Lee, Yong-joon;Park, Se-joon;Park, Yeon-chool
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.91-97
    • /
    • 2021
  • The United States is responding to evolving cyberattacks through the Commercial Solutions for Classified Program (CSfC). Authorized safety evaluation and certification are being carried out so that US government agencies can quickly introduce civilian commercial security products into the national pavilion. Commercial security products registered in the CSfC process can be used by defense agencies through a rapid approval process. Defense agencies approve commercial security products without duplicate evaluation. Approved security products can reduce the time, cost, and cost of the approval process required to implement the defense information system. In this study, security control for 4 types of network security architecture MSC (Multi-Site Connectivity), MA (Mobile Access), Campus WLAN, and DAR (Data at Rest) proposed by the US National Security Agency (NSA) for introduction to national defense A detailed analysis was performed on the items.

Research on the Implementation of 5G SA Test Network Test Bed Function Based on Service-Based Architecture (SBA 기반 5G SA 시험망 시스템 기능 구현에 관한 연구)

  • Park, Jea-Seok;Yoon, Mahn-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.529-531
    • /
    • 2022
  • The 5th generation mobile communication (5G) is being commercialized by major domestic and foreign mobile telecommunication businesses and is spreading to general customers mainly on smart devices such as smartphones, wearables, and IoT. If 4G networks and 5G access equipment were utilized by introducing NSA(None-Stand Alone) technology when 5G was first introduced, recently, 5G convergence services are being realized by gradually expanding evolution to 5G standalone networks through SA (Stand Alone) technology. The purpose of this study is to study a design plan for implementing necessary service-oriented functions from the perspective of communication network users on the configuration of 5G SA equipment based on SBA(Service-based Architecture) mentioned in the 3GPP technical specification document. Through this research, it is expected that companies that need to enter the 5G market can easily access the 5G SA network to develop and supplement specialized 5G convergence services to improve product performance and quality.

  • PDF

Functional Properties of Medicinal Plant Extracts (한방식재료 추출물의 기능성)

  • Park, Chan-Sung;Yang, Kyung-Mi;Kim, Mi-Lim
    • Korean journal of food and cookery science
    • /
    • v.22 no.5 s.95
    • /
    • pp.720-727
    • /
    • 2006
  • The purpose of this study was to investigate the functional properties of medicinal plant extracts. Four kinds of medicinal plants, Dioscorea batatas(DB), Armeniacae Semen(AS) Crataegus pinnatifida Bunge(CP) and Ponciri Fractus(PF), were extracted with water and 70% ethanol and the extracts were tested for their electron donating ability(EDA), nitrite scavenging ability(NSA) and inhibitory effects on cancer cells(MDA cell and A549 cell)growth. EDA at 100-1,000 ppm of water extract ranged from 3% to 14%, 14% to 36%, 29% to 72% and 14% to 43%, and that of ethanol extract ranged from 9% to 62%, 27% to 59%, 33% to 89% and 14% to 44%, in DB, AS, CP and PF, respectively. NSA of extracts measured at various pH(1.2, 3.0, 4.2, 6.0) showed the highest ability in all extracts at pH 1.2 and decreased with increasing pH. The highest NSA of water extracts of 1,000 ppm at pH 1.2 was 6%, 31%, 55% and 44% and that of ethanol extract was15%, 32%, 69% and 52%, in DB, AS, CP and PF, respectively Inhibition ratio of water and ethanol extracts on MDA cell growth was 24% and 17%, 51% and 93%, 46% and 69%, and 48% and 47%, while that on A549 cell was 18% and 9%, 6% and 3%, 7% and 3%, and 43% and 11%, at 1,000 ppm, in DB, AS, CP and PF, respectively.

A Broadband Reference Antenna to Measure an Electromagnetic Interference in the Range form 30MHz to 300MHz (30 MHz에서 300MHz 대역의 전자파 장해 즉정용 광대역 기준 안테나)

  • 조원서;황호정
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3A
    • /
    • pp.417-423
    • /
    • 2000
  • A broadband antenna available in the range of 30MHz for electromagnetic interference (EMI) test is proposed in this paper, This antenna is configurated in a disk-loaded cylindrical dipole (DLCD) connected to an 180。 hybrid balun consisting of two coaxial feeders. The performance of EMI antenna is characterized with its accurate antenna factor. The antenna factor for this antenna is obtained by using the method of moments and the calculated results are compared with the measured ones. Normalized site attenuation (NSA) is also measured by using this antenna. The results present that the propose antenna could be used for a reference antenna having measurement reproducibility and represented by a theoretically accurate analysing model in EMI measurement.

  • PDF

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.

A Study on Assumptions for Operational Environment of OS Security Enhancement System

  • Kim, Tai-Hoon;Kim, Min-Chul;Baik, Nam-Kyun;Kim, Jae-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2093-2096
    • /
    • 2003
  • Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. Trusted operating systems have been developed since the early 1980s and began to receive National Security Agency (NSA) evaluation in 1984. The researches about trusted OS are proceeding over the world, and new product type using the loadable security kernel module (LSKM) or dynamic link library (DLL) is being developed. This paper proposes a special type of product using LSKM and specific conditions for operational environment should be assumed.

  • PDF

The Concept and Threat Analysis of Intrusion Detection System Protection Profile (침입탐지 시스템 보호프로파일의 개념 및 위협 분석)

  • 서은아;김윤숙;심민수
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.67-70
    • /
    • 2003
  • Since IT industries grew, The information security of both individual and company has come to the front. But, nowadays, It is very hard to satisfy the diversity of security Protection Profile with simple Intrusion Detection System, because of highly developed Intrusion Skills. The Intrusion Detection System is the system that detects, reports and copes with of every kind of Intrusion actions immediately. In this paper, we compare the concept of IDS PPs and analyze the threat of PP.

  • PDF

A Study on Nitrite Scavenging Ability of Tea Extracts (각종 차성분의 아질산염 소거능에 대한 연구)

  • Lee, Jung-Min;Ahn, Myung-Soo
    • Journal of the Korean Society of Food Culture
    • /
    • v.12 no.5
    • /
    • pp.567-572
    • /
    • 1997
  • This reserch was carried out to investigate the nitrite scavenging abilities (NSA) of 7 kinds of tea extracts. Nitrites are used as additives of cured meat preperation and exist in plants, foods, and medicines, so we intake it very often easily. Nitrites can act with amines to produce nitrosamine which is known to be a carcinogen. It is known that the pH, concentration of amines, and amounts of nitrite are three important conditions of nitrosamine occurence. 7 kinds of tea used in this experiment were Persimmon tree (Diospyroo kaki Thiunb, Per.), Mulberry tree (Morus alba Linne, Mul.), Rubber tree (eucommia ulmoi-des Oliver, Rub.), Solomon's-seal (Bolygonatu Morr, Som.), Chicory (Cichorrium intybus L, Chi.), Sumach (Rhus javanica L., Sum.), Docwood (Cornus officinale Sieb, Doc.) and they were extracted with methanol (MeOH), ethyl ether (EtEt), ethyl acetate (EtAc), and also the extract existed in the aqueous layer II (Aq L. II) was used.

  • PDF

Correlating Fully Anechoic Chamber to Open Area Test Site Measurements by the Normalized Site Attenuation

  • Kang, Tae-Weon;Kim, Byung-Wook;Chung, Yeon-Choon;Kim, Hyo-Tae
    • Journal of electromagnetic engineering and science
    • /
    • v.1 no.2
    • /
    • pp.126-130
    • /
    • 2001
  • The performance of a fully anechoic chamber (FAC) for radiated emission (RE) measurements has been evaluated using the normalized site attenuation (NSA). To do this, the antenna factor (AF) of a set consisting of nearly identical antennas has been calibrated at an open area test site (OATS). Appropriate correlation factor (CF) between the chamber and the OATS has been calculated. Results show that the performance of the chamber is fairly good with respect to the ANSI-limit except 41~66 MHz far vertical polarization and near 900 MHz for horizontal polarization.

  • PDF

TDES CODER USING SSE2 TECHNOLOGY

  • Koo, In-Hoi;Kim, Tae-Hoon;Ahn, Sang-Il
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.114-117
    • /
    • 2007
  • DES is an improvement of the algorithm Lucifer developed by IBM in the 1977. IBM, the National Security Agency (NSA) and the National Bureau of Standards (NBS now National Institute of Standards and Technology NIST) developed the DES algorithm. The DES has been extensively studied since its publication and is the most widely used symmetric algorithm in the world. But nowadays, Triple DES (TDES) is more widely used than DES especially in the application in case high level of data security is required. Even though TDES can be implemented based on standard algorithm, very high speed TDES codec performance is required to process when encrypted high resolution satellite image data is down-linked at high speed. In this paper, Intel SSE2 (Streaming SIMD (Single-Instruction Multiple-Data) Extensions 2 of Intel) is applied to TDES Decryption algorithm and proved its effectiveness in the processing time reduction by comparing the time consumed for two cases; original TDES Decryption and TDES Decryption with SSE2

  • PDF