• Title/Summary/Keyword: Network Assets

Search Result 170, Processing Time 0.024 seconds

A Study on the ITS integrated airport security system (ITS 통합 공항 보안시스템에 관한 고찰)

  • Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.2
    • /
    • pp.339-344
    • /
    • 2013
  • Airport security activities to ensure the airport's facilities and assets from crime, such as theft, to prevent. security systems that support these activities efficiently so you can be called. security center systems, CCTV systems, access control systems, intrusion detection systems, security communication systems, warning broadcasting system, network security systems, perimeter intrusion detection systems, search systems, and information security systems for the security system will be examined.

Study of Information Security Management Model in Public Institution (공공기관의 정보보안 관리 모델 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.43-50
    • /
    • 2013
  • Recently, Cyber threats that is doing intelligence and sophistication from the organization's information assets to secure order technical disciplines, as well as managerial and environmental sectors, such as mind-response system is must established. In this paper, possible to analyze the case for the theory in network security, such as the logical network and physical network separation suitable for the corporate environment and constantly respond and manage the Information Security Management Model A secure network design is proposed. In particular, the proposed model improvements derived from the existing network, network improvements have been made in order to design improved ability to respond to real-time security and central manageability, security threats, pre-emptive detection and proactive coping, critical equipment in the event of a dual hwalreu through applied features such as high-availability, high-performance, high-reliability, ensuring separation of individual network security policy integrated management of individual network, network security directional.

Network Topology Discovery with Load Balancing for IoT Environment (IoT환경에서의 부하 균형을 이룬 네트워크 토폴로지 탐색)

  • Park, Hyunsu;Kim, Jinsoo;Park, Moosung;Jeon, Youngbae;Yoon, Jiwon
    • Journal of KIISE
    • /
    • v.44 no.10
    • /
    • pp.1071-1080
    • /
    • 2017
  • With today's complex networks, asset identification of network devices is becoming an important issue in management and security. Because these assets are connected to the network, it is also important to identify the network structure and to verify the location and connection status of each asset. This can be used to identify vulnerabilities in the network architecture and find solutions to minimize these vulnerabilities. However, in an IoT(Internet of Things) network with a small amount of resources, the Traceroute packets sent by the monitors may overload the IoT devices to determine the network structure. In this paper, we describe how we improved the existing the well-known double-tree algorithm to effectively reduce the load on the network of IoT devices. To balance the load, this paper proposes a new destination-matching algorithm and attempts to search for the path that does not overlap the current search path statistically. This balances the load on the network and additionally balances the monitor's resource usage.

Development of Ubiquitous Sensor Network Applications based on Software Product Line Approach (프로덕트 라인 기반의 센서 네트워크 응용 소프트웨어 개발)

  • Kim, Young-Hee;Lee, Woo-Jin;Choi, Il-Woo
    • The KIPS Transactions:PartA
    • /
    • v.14A no.7
    • /
    • pp.399-408
    • /
    • 2007
  • Currently various techniques for efficiently developing sensor network applications are developed. However, these techniques provide the method for developing only single sensor network application easily and rapidly. Since sensor network applications control various sensor nodes based on core components of operating system, the technique to develop applications by defining common functionalities of various applications and selecting variable functionalities according to the work flow of specific application is efficient. Accordingly, this paper presents an experimental study that identifies commonality of sensor network application domain and supports optional development according to the variability of application by applying product line approach to developing sensor network application. Through the experimental study, we describe the characteristics of sensor network application domain compared with general business domain for product line development. Also, we show the effectiveness of the proposed approach by presenting that core assets designed using the proposed variability feature model and VEADL are reused according to the functionalities of each sensor node.

A Study on the Estimation of Character Value in Media Works: Based on Network Centralities and Web-Search Data (미디어 작품 캐릭터 가치 측정 연구: 네트워크 중심성 척도와 검색 데이터를 활용하여)

  • Cho, Seonghyun;Lee, Minhyung;Choi, HanByeol Stella;Lee, Heeseok
    • Knowledge Management Research
    • /
    • v.22 no.4
    • /
    • pp.1-26
    • /
    • 2021
  • Measuring the intangible asset has been vigorously studied for its importance. Especially, the value of character in media industry is difficult to quantitatively evaluate in spite of the industry's rapid growth. Recently, the Social Network Analysis (i.e., SNA) has been actively applied to understand human usage patterns in a media field. By using SNA methodology, this study attempts to investigate how the character network characteristics of media works are linked to human search behaviors. Our analysis reveals the positive correlation and causality between character network centralities and character search data. This result implies that the character network can be used as a clue for the valuation of character assets.

Antecedents and Consequences of Cooperation in Retail Voluntary Chain (소매점 볼런터리 체인 활성화의 선행요인과 결과)

  • Yi, Ho-Taek
    • Journal of Distribution Science
    • /
    • v.14 no.6
    • /
    • pp.65-73
    • /
    • 2016
  • Purpose - Recently, the management conditions of small independent retailers are getting worse everyday as large-scale marts and franchised convenience stores are increasing. The objective of this research is to find out the antecedents and consequences of cooperation in voluntary chain in order to enhance small independent retailer's competitiveness. Voluntary chains, also called affiliation or symbol groups, or allied group represent a high market shared in some European countries like Italy, France, and Germany. Nevertheless, there are still limitations in this research from academic fields. Drawing from network theory, the author investigates the relationship between antecedent factors in voluntary chain cooperation, such as participation benefits, justice of compensation, and autonomy in voluntary chain, and relationship specific asset. The author also attempts to examine the relationship between the relationship specific asset and cooperation of voluntary chain member shop and cooperation and consequence factors of voluntary chain cooperation, such as efficiency, group cohesiveness, and long-term relationship. Research design, data, and methodology - The author presented conceptual framework integrating the major antecedents and consequences of voluntary chain cooperation. The data were collected from 174 independent small retailers who joined K-voluntary chain. K-voluntary chain consists of small independent retailers. In accordance with their status, each entrepreneur associated with the voluntary group can own one or more outlets and can be a part of the life and the decision-making process of the group. This participation is not based on company turnover or on the number of outlets, but based on a one member, one vote system. To verify the research model and test hypotheses, the author carefully investigated the reliability, content validity, convergent validity, and discriminant validity of the proposed model. The data were analyzed by using SPSS 18.0 and AMOS structural equation modeling program. Results - The results of this study are as follows. First, as antecedent variables, participation benefits and justice of compensation have positive effect on the relationship specific assets of voluntary chain members. Second, voluntary chain members' relationship specific asset also directly related to the level of its cooperation to chain headquarter. Third, cooperation of voluntary chain member shop facilitates efficiency, group cohesiveness, and long-term relationship. Unexpectedly, there are no effect autonomy in voluntary chain to relationship specific asset. Conclusions - This research shows several theoretical and practical implications to both marketing scholars and marketers. In terms of theoretical implications, this study applies to network theory and network theory variables to explain the antecedent and consequence factors of cooperation in voluntary chain. From the point of view from business management, most of all, this study shows the way how to reinforce competitiveness of voluntary chain. Specifically, it is necessary for voluntary chain headquarter to give higher level of participation benefit and justice of compensation to its members. Second, the results also indicate what the consequence factors of cooperation in voluntary chain. In other words, to increase the level of marketing efficiency, group cohesiveness, long-term orientation in retail voluntary chain, and chain headquarter need to facilitate participants' cooperation.

Efficient Detction and Defence Model against IP Spoofing Attack through Cooperation of Trusted Hosts (신뢰 호스트 상호 협력을 통한 IP 스푸핑 공격의 효율적 탐지 및 방어 모델 설계)

  • Lee, Hae-Dong;Ha, Hyeon-Tae;Baek, Hyun-Chul;Kim, Chang-Gun;Kim, Sang-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2649-2656
    • /
    • 2012
  • Today, many enterprises have invested heavily for the part of information security in order to protect the internal critical information assets and the business agility. However, there is a big problem that big budget and too many manpower are needed to set the internal corporate network up to the same high level of defense for all of part. On the distributed enterprise networks in this paper, a defense model for effective and rapid response on the IP spoofing attack was designed to protect the enterprise network through the exchange of information between the trust hosts when an attacker attacked any target system using other trusted host.

Teaching Book and Tools of Elementary Network Security Learning using Gamification Mechanism (게이미피케이션 메커니즘을 이용한 초등 네트워크 정보보안 학습교재 및 교구 개발)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.787-797
    • /
    • 2016
  • This paper is directed for the information security education of the elementary students. The dependence on human involvement and human behavior to protect information assets necessitates an information security education to make the awareness of their roles and responsibilities towards information security. The information security education is needed even to elementary school students. The information security learning model integrating knowledge, attitudes, and ways to practice was developed, and the teaching plan and learning material hand-out were accordingly made out. As the test result analysis, it was verified that the developed teaching tools of elementary network security learning using gamification mechanism was effective to help the students learn the knowledge, attitudes, skills and ways to practice.

A Study on Combine Artificial Intelligence Models for multi-classification for an Abnormal Behaviors in CCTV images (CCTV 영상의 이상행동 다중 분류를 위한 결합 인공지능 모델에 관한 연구)

  • Lee, Hongrae;Kim, Youngtae;Seo, Byung-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.498-500
    • /
    • 2022
  • CCTV protects people and assets safely by identifying dangerous situations and responding promptly. However, it is difficult to continuously monitor the increasing number of CCTV images. For this reason, there is a need for a device that continuously monitors CCTV images and notifies when abnormal behavior occurs. Recently, many studies using artificial intelligence models for image data analysis have been conducted. This study simultaneously learns spatial and temporal characteristic information between image data to classify various abnormal behaviors that can be observed in CCTV images. As an artificial intelligence model used for learning, we propose a multi-classification deep learning model that combines an end-to-end 3D convolutional neural network(CNN) and ResNet.

  • PDF

An Empirical Study on the Effect of Cryptocurrency Personal Characteristics on Investment Intentions (암호화폐 개인 특성이 투자의도에 미치는 영향에 관한 실증적 연구)

  • Kim Sangil;Seo Jaeseok;Kim Jeongwook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.2
    • /
    • pp.147-160
    • /
    • 2023
  • Unlike other currencies, cryptocurrency is not a currency used for general transactions, but is currently applied to various investment assets and its scope is expanding. The purpose of this study is to the effect of personal characteristics on investment intention. As a theoretical background, it was verified by applying the Extended Technical Acceptance Model (ETAM). self-confidence propensity, bandwagon propensity, risk tolerance propensity, network externality, attitude, and Investment intention were composed of variables. The research method collected data from 871 people who had experience in cryptocurrency investment through a survey and analyzed it after excluding the data of 71 people who were judged to be inappropriate. The structural equation modeling method using AMOS was used. As a result of this paper, five hypotheses were accepted as statistically significant. This study concluded that self-confidence propensity, bandwagon propensity, risk tolerance propensity, network externality, and attitude had statistically significant effects on Investment intention. In this respect, this study will be able to provide useful information for cryptocurrency research.