• 제목/요약/키워드: Program Security

검색결과 1,229건 처리시간 0.025초

전력계통의 신뢰도제어 -상정사고해석을 중심으로- (Security Control of Power Systems)

  • 양흥석;박영문
    • 전기의세계
    • /
    • 제26권3호
    • /
    • pp.84-91
    • /
    • 1977
  • A modified version of algorithm and computer program is proposed to improve the currently available contingency analysis methode for the security control of power system. The underlying principle is based upon the reasonable modification of the current methods suggested by Stagg, Tinny, Alsac, and Stott in consideration of speed, aceuracy, reliability and convergency characteristics. The algorithm and program are desirgned especially for On-Line operation, although Off-Line applications are readily available. Several case studies on the Koren Power Company's 48-bus, 91-line system have shown that the method proposed is efficiently powerful in a sense of practical applicability.

  • PDF

불법 유통 방지를 위한 핑거프린팅 코드에 관한 연구 (A Study on Fingerprinting Code for Illegal Distribution Prevention)

  • 이진흥;박지환
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2003년도 추계학술발표논문집 (하)
    • /
    • pp.1839-1842
    • /
    • 2003
  • 핑거프린팅은 컨텐츠 유통 시, 구매자의 정보를 컨텐츠에 삽입함으로써 불법 유통 행위된 컨텐츠에 대하여 불법 배포자를 추적할 수 있는 기법이다. 이 방법에는 서로 다른 구매자에 의한 핑거프린팅코드를 제거하려는 공모 공격(collusion attacks)이 발생할 수 있다. 본 논문에서는 고차의 원시다항식을 이용하여 효율적이면서 공모 공격에 강인한 핑거프린팅 코드 구성 방법을 제안한다. 그리고, 제안된 방법을 오디오 데이터에 적용하여 공모 공격에 대하여 안전한 코드임을 보이고 있다.

  • PDF

안전한 온라인 인증에 관한 연구 (A Study on Secure Authentication via Online)

  • 마기평;노봉남
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.395-398
    • /
    • 2014
  • 데스크톱 애플리케이션은 제품 활성화를 위해 제품번호나 라이선스 키, 아이디-패스워드를 이용한 인증을 활용한다. 그러나 크랙, 패치, 인증서버 우회로 인한 불법 복제 프로그램 사용 및 사용자 권한 도용이 끊이질 않고 있다. 본 논문에서는 국내외 소프트웨어 품질 향상과 정품 소프트웨어 사용 및 안전한 인증을 위해 도입해야할 기본적인 보안 요구사항을 연구하고 검증하였다.

정보보안 거버넌스의 구성요소가 종업원의 보안 인식과 행위에 미치는 영향에 관한 연구 (A Study on the Influence of the Components Related to Information Security Governance on the Perception and Behavior of Employees)

  • 김영곤
    • 한국항행학회논문지
    • /
    • 제14권6호
    • /
    • pp.935-950
    • /
    • 2010
  • 본 연구는 정보보안 거버넌스(Information Security Governance)의 구성 요소인 리더십과 거버넌스, 보안 관리 조직, 보안 정책, 보안 프로그램 관리, 사용자 보안 관리, 기술적 보안과 조직 구성원의 보안 인식과 보안 행위 간의 관계를 가설 검증과 최적 모델 분석을 통해 요소간의 관계를 검증하였으며, ISG 확립을 위한 효과적인 방향을 제시하였다.

Integration Facility Management: Interface Coordination in Process Management

  • Laksmana, Dimas Indra;Wijayaningtyas, Maranatha;Indriani, Sri;Kiswandono, Kiswandono
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.319-323
    • /
    • 2022
  • The information research system continues to be developed and directed at leading research National Institute of Technology (ITN) Malang in accordance with the Research Strategic Plan of ITN Malang. One of them is a computer system in a complete integrated facility management activity, such as this research scheme. The purpose of this research is to combine and integrate people, places, product, processes and technology. All of them are integrate existing organizational factors into a more effective, simplifying of complex processes, identifying and scheduling, notes, decision makers and more. This research was conducted in stages by design with a structured model stage for 3 (three) years (focus on humans, products and processes), research on Integration Facility Management: Interface Coordination in human resources and product management have been completed on 2019 and 2020. While the focus of research this year is to obtain an integrated facility management Interface Coordination in Process Management.

The Effectiveness of a Training Program based on Digital Stories to Develop Writing Skills for Students with Learning Difficulties

  • ALMAGHRABI, Emtenan Saud;Alqudah, Derar Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.25-32
    • /
    • 2022
  • The current research aims to identify the effectiveness of a training program based on digital stories to develop writing skills for students with learning difficulties. The research sample consisted of (12) students with learning difficulties in the fifth and sixth grades, who were chosen intentionally. The results showed the effectiveness of the program and the maintenance of this improvement over time as results showed that there were statistically significant differences at the level (α = 0.05) between the two measurements, before and after, in favor of the post-measurement. The results also showed that there were no statistically significant differences at the level (α = 0.05) between the post and follow-up measurements on the writing skills scale. This indicates the long-term impact of the program. The researchers recommend the need to expand educational programs' adoption of digital stories to develop the skills of students with learning difficulties.

Helping People with Visual Disability Using AI

  • Naif Al Otaibi;Tariq S Almurayziq
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.205-208
    • /
    • 2024
  • Artificial Intelligence (AI) technology has evolved rapidly in recent years and is used in everything from banking to email management to surgery, but without the help of the visible, most of the fun features of the Internet include visual impairment. It benefits people with disabilities. The main purpose of this study is to find ways to help people with visual impairments using AI technology. A visually impaired request is made for the visually impaired. For example, when a message arrives that the program will notify you by voice (reads the sender's name, read the message, and replies to it if necessary), this is a special program installed on your mobile phone. This program uses a customized algorithm developed in Python to convert written text to voice, read text, and convert voice to written text on a message when a visually impaired person wants to respond. Then it sends the response in the form of a text message. Therefore, the research should lead to programs for people with visual impairments. This program makes mobile phones easier and more comfortable to use and makes the daily life easier for visual impairments.

국가연구개발사업 연구보안수준 평가모델 개발에 관한 연구 (A Study on Development of the Evaluation Model about Level of Security in National R&D Program)

  • 배상태;김주호
    • 컴퓨터교육학회논문지
    • /
    • 제16권1호
    • /
    • pp.73-80
    • /
    • 2013
  • 정부는 최근 연구개발 패러다임 변화에 따라 미래 성장잠재력 확충 및 국가경쟁력 제고를 위하여 선진기술을 모방하는 추격형 R&D에서 탈피하여 선도형 R&D로의 변환을 추진하고 있다. 이에 따라 국가연구개발사업을 통한 기초 원천 연구분야 및 국가 중요핵심 기술에 대한 연구가 활발히 이루어지고 있어 이에 대한 보안의 중요성이 부각되어 다양한 보안진단 및 평가가 시행되고 있다. 그러나 기존 연구보안수준 평가는 보안관리 관점에서 도메인으로 분류하고 그에 따른 평가지표를 제시하여 연구자의 자율적인 연구보안평가 시 한계점을 노출하였다. 이에 본 논문에서 연구관리 프로세스 관점으로 도메인을 설정한 후 그에 따른 연구보안 평가지표를 설계하여 연구보안 수준의 자가진단에 효과적으로 활용할 수 있는 평가모델을 제시하였다.

  • PDF

원전 계측제어시스템의 사이버보안 요구사항 (Introduction of Requirements and Regulatory Guide on Cyber Security of I&C Systems in Nuclear Facilities)

  • 강영두;정충희;정길도
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2008년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.209-210
    • /
    • 2008
  • In the case of unauthorized individuals, systems and entities or process threatening the instrumentation and control systems of nuclear facilities using the intrinsic vulnerabilities of digital based technologies, those systems may lose their own required functions. The loss of required functions of the critical systems of nuclear facilities may seriously affect the safety of nuclear facilities. Consequently, digital instrumentation and control systems, which perform functions important to safety, should be designed and operated to respond to cyber threats capitalizing on the vulnerabilities of digital based technologies. To make it possible, the developers and licensees of nuclear facilities should perform appropriate cyber security program throughout the whole life cycle of digital instrumentation and control systems. Under the goal of securing the safety of nuclear facilities, this paper presents the KINS' regulatory position on cyber security program to remove the cyber threats that exploit the vulnerabilities of digital instrumentation and control systems and to mitigate the effect of such threats. Presented regulatory position includes establishing the cyber security policy and plan, analyzing and classifying the cyber threats and cyber security assessment of digital instrumentation and control systems.

  • PDF

Integration of PKI and Fingerprint for User Authentication

  • Shin, Sam-Bum;Kim, Chang-Su;Chung, Yong-Wha
    • 한국멀티미디어학회논문지
    • /
    • 제10권12호
    • /
    • pp.1655-1662
    • /
    • 2007
  • Although the PKl-based user authentication solution has been widely used, the security of it can be deteriorated by a simple password. This is because a long and random private key may be protected by a short and easy-to-remember password. To handle this problem, many biometric-based user authentication solutions have been proposed. However, protecting biometric data is another research issue because the compromise of the biometric data will be permanent. In this paper, we present an implementation to improve the security of the typical PKI-based authentication by protecting the private key with a fingerprint. Compared to the unilateral authentication provided by the typical biometric-based authentication, the proposed solution can provide the mutual authentication. In addition to the increased security, this solution can alleviate the privacy issue of the fingerprint data by conglomerating the fingerprint data with the private key and storing the conglomerated data in a user-carry device such as a smart card. With a 32-bit ARM7-based smart card and a Pentium 4 PC, the proposed fingerprint-based PKI authentication can be executed within 1.3second.

  • PDF