• Title/Summary/Keyword: Protect

Search Result 7,488, Processing Time 0.039 seconds

A Prefect Management Model for Developing Information Systems in Public Sector with UML (UML기반의 공공부문 정보화프로젝트관리모델에 관한 연구)

  • Ong, Sang-Soon;Choi, Jae-Hyun;Park, Jae-Won;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.8 no.3
    • /
    • pp.101-109
    • /
    • 2009
  • For half a century, PMM(Project Management Model) continually has been advanced by many researchers and managers. Especially, the model for civil and construct engineering has now high maturity, but the model for IT engineering has not acceptable maturity. PMI(Project Management Institute) provides the knowledge of protect management for general purpose, it is not adequate for IT prefect management without complements. In this paper, we propose IT project management model based the knowledge of PMI using UML. IT project management model provides not only functions for project planning, budgeting, design and Implement, but also the knowledge for managing IT protect efficiently. We use uses case diagrams to describe the details of the model. We expect the model to be used in management of IT project efficiently in public sector.

An APT Malicious Traffic Detection Method with Considering of Trust Model (신뢰모형을 고려한 APT 악성 트래픽 탐지 기법)

  • Yun, Kyung-mi;Cho, Gi-hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.937-939
    • /
    • 2014
  • Recently, an intelligent APT(Advanced Persistent Threat) attack which aims to a special target is getting to be greatly increased. It is very hard to protect with existing intrusion detection methods because of the difficulties to protect the initial intrusion of malicious code. In this paper, we analyze out-bound traffics to prevent call-back step after malicious code intrusion, and propose an APT malicious traffic detection method with considering of trust. The proposed method is expected to provide a basement to improve the detection rate in comparing with that of existing detection methods.

  • PDF

A Study on Database Access Control using Least-Privilege Account Separation Model (최소 권한 계정 분리 모델을 이용한 데이터베이스 엑세스 제어 연구)

  • Jang, Youngsu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.3
    • /
    • pp.101-109
    • /
    • 2019
  • In addition to enabling access, database accounts play a protective role by defending the database from external attacks. However, because only a single account is used in the database, the account becomes the subject of vulnerability attacks. This common practice is due to the lack of database support, large numbers of users, and row-based database permissions. Therefore if the logic of the application is wrong or vulnerable, there is a risk of exposing the entire database. In this paper, we propose a Least-Privilege Account Separation Model (LPASM) that serves as an information guardian to protect the database from attacks. We separate database accounts depending on the role of application services. This model can protect the database from malicious attacks and prevent damage caused by privilege escalation by an attacker. We classify the account control policies into four categories and propose detailed roles and operating plans for each account.

A Study on the Policy Direction for the Protection of Underwater Cultural Heritage in Korea (우리나라 수중문화유산 보호 정책 방향에 관한 연구)

  • Park, seong-wook
    • Korean Journal of Heritage: History & Science
    • /
    • v.34
    • /
    • pp.210-220
    • /
    • 2001
  • UNESCO convention on the Protection of the Underwater Cultural Heritage(hereafter 'UCH')was adopted in the Fourth meeting of governmental experts on the draft Convention on the protection of UCH. Accordingly, Korea will prepare an appropriate policy for the protection of UCH. This article aims to give policy directions for the protection of UCH in Korea. Korea has some legislation relating to protection of cultural property. However, these legislation did not have effective schemes to protect UCH. Moreover, the Cultural Properties Administration which is a primary agency for protecting UCH has been ineffective in their effort for protecting UCH. To Protect UCH, I suggest establishment of law relating to protection of UCH, designation of competent authorities for protection of UCH in accordance to UNESCO Convention, and establishment of a long term national plan for protection of UCH.

Epicatechin Prevents Methamphetamine-Induced Neuronal Cell Death via Inhibition of ER Stress

  • Kang, Youra;Lee, Ji-Ha;Seo, Young Ho;Jang, Jung-Hee;Jeong, Chul-Ho;Lee, Sooyeun;Jeong, Gil-Saeng;Park, Byoungduck
    • Biomolecules & Therapeutics
    • /
    • v.27 no.2
    • /
    • pp.145-151
    • /
    • 2019
  • Methamphetamine (METH) acts strongly on the nervous system and damages neurons and is known to cause neurodegenerative diseases such as Alzheimer's and Parkinson's. Flavonoids, polyphenolic compounds present in green tea, red wine and several fruits exhibit antioxidant properties that protect neurons from oxidative damage and promote neuronal survival. Especially, epicatechin (EC) is a powerful flavonoid with antibacterial, antiviral, antitumor and antimutagenic effects as well as antioxidant effects. We therefore investigated whether EC could prevent METH-induced neurotoxicity using HT22 hippocampal neuronal cells. EC reduced METH-induced cell death of HT22 cells. In addition, we observed that EC abrogated the activation of ERK, p38 and inhibited the expression of CHOP and DR4. EC also reduced METH-induced ROS accumulation and MMP. These results suggest that EC may protect HT22 hippocampal neurons against METH-induced cell death by reducing ER stress and mitochondrial damage.

Intelligent Soft Suit That Can Autonomously Augment Strength and Protect the Human Body (Exoskin) (인간 신체를 자율적으로 보조하고 보호하는 지능형 소프트 슈트(엑소스킨))

  • Son, Y.K.;Jung, J.Y.;Jin, H.B.;Gu, J.B.;Kim, B.S.;Lee, D.W.;Kim, H.J.;Shin, H.C.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.1
    • /
    • pp.32-42
    • /
    • 2021
  • Innovative developments in wearable and artificial intelligence technologies are accelerating the emergence of a soft suit that can autonomously augment a body's own strength and protect the human body. In this paper, we define the concept of "Exoskin," a new concept specifically derived from the "Road to an Intelligent Information Society" (Technology Development Map 2035) as predicted by the Electronics and Telecommunications Research Institute. In addition, we analyze the development status of each element of this technology and forecast its future development.

A Method to Protect the Information of Tag Using Forced Collision Mechanism in RFID System (RFID 시스템에서 강제 충돌을 이용한 태그 정보 보호 기법)

  • Park Ju-Sung;Kang Jeonil;Nyang Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.25-33
    • /
    • 2005
  • We propose a method to protect the tag's information from illegal reader in RFID system. In this method, a special tag called ownership tag makes intentionally collisions during singulation. By the forced collision of an ownership tag a reader can obtain the information of ordinary tags. Whereas a reader can not find my information on tag's ID without the ownership tag.

Effects of anti-inflammation and cell protection through biphenyl dimethyl dicarboxylate on Rat Microglia

  • Joo, Seong-Soo;Kang, Hee-Chul;Lee, Do-Ik
    • Proceedings of the PSK Conference
    • /
    • 2003.10b
    • /
    • pp.132.1-132.1
    • /
    • 2003
  • Biphenyl dimethyl dicarboxylate (DDB) is a by-product produced in process of synthesizing Schizandrin-C. Generally, DDB has known to protect hepatocytes and to decrease the index of liver enzyme (e.g. GOT and GPT) in chronic hepatitis. The present study was aimed to demonstrate whether DDB can protect the brain cell, especially the Alzheimer brain in vitro. As Alzheimers disease can be induced by activated microglia, a macrophage in the brain, through Abeta peptide (A$\beta$) produced from amyloid precursor protein (APP). (omitted)

  • PDF

Understanding the commercial significance of geographical indications and the implications for Korean kimchi through the example of Columbian coffee (콜롬비아 커피의 지리적 표시 활용 전략을 통해 본 지리적 표시의 상업적 의의와 김치의 지리적 표시제 개선 방향)

  • Song, YoungJoo
    • Food Science and Industry
    • /
    • v.54 no.4
    • /
    • pp.268-277
    • /
    • 2021
  • A geographical indication (GI) is a sign used on products that have a specific geographical origin and possess qualities or a reputation that are due to that origin. This paper explores ways to protect Korean goods as GIs in the U.S. and EU by examining the efforts of the Colombian Coffee Federation (FNC) to protect Colombian coffee. The FNC enhanced the global awareness of Colombian coffee and increased the profits of Colombian coffee producers by registering Colombian coffee as a certification mark in the U.S. and as a GI under the EU's quality schemes. The Korean government protects kimchi under its own GI system. For kimchi products to earn the label "Korean kimchi," the three main ingredients must be produced in Korea. This has been a challenge for kimchi producers, who often rely on imported ingredients. Korea could learn from FNC's strategies to improve the current GI system for kimchi.

Mechanisms of Protection of the Rights and Interests of Entrepreneurs in Russia

  • Turanin, Vladislav Yurievich;Kistenev, Vitaliy Valentinovich;Posokhova, Yana Vitalievna;Kisteneva, Olga Alekseevna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.291-293
    • /
    • 2022
  • The implementation of the legal mechanism to protect the rights and interests of entrepreneurs in Russia has its unique features. When the rights and interests of a businessman are threatened with infringement, specific legal remedies may be applied, by means of which the violated rights and interests are restored and, thereby, the opportunity to resume entrepreneurial activity is created. The paper explores extrajudicial ways to protect the rights and interests of entrepreneurs in Russia. The study analyzes the forms of self-help, arbitral tribunal, resolution of applications and complaints by executive authorities, the notariate, and work with the business ombudsman and civil society institutions.