• Title/Summary/Keyword: Protection of Research Information

Search Result 1,341, Processing Time 0.027 seconds

A Study on Command and Control Through Cyber Protection Function Analysis (사이버 방호기능 분석을 통한 지휘통제에 관한 연구)

  • Choi, Seho;Oh, Haengrok;Yun, Joobeom
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.537-544
    • /
    • 2021
  • Cyber threats can bypass existing cyber-protection systems and are rapidly developing by exploiting new technologies such as artificial intelligence. In order to respond to such cyber threats, it is important to improve the ability to detect unknown cyber threats by correlating heterogeneous cyber protection systems. In this paper, to enhance cyber-attack response capabilities, we proposed command and control that enables rapid decision-making and response before the attack objectives are achieved, using Lockheed Martin's cyber kill chain and MITRE ATT&CK to analyze the purpose and intention of the attacker.

Formalizing the Design, Evaluation, and Analysis of Quality of Protection in Wireless Networks

  • Lim, Sun-Hee;Yun, Seung-Hwan;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.634-644
    • /
    • 2009
  • A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical crosslayer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks.

Measures for Enhancing System of Crime Victim's Information Protection (범죄피해자 정보보호법제의 개선방안에 대한 연구)

  • Lee, Kwon Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.175-187
    • /
    • 2016
  • Protection of personal information has significant meaning in current information age. Information of crime victim is one of top in value in that divulgence of the information to perpetrators may threat safety of the victim or cause psychological demage as $2^{nd}$ harm if disclosed to public. Legal system protects the information with scattered statutes including Criminal Procedure Act. Existing studies have been limited to discussion of the single statute without integrated approach. Bearing necessity of the approach in mind, as issues of protection system this research proffers too broad subject of eligible inspection of case document, inactive practice of identity management cards and omission of personal information, and inappropriate punishment on the disclosure or divulgence. After reviewing systems of foreign jurisdictions to get useful implications, this paper suggests several measures with two separate aspect of legal provisions and protection practice.

A Study on Personal Information Protection amid the COVID-19 Pandemic

  • Kim, Min Woo;Kim, Il Hwan;Kim, Jaehyoun;Ha, Oh Jeong;Chang, Jinsook;Park, Sangdon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4062-4080
    • /
    • 2022
  • COVID-19, a highly infectious disease, has affected the globe tremendously since its outbreak during late 2019 in Wuhan, China. In order to respond to the pandemic, governments around the world introduced a variety of public health measures including contact-tracing, a method to identify individuals who may have come into contact with a confirmed COVID-19 patient, which usually leads to quarantine of certain individuals. Like many other governments, the South Korean health authorities adopted public health measures using latest data technologies. Key data technology-based quarantine measures include:(1) Electronic Entry Log; (2) Self-check App; and (3) COVID-19 Wristband, and heavily relied on individual's personal information for contact-tracing and self-isolation. In fact, during the early stages of the pandemic, South Korea's strategy proved to be highly effective in containing the spread of coronavirus while other countries suffered significantly from the surge of COVID-19 patients. However, while the South Korean COVID-19 policy was hailed as a success, it must be noted that the government achieved this by collecting and processing a wide range of personal information. In collecting and processing personal information, the data minimum principle - one of the widely recognized common data principles between different data protection laws - should be applied. Public health measures have no exceptions, and it is even more crucial when government activities are involved. In this study, we provide an analysis of how the governments around the world reacted to the COVID-19 pandemic and evaluate whether the South Korean government's digital quarantine measures ensured the protection of its citizen's right to privacy.

A Protection Technique Against the Damages Caused by Lightning Surges on Information and Communication Facilities

  • Lee, Bok-Hee;Kang, Sung-Man;Ahn, Chang-Hwan
    • KIEE International Transactions on Electrophysics and Applications
    • /
    • v.3C no.4
    • /
    • pp.117-122
    • /
    • 2003
  • The AC power lines and signal lines of info-communication networks are routed on overhead poles and are highly exposed to lightning strikes. Due to the potential difference between grounding points of AC power lines and signal lines, the electronic equipments connected to the signal lines can easily be damaged by lightning surges. In this work, in order to develop reliable methods of protecting information and communication facilities from lightning surges, the reliability and performance of SPDs (surge protective devices) were experimentally investigated in an actual-sized test circuit. The behaviors of SPDs against lightning surges from AC power lines and signal lines and the coordinated effects of SPD installation methods were evaluated. As a consequence, it was confirmed that the bypass arrester methods and common grounding system are both highly effective.

A Cross-Layer Unequal Error Protection Scheme for Prioritized H.264 Video using RCPC Codes and Hierarchical QAM

  • Chung, Wei-Ho;Kumar, Sunil;Paluri, Seethal;Nagaraj, Santosh;Annamalai, Annamalai Jr.;Matyjas, John D.
    • Journal of Information Processing Systems
    • /
    • v.9 no.1
    • /
    • pp.53-68
    • /
    • 2013
  • We investigate the rate-compatible punctured convolutional (RCPC) codes concatenated with hierarchical QAM for designing a cross-layer unequal error protection scheme for H.264 coded sequences. We first divide the H.264 encoded video slices into three priority classes based on their relative importance. We investigate the system constraints and propose an optimization formulation to compute the optimal parameters of the proposed system for the given source significance information. An upper bound to the significance-weighted bit error rate in the proposed system is derived as a function of system parameters, including the code rate and geometry of the constellation. An example is given with design rules for H.264 video communications and 3.5-4 dB PSNR improvement over existing RCPC based techniques for AWGN wireless channels is shown through simulations.

Investigation of the Effective Range of Cathodic Protection for Concrete Pile Specimens Utilizing Zinc Mesh Anode

  • Duhyeong Lee;Jin-A Jeong
    • Corrosion Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.195-202
    • /
    • 2024
  • A zinc mesh sacrificial anode cathodic protection method is recently being developed to protect the reinforced concrete structure in a marine environment. However, comprehensive information regarding the cathodic protection technology applied to reinforced concrete test specimens utilizing zinc mesh sacrificial anodes remains limited. Particularly, no research has investigated the effective range of sacrificial anode cathodic protection in a reinforced concrete structure regarding the transmission of protection current from zinc mesh sacrificial anode to the reinforced concrete structure, particularly concerning effects of temperature variations. This study examined the distribution of potential and current using a long single rebar and several segment reinforcing bars inside a horizontal beam. Vertical pile specimens were applied with a zinc mesh sacrificial anode to simulate concrete bridges or harbor structures. To check the effect of cathodic protection, cathodic protection potential and current of the reinforced concrete specimens were measured and 100 mV depolarization criterion test was performed. It was confirmed that effect of cathodic protection varied depending on resistivity and temperature. The cathodic protection test of pile specimens revealed that the maximum reachable range of cathodic protection current was 10 cm from the waterline as observed in the experiment.

INFORMATION SYSTEM ON INTEGRATED RADIATION SAFETY (ISIRS) AND ORPHAN SOURCES CONTROL IN KOREA

  • Lee, Dewhey
    • Journal of Radiation Protection and Research
    • /
    • v.26 no.3
    • /
    • pp.255-263
    • /
    • 2001
  • An Orphan Sources Control program controlled by a web based information system in Korea has been developed to satisfy the national demand on a total management of and integrated radiation safety. There are, currently, three approaches going on to control and manage the orphan sources in Korea. First, Korean regulatory authority has been conducting scrutinizing investigation on and thoroughly monitoring the possession of unlicensed radioactive sources from the late 1990s. Second, the regulatory authority will fully operate an information system on radiation safety to effectively trace and monitor all radioactive sources in the country by the mid 2001. Finally, the regulatory authority strongly advises steel mill companies to closely scrutinize and inspect the scrap metals when they attempt to reutilize metals to prevent from being contaminated by uncontrolled sources through the scrap monitoring systems.

  • PDF

A Study on the Protection of New Intellectual Property Rights Focusing on E-commerce (전자상거래 관련 한국기업의 신지식재산권 보호방안)

  • Lee, Seung-Young;Cho, Myung-Ja
    • International Commerce and Information Review
    • /
    • v.10 no.3
    • /
    • pp.291-313
    • /
    • 2008
  • As digital economy has dramatically evolved, new intellectual property rights protection has emerged as a pivotal issue which companies need to actively restxnid to. At the new digital era, the possession of new intellectual property rights determines the company values, and thus the protection of new intellectual property rights is getting more importance in the dimension of global competitiveness. The paper analyzes the changing aspect of digital economy and e-commerce paradigm, and explores the protection plan of new intellectual property rights focusing on e-commerce and digital goods transaction so that it can help the companies to strengthen their global competitiveness. After various case studies, we can find out that even though the companies have difficulty in settling out the strategies and policy due to the radical change of cycle in internet-centered digital economy, companies need to establish the systemic strategic plan to protect the new intellectual property rights stage by stage. Also, appropriate legal, institutional basis to protect the new intellectual property rights should be rearranged. The unsloved problems which relates with the protection of new intellectual property rights will be left for next research project.

  • PDF