• 제목/요약/키워드: Public Security

검색결과 2,557건 처리시간 0.036초

Modern Technologies for Ensuring Economic Security in the Context of Achieving High Efficiency of Public Administration

  • Kryshtanovych, Myroslav;Akimova, Liudmyla;Gavkalova, Nataliia;Akimov, Oleksandr;Shulga, Anastasia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.362-368
    • /
    • 2022
  • The main purpose of the article is to study the key aspects of the use of modern technologies to ensure economic security in the context of achieving high efficiency of public administration.The economic security of the country is a multi-level system, the structure of which is determined by the peculiarities of the structure and key development priorities both in the regional aspect and nationally. The fundamental role of economic security is realized through a set of goals and objectives that are achieved in the process of ensuring it, among the main ones is the effective, dynamic and progressive development of the economy, which is impossible without the development of innovations. The essence of ensuring economic security from the standpoint of innovative development lies in the development of innovations that can increase the level of competitiveness of the state-level economic system, which necessitated an analysis of the conditions and dynamics of innovation development. As a result of the study, the basic aspects of the implementation of modern technologies were analyzed in the context of achieving high efficiency in public administration.

A Novel Transfer Learning-Based Algorithm for Detecting Violence Images

  • Meng, Yuyan;Yuan, Deyu;Su, Shaofan;Ming, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.1818-1832
    • /
    • 2022
  • Violence in the Internet era poses a new challenge to the current counter-riot work, and according to research and analysis, most of the violent incidents occurring are related to the dissemination of violence images. The use of the popular deep learning neural network to automatically analyze the massive amount of images on the Internet has become one of the important tools in the current counter-violence work. This paper focuses on the use of transfer learning techniques and the introduction of an attention mechanism to the residual network (ResNet) model for the classification and identification of violence images. Firstly, the feature elements of the violence images are identified and a targeted dataset is constructed; secondly, due to the small number of positive samples of violence images, pre-training and attention mechanisms are introduced to suggest improvements to the traditional residual network; finally, the improved model is trained and tested on the constructed dedicated dataset. The research results show that the improved network model can quickly and accurately identify violence images with an average accuracy rate of 92.20%, thus effectively reducing the cost of manual identification and providing decision support for combating rebel organization activities.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권5호
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.

A Novel Least Square and Image Rotation based Method for Solving the Inclination Problem of License Plate in Its Camera Captured Image

  • Wu, ChangCheng;Zhang, Hao;Hua, JiaFeng;Hua, Sha;Zhang, YanYi;Lu, XiaoMing;Tang, YiChen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.5990-6008
    • /
    • 2019
  • Recognizing license plate from its traffic camera captured images is one of the most important aspects in many traffic management systems. Despite many sophisticated license plate recognition related algorithms available online, license plate recognition is still a hot research issue because license plates in each country all round the world lack of uniform format and their camera captured images are often affected by multiple adverse factors, such as low resolution, poor illumination effects, installation problem etc. A novel method is proposed in this paper to solve the inclination problem of license plates in their camera captured images through four parts: Firstly, special edge pixels of license plate are chosen to represent main information of license plates. Secondly, least square methods are used to compute the inclined angle of license plates. Then, coordinate rotation methods are used to rotate the license plate. At last, bilinear interpolation methods are used to improve the performance of license plate rotation. Several experimental results demonstrated that our proposed method can solve the inclination problem about license plate in visual aspect and can improve the recognition rate when used as the image preprocessing method.

공공기관 정보보호 거버넌스 수준에 영향을 미치는 요인에 관한 연구 (A Study on Factors Affecting the Level of Information Security Governance in Korea Government Institutions and Agencies)

  • 송정석;전민준;최명길
    • 한국전자거래학회지
    • /
    • 제16권1호
    • /
    • pp.133-151
    • /
    • 2011
  • 공공기관은 정보보호를 강화하기 위하여 정보보호 거버넌스 체제를 도입하고 있다. 공공기관은 정보보호 거버넌스 체계의 중요성을 인식하고, 정보보호 거버넌스의 확립을 위해서 정책 수립 및 제도 확립에 노력을 기울이고 있다. 본 연구는 공공기관의 정보보호 거버넌스 수준에 영향을 미치는 요인을 탐색하기 위하여 정보보호 거버넌스 수준 측정 모형과 요인 모형을 개발한다. 본 연구는 공공기관 정보보호 거버넌스 수준은 최고경영층의 지원에 의해서 결정되며, 공공기관 정보보호 거버넌스는 정보보호 예산 및 정보화 담당 부서의 규모와 밀접한 관련이 있음을 제시한다. 본 연구의 결과는 공공기관의 정보보호 거버넌스 확립을 위한 정책 방향을 제시한다.

민간영역과의 공조에 의한 경비경찰 효율화에 관한 연구 (A Study on efficiency of security police through cooperation with private sector)

  • 김진혁
    • 시큐리티연구
    • /
    • 제20호
    • /
    • pp.119-140
    • /
    • 2009
  • 국가와 시민의 안전을 확보하기 위한 경비경찰 작용은 인류가 공동체를 이루기 시작할 때부터 존재하였다고 볼 수 있다. 이러한 경비작용은 처음부터 국가가 전담했다기 보다는 오랜기간 민간영역에서 자율적으로 수행되어 오다가 국가체제가 견고해 짐에 따라 공적영역이 그 기능을 흡수하게 되었다. 그러나 다양한 위험이 상존하는 현대사회에서는 공경찰만으로는 사회의 안전을 담보할 수 없게 되었고, 때문에 민간영역과의 공조는 필수적으로 요청되는 사안이다. 공경찰의 한계 속에서 경비업체와 일반시민들의 자율조직은 확장을 계속하고 있다. 때문에 이들은 사회안전망 구축을 위한 삼각대로서 파트너쉽을 발휘해야만 한다. 경비경찰은 다양한 업무와 과도한 동원에도 불구하고 경비전담인력이 확보되지 못하였기 때문에 이들의 전문성과 위기대처능력이 문제시되고 있다. 특히 전방위로 펼쳐지는 국제테러의 시대에 경비경찰의 효율화는 더욱 시급한 문제이다. 민간영역은 경비업체와 민간자율조직의 참여로 구분되어질 수 있다. 경비업체의 경우 양적인 팽창, 다양한 업무로의 진출 등 외형상의 급성장에 비하여 경비원의 자질과 업무능력의 문제가 대두된다. 순수민간활동에 있어서는 공경찰활동에 대한 이해의 필요성과 항시적 조직적 활동을 할 수 있는 여건이 마련될 필요가 제기된다. 때문에 이러한 문제점을 극복하고 공동의 목표를 효율적으로 달성하려면 공경찰영역에서는 채용방법의 변화, 경비경과 신설, 전문성 및 위기관리능력 강화가 필요하다. 경비업체의 경우 공경찰과의 공동교육을 통한 관계개선과 업무능력 강화 및 이를 통한 업무공조의 활성화가 필요하다. 또한 순수민간영역의 활동을 극대화하기 위해서는 예비경찰대 창설 및 이들 민간자율조직에 대한 관리와 대시민 홍보를 강화하여야 한다.

  • PDF

재난안전망 앱 보안 체계 구축 (Establishment of a public safety network app security system)

  • 백남균
    • 한국정보통신학회논문지
    • /
    • 제25권10호
    • /
    • pp.1375-1380
    • /
    • 2021
  • 우리나라는 재난안전통신망 개통 초기로 응용서비스 앱에 대한 보안 대응은 아직은 미흡한 실정이기에, 이에 대한 선제적 보안 대응이 반드시 필요하다. 본 연구에서는 재난안전통신망에서 앱을 유통하는 앱 스토어와 전용 단말에서 앱이 동작되는 안드로이드 운영체제에 대한 잠재적 취약점을 사전 예방하고자 '재난안전망 앱 보안 체계 구축'을 제안하였다. 응용서비스 앱이 재난안전통신망 모바일 앱스토어에 등재하고자 하기 위해서는, 우선 악성 및 정상 앱에 대한 데이터 셋을 구축하여 피쳐를 추출하고 가장 효과적인 AI 모델을 선정하여 정적 및 동적 분석을 수행한다. 분석 결과에 따라 악성 앱이 아닌 경우에 대해서 '안전 앱 인증서'를 인증하여 공인 앱에 대한 신뢰성을 확보한다. 궁극적으로 재난안전통신망 앱의 보안 사각지대를 최소화하고 인증된 앱의 재난안전 응용 서비스 지원으로 재난상황에 대한 통신망의 안전성을 확보할 수 있다.

A Provable Authenticated Certificateless Group Key Agreement with Constant Rounds

  • Teng, Jikai;Wu, Chuankun
    • Journal of Communications and Networks
    • /
    • 제14권1호
    • /
    • pp.104-110
    • /
    • 2012
  • Group key agreement protocols allow a group of users, communicating over a public network, to establish a shared secret key to achieve a cryptographic goal. Protocols based on certificateless public key cryptography (CL-PKC) are preferred since CL-PKC does not need certificates to guarantee the authenticity of public keys and does not suffer from key escrow of identity-based cryptography. Most previous certificateless group key agreement protocols deploy signature schemes to achieve authentication and do not have constant rounds. No security model has been presented for group key agreement protocols based on CL-PKC. This paper presents a security model for a certificateless group key agreement protocol and proposes a constant-round group key agreement protocol based on CL-PKC. The proposed protocol does not involve any signature scheme, which increases the efficiency of the protocol. It is formally proven that the proposed protocol provides strong AKE-security and tolerates up to $n$-2 malicious insiders for weak MA-security. The protocol also resists key control attack under a weak corruption model.

Anti-Corruption Policy to Ensure Public Order in the State Security System

  • Shchekhovska, Larysa;Gavrylechko, Yuriy;Vakuliuk, Vasyl;Ivanyuta, Viktoriya;Husarina, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.57-62
    • /
    • 2022
  • Today, in many countries of the world, the problems of forming and implementing anti-corruption policies are among the most pressing, since the scale of the spread of corruption poses a real threat to national security and democratic development. Without a victory over corruption as a system of social relations, any country will never be able to ensure the safety of its citizens, have a high standard of living, build an efficient economy and a democratic state based on the rule of law, protect its sovereignty, and become competitive among the developed countries of the world community. The main purpose of the article is to analyze the key aspects of the anti-corruption policy of ensuring public order in the state security system. The research methodology includes methods for researching aspects of the anti-corruption policy of ensuring public order in the state security system. Based on the results of the study, the main aspects of the anti-corruption policy of ensuring public order in the state security system are characterized.