• Title/Summary/Keyword: Rapid audit

Search Result 20, Processing Time 0.022 seconds

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

Chinese Policy to Stimulate University-Industry Linkages in Nanjing

  • Su, De-Jin;Sohn, Dong-Won;Sohn, Sunwoo
    • STI Policy Review
    • /
    • v.4 no.2
    • /
    • pp.74-95
    • /
    • 2013
  • Rapid changes in the economic, social and academic environments often provide opportunities to develop new and advanced technologies. In China, recent literature on the role of universities suggests that university-industry linkages (UILs) play a substantial role in the development of high-tech industries. Since 1979 when the country became more open and underwent economic reform, Chinese central authorities, local governments, and universities have continued to set up various science and technology (S&T) policies to stimulate UILs, contributing to China's technological progress and economic growth. This study examines the role of S&T policies on UILs such as transfer of technology, joint research, and spin-off creation with a particular focus on Nanjing University (NJU) in Jiangsu Province. Nanjing has over 53 universities, ranking it behind Beijing and Shanghai in terms of S&T and higher education opportunities. By adopting "institutional methodology," this study contends that UILs not only benefit universities and industry but also society in terms of job training, consulting activities, joint research, R&D results commercialization, patent licensing, new business creation, and other aspects. Finally, we suggest that the Chinese experience, though with some problems, might enhance our understanding of how to stimulate UILs through the arrangement of various S&T policies.

A Study on the Applicability of ENERWATER for Evaluation of the Energy Consumption Label of WWTPs in Korea (국내 하수처리시설 에너지 등급 평가를 위한 ENERWATER의 적용 가능성에 관한 연구)

  • Park, Minoh;Lee, Hosik
    • Journal of Korean Society on Water Environment
    • /
    • v.38 no.5
    • /
    • pp.231-239
    • /
    • 2022
  • In this study, we applied ENERWATER to evaluate the energy consumption labeling of wastewater treatment plants in Korea using the Korea sewerage statistics data. The results showed that the energy label status was excellent in the SBR process for small and medium-scale wastewater treatment plants and the A2O process for large-scale wastewater treatment plants. The energy labeling of wastewater treatment plants of 50,000 tons capacity was excellent. The statuses of metropolitan cities and Jeollanam-do province were excellent. We analyzed the effects of renewable energy on wastewater treatment plants' energy consumption and found out that digestion gas for large-scale plants and photovoltaic energy for small-scale plants were effective in improving energy labeling. In addition, we compared the energy labels of four wastewater treatment plants in "Z" city and wastewater treatment plant "X" had the best energy label, and the wastewater treatment plants "V" and "Y" had to be selected as priorities for the energy diagnosis and improvement project. In a comprehensive conclusion, the applicability of ENERWATER was confirmed based on sewage statistics data and labeling can be used to set priorities for the energy diagnosis and improvement project.

Secure SLA Management Using Smart Contracts for SDN-Enabled WSN

  • Emre Karakoc;Celal Ceken
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3003-3029
    • /
    • 2023
  • The rapid evolution of the IoT has paved the way for new opportunities in smart city domains, including e-health, smart homes, and precision agriculture. However, this proliferation of services demands effective SLAs between customers and service providers, especially for critical services. Difficulties arise in maintaining the integrity of such agreements, especially in vulnerable wireless environments. This study proposes a novel SLA management model that uses an SDN-Enabled WSN consisting of wireless nodes to interact with smart contracts in a straightforward manner. The proposed model ensures the persistence of network metrics and SLA provisions through smart contracts, eliminating the need for intermediaries to audit payment and compensation procedures. The reliability and verifiability of the data prevents doubts from the contracting parties. To meet the high-performance requirements of the blockchain in the proposed model, low-cost algorithms have been developed for implementing blockchain technology in wireless sensor networks with low-energy and low-capacity nodes. Furthermore, a cryptographic signature control code is generated by wireless nodes using the in-memory private key and the dynamic random key from the smart contract at runtime to prevent tampering with data transmitted over the network. This control code enables the verification of end-to-end data signatures. The efficient generation of dynamic keys at runtime is ensured by the flexible and high-performance infrastructure of the SDN architecture.

A Study on Practical Method of Utility Curve for Deciding Priority Order of the Improvements in Traffic Safety Audit (교통안전진단 개선방안들의 우선순위 산정 연구)

  • Choi, Ji Hye;Kang, Soon Yang;Hong, Ji Yeon;Lim, Joon Beom
    • Journal of the Korean Society of Safety
    • /
    • v.31 no.3
    • /
    • pp.143-155
    • /
    • 2016
  • Recently, a massive loss of life and property is occurring in Korea due to traffic accidents, with the rapid increase in cars. For improvement of traffic safety, the Korea Transportation Safety Authority intensively analyzes accident data in local governments with low traffic safety index, performs a field investigation to extract problems and offers local governments improvements for problems, by conducting the 'Special Survey of Actual Conditions of Traffic Safety' each year, starting 2008. But local governments cannot strongly push forward the improvement projects due to the limited budget and the uncertainty of the improvement plan effects. Therefore, this study suggested a model which applied the Utility concept to the AHP theory, in order to efficiently decide a priority of the improvement plans in accident black spots in consideration of the limited budget of local governments. The number of accidents in each spot for improvement and accident severity, traffic volume, pedestrian volume, the improvement project cost and the accident reduction effect were chosen as evaluation factors for deciding a priority, and data about the improvement plan costs and the accident reduction effects, traffic accidents and traffic volume in the spots to undergo the special research on the real condition of traffic accident in the past were collected from the existing studies. Then, regression analysis was carried out and the Utility Curve of each evaluation factor was computed. Based on the AHP analysis findings, this study devised a priority decision method which calculated the weight and the utility function of each evaluation factor and compared the total utility values. The AHP analysis findings showed that among the evaluation factors, accident severity had the biggest importance and it was followed by the improvement plan cost, the number of accidents, the improvement effect, traffic volume and pedestrian volume. The calculated utility function shows a rise in utility, as the variables of the 5 evaluation factors; the number of accidents, accident severity, the improvement plan effect, traffic volume and pedestrian volume increase and a fall in utility, as the variables of the improvement plan cost increase, since the improvement plan cost is included in the budget spent by a local government.

Materialize the Checklist through Type of Classification analysis for the Regulatory Compliance and Database Encryption, Access Control (데이터베이스 규제 준수, 암호화, 접근제어 유형 분류에 따른 체크리스트 구현)

  • Lee, Byoung-Yup;Park, Jun-Ho;Kim, Mi-Kyoung;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.61-68
    • /
    • 2011
  • Due to the rapid development of the Internet, many companies in a variety of applications to users open an unspecified number of the current business environment, security of personal information about recent issues are often mentioned in terms of its importance may be the company's top priority. The government recently on personal information strengthening measures on information communications network law enacted into law which is applicable to various industries. Companies to protect the personal information of various measures to comply with these regulations, and arrange your personal information for internal management to enhance security fast security solution has been introduced. The number of used data is stored in the DBMS in terms of compliance with these regulations at the same time effectively to ensure data security and encryption measures, access control, audit, each separated by an implementation of the solution and how it compares with the best Database security plan allows you to explore as a this paper's security checklist.

A Study on ISMS-P Controls for Hyper Scale Cloud (하이퍼 스케일 클라우드에 적합한 정보보호 및 개인정보보호 관리체계 인증 통제항목 연구)

  • Yong-Nyuo Shin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.19-26
    • /
    • 2023
  • Critical information infrastructure designations for cloud service providers continue to spread around the world as energy, financial services, health, telecommunications, and transportation sectors move to the cloud. In addition, in the case of Ukraine, the removal of restrictions on the use of cloud for national critical facilities and the rapid transition of critical data to the cloud enabled the country to effectively respond to cyberattacks targeting Russian infrastructure. In Korea, the ISMS-P is operated to implement a systematic and comprehensive information protection management system and to improve the level of information protection and personal information protection management in organizations. Control items considering the cloud environment have been modified and added to the audit of companies. However, due to the different technical levels of clouds between domestic and global, it is not easy to obtain information on the findings of cloud providers such as Microsoft for the training of domestic certification auditors on hyperscale scale. Therefore, this paper analyzes findings in hyperscale clouds and suggests ways to improve cloud-specific control items by considering the compatibility of hyperscale environments with ISO/IEC 27001 and SOC(System and Organization Control) security international standards.

Evaluation and Comparison with Standard 48 hr Acute Bioassay and High Temperature Rapid Toxicity Test for Sewage Toxicity Test (하수의 독성평가를 위한 표준독성시험법과 온도증가 단기독성평가법의 비교 평가)

  • Lee, Sang-Ill;Jun, Byong-Hee;Weon, Seung-Yeon;Kim, Yi-Jung;Kim, Keum-Yong
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.27 no.2
    • /
    • pp.191-197
    • /
    • 2005
  • A new method, ToxTemp (TOXcity test based on TEMPerature control) using Ceridaphnia dubia was applied to evaluate the toxicity of insecticide materials and compared with the standard 48 hr acute bioassay. BPMC, diazinon and fenitrothion may cause the inhibition to the biological process in sewage treatment plant and need to detect toxicity within short contact time. The ToxTemp method showed sensitive detection with more shorter contact of 1-1.5 hr time than that of the standard 48 hr acute bioassay. To evaluate toxicity of real wastewater/sewage, the inhibition rate of nitrification and oxygen uptake rate (OUR) using activated sludge, the standard 48hr acute bioassay and ToxTemp method using C. dubia were compared, respectively. On the basis of the inhibition rate of nitrification, the OUR test showed the less sensitive results at the relatively strong toxic sewage. On the other hands, the standard 48hr acute bioassay and ToxTemp method using C. dubia represented the toxicity of each wastewater/sewage with high sensitivity. Even the slightly low (about 1.5%) sensitivity, the ToxTemp method showed the high applicability to the real site of sewage treatment plant.

Nutrient Intake Status of Korean Drinkers: Analysis of Data from Korea National Health and Nutrition Examination Survey (KNHANES), 2011 (성인 음주자의 영양소 섭취실태: 2011 국민건강영양조사 자료 분석)

  • Kim, Hyung-Tae;Chun, Sung-Soo;Joung, Sun-Hee;Yun, Mi-Eun
    • Journal of the Korean Dietetic Association
    • /
    • v.19 no.4
    • /
    • pp.343-355
    • /
    • 2013
  • This study analyzed the dietary habits and nutrient intake status of adult drinkers in Korea. Alcohol drinking patterns were obtained from the Korea National Health and Nutrition Examination Survey (KNHANES). Among 4,968 persons, 91.5% were drinkers. Classification of their drinking patterns by the Alcohol Use Disorders Identification Test (AUDIT) score showed 64.5% of the drinkers were normal drinkers, 22.4% problem drinkers and 13.2% alcohol-dependent drinkers. Overall, 47% of the drinkers were considered alcohol-dependent in the Rapid Alcohol Problems Screen (RAPS4). Significant differences were found between those who abstained from alcohol (86.8%) and alcohol-dependent drinkers (68.9%); when asked about breakfast habits 73.4% of non-drinkers often had family meals, while only 55.4% of the alcohol-dependent drinkers had family meals. Dietary energy, alcohol energy, and total energy intake significantly increased for the alcohol-dependents (P<0.001). In addition, the intake of eight nutrients (protein, vitamin A, vitamin $B_1$, vitamin $B_2$, niacin, calcium, phosphorous and iron), significantly increased in the following order (least to highest): abstainers, normal drinkers, drinkers with a moderate addiction to alcohol and alcohol-dependent drinkers (P <0.05). Nutrient Adequacy Ratios (NAR) of all nutrients, except vitamin C, and the Mean nutrient Adequacy Ratio (MAR) significantly increased in the following order (least to highest): abstainers, normal drinkers, drinkers with a moderate addiction to alcohol and alcohol-dependent drinkers (P<0.05). The intake of vitamin $B_1$, vitamin $B_2$, and niacin per 1,000 kcal, according to drinking pattern, decreased in the order of abstainers, normal drinkers, drinkers with a moderate addiction to alcohol, and alcohol-dependent drinkers (P<0.001). The above results show that the nutrient intake of normal drinkers, drinkers with a moderate addiction to alcohol, and alcohol-dependent drinkers are higher than abstainers. However, overall intake of vitamin $B_1$, vitamin $B_2$, and niacin per 1,000 kcal was low. Therefore it is necessary to increase vitamin $B_1$, vitamin $B_2$, and niacin intake for drinkers.

Management and Supervision Measures for Virtual Asset Ecosystem (가상자산 생태계 관리・감독 방안)

  • Sehyun Lee;Sangyeon Lee;Hee-Dong Yang
    • Knowledge Management Research
    • /
    • v.24 no.3
    • /
    • pp.73-94
    • /
    • 2023
  • With the virtual asset market's rapid growth, government regulations on listing and trading procedures are expected. However, specific measures are currently lacking. To ensure stable inclusion in the institutional framework, precise regulations are needed for market development and investor protection. This study compares self-regulatory guidelines of the top domestic virtual asset exchanges with Korea Exchange's Preliminary Listing Examination Standards (2022) to enhance timeliness and relevance. It defines IEO, IPO, and ICO concepts and addresses conflicts of interest in IEO. Analyzing delisted virtual assets, it categorizes issues and classifies listing examination guidelines into formal and qualitative requirements. The study examines self-regulatory guidelines based on continuity, transparency, stability, corporate characteristics, and investor protection criteria, along with five special requirements for virtual assets. Improvement measures include regular disclosures of governance structure, circulation volume, and the establishment of independent audit institutions. This research further analyzes delisting cases, classifies issues, and proposes solutions. Considering stock market similarities, it offers measures based on the institutional framework.