• Title/Summary/Keyword: Respond Plan

Search Result 309, Processing Time 0.029 seconds

A Study on Countermeasures through Messenger Phishing Experience Analysis (메신저피싱 경험사례 분석을 통한 대응방안 연구)

  • Nam, Sowon;Lee, Haksun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.791-805
    • /
    • 2022
  • In recent years, the number of scams related to voice phishing has been on the decline, but the number of messenger phishing attacks, a new type of crime, is increasing. In this study, by analyzing SNS posts containing messenger phishing cases, criminal trends of the main methods, imposture of trusted relative and fake payment were identified. Through the analysis, main words and patterns composing the message and the similarity and continuity of the phone numbers used were derived as criminal attributes, and criminal organizations were grouped. As the results of the analysis, we propose a cooperative system to prevent damage from messenger phishing by disseminating the criminal information collected by investigative agencies to private operators, and a plan to respond to messenger phishing predicted through grouping of criminal organizations.

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

A study on the occurrence and transfer status of emergency patients at Incheon International Airport (인천국제공항의 응급환자 발생 및 이송 현황에 관한 연구)

  • Ji-in Jo;Kyoung-youl Lee
    • The Korean Journal of Emergency Medical Services
    • /
    • v.27 no.2
    • /
    • pp.51-63
    • /
    • 2023
  • Purpose: The study aimed to analyze the occurrence and transfer status of emergency patients at Incheon International Airport in Korea. Methods: This study design included 810 patients for eight years, from July 1, 2014 to June 31, 2022. The collected data were analyzed with SPSS statistics version 25.0. Results: For the demographics, 531 (65.6%) were males, 151 (19.5%) were in the highest age group (in their 50s), and 289 (35.9%) were foreigners. The most common place of occurrence was in protected areas in the passenger terminal, with 341 (42.1%) of cases occurring here. The time of arrival at the site (z=-3.444, p=.001), stay duration at the site (z=-8.145, p=. 001), and transfer time (z=-3.623, p=.000) were all significantly longer. Conclusion: It is necessary to consider a rapid emergency transportation plan, such as developing a system that simplifies immigration procedures when emergency patients move from protected areas to general areas. Moreover, in order to quickly respond to foreign emergency patients, detailed characteristics will need to be identified. Lastly, considering the long transfer time, an instructing doctor should accompany an ambulance and actively perform advanced resuscitation.

A Plan to Create New Job Positions for the Elderly in the Era of the 4th Industrial Revolution : Focused on Cheonan-Si (4차 산업혁명 시대 노인 일자리 창출 방안: 천안시를 중심으로)

  • Kim, Chilhyeon;Kim, Taehong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.159-160
    • /
    • 2021
  • We are facing major changes such as an aging population along with the 4th industrial revolution based on ICT technologies such as artificial intelligence, the Internet of Things, autonomous driving, and factory automation. For the local governments that are indexed in high population extinction risk, it is essential to consider market expansion and re-education policies suitable for regional characteristics in order to respond to changes such as advanced industrial automation and population aging. For the reemployment of the elderly, we will analyze previous public strategies for elderly-friendly jobs, expand investment in age-friendly industries. In this study, we suggest to improvement direction of the elderly labor market in Cheonan-Si.

  • PDF

Analysis of Security Trends in Smart Cities(A focus on grids, buildings, and transportation) (스마트시티(그리드, 빌딩, 교통 중심)보안 동향 분석)

  • Jeom-goo, Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.37-47
    • /
    • 2022
  • The need for smart city is emerging all over the world to solve these urban problems such as urban resource and infrastructure shortage, traffic congestion, energy problems and to preemptively respond to the fourth industrial revolution. The analysis that the security of smart city technology is dangerous is dominant all over the world. In this paper, we analyze the technology, security threats and responses of smart city, which are the main security issues of smart city, limited to smart grid, smart building, and smart traffic. In the future, the analysis of various technologies of smart city construction and the research on cyber security are actively progressing, and this paper is expected to be the beginning of the solution plan.

A Study on Direction of University Safety Management Policy by AHP Analysis (AHP 분석을 통한 대학안전관리정책 방향에 대한 연구)

  • Jaeshin Seo;Taekeun Oh
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.511-517
    • /
    • 2023
  • Universities are subject to various safety laws and regulations and practical measures are needed to properly implement them. In order to improve safety management through response to each law, intensive management is required by having an organization and professional personnel in charge, but it is financially difficult to appropriately allocate personnel to respond to laws. Therefore, in this study, necessary safety management policy items were set to reflect the requirements of major laws related to university safety, and a reasonable safety management plan was proposed through the AHP for priorities.

COST-EFFECTIVE MODEL FOR ENERGY SAVING IN SUPER-TALL BUILDING

  • Kwonsik Song;Moonseo Park;Hyun-Soo Lee;Sooyoung Kim;Jinho Shin
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.294-299
    • /
    • 2013
  • In many urban cities, super-tall buildings have been being constructed around New York and Chicago as the center since 1930 to improve the efficiency of land use and respond to new residential type. In terms of energy consumption, super-tall buildings are classified as a top energy consumption building. Also, as time passed, the degradation of energy performance occurs in super-tall buildings like general things so that these cannot show the initial performance planned in the design phase. Accordingly, building owners need to make a plan to apply energy saving measures to existing building during the operation phase. In order to select energy saving measures, calculus-based methods and enumerative schemes have been typically used. However, these methods are time-consuming and previous studies which used these methods have problems with not considering the initial construction cost. Consequently, this study proposes a model for selecting an optimal combination of energy saving measures which derives maximum energy saving within allowable cost using genetic algorithms. As a contribution of this research, it would be expected that a model is utilized as one of the decision-making tools during the planning stage for energy saving.

  • PDF

The Analysis of KASS Operational Mitigation Methods and Continuity Cases Based on ICAO Standards (ICAO 표준 기반 KASS 운영 상 완화조치 및 연속성 사례 분석)

  • Yun-Jung Choi;Dong-Hwan Bae;Hyo-Jung Yoon;Donghwan Yoon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.13 no.2
    • /
    • pp.131-136
    • /
    • 2024
  • This paper deal with a method for calculating the continuity of Korea Augmentation Satellite System (KASS), which was completed in Korea in December 2023, and a plan to respond in the event that a continuity hazard situation occurs during operation. For this purpose, the International Civil Aviation Organization (ICAO) Satellite Based Augmentation System (SBAS) continuity standards, Wide Area Augmentation System (WAAS), and European Geostationary Navigation Overlay Service (EGNOS) continuity cases are examined in this paper. According to the measures recommended by the ICAO, when the number of continuity risks exceeds a certain level and the level drops drastically, various mitigation operations by country are implemented. Through this, if KASS does not meet ICAO continuity standards in the future, such measures can be referred to. In addition, this paper computes the short-term KASS continuity during the test broadcast period. Although continuity does not meet the ICAO standards, although this test period is too short, further meaningful analysis in the future is required. Additionally, this paper carried out an analysis of the timing and period to systematically calculate the meaningful value of continuity.

Introduction and Activation of ESG Management of Small Manufacturing Companies (소규모 제조기업의 ESG경영 도입 및 활성화방안)

  • Ik-Gu Park;Soo-Yong Park;Dong-Hyung Lee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.47 no.1
    • /
    • pp.51-59
    • /
    • 2024
  • Recently, ESG management has become a global trend, receiving increasing attention from stakeholders such as consumers, investors, and governments, as regulations related to ESG disclosure and supply chain due diligence have been strengthened since the United Nations Principles of Responsible Investment (UN PRI) was announced in 2006. ESG is an acronym for the environment (E), social (S), and governance (G) and is accepted as a key factor for the continuous survival and growth of a company. As a result, there are over 600 ESG management evaluation indicators operated domestically and internationally, and numerous global initiatives have emerged. Korea's Ministry of Trade, Industry and Energy also announced "K-ESG Guidelines (December 2011)" and "K-ESG Guidelines for Supply Chain Response (December 22)" to help SMEs introduce ESG management and respond to supply chain due diligence. However, small-scale manufacturing companies with poor financial, human resources, and technological capabilities face significant challenges in introducing ESG management. Accordingly, this study aims to examine the current status of ESG management adoption in small-scale manufacturing companies with less than 150 people in Korea and propose activation plan ESG management based on the diagnostic requirements of the "Supply Chain Response K-ESG Guidelines."

The Study for Cloud-native Application of Public Sector Information System on Considerations during Project Execution (공공부문 정보시스템의 클라우드 네이티브 적용을 위한 적합성 검토방안 및 사업진행 시 고려사항에 대한 연구)

  • Jin Won Choi;Eun Suk Lee
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.27-35
    • /
    • 2024
  • In accordance with the cloud conversion of public sector information systems and the implementation of cloud native introduction policies, review items were presented to review the cloud native of information systems for stable and efficient cloud native deployment. By presenting cloud native considerations when promoting a project, we propose a plan to flexibly respond to policy and business changes and improve development quality and productivity to operate cloud services stably. In order for information project managers to switch to a cloud-native-based information system in order to efficiently utilize the cloud as a cloud, they must decide whether to introduce cloud-native through suitability review questions and sufficiently review development and operation costs and efficiency to promote the project. As a result of conducting a focus group interview (FGI) with a council of cloud native experts, there was an opinion that information systems can be operated in a cloud-native manner even with a monolithic structure. By fully considering the circumstances of each system, development quality and productivity, we expect to be able to operate improved to provide a stable cloud service.