• Title/Summary/Keyword: Security Area

Search Result 1,686, Processing Time 0.1 seconds

The Development of PV-Batttery Driven LED Security Lighting (태양광 배터리 하이브리드 시스템 기반 LED 보안등 개발)

  • Go, Seok-Il;Ahn, Seon-Ju;Park, Byeong-Ha;Choi, Joon-Ho
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2012.03a
    • /
    • pp.433-438
    • /
    • 2012
  • LED is expected as an environmentally friendly next generation light source with its good reliability and long lifetime. In this paper, we propose the PV-Battery Driven LED Security Lighting using the LabVIEW program. The remote monitoring is a program for monitoring the voltage and current that made from PV-Battery Driven LED security lighting in remote area. The main subject of this paper is about making the more useful monitoring program to get and save the data from LED Security Lighting. We develop a prototype of the proposed system.

  • PDF

A Study on Implementation Method of ECM-based Electronic Document Leakage Prevention System through Security Area Location Information Management (보안구역 위치정보 관리를 통한 ECM기반 전자문서유출방지 시스템 구현방안 연구)

  • Yoo, Gab-Sang;Cho, Seung-Yeon;Hwang, In-Tae
    • Journal of Information Technology Services
    • /
    • v.19 no.2
    • /
    • pp.83-92
    • /
    • 2020
  • The current technology drain at small and medium-sized enterprises in Korea is very serious. According to the National Intelligence Service's survey data, 69 percent of technology leaks are made through employees of small and medium-sized enterprises. A document security system was introduced to compensate for the problem. However, small and medium-sized enterprises are not doing well due to their poor environment. Therefore, it proposes a document security system suitable for small businesses by developing a location information machine learning system that automatically creates a document security Green Zone through learning, and an ECM-based electronic document leakage prevention system that manages generated Green Zone information by reflecting it into the document authority system. And step by step, propose a universal solution through cloud services..

Secure Electronic Financial Services using End-to-End Encryption (종단간 암호화(End-to-End Encryption)를 이용한 전자금융거래 정보보호 강화)

  • Kim, In-Seok;Lee, Su-Mi;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.65-71
    • /
    • 2007
  • Recently, security softwares are the program that is to protect the users from hackers in using electronic financial services. However heackers commit financial crimes to extort asserts using known hacking skills. In our paper, we analyse vulnerability that can be used to hook financial information in user application area and explain end-to-end encryption which is able to be provided by interacting keyboard security program and PKI application program.

  • PDF

Informational and Methodological Approach to Ensuring the Economic Security of the State in the Banking Sphere

  • Shemayeva, Luidmila;Hladkykh, Dmytro;Mihus, Iryna;Onofriichuk, Andrii;Onofriichuk, Vitalii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.477-482
    • /
    • 2021
  • The existing approaches to ensuring the banking security of the state do not take into account the peculiarities of the banking system in the rapid development of the information economy (increasing uncertainty, imbalance and nonlinearity of processes in the banking system under the influence of innovation, institutions, information asymmetry, etc.). A methodological approach to determining the synergetic effect in the implementation of the regulatory influence of the state on the development of innovation processes related to informatization in the banking system, based on the use of differential equations and modelling the sensitivity of innovation processes related to informatization in the banking system, to the regulatory influence of the state to prevent the deployment of risks and threats to economic security of the state in this area has been suggested in the present article.

Performance Analysis of Blockchain Consensus Protocols-A Review

  • Amina Yaqoob;Alma Shamas;Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.181-192
    • /
    • 2023
  • Blockchain system brought innovation in the area of accounting, credit monitoring and trade secrets. Consensus algorithm that considered the central component of blockchain, significantly influences performance and security of blockchain system. In this paper we presented four consensus protocols specifically as Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS) and Practical Byzantine Fault-Tolerance (PBFT), we also reviewed different security threats that affect the performance of Consensus Protocols and precisely enlist their counter measures. Further we evaluated the performance of these Consensus Protocols in tabular form based on different parameters. At the end we discussed a comprehensive comparison of Consensus protocols in terms of Throughput, Latency and Scalability. We presume that our results can be beneficial to blockchain system and token economists, practitioners and researchers.

The Epidemiologic Study of Farmers' Syndrome in Chonnam Province (전남지역주민의 농부증에 관한 역학적 연구)

  • Moon, Gang;Choi, Jin-Su;Sohn, Seok-Joon;Kim, Byong-Woo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.26 no.3 s.43
    • /
    • pp.321-331
    • /
    • 1993
  • This survey was conducted to investigate Farmers' Syndrome and its related factors in Chonnam province. 5,920 (men 6,148, women 6,722) persons in urban area and 12,870 (men 6148, women 6,722) persons in rural area were selected in stratified cluster sampling manner, and interviewed individually with structured questionnaire in April, 1992. The results were summarized as follows : 1 In rural area of Chonnam province, the prevalence of Farmers' syndrome positive was 283 per 1,000 persons (203 in male, 355 in female). In urban area of Chonnam province, control area, the prevalence of Farmers' syndrome positive was 113 (72 in male, 145 in female). The prevalence of Farmers' syndrome positive in rural area was 2.5 times higher than that of urban area, and the prevalence in female was 1.7 times higher than that of male. The prevalence in total respondents was 256. 2. In rural area of Chonnam province, the age standardized prevalence of Farmers' syndrome positive was 209 per 1,000 persons (140 in male, 267 in female). In urban area of Chonnam province, control area, the age standardized prevalence of Farmers' syndrome positive was 122(79 in male, 158 in female). The age standardized prevalence in total respondents was 194. 3. The associated factors with Farmers' syndrome in univariate analysis were having illness during recent 15 days, age, sex, occupation, area, monthly income, education, medical security status, family size and duration of farming. 4. When applying multiple logistic regression for Farmers' syndrome, the significant variables were having illness during recent 15 days, area, sex, age, education, medical security status, family size and duration of farming.

  • PDF

Enhanced Security Measurement of Web Application Testing by Outsourcing (외주 개발 웹 어플리케이션 테스팅의 보안성 강화 방안)

  • Choi, Kyong-Ho;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.3-9
    • /
    • 2015
  • A web application that allows a web service created by a internal developer who has security awareness show certain level of security. However, in the case of development by outsourcing, it is inevitable to implement the development centered on requested function rather than the issue of security. Thus in this paper, we improve the software testing process focusing on security for exclusion the leakage of important information and using an unauthorized service that results from the use of the vulnerable web application. The proposed model is able to consider security in the initial stage of development even when outsourced web application, especially, It can prevent the development schedule delay caused by the occurrence of modification for program created by programer who has low security awareness. This result shows that this model can be applied to the national defense area for increasing demand web application centered resource management system to be able to prevent service of web application with security vulnerability based on high test.

Ocean Security and its Dilemma among the OAS countries in the 21st Century: Conflict between the Re-establishment of the 4th Fleet and Emerging of UNASUR in S. America (21세기 미주대륙과 대서양 해양안보의 딜레마: 미4함대의 등장과 남미지역과 갈등)

  • Ha, Sang-Sub
    • Journal of International Area Studies (JIAS)
    • /
    • v.14 no.2
    • /
    • pp.449-476
    • /
    • 2010
  • This paper focuses on the security problems in atlantic ocean involved in the USA and Latin America and the Caribbean. The ocean security matters in this region have mainly argued military concerns traditionally. However, the concept of ocean security has been changed in the 21st century and strongly debated with various dimensions: social, human and resource, environment as well. This paper traces these changed concepts currently with many empirical cases existed in many security conflicts in this ocean, especially between the USA and Latin(South) America region. Historically, security conflicts in the OAS(Organization of American States) countries have involved with many military matters, territory and oceans, and currently added up with terrorism and drug problems as well. However, the great and potential conflict emerged in the security issues is resource matter in this ocean and get a dilemma to be sorted out between military and social security matter. For example, the re-establishment of 'the 4th Fleet' in US Navy got a great conflict between the USA and the South American countries, both of them wants to achieve to resource security in this ocean to meet their energy security. Finally this paper addresses some implications and prospects in this conflict in near future and suggests a few solutions and advices for Korean's relation in this ocean.

A Study on the Security Framework Design for Stable Operation of Critical Infrastructure Service (주요기반시설 서비스의 안정적 운영을 위한 보안 프레임워크 설계에 관한 연구)

  • Lee, Suyeon;Yoo, Jiyeon;Lim, Jongin
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.63-72
    • /
    • 2016
  • Critical infrastructure has been operating in a closed environment with a completely separate information system and in the private area. However, with the current ICT environment changes due to convergence and open platforms it has increased the threats and risks to critical infrastructure. The importance of cyber security is increasing in the infrastructure control system, such as the outbreak of Ukraine blackout in 2015 by a malicious code called 'black energy'. This thesis aims to recognize the importance and necessity of protecting the critical infrastructure service, designing a security framework reflecting environmental and characteristic changes, and analyzing the management system suitable for a security framework. We also propose a theoretical basis for constructing a new security framework by comparing and analyzing seven international security management system standards, such as NIST 800-82 and IEC 62443-2-1, which are used in the control system. As a result, the environment surrounding critical infrastructure changes with the characteristics of connectivity, openness, and finality was studied, and as a response to this, many scholars and institutions present critical infrastructure security frameworks as cycle enhancement type structures, risk management structures, and management domain expansion structures. In response, the security framework encompassing these structures, CISF (Critical Infrastructure Security Framework), was designed. Additionally, through the security related international standard and criterion analysis, as a newly designed security standard suitable for CISF, IEC 62443-2-1 is reviewed and suggestions are made.

Study on Security Framework using Security Quantitative Analysis for the Effective Multimedia Services to WLAN Mesh Network (무선랜 메쉬 네트워크에서의 효율적인 멀티미디어 서비스를 위한 보안 정량화 기반의 프레임워크 연구)

  • Shin, Myoung-Sub;Lim, Sun-Hee;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of Broadcast Engineering
    • /
    • v.13 no.2
    • /
    • pp.261-273
    • /
    • 2008
  • Multimedia service whose use is rapidly increasing supports effective services to convert and transmit multimedia data based on network speed, noise circumstance, terminal computation, and type of contents for satisfying QoS. For supporting information protection of multimedia service, it offers middle level of singular security service or security mechanism which is based on policy of service provider, depending on present terminal computation and type of contents. It can support security mechanism for more effective multimedia service, if we study security of application layer and network layer for supporting multimedia service. In this paper, we propose Multimedia security framework reflected on quantitative analysis of the WLAN(Wireless Local Area Network) mesh network security using the utility function in the level of the sorority, violation and addictive compensation model.