• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.03 seconds

The Brainwave Analyzer of Server System Applied Security Functions (보안기능을 강화한 뇌파 분석 서버시스템)

  • Choi, Sung-Ja;Kang, Byeong-Gwon;Kim, Gui-jung
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.343-349
    • /
    • 2018
  • Electroencephalograph(EEG) information, which is an important data of brain science, reflects various levels of information from the molecular level to the behavior and cognitive stages, and the explosively amplified information is provided at each stage. Therefore, EEG information is an intrinsic privacy area of an individual, which is important information to be protected. In this paper, we apply spring security to web based system of spring MVC (Model, View, Control) framework to build independent and lightweight server system with powerful security system. Through the proposal of the platform type EEG analysis system which enhances the security function, the web service security of the EEG information is enhanced and the privacy of the EEG information can be protected.

Implementation of a High Performance SEED Processor for Smart Card Applications (스마트카드용 고성능 SEED 프로세서의 구현)

  • 최홍묵;최명렬
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.37-47
    • /
    • 2004
  • The security of personal informations has been an important issue since the field of smart card applications has been expanded explosively. The security of smart card is based on cryptographic algorithms, which are highly required to be implemented into hardware for higher speed and stronger security. In this paper, a SEED cryptographic processor is designed by employing one round key generation block which generates 16 round keys without key registers and one round function block which is used iteratively. Both the round key generation block and the F function are using only one G function block with one 5${\times}$l MUX sequentially instead of 5 G function blocks. The proposed SEED processor has been implemented such that each round operation is divided into seven sub-rounds and each sub-round is executed per clock. Functional simulation of the proposed cryptographic processor has been executed using the test vectors which are offered by Korea Information Security Agency. In addition, we have evaluated the proposed SEED processor by executing VHDL synthesis and FPGA board test. The die area of the proposed SEED processor decreases up to approximately 40% compared with the conventional processor.

Peer to Peer Anonymous Protocol Based Random Walk (랜덤 워크 기반의 P2P 익명 프로토콜)

  • Cho, Jun-Ha;Rhee, Hyun-Sook;Park, Hyun-A;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.65-76
    • /
    • 2007
  • The P2P file sharing system sends the results to users by searching the files in the shared folders. In the process of it, the problem is that the transferred information includes the pathname and file information and it can be revealed who searches which files. In related to this problem, anonymous file sharing P2P protocol has been an active research area where a number of works have been produced. However, the previous studies still have a few of weakness. Therefore, We propose two anonymous P2P file sharing protocols based on the decentralized and unstructured Random Walk. The first scheme uses the dynamic onion routing where the requester can receive the wanted file without knowing other peers' IDs. The second scheme uses the IP multicast method which lowers the computational overhead. Both of them are more suited for the dynamic P2P system.

A Development of Curriculum for Information Security Professional Manpower Training (정보보안 전문인력 양성을 위한 교육과정 개발)

  • Lee, Moongoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.46-52
    • /
    • 2017
  • Social attention to information security field is inspired, and manpower demand forecast of this area is getting high. This study surveyed information security knowledge of practitioners who work in a field of information security such as computer and network system. We analyzed a connection between survey data, information protection job system that was suggested by NICE, IT skills that NCS and KISA classified and security field classification system. Base on data that analyzed, this study suggests a curriculum that trains professional manpower who perform duties in the field of information security. Suggested curriculum can be applied to 2 year college, 3 year college and 4 year college. Suggested curriculum provides courses that students who want to work in a field of information security must learn during the college. Suggested courses are closely connected to a related field and detailed guideline is indicated to each course to educate. Suggested curriculum is required, and it combines a theoretical education that become basis and a practical education so that it is not weighted to learn theory and is not only focusing on learning simple commands. This curriculum is established to educate students countermeasures of hacking and security defend that based on scenario that connected to executive ability. This curriculum helps to achieve certificates related to a field more than paper qualification. Also, we expect this curriculum helps to train convergent information security manpower for next generation.

A Efficient Network Security Management Model in Industrial Control System Environments (산업제어시스템 환경에서 효과적인 네트워크 보안 관리 모델)

  • Kim, Il-Yong;Lim, Hee-Teag;Ji, Dae-Bum;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.664-673
    • /
    • 2018
  • The industrial control system (ICS) has operated as a closed network in the past, but it has recently been linked to information and communications services and has been causing damage due to cyber attacks. As a countermeasure, the Information Communication Infrastructure Protection Act was enacted, but it cannot be applied to various real control environments because there is only a one-way policy-from a control network to a business network. In addition, IEC62443 defines an industrial control system reference model as an international standard, and suggests an area security model using a firewall. However, there is a limit to linking an industrial control network, operating as a closed network, to an external network only through a firewall. In this paper, we analyze the security model and research trends of the industrial control system at home and abroad, and propose an industrial control system security model that can be applied to the actual interworking environments of various domestic industrial control networks. Also, we analyze the security of firewalls, industrial firewalls, network connection equipment, and one-way transmission systems. Through a domestic case and policy comparison, it is confirmed that security is improved. In the era of the fourth industrial revolution, the proposed security model can be applied to security management measures for various industrial control fields, such as smart factories, smart cars, and smart plants.

The Devices for Improvement against the Precedents about unfair Transactions in the Security Industries (경비업계에 있어서의 불공정거래의 사례 개선방안)

  • Kim, Tae-Wan
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.37-60
    • /
    • 2006
  • The area of security service has been maintaining the high growth curve annually by improving security consciousness from increase of the income and the progress of public services's level by the accomplishment in the info-communication field, recently the demand for unmanned security system is extended form commercial purposes into public offices and individual's houses. In addition to, the possible distance of offering services is scheduled to magnify. At the period when security company's influence has been becoming significant, the injustice transaction is the serious factor which obstructs the development of security companies. Therefore, it is urgent thing to devise counterplans to extirpate injustice transactions. There are the legalistic approaches of the breakthroughs against injustice transactions. One thing is settling the standard of the judgment and the other is renovating the provision of injustice transactions. Utilizing the principles of the fair competitions and importing self-obedience programs within the range of trade actions which is permitted by law, acted as the system approach. Moreover, there are such three things which can achieve mutual balances as establishing the range of the permitted action toward business corporations, applying spontaneously the fair competition principles and introducing the system of standard agreements. Gong further, this can establish order of security service areas and control them. Besides, it is possible for every organizations to make and operate the system appropriately by importing the self-observance system.

  • PDF

Standards on the Effectiveness of the Rights to Social Security of People with Disability (장애인 사회보장수급권의 실효성 기준에 관한 연구)

  • Seo, Jeong-Hee
    • Korean Journal of Social Welfare
    • /
    • v.62 no.1
    • /
    • pp.211-235
    • /
    • 2010
  • This study attempts to examine standards on the effectiveness of the rights to social security of people with disability. The current research makes the standards on effectiveness of social security rights to the disabled. This standards draw four right areas and five general principles from debates about effectiveness of general social security rights and extend for applying three social area to the disabled. Four right areas are benefit coverage, benefit structure, benefit restriction and rights relief. Five general principles are enforceable rule principle, national finance principle, unconditional principle, adequacy principle and penalties principle. These four right areas and five general principles apply to three social security areas of income support, employment security and medical security. Measurement values are 'high' and 'low'. These measurement values divided into two that are used to ensure same intervals. This study on standards to the effectiveness of the rights to social security of people with disability has political and theoretical implications. First, in political aspects, these standards provide objective understanding of the present level of social security policies for the disabled. Second, theoretically the current study expands debates about the effectiveness of general social security through multi-disciplined research. At once this study is significant to establish empirical research foundation.

  • PDF

Relation of Empowerment and Organization Attachment with the Organization Culture of Security Organization (시큐리티조직의 조직문화와 임파워먼트 및 조직애착도의 관계)

  • Kim, Chan Sun
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.33-41
    • /
    • 2014
  • The purpose of this study is to establish the relationship of empowerment and organization attachment with the organization culture of security organization. This study is based by setting the security organization employed in security firms in the capital area(Seoul) in 2012 as the parent population and using the purposive sampling method to analyze a total amount of 280 examples. The frequency analysis, analysis on primary factors, reliability analysis, multiple regression analysis, path analysis methods using SPSSWIN 18.0 were used in analysis. The reliability of the survey showed a Cronbach's ${\alpha}$ value of over 0.690. The results are like the following. First, the organization culture of security organization affect empowerment. Thus, the more a practical development culture is settled, the more the capability of self-determinism, meaningfulness, and effect is amplified. Moreover, the more a consensual culture is established, the more the capability of self-determinism is enhanced, and the more a hierarchical culture is established, the more the meaningfulness is enhanced. Second, the organization culture of security organization affect organization attachment. Thus, the continuous normative attachment is enhanced when a more hierarchical culture is established. Moreover, emotional attachment is enhanced when a more practical development culture is established. Third, the empowerment of security organization affects organization attachment. Thus, the continuous normative attachment is decreased when one's capability of self-determinism is more lacking. However, the continuous normative attachment is higher when the meaningfulness and effect is enhanced. Moreover, emotional attachment is enhanced when meaningfulness is increased. Fourth, the organization culture of security organization directly/indirectly affects empowerment and organization attachment. Thus, empowerment is an important mediating factor between organization culture and organization attachment.

The Factors Influencing on Success of Quitting Smoking in Rural and Urban Smoking Cessation Clinics (보건소 금연클리닉 이용자의 지역별 금연 성공요인)

  • Lee, Ju-Yul;Song, Tae Min
    • Journal of agricultural medicine and community health
    • /
    • v.33 no.3
    • /
    • pp.292-302
    • /
    • 2008
  • - Abstract - Objectives: The purpose of this paper is to determine an efficient operation plan for a smoking cessation clinic in public health centers. To do so, the primary success factors in smoking cessation have been analyzed after classifying the smoking cessation programs of public health centers into urban and rural areas. Methods: A study was conducted with 262,837 smokers age 19 or older who were provided with smoking cessation services for more than 6 months through smoking cessation clinics at public health centers(250 clinics nationwide) from July 16, 2006 to July 15, 2007. Results: Urban areas indicated that gender, age, social security, the frequency of counseling, re-enrollment in the program, the number of cigarettes per day and alcohol problems were all factors that influenced the success of smoking cessation. On the other hand, in the rural areas the total number of counseling, re-enrollment in the program, the number of cigarettes per day and alcohol problems were the influential factors. Furthermore, the urban area confirmed that the frequency of counseling, re-enrollment in the program, the number of cigarettes per day and alcohol problems affected traveling while the rural area was affected by social security, the frequency of counseling and re-enrollment. Conclusions: It has been confirmed that the success rate and factors of smoking cessation clinics can vary depending on the region and enrollment method.

Impact Assessment of the Damage by a Pool Fire in Yard Storage Facilities of a Container Terminal (컨테이너 터미널 옥외저장소에서의 액면화재에 대한 피해영향 평가)

  • Hwang, Man Woong;Lee, Ik Mo;Hwang, Yong Woo;Chun, Young Woo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.2
    • /
    • pp.33-42
    • /
    • 2016
  • Domestic harbor yard storage facilities are a place specifically located in a container terminal for import and export of packaged dangerous goods, and due to the recent relaxed criteria for the secured open area, concerns for the extended damage upon accidents are increasing. In this study, the impact of damages by radiant heat was analyzed through a simulation of a pool fire caused by the leakage of flammable liquids from a tank container. As a result, it was analyzed that the distance of radiant heat according to threshold damage levels was beyond the current criteria of the secured open area, and the structural damage of adjacent containers could happen within a very short time if they were exposed to the early pool fire continuously. It is considered that this study will be helpful in preparing the proper criteria for the secured open area between yard storage facilities in a container terminal.