• Title/Summary/Keyword: Security Environment Contents

Search Result 209, Processing Time 0.031 seconds

A Secure Protocol for Contents Service in IMT-2000 (IMT-2000 기반 컨텐츠 서비스를 위한 보안 프로토콜)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.241-252
    • /
    • 2003
  • IMT-2000 appeared in order to satisfy the desires of the uses who wish to supply through wireless most of the services being provided through wire, such as Internet services and multimedia high-speed data information. However, during global roaming, the signal data and the user data get transmitted through the networks of other users. Also, it is judged that with the provision of high speed data communication the amount of data communication necessary for confidentiality protection will increase. It is planned that the recent IMT-2000 Project will begin its commercial service in 2002. From this viewpoint, wireless contents, due to their special characteristics, are greatly exposed to illegal actions by third persons. As a result, it can be said that security and certification issues in the mobile telecommunication environment are indispensable matters. For this purpose, it is intended that in this thesis through an analysis of the existent IMT-2000 certification method, a more safe and efficient authentication method is presented and, at the same time, a security protocol necessary in the provision of wireless contents is designed.

Road Map for ROK-US Alliance Readjustment with the Changing Security Environment (안보환경 변화에 따른 한미동맹 조정 로드맵)

  • Park, Won Gon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.577-589
    • /
    • 2018
  • The future of ROK-US alliance has not been discussed in detail by both governments since early 2000s. However, it is becoming more apparent that ROK-US alliance is facing various daunting challenges. The new administrations both in ROK and US might have different perspectives about the future of alliance. In the process of resolving outstanding North Korean nuclear issue, the alliance can face challenges to change its fundamental features such as halting joint military exercise. ROK-US governments also agreed to transfer wartime operational control as soon as possible. All those factors indicates the growing necessity to articulate the future of ROK-US alliance. ROK and US needs to facilitate to dialogue for future alliance with the possible scenarios of changing security environment such as maintaining status quo, reconciliation of North and South Korea, and entering the reunification stage. In each phase, ROK-US has to develop the goal for the alliance, military institution to implement the alliance, role of USFK, and etc. It is imperative to develop the road map for future ROK-US alliance at this stage to avoid unnecessary folly.

The Future of BlockChain Technology Leading Innovation in the Industrial Ecosystem (산업 생태계의 혁신을 선도할 블록체인 기술의 미래전망)

  • Kim, Jung-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.324-332
    • /
    • 2018
  • Blockchain technology has the potential to revolutionize trust models and business processes in a variety of industries. However, it is considered to be the initial stage of the system that pursues autonomy rather than efficiency, and it is necessary to monitor and inspect the distributed ledger technology from the price and introduction time as compared with the existing relational DB transaction technology. However, domestic and foreign private sectors have already been activated by applying block-chain technology in the national domain, and the block chain is devoid of doubt that it is an exaggerated technology, characterized by the invariance of the record, transparency, and autonomous execution of business rules. It has begun to be utilized in history, identity, certification and auditing in the financial industry as well as various industries. In this paper, we analyze the problems such as security weakness, insufficient regulatory environment, technical consensus and lack of common standard. In addition, the business sense and possibility of the block chain technology is expected to be the innovation of the industrial ecosystem by entering into the reality system from the concept through monitoring the actual introduction performance in the field of copyright, logistics, health care and environment.

A Study on the Curriculum of Department Security Secretarial Programs in Korea University (국내 대학 경호비서학과의 교육과정 특성에 관한 연구 - 4년제 대학을 중심으로 -)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.1-21
    • /
    • 2007
  • This study aims to analysis and measure on the curriculum of security programs in Korean university as the private security system. Civil security demand social safety life by the police protection and private security system. The private security or the civil guards shows rapid growth by the social development and improve the quality of life. But the supply and training system have some limitations in spite of the high demand guard-secretary. The main role of secretaries has been to accompany superiors in order to maintain their dignity or trait. Then the secretaries are required to play additional roles of safety managers such as a security manager, a protocol manager, an intelligence manager and a protective driver in order to overcome the domestic and the international safety environment and to elevate the quality of service as a competitive work. So, the purpose of this article is to analyze current situation of civil body and security guard training industry and to seek an educational model. For that, we examine in 'Do the professional training organizations meet social demand for the body and security guards'? And, 'What kind of training has to be provide for the body and security guards'? and 'What the qualifications of the trainers'? Then, 'What are the differences in training courses between private organizations and universities'? 'Is there differences in the job placement among the trainers of private organizations and universities'? etc.. Conclusion, the social demand common curriculum for the body and security guard will be drawn from the analysis of diverse training organizations with different training courses in contents, training periods, educational value, and social aim. Then we have to a standard curriculum for the successful training education system to provide social security.

  • PDF

Curriculum Development Direction through Content Analysis of the safety security guard (경호·경비분야 연구의 내용분석에 따른 교육과정 개선을 위한 개발방향 탐색)

  • Park, Young-Man
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.253-272
    • /
    • 2017
  • This study analyzes the contents of 1,279 articles related to administrative, management, marketing, and service for private clients among the scholarly research results in the field of security and security, and categorizes the main topic security, private security, The results of this study are as follows. First, the main academic achievements of the security and security sciences were first identified by finding 32 subordinate or related subjects in each category. The situation of the curriculum and the environment which is insufficient compared to the needs of academia and the age was confirmed. The task of improving security and security science analyzed through this study is the expansion of education and training courses related to management and service, which are suitable for the major course of the major. And the analysis of socio-scientific disciplines and job types in the field of security and security In this study, firstly, it is necessary to develop a management and marketing measurement tool suggesting the specificity of security and security business. Second, it is necessary to reconsider learning units of management skill related to management and marketing. Third, In order to improve the curriculum of security related departments, we proposed the necessary preconditions and improvement directions.

  • PDF

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.

Smart CCTV Security Service in IoT(Internet of Things) Environment (사물인터넷 환경에서 스마트 CCTV 방범 서비스)

  • Cho, Jeong-Rae;Kim, Hye-Suk;Chae, Doo-Keol;Lim, Suk-Ja
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1135-1142
    • /
    • 2017
  • In this paper, we propose IoT based smart CCTV security service to prevent crime in blind spot and prevent unexpected fire or danger. In the proposed method, a RC (Radio Control) car is made using Raspberry pie, and a camera and various modules are installed in an RC car. It was then implemented using Raspbian O / S, Apache Web Server, Shell script, Python, PHP, HTML, CSS, Javascript. The RC car provides a security service that informs the manager of the situation by judging the risk of the scene with modules such as video, voice and temperature. Experimental results show that the transmission time of video and audio information is less than 0.1 second. In addition, real-time status transmission was possible in AVG, emergency, and manual mode. It is expected that the proposed method will be applied to the development of smart city by applying it to unmanned vehicles, drones and the like.

Privacy Protection Technologies on IoT Environments: Case Study of Networked Cameras (사물인터넷(IoT) 환경에서 프라이버시 보호 기술: 네트워크 카메라 사례 연구)

  • Kim, Mihui
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.9
    • /
    • pp.329-338
    • /
    • 2016
  • Internet of Things (IoTs) technology makes every things in physical world being digitalized and communicated with each other. The technology is emerging as a new paradigm and is expected to provide a convenient and effective life. However, for the successful realization of the IoT technologies, IoT security issues are an important prerequisite, and particularly the privacy protection is expected to become more important in view of object communication directively related with human. In this paper we describe for the security and privacy threats in IoT environment and introduce the shodan (a legitimate search engine that finds backdoor routers, switches, webcams, IoT devices connected to the Internet etc.) that can expose the security and privacy problems. Lastly, we compare the privacy threats through real-world case study of network cameras currently in use and finally derive the countermeasures for the threats.

Applied Method to Trusted Digital Content Distribution Architecture (신뢰할 수 있는 디지털 콘텐츠 유통 아키텍처 방안)

  • Kim, Hye-Ri;Hong, Seng-Phil;Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.151-162
    • /
    • 2008
  • As the innovative internet technologies and multimedia are being rapidly developed, digital content is a remarkable new growth industry and supplied by various channel. For example, domestic sales volume in digital contents marked an annual increase of 14.7% since 2003. Against the merits of digital content distribution, Information reengineering aspects are getting more serious issues in these days such as infringement of copyright, flood of inappropriate content, invasion and infringement of privacy, etc. In this paper, we are making a suggestion of the TDCDA-Trusted Digital Content Distribution Architecture in order to solve above problems. TDCDA is provided to how well-define and design the trusted path in digital contents distribution in internet environments using a secure distribution mechanism, digital content integrity and copyright protection. Finally, we also proposed the TDCDA algorithm and applicable guidelines for feasible approach in real computing environment.