• Title/Summary/Keyword: Security Inspection

Search Result 223, Processing Time 0.036 seconds

A New Method of Object-based Tracking Modules for the Interactive Media

  • Kim, Young-Ouk;Suh, Sang-Bong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.100.1-100
    • /
    • 2001
  • With the prolific growth of cable, satellite digital broadcasting and internet related industry, new digital contents are being demanded. Today, more end-users seek participations in the media through interactivity. Visual tracking technology, based on image processing, is mainly used in fields of human face tracking, security inspection, and traffic monitoring applications. In this research, we describe the interactive modules such as information display, e1-commerce and other services along with on-screen visuals on the streaming media using object visual tracking technology. The ...

  • PDF

Risk analysis of checklist for efficient web vulnerability inspection (효율적인 웹 취약점 점검을 위한 점검항목의 위험도 분석)

  • Lee, Hyun-A
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.126-128
    • /
    • 2018
  • 웹 해킹 사고 건수와 피해규모가 매년 증가하고 있다. 해킹사고의 대부분이 웹을 통해 발생하고 있으며 웹 취약점 점검을 통해 사전에 예방할 수 있지만 인력과 예산 부족으로 주기적인 점검이 어려운 것이 현실이다. 본 연구에서는 효율적인 웹 점검을 위해 공격가능성을 바탕으로 점검 항목의 위험도를 분석하고 향후 지속되어야 할 연구 방향을 제시한다.

Proposal of Security Inspection Procedure for Linux System (리눅스 시스템을 위한 보안점검 항목 및 절차 제안)

  • Yu, Jun-sang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.601-602
    • /
    • 2009
  • 최근 기업 및 관공서 등에서 비용대비 효과적인 Linux System을 적극 도입하면서 그 관리와 보안사항이 이슈화되고 있다. 본고는 현업의 관리자들이 손쉽게 적용할 수 있는 시스템 보안점검 절차 및 사고 발생시 보안프로그램을 이용한 대응 방법에 대해 제안하고자 한다.

Verification of Human Error Factors for Access Control of Bodyguards through Multiple Risk Case Analysis

  • Kim, Jin-Hwan;Kim, Sang-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.143-150
    • /
    • 2020
  • The purpose of this study is to investigate the human error of bodyguards caused in the process of performing access control activities between security missions, focusing on multiple risk cases, and to suggest countermeasures accordingly. To verify this, after arranging the sequence of events in a time series, the VTA technique and Why-Why analysis technique that can easily identify the problem centered on the variable node were used. In addition, environmental factors and personal factors that cause human errors were extracted through M-SHEL Metrix. As a result of analyzing multiple risk cases through such a method, the security environment factors that cause access control accidents include lack of time (impatience), prejudice against visitors, intensive work methods, lack of security management, unattended travel, and familiar atmosphere. (Relaxation), formal work activities, convenience provision, and underestimation were surveyed. In addition, human errors caused by personal security guards were investigated as low alertness, formal work, negligence of inspection, and comfortable coping.

Security Verification Framework for e-GOV Mobile App (전자정부 모바일 앱 보안성 검증체계)

  • Bang, Ji-Ho;Ha, Rhan;Kang, Pil-Yong;Kim, Hong-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.119-131
    • /
    • 2012
  • Recently smart phones have been proliferating widely and quickly. Since the number of mobile apps that are being developed and deployed to domestic/international app stores is rising, more apps are being installed and deleted by users without any difficulty. The deployed apps are each attested through distinct verification framework of specific app stores. However, such verification frameworks are insufficient in checking security concerns. Unfortunately, the security verification framework is necessary since the incidents of leaking privacy and confidential information are being increased in lately. The aim of this paper is to provide the security verification framework that assures security and reliability of the e-government mobile apps. In order to verify proposed verification framework, a few apps were selected and inspected through proposed framework and these inspection results are included in this paper.

The analysis of transfer effect through recruit education programs for security personnel (민간 시큐리티 종사자의 신임 교육에 따른 전이효과 분석)

  • Lee, Young-Seok;Bang, Whan-Bog;Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.243-264
    • /
    • 2008
  • Investigation about training of Private Security in Korea has managed status of training and understanding of issue mostly, systematic analysis about transfer effect as well as learning and determinant of training is insufficient. Consequently this investigation research to examine the effect of training program for newly appointed private security guards to learning and transfer then, to analyze factor through incumbent private security guard-oriented hypothesis testing under article 13, section 1 of the security guard law. To grasp effect factors of learning and transfer, this dissertation establishes research model and research hypothesis through domestic and foreign studies and then theoretical as well as positive literatures consideration in the first place. Conclusion of this investigation through techniques mentioned above and data analysis is as follows. First of all, the personal characteristics, training characteristics, work environment, difference of transfer as well as learning are verified in accordance with Sociodemographic characterist of Private Security Guard. After then, there is a difference of great import. Secondly, the effect of personal characteristics of Private Security Guard to the transfer is inspected. As a result, there is a difference of significance statistical. Thirdly, the effect of training characteristics of Private Security Guard to the transfer is inspected. Consequently, there is a difference of import statistical. The following thing, subsequent to inspection about the effect of work environment of Private Security Guard to transfer, statistical difference of import is.

  • PDF

A Study on the Correlation between the Investigation on the Violation Crime of Intellectual Property Rights and the Goods Inspection in Customs Law (관세법상 지식재산권 침해사범 수사와 물품검사와의 상호관계)

  • Ye, Sangkyun
    • International Commerce and Information Review
    • /
    • v.19 no.3
    • /
    • pp.197-214
    • /
    • 2017
  • It requires professional knowledge and much time to judge intellectual property rights infringement. The duties of customs administration are the balance between the propositon of trade facilitation through rapid clearance and the thesis of social security through exact examination. There is a view that the criminal procedure law control is necessary to the goods inspection of clearnce procedure if it is related to crimianl investigation. However, it seems that the customs law does not consider the goods inspection investigation as the investigation under judicial control, but only the mere administrative investigation. It can be said that the inspection of goods by customs law functioning as a clue of investigation is confined to the ordinary goods inspection, including the screening test. Searching for specific articles by specific informaition should be under the control of criminal procedure law because it constitutes the commencement of criminal investigation in criminal cases. This interpretation could be an opportunity as a harmonious operation between the goods inspection of customs clearance and the search and seizure of criminal procedure.

  • PDF

Effective Countermeasures against Vulnerability Assessment for the Public Website of Financial Institution (금융기관 공개용 홈페이지 취약점 분석평가에 대한 효율적인 대처방안)

  • Park, Hyun-jin;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.885-895
    • /
    • 2017
  • Security issues arise due to various types of external intrusions as much as the rapidly changing IT environment. Attacks using vulnerabilities in web applications are increasing, and companies are trying to find the cause of the vulnerability, prevent external intrusion, and protect their systems and important information. Especially, according to the Supervision Regulation, each financial institution and electronic financial service provider shall perform vulnerability analysis evaluation for the website for disclosure once every six months and report the result to the Financial Services Commission. In this study, based on the Web vulnerability items defined in the Supervision Regulation, based on the inspection cases of actual financial institution, we analyze the most frequently occurring items and propose effective countermeasures against them and ways to prevent them from occurring in advance.

PSMS Design and Implementation for a Phishing Attack Intercept (피싱공격 차단을 위한 PSMS 설계 및 구현)

  • Yoo, Jae-Hyung;Lee, Dong-Hwi;Yang, Jae-Su;Park, Sang-Min;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.49-56
    • /
    • 2008
  • Recently, Phising attack uses trick of URL and sites, and technical concealment method which infiltrates sophisticated malicious code. However, sometimes Phising security technology cannot cover all of Phising methods. Consequently, this research proposes inspection to solve this problem. First, we can install Proxy server for a strong open information exchange of web environment between web servers and clients. Therefore, it compares and analyzes harmful site and Phising URL with White domain list, and filters them. Finally, designs for stable web based information so that we can block Phising with least regulation and active control. So the purpose of this paper is introducing this design system and structure, and inspect them.

  • PDF

Development of Digital Signal Processing Board for Detection Array Module Signal Processing System (Array 검출 Module 신호처리 System의 Digital Signal Processing Board 개발)

  • Park, Ge-O;Sung, So-Young;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.375-378
    • /
    • 2017
  • Shipping and logistics safety, security system is strengthening worldwide, the development of shipping and logistics safety security core technology for national security logistics system construction has been carried out. In addition, it is necessary to localize the Array Detection System, which is a core component of the container search machine, to cope with the 100% pre-inspection of the container scheduled for 2018 in the United States. In this paper, we propose a study on a self-developed Digital Signal Processing Board among the array detection systems that replace foreign products.

  • PDF