• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.026 seconds

A Study on Utilization Effect and Implementation Model of Directory Service Based Information Resource Management System (디렉터리 서비스 기반 정보자원 관리시스템의 활용 효과 및 구축 모델에 대한 연구)

  • Lee, Sung-Jun;Kim, Hyuk;Lee, Kwang Soo;Kim, Minsoo
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.427-439
    • /
    • 2014
  • Introduction of new information systems due to continuous progress of ICT has made the enterprise IT environment into a mixed pot of various IT resources. Rapidly changing business situation has emphasized the integration of organizational IT resources as one of key competitive advantages. Those distributed IT resources are now demanding to solve the problems not only on their own effective management but also on security and control issues against unauthorized infiltration and information leakages. Under the situation that the number of IT resources is constantly increasing, it is needed to study a management model and its implementation that integrally solves above all problems. In this paper, it is revealed that a directory service can be used to integrally manage distributed IT resources and a directory service based system model for distributed IT resource management is suggested. By implementing an HR solution over active directory service, it is demonstrated that our integrated management model for distributed resources is applicable to real business cases. It is expected that for small and medium sized enterprises with limited IT investments, directory service based IT resource management system can be a cost-effective solution for increasing security threats and lack of governance.

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.

An Exploration on Personal Information Regulation Factors and Data Combination Factors Affecting Big Data Utilization (빅데이터 활용에 영향을 미치는 개인정보 규제요인과 데이터 결합요인의 탐색)

  • Kim, Sang-Gwang;Kim, Sun-Kyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.287-304
    • /
    • 2020
  • There have been a number of legal & policy studies on the affecting factors of big data utilization, but empirical research on the composition factors of personal information regulation or data combination, which acts as a constraint, has been hardly done due to the lack of relevant statistics. Therefore, this study empirically explores the priority of personal information regulation factors and data combination factors that influence big data utilization through Delphi Analysis. As a result of Delphi analysis, personal information regulation factors include in order of the introduction of pseudonymous information, evidence clarity of personal information de-identification, clarity of data combination regulation, clarity of personal information definition, ease of personal information consent, integration of personal information supervisory authority, consistency among personal information protection acts, adequacy punishment intensity in case of violation of law, and proper penalty level when comparing EU GDPR. Next, data combination factors were examined in order of de-identification of data combination, standardization of combined data, responsibility of data combination, type of data combination institute, data combination experience, and technical value of data combination. These findings provide implications for which policy tasks should be prioritized when designing personal information regulations and data combination policies to utilize big data.

A Study on Improvement of Test & Evaluation of Vehicle Part in Mixed Equipment and Defense Industrial Technology (혼성장비 차량부 시험평가 및 방위산업기술 보호 제도 개선에 관한 연구)

  • Yoon, Heung-Soo;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.241-249
    • /
    • 2018
  • The military purpose vehicles are developed by using the platform of civil vehicles according to the commercial vehicle expansion plan and military supplied product commercialization policy. But the information related to the military purpose vehicle which adopts the same platform with the civil vehicle is forced to be exposed because its information is revealed by containing into the maintenance manual and electric circuit diagram. Especially, the information disclosure should be blocked by reviewing the application of technology protection because the military vehicle becomes combating purposed mixed equipment when the missile and radar are mounted. The mixed equipment means the one configured with more than 2 types of equipment, and it is categorized into the main and sub equipment. This study was performed to derive the problems in Korean system for vehicle part test evaluation on the mixed equipment and the defense industry technology protection system, and to derive the methods for improving through interviews with the specialists. The conflicts between the civil laws and army regulation were reduced by adding a clause that the engine reflected with the newest emission gas standard should be mounted based on the time of force integration, and the commercialized military supplies were designated as element technology of defense industry technology in consideration of its roles and functions.

Feed Resources for Animals in Asia: Issues, Strategies for Use, Intensification and Integration for Increased Productivity

  • Devendra, C.;Leng, R.A.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.24 no.3
    • /
    • pp.303-321
    • /
    • 2011
  • The availability and efficient use of the feed resources in Asia are the primary drivers of performance to maximise productivity from animals. Feed security is fundamental to the management, extent of use, conservation and intensification for productivity enhancement. The awesome reality is that current supplies of animal proteins are inadequate to meet human requirements in the face of rapidly depleting resources: arable land, water, fossil fuels, nitrogenous and other fertilisers, and decreased supplies of cereal grains. The contribution of the ruminant sector lags well behind that of non-ruminant pigs and poultry. It is compelling therefore to shift priority for the development of ruminants (buffaloes, cattle, goats and sheep) in key agro-ecological zones (AEZs), making intensive use of the available biomass from the forage resources, crop residues, agro-industrial by-products (AIBP) and other non-conventional feed resources (NCFR). Definitions are given of successful and failed projects on feed resource use. These were used to analyse 12 case studies, which indicated the value of strong participatory efforts with farmers, empowerment, and the benefits from animals of productivity-enhancing technologies and integrated natural resource management (NRM). However, wider replication and scaling up were inadequate in project formulation, including systems methodologies that promoted technology adoption. There was overwhelming emphasis on component technology applications that were duplicated across countries, often wasteful, the results and relevance of which were not clear. Technology delivery via the traditional model of research-extension linkage was also inadequate, and needs to be expanded to participatory research-extension-farmer linkages to accelerate diffusion of technologies, wider adoption and impacts. Other major limitations concerned with feed resource use are failure to view this issue from a farming systems perspective, strong disciplinary bias, and poor links to real farm situations. It is suggested that improved efficiency in feed resource use and increased productivity from animals in the future needs to be cognisant of nine strategies. These include priorities for feed resource use; promoting intensive use of crop residues; intensification of integrated ruminant-oil palm systems and use of oil palm by-products; priority for urgent, wider technology application, adoption and scaling up; rigorous application of systems methodologies; development of adaptation and mitigation options for the effects of climate change on feed resources; strengthening research-extension-farmer linkages; development of year round feeding systems; and striving for sustainability of integrated farming systems. These strategies together form the challenges for the future.

The limits in legislating and the methods for improving the current 'National Guidelines on Anti-Terror Activities' (현행 '국가대테러활동지침'의 문제점과 입법적 개선방안에 관한 연구)

  • Kim, Soon-Seok;Shin, Jae-Chul
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.95-117
    • /
    • 2009
  • Ever since the 9/11 terror attack, all the world has perceived the need and taken actions to make an anti-terror law, however The Republic of Korea has not yet come up with any relevant output. Currently, the Korean government apportions duties to each related government agency and sets up systems for cooperation among them to make preparations against and cope with terror threats, according to The National Guidelines on Anti-Terror Activities (the presidential directive number 47 given on January 21, 1982). However, the directive has many limits and shortcomings in coping with national emergencies. In this situation, this research aims to compare the national anti-terror laws of others countries with Korea's, in order to understand the problems in Korea, i.e., that The National Guidelines on Anti-Terror Activities, which are the only anti-terror regulations in Korea do not clearly describe the concept and range of a terror, that national anti-terror meetings and the anti-terror standing committee have problems with their operation, that the Terrorism Information Integration Center has also its own problems, and that Korea lacks in preparatory actions against terror crimes and there are still problems about investigations into terror incidents. In order to solve these problems for the future, the present author suggests that the purpose of the law on The National Guidelines on Anti-Terror Activities shall be re-established so as to meet the current anti-terror conditions of Korea, the concept of a terror and anti-terror activities shall be clarified, anti-terror organizations shall be unified, the chair of the anti-terror standing committee shall be appointed legally and automatically according to the relevant rule and be given more rights so as to have free access to private information for anti-terror activities and terror-related information, and systems shall be supplemented for reporting terror-involved persons and funds.

  • PDF

A Comparative Study on Each Nation's Counter terrorism Organization and Function (각국의 테러대응 조직과 기능의 비교 연구)

  • Kwon, Jeong-Hoon;Kim, Tae-Hwan
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.45-69
    • /
    • 2009
  • This study is to present effective and rational strategies by comparing and analyzing plans of some nations such as the United States, Britain, Germany and Japan against terrorism. Nations mentioned above have made alliance to prevent the possible terrorism after 9.11 attack and performed various tasks efficiently. The result of this study is summarized as follows. First, it is required that there should be an integrated system which works properly. Each nation has not distinguished natural disaster from man-made one based on the damage and the abilities of authorities to deal with. On the other hand, South Korea tells two disasters according to causes and runs distributed systems in which each government division performs its duties to manage each disaster. Accordingly, in economic terms, it is much more effective to provide integrated counter terrorism, not distributed one. Second, information sharing must be stimulated. To take actions quickly when an accident occurs, the government needs to have united and integrative systems, which make it prepare for various types of terrorism well. In addition, it is necessary for a government-related organization to tie up with other channels for collecting, analyzing and sharing information. For this, integrative systems for terrorism should be taken into consideration.

  • PDF

A scheme on strengthening of R.O.K reserved force (예비전력 정예화 방안)

  • Kim, Jae-Sam
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.1-45
    • /
    • 2007
  • Reserved forces of ROKA are in charge of replacement of TOE in the wartime and mission of rear area operation. But there is institutional inertia in the law and organization oriented to fill human resources rather than take mission. We need to prepare for the investment and arrangement of reserved forces as military power that would be replaced standing forces. In this portion, to reinforce reserve forces elite, First, efficient mobilization regulations and systems are suggested. I covered a maintenance of relevant mobilization ordinances which need to legislated and approved by national assembly for wartime and development of mobilization system which might lose the appropriate time for mobilization due to complicated declaration procedures and measures to overcome the panic at the initial stage of the war and organization and employment of nationwide transportation system and mobilization center. To ensure efficient resource management and mobilization of reserve forces with a number of approximately 3 million, there's a necessity of organization for integration and conciliation. To make it real, I suggested establishing and employing the mobilization center, on first phase, employ the mobilization center focusing on homeland divisions, on second phase, it is advisable to convert to national level mobilization system and develop to central mobilization center focusing on national emergency planning committee. During peacetime, in conjunction with Mobilization Cell, mobilization center can conduct resource survey and integrate and manage mobilization resources and take charge of mobilization training of subordinate units, and during wartime, in conjunction with mobilization coordination team and Cell, can ensure the execution of mobilization. Second, Future oriented reserve forces management system such as service system of reserve forces and support system of homeland defense operations. Current service and trainings of reserve forces by the year have very low connection, as it is very complex to manage the resources and trainings, and service and training lack the equity, re-establishment of service system is required. Also in an aspect of CSS and cultivation support for reserve forces, as the scope and limitation of responsibility between the armed forces and autonomous organization is obscure, conditions to conduct actual-fighting exercises are limited. Concentrated budgetting is extremely difficult because reserve forces training fields are scattered nationwide, and facilities and equipments are rapidly getting older. To improve all these, I suggest the organization of homeland defense battalion with a unit of "City-Gun-District" and supporting the local reserve forces. Conduct unit replacement or personal replacement for those who have finished their 1 or 2 years and homeland defense operation duty for those with 3-5 years for consistency and simplification. Third, I suggest Future oriented Reserved Training(FRT) and Training Center oriented training management to establish a reliable reserve training. Reserves carry out expansion of unit, conventional combat mission, homeland defense and logistics support during wartime, and actual-fighting exercise, and disaster relief, peace keeping activities. Despite diverse activities and roles, their training condition still stays definitely poor. For these reasons, Modernization of weapons and facilities through gradual replacement and procurement is essential to enhance mobilization support system.

  • PDF

Digital Barrier-Free and Psychosocial Support for Students with Disabilities in Distance Learning Environments

  • Kravchenko, Oksana;Koliada, Natalia;Berezivska, Larysa;Dikhtyarenko, Svitlana;Baida, Svitlana;Danylevych, Larysa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.15-24
    • /
    • 2022
  • The article clarifies the conditions for information, digital and educational accessibility for higher education seekers with disabilities in terms of distance learning caused by quarantine restrictions. It is established that such conditions are regulated by international and Ukrainian legal documents (The Standard Rules on the Equalization of Opportunities for Persons with Disabilities, Convention on the Rights of Persons with Disabilities, Sustainable Development Goals, Law of Ukraine "On Education", Law of Ukraine "On Higher Education", Strategy for the Development of Higher Education in Ukraine 2021-2031, Development Strategy areas of innovation for the period up to 2030, Development strategy of the sphere of innovation activity for the period up to 2030). As a part of information barrierlessness, Higher Education Institutions (HEI) should provide access to information in various formats and using technologies, in particular Braille script, large-type printing, audio description (audio descriptive commenting), sign language interpretation, subtitling, a format suitable for reading by screen access programs, formats of simple speech, easy-to-read formats, means of alternative communication. The experience of Pavlo Tychyna Uman State Pedagogical University is described. In particular, special attention is paid to the study of sign language: in view of this, the initiative group implemented the project "Learning to hear and overcome social isolation together" with the financial support of the British Council in Ukraine. Within the framework of digital accessibility, the official website of the Faculty of Social and Psychological Education has been adapted for the visually impaired in accordance with WCAG 2.0 World Standards. In 2021, Pavlo Tychyna Uman State Pedagogical University implemented the project "Cultural, Recreational and Tourist Cherkasy Region: Inclusive Social 3D Map" funded by the Ukrainian Cultural Foundation; a site with available content for online travel in the region to provide barrier-free access to the historical and cultural heritage of Cherkasy region was created. Educational accessibility is achieved by increasing the number of people with special educational needs, receiving education in inclusive groups; activities of the Center for Social and Educational Integration and Inclusive Rehabilitation Social Tourism "Bez barieriv" ("Without barriers"); implementation of a research topic for financing the Ministry of Education and Science of Ukraine: "Social and psychological rehabilitation of children and youth with special educational needs by means of inclusive tourism"; implementation of the project "Social inclusion of distance educational process"; development of information campaigns to popularize the ideas of accessibility, the need for its implementation, ongoing training programs and competitions, etc.

A Estimation Study on Water Integration Management Model using Water-Energy-Food-Carbon Nexus - Focused on Yeongsan River - (물-에너지-식량-탄소 넥서스를 이용한 통합물관리 모델 평가 연구 - 영산강 수계를 중심으로 -)

  • Na, Ra;Park, Jin-hyeon;Joo, Donghyuk;Kim, Hayoung;Yoo, Seung-Hwan;Oh, Chang-Jo;Lee, Sang-hyun;Oh, Bu-Yeong;Hur, Seung-oh
    • Journal of Korean Society of Rural Planning
    • /
    • v.29 no.1
    • /
    • pp.37-49
    • /
    • 2023
  • Active attention and effort are needed to develop an integrated water management system in response to climate change. In this study, it proposed models for cross-use of agricultural water and river maintenance water using sewage treatment water as an integrated water management system for the Yeongsan River. The impact of the integrated water management models was assessed by applying the concept of Nexus, which is being presented worldwide for sustainable resource management. The target year was set for 2030 and quantitatively analyzed water, energy, land use and carbon emissions and resource availability index by integrated water management models was calculated by applying maximum usable amount by resource. An integrated water management system evaluation model using the Nexus concept developed in this study can play a role that can be viewed in a variety of ways: security and environmental impact assessment of other resources. The results of this research will be used as a foundation for the field of in the establishment of a policy decision support system to evaluate various security policies, as we analyzed changes in other factors according to changes in individual components, taking into account the associations between water, energy, food, and carbon resources. In future studies, additional sub-models need to be built that can be applied flexibly to changes in the future timing of the inter-resource relationship components.