• Title/Summary/Keyword: Security Level Management

Search Result 802, Processing Time 0.037 seconds

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

Healthcare and Emergency Response Service Platform Based on Android Smartphone

  • Choi, Hoan-Suk;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • v.16 no.1
    • /
    • pp.75-86
    • /
    • 2020
  • As the elderly population is becoming an aging society, the elderly are experiencing many problems. Social security costs for the elderly are increasing and the un-linked social phenomenon is emerging. Thus, the social infrastructure and welfare system established in the past economic growth period are in danger of not functioning properly. People socially isolated or with chronic diseases among the elderly are exposed to various accidents. Thus, an active healthcare management service is imperative. Additionally, in the event of a dangerous situation, the system must have ways to notify guardians (family or medical personnel) regarding appropriate action. Thus, in this paper, we propose the smartphone-based healthcare and emergency response service platform. The proposed service platform aggregates movement of relevant data in real-time using a smartphone. Based on aggregated data, it will always recognize the user's movements and current state using the human motion recognition mechanism. Thus, the proposed service platform provides real-time status monitoring, activity reports, a health calendar, location-based hospital information, emergency situation detection, and cloud messaging server-based efficient notification to several subscribers such as family, guardians, and medical personnel. Through this service, users or guardians can augment the level of care for the elderly through the reports. Also, if an emergency situation is detected, the system immediately informs guardians so as to minimize the risk through immediate response.

Visualization of women's safety facility index based on public data analysis: Focusing on Seoul (공공데이터 분석 기반 여성안전 시설지수 시각화: 서울시 중심으로)

  • Kim, Hyeong-Gyun
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.19-24
    • /
    • 2021
  • In this paper, an index of women's safety facilities was created and visualized using public data related to Seoul. CPTED, the women's safety facilities index was created by collecting and analyzing eight data related to the local women's safety index and five major crime victims of women. As a result of the correlation analysis between the factors of the female safety facility index and the number of female crime victims, three data were selected as the main factors, "CCTV," "street lamps," and "female security guardians", which were found to be meaningful at the 95% level of reliability. The distinction women's safety facility index was calculated by weighting the correlation coefficient between the main factors for calculating the women's safety facility index, and visualized using Python's Follium library.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

A Policy-driven RFID Data Management Event Definition Language (정책기반 RFID 데이터 관리 이벤트 정의 언어)

  • Song, Ji-Hye;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.55-70
    • /
    • 2011
  • In this paper, we propose a policy-driven RFID data management event definition language, which is possibly applicable as a partial standard for SSI (Software System Infrastructure) Part 4 (Application Interface, 24791-4) defined by ISO/IEC JTC 1/SC 31/WG 4 (RFID for Item Management). The SSI's RFID application interface part is originally defined for providing a unified interface of the RFID middleware functionality―data management, device management, device interface and security functions. However, the current specifications are too circumstantial to be understood by the application developers who used to lack the professional and technological backgrounds of the RFID middleware functionality. As an impeccable solution, we use the concept of event-constraint policy that is not only representing semantic contents of RFID domains but also providing transparencies with higher level abstractions to RFID applications, and that is able to provide a means of specifying event-constraints for filtering a huge number of raw data caught from the associated RF readers. Conclusively, we try to embody the proposed concept by newly defining an XML-based RFID event policy definition language, which is abbreviated to rXPDL. Additionally, we expect that the specification of rXPDL proposed in the paper becomes a technological basis for the domestic as well as the international standards that are able to be extensively applied to RFID and ubiquitous sensor networks.

A Study on the Problems and Improvement of the Safety Management Law of Nuclear Facilities -Focused on Safety Management of Aquatic Products- (원자력시설 안전관리 법제의 문제점과 개선방안 연구 -수산물의 안전관리를 중심으로-)

  • Lee, Woo-Do
    • The Journal of Fisheries Business Administration
    • /
    • v.50 no.2
    • /
    • pp.23-40
    • /
    • 2019
  • The main purpose of this study is to analyze and examine the problems of the law systems of the safety and maintenance of nuclear facilities and to propose the improvements with respect to the related problems especialy focused on safety management of aquatic products. Therefore, the results of the paper would be helpful to build an effective management law system of safety and maintenance of nuclear facilities and fisheries products. The research methods are longitudinal and horizontal studies. This study compares domestic policies with foreign policies of nuclear plants and aquatic products. Using the above methods, examining the current system of nuclear-related laws and regulations, we have found that there exist 13 Acts including "Nuclear Safety Act", etc. Safety laws related on nuclear facilities have seven Acts including "Nuclear Safety Act", "the Act on Physical Protection and Radiological Emergency", "Radioactive waste control Act", "Act on Protective Action Guidelines against Radiation in the Natural Environment", "Special Act on Assistance to the locations of facilities for disposal low and intermediate level radioactive waste", "Korea Institute of Nuclear Safety Act". "Act on Establishment and Operation of the Nuclear Safety and Security Commission". The seven laws are composed of 119 legislations. They have 112 lower statute of eight Presidential Decrees, six Primeministrial Decrees and Ministrial Decrees, 92 administrative rules (orders), 6 legislations of local self-government aself-governing body. The concluded proposals of this paper are as follows. Firstly, we propose that the relationship between the special law and general law should be re-established. Secondly, the terms with respect to law system of safety and maintenance of nuclear plants should be redefined and specified. Thirdly, it is advisable to re-examine and re-establish the Law System for Safety and Maintenance of Nuclear Facilities. and environmental rights like the French Nuclear Safety Legislation. Lastly, inadequate legislation on the aquatic pollution damage should be re-established. It is necessary to ensure sufficient transparency as well as environmental considerations in the policy decisions of the Korean government and legislation of the National Assembly. It is necessary to further study the possibilities of accepting the implications of the French legal system as a legal system in Korea. In conclusion, the safety management of nuclear facilities is not only focused on the secondary industry and the tertiary industry centering on power generation and supply, but also on the primary industry, which is the food of the people. It is necessary to prevent damage to be foreseen. Therefore, it is judged that there should be no harm to the people caused by contaminated marine products even if the "Food Safety Law for Prevention of Radiation Pollution Damage" is enacted.

Determination of Radionuclide Concentration Limit for Low and Intermediate-level Radioactive Waste Disposal Facility I : Application of IAEA Methodology for Underground Silo Type Disposal Facility (중저준위 방사성폐기물 처분시설의 처분농도제한치 설정에 대한 고찰 I : IAEA 방법론의 동굴처분시설 적용)

  • Hong, Sung-Wook;Kim, Min Seong;Jung, Kang Il;Park, Jin Beak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.15 no.3
    • /
    • pp.257-264
    • /
    • 2017
  • For the safe disposal of intermediate level radioactive waste according to the Nuclear Safety and Security Commission's notice and KORAD's management plan for low and intermediate level radioactive waste, the disposal concentration limit was derived based on the IAEA methodology. The evaluation of the derived disposal concentration limit revealed that it is not suitable as a practical limit for intermediate level radioactive waste. This is because the disposal concentration limit according to the IAEA methodology is derived using a single value of radioactive waste density and the disposal facility's volume. The IAEA methodology is suitable for setting the concentration limit for vault type disposal, which consists of a single type of waste, whereas an underground silo type disposal facility is composed of several types of radioactive waste, and thus the IAEA methodology has limitations in determining the disposal concentration limit. It is necessary to develop and apply an improved method to derive the disposal concentration limit for intermediate level radioactive waste by considering the radioactivity of various types of radioactive waste, the corresponding scenario evaluation results, and the regulatory limit.

The Critical Factors on Improvement of Medical institution Competitiveness (의료기관 경쟁력 향상에 영향을 미치는 핵심 요인)

  • Yeom, Jae-Kwang;Kang, Chang-Yeol
    • Korea Journal of Hospital Management
    • /
    • v.12 no.1
    • /
    • pp.1-30
    • /
    • 2007
  • The study carried out a survey with employees of hospitals located in Daejeon, Chungnam, and Chungbuk from Sep. 12 to Sep. 30, 2005 in order to derive primary elements that affect the improvement of hospital's competitiveness. The study investigated and analyzed the employees' recognition on the change of competitive environment caused by the change of medical environment. The study also analyzed the elements that affect the hospital's competitiveness and the competitive strategies of the hospitals. The conclusion of this study can be summarized as follows. 1. Summary 1) Most of the employees responded that there is a rival in the competitive environment and the competitive is intense. Especially when the employees are married, live in urban areas, have an education level of university graduate or are managers, they tend to think the competitive is very intense. Also, they said that the competitive is based upon the quality of medical service. They mentioned the element that has the biggest effect on the competitiveness is the element of medical consumer and they recognized that the medical services in university and general hospitals have more competitiveness than the one-department hospitals. 2) It was investigated that the medical technique service has the most effect on the hospital's competitiveness. Also, the external service of medical techniques also has a large effect on the hospital's competitiveness. 3) When they were asked for the factors that affect the patients' decision on selecting a hospital, most of them responded "capability and technique of the medical staffs." Also, they said that "sufficient explanation from doctors" and "special center and clinic" are the factors that have big effects on the patients' decision. 4) In the SWOT analysis, most of them responded that the strength is the hospital's characteristics and the weakness is insufficient and obsolete equipment. They said the opportunity is the demands for professional medical service and the risk is the intense competitive among the hospitals. 5) In the SWOT strategy, they emphasized the strategy that uses the opportunity and the strength and the strategy that uses the opportunity while overcoming the weakness. 6) As for the basic competition strategy, most of them thought of the strategy of professionalizing the medical service most importantly. Next, they focused on the strategy of distinct service and the strategy of lower prime cost. 2. Conclusion 1) Because service competition between hospitals is happening seriously, need competitiveness security through right awareness transfer and satisfaction upgrade about medical consumer. 2) For medical technique service upgrade that equip Hospital's competitiveness but affects most, must solidify the countermeasure because professionalizing the medical service and newest medical technique induction should be achieved first, and compose task force for the external service of medical techniques improvement. 3) To improve SWOT of hospital, opportunity and the strength strategy choice that rescue hospital's characteristics heightening professionalizing the medical service level is fancied. 4) As for the basic competition strategy, will have to try in phase triangular position of hospital which is trusted medical level upgrade and excellent manpower security and finance independence through upgrade. The study was only done with hospitals in Daejeon, Chungnam and Chungbuk. Also, it is a study from the side of suppliers of medical service so there are limitations. However, the significance of the study is to present the basic data for improvement of hospital's competitiveness by examining the importance of medical techniques and external service of medical techniques that are the main effects on the improvement of hospital's competitiveness.

  • PDF

Aspect of the chief of state guard EMP (Electro Magnetic Pulse) protection system for the consideration (국가원수 경호적 측면에서의 EMP(Electro Magnetic Pulse) 방호 시스템에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.37-66
    • /
    • 2014
  • In recent years, with the development of computers and electronics, electronics and communication technology in a growing and each part is dependent on the cross-referencing makes all electronic equipment is obsolete due to direct or indirect damage EMP. Korea and the impending standoff North Korea has a considerable level of technologies related to the EMP, EMP weapons you already have or in a few years, the development of EMP weapons will complete. North Korea launched a long-range missile and conducted a nuclear test on several occasions immediately after, when I saw the high-altitude nuclear blackmail has been strengthening the outright offensive nuclear EMP attacks at any time and practical significance for the EMP will need offensive skills would improve. At this point you can predict the damage situation of Korea's security reality that satisfy the need, more than anything else to build a protective system of the EMP. The scale of the damage that unforeseen but significant military damage and socio-economic damage and fatalities when I looked into the situation which started out as a satellite communications systems and equipment to attack military and security systems and transportation, finance, national emergency system, such as the damage elsewhere. In General, there is no direct casualties reported, but EMP medical devices that rely on lethal damage to people who can show up. In addition, the State power system failure due to a power supply interruption would not have thought the damage would bring State highly dependent on domestic power generation of nuclear plants is a serious nuclear power plant accident in the event of a blackout phenomenon can lead to the plant's internal problems should see a forecast. First of all, a special expert Committee of the EMP, the demand for protective facilities and equipment and conduct an investigation, he takes fits into your budget is under strict criteria by configuring the contractors should be sifting through. He then created the Agency for verification of performance EMP protection after you have verified the performance of maintenance, maintenance, safety and security management, design and construction company organized and systematic process Guard facilities or secret communications equipment and perfect for the EMP, such as protective equipment maneuver system should take.

  • PDF

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.