• Title/Summary/Keyword: Security Study

Search Result 10,150, Processing Time 0.041 seconds

A Study on the Usage of Investigation of Google Cloud Data (Smartphone user-oriented) (구글 클라우드 데이터의 수사활용 방안에 관한 연구 (스마트폰 사용자 중심))

  • Kim, Dongho;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.109-120
    • /
    • 2018
  • The smartphone is the communication device that is the most personal to the user, and it keeps a lot of information related to the user and makes information communication with other devices. With these characteristics, forensics on smartphones are one of the most basic methods of investigation in criminal investigations, and have actually contributed to the settlement of the case by providing many clues. However, recently, it is designed to encrypt data stored as a social issue related to the protection of user's personal information, or to delete deleted data or to delete log data together. So, any solutions? In this paper, I try to find the answer from cloud data stored by smartphone user account. Cloud forensics should approach complementary relationships rather than smartphone forensics. There are a lot of data stored in the cloud that can be meaningfully used in the investigation. Online activity information of users, such as Internet usage, YouTube view, and contents purchase information, cloud service such as e-mail, cloud drive, and location information are the most representative data. These data can be unvaluable, but here are some important clues in various types of criminal investigations. In this paper, I propose a method to extract data from the google cloud so that the data can be used for investigation, and to utilize the extracted data for investigation. And it explains the role of the extracted artifacts in the actual investigation business through virtual cases and proves its value.

Welfare Regime of Park, Jeong-hee Authoritarian Anti-communism Developmental State. (박정희 정권시기 한국 복지체제: 반공개발국가, 복지국가의 기능적 등가물)

  • Yoon, Hongsik
    • 한국사회정책
    • /
    • v.25 no.1
    • /
    • pp.195-229
    • /
    • 2018
  • This study has examined how the welfare system has changed as it has passed through the most controversial period in Korean modern history. The welfare system has changed in a way that adapts to the need for export-led economic growth. Industrialization centered on light industry, which started in the mid-1960s, absorbed the labor force that existed in the rural areas and commodified them, thereby creating a momentum for Korean society to get out of poverty. However, the public de-commodification, ie social security system, adapted to the commodification of the labor force has been institutionalized only in a very limited area and people. Indeed, the de-commodification system was confined to the area directly linked to the reproduction of the labor force. Even so, the target was very limited in the abundance of labor in rural areas. Compulsory medical insurance was rejected because of corporate burden, and industrial accidents insurance was introduced centering on large-scale workplaces. As the Korean economy began to move from the light industry to the heavy industry in the 1970s, the commodificated labor force changed from a low skilled labor force to a skilled male labor force. It is at this time that dual structures have begun to be created between workers employed in export-oriented large enterprises and workers employed in domestic-oriented SMEs. Therefore, the system of de-commodification that supports the reproduction of labor power in response to social risks has also been institutionalized centering on large-scale workplaces.

A Study on Wage System and Social Security for Precarious Workers: Focusing on the Award Wage of Construction Workers in Australia (불안정 노동자를 위한 임금 체계와 사회보장 사례 연구: 호주 건설 노동자의 어워드 임금 체계를 중심으로)

  • Lee, Gyunho;Lim, Woontaek
    • Korean Journal of Labor Studies
    • /
    • v.24 no.3
    • /
    • pp.109-142
    • /
    • 2018
  • This paper aims to analyze the Award wage system in Australia for construction workers. Considering low wages and precarious employment situation of construction workers in general, it is of advantage especially for them in Australia. Furthermore, it seems to be instructive for Korean construction workers, who stand in more precarious and unstable situation and furthermore are lack of fair wage and social safety. After strong and longstanding labour struggle in the late 19th century in Australia, it has been established a tripartite institution called as 'tribunal' between trade unions, employers, and the government. Under the highly institutionalized form of industrial relations, it functions as an arbitration and conciliation system between labour and management. The Award wage system stands in the middle point. This Award wage system including various welfare provisions is settled by the tribunal, today renamed as Fair Work Commission. In this wage system should be defined level of minimum wages according to the various skill levels, which are in turn connected with compulsory superannuation and Medicare as well as vocational education and training. Furthermore, it provides especially for the construction workers, who suffer from job instability, so-called 'portable benefits', which relate to long service leave and redundancy pay. Considering general conditions of precarious construction workers in Korea, In that respect, the Australian Award wage system would be very instructive for our social wage and safety system for construction workers.

Evaluation and Implications of the German Riester Pension Scheme (독일 리스터연금제도의 평가와 시사점)

  • Kim, Won Sub
    • 한국사회정책
    • /
    • v.25 no.3
    • /
    • pp.279-303
    • /
    • 2018
  • Since the introduction of the Riester Pension Scheme, the controversy has continued in the policy studies and the political debates. This study evaluates the achievements and limitations of the German Riester pension scheme and tries to derive policy implications for South Korea. As a result of the analysis, the most worthwhile achievement of the Riester Pension is to strengthen the role of the private pension schemes. Unlike other private pension schemes, it included a large part of lower income households. It also opened a new perspective of utilizing private pension schemes to accomplish the goals of the family policy. Despite these attainments, it does not reach the promised coverage rate. It also was revealed that the higher income households have concluded more Riester Pension Contracts than the targeted lower-income households. Due to high administration fee and incomplete information problems, benefit levels are supposed to be much lower than expected. It concludes, above all, despite some achievements, the Riester Pension Scheme will not fill completely the gap of old age income security caused by the reduction of the public pension system. The German case provides fruitful lessons for Korea. The introduction of a subsidized personal pension scheme in South Korea can be realized only when some prerequisites would be satisfied such as the consolidation and maturing of public pension schemes and the strengthening of the transparency in the private pension market.

Design of an Integrated University Information Service Model Based on Block Chain (블록체인 기반의 대학 통합 정보서비스 실증 모델 설계)

  • Moon, Sang Guk;Kim, Min Sun;Kim, Hyun Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.43-50
    • /
    • 2019
  • Block-chain enjoys technical advantages such as "robust security," owing to the structural characteristic that forgery is impossible, decentralization through sharing the ledger between participants, and the hyper-connectivity connecting Internet of Things, robots, and Artificial Intelligence. As a result, public organizations have highly positive attitudes toward the adoption of technology using block-chain, and the design of university information services is no exception. Universities are also considering the application of block-chain technology to foundations that implement various information services within a university. Through case studies of block-chain applications across various industries, this study designs an empirical model of an integrated information service platform that integrates information systems in a university. A basic road map of university information services is constructed based on block-chain technology, from planning to the actual service design stage. Furthermore, an actual empirical model of an integrated information service in a university is designed based on block-chain by applying this framework.

Study on Influence Analysis of Radioactive Terror Scenarios by Weather Conditions (기상조건에 따른 방사능테러 시나리오 영향 분석)

  • Kim, Tae Woo;Jeon, Yeo Ryeong;Chang, Sunyoung;Kim, Yongmin
    • Journal of the Korean Society of Radiology
    • /
    • v.12 no.6
    • /
    • pp.719-725
    • /
    • 2018
  • After 9/11 attacks in the U.S, Terrorism has increased the number of unspecified casualties through multi-use facility terror attacks compared to the past. The subsequent London bombings and the self-destruction of Pakistan increased people's fear and social anxiety. As international events have been held in Korea recently, awareness and concern over radioactive terrorism and security management of radioactive materials are increasing. In this paper, we compared the results of different meteorological conditions using HotSpot Code. After creating a possible terror scenario in Korea, sources likely to be use in RDD and Dirty bomb were investigated. The meteorological condition was selected by comparing the Pasquill-Gifford stability class with the most stable condition F and the most unstable condition A. The result value of the A and F condition through simulation were shown not to cause citizens to die from acute effects due to radiological effects. The range of radioactivity is different according to the wind speed and the meteorological stability, and the degree of radioactivity dilution is different according to meteorological conditions. Analysis results are expected to be used for initial response in the event of a radioactive terrorist attack.

A Study of Economic Efficiency and Environmental Performance Due to the Conversion of the 7th and 8th Basic Plan for Long-term Power Supply and Demand (제7차 및 제8차 전력수급기본계획 전원 구성 전환에 따른 경제성 및 환경성 변화 분석 연구)

  • Cho, Sungjin;Yoon, Teayeon;Kim, Yoon Kyung
    • Environmental and Resource Economics Review
    • /
    • v.28 no.2
    • /
    • pp.201-229
    • /
    • 2019
  • This paper estimates the effects of generation mix changes in the $7^{th}$ and $8^{th}$ Basic Plan for Long-term Power Supply and Demand from two aspects: economic efficiency through electricity prices and environmental performance through $CO_2$ and air pollutants(NOx, SOx, PM) emissions. Particularly, we examined additional generation mix conversion paths that take into account the trade-off between economic efficiency and environmental performance through scenario analysis. According to our results, the conversion from the $7^{th}$ plan to the $8^{th}$ plan should increase the electricity prices in the mid- and long-term, while reducing GHG and air pollutants emissions at the same time. The alternative generation mix that combines $7^{th}$ and $8^{th}$ plans shows that there exists a path to mitigate the trade-off between economic and environmental in the long-term. It will be next to impossible to derive a optimal generation mix that simultaneously considers the core values, such as supply stability, environmental performance, economic efficiency, energy safety and energy security, when establishing the power supply and demand plan. However, by exploring the effects of various generation mix paths and suggesting near-optimal paths, people can best choose their direction after weighhing all the paths when deciding on a forward-looking generation mix in the long term.

Evaluation of Access Control Function of the Standard Records Management System (표준기록관리시스템 기능 평가 접근관리 기능을 중심으로)

  • Park, Min-Yung
    • The Korean Journal of Archival Studies
    • /
    • no.38
    • /
    • pp.3-35
    • /
    • 2013
  • The physical access or control of records with material entities is relatively easy. However, in the case of electronic records, due to its heightened applicative aspect that allows anyone with the authority to have access over the data, it requires an appropriate standard and stability to ensure the authenticity and integrity of electronic records. This study performed functional evaluation by extracting the minimum critical items from the national functional requirements documents and standards to explore the access control function that play an important role for the standard records management system to maintain quality requirements of electronic records. Based on this checklist, it evaluates whether the standard records management system properly carries out the access control function and investigates the current condition of application to practical records management work. Records managers generally do not use access control function, which may be because they do not feel the necessity, since the application of records management system is not yet actively promoted. In order for the standard records management system to be developed to become a more active system, it requires system improvement as well as considerations for below factors: First, although the necessity of establishing access control conditions is already recognized, it requires a clear stipulation of the regulation. Second, measures must be taken to implement access control in the records management system through document security solution. Third, it requires self-reflection of records manager, who utilizes the records management system. Instead of placing all responsibility on the National Archives, which established the system, professionals must further develop the system through continuous evaluation and improvement. Finally, a general discussion is required to publicize the issue of functional improvement of records management system. Although there is a bulletin board already created for this purpose, its users are extremely limited and it only deals with current problems. A space in online as well as in offline is required to solve the fundamental problems and exchange opinions.

Evaluation of Prevention System of Falls and Committing Suicide with Application Technology of Rollinder System (추락 및 투신자살 방지시스템의 조사 및 Rollinder System 적용기술)

  • Park, Sea-Man;Baek, Chung-Hyun;Choi, Byong-Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.591-598
    • /
    • 2019
  • The statistics of committing suicide in S. Korea is ranked in top with serious attempts of falling among OECD countries since 2003. The rates is slightly dropped by 5 percent point, nevertheless the falling is still high for the age of over 10 years old and this matter must be solved. Most of the case of suicides are the falling based on a trend view of falling which is serious matter and cannot be solved easily for both domestic and foreign countries. For example, the steel net of falling prevent was installed in the Golden Gate Bridge costed by 200 million-dollar. In New Zealand, the steel net of falling prevention had been removed and re-installed beccause of the high suicide rates. Canada and Australia also surrounded the bridge with steel fences to prevent suicide without consideration of the beauty of bridge. Therefore, this paper suggested a comparison study on both falling prevention systems in all countries and patent technologies. Also, it covers the blocking skills of approach in both security and limited area. This paper suggested the technical Rollinder system equipped with the mechanical apprentice to prevent effectively the falling sucides and wall passing. Before the installation of Rollinder System by 2016, there were 33 person who tried to fall in the river in Machang Bridge. However, the number of the committing suicides were dramatically reduced to zero after the installation of the system.

Derivation of Anti-Tamper System Requirements Based on CMVP Standard for Technology Protection of Weapon Systems (무기 시스템의 기술 보호를 위한 CMVP 표준 기반의 Anti-Tamper 시스템 요구사항 도출)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.470-478
    • /
    • 2019
  • As the growth of the domestic defense industry is remarkable regarding technology level and export size, technology protection is necessary. Particularly, there is a need to apply anti-tamper measures to prevent critical technologies from illegally being taken out of weapon systems. However, there is no security protection strategy and system built yet in ROK. Precedent studies discussed the trend analysis and technical research for specific protective techniques, and the application of anti-tamper using limited procedures was provided. Recently, methods of how to select the technology for protection were studied based on risk management. Nonetheless, these studies cannot be associated with the acquisition process for the whole life-cycle, having difficulty with actual development and evaluation of the weapon systems. The objective of our study is to derive the system requirements of the weapon system for which anti-tamper measures have been determined to apply. Specifically, requirements items suitable for the development of anti-tamper weapon systems were derived based on ISO/IEC 19790, the CMVP standard for the development and verification of cryptographic modules. Also, its utilization in technical reviews and test & evaluations was presented. The usefulness of the research results was confirmed through inductive inference and comparative evaluation. The result can be expected to play a role in initiating extensive activities needed for technology protection of the weapon systems.