• Title/Summary/Keyword: Security Technology Policy

Search Result 686, Processing Time 0.189 seconds

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.

Establishment of a Fuzzy Multi-criteria Decision Making Method Framework for Selecting R&D Programs of Energy Technologies (에너지기술 R&D 프로그램 선정을 위한 퍼지 다기준의사결정 프레임워크 수립)

  • Lee, Seong-Kon;Mogi, Gento;Kim, Jong-Wook
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.20 no.1
    • /
    • pp.22-30
    • /
    • 2009
  • Energy environment has been changing rapidly such as the fluctuation of oil prices and the effect on UNFCCC. Oil price change affects Korea's economy heavily due to her poor natural resources and large dependence of consumed energy resources. Korea takes the 4th place of importing the crude oil and 9th place in $CO_2$ emissions with the 1st place of $CO_2$ emissions increasing rate. Considering the current statue of Korea including oil price change and UNFCCC, Korea will be expected to be the Annex I nation due to Korean energy environments and the quantity of $CO_2$ emission. Energy technology development is a crucial key to cope with Korea's national energy security and environments. In this study, we establish the framework, which allocates the relative weights of assessment criteria and sub-criteria, for assessing and selecting R&D programs of energy technologies strategically. We integrated fuzzy theory and analytic hierarchy process (AHP) approach since the fuzzy AHP approach reflects the vagueness of human thoughts and perception effectively as making pairwise comparisons of criteria and alternatives. The fundamental data of this research results will support R&D planning phase for policy-makers and the production of well focused R&D outcomes.

A Study on Policy Support for Emergency Relief Grant for COVID-19 through Causal Loop Analyses (인과지도 분석을 통한 코로나-19의 소상공인 정책지원 연구)

  • Suh, Kyung-Do;Choi, Jung il;Choi, Pan-Am;Jung, Jaerim
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.531-539
    • /
    • 2022
  • The government enforced policies such as social distancing and limiting business hours to prevent the spread of COVID-19. However, the impact of the long-term COVID-19 pandemic is causing more serious difficulties for small business owners. The government intended to relieve the business management pressure for small business owners by drawing up the COVID-19 emergency disaster relief funds. The funds provided temporary support for the small business owners, but the prolonged pandemic worsened the business management difficulties. Therefore, this study will apply fixes that fail and shifting the burden archetypes from the system archetype of system thinking for the exploratory deduction of policy measures as the policy leverage to effectively enhance the recovery of small business owners. In response to the situation, emergency financial aid for small business owners and support that can enhance the self-sustaining powers are required to heighten the recovery of small business owners.

Development of Chinese Maritime Related Laws and Status and Interpretation in Legislation System (중국 해양관련 법령의 발전과 입법체계에서의 지위 및 해석)

  • Yang, Hee-Cheol;Lee, Moon-Suk;Park, Seong-Wook;Kang, Ryang
    • Ocean and Polar Research
    • /
    • v.30 no.4
    • /
    • pp.427-444
    • /
    • 2008
  • The most important bases of maritime laws in China are laws enacted by Constitution, a legislative institution of National People's Congress and Legislation of NPC Standing Committee. However, in reality, the institution, which become the basis of Chinese marine policy and leads overall maritime affairs, is a State Council of the Chinese central government and many objects of our researches on Chinese marine policy and laws are composed centering on this administration law. Therefore, in understanding Chinese maritime laws, it becomes an important prerequisite to understand relevant laws (statutes), administration law, statutes of local province, mutual authority relationships of these legislative institutions, and interpretation authority regarding laws (statutes). In May 2003, Chinese State Council ratified and declared ${\ll}$Guideline of the national maritime economic development plan${\gg}$ and this is the first macroinstructive document enacted by the Chinese government for promoting maritime economy in integration development. This plan guideline shows very well a new policy and deployment direction of maritime policy in China. China is already striving to lead its maintenance stage of domestic legislation into a new stage under the UN maritime laws agreement system and this is an expression of intention to take national policy regarding the ocean as a new milestone for the national economy through concurrent developments in various fields such as national territory, economy, science technology, national defense, and maritime biology. In this point, Chinese maritime policy and maritime legislation provide lots of indexes of lessons in many parts. In particular, regarding Korea, which has to solve many issues with China in Yellow Sea, East China Sea, and Balhae, we have to realize that we can maximize national interest only with a systematic approach to research on changes of domestic policies and maritime legislation within China. In addition, in understanding Chinese maritime related laws, we have to realize it is an important task to not only understand legislative subjects for mutual creation of order within the entire frame of law orders of China but also to predict and react to direction of policy of Chinese domestic legislation through dynamics of these subjects.

Review on the Trends of Social Sciences Research in the International Agricultural Research Institute - Focused on the International! Rice Research Institute (IRRI) - (국제농업연구기관의 사회과학연구 동향 고찰 -국제미작연구소를 중심으로-)

  • 윤순덕
    • The Korean Journal of Community Living Science
    • /
    • v.15 no.3
    • /
    • pp.45-56
    • /
    • 2004
  • The purpose of this paper is to review research evolution and achievements, major activities, research manpower, and difficulties for social scientists, using IRRI's internal web site and Social Sciences Division's research literatures. The major findings are as follows: 1) Social research started with the establishment of Agricultural Economics Division (AED) in 1966, and it was developed into the Social Sciences Division (SSD) in 1990; 2) Their research has been geared towards developing technological and policy interventions that improve food security and raise the well-being of rice farmers through sustainable increase in the productivity of a rice-based production system; 3) Major activities of social sciences research for about four decades can be classified into the identification of technology needs, technology impact assessment, policy analysis, research prioritization, and capacity building for social science research in NARS (National Agricultural Research Systems). They have become increasingly important in alleviating the poverty of the rice growing and consuming population; 4) Social researchers at IRRI include economists, anthropologists, gender specialists, geographic information specialists, and rural sociologists; 5) Finally, this paper discusses the difficulties faced by social researchers.

  • PDF

Study on the Direction of Korea's National Defense Strategy Focused on the Hegemony Strategy of U.S.A. (미국의 패권전략과 한국 군사전략 발전방향)

  • Kim, Sung-Woo
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.239-270
    • /
    • 2010
  • This thesis is to make an appropriate national defense policy of Republic of Korea through studying the Hegemony Strategy of United States. I searched the theory of hegemony. The hegemony was differently defined by the point of time and region. The strong power nations with the hegemony have been making efforts to maintain their hegemony everytime. I have conclusion that the presence of hegemony once emerged, it brought regional stability in place whether it is coercive or beneficial. The stability and instability of international order IS not exclusively dependent on hegemony. Even if the safety of hegemony cannot guarantee absolute stability of international order, there IS on doubt that the hegemony has enormous impact on that. According to the hegemonic theory, the history of mankind equals to the history of rising and falling hegemony. The international order was changed as the hegemony changes. The United States has been making efforts to maintain her global hegemony during the post cold-war era as well. Taking all these into consideration, relevant military strategy direction able to pursue national interest is that to make up for the relative weakness in the strategic environment. South Korea have to prepare security policy response as following. First, South Korea should build the military force equipped with advanced weapons in military technology sector and solidify military diplomatic relation able to form cooperative relation in wartime. Second, South Korea should make solid Alliance of Korea and U.S. Third, develop and maintain multilateral security cooperation of East Asia. Forth, we could realize that there are means that can neutralize opponent's strong point by seeking one or two and more asymmetry in the aspect of strategy, tactics, and means through asymmetric strategy. Than the military force of South Korea should develop into a force that is able to overcome to the traditional North Korea's threat and new type of conflicts. And the force should have sufficient strength and be deployed to effectively defend the Korean Peninsula. So, we need to establish a denial and defense system against any hostile neighboring country. Therefore, ROK military forces preparing for the future should try to construct a future military power to gradually establish enough strength for self-defense to prepare for a uncertain security environment and when the Korean Peninsula is unified in a future.

  • PDF

Development of Device Resource and Contents Access Security Policy Based Cloud Media Service (리소스 접근 제어 보안 정책 기반 이종기기 연계형 클라우드 미디어 서비스 기술 개발)

  • Park, Byoung Ha;Hong, Sung Hye;Jung, Kwang Mo;Koh, Byoung Soo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.11a
    • /
    • pp.241-242
    • /
    • 2012
  • 본 논문에서는 스마트폰, 태블릿, 스마트TV 등 이종기기가 접속된 클라우드 미디어 서비스 환경에서 보안 정책 기반 리소스/콘텐츠 접근 제어를 통해 단말 로컬콘텐츠, 클라우드 아카이버 콘텐츠가 연동된 채널 형태의 융합형 미디어 콘텐츠를 사용자 주도로 이종 단말 간 연계를 통해 제공하는 모바일 웹 애플리케이션 형태의 이종기기 연계형 클라우드 미디어 서비스 기술 개발에 관하여 논한다.

  • PDF

Improving the speed of the Lizard implementation

  • Rustamov, Shakhriddin;Lee, Younho
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.25-31
    • /
    • 2019
  • Along with the recent advances in quantum computers, it is anticipated that cryptographic attacks using them will make it insecure to use existing public key algorithms such as RSA and ECC. Currently, a lot of researches are underway to replace them by devising PQC (Post Quantum Cryptography) schemes. In this paper, we propose a performance enhancement method for Lizard implementation which is one of NIST PQC standardization submission. The proposed method is able to improve the performance by 7 ~ 25% for its algorithms compared to the implementation in the submission through the techniques of various implementation aspects. This study hopes that Lizard will become more competitive as a candidate for PQC standardization.

Market Performance of Major Companies in Cybersecurity and Policy Trends in Information and Communication Technology Supply Chain (사이버 보안 분야 주요 기업의 시장 성과와 ICT 공급망 관련 정책 동향)

  • C.M. Ahn;Y. Yoo
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.3
    • /
    • pp.48-57
    • /
    • 2024
  • Cyberthreats and crimes have become common in society and demand the adoption of robust security measures. Financial cybercrimes, personal information breaches, and spam messages are now prevalent, while companies and nations face an increasing number of cyberthreats and attacks such as distributed denial of service, ransomware, and malware. As the overall socioeconomic landscape undergoes digitalization powered by big data, cloud computing, and artificial intelligence technologies, the importance of cybersecurity is expected to steadily increase. Developed nations are actively implementing various policies to strengthen cybersecurity and providing government support for research and development activities to bolster their domestic cybersecurity industries. In particular, the South Korean government has designated cybersecurity as one of the 12 nationwide strategic technology sectors. We examine the current landscape of cybersecurity companies and the information and communication technology supply chain, providing insights into the domestic cybersecurity market and suggesting implications for South Korea.

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.