• Title/Summary/Keyword: Security design

Search Result 3,398, Processing Time 0.037 seconds

Implementation of a KPI Focused e-QMS: A Case Study in the Aerospace & Defense Industry (KPI 중심의 e-QMS 구현: 우주항공 및 방위 산업 사례 연구)

  • Jae Young Shin;Wan Seon Shin
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.1
    • /
    • pp.131-154
    • /
    • 2023
  • Purpose: The purpose of this paper is to design an integrated informatization system that can manage quality & KPI by integrating management systems in the aerospace and defense industry, and study the effect on KPI when applied to related companies. Methods: The 7 management systems required for integration in the AS&D industry were studied, and an empirical analysis was conducted for H company in South Korea for the application of e-QMS integrated informatization & KPI system based on security environment and open quality. Results: The results of this study were analyzed to have an effect on the improvement of customer satisfaction and the positive improvement of quality failure cost in the aerospace and defense industry. And it was analyzed that it works to continuously comply with ethical management and environmental laws and prevent safety accidents. Conclusion: The greatest significance of this study is that it attempted to build an e-QMS integrated system in the aerospace and defense industry. Considering that the case of integrated management system and integrated operation of KPI in related industries has not been introduced in the existing literature, the results of this study will be shared as a meaningful preceding study in the era of digital quality information. In addition, the fact that the open-quality quality innovation methodology emphasizing measurement(M), tracking(T), and connection(C) was actually applied in an AS&D company and its effectiveness was objectively proven. It is expected that it will be a good paper for follow-up research.

Design of Reconfigurable Processor for Information Security System (정보보호 시스템을 위한 재구성형 프로세서 설계)

  • Cha, Jeong-Woo;Kim, Il-Hyu;Kim, Chang-Hoon;Kim, Dong-Hwi
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.113-116
    • /
    • 2011
  • 최근 IT 기술의 급격한 발전으로 개인정보, 환경 등 다양한 정보를 수시로 수집 및 관리하면서 사용자가 원할시 즉각적인 정보서비스를 제공하고 있다. 그러나 유 무선상의 데이터 전송은 정보의 도청, 메시지의 위 변조 및 재사용, DoS(Denial of Service)등 외부의 공격으로부터 쉽게 노출된다. 이러한 외부 공격은 개인 프라이버시를 포함한 정보서비스 시스템 전반에 치명적인 손실을 야기 시킬 수 있기 때문에 정보보호 시스템의 필요성은 갈수록 그 중요성이 부각되고 있다. 현재까지 정보보호 시스템은 소프트웨어(S/W), 하드웨어(ASIC), FPGA(Field Progr- ammable Array) 디바이스를 이용하여 구현되었으며, 각각의 구현방법은 여러 가지 문제점이 있으며 그에 따른 해결방법이 제시되고 있다. 본 논문에서는 다양한 환경에서의 정보보호 서비스를 제공하기 위한 재구성형 SoC 구조를 제안한다. 제안된 SoC는 비밀키 암호알고리즘(AES), 암호학적 해쉬(SHA-256), 공개키 암호알고리즘(ECC)을 수행 할 수 있으며, 마스터 콘트롤러에 의해 제어된다. 또한 정보보호 시스템이 요구하는 다양한 제약조건(속도, 면적, 안전성, 유연성)을 만족하기 위해 S/W, ASIC, FPGA 디바이스의 모든 장점을 최대한 활용하였으며, MCU와의 효율적인 통신을 위한 I/O 인터페이스를 제안한다. 따라서 제안된 정보보호 시스템은 기존의 시스템보다 다양한 정보보호 알고리즘을 지원할 뿐만 아니라 속도 및 면적에 있어 상충 관계를 개선하였기 때문에 저비용 응용뿐만 아니라 고속 통신 장비 시스템에도 적용이 가능하다.

A Hybird Antibody Model Design using Genetic Algorithm Scheme (유전 알고리즘 기법을 이용한 HA 모델 설계)

  • Shin, Mi-Yea;Jeon, Seoung-Heup;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.159-166
    • /
    • 2009
  • A nature immunity system responds sensitively to an external invasion with various functions in a lot of bodies, besides it there is a function to remember information to have been currently infected. we propose a hybrid model similar to immune system which combine with the antibody which applied genetic algorithm as select antibody and the arbitrary abnormal system call sequence that applied negative selection of a nature immunity system. A proposed model uses an arbitrary abnormal system Kol sequence in order to reduce a positive defect and a negative defect. Data used to experiment are send mail data processed UNM (University of New Maxico). The negative defect that an experiment results proposal model judged system call more abnormal than the existing negative selection to normal system call appeared 0.55% low.

Design for Position Protection Secure Keypads based on Double-Touch using Grouping in the Fintech (핀테크 환경에서 그룹핑을 이용한 이중 터치 기반의 위치 차단이 가능한 보안 키패드 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.3
    • /
    • pp.38-45
    • /
    • 2022
  • Due to the development of fintech technology, financial transactions using smart phones are being activated. The password for user authentication during financial transactions is entered through the virtual keypad displayed on the screen of the smart phone. When the password is entered, the attacker can find out the password by capturing it with a high-resolution camera or spying over the shoulder. A virtual keypad with security applied to prevent such an attack is difficult to input on a small touch-screen, and there is still a vulnerability in peeping attacks. In this paper, the entire keypad is divided into several groups and displayed on a small screen, touching the group to which the character to be input belongs, and then touching the corresponding character within the group. The proposed method selects the group to which the character to be input belongs, and displays the keypad in the group on a small screen with no more than 10 keypads, so that the size of the keypad can be enlarged more than twice compared to the existing method, and the location is randomly placed, hence location of the touch attacks can be blocked.

Design and Implementation of an Automated Privacy Protection System over TPM and File Virtualization (TPS: TPM 및 파일 가상화를 통한 개인정보보호 자동화 시스템 디자인 및 구현)

  • Jeong, Hye-Lim;Ahn, Sung-Kyu;Kim, Mun Sung;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.2
    • /
    • pp.7-17
    • /
    • 2017
  • In this paper, we propose the TPS (TPM-enhanced Privacy Protection System) which is an automated privacy protection system enhanced with a TPM (Trusted Platform Module). The TPS detects documents including personal information by periodic scanning the disk of clients at regular intervals and encrypts them. Hence, system manages the encrypted documents in the server. In particular, the security of TPS was greatly enhanced by limiting the access of documents including the personal information with regard to the client in an abnormal state through the TPM-based platform verification mechanism of the client system. In addition, we proposed and implemented a VTF (Virtual Trusted File) interface to provide users with the almost identical user interface as general document access even though documents containing personal information are encrypted and stored on the remote server. Consequently, the TPS automates the compliance of the personal information protection acts without additional users' interventions.

Design and Implement a Forgery-safe Blockchain-based Academic Credential Verification System (위변조에 안전한 블록체인 기반 학력 검증 시스템 설계 및 구현)

  • Jung-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.7
    • /
    • pp.41-49
    • /
    • 2023
  • In recent years, various educational institutions have used online certificate services to verify academic achievement related to graduation and grades. However, the certificate of the existing system has limitations in verifying and tracking whether it is true or not and detailed academic background. In this regard, cases of forgery/falsification of online/offline certificates continue to occur. This study proposes a blockchain-based verification method that is safe from forgery and alteration, focusing on university institutions. Necessary information such as detailed class categories for each department, attendance, and detailed grades was collected/analyzed to create a linkage relationship through blockchain. In addition, the system/network environment required for blockchain sharing was considered, and it was implemented as an extension module in the form of an independent web application. As a result of the block chain verification, it was proved that the safe trust verification of educational information and the relationship between detailed information can be traced. This study aims to contribute to the improvement of academic credential verification services and information security for Korean educational institutions in the future.

Device RDoS Attack Determination and Response System Design (디바이스의 DDoS 공격 여부 판단 및 대응 시스템 설계)

  • Kim, Hyo-jong;Choi, Su-young;Kim, Min-sung;Shin, Seung-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.108-110
    • /
    • 2021
  • Since 2015, attacks using the IoT protocol have been continuously reported. Among various IoT protocols, attackers attempt DDoS attacks using SSDP(Simple Service Discovery Protocol), and as statistics of cyber shelters, Korea has about 1 million open SSDP servers. Vulnerable SSDP servers connected to the Internet can generate more than 50Gb of traffic and the risk of attack increases gradually. Until recently, distributed denial of service attacks and distributed reflective denial of service attacks have been a security issue. Accordingly, the purpose of this study is to analyze the request packet of the existing SSDP protocol to identify an amplification attack and to avoid a response when an amplification attack is suspected, thereby preventing network load due to the occurrence of a large number of response packets due to the role of traffic reflection amplification.

  • PDF

The Impact of Employee's Attributes on Corporate Pension Insurance Products Preference (기업연금보험상품 선호도에 대한 종업원 속성의 영향)

  • Joo, Heon
    • The Korean Journal of Franchise Management
    • /
    • v.7 no.2
    • /
    • pp.27-35
    • /
    • 2016
  • Purpose - The primary objective of this study is to investigate the impact of employee characteristics on employees' preference towards corporate pension products. This study can provide a guidance for maximization of benefits for employees and their affiliated corporation. Employee characteristics include average length of labour, wage system of annual salary, age, types of interest rates and size of corporation. Existing research generally concentrate on vitalizations of corporate pension product raising an imperfection, improvements, tax benefit analysis and legal consideration. Thus, this study intensively analyses the effect of employee attributes on firms' decision for corporate pension products, such as DB(defined benefit) and DC(defined contribution) type. Research design, data, and methodology - The data were collected using self-administrated questionnaire survey on corporate pension products from CEOs or HR directors 250 foreign-invested companies', purchasing pension plans in practice with domestic financial trustees (insurance companies, banks and security companies). Hypotheses testing was conducted using Logistic Regression analysis with SPSS/PC+ 21.0. Results - The findings of the study are as follows. Employees with the long length of labour are more likely to have DB plan; more likely to prefer DC plan with the dividend distribution product regarding the types of interest rate. SMEs(less than 100 employees) are more likely to select DC plan whereas high fluctuation in wage with annual salary has no impacts. In addition, the ages has no significant effect on the preference. Conclusions - This study has examined with the empirical testing that employees' variable attributes and qualities are one of the vital factors for corporation pension plan selection. Currently, majority employees are highly likely to join DB plan and Defined interest types. Corporation with less than 10 employees prefer IRP scheme while most of corporation are intended to join DC plan. In a very near future, corporation more than 300 employees will be required to purchase mandatory plan under national regulation. For maximization of employees' contentment to corporation pension insurance and for complementing the flaws of existing plans, the future studies shall also research in a perspective of employee benefit.

An Adaptive Tuned Heave Plate (ATHP) for suppressing heave motion of floating platforms

  • Ruisheng Ma;Kaiming Bi;Haoran Zuo
    • Smart Structures and Systems
    • /
    • v.31 no.3
    • /
    • pp.283-299
    • /
    • 2023
  • Structural stability of floating platforms has long since been a crucial issue in the field of marine engineering. Excessive motions would not only deteriorate the operating conditions but also seriously impact the safety, service life, and production efficiency. In recent decades, several control devices have been proposed to reduce unwanted motions, and an attractive one is the tuned heave plate (THP). However, the THP system may reduce or even lose its effectiveness when it is mistuned due to the shift of dominant wave frequency. In the present study, a novel adaptive tuned heave plate (ATHP) is proposed based on inerter by adjusting its inertance, which allows to overcome the limitation of the conventional THP and realize adaptations to the dominant wave frequencies in real time. Specifically, the analytical model of a representative semisubmersible platform (SSP) equipped with an ATHP is created, and the equations of motion are formulated accordingly. Two optimization strategies (i.e., J1 and J2 optimizations) are developed to determine the optimum design parameters of ATHP. The control effectiveness of the optimized ATHP is then examined in the frequency domain by comparing to those without control and controlled by the conventional THP. Moreover, parametric analyses are systematically performed to evaluate the influences of the pre-specified frequency ratio, damping ratio, heave plate sizes, peak periods and wave heights on the performance of ATHP. Furthermore, a Simulink model is also developed to examine the control performance of ATHP in the time domain. It is demonstrated that the proposed ATHP could adaptively adjust the optimum inertance-to-mass ratio by tracking the dominant wave frequencies in real time, and the proposed system shows better control performance than the conventional THP.

A Study on The Network Design of Smart Village to Provide Wired and Wireless Convergence Services on IoT (IoT기반의 유무선 융복합 서비스 제공을 위한 스마트빌리지의 네트워크 구성방안에 관한 연구)

  • Kim, Yun-ha;Jeong, Jae-woong;Kim, Young-sung;Choi, Hyun-ju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.296-299
    • /
    • 2022
  • The rapid urban expansion and the increase in natural disasters due to the increase of population after industrialization and climate change are causing numerous urban management problems. The IP based hyper-connectivity caused by the initiation of the 4th industrial revolution enables a variety of technologies and services that produce vast amounts of data and solve urban management problems based on this. Especially, the quality of life is improved by providing the necessary information for life that are produced through a sensor network on wired and wireless communication. In this study, we intend to propose the method of optimal communcation network composition for innovative and futuristic city management technology through the case of K-water Smart Village Communication System

  • PDF