• Title/Summary/Keyword: Security limits

Search Result 162, Processing Time 0.087 seconds

A Study of Password Management System for Improves the Availability and Efficiency (효율성과 가용성을 향상시킨 패스워드 관리시스템 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.150-153
    • /
    • 2013
  • By the development of IT, most business has been processed on the IT solution-based servers has increased Therefore, the importance of security of the server is highlighted. And the need for password management server efficient and safe is raised. There is a need to change at least 8 characters to mix the numbers and letters and password change passwords on a regular basis, you need a password for each system account is set in a different way, but the continuation of the system there is a tendency to password problems occur problems caused by the limits of the introduction of human resources and introduction basis occurs. The password management feature, though it is expensive is partially providing integrated access control solutions at home and abroad, there is a drawback that stresses the traffic on the server. Future, we conducted a study of password management solutions for the server of the server is determined IT transformation trend of non-IT field to accelerate, is continuously increasing it accordingly.

  • PDF

The Academic Vocabulary Studies for Petty Officer in Community Colleague (전문대학 부사관과의 사고도구어 선정을 통한 글쓰기 교육방안 연구)

  • Yu, Yong-tae
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.165-171
    • /
    • 2017
  • The goal of this paper is to seek an educational method that can cause some communicational improvements to petty officer majoring students through listing and utilizing the academic vocabulary. The academic vocabulary has been listed by using three major steps. The first, the academic vocabulary is needed to extract from the studies based on this field in past 3 years. Second, the academic vocabulary for petty officers is required to compare with high school level of the academic vocabulary. For the last, the academic vocabulary is demanded to be listed for teaching petty officer majoring students. The signification of the academic vocabulary in this study is limited by focusing on the educational skills for writing in petty officer majors. This study presents a way to develop the communicational abilities through using the academic vocabulary into the collaborative learning. For the conclusion, this study presents its limits and further directions.

Breaking the Silence: Revealing the limits of Preschool Teachers' Cultural and Linguistic Competence (CLC) in Saudi Arabia

  • Allehyani, Sabha Hakim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.222-234
    • /
    • 2022
  • Background: Within the framework of the new Saudi Vision 2030, the education system is keen on developing Early Childhood (EC) curricula to meet the needs of children from diverse cultural and linguistic backgrounds, in addition to preparing teachers to be the main driving forces in this field. To achieve these strategic goals, the professional development of teachers has taken the lead in terms of their continuous professional achievements. Purpose: The recent study tended to explore the promotion of Cultural and Linguistic Competence (CLC) of teachers in preschool institutions in different sectors in the Kingdom of Saudi Arabia (KSA) include public, private and international. Method: In the current study, (n=300) of preschool female teachers, who had experience teaching children from diverse language and cultural backgrounds, participated voluntarily by filling out the exploratory questionnaire. It was designed on a five-point Likert scale. The credibility of the scale and the validity of the questionnaire were ascertained, and the content for which it was designed verified in terms of the purposes of the current investigation. Results: The results revealed that preschool female teachers in the private preschool settings have a higher level of CLC compared to those who were teaching in public and international preschools in KSA. In the private sector, preschool female teachers showed create abilities to provide culturally responsive environments for diverse students, applying various communication styles, and showing proper attitudes and values toward diversity. Implication: The current study provided key implications for policy makers regarding the promotion of CLC for all teachers, particularly preschool in government settings in KSA. It contributed to revealing the cultural awareness of preschool teachers' values and attitudes toward diversity.

Deobfuscation Processing and Deep Learning-Based Detection Method for PowerShell-Based Malware (파워쉘 기반 악성코드에 대한 역난독화 처리와 딥러닝 기반 탐지 방법)

  • Jung, Ho-jin;Ryu, Hyo-gon;Jo, Kyu-whan;Lee, Sangkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.501-511
    • /
    • 2022
  • In 2021, ransomware attacks became popular, and the number is rapidly increasing every year. Since PowerShell is used as the primary ransomware technique, the need for PowerShell-based malware detection is ever increasing. However, the existing detection techniques have limits in that they cannot detect obfuscated scripts or require a long processing time for deobfuscation. This paper proposes a simple and fast deobfuscation method and a deep learning-based classification model that can detect PowerShell-based malware. Our technique is composed of Word2Vec and a convolutional neural network to learn the meaning of a script extracting important features. We tested the proposed model using 1400 malicious codes and 8600 normal scripts provided by the AI-based PowerShell malicious script detection track of the 2021 Cybersecurity AI/Big Data Utilization Contest. Our method achieved 5.04 times faster deobfuscation than the existing methods with a perfect success rate and high detection performance with FPR of 0.01 and TPR of 0.965.

Conveyance Verification through Analysis of River Vegetation and Soil Impact using Sentinel-2 (Sentinel-2를 활용한 하천의 식생 및 토양 영향 분석을 통한 통수능 검정)

  • Bang, Young Jun;Choi, Byeong Jun;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.4
    • /
    • pp.37-45
    • /
    • 2021
  • Flooding damage may occur due to an unexpected increase in rainfall in summer. Previously, the roughness coefficient, which is a major factor of conveyance, was calculated through on-site measurement, but in case of on-site measurement, there are many limits in accurately grasping changes in vegetation. In this study, the vegetation index (NDVI) was calculated using the Sentinel-2 optical images, and the modified roughness coefficient was calculated through the density and distribution area of the vegetation. Then the calculated roughness coefficient was applied to HEC-RAS 1D model and verified by comparing the results with the water level at the water level station directly downstream of the Soyang River dam. As a result, the error rate of the water level decreased about 14% compared to applying the previous roughness coefficient. Through this, it is expected that it will be possible to refine the flood level of rivers in consideration of seasonal flood characteristics and to efficiently maintain rivers in specific sections.

Specifics of Speech Development of Children with Cerebral Palsy

  • Zavitrenko, Dolores;Rizhniak, Renat;Snisarenko, Iryna;Pasichnyk, Natalia;Babenko, Tetyana;Berezenko, Natalia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.157-162
    • /
    • 2022
  • Cerebral palsy is one of the most serious forms of disorders of the psychophysical development of children, which manifests itself in disturbances of motor functions, which are often combined with speech disorders, other complications of the formation of higher mental functions, and often with a decrease in intelligence. The article will discuss the speech disorder in children with cerebral palsy. Emphasis is placed on some important aspects, which should bear in mind, investigating the problem of specifics of speech development of children with cerebral palsy. In particular at the heart of speech disorders in the cerebral palsy is not only damage to certain structures of the brain, but also the later formation or underdevelopment of those parts of the cerebral cortex, which are of major importance in linguistic and mental activity. This is an ontogenetically young region of the cerebral cortex, which is most rapidly developing after birth (premotor, frontal, temmono-temporal). It is important to take into account, that children with cerebral palsy have disturbances of phonemic perception. Often, children do not distinguish between hearing sounds, cannot repeat component rows, allocate sounds in words. At dysarthria, there are violations of pronunciation of vowel and consonant sounds, tempo of speech, modulation of voice, breathing, phonation, as well as asynchronous breathing, alignment and articulation. As a result, we identified the main features and specifics of the speech development of children with cerebral palsy and described the conditions necessary for the full development of language. Language disturbances in children's cerebral palsy depend on the localization and severity of brain damage. Great importance in the mechanism of speech disorders has a pathology that limits the ability of movement and knowledge of the world.

ECC-based IPTV Service Key Establishment Protocol With User Attribute (사용자 속성을 이용한 ECC 기반의 IPTV 서비스 키 설립 프로토콜)

  • Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.105-111
    • /
    • 2012
  • Internet Protocol Television (IPTV) through broadband cable network is a subscriber-based system which consists of software and set-top box. However, a weakness for the current IPTV system is the lack of security between users and CAS. This paper proposes a user authentication protocol at STB, which limits the service by the user-valued attribute to prevent illegal IPTV users. User attribute values change the order with bit form according to the certain rule, and apply to one-way hash function and Diffie-Hellman's elliptic curve key-exchange algorithm. The proposed protocol is able to improve on user authentication and computation. Also, each user generates an authentication message by smart card and receives various services based on the user-valued attribute.

그룹의사결정지원을 위한 인터넷 기능개선 방향

  • Heo, Yeong-Jong
    • Asia pacific journal of information systems
    • /
    • v.6 no.2
    • /
    • pp.107-124
    • /
    • 1996
  • This research studied future directions of Internet technology toward supporting group decision making. From the previous research, this study classified requirements of group decision support systems into three categories which are information transfer, information provision, and communication control. For each of the category, this study analyzed the limits of current Internet functions. Next, this research discussed technological solutions, for each of the OSI 7 layers, toward supporting group decision making. Additional functions in Internet which are required for group supporting are tracing communications, application dependent coding, selection of communication modes, and security handling. For high speed data communication in Internet, this research discussed the potential of cell-switching technology for the lower level link in Internet. The conclusions of this research can be used for designing future group decision support systems and development of Internet.

  • PDF

A Study on the Airport and Airspace Management (공항 및 공역관리 제도 개선에 관한 연구)

  • Kim, Byeong-Jong;Yang, Han-Mo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.12
    • /
    • pp.246-274
    • /
    • 2000
  • This paper discusses the qualification criteria for international hub airport and suggests the strategies for Inchon International Airport (IIA) to be the hub airport in the East Asia. Recently, many East and Southeast Asia countries have invested on large scale international airports like Chap Lak Kok airport, Pudong airport etc.. as Korea have done on IIA. IIA to be open in 2001 will face a serious competition with these airport. Being a hub airport requires geographic proximity. sufficient volume of local traffic. uncongested infrastructure, a good accessibility to surrounding industrial centers. high quality of service to the airline. In order to promote airlines to land at IIA. Korea Government need to establish Open Sky Policy to many countries and national flag carriers of Korea need to be involved in a global alliance. Developing vicinity of IIA as free trade zone will generated more local traffic which makes IIA as more attractive candidate for airlines. The Korea airspace is one of the most restricted area in the world becuase of the national security. which limits civil aircraft maneuvers. The airspace need to be re-structured to exploit the full capacity of IIA.

  • PDF

Compliance and Implications for Public Officials in Charge of Personal Information Protection by Policy Trends (개인정보보호 정책 동향에 따른 공공기관 담당자를 위한 업무 수행 준수사항 및 시사점)

  • Ju, Gwang-il;Choi, Seon-Hui;Park, Hark-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.4
    • /
    • pp.461-467
    • /
    • 2017
  • Privacy laws are widely enforced throughout the general public and private sector, and the Ministry of Government Administration and Home Affairs is stepping up its annual level of protection and management levels annually. However, in actual field, it has limits to follow the laws that are amended to comply with the privacy laws of the public sector. Therefore, this study should examine the trends of privacy protection and examine items that require adherence to privacy practices in public institutions. In addition, it is hoped to draw implications for the problems arising from the task itself, as well as providing implications for the issues that are closely related to the public in the privacy of the privacy policies.