• Title/Summary/Keyword: Security limits

Search Result 162, Processing Time 0.033 seconds

Study on Trends of the Future Internet Security : FIA Work (미래 인터넷 보안 연구 동향 분석 : FIA를 중심으로)

  • Jun, Eun-A;Lee, Do-Geon;Lee, Sang-Woo;Seo, Dong-Il;Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.79-87
    • /
    • 2012
  • Future Internet has been designing and developing in the world because of overcoming limits of current Internet and accepting new requirements. Therefore it is totally different from architectures of current Internet and it is based on Clean-Slate. Future Internet already has been studying with enormous investment by advanced countries such as USA, EU etc. Technical characteristics of Future Internet can be categorized into Infra techniques, Architectures and Service techniques. Especially, our country is in a superior position in Infra techniques and Service techniques. We can have competitiveness to develop trust communication in Future Internet because we have advantages of various Services such as mobile communication, Machine to Machine and Sensor Networks. This paper aims to analysis reference model of trust communication in Future Internet. To achieve this, we studied analysis of security techniques in four Future Internet researches of NSF.

A Comparative Study on Reforming the Resident Registration Number (주민등록번호 개선방안 비교연구)

  • Kim, Seon-Ju;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.673-689
    • /
    • 2015
  • Resident Registration Number(RRN) has been used broadly by public institutions or civilian departments as a means of personal identification due to its effectiveness and convenience in managing the information. Recently, because of personal information leakage including resident registration number, the potential damage is increasing public anxiety. In this situation, there have been demands requiring systems that can end the link between the resident registration number and personal information. In order to solve the problem, multiple alternatives are under consideration. In this research, we will discuss limits, needs for change of the system, and the basic concepts or traits that new registration number require. Also, by comparing the alternatives being discussed, we will analyze personal information security level and the cost required for reorganizing the system to present alternative that has high effectiveness.

The Study of technique to find and prove vulnerabilities in ActiveX Control (ActiveX Control 취약점 검사 및 검증 기법 연구)

  • Sohn, Ki-Wook;Kim, Su-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.3-12
    • /
    • 2005
  • To provide visitors with the various services, Many web sites distribute many ActiveX controls to them because ActiveX controls can overcome limits of HTML documents and script languages. However, PC can become dangerous if it has unsecure ActiveX controls, because they can be executed in HTML documents. Nevertheless, many web sites provide visitors with ActiveX controls whose security are not verified. Therefore, the verification is needed by third party to remove vulnerabilities in ActiveX controls. In this paper, we introduce the process and the technique to fad vulnerabilities. The existing proof codes are not valid because ActiveX controls are different from normal application and domestic environments are different from foreign environments. In this paper, we introduce the technique to prove vulnerabilities in ActiveX control.

A study on the ATC(Available Transfer Capabilily) calculation using an Energy Function Method (에너지함수법을 이용한 가용송전용량(ATC) 계산에 관한 연구)

  • Kim, Jae-Hyeon;Jeong, Sung-Won;Kim, Yong-Il
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.22 no.2
    • /
    • pp.94-100
    • /
    • 2008
  • Available transfer capability(ATC) quantifies the viable increase in real power transfer from one point to another in a power system. ATC calculation has predominantly focussed on steady-state viability. But ATC assessment with transient stability constraints has a dominant part in overall ATC calculation. ATC assessment requires a reputation of (n-1) security assessment with constraints of thermal limits, voltage stability and dynamic stability. An estimation of determinant contingency screening method is used for computing eigenvalue of Jacobian matrix. This paper proposed a methods to ATC calculation using energy function. Constraints is used thermal limits, voltage stability and transient stability.

Re-evaluation of Korean Effluent Concentration Limits and Comparative Analysis

  • Hwang, Won Tae;Lee, Joeun;Kwon, Dahye;Kim, Eun Han;Han, Moon Hee
    • Journal of Radiation Protection and Research
    • /
    • v.43 no.3
    • /
    • pp.124-129
    • /
    • 2018
  • Background: Effluent Concentration Limits (ECLs) were re-evaluated via direct calculation using dose coefficients based on radiation protection quantity introduced in Korea and the intrinsic breathing rates of Korean residents. Materials and Methods: The re-evaluated ECLs were compared with the domestic standards given in the Notice of the Nuclear Safety and Security Commission (NSSC), as well as with ECLs specified in the Code of Federal Regulations (CFR). Results and Discussion: The relative ratios of the re-evaluated ECLs to the currently applied domestic standards differed depending on the radionuclide type, but it was clearly shown that, for tritium ($^3H$) and radiocarbon ($^{14}C$), which significantly affect radiological dose to the public during the normal operation of nuclear power plants, the re-evaluated ECLs were higher than the domestic standards. This implies that Korean standards are relatively conservative. Conclusion: The re-evaluated results for each age group showed that $^{131}I$ (radioiodine), one of the significant radionuclides, had the lowest values, but nonetheless, the domestic standards for radioiodine were lower than the ECLs given in the CFR and the re-evaluated ECLs via a method given in the CFR.

A Study on the on-line Dispute Resolution for the E-Trade (전자무역의 분쟁해결방안에 관한 연구)

  • 이상옥
    • Journal of Arbitration Studies
    • /
    • v.13 no.2
    • /
    • pp.425-457
    • /
    • 2004
  • This study is to approach e-Trade issues and how to settle the dispute for e-Trade according to on-line Alternative Dispute Resolution (ADR) process. Most on-line systems operate on a limited access basis. The increasing use of the internet to do business brings to light at least important concerns to persons who engage in commerce on-line, or e-Trade. There is some concern about the limits of current internet technology to guarantee the security of e-Trade. The new technology has transformed society and is defining new years of doing business. This revolution in technology has even changed the nature of many of the goods and services that are the subjects of e-Trade. There is also concern about the limits of the legal framework to guarantee the enforcement of e-Trade. A significant issue is how the law should be adapted to reflect business practices regarding such cyberspace agreements as Web site click-on agreements, e-data interchange, and on-line sales. The principal benefits of on-line ADR should typically be faster and less expensive than traditional conciliation arbitration. The on-line ADR system has the several significances, decreasing inappropriate cost as time and burden of ADR, providing an approachable measure of relief and more efficient tool for the settle of dispute. Therefore, on-line ADR could be used as an adjunct resolution process in large class actions where each single claim is small, but varies somewhat, thus requiring some individual fact determination.

  • PDF

The Method of Analyzing Firewall Log Data using MapReduce based on NoSQL (NoSQL기반의 MapReduce를 이용한 방화벽 로그 분석 기법)

  • Choi, Bomin;Kong, Jong-Hwan;Hong, Sung-Sam;Han, Myung-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.667-677
    • /
    • 2013
  • As the firewall is a typical network security equipment, it is usually installed at most of internal/external networks and makes many packet data in/out. So analyzing the its logs stored in it can provide important and fundamental data on the network security research. However, along with development of communications technology, the speed of internet network is improved and then the amount of log data is becoming 'Massive Data' or 'BigData'. In this trend, there are limits to analyze log data using the traditional database model RDBMS. In this paper, through our Method of Analyzing Firewall log data using MapReduce based on NoSQL, we have discovered that the introducing NoSQL data base model can more effectively analyze the massive log data than the traditional one. We have demonstrated execellent performance of the NoSQL by comparing the performance of data processing with existing RDBMS. Also the proposed method is evaluated by experiments that detect the three attack patterns and shown that it is highly effective.

A study on the Smart Door System For Single Households (1인 가구를 위한 스마트 도어 시스템에 대한 연구)

  • Kim, Donghyeon;Park, Yeeun;Moon, Juhyuk;Im, Yunkyung;Ko, Dongbeom;Kim, Jungjoon;Park, Jeongmin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.267-274
    • /
    • 2018
  • This paper introduces a smart door system composed of security system and secretary system. As ratio of single households increase, the security of household became more important. Also already there were a lot of artificial intelligence secretary system based on voice called smart home technology. But It has limits. It can not work without user's requests. That mean it is not automatic. And the voice recognition depend on user's pronounce. Thus in this paper, we design and develop smart door system that is added function of security and secretary. That can inform users that there are outsider in front of their house in real time. Also that can speak information such as user's requirements, delivery and weather information using TTS. As a result they can prevent crimes and use convenient secretary system.

A Study on Cloud Computing for Financial Sector limited to Processing System of Non-Critical Information: Policy Suggestion based on US and UK's approach (비중요 정보처리시스템으로 한정된 국내 금융권 클라우드 시장 활성화를 위한 제안: 영미 사례를 중심으로)

  • Do, Hye-Ji;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.39-51
    • /
    • 2017
  • In October 2016, the NFSA (National Financial Supervisory Authorities) revised the network separation clause of the Regulation on Supervision of Electronic Financial Activities in order to promote the Cloud Computing implementation in the financial sectors. The new regulation, however, limits the Cloud Computing usage to non-critical information and its processing system. Financial institutions that provide customer data analysis and personalized services based on personal data regard current revision as unchanged as before. The implementation of Cloud Computing has greatly contributed to cost reduction, business innovation and is an essential requirement in ever-changing information communication technology environment. To guarantee both security and reliability of the implementation of the Cloud Computing in financial sectors, a considerable amount of research and debate needs to be done. This paper examines current Cloud Computing policies in the Korean financial sector and the challenges associated with it. Finally, the paper identifies policy suggestions based on both European Union and United States' approach as they have successfully introduced Cloud Computing Services for their financial sectors.

A Study of U.S. Coast Guard(USCG) (미 해안경비대(U. S. Coast Guard)의 고찰을 통한 한국 해양경찰의 제도적 개선방안)

  • Lee, Jae-Seung;Lee, Wan-Hee;Moon, Jun-Seop
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.443-467
    • /
    • 2013
  • The purpose of this study is to introduce United States Coast Guard (USCG) in order to suggest a direction to advance the system of Korea Coast Guard. After the effect of United Nations on the Law of the Sea in 1994, the world is facing with new era of maritime age with emergence of new maritime border 'Exclusive Economic Zone(EEZ)'. Along with new maritime era, Korea also has been facing with the conflicts caused from EEZ. Also, there is a increasing concern about maritime safety and security since people looking for maritime tourism and leisure sports are dramatically increasing in Korea. Moreover, national security matters are a big issue in Korea due to the several incidents occurred in the sea such as the attack on Yeon-Pyung Island and the sinking of Cheonan naval vessel. Arising concern on these issues in maritime space requires Korea Coast Guard to handle these effectively. However, the systematical and structural limitation of Korea Coast Guard limits the effective management of recent issues. The United States Coast Guard which is considered as one of the military force in the United States has continuously reformed and developed its system and structure to better handle the maritime safety and security issues through developing project such as the Integrated Deep Water system. Also, maritime police system and structure in the United States is different with in Korea. This study expects to suggest a way to advance the system and structure of Korea Coast Guard through examination of United States Coast Guard and comparing maritime police system and structure between Korea and the United States in order to properly deal with the maritime safety and security issues arising recently.

  • PDF