• 제목/요약/키워드: Security technologies

검색결과 1,856건 처리시간 0.026초

APPLICATION OF PROJECT MANAGEMENT: LEAN TECHNOLOGIES AND SAVING MANUFACTURING (ASPECTS OF MANAGEMENT AND PUBLIC ADMINISTRATION)

  • Kulinich, Tetiana;Berezina, Liudmyla;Bahan, Nadiia;Vashchenko, Iryna;Huriievska, Valentyna
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.57-68
    • /
    • 2021
  • Successfully adapting to digital and customer-oriented transformation, the concept of lean manufacturing professes the philosophy of creating greater benefit while minimizing losses. These losses are operations that do not add value in the production process to ensure the efficiency, flexibility, and profitability of projects. In the context of broad automation and digitalization of all sectors of the economy, mechanisms for combining automation technologies and lean production are becoming available. Moreover, when it comes to the efficient use of financial, human, or material resources, it is clear that the use of Industry 4.0 technologies can be an effective tool for achieving the goals of lean production, as many of them pursue the same goal. In this context, this article aims to study the effectiveness of the implementation of project management concepts at the global level and identify the main factors influencing its effectiveness to ensure the achievement of lean production through LEAN technologies and Industry 4.0 technologies. To achieve this goal, several statistical indicators were selected and several statistical methods of analysis were used: pairwise correlation, regression analysis, methods of comparison, synthesis, and generalization. Statistical analysis was conducted according to a survey conducted by the Project Management Institute (PMI) in 2020. An economic-mathematical model of dependence of project effectiveness in different regions of the world on the level of implementation of project management approaches is built, which shows that the increase in project effectiveness by 85% is due to financial losses, technical training, and consumer orientation. These results allow project managers to develop appropriate strategies to improve project management approaches at all levels. It is established that LEAN technologies and technologies of Industry 4.0 have several tools that have a positive effect on minimizing losses following the concept of lean production. Besides, given that the technology of Industry 4.0 is focused on the automation of Lean Production technology, a mechanism for the introduction of lean production using these technologies and methods.

Application of Information Technologies to Improve the Quality of Services Provided to the Tourism Industry Under the COVID-19 Restrictions

  • Iudina, Elena Vladimirovna;Balova, Suzana L.;Maksimov, Dmitrij Vasilievich;Skoromets, Elena Klimentinovna;Ponyaeva, Tatyana Anatolyevna;Ksenofontova, Ekaterina Andreevna
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.7-12
    • /
    • 2022
  • The modern stage of society's development is characterized by the rapid penetration of information technologies into all spheres of life. Their use contributes to improving the quality of tourism services, as well as the competitiveness of tourism industry enterprises. The role of information technology in tourism is growing more and more every year, which determines the relevance of the study of modern trends in the use of information technology in the tourism sector. The purpose of the study is to determine the possibilities of using information technologies to improve the quality of services provided to the tourism industry under the COVID-19 restrictions. The article systematizes the main approaches to the "cluster" category and provides an original definition of the "regional tourist cluster" concept. Based on an expert survey, the main trends in the introduction of information technologies in the tourism industry under the COVID-19 restrictions have been identified, which include virtual reality and augmented reality, speech recognition technologies, photo, video, audio (contactless control technologies), mobile IT applications and Big Data technologies. It has been concluded that the vast majority of improvements in the organization of tourism services under restrictions will be based on the organization of virtual solutions and online activities. The types of tourism services will also change, and information technology will help their development and dissemination.

정보보호 대책 수준을 고려한 정보보호 투자 최적화: 유전자 알고리즘 접근법 (Optimization of Information Security Investment Considering the Level of Information Security Countermeasure: Genetic Algorithm Approach)

  • 임정현;김태성
    • 한국IT서비스학회지
    • /
    • 제18권5호
    • /
    • pp.155-164
    • /
    • 2019
  • With the emergence of new ICT technologies, information security threats are becoming more advanced, intelligent, and diverse. Even though the awareness of the importance of information security increases, the information security budget is not enough because of the lack of effectiveness measurement of the information security investment. Therefore, it is necessary to optimize the information security investment in each business environment to minimize the cost of operating the information security countermeasures and mitigate the damages occurred from the information security breaches. In this paper, using genetic algorithms we propose an investment optimization model for information security countermeasures with the limited budget. The optimal information security countermeasures were derived based on the actual information security investment status of SMEs. The optimal solution supports the decision on the appropriate investment level for each information security countermeasures.

유비쿼터스 컴퓨팅 환경에서 이기종 네트워크간 안전한 키 관리 기술에 관한 연구 (A Study on Secure Key Management Technology between Heterogeneous Networks in Ubiquitous Computing Environment)

  • 문종식;이임영
    • 한국멀티미디어학회논문지
    • /
    • 제11권4호
    • /
    • pp.504-515
    • /
    • 2008
  • 유선 네트워크의 빠른 전송속도 및 다양한 서비스와 무선의 편리성 및 이동성이 결합되어 새로운 서비스 영역을 창출하고 사용자와 서비스 제공자 모두에게 새로운 변화를 가져올 신기술로 유/무선 통합 시대가 전개되고 있다. 유/무선 통합 서비스 중에서 네트워크의 통합은 이기종 네트워크간 연동에 의한 네트워크 융합과 네트워크상에서 전송기술간 융합으로써 매주 중요한 부분을 차지하고 있다. 이러한 상황 속에서 이기종 네트워크의 융합은 서로 다른 네트워크의 융합으로 인해 기존의 보안 기술 및 통신 기술을 그대로 적용하기가 매우 어려우며, 보안 측면에서도 많은 취약점을 내포하고 있다. 기존의 동종 네트워크에서 사용자의 인증 및 키 관리와는 다르게 이기종 네트워크간의 사용자 인증 및 키 관리는 새로운 기술이 필요한 실정이며 또한 동종 네트워크에서 이기종 디바이스간의 보안 기술 확립은 매우 중요한 사항이라 할 수 있다. 본 논문에서는 이기종 네트워크 환경에서의 안전하고 효율적인 키 관리를 제안하여, 이기종 네트워크 디바이스간의 안전한 통신을 제공 할 수 있다.

  • PDF

VOIP 보안 게이트웨이에 관한 연구 (A Study of VoIP Secure Gateway)

  • 박대우
    • 한국컴퓨터정보학회논문지
    • /
    • 제10권5호
    • /
    • pp.237-244
    • /
    • 2005
  • VoIP 기술을 사용하는 IP 인터넷 전화 통신 서비스에서 기업형 IP-PBX서비스와 개인형 IP 인터넷 전화서비스의 상호운영은 방화벽에 막혀 통신이 원활하지 못했다. 본 논문에서는 VoIP보안 게이트웨이를 이용하여 통신 및 보안을 수행하는 방안으로 방화벽에 VPN전용 터널 개설, 애플리케이션 레벨의 게이트웨이 사용, VoIP보안 게이트웨이 설정 연결, IP 인터넷 전화 프로토콜로의 변환을 제안한다. 이를 통해 IP 인터넷 전화 프로토콜과 기업형 IP-PBX 서비스가 방화벽을 지나 개인형 IP 인터넷 전화서비스와 상호 운영될 수 있도록 하는VoIP보안 게이트웨이의 통신 기술에 대한 제안을 한다. 또한 VoIP보안 게이트웨이의 보안성에 대한 문제점과 해결점을 제시한다.

  • PDF

입법 발의안을 통한 대한민국 국회의원 네트워크 분석 (Network Analysis of Korean legislators using Bipartite Network Projection)

  • 이지연;조현주;윤지원
    • 인터넷정보학회논문지
    • /
    • 제15권4호
    • /
    • pp.103-110
    • /
    • 2014
  • 본 연구는 국회의원 구성에 있어서 큰 변화를 갖는 17대 국회의 입법발의 결과를 토대로 국회의원 네트워크 분석을 하였다. 각 개별 국회의원들의 입법활동을 넘어서 전체 입법활동에서 국회의원간 협업관계를 파악하고자 하였다. 17대 국회에서 국회의원들이 제출한 대표발의안 총 5728건을 수집하여 국회의원간 이원모드 네트워크를 프로젝션을 통해 분석하였다. 입법발의안을 매개로 국회의원 간의 네트워크 분석을 결과, 입법과정에서 영향력이 큰 국회의원은 물론 여당과 야당의 입법발의 과정에서의 다른 정당의 국회의원들과의 협업관계의 양상이 다름을 알 수 있다.

Efficient Masked Implementation for SEED Based on Combined Masking

  • Kim, Hee-Seok;Cho, Young-In;Choi, Doo-Ho;Han, Dong-Guk;Hong, Seok-Hie
    • ETRI Journal
    • /
    • 제33권2호
    • /
    • pp.267-274
    • /
    • 2011
  • This paper proposes an efficient masking method for the block cipher SEED that is standardized in Korea. The nonlinear parts of SEED consist of two S-boxes and modular additions. However, the masked version of these nonlinear parts requires excessive RAM usage and a large number of operations. Protecting SEED by the general masking method requires 512 bytes of RAM corresponding to masked S-boxes and a large number of operations corresponding to the masked addition. This paper proposes a new-style masked S-box which can reduce the amount of operations of the masking addition process as well as the RAM usage. The proposed masked SEED, equipped with the new-style masked S-box, reduces the RAM requirements to 288 bytes, and it also reduces the processing time by 38% compared with the masked SEED using the general masked S-box. The proposed method also applies to other block ciphers with the same nonlinear operations.

무선센서 네트워크를 위한 효율적인 키 관리 연구 (An Efficient Key management for Wireless Sensor Network)

  • 박성곤
    • 디지털콘텐츠학회 논문지
    • /
    • 제13권1호
    • /
    • pp.129-139
    • /
    • 2012
  • 최근 소형화, 저가격, 저전력 기술의 발달에 힘입어 무선 통신이 가능한 스마트 센서 기술이 발전하고 있다. 특히 스마트 센서의 소형화 기술인 MEMS (micro-electro-mechanical system) 및 NEMS(nano-electro mechanical system) 기반의 센서 기술을 바탕으로 무선 센서 네트워크에 대한 연구가 활발하게 진행되고 있다. 그러나 무선 센서 네트워크는 각종 물리적 자원에 대한 제약이 심하기 때문에 네트워크 보안을 유지하기 어렵다. 본 논문에서는 무선 센서 네트워크 환경에서 제한된 자원으로 안전한 키 확립하는 방법과 센싱된 정보의 암호화를 위해 사용할 수 있는 키 관리 메커니즘 및 키 관리 프로토콜, 보안 기술을 위한 제안한다.

활용성 강화 데이터 프라이버시 보호 기술 동향 (Trends in Data Privacy Protection Technologies with Enhanced Utilization)

  • 김주영;조남수;장구영
    • 전자통신동향분석
    • /
    • 제35권6호
    • /
    • pp.88-96
    • /
    • 2020
  • As the usability and value of personal information increase, the importance of privacy protection has increased. In Korea, the scope of the use of pseudonymized personal information has increased because of revisions to the law. In the past, security technologies were used to safely store and manage personal information, but now, security technologies focused on usability are needed to safely use personal information. In this paper, we look at issues related to the de-identification and re-identification of personal information. Moreover, we examine the standards and techniques related to the de-identification of personal information.

Implementation of Advanced IP Network Technology for IPTV Service

  • Joo, Young-Do
    • Journal of Information Processing Systems
    • /
    • 제5권1호
    • /
    • pp.25-32
    • /
    • 2009
  • It is absolutely essential to implement advanced IP network technologies such as QoS, Multicast, High Availability, and Security in order to provide real-time services like IPTV via IP backbone network. In reality, the existing commercial networks of internet service providers are subject to certain technical difficulties and limitations in embodying those technologies. On-going research efforts involve the experimental engineering works and implementation experience to trigger IPTV service on the premium-level IP backbone which has recently been developed. This paper introduces the core network technologies that will enable the deployment of a high-quality IPTV service, and then proposes a suitable methodology for application and deployment policies on each technology to lead the establishment and globalization of the IPTV service.