• Title/Summary/Keyword: Security threats

Search Result 1,482, Processing Time 0.022 seconds

RealTime Personal Video Image Protection on CCTV System using Intelligent IP Camera (지능형 IP 카메라를 이용한 CCTV 시스템에서의 실시간 개인 영상정보 보호)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.120-125
    • /
    • 2016
  • For the purpose of protecting personal property and lives from incidents, accidents, and threats such as terrorism, video surveillance equipment has been installed and operates in many places. Video surveillance technology has gradually developed into high-quality, high-definition equipment, and a lot of products have been launched. However, closed circuit television (CCTV) equipment for security purposes can invade a person's privacy. In this paper, we propose a way to protect personal video images using meta-data in an intelligent Internet protocol (IP) camera. We designed the system to mask personal video information from meta-data, define the method of image-information access according to user privileges, and show how to utilize the meta-data during storage and recorded data searches. The suggested system complies with guidelines for CCTV installation and operation from Korea's Ministry of the Interior. Installed on only a single server so far, due to the limitations and technical difficulties of hardware performance, it has been difficult to find a method that can be applied to personal image information using real-time protection techniques. Applying the method proposed in this paper can satisfy the guidelines, reduce server costs, and reduce system complexity.

A Study of Cyber Operation COP based on Multi-layered Visualization (멀티레이어드 시각화를 적용한 사이버작전 상황도 개발에 관한 연구)

  • Kwon, Koohyung;Kauh, Jang-hyuk;Kim, Sonyong;Kim, Jonghwa;Lee, Jaeyeon;Oh, Haengrok
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.143-151
    • /
    • 2020
  • The cyber battlefield called the fifth battlefield, is not based on geological information unlike the existing traditional battlefiels in the land, sea, air and space, and has a characteristics that all information has tightly coupled correlation to be anlayized. Because the cyber battlefield has created by the network connection of computers located on the physical battlefield, it is not completely seperated from the geolocational information but it has dependency on network topology and software's vulnerabilities. Therefore, the analysis for cyber battlefield should be provided in a form that can recognize information from multiple domains at a glance, rather than a single geographical or logical aspect. In this paper, we describe a study on the development of the cyber operation COP(Common Operational Picture), which is essential for command and control in the cyber warfare. In particular, we propose an architecure for cyber operation COP to intuitively display information based on visualization techniques applying the multi-layering concept from multiple domains that need to be correlated such as cyber assets, threats, and missions. With this proposed cyber operation COP with multi-layered visualization that helps to describe correlated information among cyber factors, we expect the commanders actually perfcrm cyber command and control in the very complex and unclear cyber battlefield.

The Return of Great Power Competition to the Arctic (북극해 일대에서 본격화되기 시작한 강대국 경쟁)

  • Hong, Kyu-dok;Song, Seongjong;Kwon, Tae-hwan;JUNG, Jaeho
    • Maritime Security
    • /
    • v.2 no.1
    • /
    • pp.151-184
    • /
    • 2021
  • Global warming due to climate change is one of the biggest challenges in the 21st century. Global warming is not only a disaster that threatens the global ecosystem but also an opportunity to reduce logistics costs and develop mineral resources by commercializing Arctic routes. The Arctic paradox, in which ecological and environmental threats and new economic opportunities coexist, is expected to have a profound impact on the global environment. As the glaciers disappear, routes through the Arctic Ocean without passing through the Suez and Panama Canals emerged as the 'third route.' This can reduce the distance of existing routes by 30%. Global warming has also brought about changes in the geopolitical paradigm. As Arctic ice begins to melt, the Arctic is no longer a 'constant' but is emerging as the largest geopolitical 'variable' in the 21st century. Accordingly, the Arctic, which was recognized as a 'space of peace and cooperation' in the post-Cold War era, is now facing a new strategic environment in which military and security aspects are emphasized. After the Cold War, the Arctic used to be a place for cooperation centered on environmental protection, but it is once again changing into a stage of competition and confrontation between superpowers, heralding 'Cold War 2.0.' The purpose of this study is to evaluate the strategic value of the Arctic Ocean from geopolitical and geoeconomic perspectives and derive strategic implications by analyzing the dynamics of the New Cold War taking place in the Arctic region.

  • PDF

New Approaches to Quality Monitoring of Higher Education in the Process of Distance Learning

  • Oseredchuk, Olga;Drachuk, Ihor;Teslenko, Valentyn;Ushnevych, Solomiia;Dushechkina, Nataliia;Kubitskyi, Serhii;Сhychuk, Antonina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.35-42
    • /
    • 2022
  • The article identifies the problem of monitoring the quality of higher education in three main areas, which are comparative pedagogical systems of education. The first direction is determined by dissertation works, the second - monographs and textbooks, and the third reveals scientific periodicals. According to its internal structure, monitoring the quality of education combines important management components identified in the article (analysis, evaluation and forecasting of processes in education; a set of methods for tracking processes in education; collecting and processing information to prepare recommendations for research processes and make necessary adjustments). Depending on the objectives, three areas of monitoring are identified: informational (involves the accumulation, structuring and dissemination of information), basic (aimed at identifying new problems and threats before they are realized at the management level), problematic (clarification of patterns, processes, hazards, those problems that are known and significant from the point of view of management). According to its internal structure, monitoring the quality of education combines the following important management components: analysis, evaluation and forecasting of processes in education; a set of techniques for tracking processes in education; collection and processing of information in order to prepare recommendations for the development of the studied processes and make the necessary adjustments. One of the priorities of the higher education modernization program during the COVID-19 pandemic is distance learning, which is possible due to the existence of information and educational technologies and communication systems, especially for effective education and its monitoring in higher education. The conditions under which the effectiveness of pedagogical support of monitoring activities in the process of distance learning is achieved are highlighted. According to the results of the survey, the problems faced by higher education seekers are revealed. A survey of students was conducted, which had a certain level of subjectivity in personal assessments, but the sample was quite representative.

Concepts and Legal Problems Related to the Health-vulnerable Class, and Measures to Ensure Health (건강취약계층의 개념과 법적 문제점, 그리고 건강보장을 위한 방안)

  • Kim, JESUN
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.3
    • /
    • pp.125-144
    • /
    • 2021
  • The purpose of this study is to present a legal improvement plan for health protection of the health-vulnerable class in our society in the 'COVID-19'. The contents of the first study examined the meaning of the existing (social) vulnerable class, and then critically considered the health-vulnerable class as an expanded concept in connection with the social risk of health. The term "vulnerable class" tends to have both meaning as the traditionally marginalized class such as the elderly, the disabled, and women, as well as the condition of having no ability to live due to low income, such as the low-income class. The concept of the health-vulnerable class is meaningful in that it appears as a recently expanded concept as it is linked to the concept of the vulnerable class and social risks such as health threats. The content of the second study looked at the problems that appeared when the health-vulnerable class was used together with the health care-vulnerable class in laws. Due to the laws used in both terms, there was a problem that the social security system related to health and health care could create blind spots. The contents of the third study suggested legal improvement directions for social security measures for health for the underprivileged.

A study on role of ROK Escort Task Gruop according to recently Pirate Conducting Trend and Anti-Piracy Operation in Indian Ocean (최근 인도양 해적활동과 대해적작전 변화에 따른 한국 청해부대 역할 연구)

  • Choi, Hyoung-Min
    • Strategy21
    • /
    • s.32
    • /
    • pp.192-221
    • /
    • 2013
  • In order to deal with the current economic crisis, the U.S. government, as a part of its austerity fiscal policy, implemented a budget sequester. The sequester will hit the U.S. defense budget the hardest, and as a result will most likely put the security of the international community in jeopardy. The U.S. will have to cut 46 billion dollars from its original 525 billon defense spending in 2013. And by the year 2022, will have to cut 486.9 billion dollars. Such an astronomical decrease in the U.S. defense spending will inevitably burden the friendly nations. According to recent studies, pirate related incidents in Somalia, where piracy is most active, has declined from its 226 incidents to 76 incidents per year in 2012, a 66% drop from previous years'. However, piracy threats as well as those related to firearms still remain and thus participants of anti-piracy operations, namely the U.S., U.K., France, Canada, NCC, EUNAVFOR, and NATO, are facing a problem of declining forces. Considering the current situation as well as rising expectations from the international community, Republic of Korea, a supporter of NCC's maritime security operation, not to mention its foremost duty of securing its sea, is at a stage to re-examine its operational picture. Such action will be a good opportunity for Republic of Korea to build the trust and live up to the international community's expectation. To quote from the network theory, although in relation to other friendly nations participating in the anti-piracy operation, Republic of Korea currently remains at a single cell level, this opportunity will certainly develop Korea to a 'node' nation in which power and information would flow into. Through this expansion of operational capability, Republic of Korea will be able to exert more influence as a more developed nation. Currently however, not only is the single 4,500 ton class destroyer deployed in Somalia a limited unit to further expand the scale and amount of force projection in the area, but also the total of six 4,500 ton class destroyers ROK feet possess is at a high fatigue degree due to standard patrolling operations, midshipman cruise and the RIMPAC exercise. ROK fleet therefore must consider expanding the number of ships deployed along with either deploying combat support ships or constructing logistics support site in the African region. Thus, by expanding its operational capabilities and furthermore by abiding to the rightful responsibilities of a middle power nation, Republic of Korea will surely earn its respect among the members of the international community.

  • PDF

Design of Authentication Mechinism for Command Message based on Double Hash Chains (이중 해시체인 기반의 명령어 메시지 인증 메커니즘 설계)

  • Park Wang Seok;Park Chang Seop
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.51-57
    • /
    • 2024
  • Although industrial control systems (ICSs) recently keep evolving with the introduction of Industrial IoT converging information technology (IT) and operational technology (OT), it also leads to a variety of threats and vulnerabilities, which was not experienced in the past ICS with no connection to the external network. Since various control command messages are sent to field devices of the ICS for the purpose of monitoring and controlling the operational processes, it is required to guarantee the message integrity as well as control center authentication. In case of the conventional message integrity codes and signature schemes based on symmetric keys and public keys, respectively, they are not suitable considering the asymmetry between the control center and field devices. Especially, compromised node attacks can be mounted against the symmetric-key-based schemes. In this paper, we propose message authentication scheme based on double hash chains constructed from cryptographic hash function without introducing other primitives, and then propose extension scheme using Merkle tree for multiple uses of the double hash chains. It is shown that the proposed scheme is much more efficient in computational complexity than other conventional schemes.

Comparative study on the role of the public sector in the health care system -Comparison of the United States and Korea in social risk situations- (의료보장 체계에서의 공공 부분의 역할 비교연구 -사회적 위험 상황 속의 미국과 한국의 비교-)

  • Kim Jong Hwi;Hyun-Seung Park
    • Industry Promotion Research
    • /
    • v.9 no.2
    • /
    • pp.95-102
    • /
    • 2024
  • This study aims to compare the role of the public sector in the U.S. and Korean medical security systems and study response measures in the social risk situation of the COVID-19 virus. The COVID-19 pandemic was a typical case of a 'disaster' that spread across the world across borders in a short period of time and caused serious social welfare losses by increasing the annual number of deaths by approximately 4% in 2020. Threats to health security, such as changes in social order, unpredictable endings, prolonged control of daily life, and deepening inequality, affected the economy, politics, and environment as a whole, and people had to experience anxiety and confusion due to mental and physical stress. Furthermore, developed countries failed to provide help to low-income countries in the face of global disasters. In this situation, the country's disaster management capacity to minimize harm and secure resilience, especially disaster response capacity in the health and medical field, is inevitably very important. Therefore, this study compares how the health insurance system, which is a system to guarantee citizens' right to life, differs from the United States, a liberal health care country, and raises the need to strengthen the role of the public sector.

A Study on Biometric Model for Information Security (정보보안을 위한 생체 인식 모델에 관한 연구)

  • Jun-Yeong Kim;Se-Hoon Jung;Chun-Bo Sim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.317-326
    • /
    • 2024
  • Biometric recognition is a technology that determines whether a person is identified by extracting information on a person's biometric and behavioral characteristics with a specific device. Cyber threats such as forgery, duplication, and hacking of biometric characteristics are increasing in the field of biometrics. In response, the security system is strengthened and complex, and it is becoming difficult for individuals to use. To this end, multiple biometric models are being studied. Existing studies have suggested feature fusion methods, but comparisons between feature fusion methods are insufficient. Therefore, in this paper, we compared and evaluated the fusion method of multiple biometric models using fingerprint, face, and iris images. VGG-16, ResNet-50, EfficientNet-B1, EfficientNet-B4, EfficientNet-B7, and Inception-v3 were used for feature extraction, and the fusion methods of 'Sensor-Level', 'Feature-Level', 'Score-Level', and 'Rank-Level' were compared and evaluated for feature fusion. As a result of the comparative evaluation, the EfficientNet-B7 model showed 98.51% accuracy and high stability in the 'Feature-Level' fusion method. However, because the EfficietnNet-B7 model is large in size, model lightweight studies are needed for biocharacteristic fusion.

A Study on Open Source Version and License Detection Tool (오픈소스 버전 및 라이선스 탐지 도구에 관한 연구)

  • Ki-Hwan Kim;Seong-Cheol Yoon;Su-Hyun Kim;Im-Yeong Lee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.7
    • /
    • pp.299-310
    • /
    • 2024
  • Software is expensive, labor-intensive, and time-consuming to develop. To solve this problem, many organizations turn to publicly available open source, but they often do so without knowing exactly what they're getting into. Older versions of open source have various security vulnerabilities, and even when newer versions are released, many users are still using them, exposing themselves to security threats. Additionally, compliance with licenses is essential when using open source, but many users overlook this, leading to copyright issues. To solve this problem, you need a tool that analyzes open source versions, vulnerabilities, and license information. Traditional Blackduck provide a wealth of open source information when you request the source code, but it's a heavy lift to build the environment. In addition, Fossology extracts the licenses of open source, but does not provide detailed information such as versions because it does not have its own database. To solve these problems, this paper proposes a version and license detection tool that identifies the open source of a user's source code by measuring the source code similarity, and then detects the version and license. The proposed method improves the accuracy of similarity over existing source code similarity measurement programs such as MOSS, and provides users with information about licenses, versions, and vulnerabilities by analyzing each file in the corresponding open source in a web-based lightweight platform environment. This solves capacity issues such as BlackDuck and the lack of open source details such as Fossology.