• Title/Summary/Keyword: Special security

Search Result 543, Processing Time 0.022 seconds

State Management of the Development of National Cybersecurity Systems

  • Kryshtanovych, Myroslav;Storozhev, Roman;Malyshev, Kostiantyn;Munko, Anna;Khokhba, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.11-16
    • /
    • 2022
  • The main purpose of the study is to determine the main elements of the state management of the development of national cybersecurity. Cybersecurity ensures the protection of the properties of information resources and the operability of technical and software users and is directed against relevant cyber incidents. Therefore, today it is impossible to ignore the importance of public administration of the processes taking place in it. The methodological support of our study is determined by its goals and objectives and is based on the use of a combination of general scientific and special methods of scientific knowledge, which ensured the completeness and reliability of the results obtained. The article has limitations and concerns the lack of practical implementation of the research results. The study is purely theoretical to reflect the main aspects of the modern system of state management of the development of national cybersecurity. Further research requires an analysis of the world experience of state management of the development of national cybersecurity.

Including P4 and AI: A Survey on SDN Security (P4 와 AI 포함된 SDN 보안 기술 동향 연구 )

  • Xiang Li;Yeonjoon Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.200-202
    • /
    • 2023
  • SDN (Software Defined Networking) is an emerging networking system which differs from traditional network architecture. Moreover SDN has many advantages and special capabilities that traditional networks do not have. SDN and P4 are related in that they can be combined to create more advanced and intelligent networking systems. Additionally, Al has emerged as a transformative force in various fields, including SDN. By applying Al and P4 to SDN, network administrators can leverage the power of them to make impact on SDN security. We offer an overview of recent trend of SDN security integrating P4 a nd Al in this study.

Secure Face Authentication Framework in Open Networks

  • Lee, Yong-Jin;Lee, Yong-Ki;Chung, Yun-Su;Moon, Ki-Young
    • ETRI Journal
    • /
    • v.32 no.6
    • /
    • pp.950-960
    • /
    • 2010
  • In response to increased security concerns, biometrics is becoming more focused on overcoming or complementing conventional knowledge and possession-based authentication. However, biometric authentication requires special care since the loss of biometric data is irrecoverable. In this paper, we present a biometric authentication framework, where several novel techniques are applied to provide security and privacy. First, a biometric template is saved in a transformed form. This makes it possible for a template to be canceled upon its loss while the original biometric information is not revealed. Second, when a user is registered with a server, a biometric template is stored in a special form, named a 'soft vault'. This technique prevents impersonation attacks even if data in a server is disclosed to an attacker. Finally, a one-time template technique is applied in order to prevent replay attacks against templates transmitted over networks. In addition, the whole scheme keeps decision equivalence with conventional face authentication, and thus it does not decrease biometric recognition performance. As a result, the proposed techniques construct a secure face authentication framework in open networks.

Image Encryption Scheme using Complemented MLCA and Special Chaos Map (여원 MLCA와 특수 혼돈 함수를 이용한 영상 암호화 기법)

  • Jeong, Hyun-Soo;Park, Kyu-Chil;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.873-880
    • /
    • 2020
  • The proposed encryption algorithm strengthens its security by converting pixel-specific values and changing pixel positions. The state transition matrix created by Wolfram's rule creates a complemented CA sequence with the maximum length. Then, we convert the sequence into a 2D basis image and go through a XOR operation with the original image. The final encrypted image is created by shear stressing and rearranging. The image stability analysis verified that the proposed encryption method has high security.

A case study on the building of integrated CCTV control center at Busan metropolitan city (부산광역시 CCTV통합관제센터구축 사례연구)

  • Kwon, Chang-Hwan;Seo, Chang-Gab
    • Journal of Digital Convergence
    • /
    • v.9 no.3
    • /
    • pp.191-202
    • /
    • 2011
  • Public agencies and local governments have been installing CCTV cameras for the prevention of crime, traffic jam, and unauthorized waste. Additionally, national government agencies and schools, a special corporation by special law, local construction and industrial company installed CCTV cameras of their own and are operating them. Various types of CCTV systems disclosed technical heterogeneity. In February, 2011, Ministry of Public Administration and Security presented guidelines for building an integrated control center. This study examines the case of Busan by using the administrative guidelines. Busan integrated CCTV control center among themselves, police agency and fire department. This study looks into the potential problems with the integration process of CCTV cameras and proposes a solution to them.

Communication with Video Games as a Process of Semiosis

  • Maletska, Mariia;Ostashchuk, Ivan;Khrypko, Svitlana;Salo, Hanna;Petryshyn, Halyna;Lobanchuk, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.37-42
    • /
    • 2022
  • Communication as a process of interpreting signs has always existed in people's life. In post-information society, the communication between a person and a technological system through the specific sign-attaching process becomes widespread. Moreover, it somehow replaces usual communication between people. One of the means of communication in the digital space are video games. They not only play an important role in communication processes, but also are a special case of sign-creating and interpreting. The purpose of the article is to examine video games as a space of sign-based communication between a person and a game as a specific digital system. With the help of general scientific and hermeneutic methodology, the analysis of video games as a post-information society phenomenon which people communicate to has been conducted. The process of semiosis as attaching special meanings to signs has been traced in both manipulating in-game objects and characters and understanding rules of an in-game world.

Special Judicial Police for Enhancing Administrative Power A Study on the Expansion of Jobs: Based on the results of 10 years' operation of Seoul Metropolitan Police Judicial Police Team (행정의 집행력 강화를 위한 특별사법경찰 직무확대에 관한 연구 - 서울특별시 민생사법경찰단 운영 10년 분석 결과를 바탕으로 -)

  • Yang, Jae Yeol;Kim, Sang Su
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.59-80
    • /
    • 2019
  • Recently, our company has entered the modern knowledge company, government policy and regulation has a big influence on people's lives. Also, unlike in the past, I am hoping for administrative intervention as a problem peculiar to the environment, such as environmental housing problems, urban transportation problems, misuse problems, etc. and corporate pending issues. In this study, through the 10th year of the Seoul Special Citizen Judicial Police Force, if the local autonomy is a special envoy, it will try to present the correctness in the organization luck. As a measure to secure the nature of administrative action, the method of investigation was through the study of the execution process of administrative penalty and its result based on the statistical data of Seoul City. Therefore, we will analyze the process and operation of the 10-year organizational change of the Seoul Metropolitan Government's police force and examine how the police force of the people's livelihoods, which is a special investigation organization, is expanding its duties in order to strengthen the enforcement power of the administration. Also, we will make future-oriented suggestions to encourage the readjustment of the current relevant laws, such as the Ministry of Patriots and Veterans Affairs, and to actively accommodate the expected changes of the special law police organization in charge of the enforcement of the police system.

Capacity-Equivocation Region of a Special Case of Wiretap Channel with Noiseless Feedback

  • Dai, Bin;Han Vinck, A.J.;Luo, Yuan;Ma, Zheng
    • Journal of Communications and Networks
    • /
    • v.17 no.1
    • /
    • pp.21-26
    • /
    • 2015
  • The general wiretap channel with noiseless feedback is first investigated by Ahlswede and Cai, where lower and upper bounds on the secrecy capacity are provided in their work. The upper bound is met with equality only in some special cases. In this paper, we study a special case of the general wiretap channel with noiseless feedback (called non-degraded wiretap channel with noiseless feedback). Inner and outer bounds on the capacity-equivocation region of this special model are provided. The outer bound is achievable if the main channel is more capable than the wiretap channel. The inner bound is constructed especially for the case that the wiretap channel is more capable than the main channel. The results of this paper are further explained via binary and Gaussian examples. Compared with the capacity results for the non-degraded wiretap channel, we find that the security is enhanced by using the noiseless feedback.

Driver's Protection Method of Ambulance Car Accident (응급구조 교통사고에 대한 운전자의 보호방안)

  • Park, Hi-Jin;Kwon, Hayrran;Lee, Young-Hyun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.4 no.1
    • /
    • pp.63-71
    • /
    • 2000
  • Exceptive clause of ambulance stated in Road Traffic Laws of ambulance car accidents is not properly applied and emergency staffs who transfer over 85% of emergency cases are to be forced to start out to the emergency field with unstable conditions which they may be punished on the criminal and civil laws. Hereby this study makes the following suggestions to activate the duties of transferring emergency cases by emergency staffs, promote their morale and diminish the victim of emergency staffs due to traffic accidents. 1) It is prescribed that ambulance car drivers should be protected legally by applying the exceptive clauses thoroughly regulated in special case clauses because ambulance cars are used for the purpose of saving the human life. 2) On the traffic accidents occurred during the transfer of emergency cases, the special insurance system is created for treating the ambulance car accidents, not to bind the emergency staff's mistake to traffic law and the victims are compensated by the nation on the basis of insurance system and emergency staffs have the systematic security. 3) On the road over six lanes, emergency lane is set on the center and ambulance car should be used as the exclusive lane. 4) Ambulance car drivers must have the habit of transferring emergency cases rapidly within the range of legal operation.

  • PDF

On the Transfer of Classified Records of the Special Records Center (특수기록관 비공개기록의 이관에 관한 연구)

  • Kwak, Kun-Hong
    • The Korean Journal of Archival Studies
    • /
    • no.42
    • /
    • pp.327-361
    • /
    • 2014
  • 'Special Records' means the records created by the government power authorities like security, investigation, intelligence agencies. Even after the enactment of the Public Records Act, these kinds of records were out of the control of the National Archives of Korea. The reason was certainly complex including the loss of control power caused by the National Archives' low status, limitation of the legislation and lack of positive measures for the transfer of classified records. But core records of the government power authorities should be transferred to the National Archives for the righteous records culture in the democracy. This paper investigates the problems concerned with the transfer of classified records of the special records center, looking for a practical alternative.