• Title/Summary/Keyword: Vulnerability Information Management

Search Result 304, Processing Time 0.027 seconds

Network security and legal protection of the Criminal (네트워크보안의 형사법적 보호)

  • Kim, Hyung-Man
    • Journal of Digital Convergence
    • /
    • v.9 no.3
    • /
    • pp.11-19
    • /
    • 2011
  • The spread of computer and network gets various social and economic activities done quickly and efficiently. As a result, it makes a crime using network easy and increases the vulnerability of a social system. As there is a crime as a social being, we need to give careful consideration to the crime occurring in virtual space. Accordingly, the purpose of this paper is to investigate the regulatory need of the Criminal Procedure concerning the network security issues as the new legal and regulatory space that begins to be realized from the late of 20th century because of the extent of social threat. Above all, we addresses whether the amendment of existing legal regulations is necessary, based on the special characteristics of the virtual space.

Big Data Processing Scheme of Distribution Environment (분산환경에서 빅 데이터 처리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.311-316
    • /
    • 2014
  • Social network server due to the popularity of smart phones, and data stored in a big usable access data services are increasing. Big Data Big Data processing technology is one of the most important technologies in the service, but a solution to this minor security state. In this paper, the data services provided by the big -sized data is distributed using a double hash user to easily access to data of multiple distributed hash chain based data processing technique is proposed. The proposed method is a kind of big data data, a function, characteristics of the hash chain tied to a high-throughput data are supported. Further, the token and the data node to an eavesdropper that occurs when the security vulnerability to the data attribute information to the connection information by utilizing hash chain of big data access control in a distributed processing.

Utilization and Excavation Practices of Fire-Fighting Vulnerable Zone Model (소방취약지 모델의 활용 및 적용사례 발굴)

  • Choi, Gap Yong;Chang, Eun Mi;Kim, Seong Gon;Cho, Kwang-Hyun
    • Spatial Information Research
    • /
    • v.22 no.3
    • /
    • pp.79-87
    • /
    • 2014
  • In order to foster rapid disaster response and public life protection, National Emergency Management Agency has been trying to spread 'Emergency Rescue Standard System' on a national scale since 2006. The agency has also intensified management of firefighter's safety on disaster site by implementing danger predication training, specialized training and education and safety procedure check as a part of safety management officer duties. Nevertheless, there are limitations for effective fire fighting steps, such as damage spreading and life damage due to unawareness of illegal converted structure, structure transformation by high temperature and nearby hazardous material storage as well as extemporary situation handling endangered firefighter's life. In order to eliminate these limitations there is a need for an effort and technology application to minimize human errors such as inaccurate situational awareness, wrong decision built on experience and judgment of field commander and firefighters. The purpose of this study is to propose a new disaster response model which is applied with geospatial information. we executed spatial contextual awareness map analysis using fire-fighting vulnerable zone model to propose the new disaster response model and also examined a case study for Dalseo-gu in Daegu Metropolitan City. Finally, we also suggested operational concept of new proposed model on a national scale.

Vulnerability Assessment for Fine Particulate Matter (PM2.5) in the Schools of the Seoul Metropolitan Area, Korea: Part I - Predicting Daily PM2.5 Concentrations (인공지능을 이용한 수도권 학교 미세먼지 취약성 평가: Part I - 미세먼지 예측 모델링)

  • Son, Sanghun;Kim, Jinsoo
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.6_2
    • /
    • pp.1881-1890
    • /
    • 2021
  • Particulate matter (PM) affects the human, ecosystems, and weather. Motorized vehicles and combustion generate fine particulate matter (PM2.5), which can contain toxic substances and, therefore, requires systematic management. Consequently, it is important to monitor and predict PM2.5 concentrations, especially in large cities with dense populations and infrastructures. This study aimed to predict PM2.5 concentrations in large cities using meteorological and chemical variables as well as satellite-based aerosol optical depth. For PM2.5 concentrations prediction, a random forest (RF) model showing excellent performance in PM concentrations prediction among machine learning models was selected. Based on the performance indicators R2, RMSE, MAE, and MAPE with training accuracies of 0.97, 3.09, 2.18, and 13.31 and testing accuracies of 0.82, 6.03, 4.36, and 25.79 for R2, RMSE, MAE, and MAPE, respectively. The variables used in this study showed high correlation to PM2.5 concentrations. Therefore, we conclude that these variables can be used in a random forest model to generate reliable PM2.5 concentrations predictions, which can then be used to assess the vulnerability of schools to PM2.5.

Enhanced Security Measurement of Web Application Testing by Outsourcing (외주 개발 웹 어플리케이션 테스팅의 보안성 강화 방안)

  • Choi, Kyong-Ho;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.3-9
    • /
    • 2015
  • A web application that allows a web service created by a internal developer who has security awareness show certain level of security. However, in the case of development by outsourcing, it is inevitable to implement the development centered on requested function rather than the issue of security. Thus in this paper, we improve the software testing process focusing on security for exclusion the leakage of important information and using an unauthorized service that results from the use of the vulnerable web application. The proposed model is able to consider security in the initial stage of development even when outsourced web application, especially, It can prevent the development schedule delay caused by the occurrence of modification for program created by programer who has low security awareness. This result shows that this model can be applied to the national defense area for increasing demand web application centered resource management system to be able to prevent service of web application with security vulnerability based on high test.

Practices of Sustainable Agriculture in Korea With References for the Development of Sustainable Rice Production Systems (한반도에서 지속농업의 실천방안 지속적 벼 생산체계 개발을 중심으로)

  • Choe Zhin Ryong;Kim Jeong Bu;Cho Yong Son
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 1998.10a
    • /
    • pp.288-312
    • /
    • 1998
  • In Korea, chemical fertilizers and agricultural chemicals have had a significant impact on food production and these are today thought to be an indispensable part of modern agriculture. On the other hand, socioeconomical and IMF and WTO status in Korea are constant reminders of the vulnerability of our fossil fuel dependent agriculture. A new crop production system to improve economic, environmental and production efficiency must be exploited. Our particular concern has been given to an integrated cropping system involving recycling of crop residues, soil and N management, biological N fixation and multipurpose legumes. As a new integrated crop production system, a no-till direct-sown rice-vetch relaying cropping system has been proposed in this paper. The formulation of this system is based on the conception that N fertilizers being neither limitlessly available nor affordable, the current high-input crop production systems have produced troubled results severe labour shortage ill rural areas, balance of payment, environmental degradation and reduction of human health far exceed economic concerns. A natural and logical consequence is that long-term sustainability of agricultural systems must rely on the use and effective management of internal resources. Based on the information obtained throughout a series of experiments last years we have proved that the no-till direct-sown rice-vetch relaying cropping system dictates biological alternative which can augment, and in some cases replace, N fertilizers. Comprehensive discussions were made for the proposed system and it concluded that the system can offer an economically attractive and ecologically sound means of reducing external nitrogen input and improving the quality and quantity of internal resources, and consequently improving the farmers as well as the national returns.

  • PDF

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

Development and application of Smart Water Cities global standards and certification schemes based on Key Performance Indicators

  • Lea Dasallas;Jung Hwan Lee;Su Hyung Jang
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.183-183
    • /
    • 2023
  • Smart water cities (SWC) are urban municipalities that utilizes modern innovations in managing and preserving the urban water cycle in the city; with the purpose of securing sustainability and improving the quality of life of the urban population. Understanding the different urban water characteristics and management strategies of cities situate a baseline in the development of evaluation scheme in determining whether the city is smart and sustainable. This research herein aims to develop measurements and evaluation for SWC Key Performance Indicators (KPIs), and set up a unified global standard and certification scheme. The assessment for SWC is performed in technical, as well as governance and prospective aspects. KPI measurements under Technical Pillar assess the cities' use of technologies in providing sufficient water supply, monitoring water quality, strengthening disaster resilience, minimizing hazard vulnerability, and maintaining and protecting the urban water ecosystem. Governance and Prospective Pillar on the other hand, evaluates the social, economic and administrative systems set in place to manage the water resources, delivering water services to different levels of society. The performance assessment is composed of a variety of procedures performed in a quantitative and qualitative manner, such as computations through established equations, interviews with authorities in charge, field survey inspections, etc. The developed SWC KPI measurements are used to evaluate the urban water management practices for Busan Eco Delta city, a Semulmeori waterfront area in Gangseo district, Busan. The evaluation and scoring process was presented and established, serving as the basis for the application of the smart water city certification all over the world. The established guideline will be used to analyze future cities, providing integrated and comprehensive information on the status of their urban water cycle, gathering new techniques and proposing solutions for smarter measures.

  • PDF

An Analysis on the Rural Research Trends using Topic Modeling (토픽모델링을 활용한 농촌연구 동향분석)

  • Kim, Gaeun;Jeong, yookyung;Lim, Yeonghun
    • Journal of Korean Society of Rural Planning
    • /
    • v.29 no.4
    • /
    • pp.81-92
    • /
    • 2023
  • The purpose of this study is to identify rural research topics, differences in research topics over time, and key mediators through the analysis of academic research trends using topic modeling. This study analyzed a total of 1,183 articles published in the Journal of Rural Planning and Rural Society over a 23-year period (2000-2022). We categorized rural research topics into 30, examined the proportion of research in each topic, and identified major changes in research topics over time. We also identified key words that mediate between research topics. The study found that, first, rural research trends can be categorized into five types (resources and utilization, area/space, people, ecosystem/environment, and tourism), with area/space being the most studied. Subtopics include rural amenities, rural disappearance/village miniaturization, and rural landscape management. Second, the research topics for each period were different. In the first period(2003-2007), the main research topics were rural amenities and Agricultural production- based climate vulnerability assessment. In the second period(2008-2012), the main research topics were Rural extinction and village depopulation, and rural landscape management, and in the third period(2013-2017), the main research topics were rural sixth industrialization and rural ecotourism. In the fourth period(2018-2022), rural development planning and rural life services(life SOC) were the main research topics. The significance of this study is that it extends the existing method of analyzing research trends and provides basic data to enhance comprehensive insights and understanding of rural research.

Authing Service of Platform: Tradeoff between Information Security and Convenience (플랫폼의 소셜로그인 서비스(Authing Service): 보안과 편의 사이의 적절성)

  • Eun Sol Yoo;Byung Cho Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.137-158
    • /
    • 2018
  • Online platforms recently expanded their connectivity through an authing service. The growth of authing services enabled consumers to enjoy easy log in access without exerting extra effort. However, multiple points of access increases the security vulnerability of platform ecosystems. Despite the importance of balancing authing service and security, only a few studies examined platform connectivity. This study examines the optimal level of authing service of a platform and how authing strategies impact participants in a platform ecosystem. We used a game-theoretic approach to analyze security problems associated with authing services provided by online platforms for consumers and other linked platforms. The main findings are as follows: 1) the decreased expected loss of consumers will increase the number of players who participate in the platform; 2) linked platforms offer strong benefits from consumers involved in an authing service; 3) the main platform will increase its effort level, which includes security cost and checking of linked platform's security if the expected loss of the consumers is low. Our study contributes to the literature on the relationship between technology convenience and security risk and provides guidelines on authing strategies to platform managers.