• Title/Summary/Keyword: information & data security

Search Result 4,597, Processing Time 0.034 seconds

Students' Expectation for Specialized Subjects Teacher's Role of Technical High School (공업계 고등학교 전문교과 교사의 역할에 대한 학생들의 기대)

  • Lee, Myung-Hun
    • 대한공업교육학회지
    • /
    • v.40 no.2
    • /
    • pp.22-43
    • /
    • 2015
  • The purpose of this study was to analyze students' expectation for specialized subjects teacher's role of technical high school. The study was carried out through questionnaire survey method. A survey questionnaire was developed by researcher to collect the information needed for the study. It consists of 15 items. 428 questionnaires were used for analysis. A chi squared test was used for data analysis. Major findings of this study were as follows: First, when specialized subjects teachers lecture major theory subject classes, students of technical high school wanted it to be according to their level. Their practical class preference differed depending on their department. For the security guidance method during practical class, students most wanted teachers constantly instructing in class. Second, students of technical high school wanted their teachers to pay attention to personality guidance during student life guidance & counseling time. They hoped that teachers would not discriminate towards wrong doings. Also students wanted career the most as a counseling topic and expected a guidance role from teachers. Third, students of technical high school wanted teachers to work hard to create a harmonious class atmosphere when managing a class. They wanted teachers to have affection for class and students. They wanted teachers making jokes easily with students to get friendly. Fourth, students of technical high school hoped 'employment and entrance higher grade school' the most as a career guidance topic. They wanted teachers to consider their aptitude when they were counseling about finding a job and wanted to learn more about job information during employment instructions.

A Study on Issues and Improvements Plan for National Safety Assessment (국가안전대진단의 문제점과 개선방안)

  • Shin, Jae-Hun;Kim, Sang-Woon
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.334-342
    • /
    • 2018
  • Purpose: The purpose of this study is to examine and improve the issues related to National Safety Inspection currently operation and reform the system for response to various disasters. Method: For the completion, this study established theoretical background using materials related to National Safety Inspection and identified the issues using the open statistical data for National Safety Inspection to suggest the improvement plans. Results: National Safety Inspection has been operating a complete large-scale inspection on risk factors in cooperation with the central government, local governments, and citizens since 2015 to remove various disaster factors neglected in people's daily lives. Operation of National Safety Inspection had positive influence in preventing major disasters. However, inefficient activity is pointed out due to issues related to cooperation with other institutes, limitation for citizen's positional role, and superficial inspection. Conclution: To solve this issue, this study proposed strengthening of communication activity with disaster institutes, strengthening of efficiency through citizen participation by type, and actualization of checklist used in National Safety Inspection.

The Mechanism of Proxy Mobile IPv4 to Minimize the Latency of Handover Using MIH Services (MIH 서비스를 활용한 Proxy Mobile IPv4의 핸드오버 지연 최소화 방안)

  • Kim, Sung-Jin;You, Heung-Ryeol;Rhee, Seuck-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.211-217
    • /
    • 2008
  • Recently, there are many efforts to support seamless mobility in 802.11 WLANs using IP Layer mobility protocols. The IP layer mobility protocols are the most efficient mechanism to guarantee the service session continuity when IP subnet is changed during handover. Even if the IP layer mobility protocols are quite efficient, the feature of the protocols that had been designed to consider only L3 layer makes it difficult to improve the performance of hand over more and more. Nowadays, to overcome this limitation of IP mobility protocols, many researchers have worked on the mobility protocols integration of different layers (e.g., L2 layer). In this paper, we propose the enhanced Proxy MIPv4 to minimize the latency of handover using MIH protocol in 802.11 WLANs. The proposed mechanism minimizes the latency of authentication by exchanging security keys between Access Routers during handover. Moreover, it also minimizes packet losses by Inter-AP Tunneling and data forwarding.

  • PDF

A Resilient Key Renewal Scheme in Wireless Sensor Networks (센서 네트워크에서 복원력을 지닌 키갱신 방안)

  • Wang, Gi-Cheol;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.103-112
    • /
    • 2010
  • In sensor networks, because sensors are deployed in an unprotected environment, they are prone to be targets of compromise attack, If the number of compromised nodes increases considerably, the key management in the network is paralyzed. In particular, compromise of Cluster Heads (CHs) in clustered sensor networks is much more threatening than that of normalsensors. Recently, rekeying schemes which update the exposed keys using the keys unknown to the compromised nodes are emerging. However, they cause some security and efficiency problems such as single group key employment in a cluster, passive eviction of compromised nodes, and excessive communication and computation overhead. In this paper, we present a proactive rekeying scheme using renewals of duster organization for clustered sensor networks. In the proposed scheme, each sensor establishes individual keys with neighbors at network boot-up time, and these keys are employed for later transmissions between sensors and their CH. By the periodic cluster reorganization, the compromised nodes are expelled from network and the individual keys employed in a cluster are changed continuously. Besides, newly elected CHs securely agree a key with sink by informing their members to sink, without exchangingany keying materials. The simulation results shows that the proposed scheme remarkably improves the confidentiality and integrity of data in spite of the increase of compromised nodes. Also, they show that the proposed scheme exploits the precious energy resource more efficiently than SHELL.

Forest Fire Monitoring System Using Satellite (위성활용 산불감시 시스템 구축)

  • Park, Beom-Sun;Cho, In-Je;Lim, Jae-Hwan;Kim, In-Bae
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.143-150
    • /
    • 2021
  • It introduces the contents of establishing a geostationary satellite-based forest fire monitoring system that can monitor areas of the Korean Peninsula 24 hours a day for forest fire monitoring, and describes how to establish a forest fire monitoring system and use it in various ways. In order to establish a satellite-utilized forest fire monitoring system, we will describe and draw conclusions on literature research, technical principles, forest fire monitoring means, and satellite forest fire monitoring system. The satellite-utilized forest fire monitoring system can consist of one geostationary satellite equipped with infrared detection optical sensors and a ground processing station that processes data received from satellites to spread surveillance information. Forest fire monitoring satellites are located in the country's geostationary orbit and should be operated 24 hours a day, 365 days a day. Forest fire monitoring technology is an infrared detection technology that can be used in national public interests such as forest fire monitoring and national security. It should be operated 24 hours a day, and to satisfy this, it is efficient to establish a geostationary satellite-based forest fire monitoring satellite system.

A Study on the Research Trends for Smart City using Topic Modeling (토픽 모델링을 활용한 스마트시티 연구동향 분석)

  • Park, Keon Chul;Lee, Chi Hyung
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.119-128
    • /
    • 2019
  • This study aims to analyze the research trends on Smart City and to present implications to policy maker, industry professional, and researcher. Cities around globe have undergone the rapid progress in urbanization and the consequent dramatic increase in urban dwellings over the past few decades, and faced many urban problems in such areas as transportation, environment and housing. Cities around the globe are in a hurry to introduce Smart City to pursue a common goal of solving these urban problems and improving the quality of their lives. However, various conceptual approaches to smart city are causing uncertainty in setting policy goals and establishing direction for implementation. The study collected 11,527 papers titled "Smart City(cities)" from the Scopus DB and Springer DB, and then analyze research status, topic, trends based on abstracts and publication date(year) information using the LDA based Topic Modeling approaches. Research topics are classified into three categories(Services, Technologies, and User Perspective) and eight regarding topics. Out of eight topics, citizen-driven innovation is the most frequently referred. Additional topic network analysis reveals that data and privacy/security are the most prevailing topics affecting others. This study is expected to helps understand the trends of Smart City researches and predict the future researches.

Monthly Water Balance Analysis of Hwanggang Dam Reservoir for Imjin river in Border Area using Optical Satellite (광학위성을 활용한 임진강 접경지역 황강댐 저수지의 월단위 물수지 분석)

  • KIM, Jin-Gyeom;KANG, Boo-Sik;YU, Wan-Sik;HWANG, Eui-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.4
    • /
    • pp.194-208
    • /
    • 2021
  • The Hwanggang Dam in North Korea is located upstream of the Imjin River which is a shared river in the border area. It is known to have a reservoir capacity of 350 million cubic meters and releases a discharge primarily for generating hydroelectric power and partly for transferring to the Yesung River basin. Due to the supply of water from the Hwanggang Dam to another basin, the flow of the Imjin River has decreased, which has a negative impact on the water supply, river maintenance flow, water quality, and ecological environment in Korea. However, due to the special national security issue of the South and North Korea border region, the hydrological data is not shared, and the operation method of the Hwanggang Dam is unknown, so there is a risk of damage to the southern part of the downstream area. In this study, the monthly diversion as the long-term runoff concept was derived through the calibrated hydrological model based on optical remotely sensed Images and water balance analysis. As a result of the water balance analysis from January 2019 to September 2021, the average diversion of the Hwanggang Dam was 29.2m3/s, which is equivalent to 922 million tons per year and 45.6% of the annual inflow of 2.02 million tons into the Hwanggang Dam.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.

Convergence Plan of IT Social Safety and SIB by Expanding Sharing Information Data (공유정보 데이터 확대로 인한 IT와 SIB의 사회인식)

  • Seo, DaeSung;Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.97-105
    • /
    • 2022
  • This study deals with the credibility of citizens when investing in uncertain project companies, as well as the Social Performance Compensation Project (SIB) and the IT sharing economy. This allows the convergence of the three sectors to address investment inequalities in economic effectiveness and social security. Activates the model of the overall Social Impact Bond (SIB) process that successfully activates the exchange of information. The empirical presentation of the operations and techniques for social IT service finance examines how the innovation ecosystem can be created with social performance and reward projects. The analysis shows that small sharing institutions or citizens can participate directly to create the ability to connect with private investors, identify the possibility of recognizing non-shared barriers to participation, and show the great impact of citizen trust in IT sharing projects in uncertain areas. As a result, for the sake of social sharing and IT cooperation promoted by the City of Seoul, before the project has the ability to design directly, it will be responsible for reliability and safety in the planning of the project. Therefore, non-shared citizens can also participate in the platform that has been effectively constructed and created.

A Study on the AI Home Care Solution for the Mobile Vulnerable (이동약자를 위한 AI 홈케어 솔루션에 관한 연구)

  • ChangBae Noh;Wonshik Na
    • Journal of Industrial Convergence
    • /
    • v.21 no.4
    • /
    • pp.165-170
    • /
    • 2023
  • There are cases where the mobility impaired have difficulty moving from the moment they leave the house. If guardians also do not have time to entrust their families, who are socially disadvantaged, to a shelter, the guardian has no choice but to check directly in order to know the location of the guardian. The AI home care solution was designed to relieve the anxiety and labor of caregivers and to provide convenience for protection facility officials and users. If more facilities distribute and use services free of charge to non-profit foundations and protective facilities, the concern of guardians will be reduced, and the burden of facility officials who have to manage facility users will be reduced. In this paper, we provide emergency notification services to guardians in the event of an emergency as well as location and status alarms for guardians, which are all data related to movement, in consideration of the mobility vulnerable. Furthermore, it is necessary to provide a service function that recommends the optimal route using a navigation function to ease the convenience and burden of facility officials. It is necessary to alleviate anxiety by providing necessary information to the guardian, such as the location of the shuttle used by the mobile weak and the time of getting on and off. In addition, while providing services for free, the goal is to improve the quality of service for facility managers and the quality of service for the mobility weak.