• Title/Summary/Keyword: information assets

Search Result 877, Processing Time 0.034 seconds

Analysis of the Security Requirements of the Chatbot Service Implementation Model (챗봇서비스 구현 모델의 보안요구사항 분석)

  • Kyu-min Cho;Jae-il Lee;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.167-176
    • /
    • 2024
  • Chatbot services are used in various fields in connection with AI services. Security research on AI is also in its infancy, but research on practical security in the service implementation stage using it is more insufficient. This paper analyzes the security requirements for chatbot services linked to AI services. First, the paper analyzes the recently published papers and articles on AI security. A general implementation model is established by investigating chatbot services provided in the market. The implementation model includes five components including a chatbot management system and an AI engine Based on the established model, the protection assets and threats specialized in Chatbot services are summarized. Threats are organized around threats specialized in chatbot services through a survey of chatbot service managers in operation. Ten major threats were drawn. It derived the necessary security areas to cope with the organized threats and analyzed the necessary security requirements for each area. This will be used as a security evaluation criterion in the process of reviewing and improving the security level of chatbot service.

A Digital Forensic Framework Design for Joined Heterogeneous Cloud Computing Environment

  • Zayyanu Umar;Deborah U. Ebem;Francis S. Bakpo;Modesta Ezema
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.207-215
    • /
    • 2024
  • Cloud computing is now used by most companies, business centres and academic institutions to embrace new computer technology. Cloud Service Providers (CSPs) are limited to certain services, missing some of the assets requested by their customers, it means that different clouds need to interconnect to share resources and interoperate between them. The clouds may be interconnected in different characteristics and systems, and the network may be vulnerable to volatility or interference. While information technology and cloud computing are also advancing to accommodate the growing worldwide application, criminals use cyberspace to perform cybercrimes. Cloud services deployment is becoming highly prone to threats and intrusions. The unauthorised access or destruction of records yields significant catastrophic losses to organisations or agencies. Human intervention and Physical devices are not enough for protection and monitoring of cloud services; therefore, there is a need for more efficient design for cyber defence that is adaptable, flexible, robust and able to detect dangerous cybercrime such as a Denial of Service (DOS) and Distributed Denial of Service (DDOS) in heterogeneous cloud computing platforms and make essential real-time decisions for forensic investigation. This paper aims to develop a framework for digital forensic for the detection of cybercrime in a joined heterogeneous cloud setup. We developed a Digital Forensics model in this paper that can function in heterogeneous joint clouds. We used Unified Modeling Language (UML) specifically activity diagram in designing the proposed framework, then for deployment, we used an architectural modelling system in developing a framework. We developed an activity diagram that can accommodate the variability and complexities of the clouds when handling inter-cloud resources.

Conceptual Design of Damage Assessment Inventory in Response to Disaster Risk for Infrastructures Close to River (수변구조물 재해 위험에 대응하기 위한 피해 평가 인벤토리 개념 설계)

  • Jo, Yun-Won;Choi, Hyeoung-Wook;Choi, Soo-Young;Jo, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.17 no.1
    • /
    • pp.144-158
    • /
    • 2014
  • This research presented a conceptual design of damage assessment inventory for efficient response to natural disaster damage of infrastructure close to the river. It consists of classification and categorization of facilities for accomplishing the conceptual design of inventory for damage of infrastructure close to the river. However, there are arising problems of efficient management on disaster, such as poor management of data facilities and constructions which is managed by the different types of government departments. Therefore, this research presented conceptual models of damage assessment inventory on risks of damage infrastructure close to the river using the United states' HAZUS-MH to analyze damage facilities, type of asset classification, classification of domestic facilities and guidelines for computing the value of assets. Conceptual models of inventory this research presented is to be used on the data for damage response on protected inland damage assessment and to increase efficiency for evaluating detailed damage amount of private property by natural disaster and to establish a restoration plan.

Ontology-based Context-aware Framework for Battlefield Surveillance Sensor Network System (전장감시 센서네트워크시스템을 위한 온톨로지 기반 상황인식 프레임워크)

  • Shon, Ho-Sun;Park, Seong-Seung;Jeon, Seo-In;Ryu, Keun-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.4
    • /
    • pp.9-20
    • /
    • 2011
  • Future warfare paradigm is changing to network-centric warfare and effects-based operations. In order to find first and strike the enemy in the battlefield, friendly unit requires real-time target acquisition, intelligence collection, accurate situation assessment, and timely decision. The rapid development in advanced sensor technology and wireless networks requires a significant change in operational concepts of the battlefield surveillance. In particular, the introduction of a battlefield surveillance sensor network system is a big challenge to the ground forces which have lack of automated information collection assets. Therefore this paper proposes an ontology-based context-aware framework for the battlefield surveillance sensor network system which is needed for early finding the enemy and visualizing the battlefield in the ground force operations. Compared with the performance of existing systems, the one of the proposed framework has shown highly positive results by applying the context systems evaluation method. The framework has also proven to be satisfactory by the structured evaluation method using device collaboration. Since the proposed ontology-based context-aware framework has a lot of advantages in terms of scalability and reusability, the ground force's reconnaissance and surveillance system can be widely applied to expand in the future. And, ontology-based model has some weak points such as ontology data size, processing time, and limitation of network bandwidth. However, these problems can be resolved by customizing properly to fit the mission and characteristics of the unit. Moreover, development of the next-generation communication infrastructure can expedite the intelligent surveillance and reconnaissance service and may be expected to contribute greatly to expanding the information capacity.

A Stability Verification of Backup System for Disaster Recovery (재해 복구를 위한 백업 시스템의 안정성 검증)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.205-214
    • /
    • 2012
  • The main thing that IT operation managers consider is protecting assets of corporation from system failure and disaster. Therefore, this research proposed a backup system for a disaster recovery. Previous backup method is that if database update occurs, this record is saved in redo log, and if the size of record file is over than expected, this file is saved in archive log in order. Thus, it is possible to occur errors of data loss from the process of data backup which change in real time while changes of database occur. Suggested backup system is back redo log up to database of transaction log in real time, and back a record that can be omitted from previous backup method up to archive log. When recover the data, it is possible to recover redo log in real time online, and it minimizes data loss. Also, throughout multi thread processing method data recovery is performed and it is designed that system performance is improved. To verify stability of backup system CPN(Coloured Petri Net) is introduced, and each step of backup system is displayed in diagram form, and th e stability is verified based on the definition and theorem of CPN.

Impact of Information and Communication Technologies on Spatial Structure (정보화와 정보기술이 공간구조에 미친 영향)

  • 박삼옥;최지선
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.6 no.1
    • /
    • pp.119-144
    • /
    • 2003
  • This study attempts to figure out the impact of Information and communication technologies (ICTs) on spatial structure and to speculate on spatial strategies in the electronic economy from a geographical perspective. The unprecedented development of ICTs based on the explosive use of the Internet was enough to lead to the expectation that physical distance would not be a significant barrier in business activities. In fact, however, at least at a current stage, the development of ICTs has not automatically removed the inequality in spatial structure. The accessibility to electronic space is different by economic and social status within a country as well as between countries. The importance of place, locality, and place-specific assets has been strengthened in the global economy. Physical proximity is still of great importance because it helps to minimize transaction costs, to exploit place-specific social networks, and to accumulate credibility for successful businesses. Likewise, the development of electronic commerce such as B2B and B2C EC also does not necessarily result in the ignorance of place and locality. Rather, the recognition of the importance of spatial strategies is extremely important for the success in online businesses. As a conclusion, the spatial dimension becomes more important in the digital era for successful businesses and balanced regional developments than ever before. The need for the improvement of ICT infrastructures, the development of human resources, and the establishment of regional innovation systems in peripheral areas cannot be overemphasized even in the digital era.

  • PDF

Fault-Free Process for IT System with TRM(Technical Reference Model) based Fault Check Point and Event Rule Engine (기술분류체계 기반의 장애 점검포인트와 이벤트 룰엔진을 적용한 무장애체계 구현)

  • Hyun, Byeong-Tag;Kim, Tae-Woo;Um, Chang-Sup;Seo, Jong-Hyen
    • Information Systems Review
    • /
    • v.12 no.3
    • /
    • pp.1-17
    • /
    • 2010
  • IT Systems based on Global Single Instance (GSI) can manage a corporation's internal information, resources and assets effectively and raise business efficiency through consolidation of their business process and productivity. But, It has also dangerous factor that IT system fault failure can cause a state of paralysis of a business itself, followed by huge loss of money. Many of studies have been conducted about fault-tolerance based on using redundant component. The concept of fault tolerance is rather simple but, designing and adopting fault-tolerance system is not easy due to uncertainty of a type and frequency of faults. So, Operational fault management that working after developed IT system is important more and more along with technical fault management. This study proposes the fault management process that including a pre-estimation method using TRM (Technical Reference Model) check point and event rule engine. And also proposes a effect of fault-free process through built fault management system to representative company of Hi-tech industry. After adopting fault-free process, a number of failure decreased by 46%, a failure time decreased by 56% and the Opportunity loss costs decreased by 77%.

A Study on the Usefulness of Accounting Information for the Predication of Medium and Small Enterprises' Bankruptcy (중소기업 도산예측에 회계정보 유용성에 관한 연구)

  • Lee, Sung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1460-1466
    • /
    • 2008
  • The purpose of this study is to verify how the accounting information of a bankrupt firm which is defined as a dishonor, an impaired total capital, a poor financial performance of a business, a rejection of auditor's opinion and an incongruity of auditor's opinion differs from that of a healthy firm on the basis of the index of financial affairs if the accounting information released by KOSDAQ is valuable. The sampling firms consists of 45 KOSDAQ firms that went bankrupt from 2000 to 2007 and 45 healthy firms which are selected in accordance with the sizes of assets. It has also selected the 30 sampling firms for the confirmation of the model in the same way. According to the result of the in-depth analysis, the variables related to security among the 17 indexes of financial affairs that have been used in this study for 5 years show a noticeable difference between a bankrupt firm and a healthy one. The accuracy of failed firms using this model for confirmation demonstrates 76.7% in 5 years before the bankruptcy, 76.7% in 4 years before that, 65.0% in 3 years before it, 76.7% in 2 years, 88.3% in 1 year. This data shows that the process from a healthy firm to a bankrupt one has progressed gradually and confirms the value of the index of financial affairs, exhibiting the accuracy with 83.8% of a presuming sample and 76.7% of a confirming sample for 5 years.

Considering Households' Occupation and Their View towards Forest Conservation (가구 생업과 그에 따른 삼림보호 인식에 관한 고찰)

  • Panta, Menaka;Kim, Kye-Hyun;Lee, Chol-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.3
    • /
    • pp.73-78
    • /
    • 2009
  • 100 households' survey was carried out in 2007 in Chitwan to foresee the people's livelihood and their insight into the forest conservation. This analysis revealed that households' was mainly survived with multiple livelihood categories where 98% citizens belong to food crops and 92% to livestock husbandry. The households' income shared by agriculture (crop and livestock), forest and remittance was 37% and 20% respectively. Results further showed that income distribution was somehow equal with Gini coefficient 0.25 than with the 0.37 of landholdings size. But, average per capita income of households was lower than the national standard with 33% of households below the poverty thresholds and 0.0945 poverty gap index. Similarly, 85% respondents assured for the current degraded status of forest and 83% of households for not participated in forest management activities due to low awareness in 82% households. These findings shows the forest assets could be unduly degraded in the past and forest availability which is extracting from the remaining forest is also decreasing in the area. Thus, tendency of forest dependency has been shifting to the small scale farming, other livelihood sources such as local business and services. This information could be useful in planning and decision-making process in searching of better alternative for the local livelihood as well as sustainable forest conservation strategy.

  • PDF

The Development of RFID Utility Statistical Analysis Tool (RUSAT) in Comparison to Barcode for Logistics Activities (물류활동에서 RFID와 바코드 시스템의 효용성 비교를 위한 통계분석 도구(RUSAT) 개발)

  • Ha, Heon-Cheol;Park, Heung-Sun;Kim, Hyun-Soo;Choi, Yong-Jung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.137-146
    • /
    • 2012
  • In SCM(Supply Chain Management), a management paradigm where the customer satisfaction is to be achieved by minimizing the cost, reducing the uncertainty, and obtaining the overall optimization. As it performs the integrated operation of the paths of information, assets, and knowledge from the raw material providers to the retailers, the adoption of RFID(Radio Frequency Identification) in SCM could be expected to magnify the effectiveness of the system. However, there is a huge risk by deciding whether or not RFID system is adopted without the objective analysis under the uncertain circumstances. This research paper presents the statistical analysis methodologies for the comparison of RFID with Barcode on the aspect of utility and the statistical analysis tool, RUSAT, which was programmed for nonstatisticians' convenience. Assuming a pharmaceutical industry, this paper illustrates how the data were entered and analyzed in RUSAT. The results of this research are expected to be used not only for the pharmaceutical related company but also for the manufacturer, the whole-saler, and the retailer in the other logistic industries.