• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.037 seconds

The Study on the China Advance Plan of Senior Products Industrial (고령친화산업 대중국진출방안 연구)

  • Park, Keun-Soo;Kim, So-Jin
    • International Commerce and Information Review
    • /
    • v.14 no.4
    • /
    • pp.5-25
    • /
    • 2012
  • This study is to explore the advance plan of senior products industrial into China. For this purpose, we examine the current status of the senior products industrial in Korea and investigate the demand of senior products industrial in China. Based on the results of these analyses, we discussed the concrete plans to advance into China. At result, the senior products industrial markets needed to develop in China are the elderly tourism industry, the elderly medical equipment and pension. And Korean companies intending to advance into China market might should capture the change of social security system, the trait of senior products industrial, and the regional characteristics in China.

  • PDF

A Study on the ASK Communication Modem over Electrical Power Lines (전력선을 이용한 ASK통신 모뎀에 관한 연구)

  • 사공석진;송문규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.9
    • /
    • pp.951-962
    • /
    • 1992
  • The layout of electrical power distribution networks never involved communications aspects. As a result their transmission properties severly complicate the use as data links. Futhermore bandwidth as well as transmission power is restricted. Nevertheless, power distribution net works represent a most attractive medium for digital communication purposes due to an ever increasing demand, e.g., for environment management of buildings, office automation, and remote meter reading or security monitoring. In this paper, a power line modem which is capable of transmitting and receiving data at 1200 bps using OOK-BASK through 220V AC power lines is implemented. The receiver includes noncoherent detector and performs soft decision. The OLM circuits can be simplified by use of microprocessor. The PLM also satisfies CENELEC, European standards, and can be applied to home automation system.

  • PDF

A Brokered Authentication Scheme Based on Smart-Card for Multi-Server Authentication (다중서버 인증을 위한 스마트카드 기반 중재 인증 기법 연구)

  • Kim, Myungsun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.3
    • /
    • pp.190-198
    • /
    • 2013
  • Since the facilities for the remote users tend to be deployed in distributed manner, authentication schemes for multi-server communication settings, which provide various web services, are required for real-world applications. A typical way to authenticate a remote user relies on password authentication mostly. However, this method is vulnerable to attacks and inconvenient as the system requires users to maintain different identities and corresponding passwords. On the other hand, the user can make use of a single password for all servers, but she may be exposed to variants of malicious attacks. In this paper, we propose an efficient and secure authentication scheme based on a brokered authentication along with smart-cards in multi-server environment. Further we show that our scheme is secure against possible attacks and analyze its performance with respect to communication and computational cost.

Analysis of Improved Convergence and Energy Efficiency on Detecting Node Selection Problem by Using Parallel Genetic Algorithm (병렬유전자알고리즘을 이용한 탐지노드 선정문제의 에너지 효율성과 수렴성 향상에 관한 해석)

  • Seong, Ki-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.953-959
    • /
    • 2012
  • There are a number of idle nodes in sensor networks, these can act as detector nodes for anomaly detection in the network. For detecting node selection problem modeled as optimization equation, the conventional method using centralized genetic algorithm was evaluated. In this paper, a method to improve the convergence of the optimal value, while improving energy efficiency as a method of considering the characteristics of the network topology using parallel genetic algorithm is proposed. Through simulation, the proposed method compared with the conventional approaches to the convergence of the optimal value was improved and was found to be energy efficient.

Network Defense Mechanism Based on Isolated Networks (격리 네트워크를 활용한 네트워크 방어 기법)

  • Jung, Yongbum;Park, Minho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1103-1107
    • /
    • 2016
  • Network assets have been protected from malware infection by checking the integrity of mobile devices through network access control systems, vaccines, or mobile device management. However, most of existing systems apply a uniform security policy to all users, and allow even infected mobile devices to log into the network inside for completion of the integrity checking, which makes it possible that the infected devices behave maliciously inside the network. Therefore, this paper proposes a network defense mechanism based on isolated networks. In the proposed mechanism, every mobile device go through the integrity check system implemented in an isolated network, and can get the network access only if it has been validated successfully.

A Study of the stockpile and mobilization framework for the disaster management resources (재난관리자원 비축 및 동원 체계 연구)

  • Lee, Changyeol;Kim, Taehwan;Park, Giljoo
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.3
    • /
    • pp.376-384
    • /
    • 2015
  • It needs a framework to minimizing the damage using the just-time just-resources strategy. But it is not easy to put 'what kinds of resources', 'how many resources', 'from where institutions', and 'how much money for the reimbursement'. So most of the local government depends on the field manager. In this study, we analysed the conventional system and provides the efficient methodology to the stockpiling and mobilizing against to the disaster. The study does not provide the stockpile amount for the local governments, because the stockpile amounts must consider the local diverse situations.

A study on Professionalization of Student Protecting Manpower for the Prevention of School Violence (학교폭력예방을 위한 학생보호인력의 전문화방안에 관한 연구)

  • Kim, Sun-Ah
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.1
    • /
    • pp.87-96
    • /
    • 2013
  • The purpose of this research is to suggest specialization measures of student protecting manpower for the prevention of school violence in Korea. Therefore, student protecting manpower's legal limitation, insufficiency of professionalism, insufficiency of recruitment standard's suitability, insufficiency of educational training, cooperative problem with related institutions and ethical problems were drawn as the problems of student protecting manpower. The measures for improving those problems are as follows. The first is to revise laws related to school protecting manpower and strengthen systems. The second is to prepare proper standard to recruit student protecting manpower. The third is to establish professional training institution of student protecting manpower. The fourth is to establish close cooperation system with institutions related to student protection. The fifth is to legislate ethics codes of student protecting manpower.

Web-based Automated Network Service Security Vulnerability Analysts & Management System (웹 기반의 자동화된 네트워크 서비스 보안 취약성 분석 및 관리 시스템)

  • Lim, Mun-Hee;Yang, Jin-Suck;Kim, Hyun-Ku;Chang, Beom-Hwan;Chung, Tai-Myung
    • Annual Conference of KIPS
    • /
    • 2002.04b
    • /
    • pp.853-856
    • /
    • 2002
  • 인터넷이라는 거대한 네트워크에 연결되어 있는 시스템의 보안 상태를 주기적으로 점검하여 외부로부터의 공격에 취약한 부분을 보완하여 주는 일은 공격에 대한 방어를 위하여 가장 기본적인 일이다. 그러나 수많은 호스트가 상호 연결된 네트워크 관리 시스템에서 관리자가 각 시스템의 보안상 취약점을 전부 인지하고 이에 대한 보완을 수행하는 것은 상당히 어려운 일이다. 따라서 관리자의 수작업에 의한 취약점 분석 작업보다는 자동화된 관리 도구에 의한 취약점 분석이 효율적이다. 이에 본 논문에서는 네트워크 서비스인 HTTP, SMTP의 취약점을 원격에서 분석하는 시스템을 설계 및 구현하였다. WAVAMS는 에이전트와 독립된 mobile 코드의 이동에 의한 동적 분석 모듈의 추가로 가장 최근의 취약점을 신속하게 분석 할 수 있으며 확장성이 높다. 또한 웹 기반으로 설계되어 관리자가 용이하게 관리할 수 있다.

  • PDF

Re-classifying Method for Face Recognition (얼굴 인식 성능 향상을 위한 재분류 방법)

  • Bae Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.105-114
    • /
    • 2004
  • In the past year, the increasing concern about the biometric recognition makes the great activities on the security fields, such as the entrance control or user authentication. In particular, although the features of face recognition, such as user friendly and non-contact made it to be used widely, unhappily it has some disadvantages of low accuracy or low Re-attempts Rates. For this reason, I suggest the new approach to re-classify the classified data of recognition result data to solve the problems. For this study, I will use the typical appearance-based, PCA(Principal Component Analysis) algorithm and verify the performance improvement by adopting the re-classification approach using 200 peoples (10 pictures per one person).

  • PDF

Technical analysis of Cloud Storage for Cloud Computing (클라우드 컴퓨팅을 위한 클라우드 스토리지 기술 분석)

  • Park, Jeong-Su;Bae, Yu-Mi;Jung, Sung-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1129-1137
    • /
    • 2013
  • Cloud storage system that cloud computing providers provides large amounts of data storage and processing of cloud computing is a key component. Large vendors (such as Facebook, YouTube, Google) in the mass sending of data through the network quickly and easily share photos, videos, documents, etc. from heterogeneous devices, such as tablets, smartphones, and the data that is stored in the cloud storage using was approached. At time, growth and development of the globally data, the cloud storage business model emerging is getting. Analysis new network storage cloud storage services concepts and technologies, including data manipulation, storage virtualization, data replication and duplication, security, cloud computing core.