• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.033 seconds

An authentication service application using Context-awareness (상황인식 기법을 이용한 인증 서비스 응용)

  • Lee, Myung-jun;Lee, Tae-sik;Hong, Ho-jung;Hwang, Hyeon-seo;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.169-172
    • /
    • 2013
  • In this paper, we develop an application service of user authentication system using context awareness technology. The proposed security printer system service is applying 'NFC(Near Field Communication) technology', 'authentication system using communication with server, according to context awareness to application system. Our system extracts several context-awareness elements that happen through the user's printing with server communication. The proposed system property elements contain as print time, number of printing and name of document, etc. based on working memory operation as DB. This proposed system provide with context-awareness weight algorithm and analyzes the service which decides success or failure of user's printing. The develop app service is formed and applied when approved user who gets request. Approved user according to these context awareness tech will be provided with final service after authenticating again for the certain NFC card to reader. This results cab be contributed an authentication service based on context awareness weight algorithm and improved performance of management service in secure service applications.

  • PDF

Efficient Feature Selection Based Near Real-Time Hybrid Intrusion Detection System (근 실시간 조건을 달성하기 위한 효과적 속성 선택 기법 기반의 고성능 하이브리드 침입 탐지 시스템)

  • Lee, Woosol;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.471-480
    • /
    • 2016
  • Recently, the damage of cyber attack toward infra-system, national defence and security system is gradually increasing. In this situation, military recognizes the importance of cyber warfare, and they establish a cyber system in preparation, regardless of the existence of threaten. Thus, the study of Intrusion Detection System(IDS) that plays an important role in network defence system is required. IDS is divided into misuse and anomaly detection methods. Recent studies attempt to combine those two methods to maximize advantagesand to minimize disadvantages both of misuse and anomaly. The combination is called Hybrid IDS. Previous studies would not be inappropriate for near real-time network environments because they have computational complexity problems. It leads to the need of the study considering the structure of IDS that have high detection rate and low computational cost. In this paper, we proposed a Hybrid IDS which combines C4.5 decision tree(misuse detection method) and Weighted K-means algorithm (anomaly detection method) hierarchically. It can detect malicious network packets effectively with low complexity by applying mutual information and genetic algorithm based efficient feature selection technique. Also we construct upgraded the the hierarchical structure of IDS reusing feature weights in anomaly detection section. It is validated that proposed Hybrid IDS ensures high detection accuracy (98.68%) and performance at experiment section.

Need to Reduce Industrial Accidents through the Introduction of an Prevailing Wage System (적정임금제 도입을 통한 산업재해 감축 필요성 고찰)

  • Choonhwan Cho;Yeoncheol Shin;Kyung-Bo Han
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.1
    • /
    • pp.1-9
    • /
    • 2023
  • In order to carry out construction work, it is urgent to introduce a proper wage system so that the cost burden of projects that have been won due to bleeding competition among original government buildings based on low-priced bids can be transferred to subcontractors. Purpose: Construction with illegal multi-level industrial structure needs to improve the wage reduction environment leading to order (100%) → original contractor (80%) → subcontractor (65%) → load contractor (65%) and aims to ensure wages for end workers. Method: Investigate the current status of labor cost appropriate payment plan in the construction industry, and investigate the case of the appropriate wage system (P.W) in the United States. In addition, the effect and direction of the appropriate wage system are presented. Result: Individual minimum wage security was also mentioned in the Constitution, and many researchers suggested that only the introduction of an appropriate wage system could solve the problem of reducing worker labor and ensure quality and safety. Conclusion: The proper wage system in the construction industry will block illegal multi-level and illegal foreign work, improve the labor environment in the construction market, create an influx of young workers, and have a significant impact on the construction industry's competitive structure, safety, and quality.

A Study on the Appropriate Management of Maritime Police Authority in Korea Coast Guard: Focusing on the Japan Coast Guard (해양경비안전본부의 해양경찰권 적정 운영방안에 관한 연구: -일본 해상보안청과의 비교를 중심으로-)

  • Son, Yeong-Tae
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.361-391
    • /
    • 2015
  • Regarding the [Government Organization Act; which is legislated on 19th November, 2014] Korea Coast Guard(KCG) has been re-organized and belong from Korea Coast Guard shall be established under the Minister of Oceans and Fisheries to Ministry of Public Safety and Security. Furthermore, National Police Agency(NPA) Commissioner has the right for administer duties concerning investigation and information by succession from Korea Coast Guard Commissioner. That means that main rule has been moved from prior KCG to Ministry of Public Safety and Security(MPSS) and NPA currently which is dual structure. Meanwhile, This kind of organization change has been effective to investigative agency which exert KCG's call of duty and causes needs of variety problems. In other words, There are quite huge changes such as KCG's reduction of their work, call of duty and re-organization regarding revised government organization act. However this change - including re-organization by government, was not able to take current MPSS's special features such as organization specialty and legal rights. It means, the current change has not been taken present law system CRIMINAL PROCEDURE LAW and there was no preparation to stable maritime police authority action as well. To sum up, this revised GOVERNMENT ORGANIZATION ACT is supposed to provide total, quick security service by establishing strong disasters and safety control tower. However they only contains few area such as organization revision regarding 'Sewol Ferry Disaster', they was not able to contain the other parts of Society. Therefore, in this article I would like to check the part of re-evaluation of current change made by KCC's organization revision. It is supposed to provide better legal stability by making clear of work area by government agencies who acts maritime police authority.

  • PDF

Analysis on the Korean Women's Fear of Sexual Crime in Seoul Metropolitan Subway System (한국 여성의 지하철 내 성범죄두려움 분석)

  • Lee, Yoon-Ho;Seong, Yong-Eun;Yoo, Young-Jae;Jun, Eun-Joo
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.351-382
    • /
    • 2007
  • This study seeks to analyze various aspects of women's fear of sexual crime committed against them within the Seoul metropolitan subway system, which takes center stage in public transportation today in Korea; that is, among different kinds of fear of crime, women's fear of sexual crime is empirically examined, and it is expected that the results of this study shall serve as an important basis for future policy-making, so that the fear of sexual crime against women in the subway system could be reduced. To the end, this study aims first, to investigate the real picture of women's using the subway and their attire, second, to look into the amount of information on such crime obtained and the level of its awareness, third, to analyze the characteristics of the fear of sexual crime in the subway system, and lastly, to empirically examine the relationship between women's regular women's regular attire/their level of information on such crime obtained and their fear of sexual crime. As a quantitative research method to discover facts, this study utilizes reality-analyztical and technical research methods, and for its final statistical analysis, uses questionnaire answered and returned by 509 women, out of a total of 520 female commuters on the Seoul metropolitan subway system who had originally been requested to participate in the survey. The result of this study demonstrates that the level of women's fear of sexual crime on the subway is relatively high. In detail, the higher their monthly income is, the more fearful women feel on the subway; it has also been found that women living in housing they own or in leased housing on deposits (Jeonse) fear sexual crime on the subway more than those living in the other forms of housing. However, the level of fear has been found to be low for those types of sexual crime judged to be relatively unlikely to be committed. Lastly the result of the relationship between women's regular attire/their level of information on such crime obtained and their fear of sexual crime is relatively high and very effective.

  • PDF

The Influence of the Restrictions in Chinese economic growth on Korean commercial environment (중국 경제성장의 제약요인이 한국 통상환경에 미치는 영향)

  • Shong, Il-Ho;Lee, Gye-Young
    • International Commerce and Information Review
    • /
    • v.15 no.4
    • /
    • pp.457-479
    • /
    • 2013
  • Through a Chinese rise, Chinese dream is actualizing as the world's great power. According to outlook of World Bank and IMF, Around 2030 China will be a great power bigger than America's economic power. The rise of China will give a huge impact to the whole world. China expands her influence through a global manufacturing base and a global market. To actualize 'Peaceful Rise' Strategy, China has many constraints. Chinese society is facing many difficult social problem due to side effects of a rapid development. Such as the spread of corruption, the severity of wealth gap, environmental degradation and energy shortage. Internationally there are containment from hegemon so-called 'China threat' dispute, Taiwan issue and territorial disputes. Western countries are hostile to China for two reasons. Based on expectations, one is China's socialist system and the other is the rising China which will compete for supremacy with Europe and America. Recent emergence of Chinese nationalism and the containment of the neighboring countries are also serious limiting factors. Domestically they have the rampant corruption in the bureaucracy, weakened capacity of Communist rule, wealth disparity due to the discriminatory economic development strategy, seriousness of rural problem, social instability, lack of social security systems and the development gap between the eastern coastal areas and western inland areas, ethnic minorities problems, the constraint of sustainable development issues due to lack of resources, environmental pollution and energy constraints. Like the former Soviet Union, China may face a dismantlement. After the rise, China may encounter possibilities of a war between great powers or a collapse of Chinese society caused by deepening internal conflict. Serious economic polarization would make peasants and urban workers, who are social vulnerable people, to turn their back to communist party and threaten the justification and the appropriateness of the ruling communist party. Chinese government will think internal system security threat is more formidable risk factor than a system security threat from the hegemon. The decline of great country comes from internal reasons rather than external reasons. To achieve peaceful rise, unification with Taiwan is an essential prerequisite. Taiwan issues are complex problems which equipped with international and domestic factors. Lack of energy resources, environmental pollution in China will bring economic crisis to Korean enterprises. Important influence to Korean economy will be a changeover of the method in economic development. It will turn the balance of investment and consumption, GDP-centered growth to consumption and environment-centered growth. Services industries including finance, environment, culture, education, health care and social welfare will grow. Change in China's growth model will give a great challenge upon the intermediate goods industry in Korea. Korea should reduce the portion of machinery, automotive, semiconductor, steel and chemical-centered export industry to China, and should increase the proportion of the service industry.

  • PDF

Development of Intelligent Job Classification System based on Job Posting on Job Sites (구인구직사이트의 구인정보 기반 지능형 직무분류체계의 구축)

  • Lee, Jung Seung
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.123-139
    • /
    • 2019
  • The job classification system of major job sites differs from site to site and is different from the job classification system of the 'SQF(Sectoral Qualifications Framework)' proposed by the SW field. Therefore, a new job classification system is needed for SW companies, SW job seekers, and job sites to understand. The purpose of this study is to establish a standard job classification system that reflects market demand by analyzing SQF based on job offer information of major job sites and the NCS(National Competency Standards). For this purpose, the association analysis between occupations of major job sites is conducted and the association rule between SQF and occupation is conducted to derive the association rule between occupations. Using this association rule, we proposed an intelligent job classification system based on data mapping the job classification system of major job sites and SQF and job classification system. First, major job sites are selected to obtain information on the job classification system of the SW market. Then We identify ways to collect job information from each site and collect data through open API. Focusing on the relationship between the data, filtering only the job information posted on each job site at the same time, other job information is deleted. Next, we will map the job classification system between job sites using the association rules derived from the association analysis. We will complete the mapping between these market segments, discuss with the experts, further map the SQF, and finally propose a new job classification system. As a result, more than 30,000 job listings were collected in XML format using open API in 'WORKNET,' 'JOBKOREA,' and 'saramin', which are the main job sites in Korea. After filtering out about 900 job postings simultaneously posted on multiple job sites, 800 association rules were derived by applying the Apriori algorithm, which is a frequent pattern mining. Based on 800 related rules, the job classification system of WORKNET, JOBKOREA, and saramin and the SQF job classification system were mapped and classified into 1st and 4th stages. In the new job taxonomy, the first primary class, IT consulting, computer system, network, and security related job system, consisted of three secondary classifications, five tertiary classifications, and five fourth classifications. The second primary classification, the database and the job system related to system operation, consisted of three secondary classifications, three tertiary classifications, and four fourth classifications. The third primary category, Web Planning, Web Programming, Web Design, and Game, was composed of four secondary classifications, nine tertiary classifications, and two fourth classifications. The last primary classification, job systems related to ICT management, computer and communication engineering technology, consisted of three secondary classifications and six tertiary classifications. In particular, the new job classification system has a relatively flexible stage of classification, unlike other existing classification systems. WORKNET divides jobs into third categories, JOBKOREA divides jobs into second categories, and the subdivided jobs into keywords. saramin divided the job into the second classification, and the subdivided the job into keyword form. The newly proposed standard job classification system accepts some keyword-based jobs, and treats some product names as jobs. In the classification system, not only are jobs suspended in the second classification, but there are also jobs that are subdivided into the fourth classification. This reflected the idea that not all jobs could be broken down into the same steps. We also proposed a combination of rules and experts' opinions from market data collected and conducted associative analysis. Therefore, the newly proposed job classification system can be regarded as a data-based intelligent job classification system that reflects the market demand, unlike the existing job classification system. This study is meaningful in that it suggests a new job classification system that reflects market demand by attempting mapping between occupations based on data through the association analysis between occupations rather than intuition of some experts. However, this study has a limitation in that it cannot fully reflect the market demand that changes over time because the data collection point is temporary. As market demands change over time, including seasonal factors and major corporate public recruitment timings, continuous data monitoring and repeated experiments are needed to achieve more accurate matching. The results of this study can be used to suggest the direction of improvement of SQF in the SW industry in the future, and it is expected to be transferred to other industries with the experience of success in the SW industry.

Abnormal Changes in Groundwater Monitoring Data Due to Small-Magnitude Earthquakes (지하수 모니터링 이상변동 자료를 이용한 소규모 지진 영향 유추)

  • Woo, Nam C.;Piao, Jize;Lee, Jae-Min;Lee, Chan-Jin;Kang, In-Oak;Choi, Doo-Houng
    • The Journal of Engineering Geology
    • /
    • v.25 no.1
    • /
    • pp.21-33
    • /
    • 2015
  • This study tests the potential of detecting small-magnitude earthquakes (~M3.0) and their precursors using a long-term groundwater-monitoring database. In groundwater records from April to June 2012, abnormal changes in water level, temperature, and electrical conductivity were identified in the bedrock monitoring wells of the Gimcheon-Jijwa, Gangjin-Seongjeon, and Gongju-Jeongan stations. These anomalies could be attributed to the M3.1 earthquake that occurred in the Youngdeok area on May 30th, although no linear relationship was found between the scale of changes and the distance between each monitoring station and the epicenter, which is attributed in part to the wide screen design of the monitoring wells. Groundwater monitoring networks designed specifically for monitoring earthquake impacts could provide better information on the safety of underground space and on the security of emergency water-resources in earthquake disaster areas.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

Realization of a Web-based Distribution System for the Monitoring of Business Press Releases and News Gathering Robots (기업 보도자료 모니터링을 위한 웹기반 배포시스템 및 기사 수집로봇 구현)

  • Shin, Myeong-Sook;Oh, Jung-Jin;Lee, Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.103-111
    • /
    • 2013
  • At present, a variety of Korean news stories have been about important online content and its importance in the press is becoming higher. Diverse news from businesses are provided to the public as press releases through newspapers or broadcasting media. For such news to become information for a press release, enterprises visit reporters, use e-mails, faxes, or couriers to deliver the information. However, such methods have problems with time, human resources, expenses, and file damage. Also, with these methods it is bothersome for enterprises to check what has been released and for the press to make frequent contact with enterprises for interviews and for content to be released. Therefore, this study aimed to realize a distribution system which enterprises can use to distribute data to be released to the press and to easily check what is to be released while the press can ask for interview requests in a simple way, as well as a news gathering robot that can collects news on the enterprises involved from articles online or in portal sites.