• Title/Summary/Keyword: policy windows

Search Result 105, Processing Time 0.029 seconds

System Design and Implementation for Security Policy Management of Windows Based PC and Weakness Inspection (Windows 기반의 PC 보안 정책 관리 및 취약성 점검을 위한 시스템 설계 및 구현)

  • Park, Byung-Yeon;Yang, Jong-Won;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.23-30
    • /
    • 2008
  • Attempt to protect personal computer from hacking, virus, worm, and the troy wooden horse is progressed variously. Nevertheless, it is very difficult fer public users to understand configurations to enhance security stability in windows based personal computer, and many security problem is due to there lack of recognize about information accessability, various kind of configuration, these necessity, and efficiency. Accordingly, it is demandded to develop an efficient system to protect networks and personal computer with automated method. In this paper, we derive problems of personal computer by analyzing various vulnerableness and policy on security, through which we design and implement the system to solve various windows system problem conveniently.

Security Improvement of File System Filter Driver in Windows Embedded OS

  • Seong, Yeon Sang;Cho, Chaeho;Jun, Young Pyo;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.834-850
    • /
    • 2021
  • IT security companies have been releasing file system filter driver security solutions based on the whitelist, which are being used by several enterprises in the relevant industries. However, in February 2019, a whitelist vulnerability was discovered in Microsoft Edge browser, which allows malicious code to be executed unknown to users. If a hacker had inserted a program that executed malicious code into the whitelist, it would have resulted in considerable damage. File system filter driver security solutions based on the whitelist are discretionary access control (DAC) models. Hence, the whitelist is vulnerable because it only considers the target subject to be accessed, without taking into account the access rights of the file target object. In this study, we propose an industrial device security system for Windows to address this vulnerability, which improves the security of the security policy by determining not only the access rights of the subject but also those of the object through the application of the mandatory access control (MAC) policy in the Windows industrial operating system. The access control method does not base the security policy on the whitelist; instead, by investigating the setting of the security policy not only for the subject but also the object, we propose a method that provides improved stability, compared to the conventional whitelist method.

Paying Attention to the 20th Presidential Election as Policy Windows (20대 대통령선거, 보건의료정책 변혁의 기회)

  • Lee, Sun-Hee
    • Health Policy and Management
    • /
    • v.31 no.4
    • /
    • pp.385-386
    • /
    • 2021
  • The 2022 Presidential election is approaching. Because health policies are intimately connected to other policies and involve multiple stakeholders, it is difficult to promote policy changes. Hence, the presidential election, during which policymakers are replaced, is a great timing for making policy improvements. Several important policies have been introduced and promoted throughout the presidential election process. However, these policies have been implemented without going through sufficient discussion among the experts but rather through the voices of minority groups with stronger political will. This eventually posed an obstacle to the balanced development of the entire health care system. The current medical system faces challenges that need to be addressed in the medium and long term. In particular, we should be wary of the populistic approach. We look forward to seeing more policy commitments, proposed through the evidence-based policy process and sufficient amount of discussion among the experts.

Dynamics of Environmental Policy Development in Korea : How did the Policy Windows have been opened? (한국 환경정책의 발달동인 : 정책의 창문은 어떻게 열렸는가?)

  • Rhee, Jeong-Jeon;Jeong, Hoi-Seong
    • Journal of Environmental Policy
    • /
    • v.2 no.1
    • /
    • pp.1-29
    • /
    • 2003
  • This paper examines the dynamics of environmental policy development in Korea by reviewing some of the ways on how the policy windows have been opened. There are a lot of theoretical arguments about the major factors influencing policy development or changes. Many scholars have believed that severe pollution accidents or salient environmental episodes might have been the main motivation of environmental policy development. This line of argument seems valid, especially with the water pollution control policy in Korea. Water pollution control programs had rapidly expanded along with the series of water pollution accidents in the tap water sources from the late 1980s to mid-1990s. However, regarding other major env. issues, various other factors have played more important roles in the development of the relevant policies. In case of air pollution control policy international sport events such as, 1986 Asian Games, 1988 Summer Olympics, and 2002 World Cup Competition, have contributed for the development. The municipal solid waste management policy partly owed its development to the introduction of local autonomy system in the mid-1990s. Even the foreign currency crisis occurring in December 1997 helped the policy paradigm shift from rigid supply-oriented to soft demand-oriented approaches. After closely looking at the dynamics of environmental policy development in Korea, this paper tries to identify the logical background of the observed outcomes.

  • PDF

A Study on the Windows and Doors of Traditional Houses in Jecheon (제천시 전통주거의 창호 특성에 관한 연구)

  • Lee, Wan-Geon
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.4
    • /
    • pp.94-103
    • /
    • 2013
  • This study investigated the windows and doors of traditional houses in Jecheon, designated as a cultural assets in Chungcheongbuk-do. It aimed to contribute to the study of korean traditional architecture by finding the characteristics of windows and doors, and to the preservation and reuse policy of local cultural assets. This study was conducted using the research methods of the literature and field survey, and it was to analyze and to compare the existing data and a current status. The result are as followings. Firstly, the windows and doors of kitchen in An-chae were generally installed double swinging type with wooden board door(板張門). Secondly, the windows and doors of An-bang were generally installed double swinging type with slender-ribbed windows and doors(細箭窓戶), were mostly installed Merum(遠音). Thirdly, the windows and doors of Daechung(大廳) towards the backyard were generally installed double swinging type with wooden board door, corrugated cardboard door(骨板門) and slender-ribbed windows. Lastly, the windows and doors of Sarang-bang in a house of nobility(班家) was installed triple windows and doors.

Windows 7 Operating System Event based Visual Incident Analysis System (윈도우즈 7 운영체제 이벤트에 대한 시각적 침해사고 분석 시스템)

  • Lee, Hyung-Woo
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.223-232
    • /
    • 2012
  • Recently, the leakage of personal information and privacy piracy increase. The victimized case of the malicious object rapidlies increase. Most of users use the windows operating system. Recently, the Windows 7 operating system was announced. Therefore, we need to study for the intrusion response technique at the next generation operate system circumstances. The accident response technique developed till now was mostly implemented around the Windows XP or the Windows Vista. However, a new vulnerability problem will be happen in the breach process of reaction as the Windows 7 operating system is announced. In the windows operating system, the system incident event needs to be efficiently analyzed. For this, the event information generated in a system needs to be visually analyzed around the time information or the security threat weight information. Therefore, in this research, we analyzed visually about the system event information generated in the Windows 7 operating system. And the system analyzing the system incident through the visual event information analysis process was designed and implemented. In case of using the system developed in this study the more efficient accident analysis is expected to be possible.

The Effect on a Delivery Time Window Dispatching Policy for 3PL Distribution Center (제3자 물류센터 납품시간창 디스패칭 정책에 관한 효과)

  • Lee, Woon-Seek;Kim, Byung Soo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.37 no.1
    • /
    • pp.60-67
    • /
    • 2014
  • This paper considers an inbound ordering and outbound dispatching problem for multi-products and multi-vehicles in a third-party distribution center. The demands are dynamic over a discrete and finite time horizon, and replenishing orders are shipped in various transportation modes and the freight cost is proportional to the number of vehicles used. Any mixture of products is loaded onto any type of vehicles. The objective of the study is to simultaneously determine the inbound lot-sizes, the outbound dispatching sizes, and the types and numbers of vehicles used to minimize total costs, which consist of inventory holding cost and freight cost. Delivery time window is one of the general dispatching policies between a third-party distribution center and customers in practice. In the policy, each demand of product for a customer must be delivered within the time window without penalty cost. We derive mixed integer programming models for the dispatching policy with delivery time windows and on-time delivery dispatching policy, respectively and analyze the effect on a dispatching policy with delivery time windows by comparing with on-time delivery dispatching policy using various computational experiments.

A Study on the Windows and Doors of Jecheon Park Dosu's House and Jeong Wontae's House (제천 박도수가옥 및 정원태가옥의 창호에 관한 연구)

  • Lee, Wan-Geon
    • Korean Institute of Interior Design Journal
    • /
    • v.23 no.5
    • /
    • pp.96-103
    • /
    • 2014
  • This study investigated the windows and doors of Jecheon Park Dosu's House and Jecheon Jeong Wontae's House, designated as a Important Folklore Cultural Heritage in Jecheon. It aimed to contribute to the study of traditional house, and to the conservation policy of architectural Heritage in Jecheon. This study used the research methods of the literature analysis and the field survey, and it was to analyze the spatial characteristics of the windows and doors in each building. The result are as followings. Firstly, the wooden board door(板張門) of a hinged door type is found in the kitchen of An-chae, and the Bongchang(封窓) and Gwangchang(光窓) towards the courtyard is installed for ventilation and lighting. Secondly, the slender-ribbed windows and doors(細箭 窓戶) of double swinging type towards the courtyard is installed in An-bang, and Merum(遠音) is found. Thirdly, the framed panel door(骨板門) of a hinged door type towards the backyard is found in Daechung(大廳). Lastly, the slender-ribbed windows and doors of double swinging type towards the outside is found in Sarang-bang of Sarang-chae, and Merum(遠音) is installed. Especially, double skin windows and doors is installed in Jecheon Park Dosu's House.

Self-powered Smart Window Technologies Using Photovoltaics (태양전지를 이용한 스마트 윈도우 기술 동향)

  • Lee, Kyu-Sung;Lim, Jung Wook;Kang, Mangu;Kim, Kyung Hyun;Ryu, Hojun
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.5
    • /
    • pp.36-47
    • /
    • 2019
  • Smart window technology has become a major component of smart buildings, leading to energy savings and enhanced functionality. Smart windows work like curtains or blind screens, blocking external light sources. Smart window components employ electrochromic or photochromic materials that can selectively block sunlight when electricity is applied. The installation of low-E glass and building-integrated photovoltaics (BIPV) is being encouraged in accordance with the policy on saving building energy. To incorporate BIPV into smart windows, the transparency and colors of transparent photovoltaics must be optimized. The power sources required to operate these smart windows take advantage of the transparent color of the solar cells, which also facilitates aesthetics. Self-powered smart windows that combine electrochromic or photochromic screens with transparent solar cells suggest a promising convergent technology.

A Study on Injection Attacks and Defenses on Microsoft Windows (MS Windows에서 인젝션 공격 및 방어 기법 연구)

  • Seong, HoJun;Cho, ChangYeon;Lee, HoWoong;Cho, Seong-Je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.9-23
    • /
    • 2020
  • Microsoft's Windows system is widely used as an operating system for the desktops and enterprise servers of companies or organizations, and is a major target of cyber attacks. Microsoft provides various protection technologies and strives for defending the attacks through periodic security patches, however the threats such as DLL injection and process injection still exist. In this paper, we analyze 12 types of injection techniques in Microsoft Windows, and perform injection attack experiments on four application programs. Through the results of the experiments, we identify the risk of injection techniques, and verify the effectiveness of the mitigation technology for defending injection attacks provided by Microsoft. As a result of the experiments, we have found that the current applications are vulnerable to several injection techniques. Finally, we have presented the mitigation techniques for these injection attacks and analyzed their effectiveness.