• Title/Summary/Keyword: preemptive-response

Search Result 74, Processing Time 0.028 seconds

Development of Lifecycle Model for Copyright Infringement Site (저작권 침해 사이트 생애 주기 모델 개발)

  • Kim, Deuk-Hun;Jeong, Hae-Seon;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.101-121
    • /
    • 2020
  • Technology and culture are converging with various industries to create added value of contents. In addition, the country is creating a foundation environment for grafting new technologies onto the cultural content. However, copyright infringement by voice demand and supply is continuously occurring for cultural contents with copyright, and more and more recently, there have been increasing cases of creating and operating sites with servers overseas to bypass monitoring on infringement sites. To prevent this, various copyright protection studies are under way in many areas, but the current detection and prevention technologies are largely reactive and therefore have problems of effectiveness. Accordingly, this paper proposes a model of the lifecycle of copyright infringement site to lay the foundation for preemptive response to the distribution of illegal copies through analysis of the lifecycle of copyright infringement site.

A Study for Enterprise Type Realtime Information Security Management System (기업의 상시 보안관리 체계 연구)

  • Noh, Shi-Yeong;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.617-636
    • /
    • 2017
  • Many businesses have adopted the standard security management structure such as ISO27001 and K-ISMS for strengthening business's security management structure to protect their core information assets and have acquired partial output from such effort. However, many risk factors such as recent advances in Information Technology and evolution of intrusion methods have increased exponentially requiring the businesses to response even more quickly with better accuracy. For such purpose, a study of 'Real Time Security Management Structure for Business' based on security management process optimization, defining a set of security index for managing core security area and calculation of risk indices for precognition of intrusion risk area has been made. Also, a survey on opinions of an expert panel has been conducted. The effectiveness of studied structure was analyzed using AHP method as well. Using this study, security personnels of a company can improve efficiency of the preemptive responsive and quicker measure from the current security management structure.

Deduction of Water-Energy-Food Nexus technology for preemptive response of resource security (자원안보 선제대응을 위한 물-에너지-식량 연계 기술 과제 도출)

  • Lee, Eul Rae;Choi, Byung Man;Park, Sang Young;Jung, Young Hun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.109-109
    • /
    • 2017
  • 전 세계적으로 기후변화, 인구증가, 도시화에 따른 물, 에너지, 식량 등 필수 자원의 수요량 증가로 인한 수급 불균형으로 글로벌 자원안보 위기가 대두되고 있다. 특히, 국내의 경우 경제성장로 인한 중산층 증가와 도시 인구 팽창에 따른 물, 에너지, 식량 등 필수 자원에 대한 수요 증가로 인해 유한한 자원에 대한 대응책이 시급한 실정이다. 또한 국내 자원의 대외 의존성이 높아 국제 자원 시장에 크게 영향을 받기 때문에 물-에너지-식량의 연계를 통한 자립적 자원확보가 필요하다. 국내에서도 수자원 자체만의 기존 기술 한계를 극복하기 위한 물-에너지, 물-식량 연계신기술 개발과 지속가능한 활용방안이 필요한 실정으로 현재 미국, 일본, 유럽 등 주요 선진국을 중심으로 물관리와 연계한 에너지의 효율화 및 수자원이 갖는 에너지의 회수와 적극적 활용이 추진되고 있다. 이를 반영하여, 국내의 경우 독립적으로 구분되는 이수, 치수, 물순환 건전화 등 주요 물관리 이슈에 대하여 에너지, 식량 분야를 연계한 통합적이고 효율적인 지속가능 방안제시가 필요하다. 이를 위해 자원안보의 선제적 대응을 위한 구체적이고 실질적인 물-에너지-식량의 연계 기술이 필요하며, 국내 실정에 적합한 기술의 도입이 필요하다. 즉 (1) WEF 데이터공유 및 범정부적 의사결정을 위한 다부처 협업체계 구축을 위한 Bigdata기반 부처간 데이터베이스 구축 및 공유 (2) 기후변화 적응 자원연계 솔루션 개발 및 넥서스 영향평가 툴 개발을 위한 자원 효율성 증대를 위한 연계 기술 고도화 (3) 국내(미래넥서스시티 versus 지자체자립형넥서스마을), 해외 on-demand형의 미래자원관리 패키지기술 실증을 위한 국내외 Testbed구축 및 운영 (4) 기술의 실현을 위한 제도, 정책의 개선 및 국민 공감대 형성을 위한 WEF 넥서스 거버넌스 수립 및 개선으로 구분할 수 있다. 이를 통해, 물-에너지-식량 분야 상호 연계를 통한 분야별 "생산-가공-유통처리" 효율 30% 개선, 20C SOC 시설산업기반에서 21C 사회 인프라 국민 서비스 산업으로 전환을 통한 국가 신산업기반 구축, 4차 산업혁명의 Data Technology 분야에서 세계 최초의 공공기반 WEF 연계 패키지 기술 개발 들이 가능할 것으로 판단된다.

  • PDF

Establishment of a public safety network app security system (재난안전망 앱 보안 체계 구축)

  • Baik, Nam-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1375-1380
    • /
    • 2021
  • Korea's security response to application service app is still insufficient due to the initial opening of the public safety network. Therefore, preemptive security measures are essential. In this study, we proposed to establish a 'public safety network app security system' to prevent potential vulnerabilities to the app store that distributes app in public safety network and android operating system that operate app on dedicated terminal devices. In order for an application service app to be listed on the public safety network mobile app store, a dataset of malicious and normal app is first established to extract characteristics and select the most effective AI model to perform static and dynamic analysis. According to the analysis results, 'Safety App Certificate' is certified for non-malicious app to secure reliability for listed apps. Ultimately, it minimizes the security blind spots of public safety network app. In addition, the safety of the network can be secured by supporting public safety application service of certified apps.

Comparative Analysis of Cyber Attacks of Korea Government and Policy Countermeasures (한국의 사이버공격 비교 분석과 정책적 대응방안)

  • Kwon, Hyeokchun;Lee, Youngjun;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.19-26
    • /
    • 2020
  • The purpose of this paper is to ccompare and analyze North Korean cyber attacks and our responses by government, from the Roh Moo-hyun administration to the Moon Jae-in administration. The current conflict of interests on the Korean peninsula, such as the United States, China, and Russia, is leading to a conflict for the leadership of a new world order in cyberspace. Cyber attacks are accelerating and threats are rising. Cyber threats exhibit several characteristics. Above all, it is difficult to identify or track the subject of the threat. Also, with the development of information and communication technology, attack technology has become more intelligent, and it is not easy to prepare a means to respond. Therefore, it is necessary to improve continuous and preemptive response capacity for national cybersecurity, and to establish governance among various actors, such as international cooperation between countries or private experts.

A Case Study on the Prevention of Construction Delays Using the Delay Management Index in Program Level Construction Projects (프로그램 수준 건설사업에서 지연관리지수(Delay Management Index)를 활용한 공사지연 예방 사례연구)

  • Yu, Jun-Hyeok;Kim, Ok-Kyue
    • Journal of the Korea Institute of Building Construction
    • /
    • v.21 no.4
    • /
    • pp.347-359
    • /
    • 2021
  • Recently, construction projects have emerged in the form of program management, which is complicated by the large-scale of construction, and requires astronomical construction costs. In particular, projects that absolutely require management at the program level, such as large-scale construction projects, require overall control of the planned schedule and cost as a set of various projects, including infrastructure. But in Korea, there is no specific management standard for delays in construction. In order to avoid the risk of cost increase and project delay in the program-level construction project, it is necessary to apply more systematic management standards to prevent delay and to take a more preemptive response in the construction process. Therefore, in this study, a delay management index (DMI) was developed to successfully carry out large-scale construction projects at the program level and prevent delays in advance. In addition, case studies were conducted for large-scale construction projects, and a delay prevention system was established for program-level construction projects.

AI-based Construction Site Prioritization for Safety Inspection Using Big Data (빅데이터를 활용한 AI 기반 우선점검 대상현장 선정 모델)

  • Hwang, Yun-Ho;Chi, Seokho;Lee, Hyeon-Seung;Jung, Hyunjun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.6
    • /
    • pp.843-852
    • /
    • 2022
  • Despite continuous safety management, the death rate of construction workers is not decreasing every year. Accordingly, various studies are in progress to prevent construction site accidents. In this paper, we developed an AI-based priority inspection target selection model that preferentially selects sites are expected to cause construction accidents among construction sites with construction costs of less than 5 billion won (KRW). In particular, Random Forest (90.48 % of accident prediction AUC-ROC) showed the best performance among applied AI algorithms (Classification analysis). The main factors causing construction accidents were construction costs, total number of construction days and the number of construction performance evaluations. In this study an ROI (return of investment) of about 917.7 % can be predicted over 8 years as a result of better efficiency of manual inspections human resource and a preemptive response to construction accidents.

Modeling Species Distributions to Predict Seasonal Habitat Range of Invasive Fish in the Urban Stream via Environmental DNA

  • Kang, Yujin;Shin, Wonhyeop;Yun, Jiweon;Kim, Yonghwan;Song, Youngkeun
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.3 no.1
    • /
    • pp.54-65
    • /
    • 2022
  • Species distribution models are a useful tool for predicting future distribution and establishing a preemptive response of invasive species. However, few studies considered the possibility of habitat for the aquatic organism and the number of target sites was relatively small compared to the area. Environmental DNA (eDNA) is the emerging tool as the methodology obtaining the bulk of species presence data with high detectability. Thus, this study applied eDNA survey results of Micropterus salmoides and Lepomis macrochirus to species distribution modeling by seasons in the Anyang stream network. Maximum Entropy (MaxEnt) model evaluated that both species extended potential distribution area in October compared to July from 89.1% (12,110,675 m2) to 99.3% (13,625,525 m2) for M. salmoides and 76.6% (10,407,350 m2) to 100% (13,724,225 m2) for L. macrochirus. The prediction value by streams was varied according to species and seasons. Also, models elucidate the significant environmental variables which affect the distribution by seasons and species. Our results identified the potential of eDNA methodology as a way to retrieve species data effectively and use data for building a model.

A Study on the Improvement of Aviation Safety Management System through Analysis of Legal System and Data Status (법제도 및 데이터 현황 분석을 통한 항공안전관리시스템 개선방안 연구)

  • Hae-yoon Byeon;Hyun-Jin Jeong
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.1
    • /
    • pp.105-116
    • /
    • 2023
  • Purpose: The purpose of this study is to present the preemptive prevention and improvement measures for aviation safety management by examining the current status of the aviation industry and the operation system of the aviation safety management system and identifying the shortcomings of the currently operating aviation safety management system. Method: A plan to improve aviation safety management was proposed through an analysis of recent incidents and accidents, current status of domestic laws, and analysis of overseas operating institutions and safety management systems. Result: Through the recent aircraft safety-related incidents, deficiencies of currently operating aviation safety management, and response cases of advanced countries in overseas aviation, improvement points in terms of management systems and laws and preventive aviation safety management plans were derived. Conclusion: The method for improving aviation safety management was presented based on the technique using data, and it should be materialized through additional related research.

Infrastructure Anomaly Analysis for Data-center Failure Prevention: Based on RRCF and Prophet Ensemble Analysis (데이터센터 장애 예방을 위한 인프라 이상징후 분석: RRCF와 Prophet Ensemble 분석 기반)

  • Hyun-Jong Kim;Sung-Keun Kim;Byoung-Whan Chun;Kyong-Bog, Jin;Seung-Jeong Yang
    • The Journal of Bigdata
    • /
    • v.7 no.1
    • /
    • pp.113-124
    • /
    • 2022
  • Various methods using machine learning and big data have been applied to prevent failures in Data Centers. However, there are many limitations to referencing individual equipment-based performance indicators or to being practically utilized as an approach that does not consider the infrastructure operating environment. In this study, the performance indicators of individual infrastructure equipment are integrated monitoring and the performance indicators of various equipment are segmented and graded to make a single numerical value. Data pre-processing based on experience in infrastructure operation. And an ensemble of RRCF (Robust Random Cut Forest) analysis and Prophet analysis model led to reliable analysis results in detecting anomalies. A failure analysis system was implemented to facilitate the use of Data Center operators. It can provide a preemptive response to Data Center failures and an appropriate tuning time.