• Title/Summary/Keyword: security evaluation system

Search Result 682, Processing Time 0.026 seconds

Study on the Introduction of EMC Engineering System in Korea (전자파 엔지니어링 제도 도입 방안에 관한 연구)

  • Chung, Yeon-Choon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.8
    • /
    • pp.942-949
    • /
    • 2012
  • In order to ensure the safety of the large-scale public facilities, the analysis of EMC(ElectroMagnetic Compatibility) of electronic systems included in the facilities is very necessary. The reason is that the system-level EMC of the facility could be not guaranteed, even if individual equipments included in the facility are satisfied with their EMC requirements. As a result, the system-level evaluation and analysis of EMC should be carried out in order to establish the reliable operations of safety and mission-critical electronic systems. This paper analyze the relevant legal systems of domestic and other countries, and furthermore case studies of system-level EMC approaches were analyzed in the specific applications of electric railways, building, automobile, petroleum refinery systems. And the introduction of related systems in Korea is proposed, and main parts and problems to be looked at each proposed measures are discussed. The results are expected to be utilized in the introduction of the system-level EMC engineering, and contributed in national security and the protection of people's life, body and their properties.

BER Performance Evaluation of Boss Map According to Delay Time in CDSK Modulation Scheme and Chaos Transceiver (CDSK 변조 방식과 카오스 송수신기의 지연시간에 따른 Boss Map의 BER 성능 평가)

  • Lee, Jun-Hyun;Keum, Hong-Sik;Lee, Dong-Hyung;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.365-371
    • /
    • 2014
  • Chaos communication system is possible to improve the system security by using chaos signal. Further, it is possible to reduce the possibility of eavesdropping, and have strong characteristics from interference signal and jamming signal. However, BER(Bit Error Rate) performance of chaos system is worse than digital communication system. By this reason, researches in order to improve the BER performance of chaos communication system are being actively studied. In previous studies, we proposed a novel chaos map for BER performance improvement, and called it 'Boss map'. Also, we proposed a novel chaos transceiver for BER performance improvement. However, BER performance is evaluated differently according to delay time in transceiver. Therefore, in order to use Boss map effectively, we should find the optimal delay time in proposed chaos transceiver. In this paper, when Boss map is used, we evaluate BER performance of CDSK(Correlation Delay Shift Keying) system and novel chaos transceiver according to delay time. After evaluation of BER performance according to delay time, we find a delay time that is possible to have best BER performance in CDSK system and novel chaos transceiver.

Design and Evaluation of DRM Model with Strong Security Based on Smart Card (스마트카드 기반의 강한 보안을 갖는 DRM 모델의 설계 및 평가)

  • Park, Jong-Yong;Kim, Young-Hak;Choe, Tae-Young
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.165-176
    • /
    • 2011
  • Recently, digital rights management (DRM) related researches are widely spreading with prosperity of IT industries. The DRM technology protects proprietor of copyright by preventing mischanneling and illegal copy. In this paper, we propose a new DRM model that has an enhanced and efficient protocol based on certificate using smart card. The proposed model overcomes weaknesses of WCDRM model and has following additional advantages: first, copy protection is enhanced by hiding user's specific information from attacker by storing the information within smart card; second, server load for contents encryption is reduced by making clear protocols among author, distributer, certificate authority, and users; third, offline user authentication is guaranteed by combining partial secret values in media players and smart card. Exposure of core information also is minimized by storing them in smart card. In addition, we show that the proposed system is more secure than WCDRM model by comparing various factors of anonymous attackers.

Conceptual Study for Risk Assessment of Asset Management of Infra Structure System (국가기반시설 자산관리위험도분석 개념 연구)

  • Park, Mi Yun;Park, Hung Ju
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.43-47
    • /
    • 2012
  • The asset management of infra facilities is a total framework for finally supporting a safe and comfortable service, which includes functions of supporting evaluation of condition and performance of infrastructures, making the decision method of repair or rehabilitation of deteriorated facilities, and lengthening the life cycle of structure through the decision of adequate cost and time of repair or reinforcement. In the range of the asset management, organization, human, the target, and information & data of company are included. Therefore, in this paper, appling the method of asset management analysis to the infra structures, the process of the risk assesment using BRE (Business Risk Exposure) and the basis of consisting ORDM (Optimized Renewal Decision-Making) are expressed.

Efficiency of Financing High-Tech Industries: The Case of Kazakhstan

  • SADYKHANOVA, Gulnara;EREZHEPOVA, Aiman;NURMANOVA, Biken;AITBEMBETOVA, Aida;BIMENDIYEVA, Laila
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.4
    • /
    • pp.287-295
    • /
    • 2019
  • The study aims to build a model for evaluating the effectiveness of activities and the effectiveness of financial investments in high-tech industries in Kazakhstan. The development of high-tech industries plays an important role in the economic growth of a country. In this regard, it is relevant to study the effectiveness of financing the most important industry in Kazakhstan. The development of the high-tech sector ensures the efficient functioning of the national innovation system. High-tech enterprises are one of the competitive sectors that allow us to develop and implement leading-edge innovations with the goal of their subsequent commercialization domestically and abroad. The author defines the multicriteria of efficiency in a knowledge-based economy associated with achieving an economic effect with multivariate correlation of results with costs. A multivariate dynamic model, an integral indicator of performance, an integral indicator of cost-effectiveness is proposed. The assessment of the effectiveness of financial costs and performance indicators in all regions of Kazakhstan have the positive dynamics of indicators, as well as a high economic effect. The results of the study can be applied in regional management to adequately assess the effectiveness of high-tech organizations and the effectiveness of financial investments, contribution to ensuring the economic security of the region.

High Performance Pattern Matching algorithm with Suffix Tree Structure for Network Security (네트워크 보안을 위한 서픽스 트리 기반 고속 패턴 매칭 알고리즘)

  • Oh, Doohwan;Ro, Won Woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.6
    • /
    • pp.110-116
    • /
    • 2014
  • Pattern matching algorithms are widely used in computer security systems such as computer networks, ubiquitous networks, sensor networks, and so on. However, the advances in information technology causes grow on the amount of data and increase on the computation complexity of pattern matching processes. Therefore, there is a strong demand for a novel high performance pattern matching algorithms. In light of this fact, this paper newly proposes a suffix tree based pattern matching algorithm. The suffix tree is constructed based on the suffix values of all patterns. Then, the shift nodes which informs how many characters can be skipped without matching operations are added to the suffix tree in order to boost matching performance. The proposed algorithm reduces memory usage on the suffix tree and the amount of matching operations by the shift nodes. From the performance evaluation, our algorithm achieved 24% performance gain compared with the traditional algorithm named as Wu-Manber.

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization (가상화 환경 위험도 관리체계화를 위한 취약점 분석)

  • Park, Mi-Young;Seung, Hyen-Woo;Lim, Yang-Mi
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine's vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.

Design and Implementation of Multimedia CAI Program for Learning about Electricity in the Mechanics Curriculum (기술과 전기 학습을 위한 멀티미디어 CAI 프로그램 설계 및 구현)

  • Lee, Hyae-Joung;Shin, Hyun-Cheul;Joung, Suck-Tae
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.9-16
    • /
    • 2007
  • In today's society, the paradigm is converted to information where both this and knowledge become the source of value added. In order to answer societies' needs school education is subject to a large change, that is 'from supplier-centered learners to demand-centered learners'. This study is the design and implementation of multimedia CAI program for learning about electricity in the meddle school the mechanics curriculum with a focus in generating electricity. Based on multimedia, software, educational utilization of the multimedia, CAI, learning theory and form, both technology and multimedia elements related to curriculum are analyzed. This title is composed of object, contents, evaluation and related sites every chapter for students to study. Also, it is designed for students to take interest and participate in the learning process actively by combining lots of media such as characters, sound, images and animation. Specially it is composed in a way of repetition according to the student's level.

  • PDF

Using Genetic Algorithms for Routing Metric in Wireless Mesh Network (무선 메쉬 네트워크에서 유전 알고리즘을 이용한 라우팅 메트릭 기법)

  • Yoon, Chang-Pyo;Shin, Hyo-Young;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.11-18
    • /
    • 2011
  • Wireless mesh network technology with transmission speeds similar to wired and wireless technology means to build, compared with wired networks, building a more efficient network to provide convenience and flexibility. The wireless mesh network router nodes in the energy impact of the mobility is less constrained and has fewer features entail. However, the characteristics of various kinds due to network configuration settings and the choice of multiple paths that can occur when the system overhead and there are many details that must be considered. Therefore, according to the characteristics of these network routing technology that is reflected in the design and optimization of the network is worth noting. In this paper, a multi-path setting can be raised in order to respond effectively to the problem of the router node data loss and bandwidth according to traffic conditions and links to elements of the hop count evaluation by using a genetic algorithm as a workaround for dynamic routing the routing metric for wireless mesh network scheme is proposed.