• Title/Summary/Keyword: security inspection

Search Result 222, Processing Time 0.025 seconds

A Study of Security Checks for Android Least Privilege - focusing on mobile financial services - (모바일 앱 최소권한 사전검증에 관한 연구 - 금융, 안드로이드 운영체제 중심으로 -)

  • Cho, Byung-chul;Choi, Jin-young
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.91-99
    • /
    • 2016
  • A security system in Android OS adopts sandbox and an permission model. In particular, the permission model operates the confirmation of installation time and all-or-nothing policy. Accordingly, the Android OS requires a user agreement for permission when installing an application, however there is very low level of user awareness for the permission. In this paper, the current status of permission requirement within mobile apps will be discovered, and the key inspection list with an appropriate method, when a mobile service provider autonomously inspects the violation of least privilege around financial companies, and its usefulness will be explored.

A Study on the influence of firm's Information Security Activities on the Information Security Compliance Intention of Employees (기업의 정보보안 활동이 구성원의 정보보안 준수의도에 미치는 영향 연구)

  • Jung, Jaewon;Lee, Jung-hoon;Kim, Chae-ri
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.51-59
    • /
    • 2016
  • An internal and external threat against an information system has increased, and to reduce it, organization has spent a great deal of money and manpower. However, in spite of such investment, security threat and trouble have happened continuously. Organization has conducted information security activity through various policies. The study classified such activities into prevention-oriented activity and control-oriented activity, and researched how information security activity of organization affects members of an organization and obeys information security policy by using health belief model. As a result of the study, prevention-oriented activity has a meaningful impact on seriousness, and this seriousness affects compliance intention for information security. Control-oriented activity has a meaningful impact on benefits, and the benefits have an effect on compliance intention. When an organization conducts prior activities such as education, PR, and monitoring, this organization should emphasize negative results that can happened because of deviation. In addition, in case of exposure and punishment through post activities such as inspection and punishment, if the organization emphasizes the positive effects of exposure and punishment rather than emphasis of negative parts, information security activity will be more effective.

A Study on the Mechanical Characteristics of Tunnel Structures and Ground Behavior by Synthetic Analysis Method with Tunnel Monitoring Results used (터널의 계측결과 종합분석에 의한 지반의 거동 및 터널 구조체의 역학적 특성 연구)

  • Woo, Jong-Tae
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.7 no.3
    • /
    • pp.115-124
    • /
    • 2003
  • In this study, the relationships between the displacement and stress of the tunnel using various analysis methods were compared with monitoring results carried out during construction and maintenance monitoring. The behavior of tunnel were measured in the subway tunnel passing comparative soft the weathering and analyzed both security and mechanical characteristics of the tunnel lining. With the results of simplified monitoring observed in top heading and bench excavation tunnel, it is confirmed that the crown settlement is larger than the surface settlement. it is interesting to note that the crown settlement and the crown shotcrete lining stress are widely used monitoring items for the back analysis. It is analyzed that the residual water pressure applied in the drainage type tunnel is reasonable.

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

A research for improvement methods in the aspect of safety engineering through risk analysis of facilities for multiple use - Focused on escalator and passenger conveyors - (다중이용시설물 위험분석을 통한 안전공학적 개선 방안에 관한 연구 (에스컬레이터 및 수평보행기를 중심으로))

  • Kwon, Sun-Geol;Kim, Jin-Soo;Kim, Chang-Eun
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.1
    • /
    • pp.31-40
    • /
    • 2013
  • For the matter of elevator, one of the multi-use facilities for unspecified public, the JIS has re-established and reformed to apply to the environment in South Korea for the past 20 years. In the aspect of safety assurance, it was inevitable to suggest improved measures. The government, Ministry of Public Administration and Security has secured the safety by enhancing the safety management functions in the elevator inspection standards and expanding its safety device measures. Further, the international inspection standard has been introduced, which is about unifying inspection standard system into the international standard code. In March 14th 2012, the international standard (EN) has been amended and fully announced. Escalator and passenger conveyor among lift devices have several common danger factor that cause safety accident. First, the accident caused by decreased braking power of brake. Second, the accident caused by the rate difference between handrail and tread-board. Third, the accident caused by defects of contraflow preventing device or carelessness inspection. Fourth, the accident caused by wet tread-board or wet floor of platform which makes passenger slip and fall. As the improvements to prevent and reduce these negligent accidents, the inspection list to check and methods should be subdivided and applied for each accident likelihood cause for safety management enhancement and safety assurance of existing escalator and passenger conveyors. The escalators and passenger conveyors without safety devices in existence should be obliged to modify the part of the system or install additional safety device. With making these measures obligations, it requires to improve the system to be suitable for the international inspection standard and to have measures to prevent safety accidents. It also needs to arrange improvements for skid accident of tread-board by the external environment factors such as snow and rain.

Material Discrimination Using X-Ray and Neutron

  • Jaehyun Lee;Jinhyung Park;Jae Yeon Park;Moonsik Chae;Jungho Mun;Jong Hyun Jung
    • Journal of Radiation Protection and Research
    • /
    • v.48 no.4
    • /
    • pp.167-174
    • /
    • 2023
  • Background: A nondestructive test is commonly used to inspect the surface defects and internal structure of an object without any physical damage. X-rays generated from an electron accelerator or a tube are one of the methods used for nondestructive testing. The high penetration of X-rays through materials with low atomic numbers makes it difficult to discriminate between these materials using X-ray imaging. The interaction characteristics of neutrons with materials can supplement the limitations of X-ray imaging in material discrimination. Materials and Methods: The radiation image acquisition process for air-cargo security inspection equipment using X-rays and neutrons was simulated using a GEometry ANd Tracking (Geant4) simulation toolkit. Radiation images of phantoms composed of 13 materials were obtained, and the R-value, representing the attenuation ratio of neutrons and gamma rays in a material, was calculated from these images. Results and Discussion: The R-values were calculated from the simulated X-ray and neutron images for each phantom and compared with those obtained in the experiments. The R-values obtained from the experiments were higher than those obtained from the simulations. The difference can be due to the following two causes. The first reason is that there are various facilities or equipment in the experimental environment that scatter neutrons, unlike the simulation. The other is the difference in the neutron signal processing. In the simulation, the neutron signal is the sum of the number of neutrons entering the detector. However, in the experiment, the neutron signal was obtained by superimposing the intensities of the neutron signals. Neutron detectors also detect gamma rays, and the neutron signal cannot be clearly distinguished in the process of separating the two types of radiation. Despite these differences, the two results showed similar trends and the viability of using simulation-based radiation images, particularly in the field of security screening. With further research, the simulation-based radiation images can replace ones from experiments and be used in the related fields. Conclusion: The Korea Atomic Energy Research Institute has developed air-cargo security inspection equipment using neutrons and X-rays. Using this equipment, radiation images and R-values for various materials were obtained. The equipment was reconstructed, and the R-values were obtained for 13 materials using the Geant4 simulation toolkit. The R-values calculated by experiment and simulation show similar trends. Therefore, we confirmed the feasibility of using the simulation-based radiation image.

Pool proof safety through the old apartments redesigned to ensure safety study (노후아파트 안전관리를 통한 풀 푸르프 재설계로 안전성 확보에 관한 연구)

  • Baek, Dong Seung;Lee, Jong Hyun;Park, Sung Bong
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.280-287
    • /
    • 2018
  • Purpose: The study is based on comparative review of the actual inspection of apartments and aims at proposing easy accessible and useful safety control which is enhanced from pre-existing safety apparatus. Method: On the basis of preceding research data of apartment buildings, the study presents reported problems and real condition of apartment buildings based on Housing Related Legislation and Housing Act. Results: Safety management plans and safety inspection for buildings are needed. When conducting a safety check, traceability management system for internal/exterior facilities should be available. Most important of all, 24 hour a day of self-management system for elevators, fire protection, and security cameras is necessary. Conclusion: Through the study, there should be a process of confirming problems of building security management; such as checking the management condition through apartments' resident representatives, and seeking improvement measures.

A Hybrid Multiple Pattern Matching Scheme to Reduce Packet Inspection Time (패킷검사시간을 단축하기 위한 혼합형 다중패턴매칭 기법)

  • Lee, Jae-Kook;Kim, Hyong-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.27-37
    • /
    • 2011
  • The IDS/IPS(Intrusion Detection/Prevention System) has been widely deployed to protect the internal network against internet attacks. Reducing the packet inspection time is one of the most important challenges of improving the performance of the IDS/IPS. Since the IDS/IPS needs to match multiple patterns for the incoming traffic, we may have to apply the multiple pattern matching schemes, some of which use finite automata, while the others use the shift table. In this paper, we first show that the performance of those schemes would degrade with various kinds of pattern sets and payload, and then propose a hybrid multiple pattern matching scheme which combines those two schemes. The proposed scheme is organized to guarantee an appropriate level of performance in any cases. The experimental results using real traffic show that the time required to do multiple pattern matching could be reduced effectively.

Method for improving video/image data quality for AI learning of unstructured data (비정형데이터의 AI학습을 위한 영상/이미지 데이터 품질 향상 방법)

  • Kim Seung Hee;Dongju Ryu
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.55-66
    • /
    • 2023
  • Recently, there is an increasing movement to increase the value of AI learning data and to secure high-quality data based on previous research on AI learning data in all areas of society. Therefore, quality management is very important in construction projects to secure high-quality data. In this paper, quality management to secure high-quality data when building AI learning data and improvement plans for each construction process are presented. In particular, more than 80% of the data quality of unstructured data built for AI learning is determined during the construction process. In this paper, we performed quality inspection of image/video data. In addition, we identified inspection procedures and problem elements that occurred in the construction phases of acquisition, data cleaning, labeling, and models, and suggested ways to secure high-quality data by solving them. Through this, it is expected that it will be an alternative to overcome the quality deviation of data for research groups and operators participating in the construction of AI learning data.

Analysis of Discriminant Accuracy of Estimated Load Carrying Capacity in Bridges (교량 추정 내하율 판별 정확도 분석)

  • Kyu San Jung;Dong Woo Seo;Byeong Cheol Kim;Gun Soo Kim;Ki Tae Park;Woo Jong Kim
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.4
    • /
    • pp.123-128
    • /
    • 2023
  • This paper presents the results of an analysis of the discrimination accuracy of a bridge load carrying capacity estimation model based on data from inspection reports. The load carrying rate estimation model was derived using statistical methods through the collection of 2,161 inspection reports. By entering the bridge specifications and maintenance information, you can check the estimated load carrying capacity of the bridge. In order to verify the discrimination accuracy of the estimated load carrying rate model, the estimated load carrying rate was compared with the load carrying rate in the inspection and diagnosis report for 164 public bridges for which data was available. Although there are differences depending on the bridge type, the results were obtained with an accuracy of over 80% in determining the estimated load carrying capacity.