• Title/Summary/Keyword: security technology

Search Result 6,816, Processing Time 0.033 seconds

An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment (디지털 컴퓨팅 환경의 디지털 증거화를 위한 침해 데이터보증 메커니즘)

  • Jang, Eun-Gyeom
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.129-141
    • /
    • 2010
  • In digital computing environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

A Study on Disclosure & Utilizing Plan for Closed National R&D Reports Information (비공개 국가연구개발보고서 정보의 공개 및 활성화 방안 연구)

  • Choi, Kwang-Nam;Yoon, Chong-Min
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.1
    • /
    • pp.233-254
    • /
    • 2011
  • According to the current legislation in Korea, some of national R&D reports cannot be disclosed or registered, when they need external security or the interested parties require them to be classified for a certain period of time. Therefore, there are some effects on the collection and circulation of information about R&D reports. Since those closed national R&D reports are the important outcomes from national R&D projects, they should be properly open, circulated and used by the public, when the reasons for closing those reports are removed. This study examines the present condition of the closure system of national R&D reports, and proposes a plan for collecting and utilizing the closed national R&D reports at the national level.

Korea National Health Insurance Service Financial Status and Prospect (건강보험 재정 현황과 전망)

  • Joo, Jae Hong;Jang, Sung-In;Park, Eun-Cheol
    • Health Policy and Management
    • /
    • v.30 no.2
    • /
    • pp.192-198
    • /
    • 2020
  • Background: Korea National Health Insurance Service (NHIS) is operated as a social insurance system in which people pay a portion of their monthly income as insurance premiums and receive benefits when they experience illness or injury. Since 2005, the national health insurance remained surplus accumulating cumulative reserves each year. However, as of 2018, NHIS revenue recorded 62.11 trillion won and spending of 62.29 trillion won. The deterioration of NHIS finances is expected to accelerate with the aging population, income growth, new medical technology development, and enhanced security policies. Methods: To examine the financial health and sustainability of NHIS, we estimated the future revenue and spending until 2030 using the data from Korea Health Insurance Review and Assessment Service statistical yearbook. 2004-2018 average percentage change in NHIS revenue and spending was calculated. We estimated the future NHIS financial status using two methods. In the first method, we calculated the revenue and spending of the future NHIS by applying the 2004-2018 average percentage change to the subsequent years consecutively. In the second method, we estimated the future NHIS financial status after adjusting for the predicted demographic changes such as the aging population and declining birth rate in South Korea. Results: The estimates from this study suggest that the NHIS's cumulative reserves will run out by 2024. Conclusion: In terms of spending on current health insurance, there should be a search for ways of more efficient spending and funding options.

Utilization of Soil Resources for Maximum Production of Food Grains (식량 최대생산을 위한 토양자원 이용)

  • Sin Je Seong;Kim Lee Yeol
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 1999.11a
    • /
    • pp.145-167
    • /
    • 1999
  • Our self-sufficiency of food has become less than $30{\%}$ and our nation is highly dependant on world's grain market for food. which is unstable in long term due to the world population growth faster than food production. Therefore, it is a great possibility that food might become a political weapon by way of its global shortage. its purchasing difficulty in international free trade market. and the resultant price rising. Our maximal capability of food production has become the most outstanding problem in the dimension of future food security. It would be the utmost scheme for maximal production of food to realize the maximal utilization of arable land through the enlargement of sufficient farming land and the conversion of rotation system for the more grain production. Extensional enlargement of arable land can be positively executed through the development of farming land in domestic and abroad countries. The readjustment of arable land and the installation or irrigation and drainage system can enforce the farming basement for maximal utilization of arable land through the improved rotation between paddy and upland. The prevention policy against farming land encroachment should be strictly executed through grain production encouragement on resting or marginal lands and regulation of utilization conversion for the other than food production on high grade farming lands. It is also required urgently to develope high yielding and high quality varieties through advanced genetic technology for the improvement of unit area yield, especially of wheat, corn. and soybean we import in large quantity The maximal utilization of arable land for the highest production of food can be realized through rational rotation system, the most adaptable crop cultivation on the suitable land, and the most optimal fertilization through the GIS analysis of agricultural environment information on the basis of the computerized soil resource data on super detailed soil maps(1:5000) surveyed plot by plot of whole nation.

  • PDF

A Study on the Design of CBRN Response Training Program in Korea Using Activity-Action Diagram Method (Activity-Action Diagram 기법을 활용한 한국형 화생방 교육훈련 프로그램 설계에 관한 연구)

  • Ham, Eun-Gu;Kim, Tae-Hwan
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.1
    • /
    • pp.159-169
    • /
    • 2014
  • The development of science and technology to accompany the convenience of civilization but in addition to nuclear, gas, explosion, accident and spill all over the world with the possibility of a chemical or biological terrorism response efforts collectively as a response to the urgent task of a nation. In this study major economies such as the U.S. and Canada analyzed to investigate the CBRN training programs to fit the reality in Korea CBRN training programs were developed. also the development of training programs to CBRN Korean Activity-Action Diagram technique utilized by CBRN scenarios corresponding to each event needs to be taken when the Activity is defined by its detailed definition of corrective actions for the CBRN Activity to define context-sensitive actions in particular to enable the functionality of the structure in case of CBRN emergency initial response was to establish education and training programs.

ECONOMIC AND SOCIOLOGICAL ISSUES OF THE TRANSITION TO COMPUTER BASED ENGINEERING EDUCATION

  • Bordia Surek
    • Journal of Engineering Education Research
    • /
    • v.5 no.1
    • /
    • pp.68-76
    • /
    • 2002
  • It is proposed to raise the debate on Engineering and Technical Education at the global economic level and to examine some of the issues facing developing and poorer countries in managing and improving the quality of engineering education in their countries, especially in the context of internet and IT culture After the fall of the Berlin Wall, the world is now divided in two realigned blocks: one of developed(rich or advanced) countries which have a social security safety net for their population and another of developing(or poor) countries which have no such luxuries for their population. For the general public in the developing countries, any engineering or technical degree/diploma is a passport to lifelong wellbeing of an individual and his/her extended family. Therefore, the demand for such qualifications is very high and it is almost a rat race amongst school leavers to get into engineering/technical colleges. In view of this booming demand, there are hundreds of privately funded engineering/technical colleges in countries like Philippines, India, Thailand, etc., besides state funded ones. It is extremely difficult to ensure good quality in this mushrooming scenario. There are also many very small poorly resourced developing countries where there is only one engineering school and/or two-three technical colleges. Products of these schools/colleges work only in their own country and education globalization have little or no meaning for them. Besides highlighting the aforementioned general issues, the Paper also presents a few case studies on problems of accreditation and quality assessment in larger developing countries like India and the Philippines. The Paper also discusses the effects of commercialization on the quality of education and social impacts of IT revolution on educational processes.

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

Proposal of Wireless Communication Method and Candidate Frequency Band for Constructing the Integrated Radio Networks for Railroads (철도통합 무선망 구축을 위한 무선통신방식과 후보주파수대역 제안)

  • Park, Duk-Kyu;Lee, Sang-Yun;Yoon, Byungsik;Kim, Yong-Kyu
    • Journal of the Korean Society for Railway
    • /
    • v.16 no.6
    • /
    • pp.510-518
    • /
    • 2013
  • These days, interest in radio networks for railways has increased both at home and abroad. In response to this trend, not only the existing radio networks which focus on railway control signals but also the next-generation integrated radio network that can send videos and manage mass storage data are actively being investigated. This paper proposes wireless communication methods to establish integrated radio networks for railways. The paper further suggests a candidate frequency band that could be allocated as the frequency band for railways among the frequency bands currently used in Korea. Based on this paper, we can expect that the domestic railroad will operate more efficiently and that security and convenience of the railroad will reach a superior level. In addition, the Korean integrated radio networks for railways, which cope with the changes in the global technology market, will be established.

Authentication Method using Multiple Biometric Information in FIDO Environment (FIDO 환경에서 다중 생체정보를 이용한 인증 방법)

  • Chae, Cheol-Joo;Cho, Han-Jin;Jung, Hyun Mi
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.159-164
    • /
    • 2018
  • Biometric information does not need to be stored separately, and there is no risk of loss and no theft. For this reason, it has been attracting attention as an alternative authentication means for existing authentication means such as passwords and authorized certificates. However, there may be a privacy problem due to leakage of personal information stored in the server. To overcome these weaknesses, FIDO solved the problem of leakage of personal information on the server by using biometric information stored on the user device and authenticating. In this paper, we propose a multiple biometric authentication method that can be used in FIDO environment. In order to utilize multiple biometric information, fingerprints and EEG signals can be generated and used in FIDO system. The proposed method can solve the problem due to limitations of existing 2-factor authentication system by authentication using multiple biometric information.

Network Overhead Improvement for MHT-based Content Authentication Scheme (MHT 기반 콘텐츠 인증 기술의 전송량 개선)

  • KIM, DAEYOUB
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.271-279
    • /
    • 2018
  • Various technologies have been developed to more efficiently share content such as P2P and CDN. These technologies take a common approach that request packets are responded by distributed network nodes, not by a single distributor. Such approaches not only resolve network congestion around content distributors, but also make it possible to distribute content regardless of the system and network status of content distributors. However, when receiving content from distributed nodes/hosts, not from authenticated distributors, users cannot practically identify which node/host sent content to them. Due to this characteristic, various hacking caused by the malicious modification of content is possible. Therefore, to make such approaches more secure, a content authentication technique is required. In this paper, we propose a improved operation of MHT used in CCN for authenticating distributed content. Then we evaluate the proposed method by comparing its performance with the existing technology.