• Title/Summary/Keyword: security technology

Search Result 6,551, Processing Time 0.037 seconds

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.

A Study on the AI Home Care Solution for the Mobile Vulnerable (이동약자를 위한 AI 홈케어 솔루션에 관한 연구)

  • ChangBae Noh;Wonshik Na
    • Journal of Industrial Convergence
    • /
    • v.21 no.4
    • /
    • pp.165-170
    • /
    • 2023
  • There are cases where the mobility impaired have difficulty moving from the moment they leave the house. If guardians also do not have time to entrust their families, who are socially disadvantaged, to a shelter, the guardian has no choice but to check directly in order to know the location of the guardian. The AI home care solution was designed to relieve the anxiety and labor of caregivers and to provide convenience for protection facility officials and users. If more facilities distribute and use services free of charge to non-profit foundations and protective facilities, the concern of guardians will be reduced, and the burden of facility officials who have to manage facility users will be reduced. In this paper, we provide emergency notification services to guardians in the event of an emergency as well as location and status alarms for guardians, which are all data related to movement, in consideration of the mobility vulnerable. Furthermore, it is necessary to provide a service function that recommends the optimal route using a navigation function to ease the convenience and burden of facility officials. It is necessary to alleviate anxiety by providing necessary information to the guardian, such as the location of the shuttle used by the mobile weak and the time of getting on and off. In addition, while providing services for free, the goal is to improve the quality of service for facility managers and the quality of service for the mobility weak.

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF

Design and Implementation of Economical Smart Wall Switch with IEEE 802.11b/g/n

  • Myeong-Chul Park;Hyoun-Chul Choi;Cha-Hun Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.103-109
    • /
    • 2023
  • In this paper, we propose a smart wall switch based on IEEE 802.11b/g/n standard 2.4GHz band communication. As the 4th industrial era evolves, smart home solution development is actively underway, and application cases for smart wall switches are increasing. Most of the Chinese products that preoccupy the market through price competitiveness use Bluetooth and Zigbee communication switches. However, while ZigBee communication is low power, communication speed is slower than Bluetooth and network configuration through a separate hub is additionally required. The Bluetooth method has problems in that the communication range and speed are lower than Wi-Fi communication, the communication standby time is relatively long, and security is weak. In this study, an IEEE 802.11b/g/n smart wall switch applied with Wi-Fi communication technology was developed. In addition, through the two-wire structure, it is designed so that no additional cost is incurred through the construction of a separate neutral line in the building. The result of the study is more than 30% cheaper than the existing wall switch, so it is judged that it will be able to preoccupy the market not only in terms of technological competitiveness but also price competitiveness.

Developing an Occupants Count Methodology in Buildings Using Virtual Lines of Interest in a Multi-Camera Network (다중 카메라 네트워크 가상의 관심선(Line of Interest)을 활용한 건물 내 재실자 인원 계수 방법론 개발)

  • Chun, Hwikyung;Park, Chanhyuk;Chi, Seokho;Roh, Myungil;Susilawati, Connie
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.5
    • /
    • pp.667-674
    • /
    • 2023
  • In the event of a disaster occurring within a building, the prompt and efficient evacuation and rescue of occupants within the building becomes the foremost priority to minimize casualties. For the purpose of such rescue operations, it is essential to ascertain the distribution of individuals within the building. Nevertheless, there is a primary dependence on accounts provided by pertinent individuals like building proprietors or security staff, alongside fundamental data encompassing floor dimensions and maximum capacity. Consequently, accurate determination of the number of occupants within the building holds paramount significance in reducing uncertainties at the site and facilitating effective rescue activities during the golden hour. This research introduces a methodology employing computer vision algorithms to count the number of occupants within distinct building locations based on images captured by installed multiple CCTV cameras. The counting methodology consists of three stages: (1) establishing virtual Lines of Interest (LOI) for each camera to construct a multi-camera network environment, (2) detecting and tracking people within the monitoring area using deep learning, and (3) aggregating counts across the multi-camera network. The proposed methodology was validated through experiments conducted in a five-story building with the average accurary of 89.9% and the average MAE of 0.178 and RMSE of 0.339, and the advantages of using multiple cameras for occupant counting were explained. This paper showed the potential of the proposed methodology for more effective and timely disaster management through common surveillance systems by providing prompt occupancy information.

A Study on the Introductioin of Data Trusts System to Expand the Rights of Privacy Self-Determination (개인정보 자기결정권 확대를 위한 데이터 신탁제도 도입 방안 연구)

  • Jang, Keunjae;Lee, Seungyong
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.29-43
    • /
    • 2022
  • With the advent of the Internet and the development of mobile digital devices such as smartphones and tablet PCs, the communication service paradigm began to shift from existing voice services to data services. Recently, as social network services (SNS) are activated and 4th industrial revolution technologies centered on ICT (Information and Communication Technologies) such as Big Data, Blockchain, Cloud, and 5G/6G are rapidly developed, the amount of shared data type and the amount of data are increasing rapidly. As the transition to a digital society begins actively, the importance of using data information, as well as the economic and social values of personal information are becoming increasingly important. As a result, they are actively discussing policies to revitalize the data information industry around the world and ways to efficiently obtain, analyze, and utilize increasingly diverse and vast data, as well as to protect/guarantee the rights of information subjects (providers) in various fields such as society, culture, economy, and politics.. In this paper, in order to improve the self-determination right of personal information on data produced by information subjects, and further expand the use of safe data and the data economy, a differentiated data trusts system was considered and suggested. In addition, the components and data trusts procedures necessary to efficiently operate the data trusts system in Korea were considered, and the non-profit data trusts system and the for-profit data trusts system were considered as a way to flexibly operate the data trusts system. Furthermore, the legal items necessary for the implementation of the data trusts system were investigated and considered. In this paper, in order to propose a domestic data trusts system, cases related to existing data trusts systems such as the United States, Japan, and Korea were reviewed and analyzed. In addition, in order to prepare legislation necessary for the data trusts system, data-related laws in major countries and domestic legal and policy trends were reviewed to study the rights that conflict or overlap with existing laws, and differences were investigated and considered. The Data trusts system proposed in this paper is a reasonable system that is expected to recognize the asset value of data in the capitalist market economy system, to provide legitimate compensation for data produced by data subjects, and further to contribute greatly to the use of safe data and creation of a new service market.

A Study on Risk Issues and Policy for Future Society of Digital Transformation: Focusing on Artificial Intelligence (디지털 전환의 미래사회 위험이슈 및 정책적 대응 방향: 인공지능을 중심으로)

  • Koo, Bonjin
    • Journal of Technology Innovation
    • /
    • v.30 no.1
    • /
    • pp.1-20
    • /
    • 2022
  • Digital transformation refers to the economic and social effects of digitisation and digitalisation. Although digital transformation acts as a useful tool for economic/social development and enhancing the convenience of life, it can have negative effects (misuse of personal information, ethical problems, deepening social gaps, etc.). The government is actively establishing policies to promote digital transformation to secure competitiveness and technological hegemony, however, understanding of digital transformation-related risk issues and implementing policies to prevent them are relatively slow. Thus, this study systematically identifies risk issues of the future society that can be caused by digital transformation based on quantitative analysis of media articles big data through the Embedded Topic Modeling method. Specifically, first, detailed issues of negative effects of digital transformation in major countries were identified. Then detailed issues of negative effects of artificial intelligence in major countries and Korea were identified. Further, by synthesizing the results, future direction of the government's digital transformation policies for responding the negative effects was proposed. The policy implications are as follows. First, since the negative effects of digital transformation does not only affect technological fields but also affect the overall society, such as national security, social issues, and fairness issues. Therefore, the government should not only promote the positive functions of digital transformation, but also prepare policies to counter the negative functions of digital transformation. Second, the detailed issues of future social risks of digital transformation appear differently depending on contexts, so the government should establish a policy to respond to the negative effects of digital transformation in consideration of the national and social context. Third, the government should set a major direction for responding negative effects of digital transformation to minimize confusion among stakeholders, and prepare effective policy measures.

Technology Standards Policy Support Plans for the Advancement of Smart Manufacturing: Focusing on Experts AHP and IPA (스마트제조 고도화를 위한 기술표준 정책영역 발굴 및 우선순위 도출: 전문가 AHP와 IPA를 중심으로)

  • Kim, Jaeyoung;Jung, Dooyup;Jin, Young-Hyun;Kang, Byung-Goo
    • Informatization Policy
    • /
    • v.30 no.4
    • /
    • pp.40-61
    • /
    • 2023
  • The adoption of smart factories and smart manufacturing as strategies to enhance competitiveness and stimulate growth in the manufacturing sector is vital for a country's future competitiveness and industrial transformation. The government has consistently pursued smart manufacturing innovation policies starting with the Manufacturing Innovation 3.0 strategy in the Ministry of Industry. This study aims to identify policy areas for smart factories and smart manufacturing based on technical standards. Analyzing policy areas at the current stage where the establishment and support of domestic standards aligning with international technical standards are required is crucial. By prioritizing smart manufacturing process areas within the industry, policymakers can make well-informed decisions to advance smart manufacturing without blindly following international standardization in already well-established areas. To achieve this, the study utilizes a hierarchical analysis method including expert interviews and importance-performance analysis for the five major process areas. The findings underscore the importance of proactive participation in standardization for emerging technologies, such as data and security, instead of solely focusing on areas with extensive international standardization. Additionally, policymakers need to consider carbon emissions, energy costs, and global environmental challenges to address international trends in export and digital trade effectively.

Utilizing Abandoned Mines in Regional Development: Feasibility of Underground Data Centers and Public Sports Facilities (폐광지역발전을 위한 폐광산 활용방안 연구: 지하 데이터센터 및 공공체육시설로의 운용성 평가)

  • Hyeong-Geol Kim;Ganghui Kim;Sanghyun Bin;Won-Sik Woo;Jongmun Cha;Chang-Uk Hyun
    • The Journal of Engineering Geology
    • /
    • v.33 no.4
    • /
    • pp.737-753
    • /
    • 2023
  • Abandoned mines represent unused space resulting from resource use and changes in industrial environments. Efforts are underway to repurpose such underground spaces, leveraging their unique attributes of temperature stability, shading, and security. This study aimed to assess the feasibility of operating high-demand data centers and public sports facilities as potential recycling options for abandoned mine spaces. The status of data centers located in abandoned mines abroad was examined, including their operational technology capitalizing on the advantages of underground spaces. Considering the varying sizes of underground spaces in different types of abandoned mine in South Korea, the suitability of installing facilities for 12 different sports was evaluated for potential contributions to the health and welfare of local residents. The utilization of abandoned mine spaces as data centers and public sports facilities is expected to not only recycle industrial heritage but also to allow new development opportunities for local communities.

Multi-Objective Onboard Measurement from the Viewpoint of Safety and Efficiency (안전성 및 효율성 관점에서의 다목적 실선 실험)

  • Sang-Won Lee;Kenji Sasa;Ik-Soon Cho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.116-118
    • /
    • 2023
  • In recent years, the need for economical and sustainable ship routing has emerged due to the enforced regulations on environmental issues. Despite the development of weather forecasting technology, maritime accidents by rough waves have continued to occur due to incorrect weather forecasts. In this study, onboard measurements are conducted to observe the acutal situation on merchant ships in operation encountering rough waves. The types of measured data include information related to navigation (Ship's position, speed, bearing, rudder angle) and engine (engine revolutions, power, shaft thrust, fuel consumption), weather conditions (wind, waves), and ship motions (roll, pitch, and yaw). These ship experiments was conducted to 28,000 DWT bulk carrier, 63,000 DWT bulk carrier, 20,000 TEU container ship, and 12,000 TEU container ship. The actual ship experiment of each ship is intended to acquire various types of data and utilize them for multi-objective studies related to ship operation. Additionally, in order to confirm the sea conditions, the directional wave spectrum was reproduced using a wave simulation model. Through data collection from ship experiments and wave simulations, various studies could be proceeding such as the measurement for accurate wave information by marine radar and analysis for cargo collapse accidents. In addition, it is expected to be utilized in various themes from the perspective of safety and efficiency in ship operation.

  • PDF