• Title/Summary/Keyword: web mail

Search Result 244, Processing Time 0.027 seconds

Customer Satisfaction Improvement by Combining the Blue Print and Reliability Technique: Education Service Case Study (Blue Print와 신뢰성 기법을 혼합한 고객만족도 향상에 관한 연구: 교육서비스 사례)

  • Baek, Chun-Joo;Koo, Il-Seob;Lim, Ik-Sung;Kwon, Hong-Kyu
    • Journal of Applied Reliability
    • /
    • v.12 no.1
    • /
    • pp.13-24
    • /
    • 2012
  • This paper applied the Blue Print and FMEA (Failure Mode and Effect Analysis) to education service in order to raise the education service satisfaction. First, the Blue Print is deployed to come up with strategies to overcome the fail possibility point and waiting point. Next, in order to analyze the fail factors and alternative strategies, the Blue Print of education service is applied to FMEA. The results are as follows; first, the ommission from information document by web-mail or e-mail, Second, thing that selected in spite of company uneducated, thing that omitted despite the company is target, and the unsatisfaction of attendee about training contents. Third, the delay of counsel at the telephone reply, erroneous list of course name and attendee at HRD (Human Resource Development), omission of check whether attends or not. Except for unsatisfaction of attendee, all appears at the process that service delivered. And the unsatisfaction of attendee is about education contents. Both is the factor which have influence on the education service quality. The strategies to remove the failure mode are training and manual development on service and work, a thorough management and check of information system like as ERP (Enterprise Resoure Planning), HRD, education institution list DB (Data Base), on-line application system, a development of education program to offer best education that reflect the user needs and continuously changing environment.

A Study on the Phishing Attack Protection using RUL Spoofing (URL 스푸핑을 이용한 피싱 공격의 방어에 관한 연구)

  • Min Dong-og;Shon Tae-shik;Moon Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.35-45
    • /
    • 2005
  • There has recently been an increase of phishing attacks, attacks which lure users into revealing their personal information to an attacker who in turn exploits this information for economic gain. The conventional methods of fooling the user with similarly modified mail or address are constantly evolving and have diversified to include the forgery of mail or domain addresses. Recently the injury incurred by these attacks has greatly increased as attackers exploit the weaknesses found on a few web browsers and used these to conduct phishing attacks based on URL spoofing. Furthermore we are now witnessing the entrance of highly advanced phishing techniques that no longer simply rely on vulnerabilities, but employ ordinary script, HTML, DNS sniffing, and the list goes on. In this paper we first discuss means of investigating and preventing the advanced URL spoofing techniques used in phishing attacks, and then propose a scheme for fundamentally restricting them altogether.

Analysis of Malicious Behavior Towards Android Storage Vulnerability and Defense Technique Based on Trusted Execution Environment (안드로이드 저장소 취약점을 이용한 악성 행위 분석 및 신뢰실행환경 기반의 방어 기법)

  • Kim, Minkyu;Park, Jungsoo;Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.73-81
    • /
    • 2021
  • When downloading files using an app or web-based application on the user's mobile phone, the path is set to be saved in the pre-defined default directory. Many applications requiring access to storage, including file managers, require a write or read permission of storage to provide numerous functions and services. This means that the application will have direct access to the download folder where the numerous files downloaded. In this paper, to prove our feasibility of attack using the security vulnerabilities mentioned above, we developed a file hacking function disguised as an encryption function in the file management application. The file that encrypted will be sent to hackers via E-mail simultaneously on the background. The developed application was evaluated from VirusTotal, a malicious analysis engine, was not detected as a malicious application in all 74 engines. Finally, in this paper, we propose a defense technique and an algorithm based on the Trusted Execution Environment (TEE) to supplement these storage vulnerabilities.

Implementation of Hybrid Firewall System for Network Security (전산망 보호를 위한 혼합형 방화벽 시스템 구현)

  • Lee, Yong-Joon;Kim, Bong-Han;Park, Cheon-Yong;Oh, Chang-Suk;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1593-1602
    • /
    • 1998
  • In this paper, a hybrid firewall system using the screening router, dual-homed gateway, screened host galeway and the application level gateway is proposed, The screened host gateway is comjXlsed of screening router, DMZ and bastion host. All external input traffics are filtered by screening router with network protrcol filtering, and transmitted to the bastion host performing application level filtering, The dual homed gateway is an internlediate equipment prohibiting direct access from external users, The application level gateway is an equipment enabling transmission using only the proxy server. External users can access only through the public servers in the DMZ, but internal users can aeee through any servers, The rule base which allows Telnet only lo the adrnilllslratol is applied to manage hosts in the DMZ According to the equipmental results, denial of access was in orderof Web. Mail FTP, and Telnet. Access to another servers except for server in DMZ were denied, Prolocol c1mials of UDP was more than that of TCP, because the many hosts broadcasted to networds using BOOTP and NETBIOS, Also, the illegal Telnet and FTP that transfer to inside network were very few.

  • PDF

Basic Research on Women Engineering Recognition by Using Triangulation Method (삼각측정법을 적용한 여성 공학도 인식에 관한 기초조사)

  • Park, Sun-Hee;Kim, Hyung-Su
    • Journal of Engineering Education Research
    • /
    • v.11 no.2
    • /
    • pp.79-89
    • /
    • 2008
  • The purpose of this study is to research the women engineers' recognition with a triangulation method and make suggestions on desirable education in engineering. The research period is for about 4 months from December 15, 2007 to April 4, 2008. The objects of the research are two groups of female engineers at D college located in the metropolitan area - the first group had 187 women engineering majors, 3 women graduate students and 2 women professors in engineering department, and the second group had 5 women engineering majors who once stayed out of school temporarily, 4 women engineering graduates, and 5 graduates who are currently working. The second group is intently selected in order to look into the detailed factors that affect the recognition of women engineers. The methods of the research varied and included were surveys on the web, personal interviews, focus meetings, surveys by e-mail and telephone, etc. The results of the study show what the women engineers want in engineering education includes to have role models of women engineers who can cast a vision to them, get a leadership training especially for when they lead a group that has both man and woman members. It was also found that experincing a cooperative learning through diverse projects is essential to build basic character training and competency, and practical education is required for the major or becoming a full time worker.

AI Fire Detection & Notification System

  • Na, You-min;Hyun, Dong-hwan;Park, Do-hyun;Hwang, Se-hyun;Lee, Soo-hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.63-71
    • /
    • 2020
  • In this paper, we propose a fire detection technology using YOLOv3 and EfficientDet, the most reliable artificial intelligence detection algorithm recently, an alert service that simultaneously transmits four kinds of notifications: text, web, app and e-mail, and an AWS system that links fire detection and notification service. There are two types of our highly accurate fire detection algorithms; the fire detection model based on YOLOv3, which operates locally, used more than 2000 fire data and learned through data augmentation, and the EfficientDet, which operates in the cloud, has conducted transfer learning on the pretrained model. Four types of notification services were established using AWS service and FCM service; in the case of the web, app, and mail, notifications were received immediately after notification transmission, and in the case of the text messaging system through the base station, the delay time was fast enough within one second. We proved the accuracy of our fire detection technology through fire detection experiments using the fire video, and we also measured the time of fire detection and notification service to check detecting time and notification time. Our AI fire detection and notification service system in this paper is expected to be more accurate and faster than past fire detection systems, which will greatly help secure golden time in the event of fire accidents.

The Effects of 'MEETING WITH SCIENTISTS' Program on the Fifth Graders' Physical Images of Scientists ('과학자와의 만남' 프로그램 적용이 초등학생의 과학자에 대한 신체적 이미지에 미치는 효과)

  • Kim, Sung-Kwan;Jang, Myoung-Duk;Jeong, Jin-Woo
    • Journal of The Korean Association For Science Education
    • /
    • v.22 no.3
    • /
    • pp.490-498
    • /
    • 2002
  • This study investigated the effects of the 'Meeting With Scientists' program on children's stereotypical images of scientist. To do those, 36 children of a fifth grade class participated in the program for one month. The program consisted of two main activities:(l) participating in scientists' lectures and exchanging e-mail with them; and (2) visiting web sites about scientist and science, and exchanging e-mail with scientists at the sites. The results of the study can be summarized as follows: First, after participating in the program, children showed the significant decrease of several stereotypical items, such as facial growth of hair(bald hair beard), symbols of research, and age of the scientist. Second, the most popular source of the images was the visual media at the pretest but the source was changed to the visiting and participating scientist's lecture, and internet at the posttest. The latter items appeared a significant difference between the pretest and the posttest, The results indicate that the program is effective to decrease of children's stereotypical physical image of scientist.

A Study of Prevention Model the Spread of Phishing Attack for Protection the Medical Information (의료정보 보호를 위한 피싱공격 확산방지모델 연구)

  • Choi, Kyong-Ho;Chung, Kyung-Yong;Shin, Dong-Kun
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.273-277
    • /
    • 2013
  • Phishing attacks have been implemented in smarter, more advanced ways with the passage of time. Hackers use intelligent phishing attacks to take over computers and to penetrate internal networks in major organizations. So, in this paper, a model for a prevention of phishing attack spread is conceptual designed in order to protect internal users and sensitive or important information from sophisticated phishing attacks. Internal users simultaneously utilize both external web and organizational mail services. And hackers can take the both side equally as a vector. Thus, packets in each service must be monitored and stored to recognize threatening elements from both sides. The model designed in this paper extends the mail server based security structure used in conventional studies for the protection of Internet mail services accessed by intranet users. This model can build a list of phishing sites as the system checks e-mails compared to that of the method that directly intercepts accesses to phishing sites using a proxy server, so it represents no standby time for request and response processes.

Design And Implementation Of Web-based Counselling System For Learning By Problem Based Learning(PBL) Of Constructivism (구성주의적 문제중심학습(PBL)에 따른 웹기반 학습상담 시스템의 설계 및 구현)

  • Kwon, Hyung-Kyu
    • Journal of The Korean Association of Information Education
    • /
    • v.6 no.2
    • /
    • pp.212-224
    • /
    • 2002
  • The purpose of this study is to design and implement the web-based counselling system in aspects of learning type and method by PBL in Constructivism. Learning problem is classified into learning difficulty, learning disability, emotional disability, memory/cognition, ADHD(attention deficit hyperactivity disorder), classwork, and school circumstance. Counselling for individual, offline visit, parents, electronic mail, and group with professionals who were involved in the design and implementation of learning counselling were used to supplement the clinic process for learning. The result of this study aims to administer the distance counselling system for learning without prominent computer knowledge. Each learner can solve diverse private learning problems which can be widely applied for situated learning. Also these online strategies by PBL indicate that providing learning types and methods are critical for overall understanding in online counselling system for learning.

  • PDF

Design of Internet Telephony Network System using Open Source Softwares (오픈 소스 소프트웨어를 활용한 인터넷 전화망 시스템 설계)

  • Ha, Eun-Yong
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.259-267
    • /
    • 2012
  • Internet telephony is an Internet service which supports voice telephone using VoIP technology on the IP-based Internet. It has some advantages in that voice telephone services can be accompanied with multimedia services such as video communication and messaging services. Recently, the introduction of smart phones has led to a growth in social networking services and thus, the research and development of Internet telephony has been actively progressed and has the potential to become a replacement for the telephone service that is currently being used. In this paper we designed and implemented an Internet telephony network system which is developed by using Asterisk and open source softwares. It is developed on the linux system and has some features such as VoIP telephony service between SIP phones, voice mail, and call recording. It also supports web-based functions such as SIP users and server system management that is implemented by Apache web server and PHP programs. Afterwards, this system will be applied as VoIP network base technology for small sized companies and organizations. It will paly a role for encouraging companies to use open source softwares.