• Title/Summary/Keyword: 국가정보통신서비스

Search Result 418, Processing Time 0.025 seconds

A Study on the Application Method of Digital Signature to International e-Trade over the Internet (인터넷 전자무역에서의 전자서명 적용방안 연구)

  • Park, Sang-Hwan;Lee, Seok-Lae;Park, Chu-Hwan
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.3
    • /
    • pp.227-241
    • /
    • 2004
  • With the expansion of internet usage and the advanced technology for information and communication, the international e-Trade environment gradually migrates from the VAN/EDI to the global Internet-based e-Traed on an ebXML framework. In an effort to provide a Internet-based e-Trade environment with a security and trust, this paper analyzes security components and proposed the SSL and ebXML security technologies in order to assure of the trust and security over Internet-based e-Trade. In addition, this paper presents 3-phase methodology to realize the secure and trustworthy Internet-based e-Trade. In summary, as the first phase, the e-Trade business processes are re-engineered and the digital signature council for mutual recognition is orgainzed. And as the second phase, the Internet-based e-Trade system and the concerned digital signature technology are implemented. Finally as third phase, the PKI mutual recognition agreement is signed by parties concerned and then the Internet-based e-trade business is started. Furthermore, this paper presents the promising Internet-based e-Trade models where the digital signature can be applied.

  • PDF

Analysis and prospect of North Korea's Cyber threat (북한의 사이버전 위협에 대한 분석과 전망)

  • Lee, Dae Sung;Ahn, Young Kyu;Kim, Minsu
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.11-16
    • /
    • 2016
  • In modern society, the development of Information and Communication Technology has given people a lot of opportunities. But on the other side cyber attack also gives enormous damage to people. Recently Korea has become the target of cyber attack. The threat of it is growing. Especially North Korea has committed hostile actions against South Korea. North Korea has recently attacked the computer networks of South Korea's important national facilities. The types of North Korea's cyber attacks include the followings. First, if we see it with the viewpoint of software, it tries to destroy or control the Internet, infects the networks with viruses, worms, Trojan Horse and Distributed Denial of Service. I suggest the following to solve the problem. First, South Korea should unify the organizations to respond to the attacks of North Korea, as North Korea has a unified organization for the cyber attack. Second, they should think about the establishment of "Cyber Terrorism Prevention Act" to systematically respond to the software attacks.

Visual Element Analysis and Guideline of School Web Site Design (학교 웹 사이트의 디자인에 대한 시각적인요소 분석 및 가이드라인)

  • Kwon Kyung-Ran;Kim Young-Bong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.273-279
    • /
    • 2005
  • It is activated a virtual university(digital university) without limitation time and space that the diffusion of internet, the rapid development of information and communicative technologies, web-technology. It is great importance of school-site to support various and qualitative education services, to cut social education spending, to strengthen national competitiveness with breed expert. Many people who are in universities are putting a school-site to the test. So we need study and analysis it to build up a virtual-study-space efficiently on web. This thesis is supposed to help in school-site design to make it reduce errors and save time and efforts. First, it suggests most general design pattern by analysis visual elements using HTML Tag. Second, it suggests a guide-line and a specific of design to use convenience through research on web-design problem and finding out user's favor.

  • PDF

Authentication Model of PKI-based Security Gateway using Blockchain having Integrity (무결성이 보장된 블록체인 기술을 활용한 PKI 기반 보안 게이트웨이의 인증 모델)

  • Kim, Young Soo;Mun, Hyung-Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.287-293
    • /
    • 2021
  • Recently, public certificates issued by nationally-recognized certification bodies have been abolished, and internet companies have issued their own common certificates as certification authority. The Electronic Signature Act was amended in a way to assign responsibility to Internet companies. As the use of a joint certificate issued by Internet companies as a certification authority is allowed, it is expected that the fraud damage caused by the theft of public key certificates will increase. We propose an authentication model that can be used in a security gateway that combines PKI with a blockchain with integrity and security. and to evaluate its practicality, we evaluated the security of the authentication model using Sugeno's hierarchical fuzzy integral, an evaluation method that excludes human subjectivity and importance degree using Delphi method by expert group. The blockchain-based joint certificate is expected to be used as a base technology for services that prevent reckless issuance and misuse of public certificates, and secure security and convenience.

Analysis of Digital Twin Technology Trends Related to Geoscience and Mineral Resources after the Korean New Deal Policy in 2020 (2020년 한국판 뉴딜 정책 이후 지질자원 분야 디지털 트윈 기술개발 동향 분석)

  • Ahn, Eun-Young
    • Economic and Environmental Geology
    • /
    • v.54 no.6
    • /
    • pp.659-670
    • /
    • 2021
  • In this study, we analyzed changes in policies after the Korean New Deal Policy in 2020, metaverse and 6th generation communication technology. In the research and development of geoscience and mineral resources, we emphasized on the connection between smart cities and digital twins by focusing on the linkage of the real world and geo-information. Further, we examined trends in developing digital twins after the Korean New Deal Policy in 2020 that focused on three-dimensional visualization technology, the first stage in implementing digital twins, and real-time monitoring technology of underground information, the second implementing stage. As results of this study, we emphasized on the efforts to provide accurate underground information based on geology, groundwater and geo-environment and to analyze and predict near-real-time levels of available underground information to the industry, local governments and the central governments. Research and development that integrate the fields of geology, environment, and information is required to lead national digital twin policies and smart city policies owing to the acceleration of the digital economy in Korea and globally during the post-Corona era.

Design of Microstrip Patch Antenna using Inset-Fed Layered for Metallic Object in u-Port (U-항만 환경에서 금속부착을 위한 인셋 급전 마이크로패치 안테나 설계)

  • Choi, Yong-Seok;Seong, Hyeon-Kyeong
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.2
    • /
    • pp.80-85
    • /
    • 2015
  • In this paper, we present, an indstrial RFID layered microstrip patch antenna is designed using an inset feed method in order to improve recognition rates in a long distance as tags are attached to metal object by improving a problem of feeding power in fabricating metal tags and reducing effects of metallic object. The inset feed shows a distinctive characteristic that has no separation between emitters and feed lines differing from a structure with the conventional inductive coupling feed. This structure makes possible to produce a type that presents a low antenna height and enables impedance coupling for tag chips. Although it shows a difficulty in the impedance coupling due to increases in the parasite capacitance between a ground plane and an emitter in an antenna according to decreases in the height of a tag antenna, it may become a merit in designing the tag antenna because the antenna impedance can be determined as an inductive manner if a shorted structure is used for feeding power. Therefore, in this paper the microstrip patch antenna is designed as a modified type and applies the inset feed in order to reduce effects of metallic objects where the antenna is be attached. Also, the antenna uses a multi-layer structure that includes a metal plate between radiator and ground instead of using a single layer.

Performance Evaluation of Advance Warning System for Transporting Hazardous Materials (위험물 운송을 위한 조기경보시스뎀 성능평가)

  • Oh Sei-Chang;Cho Yong-Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.4 no.1 s.6
    • /
    • pp.15-29
    • /
    • 2005
  • Truck Shipment Safety Information, which is a part of the development of NERIS is divided into Optimal Route Guidance System and Emergency Response System. This research is for establishing an advance warning system, which aims for preventing damages(fire, explosion, gas-escape etc.) and detecting incidents that are able to happen during transporting hazardous materials in advance through monitoring the position of moving vehicles and the state of hazardous materials in real-time. This research is peformed to confirm the practical possibility of application of the advance warning system that monitors whether the hazardous materials transport vehicles move the allowed routes, finds the time and the location of incidents of the vehicles promptly and develops the emergency system that is able to respond to the incidents as well by using the technologies of CPS, CDMA and CIS with testing the ability of performance. As the results of the test, communication accuracies are 99$\%$ in freeway, 96$\%$ in arterial, 97$\%$ in hilly sections, 99$\%$ in normal sections, 96$\%$ in local sections, 99$\%$ in urban sections and 98$\%$ in tunnels. According to those results, the system has been recorded a high success rate of communication that enough to apply to the real site. However, the weak point appeared through the testing is that the system has a limitation of communication that is caused in the rural areas and certain areas where are fewer antennas that make communication possible between on-board unit and management server. Consequently, for the practical use of this system, it is essential to develop the exclusive en-board unit for the vehicles and find the method that supplements the receiving limitation of the GPS coordinates inside tunnels. Additionally, this system can be used to regulate illegal acts automatically such as illegal negligence of hazardous materials. And the system can be applied to the study about an application scheme as a guideline for transporting hazardous materials because there is no certain management system and act of toxic substances in Korea.

  • PDF

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

Research for Space Activities of Korea Air Force - Political and Legal Perspective (우리나라 공군의 우주력 건설을 위한 정책적.법적고찰)

  • Shin, Sung-Hwan
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.18
    • /
    • pp.135-183
    • /
    • 2003
  • Aerospace force is a determining factor in a modem war. The combat field is expanding to space. Thus, the legitimacy of establishing aerospace force is no longer an debating issue, but "how should we establish aerospace force" has become an issue to the military. The standard limiting on the military use of space should be non-aggressive use as asserted by the U.S., rather than non-military use as asserted by the former Soviet Union. The former Soviet Union's argument is not even strongly supported by the current Russia government, and realistically is hard to be applied. Thus, the multi-purpose satellite used for military surveillance or a commercial satellite employed for military communication are allowed under the U.S. principle of peaceful use of space. In this regard, Air Force may be free to develop a military surveillance satellite and a communication satellite with civilian research institute. Although MTCR, entered into with the U.S., restricts the development of space-launching vehicle for the export purpose, the development of space-launching vehicle by the Korea Air Force or Korea Aerospace Research Institute is beyond the scope of application of MTCR, and Air Force may just operate a satellite in the orbit for the military purpose. The primary task for multi-purpose satellite is a remote sensing; SAR sensor with high resolution is mainly employed for military use. Therefore, a system that enables Air Force, the Korea Aerospace Research Institute, and Agency for Defense Development to conduct joint-research and development should be instituted. U.S. Air Force has dismantled its own space-launching vehicle step by step, and, instead, has increased using private space launching vehicle. In addition, Military communication has been operated separately from civil communication services or broadcasting services due to the special circumstances unique to the military setting. However, joint-operation of communication facility by the military and civil users is preferred because this reduces financial burden resulting from separate operation of military satellite. During the Gulf War, U.S. armed forces employed commercial satellites for its military communication. Korea's participation in space technology research is a little bit behind in time, considering its economic scale. In terms of budget, Korea is to spend 5 trillion won for 15 years for the space activities. However, Japan has 2 trillion won annul budget for the same activities. Because the development of space industry during initial fostering period does not apply to profit-making business, government supports are inevitable. All space development programs of other foreign countries are entirely supported by each government, and, only recently, private industry started participating in limited area such as a communication satellite and broadcasting satellite, Particularly, Korea's space industry is in an infant stage, which largely demands government supports. Government support should be in the form of investment or financial contribution, rather than in the form of loan or borrowing. Compared to other advanced countries in space industry, Korea needs more budget and professional research staff. Naturally, for the efficient and systemic space development and for the prevention of overlapping and distraction of power, it is necessary to enact space-related statutes, which would provide dear vision for the Korea space development. Furthermore, the fact that a variety of departments are running their own space development program requires a centralized and single space-industry development system. Prior to discussing how to coordinate or integrate space programs between Agency for Defense Development and the Korea Aerospace Research Institute, it is a prerequisite to establish, namely, "Space Operations Center"in the Air Force, which would determine policy and strategy in operating space forces. For the establishment of "Space Operations Center," policy determinations by the Ministry of National Defense and the Joint Chief of Staff are required. Especially, space surveillance system through using a military surveillance satellite and communication satellite, which would lay foundation for independent defense, shall be established with reference to Japan's space force plan. In order to resolve issues related to MTCR, Air Force would use space-launching vehicle of the Korea Aerospace Research Institute. Moreover, defense budge should be appropriated for using multi-purpose satellite and communication satellite. The Ministry of National Defense needs to appropriate 2.5 trillion won budget for space operations, which amounts to Japan's surveillance satellite operating budges.

  • PDF

Development of Market Growth Pattern Map Based on Growth Model and Self-organizing Map Algorithm: Focusing on ICT products (자기조직화 지도를 활용한 성장모형 기반의 시장 성장패턴 지도 구축: ICT제품을 중심으로)

  • Park, Do-Hyung;Chung, Jaekwon;Chung, Yeo Jin;Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.1-23
    • /
    • 2014
  • Market forecasting aims to estimate the sales volume of a product or service that is sold to consumers for a specific selling period. From the perspective of the enterprise, accurate market forecasting assists in determining the timing of new product introduction, product design, and establishing production plans and marketing strategies that enable a more efficient decision-making process. Moreover, accurate market forecasting enables governments to efficiently establish a national budget organization. This study aims to generate a market growth curve for ICT (information and communication technology) goods using past time series data; categorize products showing similar growth patterns; understand markets in the industry; and forecast the future outlook of such products. This study suggests the useful and meaningful process (or methodology) to identify the market growth pattern with quantitative growth model and data mining algorithm. The study employs the following methodology. At the first stage, past time series data are collected based on the target products or services of categorized industry. The data, such as the volume of sales and domestic consumption for a specific product or service, are collected from the relevant government ministry, the National Statistical Office, and other relevant government organizations. For collected data that may not be analyzed due to the lack of past data and the alteration of code names, data pre-processing work should be performed. At the second stage of this process, an optimal model for market forecasting should be selected. This model can be varied on the basis of the characteristics of each categorized industry. As this study is focused on the ICT industry, which has more frequent new technology appearances resulting in changes of the market structure, Logistic model, Gompertz model, and Bass model are selected. A hybrid model that combines different models can also be considered. The hybrid model considered for use in this study analyzes the size of the market potential through the Logistic and Gompertz models, and then the figures are used for the Bass model. The third stage of this process is to evaluate which model most accurately explains the data. In order to do this, the parameter should be estimated on the basis of the collected past time series data to generate the models' predictive value and calculate the root-mean squared error (RMSE). The model that shows the lowest average RMSE value for every product type is considered as the best model. At the fourth stage of this process, based on the estimated parameter value generated by the best model, a market growth pattern map is constructed with self-organizing map algorithm. A self-organizing map is learning with market pattern parameters for all products or services as input data, and the products or services are organized into an $N{\times}N$ map. The number of clusters increase from 2 to M, depending on the characteristics of the nodes on the map. The clusters are divided into zones, and the clusters with the ability to provide the most meaningful explanation are selected. Based on the final selection of clusters, the boundaries between the nodes are selected and, ultimately, the market growth pattern map is completed. The last step is to determine the final characteristics of the clusters as well as the market growth curve. The average of the market growth pattern parameters in the clusters is taken to be a representative figure. Using this figure, a growth curve is drawn for each cluster, and their characteristics are analyzed. Also, taking into consideration the product types in each cluster, their characteristics can be qualitatively generated. We expect that the process and system that this paper suggests can be used as a tool for forecasting demand in the ICT and other industries.