• Title/Summary/Keyword: 기술적 보안

Search Result 4,244, Processing Time 0.033 seconds

A Study on Maturity Model of Information Integration System (정보연계 시스템의 성숙도 모델에 관한 연구)

  • Ha, Hyodong;Lee, Ook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.8
    • /
    • pp.570-578
    • /
    • 2019
  • In this era of big data, a variety of government organizations are trying to create new added value via Information Integration. Therefore, several projects related to government agencies' information sharing have activated system connection/integration. The risk factors of system operation, however, have increased as the volume of Information Integration System grows. The interference in information sharing is predicted to affect the operation of the agencies, and the issue will grow even worse with massive impact on civil society when the agency operation is interrupted due to system failures in terms of infrastructure, software, data quality, and security. Diverse studies related to the maintenance of Information System have been conducted, but there is currently no evaluation framework for the operational system of Information Integration between various government agencies. In this respect, this study distinguishes each of the Information System components, Data, IT, People, Process, systematizes with Plan-Do-See, and finally presents a maturity model for Information Integration. Nine derived processes were analyzed through interview and questionnaires from Information Integration System officials, further suggesting maturity stage applying CMMI. This model allows diagnosis of the maturity level of an Information Integration System, and is expected to be utilized as resource for improving organizational processes.

Improving Non-Profiled Side-Channel Analysis Using Auto-Encoder Based Noise Reduction Preprocessing (비프로파일링 기반 전력 분석의 성능 향상을 위한 오토인코더 기반 잡음 제거 기술)

  • Kwon, Donggeun;Jin, Sunghyun;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.491-501
    • /
    • 2019
  • In side-channel analysis, which exploit physical leakage from a cryptographic device, deep learning based attack has been significantly interested in recent years. However, most of the state-of-the-art methods have been focused on classifying side-channel information in a profiled scenario where attackers can obtain label of training data. In this paper, we propose a new method based on deep learning to improve non-profiling side-channel attack such as Differential Power Analysis and Correlation Power Analysis. The proposed method is a signal preprocessing technique that reduces the noise in a trace by modifying Auto-Encoder framework to the context of side-channel analysis. Previous work on Denoising Auto-Encoder was trained through randomly added noise by an attacker. In this paper, the proposed model trains Auto-Encoder through the noise from real data using the noise-reduced-label. Also, the proposed method permits to perform non-profiled attack by training only a single neural network. We validate the performance of the noise reduction of the proposed method on real traces collected from ChipWhisperer board. We demonstrate that the proposed method outperforms classic preprocessing methods such as Principal Component Analysis and Linear Discriminant Analysis.

A Study on the Blockchain based Frequency Allocation Process for Private 5G (블록체인 기반 5G 특화망 주파수 할당 프로세스 연구)

  • Won-Seok Yoo;Won-Cheol Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.1
    • /
    • pp.24-32
    • /
    • 2023
  • The current Private 5G use procedure goes through the step of application examination, use and usage inspection, and can be divided in to application, examination step as a procedure before frequency allocation, and use, usage inspection step as a procedure after frequency allocation. Various types of documents are required to apply for a Private 5G, and due to the document screening process and radio station inspection for using Private 5G frequencies, the procedure for Private 5G applicants to use Private 5G is complicated and takes a considerable amount of time. In this paper, we proposed Frequency Allocation Process for Private 5G using a blockchain platform, which is fast and simplified than the current procedure. Through the use of a blockchain platform and NFT (Non-Fungible Token), reliability and integrity of the data required in the frequency allocation process were secured, and security of frequency usage information was maintained and a reliable Private 5G frequency allocation process was established. Also by applying the RPA system that minimizes human intervention, fairness was secured in the process of allocating Private 5G. Finally, the frequency allocation process of Private 5G based on the Ethereum blockchain was performed though a simulation.

A Case Study on the Interior design characteristics of Integrated CCTV Control Center - Focused at Human Factor Design aspect (CCTV 통합관제센터의 실내공간특성에 대한 사례분석연구 - 인간공학디자인(HFD)의 관점에서)

  • Han, Ji Eun;Kwon, Gyu Hyun
    • Design Convergence Study
    • /
    • v.16 no.3
    • /
    • pp.103-118
    • /
    • 2017
  • It is expected that the integrated control service of the public sector will be increased for the safety of citizens in the future. Therefore, In this study, we analyzed the classification of CCTV control center and the characteristics of interior design. The survey was conducted at eight control centers in Seoul that were constructed since 2007 and analyzed according to the criteria of general matters, services, spatial basic information, spatial structure, and internal structure. The results of the survey are summarized as follows. Based on the results of the study, the Integrated Control Center is a space where the ratio of the physical environment is not high but performs important tasks for the citizens of the city, which are operated 24 hours a day, and security and security. It is characterized by the efficient space allocation for the treatment, the design of the moving line, and the connection according to the urgent work flow. The results of this study are expected to be used as basic data for other integrated control center environment.

AutoML Machine Learning-Based for Detecting Qshing Attacks Malicious URL Classification Technology Research and Service Implementation (큐싱 공격 탐지를 위한 AutoML 머신러닝 기반 악성 URL 분류 기술 연구 및 서비스 구현)

  • Dong-Young Kim;Gi-Seong Hwang
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.9-15
    • /
    • 2024
  • In recent trends, there has been an increase in 'Qshing' attacks, a hybrid form of phishing that exploits fake QR (Quick Response) codes impersonating government agencies to steal personal and financial information. Particularly, this attack method is characterized by its stealthiness, as victims can be redirected to phishing pages or led to download malicious software simply by scanning a QR code, making it difficult for them to realize they have been targeted. In this paper, we have developed a classification technique utilizing machine learning algorithms to identify the maliciousness of URLs embedded in QR codes, and we have explored ways to integrate this with existing QR code readers. To this end, we constructed a dataset from 128,587 malicious URLs and 428,102 benign URLs, extracting 35 different features such as protocol and parameters, and used AutoML to identify the optimal algorithm and hyperparameters, achieving an accuracy of approximately 87.37%. Following this, we designed the integration of the trained classification model with existing QR code readers to implement a service capable of countering Qshing attacks. In conclusion, our findings confirm that deriving an optimized algorithm for classifying malicious URLs in QR codes and integrating it with existing QR code readers presents a viable solution to combat Qshing attacks.

A Study on Fast Iris Detection for Iris Recognition in Mobile Phone (휴대폰에서의 홍채인식을 위한 고속 홍채검출에 관한 연구)

  • Park Hyun-Ae;Park Kang-Ryoung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.2 s.308
    • /
    • pp.19-29
    • /
    • 2006
  • As the security of personal information is becoming more important in mobile phones, we are starting to apply iris recognition technology to these devices. In conventional iris recognition, magnified iris images are required. For that, it has been necessary to use large magnified zoom & focus lens camera to capture images, but due to the requirement about low size and cost of mobile phones, the zoom & focus lens are difficult to be used. However, with rapid developments and multimedia convergence trends in mobile phones, more and more companies have built mega-pixel cameras into their mobile phones. These devices make it possible to capture a magnified iris image without zoom & focus lens. Although facial images are captured far away from the user using a mega-pixel camera, the captured iris region possesses sufficient pixel information for iris recognition. However, in this case, the eye region should be detected for accurate iris recognition in facial images. So, we propose a new fast iris detection method, which is appropriate for mobile phones based on corneal specular reflection. To detect specular reflection robustly, we propose the theoretical background of estimating the size and brightness of specular reflection based on eye, camera and illuminator models. In addition, we use the successive On/Off scheme of the illuminator to detect the optical/motion blurring and sunlight effect on input image. Experimental results show that total processing time(detecting iris region) is on average 65ms on a Samsung SCH-S2300 (with 150MHz ARM 9 CPU) mobile phone. The rate of correct iris detection is 99% (about indoor images) and 98.5% (about outdoor images).

Usefulness Comparative Experimental Study of the CT and MR Imaging in the Dog Clonorchiasis (잡견 간흡충증의 전산화단층촬영과 자기공명영상의 유용성에 관한 실험적 연구)

  • Goo, Eun-Hoe;Kweon, Dae-Cheol;Kim, Dong-Sung;Choi, Chun-Kyu
    • Journal of radiological science and technology
    • /
    • v.26 no.3
    • /
    • pp.33-39
    • /
    • 2003
  • Purpose : Be aware of clinical possibilities on image quality by comparison of contrast-enhanced dynamic CT and MR imaging applied of MIP technique after the experimentally induced clonorchasis infection in dogs. Materials and Method : Twenty mongrel dogs prepared in zoo-laboratory were followed up with serial CT scans and MR imaging for 13 weeks after the experimental infection in liver. Two-phase helical CT was acquired in the supine position with the following scanning parameters. After the injection of contrast material, the arterial phase was initiated using a bolus-racking method. The portal phase scan was started 15 seconds after the arterial phase scan. CT protocol was determined after single level dynamic scans. MR imaging used the CP body coil and images get a 2D image using HASTE, FLASH, TSE pulse sequence. Bile duct MR imaging were obtained in three plans. Then each image was post processed by using target MIP algorithm. Two experimentation above, as a method of evaluation, one pathologist, three radiologist and five radiological technologist were analyzed visually for evaluation of following findings, enhancement of the bile duct wall, dilatation of bile duct tip, liver parenchyma, background suppression. Results : Five dogs was died of a disease after the infection, the rest one else shows the chronic dilatation of the intrahepatic bile duct with CT and MR imaging. Contrast administration of CT shows the contrast-enhanced of the bile duct walls with live parenchyma. MR imaging calculated of CNR and CR from pulse sequence for comparative evaluation and shows the pattern of the intrahepatic bile duct, dilatation of bile duct tip using MIP technique. CNR of the clonorchiasis, HASTE was $16{\pm}0.83$, TSE $7.06{\pm}3.0$, FLASH $1.19{\pm}0.2$ and CR, HASTE was 73.3%, TSE 62.3%, FLASH 6.4%. Conclusion : CT and MR imaging is very usefulness in diagnosis of dog clonorchiasis.

  • PDF

A Study on the Legislation for the Commercial and Civil Unmanned Aircraft System Operation (국내 상업용 민간 무인항공기 운용을 위한 법제화 고찰)

  • Kim, Jong-Bok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.28 no.1
    • /
    • pp.3-54
    • /
    • 2013
  • Nowadays, major advanced countries in aviation technology are putting their effort to develop commercial and civil Unmanned Aircraft System(UAS) due to its highly promising market demand in the future. The market scale of commercial and civil UAS is expected to increase up to approximately 8.8 billon U.S. dollars by the year 2020. The usage of commercial and civil UAS covers various areas such as remote sensing, relaying communications, pollution monitoring, fire detection, aerial reconnaissance and photography, coastline monitoring, traffic monitoring and control, disaster control, search and rescue, etc. With the introduction of UAS, changes need to be made on current Air Traffic Management Systems which are focused mainly manned aircrafts to support the operation of UAS. Accordingly, the legislation for the UAS operation should be followed. Currently, ICAO's Unmanned Aircraft System Study Group(UASSG) is leading the standardization process of legislation for UAS operation internationally. However, some advanced countries such as United States, United Kingdom, Australia have adopted its own legislation. Among these countries, United States is most forth going with President Obama signing a bill to integrate UAS into U.S. national airspace by 2015. In case of Korea, legislation for the unmanned aircraft system is just in the beginning stage. There are no regulations regarding the operation of unmanned aircraft in Korea's domestic aviation law except some clauses regarding definition and permission of the unmanned aircraft flight. However, the unmanned aircrafts are currently being used in military and under development for commercial use. In addition, the Ministry of Land, Infrastructure and Transport has a ambitious plan to develop commercial and civil UAS as Korea's most competitive area in aircraft production and export. Thus, Korea is in need of the legislation for the UAS operation domestically. In this regards, I personally think that Korea's domestic legislation for UAS operation will be enacted focusing on following 12 areas : (1)use of airspace, (2)licenses of personnel, (3)certification of airworthiness, (4)definition, (5)classification, (6)equipments and documents, (7)communication, (8)rules of air, (9)training, (10)security, (11)insurance, (12)others. Im parallel with enacting domestic legislation, korea should contribute to the development of international standards for UAS operation by actively participating ICAO's UASSG.

  • PDF

The information of the businesses and the protection of information human rights (기업정보화와 정보인권보호)

  • 하우영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.543-559
    • /
    • 2003
  • The information drive of the businesses requires new alternatives in that the promotion of business efficiency through information process technologies ends up conflicting with the protection of information human rights on laborers’side. Nevertheless, apathy on information protection has a tendency to be distorted by the efficiency of the businesses. Should the capital and mass media warn economic red lights, political circles with uneasiness would ignore the significance of information protection on the behalf of business efficiency. Therefore, the importance of information protection is considered a smaller interest than that of business efficiency with the infringements of human rights on laborers’side arising. Informatization of the businesses along with the developments of information process technologies has enabled the management to monitor and control the behaviors of laborers. This new problem needs to establish both information protection mechanism and institutional devices to regulate those labor controls. The security of business activity without human rights infringement warrants both basic rights of the public and spirit of the Constitution. The study suggests the establishment and revision of laws suitable to the period of information human rights. On top of that, the establishment of the basic law for information protection of individuals’with the common principle that integrates the related laws and rules on-off line is needed. This will warrant the active participation of labor unions and create specific alternatives for information protection.

  • PDF

The legal responsibility of the unmanned aircraft operators and insurance (무인항공기 운영자의 법적책임과 보험)

  • Kim, Jong-Bok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.2
    • /
    • pp.367-418
    • /
    • 2018
  • Just as safety is the most important thing in aviation, safety is the most important in the operation of unmanned aircraft (RPA), and safety operation is the most important in the legal responsibility of the operator of the unmanned aircraft. In this thesis, the legal responsibility of the operator of the unmanned aircraft, focusing on the responsibility of the operator of the unmanned aircraft, was discussed in depth with the issue of insurance, which compensates for damages in the event of an accident First of all, the legal responsibility of the operator of the unmanned aircraft was reviewed for the most basic : definition, scope and qualification of the operator of the unmanned aircraft, and the liability of the operator of the Convention On International Civil Aviation, the ICAO Annex, the RPAS Manual, the Rome Convention, other major international treaties and Domestic law such as the Aviation Safety Act. The ICAO requires that unmanned aircraft be operated in such a manner as to minimize hazards to persons, property or other aircraft as a major principle of the operation of unmanned aircraft, which is ultimately equivalent to manned aircraft Considering that most accidents involving unmanned aircrafts fall to the ground, causing damage to third parties' lives or property, this thesis focused on the responsibility of operators under the international treaty, and the responsibility of third parties for air transport by Domestic Commercial Act, as well as the liability for compensation. In relation to the Rome Convention, the Rome Convention 1952 detailed the responsibilities of the operator. Although it has yet to come into effect regarding liability, some EU countries are following the limit of responsibility under the Rome Convention 2009. Korea has yet to sign any Rome Convention, but Commercial Act Part VI Carriage by Air is modeled on the Rome Convention 1978 in terms of compensation. This thesis also looked at security-related responsibilities and the responsibility for privacy infringement. which are most problematic due to the legal responsibilities of operating unmanned aircraft. Concerning insurance, this thesis looked at the trends of mandatory aviation insurance coverage around the world and the corresponding regulatory status of major countries to see the applicability of unmanned aircraft. It also looked at the current clauses of the Domestic Aviation Business Act that make insurance mandatory, and the ultra-light flight equipment insurance policy and problems. In sum, the operator of an unmanned aircraft will be legally responsible for operating the unmanned aircraft safely so that it does not pose a risk to people, property or other aircraft, and there will be adequate compensation in the event of an accident, and legal systems such as insurance systems should be prepared to do so.