• Title/Summary/Keyword: 디지털 자산

Search Result 272, Processing Time 0.027 seconds

A user friendly NFT platform for Digital Assets (디지털 자산을 위한 사용자 친화적인 NFT 플랫폼)

  • Nitin Bhagat;Jong-Wook Bae;Su-Hyun Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.447-450
    • /
    • 2023
  • Blockchain technology has paved the way for the rise of non-fungible tokens(NFTs) in recent years. NFTs enable the unique ownership of digital assets and harness the power of blockchain's transparency and decentralization. However, existing NFT platforms often pose barriers to entry for the public due to their technical complexity and high issuance costs. To address the problem, this paper proposes a user-friendly NFT platform with a simplified issuance process. A home page is created to allow easy NFT issuance for anyone. These advancements are expected to foster the growth of the NFT market and facilitate the development of new business models.

  • PDF

A Study on the Relation between Record and Information Management and Knowledge Management from the Perspective of Knowledge Management : Focused on the Definition and Management Process (지식경영 관점에서 본 기록관리와 지식경영의 연관 관계 - 지식의 정의와 지식관리 프로세스를 중심으로 -)

  • Roh Jeong-Ran
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.4
    • /
    • pp.5-24
    • /
    • 2005
  • The various concepts of knowledge such as Knowledge Management(KM). Intellectual assets and digital knowledge asset management are currently important issues among many organizations. To the country like Korea that has professed Itself for a great power of knowledge Information and adopted KM and Record and Information Management (RIM) as the country's main polity, the study on the theoretical basis and best practices of KM and RIM from the perspective of Library & Information science is very urgent. However, many studies on knowledge including KM were mainly done at the business administrative field. and the consolidated study basis on knowledge even in the Library & Information Sciences was quite in deficiency, furthermore any discussion on knowledge, correlation among related systems and the possibilities of cooperation as the development of Information communication has not been done. Therefore, this study is to present the alternative plan of the consolidated management on knowledge through comparative analysis on the definition, main function and trend of KM & RIM. Especially, this study would be the theoretical basis to the public organizations that plan to introduce KM & RIM.

Comparative Analysis of Network-based Vulnerability Scanner for application in Nuclear Power Plants (원전 적용을 위한 네트워크 기반 취약점 스캐너의 비교 분석)

  • Lim, Su-chang;Kim, Do-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1392-1397
    • /
    • 2018
  • Nuclear power plants(NPPs) are protected as core facilities managed by major countries. Applying general IT technology to facilities of NPPs, the proportion of utilizing the digitized resources for the rest of the assets except for the existing installed analog type operating resources is increasing. Using the network to control the IT assets of NPPs can provide significant benefits, but the potential vulnerability of existing IT resources can lead to significant cyber security breaches that threaten the entire NPPs. In this paper, we analyze the nuclear cyber security vulnerability regulatory requirements, characteristics of existing vulnerability scanners and their requirements and investigate commercial and free vulnerability scanners. Based on the proposed application method, we can improve the efficiency of checking the network security vulnerability of NPPs when applying vulnerability scanner to NPPs.

Study on the Implementation of SBOM(Software Bill Of Materials) in Operational Nuclear Facilities (가동 중 원자력시설의 SBOM(Software Bill Of Materials)구현방안 연구)

  • Do-yeon Kim;Seong-su Yoon;Ieck-chae Euom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.229-244
    • /
    • 2024
  • Recently, supply chain attacks against nuclear facilities such as "Evil PLC" are increasing due to the application of digital technology in nuclear power plants such as the APR1400 reactor. Nuclear supply chain security requires a asset management system that can systematically manage a large number of providers due to the nature of the industry. However, due to the nature of the control system, there is a problem of inconsistent management of attribute information due to the long lifecycle of software assets. In addition, due to the availability of the operational technology, the introduction of automated configuration management is insufficient, and limitations such as input errors exist. This study proposes a systematic asset management system using SBOM(Software Bill Of Materials) and an improvement for input errors using natural language processing techniques.

The Role and Opportunity of Blockchain in the Fourth Industrial Revolution (4차 산업혁명에서의 블록체인의 역할과 기회)

  • Moon, Seung Hyeog
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.3
    • /
    • pp.55-60
    • /
    • 2019
  • It is true that Blockchain has been known as a core technology for cryptocurrency like bitcoin (BTC). It is caused by its rapid value rises. Now, one BTC is trading around 10,000 US dollars while it bought just less than one dollar at its first trading in May, 2010. Blockchain makes on-line transactions possible by the safe cryptocurrency swiftly based on P2P network and distributed public ledger while its on-line traffic is rapidly increasing. However, this technology has bigger potential in the fourth industrial revolution era and its application areas will be varied. The evolving intelligent information society needs to make new added value through utilizing, sharing and processing of useful digital information. Obstacles such as hacking and fraud often exist when transactions of digital properties, right transfers, etc. are done through digital network specialized with anonymity. It is expected that blockchain will be a definite solution in this regard. This paper addresses useful development directions and countermeasures for blokchain in the digital economy by analysis of its current status and issues.

A Study on Developing Framework for Measuring of Security Risk Appetite (보안 위험성향 측정을 위한 프레임워크 개발에 관한 연구)

  • Gim, Gisam;Park, Jinsang;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.141-148
    • /
    • 2019
  • The advancement of digital technology accelerates intelligence, convergence, and demands better change beyond traditional methods in all aspects of business models and technologies, infrastructure, processes, and platforms. Risk management is becoming more important because of various security risks, depending on the changing business environment and aligned to business goals is emerging from the existing information asset based risk management. For business aligned risk management, it is essential to understand the risk appetite for achieving business goals, which provides a basis for decision-making in subsequent risk management processes. In this paper, we propose a framework for analyzing the risk management framework, pre - existing risk analysis, and protection motivation theory that influences decisions on security risk management. To examine the practical feasibility of the developed risk appetite framework, we reviewed the applicability and significance of the proposed risk appetite framework through an advisory committee composed of security risk management specialists.

Proposal of a framework for evaluating the operational impact of cyber attacks on aviation weapons systems(EOICA) (항공무기체계 사이버공격에 대한 작전영향성평가 프레임워크 제안)

  • Hong, Byoung-jin;Kim, Wan-ju;Lee, Soo-jin;Lim, Jae-sung
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.35-45
    • /
    • 2020
  • Cyber attacks on the aviation weapon system, a state-of-the-art asset, have become a reality and are approaching as a constant threat. However, due to the characteristics of embedded software of the current aviation weapon system, it is managed and operated without connection to the network in peacetime, so the response management to cyber attacks is relatively weak. Therefore, when a cyber attack becomes a reality, it is urgent to prepare and evaluate measures for the adverse effects that such attack will have on the execution of the Air Tasking Order(ATO). In this paper, we propose a framework for operational impact assessment in order to avoid confusion in ATO execution and systematic response to cyber attacks on aviation weapons systems. The proposed framework is designed to minimize the negative impact on operations against cyber attacks that may occur under no warning by analyzing the impact on air operations for each aviation weapon system and standardizing countermeasures for this. In addition, it supports the operational commander to make a quick decision to command for the execution of the operation even in a situation where a cyber attack occurs.

Study on Automation of Comprehensive IT Asset Management (포괄적 IT 자산관리의 자동화에 관한 연구)

  • Wonseop Hwang;Daihwan Min;Junghwan Kim;Hanjin Lee
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • The IT environment is changing due to the acceleration of digital transformation in enterprises and organizations. This expansion of the digital space makes centralized cybersecurity controls more difficult. For this reason, cyberattacks are increasing in frequency and severity and are becoming more sophisticated, such as ransomware and digital supply chain attacks. Even in large organizations with numerous security personnel and systems, security incidents continue to occur due to unmanaged and unknown threats and vulnerabilities to IT assets. It's time to move beyond the current focus on detecting and responding to security threats to managing the full range of cyber risks. This requires the implementation of asset Inventory for comprehensive management by collecting and integrating all IT assets of the enterprise and organization in a wide range. IT Asset Management(ITAM) systems exist to identify and manage various assets from a financial and administrative perspective. However, the asset information managed in this way is not complete, and there are problems with duplication of data. Also, it is insufficient to update of data-set, including Network Infrastructure, Active Directory, Virtualization Management, and Cloud Platforms. In this study, we, the researcher group propose a new framework for automated 'Comprehensive IT Asset Management(CITAM)' required for security operations by designing a process to automatically collect asset data-set. Such as the Hostname, IP, MAC address, Serial, OS, installed software information, last seen time, those are already distributed and stored in operating IT security systems. CITAM framwork could classify them into unique device units through analysis processes in term of aggregation, normalization, deduplication, validation, and integration.

Analysis of Metaverse Technology Trends and Case Studies of Utilization in the Jewelry Industry in the Post-COVID (포스트 코로나의 메타버스 기술 동향과 주얼리 산업의 활용 사례 분석)

  • Hye-Rim Kang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.675-680
    • /
    • 2024
  • This study aims to examine the trends in Metaverse technology following the Post-COVID era and analyze the use cases in the jewelry industry. With the endemic, the business environment for companies has shifted from online to offline, leading to a reduced public interest in the Metaverse. However, examining the global jewelry brand trends in metaverse technology reveals advancements in AR/VR technologies that enhance realism and evolve the metaverse into a space without the uncanny gap between virtual and reality. The Metaverse exhibits three main characteristics in the Post-COVID era. First, there is a transformation in the business domain, starting with digital twins. Second, it is integrating with various information and communication technologies. Third, setting a direction for Metaverse operation as an omni-channel is being emphasized. Utilizing assets learned during the COVID-19 period and continuing to learn about digital and online technologies is essential for securing market competitiveness. This paper discusses how to enhance the competitiveness of jewelry industry entities based on the trends of Metaverse technology in the Post-COVID era.

Investigation on the Conservation Status of the 50-year-old "Yu Kil-Chun Archives" and an Effective and Practical Method of Preserving and Sharing Contents (출간 50년된 '유길준 전서(兪吉濬全書)'의 보존상태조사와 효과적인 자료보존과 공유방법)

  • Yoo, Woo Sik;Yoo, Seung Sun;Yoo, Byeong Ho;Yoo, Sung Jun
    • Journal of Conservation Science
    • /
    • v.37 no.2
    • /
    • pp.167-178
    • /
    • 2021
  • For the preservation and efficient content sharing of 5 volumes (2,866 pages) of Yu Kil-Chun's book published in 1971, which provides an important collection of data for the study of modern Korean history during the late 19th century (enlightenment period of Joseon dynasty). The books were purchased and its preservation status investigated and documented electronically by scanning for permanent preservation of content and to determine the condition of preservation at the time of documentation. The degree of deterioration and damage, such as discoloration, hardening, breakage, and damage in these 50 years old modern printed books was quantified through image analysis and made attempts to visualize the damaged areas. It was observed that the degree of deterioration and damage depended on the material and the surface condition of the paper used, the degree of exposure to light, and the storage environment. The comparison of the preservation status at the time of the photographing (or scanning) and judgment as to whether or not the image under investigation was artificially modified was accomplished by comparing the electronically documented images of Seoyugyeonmun (西遊見聞) in Volume 1 of Yu Kil-Chun's works with images provided on other websites. Practical problems encountered while considering the effective preservation of electronically documented data and publicly sharing it, in the course of this study, with other academic researchers around the world were also summarized.