• Title/Summary/Keyword: 보안 관리기

Search Result 167, Processing Time 0.028 seconds

IACS UR E26 - Analysis of the Cyber Resilience of Ships (국제선급협회 공통 규칙 - 선박의 사이버 복원력에 대한 기술적 분석)

  • Nam-seon Kang;Gum-jun Son;Rae-Chon Park;Chang-sik Lee;Seong-sang Yu
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.27-36
    • /
    • 2024
  • In this paper, we analyze the unified requirements of international association of classification societies - cyber resilience of ships, ahead of implementation of the agreement on July 1, 2024, and respond to ship cyber security and resilience programs based on 5 requirements, 17 details, and documents that must be submitted or maintained according to the ship's cyber resilience,. Measures include document management such as classification certification documents and design documents, configuration of a network with enhanced security, establishment of processes for accident response, configuration management using software tools, integrated network management, malware protection, and detection of ship network security threats with security management solutions. proposed a technology capable of real-time response.

Home Security System based on DLNA (DLNA를 기반으로 한 홈 시큐리티 시스템)

  • Ju, Jung Hyun;Kim, Dae Jin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.07a
    • /
    • pp.484-485
    • /
    • 2011
  • 최근 사회가 급속도로 발전하고 있는 동시에 흉악범죄가 증가하고 있다. 이에 따라 사람들은 범죄에 대한 안전 불감증이 증가하여 위기관리에 대한 관심이 높아지고 있다. 그리하여 다양한 보안업체가 생성되고 있고 이러한 보안업체들은 첨단기술을 이용하여 첨단장비를 만들어 사회 곳곳에서 치안 유지에 만전을 기하고 있다. 이렇듯 홈 시큐리티는 점점 그 중요성을 더해가고 있다. 하지만 이러한 보안업체 장비들은 일반 가정에서 사용하기에는 값이 비싸 이용하기가 쉽지가 않다. 본 논문에서는 이러한 값비싼 첨단장비를 대체하기 위하여 값이 싼 CAM을 이용하여 최근에 많은 디바이스 탑재되고 있는 DLNA를 기반으로 한 홈 시큐리티 시스템을 제안하고자 한다.

  • PDF

Analysis and design of Meter data structure to secure confidentiality (검침데이터 기밀성확보를 위한 구조분석 및 설계)

  • Baek, Jong-Mock;Choi, Moon-Suk;Lim, Yong-Hun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.323-324
    • /
    • 2011
  • 유틸리티에서 검침은 고객에게 제공한 에너지의 사용량을 계량하고 요금을 부과하기 위한 중요한 정보이며 검침방법이 종래의 인력검침에서 자동원격검침으로 발전함에 따라 계량기에서 검침서버로 전송되는 통신망에서 보안관리가 중요시 되고 있다. 보안의 방법은 중간의 통신망 형태, 통신 매체, 전송되는 데이터의 구조 등을 반영하여 적정한 보안방법이 적용되어야 하겠지만 본 논문에서는 현재 전기검침에 적용되는 국제규격 DLMS/COSEM데이터의 구조를 분석하고 기밀성을 보장하기 위한 방안을 제시하였다.

  • PDF

The Service Log Analyser for Blocking Unused Account on Internet Services (인터넷 서비스 미 사용 계정 차단을 위한 서비스 로그 분석기)

  • Jung, Kyu-Cheol;Lee, Jin-Kwan;Lee, Dae-Hyung;Jang, Hae-Suk;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.73-80
    • /
    • 2007
  • The fact that since Internet has been spreaded widely to people, Many security problems also have been grown too much. Due to sudden growth, administrator's responsibility for secure network and services has been growing more and more. This paper represents how to prevent account which didn't use for long period on multi domains environment using service log analysis. hence administrator can find security hole on systems and can dealing with it. The Service Log Analyzer is that loading log file which are written by each service and analyzing them. as a result it makes a list named Used User List contains a number of account names which uses specific services. When the time has come - means cron job schedule time, User Usage Shifter is the next runner. it's mission is finding the person who didn't used service for a specific period of time. Then modifying the expire day of the account information.

  • PDF

Risk Management and Strategies in Airport Security Check (공항 보안검색에 있어서의 위험관리와 대응과제)

  • Kim, Jae-Woon
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.89-113
    • /
    • 2013
  • Travel by airplane using airport in globalized modern society is familiar to our life but such airport can be a target of terrorists who would threaten our safety. However, aviation terrorism which is represented by 9.11 terror gives horror beyond our imagination to modern people. Since the first airplane hijacking in Peru in 1931 happened, security organization in each nation has taken various prevention measures to block aviation terrorism. The most realistic measures to prevent aviation terrorism would be security check activity to control approach of terrorist that passengers on airplane and cargos are checked to find out dangerous article like explosive etc. But security check activity in Korea shifted to security check activity focused on private security for efficiency of airport operation differently from security check activity in advanced countries where public interests is strengthened according to risk of terror after 9.11 system. That is, since Incheon airport opened in March 2001, security check system focused on the police was changed. Now Incheon international airport Corporation instructs and supervises security check job and private security personnel are in charge of actual security check activity. But this check system has limitation in blocking terror activity by terrorists which is systematized and intelligent as time passes due to deteriorated job satisfaction of private security personnel and confusing supervising system. Accordingly, it is suggested to introduce risk management skill which is one of management strategy of private corporation for security check activity to prevent terror activity. With this skill, risk factors of aviation terror are identified and analyzed regularly, and each process such as setting of priority, activity to reduce risk, and assessment of security is carried out. And it would be necessary to do efforts, for example, to properly change level of security check according to threat of terror such as to place policeman at airport security in case threat of terror is severe. On the other hand, it is necessary to establish national police organization for good communication of security check activity in field and supervising function, which can encourage systematization and specialization of aviation security job.

  • PDF

Real-Time File Access Event Collection Methodology for Zero Trust Environment (제로 트러스트 환경의 실시간 파일 접근 이벤트 수집 방법에 관한 연구)

  • Han, Sung-Hwa;Lee, Hoo-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1391-1396
    • /
    • 2021
  • The boundary-based security system has the advantage of high operational efficiency and easy management of security solutions, and is suitable for denying external security threats. However, since it is operated on the premise of a trusted user, it is not suitable to deny security threats that occur from within. A zero trust access control model was proposed to solve this problem of the boundary-based security system. In the zero trust access control model, the security requirements for real-time security event monitoring must be satisfied. In this study, we propose a monitoring method for the most basic file access among real-time monitoring functions. The proposed monitoring method operates at the kernel level and has the advantage of fundamentally preventing monitoring evasion due to the user's file bypass access. However, this study focuses on the monitoring method, so additional research to extend it to the access control function should be continued.

Performance Enhancement Architecture including Location Information Secrecy for HLR System (위치 정보의 보안성이 고려된 가입자 위치등록기 시스템의 새로운 구조)

  • 김자환
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.103-108
    • /
    • 2004
  • A Home Location Register(HLR) database system manages each subscriber's location information, which continuously changes in a cellular network. For this purpose, the HLR database system provides table management, index management, and backup management facilities. In this thesis, I propose using a two-level index method for the mobile directory number(MDN) as a suitable method and a chained bucket hashing method for the electronic serial number(ESN). Both the MDN and the ESN are used as keys in the HLR database system. I also propose an efficient backup method that takes into account the characteristics of HLR database transactions. The retrieval speed and the memory usage of the two-level index method are better than those of the T-tree index method. The insertion and deletion overhead of the chained bucket hashing method is less than that of the modified linear hashing method. In the proposed backup method, I use two kinds of dirty flags in order to solvethe performance degradation problem caused by frequent registration-location operations. I also propose using additional attributes in the HLR database scheme for location information secrecy as a suitable security method.

  • PDF

A Secure and Efficient Management Scheme based Heterogeneous RFIDs for Ubiquitous Environments (유비쿼터스 환경에서의 안전하고 효율적인 이종 RFID 관리 기법)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.275-285
    • /
    • 2009
  • RFID technology using the smart tag technology as a part of the sensor network is currently in the spotlight. But there are still many problems in applying the technology in a ubiquitous environment, induding at the point when anybody can read the tag information and the authentication between the tag and the reader, and security problems in very low-cost smart tag implementation. The proposed scheme is designed to enhance security and efficiency related to various services required in RF networks, based on the reliable peripheral devices for users of passive RFID tag. Using passive RFID tag, which has been applied to authentication transactions in existing papers, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services. also proposed scheme is support RFID grouping, temporary group of service and security servicce, improved efficiency of communication.

국내 디지털 복합기 및 프린터 시장 동향

  • Park, Ji-Yeon
    • The Optical Journal
    • /
    • s.110
    • /
    • pp.22-26
    • /
    • 2007
  • 2007년 복사기를 기반으로 한 복합기와 프린터를 포함한 사무기기 시장의 화두는 '컬러화' 와 '솔루션화' 에 맞춰진다. 예전에는 컬러기로 진행에 있어 걸림돌이 가격이었다면 요즘에는 흑백복사기의 1.5배 수준까지 가격이 떨어진 컬러제품이 속속 등장하면서 사무환경에서 컬러기는 하나의 대세가 됐다. 또한 솔루션은 선택이 아닌 필수요인으로 대두되고 있는 상황이다. 이미 복사기 업체와 프린터 업체들은 '솔루션 제공 및 컨설팅 업체' 로 변신을 선언하고 단순 기기 판매방식에서 벗어나 사무환경에 비용과 생산성을 따져 '맞춤 환경' 을 컨설팅 하는 업체로 발 벗고 나선지 오래다. 특히 관공서 및 대기업 등을 중심으로 총소요비용 절감을 통한 기업 생산성 혁신에 관심이 모아지면서 이러한 기업 프린팅 솔루션 시장을 타깃으로 보안과 통합관리, 총소요비용의 절감 등에 초점을 맞춘 메이커들의 솔루션 마케팅 경쟁이 더욱 치열할 것으로 보인다.

  • PDF

A Study Medium-based safe File Management Security System on the cloud Environment (클라우드 환경에서 매체기반의 안전한 파일관리 보안 시스템에 대한 연구)

  • Kim, Hee-Chul
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.142-150
    • /
    • 2019
  • This study is a file management security system that encrypts and decrypts computer and cloud data by using Bluetooth based cryptographic module. It is a necessary solution in terms of abuse of personal information and protection of social and national information. We developed H/W and S/W for SFMS(: Safe File Management Security) related Bluetooth module in cloud environment and implemented firmware development, encryption key generation and issuance, client program for system mobile and key management system. In the terminal internal encryption and decryption, SFMS was developed to ensure high security that the hacking itself is not possible because key values exist separately for each file.