• Title/Summary/Keyword: 보안 중요도

Search Result 2,301, Processing Time 0.025 seconds

Determining Priority of the Action Plan of Facilitation in Air Transport (Using CK model of Data Envelopment Analysis) (항공부문 출입국 절차 간소화 추진과제의 우선순위 결정 (자료포락분석기법 (DEA)의 CK 모형 적용))

  • Kim, Min-Jung;Hong, Seock-Jin;Kim, Yeon-Myung
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.3
    • /
    • pp.7-16
    • /
    • 2008
  • The immigration procedure at airports is vital to making passenger and cargo transport faster. The rapid procedure of immigration could be an important determining factor when passengers select an air transport company, one that should have high satisfactory in terms of their service level and efficiency. Therefore, the advanced airport makes it easy for customers and their cargo to proceed. The coordination between authorities related to the Korean international airport is not satisfactory for customers. This paper analyzes the factors necessary to enhance the airport immigration procedure with the movement of aircrafts, passengers, cargo, and post, using the CK(Cook and Kress) model of DEA(Data Envelopment Analysis). From this study, the author found that research and development will be needed to improve the immigration procedure, especially on facilities and their operating systems. There are needed, also, performance indicators and a continuous monitoring system.

Design and Analysis of the Web Stegodata Detection Systems using the Intrusion Detection Systems (침입탐지 시스템을 이용한 웹 스테고데이터 검출 시스템 설계 및 분석)

  • Do, Kyoung-Hwa;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.39-46
    • /
    • 2004
  • It has been happening to transfer not only the general information but also the valuable information through the universal Internet. So security accidents as the expose of secret data and document increase. But we don't have stable structure for transmitting important data. Accordingly, in this paper we intend to use network based Intrusion Detection System modules and detect the extrusion of important data through the network, and propose and design the method for investigating concealment data to protect important data and investigate the secret document against the terrorism. We analyze the method for investigating concealment data, especially we use existing steganalysis techniques, so we propose and design the module emphasizing on the method for investigating stego-data in E-mail of attach files or Web-data of JPG, WAVE etc. Besides, we analyze the outcome through the experiment of the proposed stego-data detection system.

Social network analysis of keyword community network in IoT patent data (키워드 커뮤니티 네트워크의 소셜 네트워크 분석을 이용한 사물 인터넷 특허 분석)

  • Kim, Do Hyun;Kim, Hyon Hee;Kim, Donggeon;Jo, Jinnam
    • The Korean Journal of Applied Statistics
    • /
    • v.29 no.4
    • /
    • pp.719-728
    • /
    • 2016
  • In this paper, we analyzed IoT patent data using the social network analysis of keyword community network in patents related to Internet of Things technology. To identify the difference of IoT patent trends between Korea and USA, 100 Korea patents and 100 USA patents were collected, respectively. First, we first extracted important keywords from IoT patent abstracts using the TF-IDF weight and their correlation and then constructed the keyword network based on the selected keywords. Second, we constructed a keyword community network based on the keyword community and performed social network analysis. Our experimental results showed while Korea patents focus on the core technologies of IoT (such as security, semiconductors and image process areas), USA patents focus on the applications of IoT (such as the smart home, interactive media and telecommunications).

A Study on Access Control Technique for Provision of Cloud Service in SSO-based Environment

  • Eun-Gyeom Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.73-80
    • /
    • 2023
  • In this paper, a technology to protect important information from access in order to revitalize the cloud service market. A technology is proposed to solve the risk of leakage of important confidential and personal information stored in cloud systems, which is one of the various obstacles to the cloud service market. To protect important information, access control rights to cloud resources are granted to cloud service providers and general users. The system administrator has superuser authority to maintain and manage the system. Client computing services are managed by an external cloud service provider, and information is also stored in an external system. To protect important in-house information within the company, all users, it was designed to provide access authority with users including cloud service providers, only after they are authenticated. It is expected that the confidentiality of cloud computing resources and service reliability achieved through the proposed access control technology will contribute to revitalizing the cloud service market.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

The Legal Study of Prohibited Items on Aeroplane for the Aircraft Safety and Security (항공안전보장.질서유지를 위한 항공기반입금지 물품 관리.감독에 관한 입법적 개선방안)

  • Chang, In-Ho
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.1
    • /
    • pp.33-66
    • /
    • 2014
  • While the numbers of overseas travelers has been increased rapidly each year, the numbers of passengers in the aircraft also has continued to be increased gradually. In the mist of these increasing numbers, such accidents as threatening an aircraft safety like riot, aircraft hijacking and terrorism have happened constantly. In these circumstances, South Korean government has prescribed "Aviation on Security Act" in accordance with the Convention on International Civil Aviation and other international agreements. This act aims to prevent illegal activities and illegal items on the aircraft to ensure the safety and security of civil aviation. However, this act is not sufficiently regulating all the illegal crimes and illegal items on the flight. For the worse, there is a lack of effective supervisory capacity. Likewise, the inherent problems of the current laws relating to the prevention of the illegal items on the aircraft are appearing on the surface continually. Above all, illegal items on the aircraft are directly connected to the issue of aviation safety and security as well as a safe utilization of the flight service. Thus, when there occurs a serious accident on board, it surely would be led to a huge economic loss not mentioning the loss of lives following the accident. Therefore safety of the flight passengers cannot be guaranteed without ensuring the safety of aircraft facilities and good supervisory mechanism of illegal items on the aircraft. Accordingly, establishing a safe operation order tends to influence economy and tourism of a country in no small measure. Therefore, it is an urgent issue to settle down a reasonable and adequate supervisory regulations regarding the prevention of the illegal items on the aircraft. Consequently, in this article, I studied on a reasonal and effective mechanism to control the prevention of the illegal items and illegal acts on the aircraft in order to ensure a safety and security of civil aircraft.

Implementaion Mechanism of Homepage Failure Notification System in Public Sector in IDC Environment (IDC환경에서 공공부문 홈페이지 장애상황공지 시스템 구축방안)

  • Kim, Yong-Tae;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.426-433
    • /
    • 2021
  • Investment in public sector information services has been on the rise in recent years. The supply of high-speed Internet and smartphones has become more common, and the stability of the information system provided to the public in the public sector has become an important management factor. In other words, tasks such as handling civil complaints and issuing certificates by public institutions, financial transactions by banks, customs clearance work, and e-commerce by individuals or institutions are mostly done online. Therefore, how to deal with obstacles arising from the information system, which is in charge of important civil service affairs, is becoming a very important issue. In other words, in the case of a disability that does not function normally even for a short period of time, various problems can occur when the work is delayed, as well as causing serious financial damage to the civil petitioner. This could be accompanied by a decline in public confidence and various other damages such as filing civil complaints. The reasons for the occurrence of information system failures are very diverse and realistically difficult to predict when. Among the various measures to cope with disability, this paper proposed a plan to establish a disability situation notification system that can minimize confusion caused by disability in the event of a homepage malfunction. The proposed disability situation notification system was established in the public IDC environment to show the possibility of utilization.

A Study on the Advance Transportation System for Inter Terminal Transshipment: Focused on the Busan New Port (타부두 환적화물에 적합한 운송수단에 관한 연구;부산항 신항을 중심으로)

  • Jo, Mi-Ji;Lee, Seung-Pil;Kim, Hwan-Seong
    • Journal of Navigation and Port Research
    • /
    • v.44 no.4
    • /
    • pp.298-304
    • /
    • 2020
  • The purpose of this study was to identify evaluation factors and analyze the relative importance among factors to select a suitable transportation method for transferring the increasing amount of transshipment at multiple terminals at the Busan new port. To accomplish this, the evaluation factors were selected through a literature survey and brainstorming of a group of experts associated with the port operation, and were classified into five major factors and 15 middle factors. The evaluation factors classified hierarchically were surveyed relative to workers in organizations such as shipping companies, port corporations, container terminals, and related ministries. The importance of each factor was calculated using the hierarchical analysis process (AHP). As a result of the importance analysis, priority was assigned in order of safety, productivity, investment efficiency, operational efficiency, and policy conformity. Through this, it was necessary to select a suitable transportation method for the transshipment cargo in terminals while focusing on the cargo and terminal security and preventing accidents. As a result of calculating from six ITT transportation candidates, the priority was determined in order of monorail, Autocon, and so on as ITT transportation suitable for the Busan new port..

Perceptions of Information Technology Competencies among Gifted and Non-gifted High School Students (영재와 평재 고등학생의 IT 역량에 대한 인식)

  • Shin, Min;Ahn, Doehee
    • Journal of Gifted/Talented Education
    • /
    • v.25 no.2
    • /
    • pp.339-358
    • /
    • 2015
  • This study was to examine perceptions of information technology(IT) competencies among gifted and non-gifted students(i.e., information science high school students and technical high school students). Of the 370 high school students surveyed from 3 high schools(i.e., gifted academy, information science high school, and technical high school) in three metropolitan cities, Korea, 351 students completed and returned the questionnaires yielding a total response rate of 94.86%. High school students recognized the IT professional competence as being most important when recruiting IT employees. And they considered that practice-oriented education was the most importantly needed to improve their IT skills. In addition, the most important sub-factors of IT core competencies among gifted academy students and information science high school students were basic software skills. Also Technical high school students responded that the main network and security capabilities were the most importantly needed to do so. Finally, the most appropriate training courses for enhancing IT competencies were recognized differently among gifted and non-gifted students. Gifted academy students responded that the 'algorithm' was the mostly needed for enhancing IT competencies, whereas information science high school students responded that 'data structures' and 'computer architecture' were mostly needed to do. For technical high school students, they responded that a 'programming language' course was the most needed to do so. Results are discussed in relations to IT corporate and school settings.

Cyber-Salesman : An Agent negotiating with Customers (가상점원 : 고객과의 협상을 위한 에이전트)

  • 조의성;조근식
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.06a
    • /
    • pp.217-225
    • /
    • 1999
  • 협상은 상거래에 있어서 매우 중요한 요소 중 하나이다. 현재의 웹 기반 전자상거래 시스템은 이러한 중요한 협상 구조를 상거래에 잘 반영하지 못하는 문제점을 가지고 있다. 이러한 문제점중 기업과 소비자간의 미비한 협상 구조를 보안하기 위해 실세계 상거래에서 존재하는 점원을 전자상거래상의 가상점원으로 모델링하여 회사의 정책과 구매자의 특성을 반영하여 구매자와 전략적으로 자동 협상을 수행할 수 있는 에이전트의 구조를 설계하고 구현하였다. 협상은 매우 복잡한 구조를 가지고 있다. 이러한 협상 구조를 지원하기 위해서는 상호간의 제안을 표현하고, 그 제안에 대한 평가 내용과 결정사항을 전달할 수 있는 언어적인 조가 필요하며, 협상의 대상이 되는 사안들의 특성을 반영할 수 있는 표현 구조도 요구된다. 또한 이러한 협상에서 전략을 세우고 알맞은 제안을 제시하며 상대의 제안에 대하여 전략적으로 반응할 수 있는 의사결정 모델이 요구된다. 본 논문에서는 회사의 정책 모델과 구매자의 모델을 정의하고 이를 이용한 협상 모델을 설계 구현하였다. 협상 구조의 모델링을 위해 KQML(Knowledge Query Manipulation Language)을 기반으로 전자상거래 프로토콜로 설계하고, 논쟁 기반 협상 모델을 기초로 협상언어를 설계하였다. 또한 협상에서의 전략적인 의사결정을 위해 게임이론을 이용하고, 규칙 기반 시스템으로 이를 보충하였다. 마지막으로 가상점원 모델을 바탕으로 조립 컴퓨터 판매를 위한 가상점원을 구현하였고, 이에 대한 실험을 통하여 가상점원의 유용성을 보였다.

  • PDF