• Title/Summary/Keyword: 보안 중요도

Search Result 2,285, Processing Time 0.026 seconds

The Evaluation of Occupational Health Program at a Granite Company in U.S.A. (일개 채석산업장의 산업보건프로그램 평가)

  • Yi, Sung-Eun
    • Research in Community and Public Health Nursing
    • /
    • v.13 no.3
    • /
    • pp.574-583
    • /
    • 2002
  • '채석(quarrying)'산업은 노천광산에서 광물을 캐내는 작업을 모두 포함하는 광범위한 산업을 의미한다. 1900년대에 들어오면서 채석작업에 홈연소기(channel burner)을 이용한 불꽃절개법(flame cutting)이 이용하여 근로자의 먼지 노출이 많이 감소하였다. 채석작업으로 인한 주 된 건강문제는 먼지, 소음, 진동 노출이며, 노천작업장으로 작업환경이 개방되어 있어 환경측정 및 관리가 불가능하므로 개별근로자의 먼지와 소음 노출 측정 및 예방이 중요하다. 본 연구는 미국의 일개 채석회사의 근로자 건강관리사업을 평가하였다. 연구자료는 저자가 현장 방문을 통하여 구한 자료와 연구대상 회사의 안전관리자의 의견 및 미국 산업안전보건국 전산자료를 이용하였다. 채석사업장에서 이루어지는 작업은 크게 채석작업과 실내에서 이루어지는 가공작업 및 운반과 보관이며, 미국 산업안전보건국(OSHA)의 표준산업분류(SIC)에서 1411(채석업)과 3281(채석가공업)에 해당한다<표 1>. 연구 대상 사업장에서 이루어지는 산업보건프로그램은 먼지 노출 예방을 위해 석재 채취시 물분사법(water jet quarrying)과 국소환기법을 사용하고 소음 노출 예방을 위해 귀마개를 사용하며 사고 예방을 위하여 안전모와 철모, 보안경, 안전조끼, 보호장갑, 안전끈(harness)을 착용하였다. 평가 결과로 나온 연구 대상 사업장에서 적용하여야 할 산업보건 프로그램은 첫째, 먼지 노출로 인한 건강문제를 예방하기 위하여 근로자 개별 노출 측정을 하고, 둘째 실내가공작업장의 근로자를 대상으로 한 먼지와 소음 노출 측정 및 환경측정이 필요하며, 셋째 안전관리를 위해 채석장에 안전표지판을 설치하여야 하며, 실내가공 작업장의 자동이동시스템을 작업별로 채색하여 식별을 용이하게 하여야 하겠다. 또한 이 연구 결과를 영세사업장의 산업간호프로그램인 'Clean 3D'사업에서 적용하여 우리나라 채석사업장 근로자 건강관리를 발전시켜야 하겠다.

  • PDF

Fusion algorithm for Integrated Face and Gait Identification (얼굴과 발걸음을 결합한 인식)

  • Nizami, Imran Fareed;An, Sung-Je;Hong, Sung-Jun;Lee, Hee-Sung;Kim, Eun-Tai;Park, Mig-Non
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.72-77
    • /
    • 2008
  • Identification of humans from multiple view points is an important task for surveillance and security purposes. For optimal performance the system should use the maximum information available from sensors. Multimodal biometric systems are capable of utilizing more than one physiological or behavioral characteristic for enrollment, verification, or identification. Since gait alone is not yet established as a very distinctive feature, this paper presents an approach to fuse face and gait for identification. In this paper we will use the single camera case i.e both the face and gait recognition is done using the same set of images captured by a single camera. The aim of this paper is to improve the performance of the system by utilizing the maximum amount of information available in the images. Fusion in considered at decision level. The proposed algorithm is tested on the NLPR database.

Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.517-520
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking stork dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.317-320
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and Classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on December in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attack thus far. Therefore, we will use big data analytics to analyze whether or not APT attack has occurred in order to defend against the manipulative attackers. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean defense system. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attack and evaluate the models' accuracy and other results. Lastly, we will present an effective response method to address a detected APT attack.

  • PDF

New Pre-processing Method for Second-Order CPA on the IT Convergence Device (IT융합 디바이스에 대한 물리적 2차 CPA 공격을 위한 새로운 전처리 기법)

  • Lee, Chul-Hee;Hwang, Ah-Reum;Lee, Dong-Geon;Kim, Hyoung-Nam;Kim, Ho-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1369-1380
    • /
    • 2010
  • In this paper, we propose the efficient Second-Order Differential Power Analysis attack, which has ability to find significant information such as secret key in the devices consisting IT convergence environment such as Smartgrid, Advanced Metering Infrastructure(AMI) and ZigBee-based home networking service. This method helps to find the secret key easily at a device, even though it uses a countermeasure like masking which makes First-Order DPA attack harder. First, we present the performance results of our implementation which implements practical Second-Order DPA attack using the existing preprocessing function, and analyze it. Then we propose a stronger preprocessing function which overcomes countermeasures like masking. Finally, we analyze the results of the Second-Order CPA attack using proposed preprocessing function and verify that proposed scheme is very threatening to the security fields of IT convergence technology through the experimental results.

A Study on the Electronic Processing of Bidding Business for Public Procurement in Construction Industry (건설산업 공공조달을 위한 입찰업무 전자처리에 관한 연구)

  • Ahn Kwang-Hoon;Cheon Bong-Gi;Kim Seung-Kyun;Kim Yea-Sang
    • Korean Journal of Construction Engineering and Management
    • /
    • v.3 no.2 s.10
    • /
    • pp.114-120
    • /
    • 2002
  • Traditional bidding process and activities in public construction area has many problems in terms of the transparency and fairness of administration. And, it causes many expenses to suppliers. As part of the efforts to solve these problems, some public institutions developed the electronic bidding systems. But these systems have still problems in diverse aspects. Therefore, the purpose of this study is to analyze current bidding systems through literature survey, Questionnaire, contentment estimation and IDEF method to compare the result of the analysis with the developed electronic bidding systems and to suggest the improvement for the coming bidding systems. According to the survey, under present bidding system big problem is inconvenience of conducting process. Nearly all users of current electronic bidding systems were contented. When public institutions are planning new electronic bidding systems, standardization, security, law and bidding system consolidation must be applied. This study proposes an improved bidding system and described the effects through the improvements.

A Study of Authentication Scheme using Biometric-Based Effectiveness Analysis in Mobile Devices (모바일 장치에서 신체정보기반의 효용성 분석을 이용한 인증기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.795-801
    • /
    • 2013
  • As the life which existed only offline has changed into a life part of which is led online, it is an important problem to identify whether an online user is legitimate one or not. Biometric authentication technology was developed to identify the user more correctly either online or in offline daily life. Biometric authentication is a technology where a person is identified by his or her unique characteristics, and is highlighted as a next-generation authentication technology replacing password. There are various kinds of traits unique to each individual, and biometric authentication technologies drawing on such traits use various devices and algorithms. Firstly, this paper classified such various biometric authentication technologies, and analyzed the effects of them when they are applied on smartphone, smartwatch and M2M of the different devices platforms. Secondly, it suggested the effectiveness-based AIB(Authentication for Integrated Biometrics) authentication technique, a comprehensive authentication technique, which can be used in different devices platforms. We have successfully included the establishment scheme of the effectiveness authentication using biometrics.

A Study on Management Plans for Activating of Smart Work (스마트워크 활성화를 위한 경영관리 방안)

  • Lee, Seung-Hee;Do, Hyeon-Ok;Seo, Kyeong-Do
    • Journal of Digital Convergence
    • /
    • v.9 no.4
    • /
    • pp.245-252
    • /
    • 2011
  • This study review about smart work to appear the use of smart device, and find the management plan for activating of smart work. Our national's smart work that is the best internet environment in worldwide fall behind foreign country. This study offers for the activating strategies of smart work. Fist, it is to change perception about smart work. Second, it should be clear up legal definition and category of smart-work. Third, it is that tighten up security of smart equipment. It is hard to achieve effects, as long as we get used to face-to-face work processing. Based on accurate perception about smart work on both employees and manager, this study suggest that it is important to change perception and to make actively use of smart work.

A Secure Tunnel Broker for the IPv6 based Wireless Ad-hoc Network (IPv6 기반 이동 Ad-hoc 네트워크를 위한 안전한 터널 브로커)

  • Yang Jong-Won;Kim Won-Joo;Seo Chang-Ho;Kim Seok-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.41-49
    • /
    • 2006
  • Wireless AD-hoc network can construct a network itself without any arbitrator. Therefore, it is difficult to make preparation for disguised assault from an illegal node, and because lots of packets from disguised assault spread over whole network, it influences the network usability and livability. This thesis proposed a safe IPv6 tunnel broker (TB) based on TSP (Tunnel Setup Protocol) to improve safety of the wireless Ad-hoc network, and to solve security problem of a tunnel broker that makes a linkage IPv4 and IPv6. To communicate between client and the tunnel broker, proposed method does not base on HTTP, but S-HTTP (Secure-HTTP) and it uses encryption/decryption to send and receive XML document. Finally, this method encrypts (decrypts) important information by applying IPSec between client and TS (Tunnel Server).

Relative Location based Risk Calculation to Prevent Identity Theft in Electronic Payment Systems (전자지불거래에서 상대위치와 연동한 도용 위험성 산출방법)

  • Suh, Hyo-Joong;Hwang, Hoyoung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.455-461
    • /
    • 2020
  • Electronic payment system using Internet banking is a very important application for users of e-commerce environment. With rapidly growing use of fintech applications, the risk and damage caused by malicious hacking or identity theft are getting significant. To prevent the damage, fraud detection system (FDS) calculates the risk of the electronic payment transactions using user profiles including types of goods, device status, user location, and so on. In this paper, we propose a new risk calculation method using relative location of users such as SSID of wireless LAN AP and MAC address. Those relative location information are more difficult to imitate or copy compared with conventional physical location information like nation, GPS coordinates, or IP address. The new method using relative location and cumulative user characteristics will enable stronger risk calculation function to FDS and thus give enhanced security to electronic payment systems.