• Title/Summary/Keyword: 보안 중요도

Search Result 2,285, Processing Time 0.036 seconds

Study on threat analysis about national important facility and control process (국가중요시설에 대한 위협분석과 처리절차에 관한 연구 - 인천국제공항을 중심으로 -)

  • Hwang, Ho-Won;Lee, Ki-Hun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.17 no.2
    • /
    • pp.31-40
    • /
    • 2009
  • South Korea opened Incheon international airport(IIA) in march 29, 2001, with high expectations of becoming the distribution hub of Northeast Asia and aiming at a world best air hub. IIA compares quite well with any other leading airports in the world in it's facilities for the movement of people and vehicles. However, with the sequence of events following the September, 2001. terrorist attack and the war in Iraq, South Korea, an ally of the US, cannot be considered a safe haven from terrorism. At a point in time when national security is given utmost importance, it is necessary to reevaluate the security of airports, because international terrorism can only occur via air and seaports. Nowadays all the countries of the world have entered into competition for their national interests and innovation of their images. with the increasing role of international airports also comes an increased likelihood as a terrorist target, because it can affect so many people and countries. From the condition of current international terrorism, we can realize that our IIA is not completely safe from a terrorist attack. The major part of counterterrorism is event control process. It's very important for quickly saves an accident and rescues a life of person, In addition for the normalization which the airport operation is prompt. In conclusion, we should secure the legal responsibility and establish and establish a system under which we can work actively in order to implement counter terror activities from being taken an airport.

  • PDF

A Study on Application Methods of Drone Technology (드론기술 적용 방안 연구)

  • Kim, Hee-Wan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.601-608
    • /
    • 2017
  • In the fourth industrial revolution, drones are an important element to lead the industry by converging with information technology. Drones are developing various technologies by combining with communication / navigation / traffic management technology, control and detection / avoidance technology, sensor technology, SW and application technology. However, there are various problems in order to settle the drone technology. In this paper, it will be examined the problems of application of drones through application fields of drones, domestic and foreign cases, and core technologies of drones. The growth of the drone market requires improvement of laws and institutions. This paper proposed security vulnerability, privacy and safety problem in wireless communication, and present technical and management problems for drone service in the Korean environment in particular.

An Approach to Constructing an Efficient Entropy Source on Multicore Processor (멀티코어 환경에서 효율적인 엔트로피 원의 설계 기법)

  • Kim, SeongGyeom;Lee, SeungJoon;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.61-71
    • /
    • 2018
  • In the Internet of Things, in which plenty of devices have connection to each other, cryptographically secure Random Number Generators (RNGs) are essential. Particularly, entropy source, which is the only one non-deterministic part in generating random numbers, has to equip with an unpredictable noise source(or more) for the required security strength. This might cause an requirement of additional hardware extracting noise source. Although additional hardware resources has better performance, it is needed to make the best use of existing resources in order to avoid extra costs, such as area, power consumption. In this paper, we suggest an entropy source which uses a multi-threaded program without any additional hardware. As a result, it reduces the difficulty when implementing on lightweight, low-power devices. Additionally, according to NIST's entropy estimation test suite, the suggested entropy source is tested to be secure enough for source of entropy input.

A Study on Mobile Forensic Data Acquisition Method Based on Manufacturer's Backup Mobile App (모바일 포렌식 증거 수집방안 연구: 제조사 백업 앱 기반 데이터 획득 기법)

  • Choi, Jaewon;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.95-110
    • /
    • 2018
  • With the widespread use of smartphones, various personal information of users is being recorded on a smartphone in real time. For the purpose of preventing the loss of important personal information of users, manufacturer provides a smartphone backup applications. Recently, not only backup programs for PC but also backup mobile apps for smart phones have been provided. From the point of view acquiring forensic data, it is important not to compromise the acquisition possibilities and the integrity of the original data. Especially, in the case of Android smartphones, various studies are being carried out to acquire the data without damaging the integrity of the original data. However, there are limitations to apply the existing research methods. In this paper, we describe the process of acquiring data using the backup mobile app provided by the manufacturer without compromising the integrity of the latest smartphone.

Cyber kill chain strategy for hitting attacker origin (공격 원점지 타격을 위한 사이버 킬체인 전략)

  • Yoo, Jae-won;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.306-309
    • /
    • 2017
  • The development of modern ICT technology constitutes cyber world by using infrastructure in country and society. There is no border in cyber world. Countries around the world are carrying out cyber attacks for their own benefit. A cyber killer strategy is needed to defend cyber attacks. In order to defend the cyber attack or to determine the responsibility of attack, it is important to grasp the attacker origin point. Strategic cyber kill chains are needed to strike against the attacker origin. In this paper, we study the analysis of attacker origin. And analyze the cyber kill chain for attacker origin point strike. Study the efficient and customized cyber kill chain strategy for attacking the origin point. The cyber kill chain strategy will be a practical strategy to replace the power of nuclear and missiles with asymmetric power.

  • PDF

Implementation of Web-based Data Storage Service System Using External Storage Devices (외장형 저장장치를 이용한 웹 기반 데이터 스토리지 서비스 시스템 구현)

  • Kim, Buemjun;Lee, Kyounghee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.111-114
    • /
    • 2017
  • As digital contents are widely used and require increasingly high quality, the data storage services over Internet also become more and more important. One of popular services, web-hard, provides lots of users with web-based functions for data storage, management and sharing but such storage utilization requires quite high cost compared to using portable storage devices. Moreover, some users may avoid putting their important data into open Internet area. On the other hand, portable storage devices are cheaper but can be used only when they are physically connected to host devices such as PC. Also additional management and security functions should be equipped to support data sharing among users. In this paper, we propose a web-based data storage system combining those advantages of aforementioned two approaches. The proposed system immediately provides web-based services for data management and sharing when a portable device such as SDD is connected to the server.

  • PDF

Distributed REID Information Service Architecture for Ubiquitous Logistics (유비쿼터스 물류를 위한 분산형 RFID 정보서비스 구조)

  • Lee, Jae-Won;Lee, Young-Koo
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.2
    • /
    • pp.105-121
    • /
    • 2005
  • To realize a ubiquitous logistics management system using the smart object of Electronic Product Code(EPC) enabled RFID tag, the design and management of RFID Information Service is very important. RFID Information Service searches, transfers and responds to the other's PML request, but Physical Markup Language (PML) data management between trading system elements has issues of standardization of PML data description and processing, and problems of data traffic and communication time overload because of the innate distributed characteristics. As a complementary study, this research analyzes the usage patterns and data types of PML. On that analysis we provide a design of the distributed RFID Information Service architecture of PML data management that is using DB middleware. Standalone and Integrated type of RFID IS were proposed.

  • PDF

Landuse Mapping using KOMPSAT-2 Satellite Image in River Basin Flood Mitigation Planning (유역 홍수계획수립에서 KOMPSAT-2 영상을 이용한 토지이용도 제작)

  • Shin, Hyoung-Sub;Kim, Kyu-Ho;Jung, Sang-Hwa;Na, Sang-Il
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.635-635
    • /
    • 2012
  • 최근 공공분야 및 민간분야에서 고해상도 위성영상의 활용이 높아짐에 따라 이를 이용하여 수자원 분야의 치수계획 및 안전도 평가, 유역 홍수대응기술 분야에서의 다양한 활용이 비약적으로 증대되고 있는 실정이다. 고해상도 위성영상의 활용은 국지적 규모의 토지이용 변화 및 대기 상태의 모니터링을 위한 효과적인 기술로 인식되어 왔다. 우리나라의 KOMPSAT-2 위성은 GSD(Ground Sample Distance) 1m급의 전정색 영상과 4m급의 다중분광 영상을 동시에 제공하는 고해상도 위성이다. 그러나 다중분광센서의 복잡성과 보안성에 의해 영상이 제한적으로 제공되고 있어 KOMPSAT-2 위성영상을 이용한 다양한 연구가 미흡한 실정이다. 한편, 토지이용도의 제작은 다중분광 영상을 제공하는 위성영상을 이용하여 제작된다. 다중분광 영상이 제공하는 분광정보 및 공간정보 등으로 토지이용분류를 수행하거나 멀티센서 자료의 통합을 통한 토지이용분류 기법을 개발하여 제작하였다. 그러나 대부분 GSD 10m급 이상의 중 저해상도 위성영상을 이용하여 제작이 이루어져 수평위치 정확도 및 세부정보의 제공이 낮으며, 정보의 최신성이 결여되어 있다. 특히, 유역 치수안전도 평가를 위한 토지이용도 작성은 매우 중요한 부분을 차지하고 있으므로 이에 대한 연구가 필요하다. 이에 본 연구에서는 섬강유역을 대상으로 KOMPSAT-2 영상을 이용하여 유역 치수안전도 평가 및 치수계획 수립기술을 위한 토지이용도를 작성하고자 한다. 토지이용 분류방법은 감독분류와 무감독분류 방법을 조합하여 분류정확도를 개선시키는 하이브리드분류(hybrid classification) 방법을 이용하였으며, 분류기준의 선정은 환경부 토지이용분류 기준을 참고하여 1단위와 2단위 분류체계를 혼용하였다. 또한, 분류 후 후처리를 통하여 잡음을 제거하고 환경부의 토지이용도를 참조하여 육안판독으로 오분류된 지역을 보정하였다. 새롭게 작성된 토지이용도는 기존의 토지이용도와 비교 분석하여 토지이용변화 상황을 파악하고, 이를 통하여 KOMPSAT-2 영상의 토지이용도 개선 가능성을 검토하였다.

  • PDF

Development of a Key Recovery System for Recovery of Encrypted Data (암호화된 정보의 복구를 위한 키복구 시스템 개발)

  • Kang, Sang-Seung;Lim, Shin-Young;Ko, Jeong-Ho;Jun, Eun-Ah;Lee, Gang-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.4
    • /
    • pp.324-335
    • /
    • 2001
  • Information systems, which support information security functions such as CALS and EC systems, should have cryptographic functions for information in order to storage and communicate securely. Additionally, including recovery of lost keys, lots of cryptographic keys should be securely managed. In this paper, we present some results of development of a key recovery system for recovery of encrypted data. The proposed system, in a type of key encapsulation approach, confirms to NIST's RKRP(Requirements for Key Recovery Products) that is a defecto international key recovery standard, as well as CC 2.0 that is a international security evaluation criteria. A message sender secretly choices two or more key recovery agents from a pool of key recovery agents. The key recovery information is generated by using the recovering key, random keys and public keys of the chosen agents. A message receiver can not know which key recovery agents are involved in his key recovery service. We have developed two versions of prototype of key recovery system such as C/Unix and Java/NT versions. Our systems can be used for recovery of communicating informations as well as storing informations, and as a new security service solution for electronic commerce service infrastructures.

  • PDF

Pulse Diagnosis Algorithm and Digital Filter Design for Development of Digital Biomedical System (전자 맥진기 시스템 개발을 위한 맥파분석 알고리즘과 디지털 필터 설계)

  • Kim, Sang-Ho;Lim, Duk-Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4473-4482
    • /
    • 2010
  • The examination of pulse, which is a typical palpation technique in the oriental medicine, has been used conventional analog system for discrimination of 28 pulses. However, the clipping phenomenon in the pulses, which used same feature extraction technique with ECG signals, has been occurred in analog system due to feature extraction method and over amplification from the input signals. It caused inaccurate to analyze the pulse signals. In this paper, we propose a digital filter design technique based on Prony's method for signal modeling and C-spline interpolation for feature extraction from pulse signal to compensate analog pulse detection system. In addition, we suggest a compensated electronic pulse detection system comprising new pulse analyzing algorithm and shape analysis technique for pulses, which were difficult to use in analog system. The feasibility for new proposed system has been confirmed comparing output signals between electronic pulse detection system having proposed filter design techniques with pulse analyzing algorithm and conventional analog system.