• Title/Summary/Keyword: 보안 중요도

Search Result 2,285, Processing Time 0.031 seconds

A Study on Telcos' Strategies to Digital Converged Service and Its Prospects; Focusing on TV-based VOD Service (통신사업자의 통신방송 융합사업 진출전략 및 전망 - TV-based VOD를 중심으로 -)

  • 조병선;황호영
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2003.11a
    • /
    • pp.23-40
    • /
    • 2003
  • 초고속인터넷 접속서비스 시장이 성숙 단계에 접어듬으로써 성장세는 급격히 둔화되고 경쟁환경은 심화되는 과정에서 통신사업자들이 기존의 신규가입자 유치 위주의 정책에서 벗어나 초고속인터넷 가입자 인프라를 기반으로 새로운 부가 서비스 및 차별화 된 서비스의 개발을 통해 가입자 확대 및 ARPU(Average Revenue Per Unit)를 중대 시킬 수 있는 수익원 개발이 절실하다. 이러한 상황하에서 통신방송 융합 서비스는 통신사업자에게 기회와 위협이라는 상반된 현상으로 다가오고 있다. TV-based VOD 서비스는 보다 양질의 멀티미디어 서비스를 원하는 고객의 수요와 신규 고객을 유치하고 가입자를 Lock-in 시키며, 타 통신 사업자의 고객을 자사 고객으로 전환시키고자 하는 차별화 전략의 일환으로 도입되기 시작하였고, 또한 ARPU를 증대 시키고 다양한 수익원 개발의 일환으로 인터넷 접속서비스 외에 부가가치를 창출 할 수 있는 Killer Service로서 주목을 받고 있다. TV VOD 사업이 성공적으로 국내 시장에 정착될 경우, 통신사업자에게는 여러 형태의 수익원 발굴이 가능할 것으로 예상된다. 즉 가입비, 월 이용료, 부가 사용료 등과 같은 포괄적인 형태의 가입비가 주된 수익원이 될 것이이며, pay-per-view(PPV) 형태의 이용료 역시 주된 수익원이 될 것이다. 이 외에도 셋톱박스, 홈게이트웨이/서버 등과 같은 단말기의 임대와 판매를 통한 수익 창출방안과 다른 서비스들과 마찬가지로 광고도 중요한 수익원천으로 활용 할 수 있을 것이며 또한 미디어업체 또는 CP(contents provider)를 대상으로, 보안, 인증, 과금, 결제, 회원 관리, 이용정보 제공 서비스 등도 사업자의 수익원으로 활용할 이 있을 것이다. TV-based VOD 서비스는 망 진화에 따른 차세대 초고속인터넷 서비스 기술인 VDSL이나 Advanced 케이블모뎀을 이용 DVD 급 고화질의 TV-based VOD 서비스가 시작되면서 ARPU를 증대 시키고 다양한 수익원 개발의 일환으로 인터넷 접속서비스 외에 부가가치를 창출 할 수 있는 Killer Service로서 VOD서비스가 주목을 받고 있다. TV-based VOD 서비스는 가입자망의 진화 와 밀접하게 연관되어 전개되는 서비스로 Post-ADSL에 대한 예측과 VOD에 서비스에 대한 설문조사 결과를 토대로 하여 예측 한 바에 의하면 Post-ADSL 가입자는 2003년 153만명에서 2004년 444만으로 증가하고 2006년 987만 명에 이를 것으로 전망되고, VOD서비스 가입의향도 16%에서 2006년 34% 까지 증가하는 것으로 나타났다. 따라서 VOD서비스 가입자는 2003년 24만 명에서 2004년 98만으로 증가하고 2006년 335만 명으로 증가하는 것으로 예측되었다.

  • PDF

The Optimal Method to Determine Damage Threshold of Rock using Hwangdeung Granite (황등화강암을 이용한 암석의 손상기준 결정방법 연구)

  • Jang, Bo-An;Ji, Hoon;Jang, Hyun-Shic
    • The Journal of Engineering Geology
    • /
    • v.20 no.1
    • /
    • pp.89-100
    • /
    • 2010
  • Although various methods for determination of damage threshold in rock have been suggested, clear damage thresholds were determined by some methods, but different thresholds were measured by other methods. We determined the damage thresholds in Hangdeung granite using all the methods suggested, and investigated the best methods, applicability and errors of each method. The crack initiation threshold and the crack damage threshold which are important in investigation of characteristics of crack development and failure were verified by field strength ratio method and long-term constant load test. The crack closure stress and the crack initiation stress were 57.5 MPa and 77.6 MPa, and the most exact values were yielded by crack volumetric strain. The secondary crack initiation stress was 90.6 MPa and AE event count and AE event count rate were the effective methods. The volumetric stiffness, AE event count and AE event count rate were the most effective methods for determination of crack coalescence threshold and crack coalescence stress was 110.3 MPa. The crack damage stress was 127.5 MPa and was measured correctly by volumetric stiffness and AE event count rate. The ratio between crack initiation stress and uniaxial compressive strength was 0.47 which was very similar with the FSR value of 0.46. The ratio between crack damage stress and uniaxial compressive strength was almost the same as the ratio between long-term strength and uniaxial compressive strength, indicating that the crack initiation stress and the crack damage stress measured were correct.

A Study on Test Report Information Service Architecture for Preventing Forgery and Alteration in Defense Industry (군수품 시험성적서 위·변조 방지 시스템 아키텍처에 대한 연구)

  • Lee, Donghun;Jeon, Sooyune;Bae, Manjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.43-51
    • /
    • 2016
  • Preventing the forgery and alteration of test reports is important, in order to maintain the reliability of military supplies. Based on a survey of reports on testing institutions and a case study of established electronic document systems in the public sector, we propose a system architecture, which helps prevent the forgery and alteration of test reports with legal force. The proposed architecture takes advantage of both the time stamp that records the time a document is received and a server synchronized with the testing institution. Using the proposed system architecture, the user is able to request a test and receive reports from the testing institution without delay. Also, a defense agency is able to conveniently prove the authenticity of the test reports and utilize the statistical data collected by the architecture. Therefore, we expect that the proposed system architecture will help defense agencies to prevent the forgery and alteration of test reports and ensure their reliability and quality.

Sensitivity Analysis of Quasi-Governmental Agencies' Decisions for Cloud Computing Service (준 정부기관 클라우드 컴퓨팅 서비스 결정에 대한 민감도 분석)

  • Song, In Kuk
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.91-100
    • /
    • 2015
  • Recently many companies began to feel the pressures of cost savings due to the global recession, so they have been interested in the Cloud Computing. Cloud Computing is one of using method of IT resources through the network. Users can borrow softwares or hardwares instead of buying them. Many people expect remarkable growth in Cloud Computing industry because of it's effectiveness. But Cloud Computing industry is still at an early stage. Especially, people who in the public sector hesitate to adopt Cloud Computing Services due to security issues and their conservative views. Also, they just have limited understanding, so we need to investigate what they really know and understand. Researches about the Cloud Computing generally focus on technical issues, so we can hardly find researches reference for decision making in considering the services. The study aims to investigate diverse factors for agencies' adoption decisions, such as benefits, costs, and risk in developing the most ideal type of cloud computing service for them, and performs priority analyses by applying ANP (Analytic Network Process). The results identify that features pertaining to the risk properties were considered the most significant factors. According to this research, the usage of private cloud computing services may prove to be appropriate for public environment in Korea. The study will hopefully provide the guideline to many governmental agencies and service providers, and assist the related authorities with cloud computing policy in coming up with the relevant regulations.

A Study on Current Status of Detection Technology and Establishment of National Detection Regime against Nuclear/Radiological Terrorism (핵테러/방사능테러 탐지 기술 현황 및 국내 탐지체계 구축 방안에 관한 연구)

  • Kwak, Sung-Woo;Jang, Sung-Soon;Lee, Joung-Hoon;Yoo, Ho-Sik
    • Journal of Radiation Protection and Research
    • /
    • v.34 no.3
    • /
    • pp.115-120
    • /
    • 2009
  • Since 1990s, some events - detection of a dirty bomb in a Russian nation park in 1995, 9/11 terrorist attack to WTC in 2001, discovery of Al-Qaeda's experimentation to build a dirty bomb in 2003 etc - have showed that nuclear or radiological terrorism relating to radioactive materials (hereinafter "radioactive materials" is referred to as "nuclear material, nuclear spent fuel and radioactive source") is not incredible but serious and credible threat. Thus, to respond to the new threat, the international community has not only strengthened security and physical protection of radioactive materials but also established prevention of and response to illicit trafficking of radioactive materials. In this regard, our government has enacted or revised the national regulatory framework with a view to improving security of radioactive materials and joined the international convention or agreement to meet this international trend. For the purpose of prevention of nuclear/radiological terrorism, this paper reviews physical characteristics of nuclear material and existing detection instruments used for prevention of illicit trafficking. Finally, national detection regime against nuclear/radiological terrorism based on paths of the smuggled radioactive materials to terrorist's target building/area, national topography and road networks, and defence-in-depth concept is suggested in this paper. This study should contribute to protect people's health, safety and environment from nuclear/radiological terrorism.

IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment (Inter-Cloud 환경에서의 IAM 구조 및 액세스 토큰 전송 프로토콜)

  • Kim, Jinouk;Park, Jungsoo;Yoon, Kwonjin;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.573-586
    • /
    • 2016
  • With the adoption of cloud computing, the number of companies that take advantage of cloud computing has increased. Additionally, various of existing service providers have moved their service onto the cloud and provided user with various cloud-based service. The management of user authentication and authorization in cloud-based service technology has become an important issue. This paper introduce a new technique for providing authentication and authorization with other inter-cloud IAM (Identity and Access Management). It is an essential and easy method for data sharing and communication between other cloud users. The proposed system uses the credentials of a user that has already joined an organization who would like to use other cloud services. When users of a cloud provider try to obtain access to the data of another cloud provider, part of credentials from IAM server will be forwarded to the cloud provider. Before the transaction, Access Agreement must be set for granting access to the resource of other Organization. a user can access the resource of other organization based on the control access configuration of the system. Using the above method, we could provide an effective and secure authentication system on the cloud.

Analysis and Forecasting for ICT Convergence Industries (ICT 융합 산업의 현황 및 전망)

  • Jang, Hee S.;Park, Jong T.
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.15-24
    • /
    • 2015
  • The trade balance for the information and communications technology (ICT) industries in 2014 have reached 863 hundred million dollars as the main export products such as smart phone and semi-conductor increase, since the ICT industries have played an important role in economic growth in Korea. Until now, the consistent supporting of government and investment of company have been doing with the growth of ICT industries, as a result, Korea marked as the first in the UN electronic government preparing index, and rank 12 in the network preparing index through the policy of national information and basic plan of inter-industry convergence. However, as the unstable international economic circumstances, ICT industries is faced with the stagnation, and then preemptive development of products and services for ICT convergence industries is needed to continually get definite ICT Korea image. In this paper, the ICT convergence industry is analyzed and forecasted. In specific, the international and domestic market for cloud, 3D convergence, and internet of things is diagnosed. The market for ICT convergence industries is predicted to be 3.6 trillion dollar in the world, and 110 trillion won in domestic. From the analytical results for technology and services development, the preemptive supporting of the technology development and policy for the internet of things and 3D convergence industries is required. In addition to, through the future forecasting by socio-tech matrix method, the policy supporting for the ICT convergence area of healthcare, fintech, artificial intelligence, body platform, and human security is needed.

Implementation of the Metadata Registry-based Framework for Semantic Interoperability of Application in Ubiquitous Environment (유비쿼터스 환경에서 어플리케이션의 의미 상호운용성을 위한 메타데이터 레지스트리 기반의 프레임워크 구현)

  • Kim, Jeong-Dong;Jeong, Dong-Won;Kim, Jin-Hyung;Baik, Doo-Kwon
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.1
    • /
    • pp.11-19
    • /
    • 2007
  • Under ubiquitous environment, applications can gather and utilize various sensing information. There are many issues such as energy management, protocol standardization, independency on sensor fields, and security to be resolved for the complete ubiquitous computing. Especially, the independent information access in the sensor field is one of the most important issues to maximize the usability of sensors in various sensor fields. However, existing frameworks are not suitable for the ubiquitous computing environment because of data heterogeneity between data elements in sensor fields. Existing applications are dependent to sensor fields and sensors in the existing ubiquitous computing on environment is dependent to the application in the sensor field. In other word, an application can utilize just information from a specific sensor field. To overcome this restriction, many issues from a hardware or software view must be resolved. In this paper, we provide the design and implementation of the Metadata Registry-based framework (UbiMDR) of the Ubiquitous environment. This framework can provides the semantic interoperability among ubiquitous applications or various sensor fields. In addition, we describe comparison evaluation between conventional Ubiquitous computing framework and UbiMDR framework with data accuracy of interoperability.

  • PDF

Regional Path Re-selection Period Determination Method for the Energy Efficient Network Management in Sensor Networks applied SEF (통계적 여과 기법이 적용된 센서 네트워크에서 에너지 효율적인 네트워크 관리를 위한 영역별 경로 재설정 주기 결정 기법)

  • Park, Hyuk;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.69-78
    • /
    • 2011
  • A large-scale sensor network usually operates in open and unattended environments, hence individual sensor node is vulnerable to various attacks. Therefore, malicious attackers can physically capture sensor nodes and inject false reports into the network easily through compromised nodes. These false reports are forwarded to the base station. The false report injection attack causes not only false alarms, but also the depletion of the restricted energy resources in a battery powered network. The statistical en-route filtering (SEF) mechanism was proposed to detect and drop false reports en route. In SEF, the choice of routing paths largely affect the energy consumption rate and the detecting power of the false report. To sustain the secure routing path, when and how to execute the path re-selection is greatly need by reason of the frequent network topology change and the nodes's limitations. In this paper, the regional path re-selection period determination method is proposed for efficient usage of the limited energy resource. A fuzzy logic system is exploited in order to dynamically determine the path re-selection period and compose the routing path. The simulation results show that up to 50% of the energy is saved by applying the proposed method.

A Study on The Preference Analysis of Personal Information Security Certification Systems: Focused on SMEs and SBs (개인정보보호 인증제도 선호도 분석에 관한 연구: 중소기업 및 소상공인을 중심으로)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.911-918
    • /
    • 2014
  • Over the past few years, security breaches have been consistently reported around the world. Especially, people's personal information are at risk of being breached as the firms gather and utilize the information for their marketing purposes. As an effort to revamp their data infrastructures, companies have rebuilt their system that almost every data, including the personal information, are stored within the digital database. However, this migration provides easier access to the database but it has also increased the system vulnerability. As the data can be easily exposed to the unauthorized personnel both intentionally and unintentionally, it is necessary for companies to establish a set of security protocol and operate the personal information protection system. There are two major certified security system in South Korea; PIMS from KISA and PIPL from NIA. This paper analyzes the preferences of SMEs and small business using conjoint attributes of PIMS and PIPL. The study shows that the business owners take post certification rewards as the most important factor. It also shows that the attributes that have the highest utility rates are the following; 1) KISA certification, 2) 79 points of protection counter measurements, 3) 28 items of life cycle, 3) 50 percent discount on certification fee, and 4) Reduced amount of fine for personal information leakage incident.