• Title/Summary/Keyword: 보호조치

Search Result 474, Processing Time 0.023 seconds

Cloud-based IoT Smart Home Intrusion Detection and Monitoring System (클라우드를 활용한 IoT 스마트 홈 침입탐지 모니터링 시스템)

  • Dong-Ju Kim;Min-Ju Choi;Hyeon-Kyeong Lee;Hye-Ju Jeong;Sung-Wook Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.231-232
    • /
    • 2024
  • 홈 IoT 사용의 확대로 우리의 생활이 편리해진 반면, 보안 취약점을 통해 사생활을 침해하는 문제가 다수 발생하고 있다. 따라서 사용자들이 안전하게 사용할 수 있는 스마트 홈 보안 시스템이 필수적이다. 본 논문에서는 웹 페이지에 홈 IoT 환경을 구성한 후, AWS 서비스를 활용하여 로그를 수집하고 이상 징후를 찾는다. 침입 및 공격이 탐지되면 웹 페이지를 통해 사용자에게 알림을 전송한다. 사용자에게 경고와 조치 안내를 제공하여 빠른 대응이 가능하도록 한다.

  • PDF

The Need and the Direction to Improve the System of Measures for the Preservation of Buried Cultural Heritage (매장문화재 보존조치 제도의 개선 필요성과 방향)

  • Ryu, Ho-cheol
    • Korean Journal of Heritage: History & Science
    • /
    • v.47 no.3
    • /
    • pp.146-159
    • /
    • 2014
  • After inspecting ground surface or excavating cultural heritage site, the government can take measures for the preservation of buried cultural heritage based on the related law. It means that the provisions complement the limitation of current cultural heritage management system by extending the scope of cultural heritage to be preserved. But we neither have set any matters about implementing the measures for preservation of the buried cultural heritage, nor manage the heritage and its surroundings after implementing the measures. Due to these insufficiency of the law, there arise several problems in the field. For example, the measures for preservation are not complete, or preserved cultural heritage is damaged due to inappropriate management. We have to resolve the problems in order to accomplish the original purpose of taking measures for preservation of the heritage. First, it is necessary to make sure of the legal status of preserved buried cultural heritage, to establish the standards to decide whether to preserve it or not. We need to have regulations by law or internal rule on the daily management, who should manage it, what and how the manager should manage. It is also important for local residents to take an active part in preserving and utilizing the cultural heritage as the owner. Through building up the foundation mentioned above, the meaning and value of preserved buried cultural heritage can be expanded widely.

Improvement Proposals for Biometric Information Protection Guideline based on the Analysis of Global Bio Information Privacy Issues (글로벌 바이오정보 프라이버시 논점 분석을 기반으로 한 바이오정보 보호 가이드라인 개선 방안)

  • Jung, Boo-geum;Kwon, Hun-yeong;Park, Hea-sook;Lim, Jong-in
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.87-94
    • /
    • 2018
  • Privacy means the right not to interfere with the private life of an individual. Bio data is the most private personal information about the person itself, and according to advancement of technology, it is possible to analyze and judge individual as well as identify individual. The Personal Information Protection Act is based on global privacy principles, but the legislation for the protection of bio information has yet to be enacted. Therefore, it is time to protect biometric data as more sensitive information than general personal information. We will review the global privacy discussions for protecting biometric information and propose additional privacy principles and measures for utilization that should be defined in the biometric information protection guideline.

  • PDF

제183회 국회(임시회)통상산업위원회에서 1997년 3월 14일 의결된 기업활동규제완화에 관한 특별조치법중 개정법률안

  • 한국전력기술인협회
    • Electric Engineers Magazine
    • /
    • v.176 no.4
    • /
    • pp.8-27
    • /
    • 1997
  • 산업단지에 전기를 공급하기 위한 전기시설 공사비를 전기공급자가 전액 부담하게 하고 현재 운영되고 있는 각종 의무고용제도중 국민의 안전 및 환경의 보호와 밀접한 관련이 없는 부분은 폐지하거나 완화하며, 각종 영업에 대한 불필요한 행정규제를 완화함으로써 기업의 경쟁력을 강화하려는 것임.

  • PDF

공업소유권법중 실용신안법개정안 - PCT가입, 부실권리방지등 위해 -

  • 한국발명진흥회
    • 발명특허
    • /
    • v.7 no.10 s.80
    • /
    • pp.66-69
    • /
    • 1982
  • 특허청은 공업소유권제도의 국제화추세에 따라 특허협력조약(PCT)에 가입하는 것을 전제로 특허출원절차의 국제협력 및 기술정보의 확산을 통한 국내기술개발을 촉진하기 위하여 필요한 국내적조치로써 실용신안법중 개정법률안을 다음과 같이 마련하였다. 또한 부실특허권의 행사로부터 선의의 피해자를 보호하기 위하여 특허권효력의 일시정지에 관한 규정도 개정법안에 신설하고 있다.

  • PDF

공업소유권법중 특허법개정안 -PCT가입, 부실권리방지등 위해-

  • 한국발명진흥회
    • 발명특허
    • /
    • v.7 no.8 s.78
    • /
    • pp.13-18
    • /
    • 1982
  • 특허청은 공업소유권제도의 국제화 추세에 따라 특허협력 조약(PCT)에 가입하는 것을 전제로 특허출원절차의 국제협력 및 기술정보의 확산을 통한 국내기술개발을 촉진하기 위하여 필요한 국내적조치로써 특허법중 개정법률안을 다음과 같이 마련하였다. 또한 부실특허권의 행사로부터 선의의 피해자를 보호하기 위하여 특허권효력의 일시정지에 관한 규정도 개정법안에 신설하고 있다.

  • PDF

The Improvement Plan for Personal Information Protection for Artificial Intelligence(AI) Service in South Korea (우리나라의 인공지능(AI)서비스를 위한 개인정보보호 개선방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.20-33
    • /
    • 2021
  • This study is to suggest improvements of personal information protection in South Korea, according to requiring the safety of process and protection of personal information. Accordingly, based on data collection and analysis through literature research, this study derived the issues and suitable standards of personal information for major artificial intelligence services. In addition, this cases studies were reviewed, focusing on the legal compliance and porcessing compliance for personal information proection in major countries. And it suggested the improvement plan applied in South Korea. As the results, in legal compliance, it is required reorganization of related laws, responsibility and compliance to develop and provide AI, and operation of risk management for personal information protection laws in AI services. In terms of processing compliance, first, in pre-processing and refining, it is necessary to standardize data set reference models, control data set quality, and voluntarily label AI applications. Second, in development and utilization of algorithm, it is need to establish and apply a clear regulation of the algorithm. As such, South Korea should apply suitable improvement tasks for personal information protection of safe AI service.

Perceptual Differences between Managers and Practitioners on Competencies of Information Security Consultants (정보보호컨설턴트 역량에 대한 관리자와 실무자의 인식차이)

  • Kim, Se-Yun;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.227-235
    • /
    • 2016
  • As various measures of law observance obligations such as mandatory obligation of privacy impact assessment (PIA) for public institutions and authorization of information security management system (ISMS) are put into practice, increase in demand for information security consulting and securement of information security consultants are emerging as a major issue. The purpose of this study is to empirically investigate what core competencies information security consultants should possess and how much they actually possess them. By analyzing the differences in perception between practitioners and managers on core competencies, this study understands difference of views between the two groups and suggests ideas for cultivation of information security consultants.

Transfering and Restoration of Kwon's 'Relief' (권진규 '부조(浮彫)'의 이전 및 복원작업)

  • Kim, Joo Sam
    • 한국문화재보존과학회:학술대회논문집
    • /
    • 2001.11a
    • /
    • pp.35-40
    • /
    • 2001
  • The wall painting and Relief type sculpture were a part of an architecture. Therefore they had better to be preserved in situ, differing with other works of arts. But we confronted inevitable cases to transfer them in appropriate place to conserve. And considering their fragility and a potential danger such as a vibration and shock in process of transfer, we had to do the preventive treatments to prohibit unexpected deteriorations. In this paper, I mention the transferring process when Kwon's 'Relief' was faced to be removed by reconstruction program. A preventive treatment and packaging method were referred in priority.

  • PDF

Improving the Efficiency of Cybersecurity Risk Analysis Methods for Nuclear Power Plant Control Systems (원전 제어시스템 사이버보안 위험 분석방법의 효율성 개선)

  • Shin-woo Lee;Jung-hee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.537-552
    • /
    • 2024
  • Domestic nuclear power plants operate under the establishment of the "Information System Security Regulations" in accordance with the Nuclear Safety Act, introducing and implementing a cybersecurity system that encompasses organizational structure as well as technical, operational, and managerial security measures for assets. Despite attempts such as phased approaches and alternative measures for physical protection systems, the reduction in managed items has not been achieved, leading to an increased burden on security capabilities due to limited manpower at the site. In the main text, an analysis is conducted on Type A1 assets performing nuclear safety functions using Maintenance Rules (MR) and EPRI Technical Assessment Methodology (TAM) from both a maintenance perspective and considering device characteristics. Through this analysis, approaches to re-evaluate the impact of cyber intrusions on asset functionality are proposed.