• Title/Summary/Keyword: 사용자 모니터링 정책

Search Result 45, Processing Time 0.026 seconds

A Study on the Influencing Factors of Knowledge Sharing at GKMC (GKMC하 지식공유영향요인에 관한 연구)

  • Song, Chung Geun
    • Informatization Policy
    • /
    • v.21 no.3
    • /
    • pp.85-101
    • /
    • 2014
  • This study analyzed the influencing factors for knowledge sharing at GKMC, and then tried to illuminate the policy meanings implied in the results. To build a framework of analysis, reviewing the KM-related studies, the author selected five influencing factors for knowledge sharing, such as CMC quality, community commitment, structural social capital, cognitive social capital, and relational capital, and actors, and identified the fact that all the factors have a positive effect on knowledge sharing. In the case of Kwang-ju metropolitan city, the first factor that affects knowledge sharing is community commitment, the second one is CMC quality, and the third one is structural social capital. This result means that to succeed in knowledge sharing, the local government managers should try to shape the bonding among members, and then to get rid of the causes of complaints. In addition, local government also needs to predict problems claims and take proper actions for GKMC to be used conveniently through monitoring their work continuously. Furthermore, they should make a free and happy working environment, closely examining the change of the relationship among social capitals.

Research on Personal Information Safety Condition and Improvements in Welfare Center for the Disabled (장애인복지관 개인정보보호 실태와 개선 방안)

  • Kim, Sung-Jin;Kweon, Jae-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.11
    • /
    • pp.262-274
    • /
    • 2010
  • In Welfare Center for the disabled, under the Government's information acceleration plan, the computer system has been developed starting from work standardization in 2001 but it has been emphasized only on the technical and customer convenience side leaving out preparation for the side effects of them. Therefore this article will seek the necessity of personal information protection, legal basis in the Welfare Center for the disabled. Additionally after analyzing current status for the personal security of Welfare Center for the disabled, establishing an alternative plan for personal security policy's way could be addressed. Increasing education for awareness stress of personal information security, and preparing institutional protection apparatus from applying life cycle of personal information would be an alternative plan for personal information protection for Welfare Center for the disabled. Also frequent monitoring of accessing personal information from the computerized system should be achieved. It is impossible to recover damage caused by leak of personal information although post actions are progressed. From this essay, awareness of personal information protection should be newly revised for both the Social Welfare Organization and the Disabled welfare center, and also technical, institutional strategy's action should be arranged.

Policy-based In-Network Security Management using P4 Network DataPlane Programmability (P4 프로그래머블 네트워크를 통한 정책 기반 인-네트워크 보안 관리 방법)

  • Cho, Buseung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.3-10
    • /
    • 2020
  • Recently, the Internet and networks are regarded as essential infrastructures that constitute society, and security threats have been constantly increased. However, the network switch that actually transmits packets in the network can cope with security threats only through firewall or network access control based on fixed rules, so the effective defense for the security threats is extremely limited in the network itself and not actively responding as well. In this paper, we propose an in-network security framework using the high-level data plane programming language, P4 (Programming Protocol-independent Packet Processor), to deal with DDoS attacks and IP spoofing attacks at the network level by monitoring all flows in the network in real time and processing specific security attack packets at the P4 switch. In addition, by allowing the P4 switch to apply the network user's or administrator's policy through the SDN (Software-Defined Network) controller, various security requirements in the network application environment can be reflected.

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

Intelligent Home Energy Management based on Powerline Communication (전력선통신을 이용한 지능형 홈에너지 관리시스템)

  • Ju, Seong-Ho;Choi, Moon-Seok;Choi, Jong-Hyup;Lim, Yong-Hoon;Kim, Tae-Kyung
    • Proceedings of the KIPE Conference
    • /
    • 2008.06a
    • /
    • pp.148-150
    • /
    • 2008
  • 지구온난화와 화석연료의 고갈 등 에너지관련 문제들이 발생함에 따라 제한된 자원의 효율적인 소비가 중요한 연구주제로 다루어지고 있다. 특히 자원수입국인 우리나라의 경우는 국제 유가 급등과 같은 에너지파동에 상당히 민감하기 때문에 에너지 관리를 통한 정확한 수급정책 수립 및 효율적인 소비생활이 무엇보다 중요하다. 이를 위해 우선적으로 취할 수 있는 해결책 중의 하나가 댁내 가전기기의 불필요한 전력낭비를 최소화하는 것이다. 이번 연구에서는 전력선통신(PLC)기반 원격검침 인프라를 활용하여 1차적으로 가전기기의 대기전력을 지능적으로 관리함으로써 전력낭비를 최소화하고 2차적으로 전력소비모니터링 서비스를 제공함으로써 사용자가 능동적으로 전력소비를 줄일 수 있도록 하는 지능형 홈에너지 관리시스템을 개발하였으며, 실제 수용가를 대상으로 구축, 운영함으로써 향후 에너지를 효율적으로 관리할 수 있는 방안을 제시하고자 한다.

  • PDF

A study on BLE-based ZEP System Attack Techniques and Countermeasures Utilizing the Convergence of Big data Platform and Monitoring System (빅데이터 플랫폼과 모니터링 시스템의 융합을 이용한 BLE기반의 ZEP시스템 공격 기법에 대한 대응방안 연구)

  • Ahn, Ye-Chan;Shin, Young-Hyun;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.331-336
    • /
    • 2015
  • Lately, the development and utilization of technology of the Internet of Things(IoT), and Fintech have been on the rise and amid the emerging convergence of system and service, mobile payment system and location based service technology have received much attention. Considering the fact that smartphone users are currently utilizing mobile payment frequently, many corporations are introducing various methods to the market for easy payment process of consumers by grafting various technologies, and by utilizing the technology based on BLE technology and location based technology, it is emerging as new method applied to payment service such as ZEP, for easy payment process. And by checking the existence of security threats and studying the attack techniques in these payment services, we strive to suggest a method of response based on big data platform.

Subway Congestion Prediction and Recommendation System using Big Data Analysis (빅데이터 분석을 이용한 지하철 혼잡도 예측 및 추천시스템)

  • Kim, Jin-su
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.289-295
    • /
    • 2016
  • Subway is a future-oriented means of transportation that can be safely and quickly mass transport many passengers than buses and taxis. Congestion growth due to the increase of the metro users is one of the factors that hinder citizens' rights to comfortably use the subway. Accordingly, congestion prediction in the subway is one of the ways to maximize the use of passenger convenience and comfort. In this paper, we monitor the level of congestion in real time via the existing congestion on the metro using multiple regression analysis and big data processing, as well as their departure station and arrival station information More information about the transfer stations offer a personalized congestion prediction system. The accuracy of the predicted congestion shows about 81% accuracy, which is compared to the real congestion. In this paper, the proposed prediction and recommendation application will be a help to prediction of subway congestion and user convenience.

Security tendency analysis techniques through machine learning algorithms applications in big data environments (빅데이터 환경에서 기계학습 알고리즘 응용을 통한 보안 성향 분석 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.269-276
    • /
    • 2015
  • Recently, with the activation of the industry related to the big data, the global security companies have expanded their scopes from structured to unstructured data for the intelligent security threat monitoring and prevention, and they show the trend to utilize the technique of user's tendency analysis for security prevention. This is because the information scope that can be deducted from the existing structured data(Quantify existing available data) analysis is limited. This study is to utilize the analysis of security tendency(Items classified purpose distinction, positive, negative judgment, key analysis of keyword relevance) applying the machine learning algorithm($Na{\ddot{i}}ve$ Bayes, Decision Tree, K-nearest neighbor, Apriori) in the big data environment. Upon the capability analysis, it was confirmed that the security items and specific indexes for the decision of security tendency could be extracted from structured and unstructured data.

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

A Study on u-Care Service for the Health and Safety of the Elderly Living Alone (1인 가구 고령자의 건강과 안전을 위한 u-Care에 관한 연구)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.59-64
    • /
    • 2017
  • Korea is experiencing a rapid increase in the number of elderly living alone accompanying the aging society problem, a nd is making efforts to solve the problem through the policy of 'living alone u-care service'. The purpose of this study is to propose a better u-Care service improvement method by applying new technology to improve the user experience of ucare service for the health and safety of the elderly living alone. First, the improvement of u-Care service for elderly livin g alone by applying IoT technology. It provides remote monitoring service using health information data measured through wearable device, and transmits personal health status to medical institution by using personal device such as smart phone, so that remote medical consultation or telemedicine can be connected in the future. Second, improvement of u-Care service through consideration of emotional stability of elderly living alone as well as simple safety and health care through applica tion of emotional service robot technology.It is expected that it will be able to help independent living of one person's elde rly person in the future by providing caring function service to existing u-care service providing service.