• Title/Summary/Keyword: 사전 예방

Search Result 1,217, Processing Time 0.028 seconds

A Implement of Integrated Management Systems for User Fraud Protection and Malware Infection Prevention (악성코드 감염방지 및 사용자 부정행위 방지를 위한 통합 관리 시스템 구현)

  • Min, So-Yeon;Cho, Eun-Sook;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8908-8914
    • /
    • 2015
  • The Internet continues to grow and develop, but there are going to generate a variety of Internet attacks that exploit it. In the initial Internet environment, the attackers maliciously exploited Internet environments for ostentations and hobbies. but these days many malicious attempts purpose the financial gain so systematic and sophisticated attacks that are associated with various crimes are occurred. The structures, such as viruses and worms were present in the form of one source multi-target before. but recently, APT(Advanced Persistent Threat, intelligent continuous attacks) in the form of multi-source single target is dealing massive damage. The performance evaluation analyzed whether to generate audit data and detect integrity infringement, and false positives for normal traffic, process detecting and blocking functions, and Agent policy capabilities with respect to the application availability.

Anomaly Detection Mechanism based on the Session Patterns and Fuzzy Cognitive Maps (퍼지인식도와 세션패턴 기반의 비정상 탐지 메커니즘)

  • Ryu Dae-Hee;Lee Se-Yul;Kim Hyeock-Jin;Song Young-Deog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.9-16
    • /
    • 2005
  • Recently, since the number of internet users is increasing rapidly and, by using the Public hacking tools, general network users can intrude computer systems easily, the hacking problem is setting more serious. In order to prevent the intrusion. it is needed to detect the sign in advance of intrusion in a Positive Prevention by detecting the various forms of hackers intrusion trials to know the vulnerability of systems. The existing network-based anomaly detection algorithms that cope with port-scanning and the network vulnerability scans have some weakness in intrusion detection. they can not detect slow scans and coordinated scans. therefore, the new concept of algorithm is needed to detect effectively the various. In this Paper, we propose a detection algorithm for session patterns and FCM.

  • PDF

The Study of Protective Solution and People in Technology Outflow about SMEs (중소기업 기술유출 및 기술인력 방지제도에 관한 연구)

  • Chung, Jason
    • International Commerce and Information Review
    • /
    • v.17 no.3
    • /
    • pp.133-152
    • /
    • 2015
  • Cause of the technology leakage and trade secrets can be leaked to the lack of infrastructure, lack of coping skills of SMEs. In addition, small businesses can avoid technology outflow and re-experience the same half of the damage, even when the external leak developed after the fact and does not demonstrate such technology leakage time for the technology and situation which did not take any action, security, infrastructure investments difficult, work-related knowledge, lack of security, trade secret protection dedicated staff, inadequate legal and institutional measures have been identified as such complaints to date. For subcontracting, etc. mid-sized transactions, hinder the growth of SMEs, SME cross-technology leakage to the increase in unfair practices, including useful, and this has been accompanied by growth-based business-to-business it weakened.

  • PDF

A Study on the Ways of Disputes Resolution Against Indian Company through ADR system (ADR을 통한 인도기업과 분쟁해결 방안에 관한 연구)

  • Shin, Koon-Jae
    • International Commerce and Information Review
    • /
    • v.14 no.3
    • /
    • pp.49-73
    • /
    • 2012
  • India is a gigantic market with a population of 1.2 billion and an economy that is growing at the second-fastest pace in the world. The volume of trade between India and Korea has been sharply increased with the increase of dispute since 2000. Although avoidance of disputes is always a priority, it is also important to prepare methods of dispute resolution which are efficient and economical. So, understanding of Indian dispute resolution system is a necessary requirement for successful business operation with Indian companies. This article analyzed and compared with the various ways of Indian ADR such as negotiation, mediation, conciliation, Lok Adalat and arbitration in order to help the Korean traders who enter into business with the Indian companies to settle their disputes efficiently. In conclusion, this article suggests the following ways to overcome problems of dispute with Indian companies: First, the Korean companies should recognize the characteristics of Indian ADR Ways respectively. Second, the Korean companies should utilize the conciliation or the mediation in small claim but arbitration in large claim. Third, Write a contract and insert the KCAB's standard arbitration clause in their contract.

  • PDF

A study on several points of commercial disputes in international license Agreement (국제라이선스계약이 가지는 상사분쟁의 주요 쟁점에 관한 고찰)

  • Jeong, Heejin
    • International Commerce and Information Review
    • /
    • v.19 no.1
    • /
    • pp.191-210
    • /
    • 2017
  • The old sources of competitive edge and value added were land, labor, and capital. In today's knowledge-based economy in the 21st century, technology is attracting attention as a new engine of growth. That paradigm shift of world economy has resulted in the global spread of technology transfer and the gradual increase of trade of intangible goods including patents and know-how as well as tangible goods in international trade. An international license agreement is a representative form of technology transfer. In license agreements, the providers of technology keep their ownership of technology, allow the implementation of technology to the users of technology only for a certain period of time, and receive loyalty as a reward. Economic profit through such technology trade can be realized with the smooth implementation and termination of agreement. International license agreements are different from sales contracts, which represent international business transaction based on mutual obligation, in many aspects in that they target intangible goods of technology and aim for rent for a certain period of time. This study thus set out to examine issues that could be controversial in the main and individual obligation of the parties in international license agreements and provide implications helpful for the prevention of disputes in advance.

  • PDF

Technique of Range Query in Encrypted Database (암호화 데이터베이스에서 영역 질의를 위한 기술)

  • Kim, Cheon-Shik;Kim, Hyoung-Joong;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.3
    • /
    • pp.22-30
    • /
    • 2008
  • Recently, protection of personal information is getting more important. Many countries have legislated about the protection of personal information. Now, the protection of relevant personal information is required not for a simple image of enterprises but law obligation. Most databases in enterprises used to store customers' names, addresses and credit card numbers with no exceptions. The personal information about a person is sensitive, and this asset is strategic. Therefore, most enterprises make an effort to preserve personal information safely. If someone, however, hacks password information of DBMS manager, no one can trust this system. Therefore, encryption is required based in order to protect data in the database. Because of database encryption, however, it is the problem of database performance in terms of computation time and the limited SQL query. Thus, we proposed an efficient query method to solve the problem of encrypted data in this paper.

Countermeasure strategy for the international crime and terrorism by use of SNA and Big data analysis (소셜네트워크분석(SNA)과 빅데이터 분석을 통한 국제범죄와 테러리즘 대응전략)

  • Chung, Tae Jin
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.25-34
    • /
    • 2016
  • This study aims to prevent the serious threat from dangerous person or group by responding or blocking or separating illegal activities by use of SNA: Social Network Analysis. SNA enables to identify the complex social relation of suspect and individuals in order to enhance the effectiveness and efficiency of investigation. SNS has rapidly developed and expanded without restriction of physical distance and geo-location for making new relation among people and sharing large amount of information. As rise of SNS(facebook and twitter) related crimes, terrorist group 'ISIS' has used their website for promotion of their activity and recruitment. The use of SNS costs relatively lower than other methods to achieve their goals so it has been widely used by terrorist groups. Since it has a significant ripple effect, it is imperative to stop their activity. Therefore, this study precisely describes criminal and terrorist activities on SNS and demonstrates how effectively detect, block and respond against their activities. Further study is also suggested.

Procedural Model of XML Schema Framework for Digitalizing Disaster Information Management for Construction Facility (시설물 재해정보관리 전자화를 위한 XML스키마 구축 방법의 절차적 모형 구성)

  • Kang, Leen-Seok;Park, Seo-Young;Moon, Hyoun-Seok
    • Korean Journal of Construction Engineering and Management
    • /
    • v.7 no.3 s.31
    • /
    • pp.56-64
    • /
    • 2006
  • The current disaster management manual is being utilized as a book or document-based type. It causes a low applicability and interoperability in practical business because each information has a different document format and it is difficult to recycle those information as common disaster information. The information reading by text type without electronic data and visual object also has a limitations in guaranteeing a quickness of disaster management business. Accordingly, the electronic document management system with visual information is necessary and the system needs to tie framed by XML schema because the electronic document standard will be changed from DTD to XML schema. This study attempts to develop a procedural methodology of an electronic document management system based on XML for disaster management. The applicability of the proposed results is verified by the simulated scenario.

Strategies for Providing Detour Route Information and Traffic Flow Management for Flood Disasters (수해 재난 시 우회교통정보 제공 및 교통류 관리전략)

  • Sin, Seong-Il;Jo, Yong-Chan;Lee, Chang-Ju
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.6
    • /
    • pp.33-42
    • /
    • 2007
  • This research proposes strategies about providing detour route information and traffic management for flood disasters. Suggested strategies are based on prevention and preparation concepts including prediction, optimization, and simulation in order to minimize damage. Specifically, this study shows the possibility that average travel speed is increased by proper signal progression during downpours or heavy snowfalls. In addition, in order to protect the drivers and vehicles from dangerous situations, this study proposes a route guidance strategy based on variational inequalities such as flooding. However, other roads can have traffic congestion by the suggested strategies. Thus, this study also shows the possibility to solve traffic congestion of other roads in networks with emergency signal modes.

A Development of Seepage Analysis Model for Unsaturated Soil during Rainfall (강우시 불포화지반의 침투해석모형 개발)

  • Lee, Jung-Sik;Han, Heui-Soo;Jang, Jin-Uk
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.796-800
    • /
    • 2009
  • 토목구조물 및 사면의 붕괴는 집중호우가 내리는 경우 많이 발생하고 있으며, 특히 사면에서는 붕괴까지의 변형이 급속히 진행되어 이를 사전에 예방하기는 매우 어려운 현실이다. 침투 및 배수과정에서의 사면 붕괴는 강우침투로 인한 지반의 물리적 특성변화가 직접적으로 사면의 안전계수 변화에 영향을 주는 것으로 판단되며, 이때 발생하는 물리적 특성변화로는 침투시 사면 내 지반의 단위 중량은 증가하여 전단응력의 증가 및 전단강도 감소현상이 발생하며, 이와 반대로 사면 내 배수로 인하여 전단응력의 감소 및 전단강도의 증가현상이 발생한다. 따라서 본 연구에서는 강우침투로 발생하는 지반의 포화도 변화를 지반 내 투수계수의 함수로 설명하여 강우로 인한 지반의 침투 및 배수과정을 규명하고자 한다. 일반적으로 지반 내 지하수의 침투과정은 라플라스 공식을 적용한다. 그러나 라플라스 공식은 정상 상태(Steady State)일 경우에만 사용할 수 있고, 강우 등으로 인한 지하수의 수두 변화가 발생한 비정상 상태(Unsteady State)의 경우에는 부적합하므로 사면과 옹벽 등의 토질구조물에서는 안전성 변화를 계산할 수 없다. 이를 위해 사면 내 지반의 침투 및 배수과정을 투수계수의 함수로 나타내어, 강우의 침투과정을 Fourier Series, 변수분리법 및 섭동함수를 사용하여 식으로 유도함으로서 강우에 의한 지반의 침투 및 배수과정에 따른 사면 내 지하수의 분포를 예측한다. 침투과정 해석을 위하여 지표에서 포화대까지의 깊이 10m의 모델사면 및 지표부터 포화대까지의 포화도는 직선으로 비례한다는 가정을 적용한다. 먼저 푸리에 급수를 이용, 시간에 따른 온도를 열전달에 관하여 편미분하여 발생하는 열확산계수를 투수계수로 변환함에 따라 지하수의 시간과 수직방향거리에 대한 지반의 포화도를 산정한다. 변수분리법은 산정된 포화도에 지반의 초기조건과 경계조건를 고려하기 위해 적용하며, 변수분리법에 의해 산정된 지하수 분포를 섭동함수법으로 과도 및 정상상태로 분류한다. 본 연구의 수행으로 인해 얻어진 결과를 요약하면 다음과 같다. 첫째, Fourier Series와 변수분리법, 섭동함수를 이용하여 강우에 의한 지반의 포화도 변화를 수식적으로 나타낼 수 있으며 둘째, 지반에서의 강우침투과정을 식으로 표현함으로서, 깊이별 시간에 따른 포화도의 영역이 상부로부터 하부로 전이되는 과정을 알 수 있다. 셋째, 푸리에 급수를 이용한 지반의 침투계산으로 강우로 인한 지반의 포화영역 및 불포화영역을 명확히 구분할 수 있으며, 각 깊이별 포화도를 계산하여 각 구간에서 불포화구간의 전단강도에 대한 보다 정확한 계산이 가능하리라 판단된다.

  • PDF