• Title/Summary/Keyword: 생명주기

Search Result 599, Processing Time 0.026 seconds

시큐어 SDLC 시각의 시코어코딩 활용과 평가

  • Seo, Dongsu
    • Review of KIISC
    • /
    • v.25 no.1
    • /
    • pp.26-31
    • /
    • 2015
  • 악의적인 공격에 대해 안전한 소프트웨어를 개발하고자 하는 보안강화 활동은 소프트웨어개발 생명주기(SDLC)의 모든 단계에서 수행되어야 한다. 시큐어코딩은 개발 단계에서 적용될 수 있는 안전한 코딩 기법으로 실행코드가 지닐 수 있는 취약성의 근본 원인을 소스코드 수준에서 제거하고자 하는 시도이다. 그럼에도 불구하고 시큐어코딩을 구현활동의 일부로만 국한시켜 보는 시각은 기법이 갖는 장점을 충분히 살리지 못할 수 있다. 외국에서는 이미 시큐어코딩의 적용과 평가를 SDLC 수준에서 시행하고 있으며 시큐어 SDLC로 분류되는 BSIMM과 SAMM, MS SDL은 이러한 시도의 대표적인 사례라 할 수 있다. 본 고에서는 이들 보안 프레임워크를 대상으로 시큐어코딩이 어떻게 정의되고, 수행되며, 평가되는지 비교를 통해 효과적인 시큐어코딩 활동의 이해를 돕고자 한다.

Development of Software Test Items for Test of Installation Phase (설치단계의 테스트를 위한 소프트웨어 시험 항목의 개발)

  • 이하용;양해술
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.589-591
    • /
    • 2001
  • 소프트웨어의 개발은 제품의 설치가 완전하게 이루어지도록 하는 설치 프로그램의 개발로 마무리된다고 할 수 있다. 소프트웨어는 개발자가 의도한 대로 이상 없이 수행될 수 있도록 설치될 시스템에 맞게 설치되어야 한다. 많은 소프트웨어들이 복잡한 설치 과정을 거쳐야 하거나 설치 과정에서 문제를 일으키는 경우가 발생함으로써 제품에 대한 신뢰를 떨어뜨리는 경우가 있다. 따라서, 본 연구에서는 생명주기 단계 중 소프트웨어 설치 단계에서 검토할 수 있는 테스트 항목을 개발하였다.

  • PDF

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Dynamic Local Update-based Routing Protocol(D-LURP) in Wireless Sensor Network with Mobile Sink (모바일 싱크노드를 갖는 무선 센서 네트워크에서 동적 지역 업데이트 기반의 라우팅 프로토콜(D-LURP))

  • Chung, Jae-Hoon;Park, Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.3
    • /
    • pp.116-122
    • /
    • 2009
  • Mobile Wireless Sensor Network is an organized collection of sensor nodes and mobile sink nodes, in which the sensor node transmits the signal to the sink node. In real environment, there are many cases in which sinks have mobility caused by the people, the vehicle and etc. Since all nodes in the sensor networks have limited energy, many researches have been done in order to prolong the lifetime of the entire network. In this paper we propose Dynamic Local Update-based Routing Protocol(D-LURP) that prolong the lifetime of the entire network to efficiently maintain frequent location update of mobile sink static sensor nodes in Mobile WSNs. When the sink node moves out of the local broadcasting area the proposed D-LURP configures dynamically the local update area consisted of the new local broadcasting area and the previous dissemination node(DN) and find the path between the DN and the sink node, instead of processing a new discovering path like LURP. In this way the processing of broadcasting sink node's location information in the entire network will be omitted. and thus less energy will be consumpted. We compare the performances of the proposed scheme and existing Protocols.

Fixed Partitioning Methods for Extending lifetime of sensor node for Wireless Sensor Networks (WSN환경에서 센서노드의 생명주기 연장을 위한 고정 분할 기법)

  • Han, Chang-Su;Cho, Young-Bok;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.942-948
    • /
    • 2016
  • WSN based on wireless sensor nodes, Sensor nodes can not be reassigned and recharged if they once placed. Each sensor node comes into being involved to a communication network with its limited energy. But the existing proposed clustering techniques, being applied to WSN environment with irregular dispersion of sensor nodes, have the network reliability issues which bring about a communication interruption with the local node feature of unbalanced distribution in WSN. Therefore, the communications participation of the sensor nodes in the suggested algorithm is extended by 25% as the sensor field divided in the light of the non-uniformed distribution of sensor nodes and a static or a dynamic clustering algorithm adopted according to its partition of sensor node density in WSN. And the entire network life cycle was extended by 14% to ensure the reliability of the network.

An Object-Oriented Modeling of Object-Oriented Software Development Methods : OMOS(Object-oriented software development Method for Object-oriented software System) (객체지향 소프트웨어 개발 방법론의 객체지향 모델링 : OMOS(Object-oriented software development Method for Object-oriented software System))

  • Choi, Sung-Woon
    • The KIPS Transactions:PartD
    • /
    • v.8D no.4
    • /
    • pp.401-408
    • /
    • 2001
  • Object-oriented software development methods are used to develop object-oriented software systems. Object-oriented systems are believed to habe better modularity, reusability, maintainability, and extensibility than systems modeled in conventional methods. Current object-oriented software development methods, however, are modeled in terms of procedural, functional, and structural models. There models cause problems such as tight coupling among activities, and uncontrolled access to global artifacts. In this paper, were introduce OMOS(Object-oriented software development Method for Object-oriented software System), an object-oriented modeling of object-oriented software development methods. Artifacts and their related activities are modeled as classes and objects. Development lifecycles are modeled as interactions among the objects. By modeling the software development method in an object-oriented way, OMOS achieves better reusability, flexibility, extensibility, and maintainability.

  • PDF

WOBR : A WebDAV-Based OSGi Bundle Repository Supporting Effective Group Access (WOBR : 효과적인 그룹별 접근을 지원하는 웹데브 기반의 OSGi 번들 저장소)

  • Park, Jong-Moon;Park, Yang-Soo;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.521-533
    • /
    • 2010
  • The OSGi framework is a java-based service platform that can be remotely managed, providing an application life cycle management model, a service registry and an execution environment. Based on the framework, various OSGi layers, APIs, and services have been defined. A bundle is an application that can be executed in the OSGi framework, deployed through a bundle repository. Usually, bundles in the repository are accessible via a designated web page. Unfortunately, the current bundle repositories do not provide any kind of group access services and dynamic bundle installation and deployment. In this paper, we describe a WebDAV-Based OSGi bundle repository named WOBR, which supports effective group-based accesses. WOBR is composed of a WOBR bundle repository, a management bundle and an access bundle that interact with the bundle repository. The management bundle is for configuration of the WOBR bundle repository, managing group access facility to the repository. The access bundle provides access to the repository and search mechanism for the bundles. Additionally, it provides the life cycle management of the installed bundles on the local environment.

Design and Implementation of Quality Evaluation Toolkit of Analysis Phase Product (분석단계 산출물에 대한 품질평가툴킷의 설계 및 구현)

  • Yang, Hae-Sool
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1719-1732
    • /
    • 1997
  • In the software development process, various development product are made in each phase of lifecycle. Formless software is visualized by products, and quality management is implemented by management for products. But, because standardization for products which is made in the development process is not established practically, developers use different development methodologies or documentation specifications. Therefore the reality is that quality evaluation is not implemented along standardized methodology or systematic process. In this paper, we constructed quality management system and designed and implemented analysis phase quality evaluation toolkit. We constructed quality external and internal character to evaluate software quality for quality management and constructed relational metrics and system of qualitative quantitative evaluation element items and, under these systems, we constructed quality evaluation toolkit and Implemented functions and evaluated products.

  • PDF

A Study on the Principle of Application of Privacy by Design According to the Life Cycle of Pseudonymization Information (가명정보 생명주기에 따른 개인정보보호 중심 설계 적용 원칙에 관한 연구)

  • Kim, Dong-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.329-339
    • /
    • 2022
  • Recently, as personal information has been used as data, various new industries have been discovered, but cases of personal information leakage and misuse have occurred one after another due to insufficient systematic management system establishment. In addition, services that use personal information anonymously and anonymously have emerged since the enforcement of the Data 3 Act in August 2020, but personal information issues have arisen due to insufficient alias processing, safety measures for alias information processing, and insufficient hate expression. Therefore, this study proposed a new PbD principle that can be applied to the pseudonym information life cycle based on the Privacy by Design (PbD) principle proposed by Ann Cavoukian [1] of Canada to safely utilize personal information. In addition, the significance of the proposed method was confirmed through a survey of 30 experts related to personal information protection.

Improving reliability of reservoir hydrological data followed by periodic evaluation (주기별 평가에 의한 저수지 수문자료 신뢰도 개선)

  • Jaekyoung Noh;Jaenam Lee
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.106-106
    • /
    • 2023
  • 저수지 수문자료는 강우량, 유입량, 저수량, 방류량이다. 이 중에서 관측되고 있는 것은 저수량과 일부 수로방류량에 불과하다. 그럼에도 모의에 의해 유입량을 고정시키면, 물수지에 의해 방류량을 계산할 수 있다. 그러나 저수량 오차로 모의 유입량과 계산 방류량의 신뢰도는 반드시 확인돼야 한다. 신뢰도가 낮으면 모의 유출량과 계산 방류량을 조정하며 신뢰도를 높여야 한다. 신뢰도는 평가주기가 짧을수록 보장된다. 여기서는 유역면적 218.80km2, 유효저수량 3,494만m3, 수혜면적 5,117ha인 탑정지에 대해 2020년 1월1일부터 12월31일까지 1시간 단위로 1달, 10일, 3일, 2일 간격의 주기로 저수지 운영자료를 생산하고, 그 신뢰도를 평가하여 평가주기가 짧을수록 오차가 감소되는 것을 관찰코자 했다. 1시간 간격의 유입량은 ONE 모형으로 모의했고, 저수지 물수지 모형을 구축하여 모의 유입량에 저수량 변화를 더해 방류량을 계산했다. 또한 저수지 물수지에 의해 저수위를 모의했으며, 관측 저수위와의 오차제곱근(RMSE)으로 신뢰도를 평가한 결과는 다음과 같다. 1달 간격으로 신뢰도를 평가한 경우 RMSE는 132.466m, 10일 간격은 46.922m, 3일 간격은 0.520m, 2일 간격은 0.349m로 나타났다. 위의 결과로부터 저수지 수문자료의 평가주기를 짧게 할수록 신뢰도는 개선된다고 말할 수 있다. 이상의 결과는 과거 자료에 대해 1년 동안 1시간 간격으로 유입량을 모의하고 방류량을 계산한 결과를 고정시키고, 평가주기를 달리하며 수위오차를 분석한 결과이다. 만약 평가주기별로 유입량과 방류량을 실제 상황에 적합하게 조정하면, 그 신뢰도는 훨씬 더 개선될 것이다. 현재 저수지 수위만을 관리하고 있는 현장의 상황에서 이 연구결과가 시사하는 바는 매우 크다. 첨언하면 AI 시대의 핵심은 자료다. AI의 먹이는 자료다. 다시 말해 자료 없는 AI는 시체와 같다. 자료는 기본이고 진실이다. 자료 없는 결과는 가짜다. 또한 위의 결과는 자료는 상시 관찰돼야 한다는 것을 말한다. 1년에 한 번 수문자료를 평가하는 제도로는 고품질의 자료를 생산할 수 없다. 무엇보다 자료는 상시 관찰하는 제도가 정착돼야 하며, 그 때 비로소 AI와 공존과 협력으로 물관리 기술의 혁신을 이룰 것이라 확신한다.

  • PDF