• Title/Summary/Keyword: 안전위험 이슈

Search Result 65, Processing Time 0.024 seconds

Domestic Market and Economic Impact of the Re-use of PSI(Public Sector Information) (공공정보 민간활용 시장 및 파급효과)

  • Heo, P.S.;Park, G.M.;Park, W.J.;Cho, G.S.;Ryu, W.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.4
    • /
    • pp.118-131
    • /
    • 2013
  • 최근 과학 및 IT 패러다임은 HW(과거) 및 SW(현재) 중심에서 '데이터 빅뱅'을 활용하여 정치 사회 경제 등 제반 이슈와 연계된 분석 예측으로 진화 중이다. 국가안전 및 위험관리, 의료, 교육, 복지, 환경 등 사회 전반에 걸쳐 공공부문에서의 빅데이터 활용 가능성이 높아지고 있다. 공공정보 자체뿐만 아니라 민간정보와의 통합 분석을 통해 효과적인 맞춤형 정책과 새로운 지식정보 서비스 제공이 가능하기 때문에 주요 선진국은 공공정보의 적극 활용을 위해 다양한 정책을 경쟁적으로 추진해 오고 있다. 공공정보의 민간활용 촉진은 정보 제공자인 공공기관뿐만 아니라, 이를 활용하는 민간 사업자, 관련 서비스 사용자 모두에게 경제적 비경제적 가치를 제공할 수 있다. 따라서, 본 연구를 통해 국내 공공정보 민간활용 산업의 경제적 파급효과를 추정하고, 중요한 전 후방 연결 산업들을 파악하고자 한다.

  • PDF

Home Network Security using NAT and IPSec (NAT와 IPSec을 이용한 홈 네트워크 보안)

  • Kim, Hong-Chul;Song, Byung-Wook;Park, In-Sung;Kim, Sang-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.1073-1076
    • /
    • 2001
  • 최근 홈 네트워크를 구축할 수 있는 기반 전송기술이 급속도로 발전하고 있다. 또한, 이를 이용할 수 있는 고성능의 가전기기가 속속 개발됨에 따라 흠 네트워크가 대중화되고 있다. 이러한 상황에서 가장 중요한 이슈로 떠오르고 있는 것이 홈 네트워크 보안이다. NAT기술은 내부 네트워크를 외부로 부터 은닉시키고 보호할 수 있는 새로운 기법을 제공한다는 점에서 최근 많은 관심을 받고 있다. 본 논문에서는 홈 네트워크 보안 시스템을 구현함에 있어 NAT기술과 범용 보안 메커니즘 IPSec을 적용하여 홈 네트워크를 인터넷과 같은 외부의 전산망에 존재하는 위험으로부터 안전하게 보호할 수 있는 기법을 제시한다.

  • PDF

A Plan of Developing the Disaster Preparedness System through Text Analysis (비정형 데이터 분석을 통한 재난예방체계 발전방안)

  • Choi, Seon-Hwa;Choi, Woo-Jeong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.13-15
    • /
    • 2012
  • 최근 모바일 인터넷과 소셜미디어 등장으로 데이터가 폭발적으로 증가하고 있으며, 이를 활용하여 정치 사회 경제 등 제반 이슈와 연계된 분석 예측의 중요성이 날로 증가하고 있다. 특히 모바일 기기의 이동성 위치기반 실시간 등의 특징은 재난안전 관리에 유용한 수단이 되고 있으며, 재난발생시 비상정보 획득 및 공유의 매체로 활용되고 있다. 본 논문은 인터넷에 존재하는 재난관련 언론보도, 민원, 제보 등의 비정형 데이터를 분석하여 재난전조(前兆)를 사전에 파악하고 위험요소를 제거하는 체계에 대해 소개하고 이 체계를 효과적으로 운영하기 위해 도입되어야 할 정보기술과 발전방안을 제안한다.

Analysis and Considerations for a Vulnerability of SSL/TLS Transmission Interval on Smartphones (스마트폰에서의 SSL/TLS 전송구간 취약점 분석 및 고찰)

  • Kang, Won Min;Jeong, Hwa Young;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.890-891
    • /
    • 2013
  • 인터넷이 발달함에 따라 사용자들은 웹에서 여러 가지 일의 처리가 가능하게 되었다. 최근에는 휴대폰의 성능과 기능이 발달하고 스마트폰의 보급이 급속히 확산되면서 스마트폰을 사용하여 많은 양의 데이터들의 전달이 이루어지고 있다. 이러한 처리 과정에서 개인 및 기업정보들이 유출될 수 있는 위험이 증가하고, 스마트폰과 클라이언트 사이에서의 개인, 기밀 정보가 SSL (Secure Sockets Layer) 또는 TLS (Transport Layer Security)프로토콜을 통해 암호화 되어 전송 되어도 프록시 서버에서 인증서 변조를 통하여 유출될 가능성이 점점 높아지고 있다. 본 논문에서는 스마트폰 상의 안전한 통신을 위해 많이 이용되는 SSL/TLS의 전송구간에 대한 취약점 분석 등 보안 이슈와 연구 방향에 대해 논의한다.

Burnout among Radiologists in Korea: Prevalence, Risk Factors, and Remedies (한국 영상의학과 의사의 탈진: 빈도, 위험인자, 해결 방안)

  • Woo Kyoung Jeong;Byung Ihn Choi
    • Journal of the Korean Society of Radiology
    • /
    • v.83 no.4
    • /
    • pp.776-782
    • /
    • 2022
  • Burnout among radiologists has recently emerged as an issue that poses a threat to patient safety. Burnout adversely effects the quality of patient care and may lead to health problems in physicians. Approximately 84% of board-certified radiologists working in large hospitals in Korea responded that they had experienced burnout at least once. To overcome this, the standardization of physicians' workloads, as well as improvements in the professional workflow are necessary to ensure a healthy lifestyle balance.

Security-Enhanced Key Establishment Scheme for Key Infection (Key Infection의 보안성 향상을 위한 개선된 키 설정 방법)

  • Hwang Young-Sik;Han Seung-Wan;Nam Taek-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.24-31
    • /
    • 2006
  • Traditional security mechanisms do not work well in the sensor network area due to the sensor's resource constraints. Therefore security issues are challenging problems on realization of the sensor network. Among them, the key establishment is one of the most important and challenging security primitives which establish initial associations between two nodes for secure communications. Recently, R. Anderson et al. proposed one of the promising key establishment schemes for commodity sensor network called Key Infection. However, key infection has an intrinsic vulnerability that there are some areas where adversaries can eavesdrop on the transferred key information at initial key establishment time. Therefore, in this paper, we propose a security-enhanced key establishment scheme for key infection by suggesting a mechanism which effectively reduces the vulnerable areas. The proposed security mechanism uses other neighbor nodes' additional key information to establish pair-wise key at the initial key establishment time. By using the additional key information, we can establish security-enhanced key establishment, since the vulnerable area is decreased than the key infection's. We also evaluate our scheme by comparing it with key infection using logical and mathematical analysis.

Aviation Safety Regulation and ICAO's Response to Emerging Issues (항공안전규제와 새로운 이슈에 대한 ICAO의 대응)

  • Shin, Dong-Chun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.1
    • /
    • pp.207-244
    • /
    • 2015
  • Aviation safety is the stage in which the risk of harm to persons or of property damage is reduced to, and maintained at or below, an acceptable level through a continuing process of hazard identification and risk management. Many accidents and incidents have been taking place since 2014, while there had been relatively safer skies before 2014. International civil aviation community has been exerting great efforts to deal with these emerging issues, thus enhancing and ensuring safety throughout the world over the years. The Preamble of the Chicago Convention emphasizes safety and order of international air transport, and so many Articles in the Convention are related to the safety. Furthermore, most of the Annexes to the Convention are International Standards and Recommended Practices pertaining to the safety. In particular, Annex 19, which was promulgated in Nov. 2013, dealing with safety management system. ICAO, as law-making body, has Air Navigation Commission, Council, Assembly to deliberate and make decisions regarding safety issues. It is also implementing USOAP and USAP to supervise safety functions of member States. After MH 370 disappeared in 2014, ICAO is developing Global Tracking System whereby there should be no loophole in tracking the location of aircraft anywhere in world with the information provided by many stakeholders concerned. MH 17 accident drove ICAO to install web-based repository where information relating to the operation in conflict zones is provided and shared. In addition, ICAO has been initiating various solutions to emerging issues such as ebola outbreak and operation under extreme meteorological conditions. Considering the necessity of protection and sharing of safety data and information to enhance safety level, ICAO is now suggesting enhanced provisions to do so, and getting feedback from member States. It has been observed that ICAO has been approaching issues towards problem-solving from four different dimensions. First regarding time, it analyses past experiences and best practices, and make solutions in short, mid and long terms. Second, from space perspective, ICAO covers States, region and the world as a whole. Third, regarding stakeholders it consults with and hear from as many entities as it could, including airlines, airports, community, consumers, manufacturers, air traffic control centers, air navigation service providers, industry and insurers. Last not but least, in terms of regulatory changes, it identifies best practices, guidance materials and provisions which could become standards and recommended practices.

A Study on the Major Standards and Actual Conditions of Evacuation Safety in Child Care Facility (보육시설의 피난안전 관련 주요 기준 분석 및 실태조사에 관한 연구)

  • Park, Jae-Sung
    • Fire Science and Engineering
    • /
    • v.23 no.3
    • /
    • pp.93-102
    • /
    • 2009
  • Recently, the number of child care facility and social demand for high quality child care service increase suddenly. Especially, social atmosphere about fire safety is more sensitive in Korea. The majority of the residents in a child care facility are composed of early childhood having difficulty to evacuate, and therefore the number of stories of a building and the appropriateness of a evacuation equipment play an important role in the evacuation safety. In this study, problems and improvements for the evacuation safety are dealt with the present conditions of child care facilities, the comparative analysis between domestic and foreign standards, the research on the actual condition of evacuation equipments, and so on. The study brings to a conclusion that it is necessary to systematize the regulations regarding fire safety, to connect fire-fighting facilities for design standards and operations of emergency preparation equipments, to improve the regulations for fire protection system such as the sprinkler system, and to restrict the facilities having fire hazards.

An Analysis on the Prevention Effects of Forward and Chain Collision based on Vehicle-to-Vehicle Communication (차량 간 통신 기반 전방추돌 및 연쇄추돌 방지 효과 분석)

  • Jung, Sung-Dae;Kim, Tae-Oh;Lee, Sang-Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.4
    • /
    • pp.36-43
    • /
    • 2011
  • The forward collision of vehicles in high speed can cause a chain collisions and high fatality rate. Most of the forward collisions are caused by insufficient braking distance due to detection time of driver and safe distance. Also, accumulated detection time of driver is cause of chain collisions after the forward collision. The FVCWS prevents the forward collision by maintaining the safety distance inter-vehicle and reducing detection time of driver. However the FVCWS can cause chain collisions because the system that interacts only forward vehicle has accumulated detection time of driver. In this paper, we analyze forward and chain collisions of normal vehicles and FVCWS vehicles on static traveling scenario. And then, we analyze and compare V2V based FVCWS with them after explaining the system. The V2V FVCWS reduces detection time of driver alike FVCWS as well as remove accumulated detection time of driver by broadcasting emergence message to backward vehicles at the same time. Therefore, the system decrease possibility of forward and chain collisions. All backward normal vehicles and 3~4 backward FVCWS vehicles have possibility of forward and chain collisions in result of analysis. However V2V FVCWS vehicles almost do not chain collisions in the result.

A Design of Authentication Method for Secure Communication based on Wearable Device (웨어러블 디바이스 기반의 안전한 통신을 위한 인증기법 설계)

  • Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.