• Title/Summary/Keyword: 위협 완화

Search Result 87, Processing Time 0.025 seconds

사학연금 가입자의 수익비 분석

  • Ju, Hyo-Chan
    • Journal of Teachers' Pension
    • /
    • v.3
    • /
    • pp.309-344
    • /
    • 2018
  • 본 논문에서는 사학연금의 수급-부담 구조에 대한 실증자료를 제공할 목적으로 사학연금 가입연도 및 가입기간에 따른 수익비를 제시한다. 이에 따르면 전반적으로 가입시기가 늦어질수록 그리고 가입기간이 길어질수록 수익비는 감소하여 몇 차례의 사학연금법 개혁이 저부담·고급여 체계를 상당 부분 완화하였음을 알 수 있다. 더불어 저소득자의 수익비가 고소득자의 수익비에 비해 높아 2015년 개혁 시 도입된 소득재분배 효과를 확인할 수 있다. 하지만 현 제도 하에서도 사망률 감소에 따른 연금수급기간의 연장으로 수익비가 1보다 높은 것으로 나타나 연금재정에 큰 위협으로 파악된다. 다만 수익비는 그 계산에 있어 요구되는 여러 가지 가정에 따라 수치가 크게 달라질 수 있으므로 타공적연금과의 비교 시 이에 대한 각별한 유의가 필요하다. 또한 수익비는 수급-부담 구조를 나타내는 지표일 뿐 공적연금제도 본연의 기능인 노후소득보장 정도를 알려주기에는 한계가 있음에 유념해야 한다.

A Exploring the impact of malware on mobile devices (모바일 장치에 대한 멀웨어의 영향 탐색)

  • Jun-ho Lee;Jae-kyung Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.611-613
    • /
    • 2023
  • 모바일 멀웨어는 민감한 데이터의 도용, 기기 성능 저하, 금전적 피해 유발 등 다양한 위협을 내포하고 있으며 특히 피싱, 앱 기반 공격 및 네트워크 기반 공격과 같은 기술을 통해 모바일 장치를 악용할 수 있다. 이를 해결하기 위해 바이러스 백신 소프트웨어 및 강력한 암호 사용과 같은 보안 기술을 구현하면 모바일 멀웨어의 영향을 방지하고 완화하는 데 도움이 될 수 있다. 추가적으로 개인과 조직이 모바일 멀웨어와 관련된 위험을 인식하고 불리한 결과를 피하기 위해 이를 차단하기 위한 사전 조치를 취하는 것이 중요하다. 본 논문에서는 이러한 조치에 대한 보안 예방책을 제안하고자 하며 이를 통해 보다 안전한 모바일 환경을 갖출 수 있을 것이라 판단한다.

  • PDF

A Study on Blockchain-Based Mobile Edge Computing for Secure Group Signatures and Authentication (안전한 그룹 서명 및 인증 체계를 위한 블록체인 기반 모바일 엣지 컴퓨팅에 관한 연구)

  • JaeMin MYEONG;Jinho YOO;Daehee SEO
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.277-278
    • /
    • 2024
  • 모바일 엣지 컴퓨팅 기술은 블록체인과 결합하여 모바일 기기의 낮은 컴퓨팅 파워를 보완함과 동시에 추적성, 무결성이 보장된 데이터베이스를 제공하기에, 미래 IoT 환경에서 중추적인 역할을 할 것으로 기대된다. 그러나 블록체인 기반 모바일 엣지 컴퓨팅을 안전하고 효율적으로 사용하기 위해 보안이 함께 동반되어야 하며, 본 논문은 이러한 보안의 하나로써 안전한 그룹 서명과 인증 체계를 위해 고려해야 하는 보안 위협을 살펴보고, 이를 완화하기 위한 보안 기술을 살펴보고자 한다.

SLA Limitations in Cloud Forensics and Suggestions for Improvement (클라우드 포렌식에서의 SLA 한계와 개선 방안 제안)

  • Mi-Yeon Kim;Sang-Hoon Choi;Ki-Woong Park
    • Annual Conference of KIPS
    • /
    • 2024.10a
    • /
    • pp.191-194
    • /
    • 2024
  • 클라우드 컴퓨팅은 적은 초기 비용만으로도 효율적인 자원 관리와 서비스를 이용할 수 있는 기술이다. 이러한 장점으로 인해 클라우드 서비스를 이용하는 개인과 기업의 비율이 갈수록 증가하고 있지만 이에 따른 보안 사고도 비례하여 증가하고 있다. 클라우드 내에서 보안 사고가 발생하면 클라우드 포렌식을 통한 조사가 신속하게 이루어져야 하는데 다양한 사용자의 자원이 공유되고 있는 멀티-테넌트 환경이 증거 수집을 지연시킨다. 또한 위치에 상관없이 접근하여 수정이 가능하다는 클라우드의 특성이 증거 변조의 위협성을 높여 클라우드 포렌식을 어렵게 한다. 따라서 본 논문에서는 클라우드 포렌식의 한계를 완화하기 위해 클라우드 서비스를 이용하기 전에 맺는 SLA(Service Level Agreement)의 한계에 대해 분석하고 그에 따른 개선 방안을 제안하고자 한다.

Cities as Place for Climate Mitigation and Adaptation: A Case Study of Portland, Oregon, USA (기후완화와 적용의 장소로서의 도시 - 미국 오레건주 포트랜드시 사례연구 -)

  • Chang, Hee-Jun;House-Peters, Lily
    • Journal of the Korean Geographical Society
    • /
    • v.45 no.1
    • /
    • pp.49-74
    • /
    • 2010
  • Cities are major sources of greenhouse gas emissions but also suitable places for implementing proactive climate mitigation and adaptation strategies. Based on the interdisciplinary review of literature, we categorize the current discussion about urban climate mitigation and adaptation planning, policy and practices into four perspectives - sustainability science, global change science, multilevel governance, and structural engineering. While these four schools of thought have distinct perspectives rooted in different disciplinary lenses, our synthesis of the literature identifies several universal themes that are common to all of the perspectives in the context of combating threats posed by climate change. The Portland case study illustrates that a city can make changes to reduce greenhouse gas emissions and increase adaptive capacity to climate change impacts by implementing smart growth, devising local climate action plans that target emission reductions in various sectors, recognizing the interactions and influences of multiple scales of governance, and supporting the installation of various green infrastructures that contribute to green economy. Furthermore, a university can serve as a hub in this climate mitigation and adaptation arena by connecting various levels of community organizations in both public and private sectors, creating innovative research centers and spatially explicit green infrastructure, designing impact assessments and campus carbon inventories, and engaging students and the larger community through service learning.

Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD (효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석)

  • Lee, Min Choul;Kim, Jeongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.271-282
    • /
    • 2015
  • In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.

Study on the Hazardousness of a Rigidly Connected Circular Post and Crash Worthiness of a Circular Post with Release Mechanism for Head-on Impacts Using Impact Simulation (시뮬레이션을 통한 강결된 원형지주의 정면충돌에 대한 위험도 및 분리식 지주의 효과 분석)

  • Ko, Man-Gi;Kim, Kee-Dong;Kim, Kyoung-Ju;Sung, Jung-Gon;Yun, Duk-Geun
    • International Journal of Highway Engineering
    • /
    • v.12 no.4
    • /
    • pp.197-202
    • /
    • 2010
  • Post release mechanism is generally used to reduce the severity of the occupant of an errant vehicle impacting a roadside posts. The 820kg-50km/h head-on impact simulations were made using LS-DYNA program for the posts of 101.6mm Dia(t=4.0mm) with and without clip-type release mechanism. The simulation result was compared with impact test result to enhance the credibility of simulation model. The study shows that the high impact severity (THIV, PHD) and excessive deformation threatens the safety of the occupant when a car impacts a rigidly connected posts, while a post with clip-type slip base reduce the impact severity to a safe level.

Secure Distributed Cryptocurrency Transaction Model Through Personal Cold Wallet (개인용 보안장치를 통한 안전한 분산형 암호 화폐 거래 모델)

  • Lee, Chang Keun;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.187-194
    • /
    • 2019
  • Ever since the world's largest Bitcoin Echange, (Mt. Gox), was closed in March 2014 due to the series of hacking, still many other Exchages incl. recent Coinale in Korea have been attacked. Those hacking attempts never stopped and have caused significant threats to the overall industry of Crypto Currency and resulted in the loss of individual investors' asset. The DEX (Decentralized Exchange) has been proposed as a solution to fix the security problem at the Exchange, but still it is far away to resolve all issues. Therefore, this paper firstly analyzes security threats against existing Crypto Currency Exchanges and secondly derives security requirements for them. To do that it proposes a secure and distributed Crypto Currency Transaction Model through Personal Security devices as a solution. The paper also proves this new attempt by demonstrating its unique modelling; ultimately by adopting this modeling into Crypto Exchange is to avoid potential security threats.

Mobile Healthcare and Security (모바일 헬스케어와 정보보안)

  • Woo, SungHee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.755-758
    • /
    • 2016
  • The use of smart phones has had a great impact on the mobile internet business. It shows a lot of growth in the healthcare sector not only commerce, advertising, billing, games, video content, media, amd O2O business. The United States has eased the regulations for healthcare apps smart phone devices in 2015, and China has established a five-year road map to solve shortage of doctors and hospital beds by utilizing mobile devices such as wearable in the same year. The application of wearable devices in the medical field is gradually increasing in Korea too, but there is a security problem as leading challenge. Security incidents in non-ICT sectors such as financial, medical, etc. have increased by using ICT each year. Personal information leakage is also increasing in field likely occurring the potential secondary damages such as financial fraud, illegal promotions, insurance and pharmaceutical companies abuse. In this study, we analyze malwares as the mobile threats, the five risks of mobile smart phone, mobile use cases and the mobile threat countermeasures for healthcare.

  • PDF

AI Security Vulnerabilities in Fully Unmanned Stores: Adversarial Patch Attacks on Object Detection Model & Analysis of the Defense Effectiveness of Data Augmentation (완전 무인 매장의 AI 보안 취약점: 객체 검출 모델에 대한 Adversarial Patch 공격 및 Data Augmentation의 방어 효과성 분석)

  • Won-ho Lee;Hyun-sik Na;So-hee Park;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.245-261
    • /
    • 2024
  • The COVID-19 pandemic has led to the widespread adoption of contactless transactions, resulting in a noticeable increase in the trend towards fully unmanned stores. In such stores, all operational processes are automated, primarily using artificial intelligence (AI) technology. However, this AI technology has several security vulnerabilities, which can be critical in the environment of fully unmanned stores. This paper analyzes the security vulnerabilities that AI-based fully unmanned stores may face, focusing particularly on the object detection model YOLO, demonstrating that Hiding Attacks and Altering Attacks using adversarial patches are possible. It is confirmed that objects with adversarial patches attached may not be recognized by the detection model or may be incorrectly recognized as other objects. Furthermore, the paper analyzes how Data Augmentation techniques can mitigate security threats by providing a defensive effect against adversarial patch attacks. Based on these results, we emphasize the need for proactive research into defensive measures to address the inherent security threats in AI technology used in fully unmanned stores.