• Title/Summary/Keyword: 인증 프로그램

Search Result 496, Processing Time 0.027 seconds

Countermeasure of an Application Attack Scenario Using Spring Server Remote Code Execution Vulnerability (CVE-2018-1270) (스프링 서버 원격코드 실행 취약점(CVE-2018-1270)을 이용한 응용 공격 시나리오의 대응 방안)

  • Jung, Byeong-Mun;Jang, Jae-Youl;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.303-308
    • /
    • 2019
  • Spring framework is widely used as a base technology for e-government frameworks and to the extent it is a standard for web service development tools of Korean public institutions. However, recently, a remote code execution vulnerability(CVE-2018-1270) was found in an application using a spring framework. This paper proposes a method of analyzing the vulnerability experiment using a hacking scenario, Proof Of Concept(POC), in which the spring framework is a hazard to the server. We propose the patch to version 4.3.16 and version 5.0.5 or later as an ultimate response. It is also expected that the proposed experiment analysis on vulnerability of hacking scenario will be used as a data for improving performance of security programs and establishing a new authentication system.

EA Study on Practical Engineering Education through the Design and Configure of Safe Running Type Drones (안전 주행형 무인기의 설계 및 제작을 통한 실천 공학 교육에 관한 연구)

  • Jo, Yeong-Myeong;Lee, Sang-Gwon;Chang, Eun-Young
    • Journal of Practical Engineering Education
    • /
    • v.9 no.1
    • /
    • pp.7-13
    • /
    • 2017
  • This study will provide a practical plan of engineering education through the study of major activities connected with the production of works to accomplish the graduation conditions by completing the comprehensive design subject and the result of the performance. The designed subject is to measure the minimum safety distance during driving using the obstacle detection function of the ultrasonic sensor and to perform the avoidance algorithm based on the measurement value of the acceleration gyro sensor. It is proposed an access surveillance system that minimizes the damage of drones, surrounding objects, and people, and improves air mobility. Experimental results show that the obstacles around the drone are detected by five ultrasonic sensors and the difference of output value is applied to each motor of the drone and obstacle avoidance is confirmed. In addition, the content and level of the data for measuring the achievement of learning achievement in the engineering education certification program were used and the results were confirmed to be consistent with the description of the engineering problem level required for the graduates of 4-year engineering college.

A Secure Active Packet Transfer using Cryptographic Techniques (암호 기술을 이용한 안전한 능동 패킷 전송)

  • 김영수;나중찬;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.135-145
    • /
    • 2002
  • Active networks represent a new approach to network architecture. Nodes(routers, switches, etc.) can perform computations on user data, while packets can carry programs to be executed on nodes and potentially change the state of them. While active networks provide a flexible network iufrastructure, they are more complex than traditional networks and raise considerable security problems. Nodes are Public resources and are essential to the proper and contract running of many important systems. Therefore, security requirements placed upon the computational environment where the code of packets will be executed must be very strict. Trends of research for active network security are divided into two categories: securing active nodes and securing active packets. For example, packet authentication or monitoring/control methods are for securing active node, but some cryptographic techniques are for the latter. This paper is for transferring active packets securely between active nodes. We propose a new method that can transfer active packets to neighboring active nodes securely, and execute executable code included in those packets in each active node. We use both public key cryptosystem and symmetric key cryptosystem in our scheme

A Comparative Study on the Curriculum of Graduate Schools of Archival Sciences in Korea and the Foreign Countries (국내외 기록관리학 대학원 교육과정에 관한 비교 연구)

  • Lee, Yun-Jung;Chung, Yeon-Kyoung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.567-591
    • /
    • 2021
  • This study examined the curriculum of 23 graduate schools of archival sciences in the United States, Canada, the United Kingdom, and Australia and 25 graduate schools of archival sciences in Korea, and compared core knowledge categories. The average number of courses in Korea and other countries was similar, but each university in other countries set required courses, and few in Korea. As a result of comparison by knowledge category, all knowledge categories in North America were opened as individual courses, while the UK and Australia did not open knowledge categories of outreach, instruction, advocacy, and knowledge categories of professionalism separately. In Korea, the category of outreach, instruction, advocacy, the knowledge category of professionalism, and the knowledge category of information technology have not been established separately, while courses related to history and administration are subdivided. In order to reform the archival science education in Korea, the knowledge categories for archival professionals should be prepared and the guidelines and certification standards for the education should be established.

A Study on the Criminal Justice Rehabilitation System of Sweden (스웨덴 법무보호복지제도 연구)

  • Kwon, Joon-Sung;Gong, Jung-Sik;Hyun, Mun-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.506-514
    • /
    • 2022
  • The method of suppressing recidivism through punishment centered on punishment is showing limitations through criminal policy research in many countries. As an alternative to this, a restorative judicial law aimed at returning criminals to members of society through reconciliation and coordination of community members, victims, and perpetrators is emerging as a paradigm for crime prevention and recidivism. Sweden is a representative welfare state and is confirming positive effects through correction of criminals based on restorative justice. In addition, it has a stable system related to the legal protection welfare system, and maintains a low recidivism rate and social security through scientific and reasonable operation using evidence-based principles in the evaluation and certification process of operating programs. However, research on the legal protection system implemented in advanced welfare and correctional countries, including Sweden, is still insufficient in Korea. Therefore, this study aims to explore the direction of the domestic legal protection system through a review of Swedish criminal policy and legal protection system, and to identify insufficient areas and complementary points of the domestic system to lay the foundation for improving the domestic legal protection welfare system and expanding business.

A Study on Blockchain-Based Mass NFT Content Minting

  • Byong-Kwon Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.49-56
    • /
    • 2023
  • Currently, e-commerce is changing from a digital twin to a metaverse world. The metaverse world is an intermediate form between virtual and real worlds and is operated as a coin-based meta-commerce. In this meta-commerce world, blockchain-based NFT coins are used when trading items (contents). In this study, we studied how to issue a large number of NFT coins (certification) rather than issuing a single type of NFT. The research method was designed to produce content layer-based and automatically create the desired quantity using a mass NFT index and automatic generation method. In this study, a layer overlap method (background, body, etc.) was used with a Phyton-based program for mass minting. As a result, it can be used as a blockchain-based certificate that can prove a group of many people. In addition, the content created with the NFT index was registered on the NFT sales site to confirm its utilization and value.

A Comparative Study on the Compliance Program of Strategic Trade and Similar Systems in Korea (한국의 전략물자 자율준수체제와 유사제도에 관한 비교연구)

  • Kim, Hyun-Jee;Shin, Ah-Reum;Chae, Soo-hong
    • Korea Trade Review
    • /
    • v.41 no.4
    • /
    • pp.269-291
    • /
    • 2016
  • This study suggests an improvement for stable and effective management of the Compliance Program of strategic trade(CP) by comparing and analyzing the program and other similar systems in Korea, the authorized economic operator(AEO) system and the Fair Trade Compliance Program. To improve the CP, training requirements should be materialized, evaluation of companies' ability to judge strategic materials should be intensified, and incentives should be offered to the companies that actively adopt the program. Moreover, the current designation system should be changed to the designation-after-registration system to strengthen and spread out the CP, and the follow-up management should be reinforced for successful management of the program.

  • PDF

A Study on the Instructional Contents and Strategies for School Library Media Specialist Education (사서교사 양성을 위한 문헌정보학 교과목의 내용과 교육의 전략적 강조점에 관한 연구)

  • Kim, Jong-Sung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.17 no.1
    • /
    • pp.135-159
    • /
    • 2006
  • The purpose of this paper is to study the instructional contents and strategies for school library media specialist education in Korean Library and Information Science. The writer insist several aspects of instructional contents should be emphasized for relevant school library media specialist education. Instructional contents for philosophical and conceptual aspect of school library and media specialist, knowledge and experience for literature for children and young adult, and knowledge and technique for teaching and instruction at field are those. And the writer suggests LIS education for media specialist should be able to let the students stand on the strong professional sprit, help adapt themselves to school practice, and make them a professor of literature.

Python Package Production for Agricultural Researcher to Use Meteorological Data (농업연구자의 기상자료 활용을 위한 파이썬 패키지 제작)

  • Hyeon Ji Yang;Joo Hyun Park;Mun-Il Ahn;Min Gu Kang;Yong Kyu Han;Eun Woo Park
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.25 no.2
    • /
    • pp.99-107
    • /
    • 2023
  • Recently, the abnormal weather events and crop damages occurred frequently likely due to climate change. The importance of meteorological data in agricultural research is increasing. Researchers can download weather observation data by accessing the websites provided by the KMA (Korea Meteorological Administration) and the RDA (Rural Development Administration). However, there is a disadvantage that multiple inquiry work is required when a large amount of meteorological data needs to be received. It is inefficient for each researcher to store and manage the data needed for research on an independent local computer in order to avoid this work. In addition, even if all the data were downloaded, additional work is required to find and open several files for research. In this study, data collected by the KMA and RDA were uploaded to GitHub, a remote storage service, and a package was created that allows easy access to weather data using Python. Through this, we propose a method to increase the accessibility and usability of meteorological data for agricultural personnel by adopting a method that allows anyone to take data without an additional authentication process.

The Education System for Cytotechnologists and Efforts to Improve Professionalism in the United States of America (미국 세포병리사 양성 교육제도와 전문성 향상을 위한 노력)

  • Eun-Suk PARK
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.55 no.3
    • /
    • pp.227-233
    • /
    • 2023
  • The path to becoming a cytotechnologist (also known as a cytologist) in the United States of America (USA) requires a minimum of a bachelor's degree and the completion of a training program certified by the Commission on Accreditation of Allied Health Education Programs. Aspirants are recognized as cytologists after passing a test administered by the American Society for Clinical Pathology Board of Certification on completion of a recognized cytotechnology training program. Cytotechnology training programs are currently provided by 18 universities and hospitals. Six of them provide master's level education, unifying existing programs to the master's level, which is necessitated due to a shortage of pathologists and the rapid development of the health care system. The improvement and unification of the curriculum, qualification renewal system, and the effort to change the title of qualified personnel from cytotechnologist to cytologist are seen as measures that would strengthen the capabilities of cytotechnologists as well as assist in keeping pace with the rapidly changing medical system. Knowledge about the educational courses available for cytotechnologists and the efforts to strengthen their expertise in the USA would be helpful to professors who guide students preparing for overseas employment and seeking professional improvement in Korea.