• Title/Summary/Keyword: 정보보안 3요소

Search Result 220, Processing Time 0.027 seconds

A study of the implementation of an OTA Provisioning System in WiBro (와이브로에서의 OTA Provisioning 시스템 구축 방안에 관한 연구)

  • Sohn, Young-Seol;Ok, Chang-Seok
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.355-359
    • /
    • 2008
  • 와이브로(WiBro), 3G 무선인터넷(HSDPA), 3G LTE 등과 같은 와이어리스 브로드밴드(Wireless Broand) 기술이 점차 성숙됨에 따라 이들 망을 활용한 다양한 무선인터넷 서비스를 제공하려는 사업자들이 증가하고 있다. 기존의 WLAN, 2G/3G 회선망에서의 제한된 이동성 및 네트워크 전송 속도를 개선한 와이어리스 브로드밴드 서비스 시장은 국내에서도 2006년부터 WiBro 및 HSDPA가 사용됨에 따라 사업자간의 경쟁도 본격화되고 있다. 이러한 환경 속에서 사업자들은 신속하고 편리한 서비스 개통과 스마트폰, USB모뎀, 노트북, UMPC, PMP등 다양한 단말들의 펌웨어 업그레이드, A/S 처리 방안에 대해 고심을 하고 있으며, 이들 문제점은 막대한 비용과 고객 민원을 야기시키는 요인이기도 하다. 따라서 경제적인 관리비용으로 동적인 서비스/펌웨어 업그레이드 및 A/S에 대한 고객 만족도를 높이기 위한 단말 원격 관리 필요성이 절실히 요구된다. WiBro 단말의 안전하고 효율적으로 관리하기 위해서는 단말과 기지국사이의 무선구간에 대한 보안(security)을 강화시켜 줄 수 있으면서 이동성(mobility)을 고려한 OMA DM프로토콜을 이용하는 것이 적합하다. 또한, WiBro에서 가입자 인증을 채택하고 있는 UICC의 관리를 위해서 3GPP에서 정의하는 SMS/MMS기반의 또는 BIP(Bear Independent Protocol)기반의 OTA기술을 병행하여 사용하여야 한다. 본 논문에서는 Wi-MAX단말 관리를 위한 OTA Provisioning 규격으로 OMA DM과 TR069이 WiMAX 단말을 위하여 어떻게 적용하도록 규정하고 있는지를 살펴본다. 특히, WiBro 가입자 인증뿐만 아니라 폰북, DRM, 금융서비스 등 다양한 부가 서비스를 위하여 사용되는 UICC의 원격관리를 위한 관리 요소들을 정의, 설계하고 이를 바탕으로 구현된 KTUICC OTA Provisioning시스템을 소개한다.

  • PDF

Analysis of K-Defense Cloud Computing Service Availability Considering of Cloud Computing Traffic Growth (클라우드 컴퓨팅 트래픽 증가를 고려한 국방 클라우드 컴퓨팅 서비스 가용성 분석)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.93-100
    • /
    • 2013
  • In 2012, According to 'Cisco Global Cloud Index 2011-2016', the Cisco company forecasted that global data center traffic will nearly quadruple and cloud traffic will nearly sextuple by 2016. Such a rapid growing of traffic is caused by traffic inside the data center and cloud computing workloads. In 2010, the Ministry of National Defense decided to build a Mega Center including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. One of the factors to consider is cloud computing traffic to build a Mega Center. Since the K-defense cloud computing system is built, K-defense cloud computing traffic will increase steadily. This paper, analyzed the availability of K-defense cloud computing service with the K-defense cloud computing traffic increasing using K-Defense cloud computing test system and CloudAnalyst simulation tool. Created 3 scenarios and Simulated with these scenarios, the results are derived that the availability of K-defense cloud computing test system is fulfilled, even cloud workloads are increased as muh as forecasted cloud traffic growth from now until 2016.

A Study on Establishing EMP Protection Performance Standards and Improving Laws and Regulations for Military Facilities and Equipment (군사시설, 장비의 EMP 방호성능 기준 정립 및 법·제도 개선 방안연구)

  • Sangjun Park;Kukjoo Kim;Hoedong Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.219-229
    • /
    • 2024
  • The application of 4th Industrial Revolution technologies in the defense sector is accelerating, leading to the rapid incorporation of information and communication technologies (ICT) into military systems. The biggest threat to these ICT-based military systems is an electromagnetic pulse (EMP) attack, which can result from nuclear explosions or EMP bombs. North Korea's ongoing nuclear advancements and EMP bomb capabilities pose a critical threat, necessitating South Korea's preparedness for such attacks to ensure the effective operation of its ICT-based military systems. Despite this urgency, the South Korean military currently lacks comprehensive standards for EMP protection, relying only on the design criteria for EMP protection facilities for buildings. This gap highlights the absence of sufficient legal and regulatory measures and the lack of focused research to develop EMP protection performance standards for safeguarding military systems. Therefore, this paper aims to analyze existing EMP protection performance standards and relevant laws and regulations. It proposes improvements and establishes necessary standards to enhance the EMP resilience of military facilities and equipment.

Texture Classification Using Rotation Invariant Local Directional Pattern (Rotation Invariant Local Directional Pattern을 이용한 텍스처 분류 방법)

  • Lee, Tae Hwan;Chae, Ok Sam
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.21-29
    • /
    • 2017
  • Accurate encoding of local patterns is a very important factor in texture classification. However, LBP based methods w idely studied have fundamental problems that are vulnerable to noise. Recently, LDP method using edge response and dire ction information was proposed in facial expression recognition. LDP is more robust to noise than LBP and can accommod ate more information in it's pattern code, but it has drawbacks that it is sensitive to rotation transforms that are critical to texture classification. In this paper, we propose a new local pattern coding method called Rotation Invariant Local Direc tional Pattern, which combines rotation-invariant transform to LDP. To prove the texture classification performance of the proposed method in this paper, texture classification was performed on the widely used UIUC and CUReT datasets. As a result, the proposed RILDP method showed better performance than the existing methods.

Research on BGP dataset analysis and CyCOP visualization methods (BGP 데이터셋 분석 및 CyCOP 가시화 방안 연구)

  • Jae-yeong Jeong;Kook-jin Kim;Han-sol Park;Ji-soo Jang;Dong-il Shin;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.177-188
    • /
    • 2024
  • As technology evolves, Internet usage continues to grow, resulting in a geometric increase in network traffic and communication volumes. The network path selection process, which is one of the core elements of the Internet, is becoming more complex and advanced as a result, and it is important to effectively manage and analyze it, and there is a need for a representation and visualization method that can be intuitively understood. To this end, this study designs a framework that analyzes network data using BGP, a network path selection method, and applies it to the cyber common operating picture for situational awareness. After that, we analyze the visualization elements required to visualize the information and conduct an experiment to implement a simple visualization. Based on the data collected and preprocessed in the experiment, the visualization screens implemented help commanders or security personnel to effectively understand the network situation and take command and control.

Personal Information Protection by Privacy Impact Assessment in Information System Audit (정보시스템 감리에서 개인정보 영향평가를 통한 개인정보 보호)

  • Kim, Hee-Wan;Ryu, Jae-Sung;Kim, Dong-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.3
    • /
    • pp.84-99
    • /
    • 2011
  • As the integrated and large-scale information is extended due to an advanced information system, a possibility of leaking out privacy increases as the time passes by. As a result, the necessity of using a privacy impact assessment (PIA) is emphasized because it can analyze and minimize the element of invasion of privacy. However, an essential audit for personal information protection is not fulfilled because most of the information system audit supervises over physical, managerial, and technical security items of system architecture area so that general items are the only things being checked. Consequently, this paper proposes that in order to minimize the invasion of personal information, the privacy impact assessment should be done. It also presents a procedure and method of personal information protection audit according to the result of the assessment. After applying the suggested method to two projects, it was confirmed that the improvements for protecting personal information were drawn from this paper.

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

A Study on the Understanding and Solving Tasks of AI Convergence Education (AI 융합교육의 이해와 해결 과제에 대한 고찰)

  • Sook-Young Choi
    • Journal of Industrial Convergence
    • /
    • v.21 no.1
    • /
    • pp.147-157
    • /
    • 2023
  • In this study, we approached from the perspective of AI convergence education in elementary, middle and high schools to understand AI convergence education. We examined what capabilities AI convergence education ultimately seeks to pursue, and analyzed various examples of AI convergence education in three dimensions: core curriculum, convergence model, AI learning elements and learning activities. In addition, factors to be considered in order for AI convergence education to be actively carried out include the cultivation of AI convergence education capabilities of teachers, the development and dissemination of AI teaching and learning methods and teaching and learning models, and evaluation methods for AI convergence education.

A Study on Protection Technology Criteria for Preventing Contents Abuse on On-line (온라인상의 콘텐츠 오남용 방지를 위한 보호기술 기준에 대한 연구)

  • Hong, Sung-Hyuk;Yoon, Eun-Jun;Han, Jae-Hong;Park, Jong-Hyuk
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.432-437
    • /
    • 2009
  • Due to fast development of communications, knowledge and information have been become digitalized and distributed actively. However, the misuse and abuse of digital properties and security problems frequently take place. In this paper, we analyze the cases of the misuse and abuse of contents and the contents protection technology. We propose important items for protection technology to prevent contents from misuse and abuse based on results of the analyses. These important items are expected to be used as important factors for establishing protection technology standards.

  • PDF

Design and Implementation of Migration from IPv4 Network to Enterprise IPv6 Network (IP4 Network에서 Enterprise IPv6 Network로의 Migration 설계 및 구현)

  • 이진영;윤일;장경진;오선진
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11b
    • /
    • pp.687-690
    • /
    • 2003
  • 오늘날 인터넷을 통한 모든 통신망이 끊임없이 발전하고 있는 가운데 IPv4가 가지는 문제점들이 치명적인 위협으로 대두되고 있다. 따라서, 폭발적인 인터넷 사용자 증가로 인한 IP address의 고갈과 느려져만 가는 인터넷 속도에 대해 대안이 필요하다. IPv4는 32bit 체계로 약 40억 개의 IP 주소를 가지고 있으나, 인터넷 초기의 무분별한 클래스를 사용하여 40억 개보다 적은 양의 주소를 사용 할 수 있게 되었다. IPv6는 128bit의 주소 체계를 가지고 있으며, 3.4 $10^{38}$개의, 천문학적인 주소를 할당 할 수 있으며, 보안성과 서비스 품질보장(QoS), 이동성 기존의 인터넷 속도의 가속 기능 등 다양한 장정들을 가지고 있다. 본 논문에서는 IPv4에서 IPv6로 진화해 가야 하는 시기적인 요소보다는 IPv6로의 공존해 나아가야 하는 기술적인 문제를 극복하기 위해 기존 IPv4망에서 IPv6 주소체계를 지원할 수 있도록 설계하고 Backbone network 구성에 일반적인 구현을 통하여 IGP와 EGP 구간의 라우팅 정보공유에 대하여 논의한다.

  • PDF