• Title/Summary/Keyword: 정보보호 안전진단

Search Result 36, Processing Time 0.032 seconds

Data Storage and Security Model for Mobile Healthcare Service based on IoT (IoT 기반의 모바일 헬스케어 서비스를 위한 데이터 저장 및 보호 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.187-193
    • /
    • 2017
  • Objects Internet-based healthcare services provide healthcare and healthcare services, including measurement of user's vital signs, diagnosis and prevention of diseases, through a variety of object internet devices. However, there is a problem that new security vulnerability can occur when inter-working with the security weakness of each element technology because the internet service based on the object Internet provides a service by integrating various element technologies. In this paper, we propose a user privacy protection model that can securely process user's healthcare information from a third party when delivering healthcare information of users using wearable equipment based on IoT in a mobile environment to a server. The proposed model provides attribute values for each healthcare sensor information so that the user can safely handle, store, and store the healthcare information, thereby managing the privacy of the user in a hierarchical manner. As a result of the performance evaluation, the throughput of IoT device is improved by 10.5% on average and the server overhead is 9.9% lower than that of the existing model.

Application of Machine Learning Techniques for the Classification of Source Code Vulnerability (소스코드 취약성 분류를 위한 기계학습 기법의 적용)

  • Lee, Won-Kyung;Lee, Min-Ju;Seo, DongSu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.735-743
    • /
    • 2020
  • Secure coding is a technique that detects malicious attack or unexpected errors to make software systems resilient against such circumstances. In many cases secure coding relies on static analysis tools to find vulnerable patterns and contaminated data in advance. However, secure coding has the disadvantage of being dependent on rule-sets, and accurate diagnosis is difficult as the complexity of static analysis tools increases. In order to support secure coding, we apply machine learning techniques, such as DNN, CNN and RNN to investigate into finding major weakness patterns shown in secure development coding guides and present machine learning models and experimental results. We believe that machine learning techniques can support detecting security weakness along with static analysis techniques.

A Proposal of Risk Management Framework for Design as a Secure Power Control System (안전한 전력 제어시스템 설계를 위한 위험관리 프레임워크 제안)

  • Park, Jun Yong;Shin, Sumin;Song, Kyoung-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.425-433
    • /
    • 2016
  • In smart grid, enhancement of efficiency and interoperability of electric power system is achieved through the connection with outer network, and this induces that power grid system is threatened increasingly, becomes the main target of cyber terrorism, and is sincerely required to design the secure power system. Although SSDLC(Secure System Development Life Cycle) is used for risk management from the design phase, traditional development life cycle is somewhat limited for satisfaction of information security indicator of power control system. Despite that power control system should reflect control entities of information security considering its own characteristics, validation elements are insufficient to apply into real tasks based on existing compliance. To make design of diagnostic model and assessment process for power control system possible and to give a direction for information security and present related indicator, we propose the new risk management framework of power control system which is applied operational security controls and standard architecture presented by IEC 62351 TC 57 with enterprise risk management framework.

An Improvement of the Guideline of Secure Software Development for Korea E-Government (대한민국 전자정부 소프트웨어 개발보안 가이드 개선 방안 연구)

  • Han, Kyung Sook;Kim, Taehwan;Han, Ki Young;Lim, Jae Myung;Pyo, Changwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1179-1189
    • /
    • 2012
  • We propose an improvement on the Guideline of Secure Software Development for Korea e-Government that is under revision by the Ministry of Public Administration and Security in 2012. We adopted a rule-oriented organization instead shifting from the current weakness-oriented one. The correspondence between the weakness and coding rules is identified. Also, added is the coverage of diagnostic tools over the rules to facilitate the usage by programmers during coding period When the proposed guideline is applied to secure software development, the weakness would be controlled indirectly by enforcing coding rules. Programmers responsibility would be limited to the compliance of the rules, while the current version implies that it is programmers responsibility to guarantee being free from the weakness, which is hard to achieve at reasonable cost.

Evaluation Model of the Contracting Company's Security Management Using the DEA Model (DEA 모형을 이용한 도급회사 보안관리 평가모델)

  • Kim, In-hwan;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.687-704
    • /
    • 2017
  • As Korea's industrial competitiveness and technological prowess increase, collaboration and technical exchanges with contracting companies are increasing. In an environment where cooperation with the contracting company is unavoidable ordering companies are also striving to prevent leakage of technologies through various security systems, policy-making and security checks. However, although the contracting companies were assessed to have a high level of security management the leakage of technical datas are steadily increasing. Issues are being raised about the effectiveness of the security management assessment and the actual security management levels. Therefore, this study suggested a security management system model to improve security management efficiency in the general contract structure. To prove this, analyze the efficiency of 36 contractor companies for the technical datas security management system using the DEA model. The results of the analysis are reflected in the assessment results. Lastly, suggestions for improving the effectiveness of the technical datas security system are proposed.

Improvement Way for Mobile X-ray Examinations by Rule Revision about Safety Management of Diagnosis Radiation Occurrence System (진단용방사선발생장치의 안전관리에 관한 규칙 개정에 따른 이동형 방사선검사의 개선방안)

  • Choi, Jun-Gu;Kim, Gyeong-Su;Kim, Byeong-Gi;Ahn, Nam-Jun;Kim, Hyeong-Sun;Kim, Sang-Geon;Lim, Si-Eun
    • Journal of radiological science and technology
    • /
    • v.30 no.1
    • /
    • pp.53-59
    • /
    • 2007
  • A safety management rule of the diagnosis radiation system which opened a court 2006 February 10th was promulgated for safety of the radiation worker, patients and patients' family members. The purpose of this study is to minimize injury by radiation that can happen to patients and people around a sick ward when managing mobile X-ray system. This study analyzed sickroom environment of mobile X-ray examination and the statistical data of the Konkuk medical Information System(KIS) and the Picture Archiving Communication System(PACS). This study also investigated patient conditions, infection, relation information and related data, when the sickroom mobile X-ray examination is used. Through data analysis, many problems were expected such as restriction of space side, manpower and expense of business side, satisfaction degree decline of patient and protector of operation side. Therefore, we tried to restrict examination of multi bed sickroom, and to use treatment room in each ward to solve problem mentioned. As a result, the whole sickroom mobile X-ray examination rate decreased to near 50%, and mobile X-ray examination rate for inpatients decreased to more than 85%. This study shows that several attempts we did should be helpful for manpower, patients satisfaction and expenses. Also, they should protect patients in sickroom from unnecessary radiation exposure and could minimize inconvenience of patients and their family members from x-ray examination.

  • PDF

Clinical Microscopy: Performance, Maintenance and Laser Safety (임상에서의 현미경: 작동, 유지보수 및 레이저 안전)

  • Lee, Tae Bok
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.51 no.2
    • /
    • pp.125-133
    • /
    • 2019
  • A microscope is the fundamental research and diagnostic apparatus for clinical investigation of signaling transduction, morphological changes and physiological tracking of cells and intact tissues from patients in the biomedical laboratory science. Proper use, care and maintenance of microscope with comprehensive understanding in mechanism are fully requested for reliable image data and accurate interpretation for diagnosis in the clinical laboratory. The standard operating procedure (SOP) for light microscopes includes performance procedure, brief information of all mechanical parts of microscopes with systematic troubleshooting mechanism depending on the laboratory capacity. Maintenance program encompasses cleaning objective, ocular lenses and inner optics; replacement and calibration of light source; XY sample stage management; point spread function (PSF) measurement for confocal laser scanning microscope (CLSM); quality control (QC) program in fluorescent microscopy; and systematic troubleshooting. Laser safety is one of the concern for medical technologists engaged in CLSM laboratory. Laser safety guideline based on the laser classification and risk level, and advisory lab wear for CLSM users are also expatiated in this overview. Since acquired image data presents a wide range of information at the moment of acquisition, well-maintained microscopes with proper microscopic maintenance program are impulsive for its interpretation and diagnosis in the clinical laboratory.

Preliminary Diagnosis of Fishing Ground Environment for Establishing the Management System in Fisheries Resources Protection Area (수산자원보호구역 관리체제 구축을 위한 어장환경 예비진단)

  • Lee, Dae-In;Park, Dal-Soo;Jeon, Kyeong-Am;Eom, Ki-Hyuk;Park, Jong-Soo;Kim, Gui-Young
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.15 no.2
    • /
    • pp.79-89
    • /
    • 2009
  • For preliminary diagnosis on current fishing ground environment and basic information for establishment of effective and rational management policy in fisheries resources protection area, water and sediment quality and changes of total area in the 10 marine protection areas designated for fisheries resources management in Korea were assessed. Results showed that environmental quality in these areas has been degraded by pollution sources, coastal utilization and development stress, etc. The pattern and degree of contamination differed by protection areas, suggesting that it is necessary for optimum environmental management plan considering the regional characteristics. The total designated area of protection areas in 2003 changed by $-22.9{\sim}2.4%$, on average -6.4%, compared with the first year of designation; Wando-Doam Bay showd the highest increase rate (2.4%), and Hansan Bay has the highest decrease rate (-22.9%) Decrease rate of land and sea in total area showd 6.1% and 6.6%. An integrated management of environmental data in protection areas is required for systematic assessment. Therefore, the suitable environmental and information management is needed specifically considering the environment characteristics such as development and utilization conditions of land and sea area Furthermore, bemuse urbanization and industrialization threats the junctions of the protection areas, authorized ministry (MIFAFF) should develope and establish monitoring and management procedures based on the related laws.

  • PDF

A Study on the Application and Analysis of FPV Drones Using Virtual Reality (가상현실을 활용한 FPV드론에 대한 분석 및 활용분야에 대한 연구)

  • Kang, Sung-Jun;Song, Eun-jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.312-314
    • /
    • 2021
  • The government sees drones as a key future growth engine, prepares plans to foster the nation-led drone industry, conducts pilot projects in various fields, such as transporting goods, forest protection, monitoring, facility safety diagnosis, and is actively in the use of drones. In particular, the police are attempting to use drones to search for missing people. However, existing drones have a short operating time due to the limitation of battery time. The effectiveness of the existing drones is insufficient because it has no choice but to search by aerial photography on the mountain tops in hillside or dense forest. In this study, we propose an FPV drone that utilizes virtual reality as a drone that can overcome the limitations of searching for missing people.

  • PDF

Wearable oxygen saturation measurement platform for worker safety management (작업자의 안전관리를 위한 웨어러블 산소포화도 측정 플랫폼)

  • Lee, Yun Ju;Song, Chai Jong;Yoo, Sun Kook
    • Smart Media Journal
    • /
    • v.11 no.9
    • /
    • pp.30-38
    • /
    • 2022
  • It is important to grasp biometric data in real time for prompt action in the event of a safety accident at a work site where the risk of safety accidents exists. Among them, blood oxygen saturation is the most important factor in maintaining human life, so real-time oxygen saturation measurement and monitoring is necessary according to the situation as a preemptive response for worker safety management. By receiving real-time bio-signals from workers wearing health and life-risk protective clothing, and sharing and analyzing the worker's risk status in an external system, it is possible to diagnose the worker's current condition and efficiently respond to emergencies that may occur to the worker. In this paper, we propose a wearable oxygen saturation measurement platform technology that can monitor the risk of harmful gases and oxygen saturation of the wearer in real time and ensure the wearer's activity and safety in order to cope with emergency situations at the scene of an accident. If we overcome the limitations identified through the results of the proposed system later and apply improved biodata such as motion correction to the platform, we expect that it will be usable not only in hazardous gas environments, but also in hospitals and homes for emergency patients.