• Title/Summary/Keyword: 정보취약

Search Result 4,367, Processing Time 0.028 seconds

Study on security requirements for the web based operation system of a shipping company (웹 기반 해운 선사 운영시스템 보안 요구사항 연구)

  • Chung, Up;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.49-68
    • /
    • 2022
  • The operation system of a shipping company is still maintaining the mainframe based terminal access environment or the client/server based environment. Nowadays shipping companies that try to migrate it into a web-based environment are increasing. However, in the transition, if the design is processed by the old configuration and knowledge without considering the characteristics of the web-based environment and shipping business, various security vulnerabilities will be revealed at the actual system operation stage, and system maintenance costs to fix them will increase significantly. Therefore, in the transition to a web-based environment, a security design must be carried out from the design stage to ensure system safety and to reduce security-related maintenance costs in the future. This paper examines the characteristics of various threat modeling techniques, selects suitable modeling technique for the operation system of a shipping company, applies data flow diagram and STRIDE threat modeling technique to shipping business, derives possible security threats from each component of the data flow diagram in the attacker's point of view, validates the derived threats by mapping them with attack library items, represents the attack tree having various attack scenarios that attackers can attempt to achieve their final goals, organizes into the checklist that has security check items, associated threats and security requirements, and finally presents 23 security requirements that can respond to threats. Unlike the existing general security requirements, the security requirements presented in this paper reflect the characteristics of shipping business because they are derived by analyzing the actual business of a shipping company and applying threat modeling technique. Therefore, I think that the presented security requirements will be of great help in the security design of shipping companies that are trying to proceed with the transition to a web-based environment in the future.

A Study on Reinforcement of Fire Safety in Residential Spaces of Low-Income Classes (저소득계층 주거 공간 화재안전성 강화를 위한 연구)

  • Park, Nam-Kwon
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.882-889
    • /
    • 2021
  • Purpose: The purpose of this study was to improve fire safety in Gosiwon, a residential space for the low-income class. Method: Problems appearing in the process of fire occurrence and damage were verified once again. In addition, we would like to suggest improvement measures through systematic discussions on blind spots. Results: As a result of examining the risk of cool fire, the causes of fire occurred in various ways. In addition, the possibility of radiant heat due to heat accumulation due to narrow rooms inside the Gosiwon was high. Also, it was found that the possibility of fire spread was high due to clothing and household goods. It was reconfirmed that the poor internal structure of a narrow indoor space had a significant effect on the spread of fire and the scale of damage as it tried to accommodate as many people as possible inside. Conclusion: It is necessary to complete the installation as soon as possible for Gosiwon where the simple sprinkler is not installed. For this, a stronger driving force from the government and local governments is needed. In addition, it will be necessary to discuss how to improve the spatial and structural fire vulnerabilities that appear due to the structural characteristics of the Gosiwon.

A Study on Fire and Evacuation simulation analysis for use of Disaster Vulnerable Personal Evacuation Device (재난약자 대피 도움장치 활용을 위한 화재 피난 시뮬레이션 분석 연구)

  • Choi, Doo Chan;Hwang, Hyun Soo;Ko, Min Hyeok;Lee, Si Yu
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.4
    • /
    • pp.824-831
    • /
    • 2020
  • Purpose: In fire case, nursing hospitals are subject to considerable restrictions on evacuation due to the characteristics of occupants and vulnerable elements of buildings, it is important to make evacuation device for vulunerabale person, and need how to intend to increase the efficiency of evacuation by fire and evacuation simulation with helper Method: The smoke characteristics were analyzed by time through fire simulation, finally, the number of helpers according to the day and night was entered, and the evacuation completion time was compared and analyzed using the evacuation simulation. Result: It was found that the evacuation time was shortened by more than 20% when the evacuation assistance device was used for the vulnerable, and the evacuation time was delayed by almost 70% in case of a fire at night compared to the daytime. Conclusion: If the horizontal and vertical evacuation device are effectively utilized in actual fire situations, a strategy appropriate to the situation is deemed necessary. It is expected that evacuation efficiency will increase based on the use of horizontal evacuation evacuation device and vertical evacuation device by developing evacuation manuals

An Adversarial Attack Type Classification Method Using Linear Discriminant Analysis and k-means Algorithm (선형 판별 분석 및 k-means 알고리즘을 이용한 적대적 공격 유형 분류 방안)

  • Choi, Seok-Hwan;Kim, Hyeong-Geon;Choi, Yoon-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1215-1225
    • /
    • 2021
  • Although Artificial Intelligence (AI) techniques have shown impressive performance in various fields, they are vulnerable to adversarial examples which induce misclassification by adding human-imperceptible perturbations to the input. Previous studies to defend the adversarial examples can be classified into three categories: (1) model retraining methods; (2) input transformation methods; and (3) adversarial examples detection methods. However, even though the defense methods against adversarial examples have constantly been proposed, there is no research to classify the type of adversarial attack. In this paper, we proposed an adversarial attack family classification method based on dimensionality reduction and clustering. Specifically, after extracting adversarial perturbation from adversarial example, we performed Linear Discriminant Analysis (LDA) to reduce the dimensionality of adversarial perturbation and performed K-means algorithm to classify the type of adversarial attack family. From the experimental results using MNIST dataset and CIFAR-10 dataset, we show that the proposed method can efficiently classify five tyeps of adversarial attack(FGSM, BIM, PGD, DeepFool, C&W). We also show that the proposed method provides good classification performance even in a situation where the legitimate input to the adversarial example is unknown.

Static Identification of Firmware Linux Kernel Version by using Symbol Table (심볼 테이블을 이용한 펌웨어 리눅스 커널 버전 정적 식별 기법)

  • Kim, Kwang-jun;Cho, Yeo-jeong;Kim, Yun-jeong;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.67-75
    • /
    • 2022
  • When acquiring a product having an OS, it is very important to identify the exact kernel version of the OS. This is because the product's administrator needs to keep checking whether a new vulnerability is found in the kernel version. Also, if there is an acquisition requirement for exclusion or inclusion of a specific kernel version, the kernel identification becomes critical to the acquisition decision. In the case of the Linux kernel used in various equipment, sometimes it becomes difficult to pinpoint the device's exact version. The reason is that many manufacturers often modify the kernel to produce their own firmware optimized for their device. Furthermore, if a kernel patch is applied to the modified kernel, it will be very different from its base kernel. Therefore, it is hard to identify the Linux kernel accurately by simple methods such as a specific file existence test. In this paper, we propose a static method to classify a specific kernel version by analyzing function names stored in the symbol table. In an experiment with 100 Linux devices, we correctly identified the Linux kernel version with 99% accuracy.

A Study on Digital Documentation of Precise Monitoring for Microscale Displacements within the Tomb of King Muryeong and the Royal Tombs in Gongju, Korea (공주 무령왕릉과 왕릉원 내부 미세변위 정밀모니터링을 위한 디지털 기록화 연구)

  • Choi, Il Kyu;Yang, Hye Ri;Lee, Chan Hee
    • Journal of Conservation Science
    • /
    • v.37 no.6
    • /
    • pp.626-637
    • /
    • 2021
  • The tomb complex of the royal family from the period of the Ungjin Baekje Kingdom (475 to 538 AD) in Gongju, Korea, contains the tomb of King Muryeong and other royal tombs. After the excavation of the tomb of King Muryeong in 1971, these tombs were opened up to the public, without the establishment of systems for their safety, conservation and management. The tombs have consequently experienced rapid environmental changes and suffered various damages. In this study, specific vulnerable parts inside the tombs were selected for deviation analysis using 3D scanning, and 3D image models were constructed on this basis. Progressive displacement was identified in tomb No. 5, and basic data for future investigations was acquired from tomb No. 6 and the tomb of King Muryeong. In the deviation analysis for the southern plastered wall of tomb No. 5, the damage was not found to exceed the ranges of ±18 mm and ±2 mm. However, the lintel stone was found to be sagging by 0.32 mm on average, and the distance between the walls to have increased by 0.36 mm on average. Direct water seepage occurring in tomb No. 5 is considered to be increasing the damage within the tomb, such as the dropping and sagging of the lintel. The 3D image models constructed in this study will play an important role as baseline data for future research, and can be used to discuss a secure conservation scheme for the tombs through cross-validation with precise measurement monitoring.

A Method of Developing a Ground Layer with Risk of Ground Subsidence based on the 3D Ground Modeling (3차원 지반모델링 기반의 지반함몰 위험 지반 레이어 개발 방법)

  • Kang, Junggoo;Kang, Jaemo;Parh, Junhwan;Mun, Duhwan
    • Journal of the Korean GEO-environmental Society
    • /
    • v.22 no.12
    • /
    • pp.33-40
    • /
    • 2021
  • The deterioration of underground facilities, disturbance of the ground due to underground development activities, and changes in ground water can cause ground subsidence accidents in the urban areas. The investigation on the geotechnical and hydraulic factors affecting the ground subsidence accident is very significant to predict the ground subsidence risk in advance. In this study, an analysis DB was constructed through 3D ground modeling to utilize the currently operating geotechnical survey information DB and ground water behavior information for risk prediction. Additionally, using these results, the relationship between the actual ground subsidence occurrence history and ground conditions and ground water level changes was confirmed. Furthermore, the methodology used to visualize the risk of ground subsidence was presented by reconstructing the engineering characteristics of the soil presented according to the Unified Soil Classification System (USCS) in the existing geotechnical survey information into the internal erosion sensitivity of the soil, Based on the result, it was confirmed that the ground in the area where the ground subsidence occurred consists of more than 40% of sand (SM, SC, SP, SW) vulnerable to internal erosion. In addition, the effect of the occurrence frequency of ground subsidence due to the change in ground water level is also confirmed.

A Study on the Effect of Fire Heat on the Durability of Concrete Structures Repaired and Reinforced with Epoxy Resin (화열(火熱)이 에폭시수지로 보수·보강된 콘크리트 구조체의 내구성에 미치는 영향에 관한 연구)

  • Tai Kwan Cho
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.1
    • /
    • pp.138-145
    • /
    • 2023
  • Purpose: In accordance with the increase in the number of buildings repaired and reinforced following deterioration from when a fire occurs in a previously reinforced building, the impact on the structure after the fire is analyzed to establish standards for repair and reinforcement measures. Method: After curing for 28 days, the process was to measure the compressive strength and induce destruction through a compressor, repair and reinforce it with epoxy, and conduct a re-compressive strength test on some specimens after curing for 3 days to understand the degree of strength restoration. The rest of the repaired and reinforced specimens as well as the unrepaired and unreinforced specimens were then put into an oven and heated according to the temporal and temperate conditions listed below, and then the compressive strength was tested to estimate the impact of fire. Result: After reinforcing the yielded specimen with epoxy, the process was to then put it in an oven and heat it at different temperatures over time. It was found that there was a decrease in the strength of the reinforcement more than that of the actual specimen. Conclusion: Based on this, it was found that a building repaired and reinforced with epoxy resin is actually more dangerous than a general unrepaired building when it is damaged by fire, and thus, that it must be prepared for fire vulnerabilities.

Inclusive educational effectiveness through Metaverse for the disabled students and policy suggestions (장애학생 메타버스 교육의 포용적 공공소통적 효과성과 정책적 제언)

  • Jinsoon Song
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.175-201
    • /
    • 2023
  • In the midst of going through a non-face-to-face society, most of human activities narrowed down to the platform, restrictions on external activities are bringing the internal scalability of digital technology. Metaverse is virtually shifting reality and increasing the possibility of utilization in various areas. However, researches linked to the educational effects of metaverse, especially students with disabilities, are still an unknown area that lacks exploration. This paper focuses on the fact that metaverse-education is widening educational fields that meets the various needs of disabled students to realize social good and inclusive education, and communication effects such as resolving barriers to interaction are prominent. As a research method, examining literature research papers linked to AR/VR, metaverse with communication skills, interviews, articles, and columns by experts, and policy suggestions and implications for the special education was conducted. Although the limitations of research are confirmed, significant results are found on inclusive education, which provides educational maximizing effects and realizing human rights through direct immersive experience reflecting the Cone of Experience Theory. Hopefully follow-up studies on meta-edu for disabled students will be carried out in the future, and various interdisciplinary discussions are needed to carefully observe inclusive policies and benefits so that the socially vulnerable are not excluded from technologies in ICT society.

A Study on Influencing Factors of Elderly Consumers' Self-Efficacy in Internet Banking Usage: Exploring Moderating Effect of 60s and 70s (고령 소비자의 인터넷 뱅킹 사용 자기효능감의 영향요인에 관한 연구: 60대와 70대의 비교)

  • Ku, Yoonhye;Yang, Su Jin
    • Journal of Korean Home Economics Education Association
    • /
    • v.34 no.4
    • /
    • pp.77-92
    • /
    • 2022
  • Recently, digital transformation in the financial industry has been accelerated, and it has become an important task to improve the level of utilization of Internet banking by elderly consumers, who are vulnerable to Internet use. Accordingly, this study analyzed 3,101 respondents in their 60s or older from the 11th year of the Media Panel Survey to identify demographic, experiential, and psychological factors that affect the self-efficacy of elderly consumers' usage of Internet banking. The main research findings are as follows. First, gender, education, occupation, and income were identified as demographic variables. Second, the Internet shopping experience was identified as an experiential factor. Also, concerns about information security, digital literacy, and high will for problem-solving were identified as psychological factors. Third, as a result of the moderating effect analysis on whether the experiential and psychological factors have different influences according to the group divided into the 60s and 70s, the effect on self-efficacy in the usage of the Internet was classified by age. The results of this study will be able to enrich the discussions related to the intention to utilize technology among elderly consumers by empirically revealing that there are characteristics that cause differences in financial behavior even within one group called the elderly.