• Title/Summary/Keyword: 침해원인

Search Result 83, Processing Time 0.024 seconds

A Study on Security Management Methods for Information System of Educational Institutions (교육기관의 정보시스템 보안관리 방안 연구)

  • Choi, JinMyung;Kim, DooYeon
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.6
    • /
    • pp.95-104
    • /
    • 2017
  • The damage caused by information spill, forgery, falsification, and deletion by cyber infringement in educational institutions and universities is very large. In this study, we analyzed the types, causes, and problems of cyber infringement in educational administrative institutions and universities. As a result, administrative, physical and technical information protection activities were weak. In this paper, we propose a security enhancement method for each domain by dividing them into Internet zone, network-neutral zone (DMZ: Demilitarized Zone), general server zone, internal server zone (Server Farm), and user zone so that these vulnerabilities can be easily identified, supplemented or security enhanced. In addition, we have proposed a method to apply security information system architecture and information protection technology correctly for educational administration institutions and universities. This study is meaningful not to provide conceptual guidance but to suggest specific action and procedure oriented security management plan.

A Study on the Structured Weakness Classification for Mobile Applications (모바일 애플리케이션을 위한 보안약점 구조화 기법에 대한 연구)

  • Son, Yunsik;Oh, Se-Man
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.11
    • /
    • pp.1349-1357
    • /
    • 2012
  • In recent years, security accidents which are becoming the socially hot issue not only cause financial damages but also raise outflow of private information. Most of the accidents have been immediately caused by the software weakness. Moreover, it is difficult for software today to assure reliability because they exchange data across the internet. In order to solve the software weakness, developing the secure software is the most effective way than to strengthen the security system for external environments. Therefore, suggests that the coding guide has emerged as a major security issue to eliminate vulnerabilities in the coding stage for the prevention of security accidents. Developers or administrators effectively in order to use secure coding coding secure full set of security weaknesses organized structurally and must be managed. And the constant need to update new information, but the existing Secure Coding and Security weakness is organized structurally do not. In this paper, we will define and introduce the structured weakness for mobile applications by the surveys of existing secure coding and coding rules for code analysis tools in Java.

Research of the Face Extract Algorithm from Road Side Images Obtained by vehicle (차량에서 획득된 도로 주변 영상에서의 얼굴 추출 방안 연구)

  • Rhee, Soo-Ahm;Kim, Tae-Jung;Kim, Moon-Gie;Yun, Duk-Geun;Sung, Jung-Gon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.16 no.1
    • /
    • pp.49-55
    • /
    • 2008
  • The face extraction is very important to provide the images of the roads and road sides without the problem of privacy. For face extraction form roadside images, we detected the skin color area by using HSI and YCrCb color models. Efficient skin color detection was achieved by using these two models. We used a connectivity and intensity difference for grouping, skin color regions further we applied shape conditions (rate, area, number and oval condition) and determined face candidate regions. We applied thresholds to region, and determined the region as the face if black part was over 5% of the whole regions. As the result of the experiment 28 faces has been extracted among 38 faces had problem of privacy. The reasons which the face was not extracted were the effect of shadow of the face, and the background objects. Also objects with the color similar to the face were falsely extracted. For improvement, we need to adjust the threshold.

  • PDF

A Qualitative Study on Public management of the Admission and Discharge of mental hospital (정신장애인의 정신의료기관 입·퇴원과 국가관리에 관한 질적 연구)

  • Lee, Yong-pyo;Chung, Hyun-ju
    • Korean Journal of Social Welfare Studies
    • /
    • no.37
    • /
    • pp.369-397
    • /
    • 2008
  • The purpose of this study is to understand the context of mental hospital admission and discharge related with the stakeholder and to find out issues about public management on mental health disabilities. To this process, the more effecive alternative policies for mental health will be offered. As a research tool, the qualitative study was used, and the 6 case were analyzed. Through this study, we find 5 theme such as admission type occurred outside public management, uneffective public management in mental hospital treatment, long-term treatment mechanism occured in mental hospital, helplessness and role distortion of public follow-up system. According to the mental health law, mental hospital admission and discharge on mental health disabilities is to managed public system. But public management with mental health disabilities did not work on. In this results, we are find infringement on mental health disabilities. According to these findings, several suggestions are offered for better policies about admission and discharge procedures managed by public system.

A Basic Study on the Introduction of Human Rights Education for Seafarers (선원인권교육의 도입 방안에 관한 기초연구)

  • Jin, Ho-Hyun;Lee, Chang-Hee
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.5
    • /
    • pp.560-571
    • /
    • 2019
  • In line with the United Nations' Action Plan for the First and Second World Programme for Human Rights, countries around the world are making efforts to strengthen and develop human rights education through voluntary participation and improvement of the legal system. South Korea is also trying to spread human rights education under the leadership of the National Human Rights Commission of the Republic of Korea, but there has been no significant progress so far. Moreover, it has failed to pay close attention to the human rights issues of seafarers on board. This study identified the phenomenological problems based on an analysis of domestic and international literature, and of cases of violation of seafarers' human rights. It utilized the interactivity research method to create an educational environment for improving the human rights situation of seafarers on board mixed-nationality crew vessels. In doing so, the research suggests the introduction of human rights education for seafarers and the implementation of a human rights education program in designated educational institutions as fundamental solutions to the human rights issues of seafarers, as these have been pointed out as the main cause of conflicts in mixed-nationality crew vessels.

A Study on the Introduction Direction of Private Investigation Law (민간조사업법의 도입방향에 관한 연구)

  • Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.255-276
    • /
    • 2008
  • The important items, which should be considered in Private Investigation Law, can include subjects, licenses, the scope of business, qualifying examinations, and supervisory and penal provisions. The subjects of Private Investigation Law should be permitted to be both natural persons and juridical persons in terms of providing various services, but should be permitted to be juridical persons and should be administered on a license system, even in order to ensure public interests. Concretely, the introduction scope of Private Investigation Law can be regulated to include the followings: that is, investigating the whereabouts identification of runaways and missing children, investigating the personal identification, habit, way of action, motivation, whereabouts identification, real child confirmation, association, transaction, reputation, and personality of specific persons or specific groups, investigating the whereabouts identification of missing persons, owners of government-vested properties or renounced properties, investigating the whereabouts of lost properties or stolen properties, investigating the causes of fire, character defamation, slander, damage, accident, physical disability, infringement on real estate or movable property, and investigating all sorts of accidents including traffic accidents, insurance accidents, and medical malpractices. In the qualifying examination, examinees' age should be restricted to be over age 25. The person, who is exempted from its primary examination, should be restricted to be the person, who has the career of over 20 years in related fields, in consideration of its equity with other certificates of qualification. In the supervisory institution, as the policy institution is the supervisory institution in many countries including France (the police) and Japan (public security committee), so the National Policy Agency should be the supervisory institution in consideration of management aspects. In the penal regulations, especially, we should clarify the management of personal information (personal information protection, personal information management), and so should prevent the infringement of people's basic rights, and then should ensure the public interest.

  • PDF

Present Deterioration Situation and Study on the Cleaning of the Surface of the Octagonal nine storied pagoda of Woljeongsa Temple (월정사팔각구층석탑의 손상현황과 표면오염물 제거연구)

  • Hwang, Jeong Eun;Kim, Sa Dug;Jung, Hee Soo
    • 보존과학연구
    • /
    • s.33
    • /
    • pp.125-148
    • /
    • 2012
  • The Octagonal nine storied pagoda of Woljeongsa Temple consists mainly of granite with the rockforming minerals quartz, plagioclase, microcline, and biotite. The surface of the stone stupa is light brown that has been discolored by the rust from the metal ornament and aids. The surface of the stylobate and roof stone is colonized by biological contaminants. Therefore, a comprehensive deterioration diagnosis was carried out in this study, and conservation treatment was conducted. It was proven that the $Fe^{2+}$ yield increases depending on the count of poultice used with oxalic acid, but the $Mg^{2+}$, $Al^{3+}$, and $Ca^{2+}$ yields were marginal following the preliminary test. Therefore, the use of poultice is an effective way of removing the rust, and only marginally influences the rock. The biological contaminants were removed through dry cleaning, and the soil located under the contaminants was removed through wet cleaning. Based on this, the dry and wet cleaning of all the biological contaminants, and the use of poultice with oxalic acid, were done to remove the rust. For the conservation treatment of the metal ornament, the rust was removed through physical cleaning, and anticorrosion treatment was performed on the iron ornament using Renaissance wax and copper ornament by BTA.

  • PDF

A Study on Similar Trademark Search Model Using Convolutional Neural Networks (합성곱 신경망(Convolutional Neural Network)을 활용한 지능형 유사상표 검색 모형 개발)

  • Yoon, Jae-Woong;Lee, Suk-Jun;Song, Chil-Yong;Kim, Yeon-Sik;Jung, Mi-Young;Jeong, Sang-Il
    • Management & Information Systems Review
    • /
    • v.38 no.3
    • /
    • pp.55-80
    • /
    • 2019
  • Recently, many companies improving their management performance by building a powerful brand value which is recognized for trademark rights. However, as growing up the size of online commerce market, the infringement of trademark rights is increasing. According to various studies and reports, cases of foreign and domestic companies infringing on their trademark rights are increased. As the manpower and the cost required for the protection of trademark are enormous, small and medium enterprises(SMEs) could not conduct preliminary investigations to protect their trademark rights. Besides, due to the trademark image search service does not exist, many domestic companies have a problem that investigating huge amounts of trademarks manually when conducting preliminary investigations to protect their rights of trademark. Therefore, we develop an intelligent similar trademark search model to reduce the manpower and cost for preliminary investigation. To measure the performance of the model which is developed in this study, test data selected by intellectual property experts was used, and the performance of ResNet V1 101 was the highest. The significance of this study is as follows. The experimental results empirically demonstrate that the image classification algorithm shows high performance not only object recognition but also image retrieval. Since the model that developed in this study was learned through actual trademark image data, it is expected that it can be applied in the real industrial environment.

GNSS Techniques for Enhancing Flight Safety of UAS (무인항공기 안전성 강화를 위한 위성항법시스템 적용 방안)

  • Park, Je-hong
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.1
    • /
    • pp.58-65
    • /
    • 2017
  • Global navigation satellite system (GNSS) has a weakness of signal integrity caused by broadcasting type data transmitting direct to user from navigation satellite. Loss of GNSS signal integrity can make a catastrophic event in the operation of unmanned aerial system (UAS) because position decision is only depended on GNSS. So it is required to apply alternative method to reduce a risk and to guarantee a GNSS signal integrity for UAS operation. This paper addressed the reason of loosing GNSS signal integrity, the effectiveness of signal jamming/spoofing and GNSS application trend for UAS. Also suggested the flight safety enhancing method in case of GNSS signal jamming for UAS as technical and political approaches.

A Study on the Causes of Security Vulnerability in 'Wall Pads' ('월패드'의 보안 취약 원인에 관한 고찰)

  • Kim Sang Choon;Jeon Jeong Hoon
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.59-66
    • /
    • 2022
  • Recently, smart home technology has been developed with a great response due to the convenience of home automation. Smart home technology provides various services by connecting various Internet of Things (IoT) and sensors to a home network through wired/wireless networks. In addition, the smart home service easily and conveniently controls lighting, energy, environment, and door cameras through a wall pad. However, while it has become a social issue due to the recent hacking accident of wall pads, personal information leakage and privacy infringement are expected. Accordingly, it is necessary to prepare preventive and countermeasures against security vulnerability factors of wall pads. Therefore, this study expects that it can be used as basic data for future smart home application and response technology development by examining the weak causes and countermeasures related to wall pads.