• Title/Summary/Keyword: 통제 네트워크

Search Result 450, Processing Time 0.025 seconds

Improved Access Control of SDP Single Packet Authorization (SDP 단일 패킷 인증의 접근통제 개선 방안)

  • Lee, sang-ku;Jung, jin-kyo;Kim, young-min
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2019.05a
    • /
    • pp.311-312
    • /
    • 2019
  • 최근 기업의 클라우드 도입 확산으로 인해 정보자산이 분산됨에 따라 보호해야 하는 접점이 점차 증가 되고 있다. 또한, 모바일의 업무 활용 증가, 망 분리 및 내부 사설 클라우드의 도입 등 기업 내 변화된 IT 환경으로 인해 네트워크 구성이 더욱 더 복잡해지고 있으며, 이로 인해 보안 수준 유지가 어려워지고 있다. 특히, 클라우드 컴퓨팅에서는 보호해야 하는 자원이 기업 외부에 분산되어 있어 기존처럼 경계를 구축하는 것은 어려운 일이다. 본 논문에서는 CSA가 주도하는 SDP 표준화 동향 및 SDP의 구성요소와 동작 원리에 대한 연구를 진행하고, 핵심 기술인 SPA 및 Dynamic Firewall 기술을 활용하여 기존 접근통제 방식의 문제점을 개선하기 위한 방안을 제시하고자 한다.

  • PDF

A Design of MHS Access Control Policy for Preventing Cascade Vulnerability (캐스케이드 취약성 방지를 위한 MHS 접근통제 정책 설계)

  • 조인준;김학범;홍기융;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.117-128
    • /
    • 1997
  • When computer systems with mandatory access control mechanism are interconnected each other for enforcing the MHS(Message Handling System) security on the multilevel secure distributed network environment, illegal information flow may occurs due to the unexpected cascade vulnerability problem. In this paper, new MHS security policy and security property functions are proposed for preventing the cascade vulnerability.

Vulnerability Analysis for Industrial Control System Cyber Security (산업제어시스템의 사이버보안을 위한 취약점 분석)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.137-142
    • /
    • 2014
  • Industrial control system (ICS) is a computer based system which are typically used in nation-wide critical infra-structure facilities such as electrical, gas, water, wastewater, oil and transportation. In addition, ICS is essentially used in industrial application domain to effectively monitor and control the remotely scattered systems. The highly developed information technology (IT) and related network techniques are continually adapted into domains of industrial control system. However, industrial control system is confronted significant side-effects, which ICS is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in industrial control system. The vulnerabilities that may be found in typical ICS are grouped into Policy and Procedure, Platform, and Network categories to assist in determining optimal mitigation strategies. The order of these vulnerabilities does not necessarily reflect any priority in terms of likelihood of occurrence or severity of impact. Firstly, corporate security policy can reduce vulnerabilities by mandating conduct such as password usage and maintenance or requirements for connecting modems to ICS. Secondly, platfom vulnerabilities can be mitigated through various security controls, such as OS and application patching, physical access control, and security software. Thirdly, network vulnerabilities can be eliminated or mitigated through various security controls, such as defense-in-depth network design, encrypting network communication, restricting network traffic flows, and providing physical access control for network components.

Implementation of an operation module for an integrated network management system of ship-based and offshore plants (해양플랜트 및 선박의 네트워크 통합 관리 시스템 운용 모듈 개발)

  • Kang, Nam-Seon;Lee, Seon-Ho;Lee, Beom-Seok;Kim, Yong-Dae
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.7
    • /
    • pp.613-621
    • /
    • 2016
  • This research connected network equipment, including CCTV, PAGA, IP-PBX, and Legacy, in order to enable the operation and configuration of internal IP-based network equipment in maritime plants and vessels, both in the field and from remote places, and to allow for the support of remotely controlling such equipment. It also realized an operating program for the integrated network equipment management system to enable the monitoring and control of equipment status, operation condition, and notifications from distant places. By applying the operating program to satellite stations and vessels sailing on the sea, a performance test was conducted to evaluate data loss and transmission/reception delay in the communication section between the land and vessels. As a result, this research verified the normal operation of CCTV control and of real-time monitoring and control of the network equipment, including PAGA, IP-PBX, and Legacy under the FBB and MVSAT environments. It was observed that the transmission of CCTV video images with a large volume of data as well as the transmission and reception of voice data were found to be slightly delayed, indicating the need to develop technology to compress and convert data for real-time transmission and reception.

The Urban Space of the Motions and Emotions of Human Bodies in Mobile Networks (휴대폰 네트워크 속 인간 육체의 활동과 감정의 도시 공간)

  • Lee, Hee-Sang
    • Journal of the Korean Geographical Society
    • /
    • v.41 no.5 s.116
    • /
    • pp.561-581
    • /
    • 2006
  • Machines, cities and bodies have been evolved together for a long time, and the recent development of information and communication technologies has transformed cities and bodies into new forms. Concerned with the relations between machines, cities and bodies, this paper explores how mobile networks are related with the physical space of the city and the psychological space of the body. The paper is organised into four main sections. First, it provides a theoretical review of the ways in which mobile networks transform urban spaces and human bodies. Secondly, it explains the generation of mobile networks through technological and institutional changes in Korea. Thirdly, it looks at the socio-spatial scales and time-space landscapes of mobile networks in relation to mobile users' motions and practices in their everyday lives. Finally, it attends to the ways in which mobile networks involve the production of paradoxical emotional spaces in relation to mobile users' emotions and desires to be dis/connected with mobile networks.

A Study of Data Security System Based PKI on Wireless Internet Environment (무선 인터넷 환경에서의 PKI 기반 데이터 보호 시스템에 대한 연구)

  • Kim, Young-Ho;Chae, Cheol-Joo;Choi, Sang-Wook;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.233-236
    • /
    • 2008
  • Wire wireless integrated service of BcN(Broadband convergence Network) is expanding. Information Security issue is highlighted for opposing attack of getting information illegally on wire wireless network. The user of PKI(Public Key Infrastructure) cipher system among Information security technology receives various security services about authentication, confidentiality, integrity, non-repudiation and access control etc. A mobile client and server are loaded certificate and wireless internet cryptography module for trusted data send receive. And data sends receives to each other after certification process through validity check of certificate. Certificate and data security system is researched through PKI on wireless network environment and data security system in this paper.

  • PDF

유비쿼터스 기술의 군 활용방안 연구

  • 이윤희
    • Review of KIISC
    • /
    • v.14 no.1
    • /
    • pp.46-55
    • /
    • 2004
  • 21세기에는 정보기술의 혁명적 발전과 함께 전쟁양상이 파격적으로 변화될 것으로 예측되며, 전력체계의 특성이 근본적으로 변화됨과 더불어 전쟁 패러다임이 획기적으로 변하고 있다. 특히, 정보과학기술을 이용한 정밀감시, 통제, 타격 복합체계의 구축이 군사력 발전의 근간이 되고 있으며, 앞으로 디지털, 인터넷, 생명공학, 나노기술 등을 복합적으로 활용하는 것이 전력체계의 중심 축이 될 것이다. 특히 전쟁 수행 방식 및 수단의 변혁과 군사패러다임의 보편적 변화추세에 능동적으로 대비하기 위하여 유선과 무선 그리고 근거리 무선 사이에 이음매 없는 통신망이 실현됨으로써 누구든지 어디서나 네트워크로부터 자신이 필요한 정보를 얻을 수 있는 유비쿼터스 컴퓨팅을 민간분야에 활용하여 스마트 흠과 물류에 적용한 사례를 살펴보았다. 유비쿼터스 컴퓨팅과 네트워크 기술은 21세기 변화될 형태의 전쟁을 수행하기 위해 국방 분야 적용이 필수적이며, 이를 통해 전술적인 감지$.$추적 능력의 차대 및 고도화된 전술 정보의 실시간 교환$.$공유, 전술부대의 커뮤니티 파워증대 효과를 가져 올 수 있다. 따라서 유비쿼터스 국방(u-Defense) 시대로 가기 위해 개발하여 적용 가능한 핵심 분야인 내장형 모바일 ad-hoc 네트워크 프로토콜, 무선 센서 네트워크, RFID(Radio Frequency Identification)를 활용한 유비쿼터스 군수지원 등을 제시하였다. 이러한 유비쿼터스 국방을 위하여 우선 비용 측면과 민간분야에 비해 훨씬 강화된 정보 보호 및 무기체계간 상호인증 환경을 고려해야 하며, 국방 정보화에 전력증강차원의 과감한 투자가 요구된다. 또한, 저 비용 고효율의 군사력을 구축해야할 것이며, 첨단 정보체계 건설을 주도할 수 있는 정보 인력을 양성하여, 장기적으로 종합적인 발전계획을 수립하고 국방 정보 체계를 효율적으로 구축하면 군 전력향상에 획기적으로 기여할 수 있을 것이다.

Ad-hoc Network Routing Protocol in the Yard of Automated Container Terminal (항만 자동화를 위한 장치장내의 Ad-hoc 네트워크 라우팅 프로토콜)

  • Lee, Seung-Ju;Park, Doo-Jin;Choi, Young-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.84-90
    • /
    • 2009
  • In this paper, the RFID-based ad-hoc network is presented for the efficient yard management of the container terminal. The loading and unloading work is performed through the ad-hoc communication between YT and GC, YT and TC within the yard without the control of the central server. That makes the efficient operation of the yard with real task correspondence. Using the location information of the RFID tag, we have proposed the routing protocol which is suitable for the yard environment of the container terminal. The performance evaluation has been carried out through the network simulator and gained an effective results.

A study on the environment-controlling system by members on the basis of HNS (HNS기반의 구성원별 자동 환경 제어 시스템에 관한 연구)

  • 황선주;조대제;임한규
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.720-723
    • /
    • 2003
  • So far the study of digital home has mainly been made up of the network technology and the sorority system, but the application to consider the discriminatory characteristics of the individual family members has been interested in comparison with the necessity. The system proposed in this study is to get the information of the internal users through the access-controlling system. The controller offers the discriminatory environment by activating the database of the internal users and controls the sub-system of the home-network. The suggested system can automatically offer the discriminatory environment among the family members by limiting TV programs or channels according to the users' age, by offering other internet environment according to the users, by putting restrictions on telephone numbers, or by restricting the settling right of the home-shopping companies.

  • PDF

The Effect of the fit between Innovation Strategy and Company Characteristics on Innovation Performance (혁신전략과 기업특성 간의 적합성이 혁신성과에 미치는 영향)

  • Shin, Sung-Wook;Choi, Won-Ju
    • Management & Information Systems Review
    • /
    • v.37 no.3
    • /
    • pp.131-145
    • /
    • 2018
  • The purpose of this study is to analyze the effect of the fit between innovation strategy and firm characteristics on innovation performance. We conducted surveys for venture companies in the Southeast region, The results of multiple regression analysis based on 135 questionnaires are as follows : First, the higher the fitness between innovation strategy and social network level, the higher the innovation performance. Second, the higher the fitness between innovation strategy and management control system level, the more positive effect on innovation performance. Finally, the higher the fitness between innovation strategy and innovation culture, the higher the innovation performance. This result implies that the enterprise characteristics should be designed and operated in accordance with the innovation strategy implementation.