• Title/Summary/Keyword: 통합보안시스템

Search Result 681, Processing Time 0.029 seconds

자율운항선박 육상원격제어시스템 테스트 결과 및 안정화 방안

  • 노화섭;김대정;임정빈
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.178-179
    • /
    • 2023
  • 자율운항선박 육상원격제어시스템 개발에 따른 각 단위시스템의 기능 및 통합시스템의 성능을 토대로 실습선과 연계하여 테스트결과를 공유하고 그 내용을 분석함으로써 시스템 안정화 방안을 제안하고자 한다.

  • PDF

Dynamic Sensitivity Level Measurement for Privacy Protection (개인정보보호 강화를 위한 동적 보안수준 결정)

  • Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.1
    • /
    • pp.137-150
    • /
    • 2012
  • For social demand and technological development, systematic private information management and security guidance have been enhanced; however, the issue of leakage and invasion of private information is shown in many ways. In the management of such private information, the issue of how to protect such information is one of the sensitive key elements. As a criterion to decide the management policy of each property information consisting of private information, this article suggests Dynamic-Security-Level-Measurement for property information. DSLM adopts the variable characteristics of property information as the element of measurement. By applying this method, it is possible to provide information management functions to cope with the changes of each property information security level of an individual actively. It is expected that this will improve the security of previous information management methods even more and also contribute to the improvement of security in integrated systems such as the integrated ID management system and electronic wallet.

Security Treats about Union File System and Responce Methodology (유니온 파일시스템에 대한 보안 위협 및 대응 방법)

  • Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.445-446
    • /
    • 2021
  • Union file system is a technology that can be used as a single file system by integrating various files and directories. It has the advantage of maintaining the source file/directory used for integration, so it is used in many applications like container platform. When using the union file system, the user accesses the write-able layer, to which the security technology provided by the operating system can be applied. However, there is a disadvantage in that it is difficult to apply a separate security technology to the source file and directory used to create the union file system. In this study, we intend to propose an access control mechanism to deny security threats to source file/directory that may occur when using the union file system. In order to verify the effectiveness of the access control mechanism, it was confirmed that the access control mechanism proposed in this study can protect the source file/directory while maintaining the advantages of the union file system.

  • PDF

자율운항선박 육상원격제어시스템 성과 및 사업추진 방향

  • 노화섭;임정빈
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.11a
    • /
    • pp.59-61
    • /
    • 2022
  • 자율운항선박 원격제어시스템을 개발에 따른 성과 내용과 개발된 시스템의 원활한 동작을 위한 시험 방법과 방향을 제시함으로써 통합 원격제어시스템과 비상상황 시나리오에 대한 효율적인 개발 방안을 제안하고자 한다.

  • PDF

A Study on establishing countermeasures to security threats due to the introduction of information protection system. (정보보호시스템도입에 따른 보안위협요소 대응방안수립에 관한 연구)

  • Kyung, ji-hun;Jung, Sung-Jae;Bae, Yu-Mi;Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.693-696
    • /
    • 2013
  • Information protection system (Information protection system)-based IT environment built popularity in public agencies and businesses take advantage of the resources for the integration of the information system one essential environment began to recognize, cloud systems (Cloud System), cloud security (Cloud Security), big data (Big Data), big data security (Big Data Security), industrial security (Security Industry), as well as the issue. Due to the influence of these information protection system (Information protection system) in response to my external security threats based on the analysis plan. In this paper, data protection systems (Information protection system), resulting in the introduction, there are a number of security threats and particularly industrial security aspects and internal and external security threats in response by lighting about aspects of the plan is based on knowledge.

  • PDF

Prototype Design and Security Association Mechanism for Policy-based on Security Management Model (정책기반 보안관리 모델을 위한 프로토타입과 정책 협상 메커니즘)

  • 황윤철;현정식;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.131-138
    • /
    • 2003
  • With the Internet winning a huge popularity, there rise urgent problems which are related to Network Security Managements such as Protecting Network and Communication from un-authorized user. Accordingly, Using Security equipments have been common lately such as Intrusion Detection Systems, Firewalls and VPNs. Those systems. however, operate in individual system which are independent to me another. Their usage are so limited according to their vendors that they can not provide a corporate Security Solution. In this paper, we present a Hierarchical Security Management Model which can be applicable to a Network Security Policies consistently. We also propose a Policy Negotiation Mechanism and a Prototype which help us to manage Security Policies and Negotiations easier. The results of this research also can be one of the useful guides to developing a Security Policy Server or Security Techniques which can be useful in different environments. This study also shows that it is also possible to improve a Security Characteristics as a whole network and also to support Policy Associations among hosts using our mechanisms.

On-line Information Services for Multimedia contents (멀티미디어 컨텐츠를 위한 온라인 정보 제공 서비스)

  • Kim, Jung-Hwan;Lee, Sang-Hyang;Kim, Joo-Youn;Kim, Jin-Chun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1353-1356
    • /
    • 2002
  • 현재 인터넷의 활성화로 웹 페이지의 활용이 여러 분야로 확산되고 있다. 따라서 도서 및 출판물과 다양한 멀티미디어 컨텐츠도 많은 업체에서 웹을 통한 온라인 방식으로 제공되고 있다. 이러한 온라인 방식을 효율적으로 활용하기 위해서는 오프라인과 비교하여 최대의 약점인 가독성 문제를 해결하기 위한 효율적인 뷰어, 제공자가 컨텐츠 및 회원 정보 등을 체계적으로 관리할 수 있는 통합관리 시스템, 컨텐츠의 복제와 무단배포 방지를 위한 자료의 암호와 사용자의 개인정보를 포함한 클라이언트와 서버간에 전송되는 데이터의 보안을 위한 웹 보안, 온라인 상에서 지불이 가능한 전자 결제 시스템의 제공이 필수 불가결하다. 본 논문에서는 다양한 형태의 자료를 포함하는 멀티미디어 컨텐츠의 온라인 상에서의 효율적인 제공을 위할 통합시스템의 설계 및 구현에 관한 방법을 제시하였다.

  • PDF

자율운항선박 사이버안전체계 구축방안

  • 임정규;최상훈;박개명
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.350-352
    • /
    • 2022
  • 자율운항선박을 IMO 자율화등급 3단계 이상으로 운용하기 위해서는 내·외부 통신시스템의 사이버보안뿐만 아니라 실시간으로 데이터를 교환하는 데이터 및 시스템 사이버안전에 대한 고려가 필수적으로 요구된다. 본 연구에서는 자율운항선박 사이버안전체계 구축방안에 대해서 살펴본다. 자율운항선박 사이버안전체계 구축을 위해서는 선박 내 사이버위협을 실시간으로 탐지하고 영향을 모니터링하는 통합 보안 시스템 구축이 필요하며, 선박 사이버안전 설계 타당성을 검증하는 사이버리스크평가 기술, 사이버안전체계를 검증하기 위한 CVE(Common Vulnerabilities Enumeration)기반 취약성 진단 및 침투테스트 기술, V-Model을 활용한 통합 소프트웨어 품질인증 기술, ISO 25024 기반 데이터 무결성 검증 기술 적용이 필요하다.

  • PDF

A study on SEED block cipher algorithm for ICMP development (SEED 블록암호알고리즘을 적용한 통합 사례관리 시스템(ICMP) 개발에 관한 연구)

  • Oh, Dong-Sic;Kim, Young-Hyuk;Lim, Il-Kwon;Li, Qi Gui;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.244-247
    • /
    • 2010
  • In this paper, propose for the international standards of security and reliability SEED block cipher algorithm is applied to the ICMP. This paper is improve security, reliability and user comfort of weakness existing integrated case management system on spring based java framework technology. As a result, part of the user interface to improve performance and can be applied to real world applications.

  • PDF