• Title/Summary/Keyword: 통합보안시스템

Search Result 681, Processing Time 0.027 seconds

A Design of Communication Network Architecture for E-Navigation Services (E-Navigation 서비스 제공을 위한 통신망 아키텍처의 설계)

  • Jeong, Jung-Sik;Kim, Sun-Young
    • Journal of Navigation and Port Research
    • /
    • v.32 no.1
    • /
    • pp.37-45
    • /
    • 2008
  • The research on an E-Navigation(E-Nav) strategy development has recently carried out by the IMO sub-committee on safety of navigation(NAV). The design of communication system architecture is a key factor in the E-Nav strategy development and it may drive the direction of a national R&D project on future navigational and marine communication systems. This study aims at designing a standard model of E-Nav communication network architecture, which enhances navigational safety and provides additional benefits in marine transportation. To achieve this purpose, authors have suggested E-Nav services, which are divided into five categories, i.e., safety and security, maritime meteorology, distress, business, and infotainment, by analyzing the related user requirements. As results, this paper proposes the E-Nav communication network architecture that consists of the navigation and communication equipments.

A Study on the MIS curriculum directions and courses based on the MIS identity and IS core competency (MIS 정체성과 IS 핵심 역량 관점의 MIS 교육과정 방향 및 내용에 관한 연구)

  • Chang, Yun-Hee
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.253-270
    • /
    • 2012
  • In a rapidly changing IT and business management environment the demand for competent IS personnels is increasing. However, it is ironic that the number of IT and IS majors has sharply decreased as well as the widespread skepticism of IS identity. This research suggests directions to differentiate MIS to other IT majors, diversify IS core competency and make general improvements in MIS curriculum. The research recommend the courses of IS Strategy and policy, ITA/EA, Global IT Management, Emerging Technologies, DW/DM, BI, IT Service Science, Project Management, IT Consulting and integrated capstone which are few in Kore universities. This research also stress the course of soft skills like business communication, team building, analytic/logical thinking, rational problem solving and so on as a important IS competency. The pedagogy of course is important, so the research recommend the internship, mentoring programme, lecturers in industry according to industrial - educational cooperation.

A Study on Anonymous Electronic Prescription based on RSA Cryptosystem (RSA 기반의 익명 전자처방전에 관한 연구)

  • Chung, Chan-Joo;Yun, Jung-Mee;Won, Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.51-62
    • /
    • 2010
  • This paper proposes RSA cryptosystem based anonymous electronic prescription which is issued from university and local hospitals by authorized medical professionals. Electronic prescription is now being used in domestic hospitals where sharing medical records and images are prevailing, facilitated by digitalizing medical information and building network infrastructure between the institutes. Proposed RSA based anonymous electronic prescription makes use of PKI protects the identity exposure of doctors and privacy of patients. While traditional prescription fails to protect identities to mandates party or to health insurance, the proposed RSA based prescription opens the contents of the prescription to health insurance authority only after its prescribing function is finished. The proposed approach along with soon to be deployed electronic ID card will help national health insurance corporation to increase the transparency of national prescription system.

Secure Healthcare Data Management and Sharing Platform Based on Hyperledger Fabric (하이퍼레저 패브릭 기반의 안전한 헬스케어 데이터 관리 및 공유 플랫폼 개발 연구)

  • Choi, Ye-Jin;Kim, Kyoung-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.95-102
    • /
    • 2020
  • In this paper, we present a healthcare data integration management and sharing platform based on a permissioned blockchain-based system called the Hyperledger fabric. The Hyperledger fabric allows patients to easily access their data, share the data with agencies that need it, and also reward participants. The healthcare data is stored in the blockchain by a de-identification process. Privacy is protected by setting detailed access rights to the stored data. The proposed model provides higher security than other models using a public blockchain. This study confirms that patient data can be stored more securely, by comparing the data stored in the blockchain with that from existing information storage methods.

웹사이트 접근성 자동화 평가 도구의 개선 방안에 관한 연구

  • 홍순구;이대형
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2005.12a
    • /
    • pp.97-109
    • /
    • 2005
  • 노인 인구의 급격한 증가와 인터넷을 통한 정보획득의 보편화로 인하여 웹 접근성의 중요성이 부각되고 있다. 웹 접근성이란 "경제적, 지역적, 신체적, 사회적 한계로 인해 정보서비스를 받기 어려운 자들에 대한 정보 통신망의 자유로운 접근과 이용" 을 의미한다 정부기관이 선도하여 웹사이트를 통해 보다 편리하고 좋은 서비스를 국민에게 제공하려는 전세계적인 노력에도 불구하고 장애인이나 노인들에게는 아직도 웹사이트의 접근이 용이하지 못한 실정이다. 이는 웹 접근성의 문제를 발생시키는 근본 원인 중 하나인 웹 접근성(Web Accessibility)에 대한 개념 이해 및 현재 사용되는 웹사이트의 접근성 만족 유무를 정확하게 평가할 수 있는 평가 방법의 부재에 기인한다. 현재까지 웹 접근성 평가는 표준 평가항목인 W3C의 웹 접근성 지침(Web Contents Accessibility Guideline 1.0, 이하 WCAG 1.0)을 기반으로 만들어진 자동화 평가도구를 이용하여 대부분 이루어져 왔다. 자동차 평가도구를 이용한 웹 접근성 평가 방법은 평가가 용이하고 평가결과의 정량화로 인해 연구의 객관성을 높일 수 있다는 장점이 있다. 그러나 선행연구와 실험을 통해 자동화 평가도구의 문제점이 지적되고 있다. 예를 들어 전문가가 직접 스크린 리더를 통해 계산한 접근성 오류와 자동화 도구가 계산한 접근성 오류와는 많은 차이를 보이고 있다. 기존 연구에서는 자동화 평가도구의 문제점을 보완하기 위해 전문가가 직접 평가하는 매뉴얼 평가방식과의 병행을 제시하고 있으나, 근본적인 문제점을 해결하고 이를 개선할 수 있는 연구가 필요하다. 따라서 본 연구에서는 "한국형 웹 콘텐츠 접근성 지침(TTAS.0T-10.0003)"을 기본으로 하여 "EuroAccessibilty Consortium" 에서 고려하고 있는 "testable statement" 으로 통합 보안한 접근성 체크항목의 재구성과 함께 "자연어 처리" 알고리즘을 적용하여 자동화 평가도구의 개선 방안을 제시한다. 아직까지 제시된 개선방안의 적용 및 검증이 이루어지지 않아 한계점을 가지고 있으나 자동화 평가도구의 개선방안에 대한 제안은 향후 연구의 기초자료로 활용 가능할 것이며 많은 후속연구를 유발할 것으로 기대한다.

  • PDF

Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack (오픈소스 ELK Stack 활용 정보보호 빅데이터 분석을 통한 보안관제 구현)

  • Hyun, Jeong-Hoon;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.181-191
    • /
    • 2018
  • With the development of IT, hacking crimes are becoming intelligent and refined. In Emergency response, Big data analysis in information security is to derive problems such as abnormal behavior through collecting, storing, analyzing and visualizing whole log including normal log generated from various information protection system. By using the full log data, including data we have been overlooked, we seek to detect and respond to the abnormal signs of the cyber attack from the early stage of the cyber attack. We used open-source ELK Stack technology to analyze big data like unstructured data that occur in information protection system, terminal and server. By using this technology, we can make it possible to build an information security control system that is optimized for the business environment with its own staff and technology. It is not necessary to rely on high-cost data analysis solution, and it is possible to accumulate technologies to defend from cyber attacks by implementing protection control system directly with its own manpower.

Custom Cryptographic Protocol Implementation Method Based on OpenSSL (OpenSSL 기반 사용자 지정 암호 프로토콜 구현 방안)

  • Lam, JunHuy;Lee, Sang-Gon;Lee, Hoon-Jae;Andrianto, Vincentius Christian
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.459-466
    • /
    • 2017
  • One of the most widely-used open source project; OpenSSL is a cryptography library that is used to secure most web sites, servers and clients. One can secure the communication with the Secure Socket Layer (SSL) or its successor, Transport Layer Security (TLS) protocols by using the OpenSSL library. Since cryptography protocols will be updated and enhanced in order to keep the system protected, the library was written in such a way that simplifies the integration of new cryptographic methods, especially for the symmetric cryptography protocols. However, it gets a lot more complicated in adding an asymmetric cryptography protocol and no guide can be found for the integration of the asymmetric cryptography protocol. In this paper, we explained the architecture of the OpenSSL library and provide a simple tutorial to modify the OpenSSL library in order to accommodate custom protocols of both symmetric and asymmetric cryptography.

A Study on the Implementation of Management System Based on UHD Transmission Contents (UHD 송출 콘텐츠 기반 관리시스템 구현)

  • Kim, Moo Yeon;Jang, Byung Min;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.813-826
    • /
    • 2019
  • This paper is a study on the implementation of MAM(Media Asset Management) to utilize UHD contents as high quality broadcast material. The implementation method of this paper is to separate MAM roles with content management functions and transmission workflow functions from workflow, metadata and system interface related work, which are divided into core MAM and MAM-Ex structure. Through the method proposed in this paper, we improved the content management method by applying the page menu method to the material metadata modification and applying the template method to the material structure API. In addition, the storage of UHD material and the configuration of the component server are pooled without any distinction of channels, thereby enhancing the security of UHD transmission assets by minimizing the movement of contents together with broadcasting material protection.

A Study on the Development of Standard Profiles Management System which supports the Technical Reference Model for Information Technology Architecture (정보기술 아키텍처를 위한 기술참조모델을 지원하는 표준프로파일 관리시스템 개발에 관한 연구)

  • Yang, Jin-Hyeok;Kim, Yeong-Do;Jeong, Hui-Jun;Yang, Jin-Yeong;Yu, Myeong-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.665-672
    • /
    • 2001
  • ITA (Information Technology Architecture) satisfies the requirements of information system, supports the information used in the institution's business to guarantee the interoperability and security, and analyzes the components of information system. ITA consists of EA (Enterprise Architecture), TRM (Technical Reference Manual) and SP (Standard Profile). The SP, one of the major components of ITA, is a set of information technology standards. In this paper, to construct and utilize the ITA, we mention the applications of information technology about the SP system implementation based on the TRM. The SP management system implemented in this paper is the first trial in Korea, and designs the software with object oriented programming languages such as JSP and Java. Moreover the basic and detailed specification based on the UML notation, system design using the component and system design pattern consisting of software architectures enhance the software reusability. And the constructed system in this paper shows less maintenance cost by using the public softwares such as Linux system, Korean DBMS, Apache and Tomcat, etc. Finally, the system includes the SP reference system which is used in the other institutions and cannot be found in other institutions. Also it includes the additional diverse service modules which support the subsequent processing for the establishment and revision of standards via internet.

  • PDF

The national limits and issues of disaster response and management capabilities (국가의 재난대처 및 관리능력의 한계와 문제점)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.99-109
    • /
    • 2014
  • Disaster is when, where, and how uncertainties, which might occur. Thus, for disaster response and management at the national and local governments have been made. Korea has established the Disaster and Safety Management Basic Act. Disaster Management has been made at the national level which is to prevent disasters and countries in order to protect citizens from harm and dangerous. Korean Disaster management system is well equipped with advanced countries. The Organization of national and local government are well-maintained substantially for the disaster activities and step-by-step manuals activities. Despite that uncertainty, due to the nature of the disaster, while infrequent, causing large-scale tragedy. Minimize the damage of the disaster as a disaster management efforts are needed. Normally a real disaster, a disaster situation, efforts are to be utilized efficiently, the effectiveness of the system will appear. But while the number of large-scale disasters, including the sinking of Sewol this time for the government and local governments see the response process, the system did not work and the manual existed in the cabinet. There was no Prevention and preparation activities, there was no integrated organization for the response management with expertise in the professional staff. Whenever a large disaster raised repeatedly as a problem, but there was a substantial change in formal but no improvement. It will not reduce the damage if the disaster management is not prepared for a revolutionary turning point.