• Title/Summary/Keyword: 파일정책

Search Result 246, Processing Time 0.029 seconds

Implementation of File Security Module Using on Windows (윈도우즈 기반 파일 보안 모듈 설계 및 구현)

  • Sung Kyung;Yoon Ho-gun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.105-112
    • /
    • 2005
  • As the development of information telecommunication technology and thus the information sharing and opening is accelerated, If system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.

  • PDF

Study on Forensic Analysis with Access Control Modification for Registry (레지스트리 접근권한 변조에 관한 포렌식 분석 연구)

  • Kim, Hangi;Kim, Do-Won;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1131-1139
    • /
    • 2016
  • In the Hive file format, the sk(Security Key) cell provides access control to registry key. An attacker can figure out secret information on registry or change the security set-up if she could apply modified hive files on system. This paper presents various methods to change access control of registry key by modifying or replacing cell on hive file. We also discuss threats by access control modification and signs of attacks analysis by modified hive files.

Hybrid Buffer Replacement Scheme Considering Reference Pattern in Multimedia Storage Systems (멀티미디어 저장 시스템에서 참조 유형을 고려한 혼성 버퍼 교체 기법)

  • 류연승
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.1
    • /
    • pp.47-56
    • /
    • 2002
  • Previous buffer cache schemes for multimedia storage systems only exploited the sequential references of multimedia files and didn't consider looping references. However, in some video applications like foreign language learning, users mark the scene as loop area and then application automatically playbacks the scene several times. In this paper, we propose a new buffer replacement scheme, called HBM(Hybrid Buffer Management), for multimedia storage systems that have both sequential and looping references. Proposed scheme assumes that application layer informs reference pattern of files to file system. Then HBM applies an appropriate replacement policy to each file. Our simulation experiments show that HBM outperforms previous buffer cache schemes such as DISTANCE and LRU.

  • PDF

A Policy based Secure Framework In WAN (광역망에서의 정책기반 보안프레임워크)

  • Park, Sang-Gil;Jang, Jong-Su;Noh, Bong-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.989-992
    • /
    • 2001
  • 인터넷의 지속적인 보급/발전과 더불어, 네트워크 상에서의 침입시도는 해가 지날수록 기하급수적으로 증가되고, 그 기법 또한 다변화되고 있다. 이는 침입탐지시스템의 적용환경에도 많은 영향을 끼치게 되었다. 일반적인 네트워크 기반 침입탐지시스템은 네트워크 디바이스를 통해 유입되는 패킷에 대해 Signature 기반 침입탐지 모듈을 통하여 침입을 탐지하게 된다. 대게의 경우 새로운 침입탐지 패턴이 생성되었을 경우, 사용자에 의해 추가되거나 또는 소스코드의 재컴파일을 통하여 시스템이 재구동되기도 한다. 본 논문이 제시하는 바는 이에 반해 AS 내에 존재하는 네트워크의 유입점인 게이트웨이 장치에 침입탐지 시스템을 설치하며, 이를 보안정책서버에 의해 정의된 정책에 의해 침입탐지 및 게이트웨이 장치로서 동작하게 한다. 이를 통해 보안정책서버에 추가되는 침입탐지 패턴 등의 정책정보가 각 침입탐지시스템에 실시간으로 반영되어 처리된다.

  • PDF

A Ranking Cleaning Policy for Embedded Flash File Systems (임베디드 플래시 파일시스템을 위한 순위별 지움 정책)

  • Kim, Jeong-Ki;Park, Sung-Min;Kim, Chae-Kyu
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.399-404
    • /
    • 2002
  • Along the evolution of information and communication technologies, manufacturing embedded systems such as PDA (personal digital assistant), HPC (hand -held PC), settop box. and information appliance became realistic. And RTOS (real-time operating system) and filesystem have been played essential re]os within the embedded systems as well. For the filesystem of embedded systems, flash memory has been used extensively instead of traditional hard disk drives because of embedded system's requirements like portability, fast access time, and low power consumption. Other than these requirements, nonvolatile storage characteristic of flash memory is another reason for wide adoption in industry. However, there are some technical challenges to cope with to use the flash memory as an indispensable component of the embedded systems. These would be relatively slow cleaning time and the limited number of times to write-and-clean. In this paper, a new cleaning policy is proposed to overcome the problems mentioned above and relevant performance comparison results will be provided. Ranking cleaning policy(RCP) decides when and where to clean within the flash memory considering the cost of cleaning and the number of times of cleaning. This method will maximize not only the lifetime of flash memory but also the performance of access time and manageability. As a result of performance comparison, RCP has showed about 10 ~ 50% of performance evolution compared to traditional policies, Greedy and Cost-benefit methods, by write throughputs.

A Study on Development of PHC pile driving force increase device on soft ground (연약지반상 PHC파일 항타력 증대장치 개발에 관한연구)

  • Kim, Jong-Gil;Lee, Young-Joo
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.219-224
    • /
    • 2020
  • The purpose of this study is to develop a device to replace the pre-boring method, which is generally constructed, to prevent pile damage caused by tension cracks that reason from tension waves generated during PHC pile construction on soft ground. Tension cracks are caused by tension waves from the hammer striking during the PHC pile hitting on the soft ground, which in turn leads to faulty construction. In order to prevent the occurrence of tension waves generated during driving, apply separate driving force increasing device to prevent the generation of tension waves, and pile damage as well. Also, it is an eco-friendly construction method that reduces smoke and noise by improving construction speed, reducing construction costs, and able to small equipment when developing equipment. This development equipment is a piece of effective equipment that can pioneer the Saemangeum reclamation area, the South-east Asian construction market, where the Deep soft ground is distributed.

A Digital Secret File Leakage Prevention System via Hadoop-based User Behavior Analysis (하둡 기반의 사용자 행위 분석을 통한 기밀파일 유출 방지 시스템)

  • Yoo, Hye-Rim;Shin, Gyu-Jin;Yang, Dong-Min;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1544-1553
    • /
    • 2018
  • Recently internal information leakage in industries is severely increasing in spite of industry security policy. Thus, it is essential to prepare an information leakage prevention measure by industries. Most of the leaks result from the insiders, not from external attacks. In this paper, a real-time internal information leakage prevention system via both storage and network is implemented in order to protect confidential file leakage. In addition, a Hadoop-based user behavior analysis and statistics system is designed and implemented for storing and analyzing information log data in industries. The proposed system stores a large volume of data in HDFS and improves data processing capability using RHive, consequently helps the administrator recognize and prepare the confidential file leak trials. The implemented audit system would be contributed to reducing the damage caused by leakage of confidential files inside of the industries via both portable data media and networks.

재무정책과 기업부실예측

  • Park, Jeong-Yun
    • The Korean Journal of Financial Studies
    • /
    • v.6 no.1
    • /
    • pp.93-117
    • /
    • 2000
  • 본 논문의 목적은 1991년부터 1996년까지 부실이 된 상장기업 41개사와 이에 대응하는 118개 건전기업의 표본을 가지고 주요 재무정책변수를 이용하여 로짓분석에 의한 기업부실예측모형을 구축하는데 있다. 본 연구에서는 기존연구와는 달리 이론적으로 타당하고 재무경영자의 관심대상인 투자정책변수, 자본조달정책변수 및 배당정책변수를 가장 잘 반영한다고 판단되는 12개의 재무비율을 사전적으로 선정하였다. 이들 12개의 재무비율에 대해 부실기업과 건전기업을 가장 잘 판별할 수 있는 재무비율을 선정하기 위하여 프로파일 분석과 두 표본 t검정을 하였다. 그 결과 투자정책, 자본조달정책, 그리고 배당정책을 대표하는 변수로 자기자본순이익률, 총자본부채비율 및 배당율이 각각 채택되었다. 그리고 현금흐름변수를 추가하였다. 이 네 변수를 이용하여 로짓분석을 실행하였다. 먼저 부실 1년전부터 부실 5년전까지 각 연도별로 부실예측모형을 추정하였다. 부실 1년전의 추정모형에 의하면 총자본부채비율을 제외한 모든 계수의 부호는 (-)로 모두 기대했던 대로 나타났다. 전체적으로 볼 때 부실 4-5년 전에는 자기자본순이익률과 총자본부채비율이 기업부실에 유의한 영향을 주나 부실전 3년간은 현금흐름과 배당률의 크기가 부실에 영향을 주는 것으로 나타났다. 본 연구는 부실예측모형을 기업의 재무정책적인 관점에서 추정하였다는 데 그 의의가 있다고 할 수 있다.

  • PDF

A Plain Cleaning Policy for Imbedded Flash File System (임베디드 플래시 파일 시스템을 위한 플레인 지움 정책)

  • Lee, Tae-Hoon;Lee, Sang-Gi;Chung, Ki-Dong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.778-780
    • /
    • 2005
  • 최근 디지털 융합(Digital Convergence)이 활발히 진행되면서 이동형 장치(Mobile Device)는 더욱 대용량, 고성능화 되고 비휘발성 메모리 요구가 커지고 있다. 이에 휴대가 용이하여, 접근시간이 빠르고, 전력소비가 적은 플래시 메모리가 많이 사용되고 있으나 상대적으로 느린 지움 시간과 지움 횟수의 한계 등 극복해야할 문제점이 있다. 본 논문에서는 이러한 문제점을 해결하기 위한 플레인 지움 정책을 제안하고 성능평가를 실시한다. 제안하는 플레인 지움 정책은 기존의 지움 정책과 같이 플래시의 블록단위의 균등한 사용을 고려할 뿐만 아니라 임베디드 시스템의 제한된 성능을 고려하여 연산을 최소화한다. 제안된 방법은 Greedy, Cost-benefit 방법에 비해 Wear-leveling에서 성능을 향상시켰고, RCP(Ranked Cleaning Policy)에 비해 연산횟수를 감소시켰다.

  • PDF

Enhancing industrial security of casino business by developing criminal profiling of deviant behaviors in casino (범죄 프로파일링 기법을 활용한 카지노 위반 행동 분석과 카지노 산업보안 증대 방안 연구)

  • Lee, Chang-Hun;Lee, Seung-Hoon
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.113-146
    • /
    • 2016
  • Criminal profiling is a effective and efficient measure for enhancing industrial security of casino business. Particularly, developing criminal profiling of deviant behaviors in casino will help security management to become more effective and efficient in practical ways. Unfortunately, however, there is lack of empirical profiling study in this regard. To fill the vacuum of literature on this topic, this study was purported to create offender profiles of different types of deviant behaviors in casino based on various theories and techniques in criminal profiling literature, such as investigative psychology, linkage analysis, and behavioral evidence analysis. To fulfill the purposes, this study collected behavioral evidence from 90 casino security officers in South Korea. Offenders' behavioral evidence was analyzed to develop offender profiles of seven different types of deviant behaviors, and then the profiles were compared with each profiles that security officers focus on to identify offenders during their work hours. Results showed that, first, there were unique profiles of each type of seven different categories of deviant behaviors in terms of offenders' ways of speaking and acting, their appearance and attitudes. In addition, this study found that there were some amount of gaps between actual offenders' profiles and profiles that security officers have in mind. Based on the results, this study provided policy implications in terms of managing casino industrial security, education and training for security officers, and future study on casino security.

  • PDF