• Title/Summary/Keyword: Convergence security

Search Result 3,410, Processing Time 0.03 seconds

Development of an Industrial Control System Information Security Management System Program (산업제어시스템 정보보안 관리체계 프로그램 개발)

  • Chun, Se-In;Joo, Soyoung;Kim, Min-Ju;Baek, Ji-Yeon;Shin, Jaeun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.397-400
    • /
    • 2019
  • 주요기반시설 산업제어시스템의 운영환경 변화에 따라 보안 위협의 양상이 다양해지고 있다. 따라서 이를 반영한 보안 관리체계가 새로이 요구된다. 이에 본 논문은 미국 을 참조한 산업제어시스템의 정보보안 관리체계 프로그램을 제안한다. 프로그램의 기능은 다음과 같다. 첫째, 산업제어시스템 자산 관리 기능, 둘째, 보안상태 평가 기능, 셋째, 보안조치 관리 기능이다. 해당 프로그램을 통해 국내 산업제어시스템의 보안 수준 향상을 기대한다.

Abnormal Object Detection-based Video Synopsis Framework in Multiview Video (다시점 영상에 대한 이상 물체 탐지 기반 영상 시놉시스 프레임워크)

  • Ingle, Palash Yuvraj;Yu, Jin-Yong;Kim, Young-Gab
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.213-216
    • /
    • 2022
  • There has been an increase in video surveillance for public safety and security, which increases the video data, leading to analysis, and storage issues. Furthermore, most surveillance videos contain an empty frame of hours of video footage; thus, extracting useful information is crucial. The prominent framework used in surveillance for efficient storage and analysis is video synopsis. However, the existing video synopsis procedure is not applicable for creating an abnormal object-based synopsis. Therefore, we proposed a lightweight synopsis methodology that initially detects and extracts abnormal foreground objects and their respective backgrounds, which is stitched to construct a synopsis.

A Study on Privacy by Design and Usable Security for Biometric Authentication (생체인증을 위한 프라이버시 중심 설계와 보안사용성에 대한 연구)

  • Moon, Jung-Hyun;Kim, Ye-Eun;Choi, Su-Bin;Lee, Il-Gu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.305-308
    • /
    • 2021
  • 최근 편리하고 안전한 생체인증 기술이 핀테크 서비스의 필수 구성요소가 되고 있다. 그러나 생체인증의 보안성과 정확도 향상을 위해 많은 양의 생체 정보를 활용한다면 연산과정이 복잡해져서 속도 저하와 개인정보 유출 가능성이 높아지고, 실시간성을 제공하기 위해 생체 정보의 일부만 샘플링하여 활용하는 경우에는 보안성과 정확도가 열화되는 Trade-off 문제가 있다. 종래의 생체인증 기술은 메타데이터를 이용한 필터링의 경우 데이터 간의 상관성이 고려하지 않아서 개인정보보호와 사용자 편의성에 한계가 있었다. 본 연구에서는 상관성 높은 데이터를 활용하여 프라이버시 중심의 생체인증 설계와 보안사용성을 향상시키는 방안을 제안한다.

'Economic Security' Discourse Analysis Using Text Mining (텍스트 마이닝을 활용한 '경제안보' 담론 분석)

  • Jungjoo Oh;Yeram Lim;Hyesu Cheon;Wonhyung Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.513-516
    • /
    • 2024
  • 미·중 기술 패권 경쟁이 심화되면서 경제안보는 국가안보의 핵심 요소로 부상하였다. 주요국들은 각국이 도입한 경제안보 개념에 따라 입법과 정책을 추진하고 있다. 그러나 우리나라에서 경제안보 개념은 아직까지 불분명한 상황이다. 이에 본 연구는 국내 뉴스 빅데이터를 통해 경제안보 관련 담론을 파악하여 한국식 경제안보 개념화를 위한 토대를 만드는 것을 목적으로 하였다. 빅카인즈를 통해 경제안보 관련 뉴스 기사를 수집하고 텍스트 마이닝을 활용하여 분석하였다. TF-IDF 분석과 LDA 토픽 모델링이 분석에 활용되었다. 그 결과 세 개의 주요 토픽이 도출되었고, 경제안보의 이중 구조를 확인할 수 있었다. 본 연구는 향후 한국식 경제안보를 개념화하고 그에 대한 전략을 마련하기 위한 기초자료로 활용할 수 있을 것으로 기대한다.

A Scheme of Security Drone Convergence Service using Cam-Shift Algorithm (Cam-Shift 알고리즘을 이용한 경비드론 융합서비스 기법)

  • Lee, Jeong-Pil;Lee, Jae-Wook;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.5
    • /
    • pp.29-34
    • /
    • 2016
  • Recently, with the development of high-tech industry, the use of the drones in various aspects of daily life is rapidly advancing. With technical and functional advancements, drones have an advantage of being easy to be utilized in the areas of use according to various lifestyles. In addition, through the diversification of the drone service converged with image processing medium such as camera and CCTV, an automated security system that can replace humans is expected to be introduced. By designing these unmanned security technology, a new convergence security drone service techniques that can strengthen the previous drone application technology will be proposed. In the proposed techniques, a biometric authentication technology will be designed as additional authentication methods that can determine the safety incorporated with security by selecting the search and areas of an object focusing on the objects in the initial windows and search windows through OpenCV technology and CAM-Shift algorithm which are an object tracking algorithm. Through such, a highly efficient security drone convergence service model will be proposed for performing unmanned security by using the drones that can continuously increase the analysis of technology on the mobility and real-time image processing.

Problem Analysis and Countermeasures Research through Security Threat Cases of Physical Security Control Systems (물리보안 관제시스템의 보안위협 사례를 통한 취약점 분석 및 대응방안 연구)

  • Ko, Yun Seong;Park, Kwang Hyuk;Kim, Chang Soo
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.1
    • /
    • pp.51-59
    • /
    • 2016
  • Physical security protecting people from physical threats, such as a person or vehicle, has received a great attention. However, it has many risks of hacking and other security threats because it is highly dependent on automated management systems. In addition, a representative system of physical security, a CCTV control system has a high risk of hacking, such as video interceptions or video modulation. So physical security needs urgent security measures in accordance with these threats. In this paper, we examine the case of security threats that have occurred in the past, prevent those from threatening the physical security, and analyze the security problem with the threats. Then we study the countermeasures to prevent these security threats based on the problems found in each case. Finally we study for the method to apply these countermeasures.

Security Operation Dashboard Design by Blockade-Detection-Response (봉쇄-탐지-대응 기반 보안관제 대시보드 설계)

  • Han, Choong-Hee
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.39-47
    • /
    • 2021
  • Standardization of the security operation dashboard is essential for efficient operation of security operation center. The security operation dashboard should be configured so that it is widely used by security operation workers who have to live together 24 hours a day, 365 days a year. In addition, it must be able to comprehensively express the business activities of the security operation center. In addition, it should be possible to easily explain the business activities of the security operation center. Therefore, in this paper, we would like to explain the design of a security control dashboard based on blockade, detection, and response that is actually applied to case organizations in the power sector. Through this, it is intended to reduce the effort and time required for configuring a custom dashboard for VIPs, and contribute to the efficient operation of the security operation center.

A Study on IoT Devices Vulnerability and Security (IoT 디바이스 보안위협 및 대응방안 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.9-17
    • /
    • 2021
  • Numerous IoT devices are connected to a wireless network environment to collect and transmit data without time and space limitations, but many security vulnerabilities are exposed in these process. But IoT security is not easy to create feasible security standards and device authentication due to differences in the approach or implementation of devices and networks. However, it is clear that the improvement and application of the standard framework for enhancing the security level of the device is the starting point to help the most successful security effect. In this study, we investigate the confidentiality, integrity, availability, and access control implementation plans for IoT devices (which are the basic goals of information security), and standardized security evaluation criteria for IoT devices, and study ways to improve them.

A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services (융합서비스를 위한 클라우드 컴퓨팅 환경에서 가상화 보안에 관한 연구)

  • Lee, Bo-Kyung
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.93-99
    • /
    • 2014
  • Cloud computing refers to borrow IT resources as needed by leveraging Internet technology and pay as much as you used by supporting real-time scalability depending on the service load. Virtualization which is the main technology of cloud computing is a technology that server, storage and hardware are regarded as not separate system but one system area and are allocated as needed. However, the security mechanisms provided by virtualized environments are difficult to cope with the traditional security mechanisms, having basic levels of visibility, control and audit function, on which the server is designed to monitor the traffic between the servers. In this paper, the security vulnerabilities of virtualization are analysed in the cloud computing environment and cloud virtualization security recommendations are proposed.

A Study on the Effect of Digital Literacy Education in Personal Information Security Perception (디지털리터러시 교육이 개인 정보 보안 인식에 미치는 영향 연구)

  • Kwon, Jungin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.161-167
    • /
    • 2020
  • Convergence ethics education for digital culture in cyberspace is limited to specific areas such as personal information and copyright. Education on the ability to accept information and provide information in cyberspace in which digital natives communicate, share and exchange is inadequate. As a result, the dysfunction of abusing the personal information of others without recognizing the importance of information security has recently emerged as a social problem. In this study, among digital netizen who communicate and exchange information the most in cyberspace, digital literacy education was conducted for students in the first and second grades of university, and then they investigated the change in information security perception. Based on this, we intend to prepare fundamental measures for systematic cultivation of digital literacy education necessary for the Digital Cultural Society.