• Title/Summary/Keyword: Cyber Protection

Search Result 246, Processing Time 0.026 seconds

A Study on the Legislation for Separate Prime Contracting in the Fire Facility Business (소방시설업의 분리발주 법제화에 관한 연구)

  • Lee, Chang Woo
    • Fire Science and Engineering
    • /
    • v.27 no.6
    • /
    • pp.97-103
    • /
    • 2013
  • This study analyzes the present public construction ordering system focussing on the legal framework for the fire facilities construction business and investigates the problem of subcontracting, and further reviews why Separate Prime Contracting should be recommended in policy, social, legislative and regulative terms. This study suggests the amendment of Fire Facilities Construction Business Act, with new bill drafting. The result of this study shows the present public construction ordering system has huge disparities between main building construction business and fire facilities construction business, and recommend Separate Prime Contracting should be adopted in the fields of fire facilities construction business. The system of Separate Prime Contracting may secure business entities' responsibility and higher quality of fire facilities, and also result in reasonable construction practices in reasonable costs. This system may also contribute to improve public safety level in fire facilities construction.

High-Speed Pattern Matching Algorithm using TCAM (TCAM을 이용한 고성능 패턴 매치 알고리즘)

  • Sung Jungsik;Kang Seok-Min;Lee Youngseok;Kwon Taeck-Geun;Kim Bongtae
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.503-510
    • /
    • 2005
  • With the increasing importance of network protection from cyber threats, it is requested to develop a multi-gigabit rate pattern matching method for protecting against malicious attacks in high-speed network. This paper devises a high-speed pattern matching algorithm with TCAM by using an m-byte jumping window pattern matching scheme. The proposed algorithm significantly reduces the number of TCAM lookups per payload by m times with the marginally enlarged TCAM size which can be implemented by cascading multiple TCAMs. Due to the reduced number of TCAM lookups, we can easily achieve multi-gigabit rate for scanning the packet payload. It is shown by simulation that for the Snort nile with 2,247 patterns, our proposed algorithm supports more than 10 Gbps rate with a 9Mbit TCAM.

A Study on the Cyber Museum Organization System for Intangible Cultural Properties I - Focused on the Information system and classification code anger - (무형문화재를 위한 사이버뮤지엄 구성체계에 관한 연구 I - 정보체계 및 분류코드화를 중심으로 -)

  • 한영호;장중식;정용섭;황복득
    • Korean Institute of Interior Design Journal
    • /
    • no.38
    • /
    • pp.266-273
    • /
    • 2003
  • The culture is a product of the century, and so a worldwide-recognized cultural legacy is like an incorporeal property owned by a country. It is a new legacy created In new environment conditions among countries. The meaning of this study is to give wider publicity to our intangible cultural properties through active database research. There are a significant number of museums that manage tangible cultural properties at a national level, but we can find that most stay very superficial in the aspects of database protection, classification system, and demonstration method. This is a critical physical factor that makes it difficult to create an information-oriented management system, or to manage intangible cultural properties as incorporeal entities. The preservation of tangible cultural properties may be a more proper approach of handing down valuable national characteristics to posterity In that they can show those characteristics more readily. Unlike tangible cultural properties, the preservation of intangible cultural properties requires a different approach and process. They are treated as a category of human cultural assets because of their incorporeity and formlessness. Since those intangible cultural properties to be preserved and quantified at a national level, it is an important consideration in the study on cultural properties. The objectives of this study are to present the intangible products by making the best use of the information society's merits; rediscover human elements constituting those products; ultimately help promote our cultural succession and development by databasing such human elements.

Study of IoT Service Strategy for Prevent Disasters (재난재해 감소를 위한 사물인터넷 서비스)

  • Yoon, YoungDoo;Choi, Hun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.11
    • /
    • pp.102-109
    • /
    • 2017
  • The Nation's Constitution stipulates that the nation should strive to prevent disasters and protect the public from harm. That is, the nation is a protector of the protection of people's lives and property from potential danger. The disasters are the most important global issues, and disasters scope are not confined to natural disasters such as pre-existing earthquakes, landslides, floods, fires and fires extend to cyber terror and disease. In the age of IoT and ability of analyze big data, the establishment of a disaster prevention service system in modern society is a priority for the nation. In this study, we will explore the disaster prevention services for each country using IoT technology. Based on the research, it is believed that it will be the foundation for establishing strategies for service system of disasters using IoT technology.

Study on the personal Information Retrieval of Smartphone Messenger Service (스마트폰 메신저 어플리케이션에서의 개인정보보호에 관한 연구)

  • Kang, Sunghoon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2013
  • The recent increase in smartphone usage has ignited the development of new applications which have changed the way of living in this internet era in the world. Almost all users which have smartphone have used many kinds of applications for lots of part. Especially, Social Network Service is the most popular part for smartphone users. The greater part of smartphone users take messenger service for smartphone. This kinds of applications provide to manage as deactivation of user or change of device. When users take to manage their information, their information would be deleted securely. If secure deletion didn't work correctly and released, their personal information can be easily abused to by others through various means such as internet phishing. In this paper, we analysis that the messenger application's management function keeps on the Personal Information Protection Act and suggest to prevent legally and technically for user's personal information and privacy.

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

Security Education Training Program Characteristics needed to Development Task of Security Software in Security Majors of 5 Universities of Seoul Region (서울지역 5개 대학 보안 전공들의 보안소프트웨어의 개발 직무에 필요한 보안 교육 훈련 프로그램 특성)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.16-22
    • /
    • 2020
  • In this paper, the technology and capabilities required for the job of developing security software recommended by the Cybersecurity Human Resources Development Framework of the National Initiative for Cybersecurity Education (NICE) were studied. In this paper, we describe what security skills are needed for the task of developing security software and what security capabilities should be held. The focus of this paper is to analyze the consistency between security technologies (core and specialized technologies) required for security software development tasks and the curriculum of information protection-related departments located in Seoul, Korea. The reason for this analysis is to see how the curriculum at five universities in Seoul is suitable for performing security software development tasks. In conclusion, if the five relevant departments studied are to intensively train developers of development tasks for security software, they are commonly required to train security testing and software debugging, how secure software is developed, risk management, privacy and information assurance.

Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology (보안성이 향상된 퍼지추출 기술 기반 사용자 인증 및 키 동의 스킴)

  • Choi, Younsung;Won, Dongho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.1-10
    • /
    • 2016
  • Information and network technology become the rapid development, so various online services supplied by multimedia systems are provided through the Internet. Because of intrinsic open characteristic on Internet, network systems need to provide the data protection and the secure authentication. So various researchers including Das, An, and Li&Hwang proposed the biometric-based user authentication scheme but they has some security weakness. To solve their problem, Li et al. proposed new scheme using fuzzy extraction, but it is weak on off-line password attack, authentication without biometrics, denial-of-service and insider attack. So, we proposed security enhanced user authentication scheme with key agreement to address the security problem of authentication schemes.

Analysis on National Economic Loss of Cyber Attack: Voice Phishing Case (사이버공격의 국가 경제적 손실분석 - 보이스 피싱을 중심으로)

  • Shin, Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2341-2346
    • /
    • 2012
  • Voice phishing against the old or weak persons have used the methods which are social engineering in the object and financial structure and function. Until recently Voice phishing from Chaina caused economic devastation and the economic loss by phishing grows with the South Koreans in the whole. Korean government and public organizations involved have been strengthening protection system and a financial security devices. But it is not easy to verify how much effects of security measures are. In this paper I will study the economic loss caused by voice phishing and potential economic effects of security measures and security device reinforcements of the Republic of Korea. Direct costs are reported about 100 million dollars and potential economic effects of voice phinshing secure measures may be around 320 million dollars.

Damage Prediction of Infomation and Communication Facilities for Prolonged Power Outage (장기간 정전사태에 대비한 기반시설-정보통신시설-에서의 피해예측)

  • Song, Chang Young;Cho, In Uh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.81-87
    • /
    • 2012
  • Critical infrastructures (energy, information technology and communications, banking, transportation, public government services, etc.) are now more vital to modern society. Citizens, businesses and governments all rely on an array of interlinked physical and information infrastructures to satisfy their needs and perform their daily operations. At the same time, these infrastructures are becoming increasingly interdependent, such that failure of one of them can often propagate and result in domino effects. Recent dramatic episodes, from 9/11 to the Madrid train bombings, the April 2010 ash cloud the power cuts in Korea in 2011, and the cyber-attacks have highlighted the need for a comprehensive, internationally coordinated policy for the protection of critical infrastructures. For the purposes of this report, we define critical infrastructure as infrastructure whose failure would result in substantial damage to society and/or the economy.