• 제목/요약/키워드: Cyber space

검색결과 476건 처리시간 0.022초

A study of Effect of Information Security Management System [ISMS] Certification on Organization Performance (정보보호관리체계[ISMS] 인증이 조직성과에 미치는 영향에 관한 연구)

  • Bae, Young-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제13권9호
    • /
    • pp.4224-4233
    • /
    • 2012
  • As Internet usage is rapidly spreading, tasks that were only possible offline are now available in cyber space but at the same time, new security threats such as hacking and viruses have also increased. For that reason, Comprehensive and methodical information security systems are therefore required in enterprises and organizations. Consequently, the Information Security Management System certification system has been in effect in Korea since July 2001. As of December 2012, 130 enterprises have been certified, and more than 120 ISO27001 certifications have been issued. As such, since the introduction of the ISMS certification system in Korea, the demand for the certification has been steadily increasing, and it is now recognized as an integral part of maintaining the competitiveness in an enterprise. However, the qualitative aspects of certification regarding the effectiveness of ISMS have been continuously questioned by actual customers. In order to clarify the situation and remove such doubts, this study will substantiate the fact that development and certification of ISMS positively affect the business performance of enterprises so that they will recognize the effect of obtaining ISMS certification and eventually prevent security accidents and improve their business performance by developing ISMS.

Automatic Binary Execution Environment based on Real-machines for Intelligent Malware Analysis (지능형 악성코드 분석을 위한 리얼머신 기반의 바이너리 자동실행 환경)

  • Cho, Homook;Yoon, KwanSik;Choi, Sangyong;Kim, Yong-Min
    • KIISE Transactions on Computing Practices
    • /
    • 제22권3호
    • /
    • pp.139-144
    • /
    • 2016
  • There exist many threats in cyber space, however current anti-virus software and other existing solutions do not effectively respond to malware that has become more complex and sophisticated. It was shown experimentally that it is possible for the proposed approach to provide an automatic execution environment for the detection of malicious behavior of active malware, comparing the virtual-machine environment with the real-machine environment based on user interaction. Moreover, the results show that it is possible to provide a dynamic analysis environment in order to analyze the intelligent malware effectively, through the comparison of malicious behavior activity in an automatic binary execution environment based on real-machines and the malicious behavior activity in a virtual-machine environment.

A Study on the Inter-constructive Design Dictionary through the Internet. (인터넷을 통한 상호구축적 디자인 용어사전의 연구)

  • 김태균
    • Archives of design research
    • /
    • 제14권4호
    • /
    • pp.25-33
    • /
    • 2001
  • With the increasing access to the internet, the number of designers who rely on internet to use information on design is on the rise. Therefore common dictionary of design terminology need to be formed and shared among designers. To do so, internet is very useful medium. However as relating terminology increases rapidly through interactivity among designers, it will be far from taking full advantage of features of internet to set up and provide such information unilaterally on internet. This indicates that providing data on the internet, not via traditional books, requires in-depth study on process of establishment of database structure and appropriate interface design. Thus this study will show design terms database model that harnesses internet feature that enables establishment of information spontaneously through user's interactivity, departing from a model that conveys information unilaterally. This report summarized and analyzed various models and suggested classification system in accordance with user's learning cognition. Problems on existing dictionary of design terminology were identified and new methods addressing such problems were exploited. In a word, this report is intended to propose user oriented inter-constructive database model that highlights high level of openness and interactivity by enabling changes of text in the cyber space and encouraging user to participate in making design dictionary.

  • PDF

A Study on Technique Vowing of Roads and Buildings for Spatial Information Management of Cyber Urban Area (가상도시의 공간정보관리를 위한 도로 및 건물의 시각화 기법의 연구)

  • 연상호
    • The Journal of the Korea Contents Association
    • /
    • 제1권1호
    • /
    • pp.15-23
    • /
    • 2001
  • It is difficult to figure out the specific contents of the buildings in the internet spatial area, since those data on the internet present only the location of buildings and the outlines of lands on which buildings are located, An experimental study for the view management of building information at internet urban spatial area was conducted on the Web-GIS based map using hyper map. With the building information on the 2-D map, modified from the previous numerical map and the regional building information and additional information, a new form of building through 3-D icons was shown on the internet spatial area. This study shows the Web-based building management system, which is designed to manage attribute data about hyper-linked buildings of 2.5-D icons and to reproduce visual building information by putting a variety of information into hyper-linked icons on the hyper map. This system not only complements the lack of consistency between real buildings and those on the map, but also provides users with more familiar urban space, so that everybody can utilize the building information as long as he has access to the internet.

  • PDF

Methodology for Automate Negotiation for Order Transaction of Injection Mold Manufacturer (사출금형제조업체의 주문처리를 위한 자동협상방법론)

  • 박영재;최형림
    • Journal of Intelligence and Information Systems
    • /
    • 제10권1호
    • /
    • pp.47-63
    • /
    • 2004
  • Today, there are several markets in cyber space where companies trade electronically due to the development of Information Technology. On the other hand, the most important thing in trades is negotiation. So, in order to support current business practices as well as new ones on the Internet, electronic commerce systems need an ability to negotiate. In this paper, proposed is a method by which a seller can be supported by an agent which plays a role in negotiation process among small and medium companies especially injection mold manufacturer. If the manufacturing capacity cannot afford to produce all orders, the manufacturer may want to extend due dates and the buyers may want to discount prices. The negotiation agent discussed in this paper cooperates with the schedule agent to get due-date information, and performs a role in one (seller)-to-many (buyer) negotiation processes.

  • PDF

Posture Analysis of Workers in an Excavator Factory Using 3D Human Simulation (3D 작업자 시뮬레이션을 이용한 굴삭기 생산공정 작업자 자세분석)

  • Moon, Dug-Hee;Baek, Seung-Geun;Zhang, Bing-Lin;Lee, Jun-Seok
    • Journal of the Korea Society for Simulation
    • /
    • 제15권3호
    • /
    • pp.93-101
    • /
    • 2006
  • Recently, work-related musculoskeletal disorders (WMSDs) become a hot issue in the industrial fields. To prevent the potential risk of workers, various approaches have been adopted. One of the approaches is to improve the design of product, that of jig (or fixture) and that of workstation in the early stage of the development. 3D simulation technology is known as the powerful method for detecting such problems before constructing the workstation, because it is possible to evaluate the posture of worker using 3D models in a cyber space. It enables to find the unexpected problems and save the time and cost for redesign and rework. This paper introduces a 3D simulation case study of workers in an excavator factory. 3D models of products, jigs were developed with CATIA. The assembly processes were animated in IGRIP and DPM. Finally the various postures of worker were simulated using Human. As a result, some postures were analysed as the risky jobs and the result of simulation was used to improve the system.

  • PDF

A Design and Implementation of the Cyber Fossil Museum Based on WWW (웹 기반 사이버 화석 박물관의 설계 및 구현)

  • Han, Seol-Heum;Choi, Yong-Yub;Hong, Sung-Soo
    • Journal of The Korean Association of Information Education
    • /
    • 제2권2호
    • /
    • pp.278-285
    • /
    • 1998
  • Computer users frequently request large scale multimedia data such as images. voice, video rather than conventional formal data. Data in virtual fossil museum are represented as points, shape, location in multidimensional space and interrelation with other spatial object. Informations in virtual fossil museum should be maintained to manipulate spatial object and non-spatial object. In this report we propose virtual fossil museum which is consisted of two parts. In the first step, basic system is implemented in internet for non-specialist such as primary students. This system is implemented based on visual multimedia information system so that non-specialist about computer can access easily. In the second step, expert system is designed which allows computer users can store, magnify, reduce, and retrieve the spatial data. This expert system uses animation, spatial query and VRML.

  • PDF

A Simple Toeplitz Channel Matrix Decomposition with Vectorization Technique for Large scaled MIMO System (벡터화 기술을 이용한 대규모 MIMO 시스템의 간단한 Toeplitz 채널 행렬 분해)

  • Park, Ju Yong;Hanif, Mohammad Abu;Kim, Jeong Su;Song, Sang Seob;Lee, Moon Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • 제51권9호
    • /
    • pp.21-29
    • /
    • 2014
  • Due to enormous number of user and limited memory space, the memory saving is become an important issue for big data service these days. In the large scaled multiple-input multiple-output (MIMO) system, the Teoplitz channel can play the significance rule to improve the performance as well as power efficiency. In this paper, we propose a Toeplitz channel decomposition based on matrix vectorization. Here we use Toeplitz matrix to the channel for large scaled MIMO system. And we show that the Toeplitz Jacket matrices are decomposed to Cooley-Tukey sparse matrices like fast Fourier transform (FFT).

Intelligence Type Electronic Medical Examination Chart and Data Treatment of Cyber Doctor to Interconnect ASP and SQL (ASP와 SQL을 연동한 사이버닥터의 지능형 전자진료차트와 데이터처리)

  • Kim Seok-Soo
    • Journal of Digital Contents Society
    • /
    • 제4권1호
    • /
    • pp.57-66
    • /
    • 2003
  • This paper presents the content regarding electronic medical examination chart and data treatment for efficient medical examination and prompt treatment by realizing mutual conversation type remote medical examination system among 3 parties(patient, doctor, pharmacist) on internet base. This is an intelligence type remote medical examination system for both on-line and off-line mode to transcend time and space on the web being participated by anybody, which is cheap type to solve problems in existing remote medical examination system such as high price based on hardware, incompatibility, and so on. By interconnecting ASP and SQL on IIS 4.0 web server, database enables system integration for efficient data processing, on-line consultation between patient and doctor, medical examination on off-line, transmission of medical prescription to pharmacist designated by patient and preparation of medicine, semi-eternal storage of medical examination data owing to storage and search of medical examination data, exact medical examination and prescription using this medical examination data by patient and doctor, and so on.

  • PDF

Data Fusion Algorithm based on Inference for Anomaly Detection in the Next-Generation Intrusion Detection (차세대 침입탐지에서 이상탐지를 위한 추론 기반 데이터 융합 알고리즘)

  • Kim, Dong-Wook;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • 제26권3호
    • /
    • pp.233-238
    • /
    • 2016
  • In this paper, we propose the algorithms of processing the uncertainty data using data fusion for the next generation intrusion detection. In the next generation intrusion detection, a lot of data are collected by many of network sensors to discover knowledge from generating information in cyber space. It is necessary the data fusion process to extract knowledge from collected sensors data. In this paper, we have proposed method to represent the uncertainty data, by classifying where is a confidence interval in interval of uncertainty data through feature analysis of different data using inference method with Dempster-Shafer Evidence Theory. In this paper, we have implemented a detection experiment that is classified by the confidence interval using IRIS plant Data Set for anomaly detection of uncertainty data. As a result, we found that it is possible to classify data by confidence interval.