• Title/Summary/Keyword: Effectiveness

Search Result 29,318, Processing Time 0.051 seconds

A Study on Improvement of Inspection Items for Activation of the Information Security Pre-inspection (정보보호 사전점검 활성화를 위한 점검항목 개선 연구)

  • Choi, Ju Young;Kim, JinHyung;Park, Jung-Sub;Park, Choon Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.933-940
    • /
    • 2015
  • IT environments such as IoT, SNS, BigData, Cloud computing are changing rapidly. These technologies add new technologies to some of existing technologies and increase the complexity of Information System. Accordingly, they require enhancing the security function for new IT services. Information Security Pre-inspection aims to assure stability and reliability for user and supplier of new IT services by proposing development stage which considers security from design phase. Existing 'Information Security Pre-inspection' (22 domains, 74 control items, 129 detail items) consist of 6 stage (Requirements Definition, Design, Training, Implementation, Test, Sustain). Pilot tests were executed for one of IT development companies to verify its effectiveness. Consequently, for some inspection items, some improvement requirements and reconstitution needs appeared. This paper conducts a study on activation of 'Information Security Pre-inspection' which aims to construct prevention system for new information system. As a result, an improved 'Information Security Pre-inspection' is suggested. This has 16 domains, 54 inspection items, 76 detail items which include some improvement requirements and reconstitution needs.

A Basic Study on Prediction Module Development of Collision Risk based on Ship's Operator's Consciousness (선박운항자 의식 기반 충돌 위험도 예측 모듈 개발에 관한 연구)

  • Park, Young-Soo;Park, Sang-Won;Cho, Ik-Soon
    • Journal of Navigation and Port Research
    • /
    • v.39 no.3
    • /
    • pp.199-207
    • /
    • 2015
  • In ports of Korea, the marine traffic flow is congested due to a large number of vessels coming in and going out. In order to improve the safety and efficiency of these vessels, South Korea is operating with a Vessel Traffic Service System, which is monitoring its waters for 24 hours. However despite these efforts of the VTS (Vessel Traffic Service) officers, collisions are occurring continuously, the risk situation is analyzed that occurs once in about 20 minutes, the risk may be greater. It investigated to reduce these accidents by providing a safety standard for collision danger in a timely manner. Thus, this study has developed a risk prediction module to predict risk in advance. This module can avoid collision risk to adjust the speed and course of ship using a risk evaluation model based on ship operator's risk perspective. Using this module, the ship operators and VTS officers can easily be identified risks in complex traffic situations, so they can take an appropriate action against danger in near future including course and speed change. To verify the effectiveness of this module, this paper predicted the risk of each encounter situation and confirmed to be capable of identifying a risk changes in specific course and speed changes at Busan coastal water.

Marine Finance and Port Logistics Industry's Development Schemes as a Creative-type Service Industry (해양금융과 항만물류산업의 발전방안 연구 -창조형 서비스산업을 근간으로-)

  • Gim, Jin-goo;Oh, Hak-Gyun;Lee, Jin-Joo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.183-185
    • /
    • 2014
  • The purpose of this paper aims at contributing to the national economic development through global competitiveness enhancement by marine finance's hub and marine logistics cluster by finance specialization and finance support as a creative-type service industry in global shipping port logistics. This study adopted the integrated approach and applied it to policy implementation to achieve the effectiveness. Creative-type marine finance development stages as a tool of policy implementation and the guide line for the time of policy implementation are followed by Stage 1(Construction & Growth Policy) for 2013~2016, Stage 2(Forstering & Activation Policy) for 2017~2019) and Stage 3(Continuous Development Policy) after 2020 until its completion. Korea has the inferiority over the competitiveness in global marine finance and needs a strategic approach to secure the liquidity of marine finance; interim, Islamic finance has been come to the force as a new alternative in financial transaction being accompanied by a spot transaction since the crisis of global finance. In order to create a potential slack of Korea in marine finance practice, in addition, this study suggests a consortium with the circle of Islamic finance as a clue of an easier policy implementation at the beginning stage.

  • PDF

Load balancing of a deployment server using P2P (P2P를 이용한 배포 서버의 부하 분산)

  • Son Sei-Il;Lee Suk-Kyoon
    • The KIPS Transactions:PartA
    • /
    • v.13A no.1 s.98
    • /
    • pp.45-52
    • /
    • 2006
  • To perform on-line maintenance for Distributed Information System, it is indispensable to disseminate files to participant nodes in the network. When users' requests for file deployment occur simultaneously in a short period a deployment server falls into overload phase, which is often called Flash Crowds. h common solution to avoid Flash Crowds is to increase hardware capacity. In this paper, we propose a software solution based on P2P, which does not cost any additional expense. In the proposed solution, nodes in the network are grouped into subnetworks one of which is composed of only neighboring nodes. In each subnetwork, copies of deployment files can be transferred to each other. Consequently, it brings about the effect of load balancing in deployment server. To raise the effectiveness, target files for deployment are packed into one package. Before being transferred, each package is divided into multiple equal-sized segments. A deployment server in a normal phase transmits a package requested from nodes in segment units. However a deployment server is overloaded, if segments already exist in the subnetwork participant nodes in the subnetwork receive necessary segments from neighboring nodes. In this paper, we propose data structures and algorithm for this approach and show performance improvement through simulation.

Technical Issues and Solutions for Developing IoT Applications (IoT 애플리케이션 개발의 기술적 이슈 및 솔루션)

  • Shin, Dong Ha;Han, Seung Ho;La, Hyun Jung;Kim, Soo Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.3
    • /
    • pp.99-110
    • /
    • 2015
  • Internet-of-Things(IoT) is the computing paradigm converged with different technologies, where diverse devices are connected via the wireless network, acquire environmental information from their equipped sensors, and actuated. IoT applications typically provide smart services to users by interacting with multiple devices connected to the network and are designed by integrating multiple technologies such as sensor network, communication technologies, and software engineering. Moreover, since the concept of IoT has been introduced recently, most of the researches are in the beginning step, which is too early to be practically applied. Due to these facts, developing IoT application results in unconventional technical challenges which have not been observed in typical software applications. And, it is not straightforward to apply conventional project guidelines to IoT application development projects. Hence, there can be many difficulties to successfully complete the projects. Therefore, for successful completion of the projects, we analyze technical challenges occurring in all phases of the project lifecycle, i.e. project preparation stage and development stage. And, we propose the effective solutions to overcome the issues. To verify identified issues and presented solutions, we present the result of applying the solutions to an IoT application development. Through the case study, we evaluate how reasonable the unconventional technical issues are generated and analyze effectiveness of applying the solutions to the application.

Suggestion of a Basis Color and Standardization for Observing a Person's Face Color of Ocular Inspection (한방 망진의 찰색을 위한 표준화 및 색 기준 설정안의 제안)

  • Lee, Se-Hwan;Kim, Bong-Hyun;Cho, Dong-Uk
    • The KIPS Transactions:PartB
    • /
    • v.15B no.5
    • /
    • pp.397-406
    • /
    • 2008
  • Despite the effectiveness of oriental medical practice in the diagnosis of symptoms and providing cure to it, the preferences in western medicinal values is socially prevalent. The diagnosis of a disease using western medicinal practices provides us with an objective diagnostic result, however, decisions by oriental doctors are based on their heuristic intuitions developed by practice and experience. Objective solutions for the cure of symptoms using oriental medical therapy can have a high impact on the world market. Therefore, development of diagnostic machines based on oriental therapy can enhance the Ocular Inspection which is evaluated as one of the best diagnostic treatment among Oriental Medical Science, is not researched much compared to other diagnoses. Because there is no color diagnosis rules for digital machines to analyze the actual color, looking at the person's face color is one of the most important components to diagnose the disease or illness. The thesis proposes the implementation of absolute observing a person's face color standards of the color settings for objective diagnosis. As a results, comparative digital color analysis for observing a person's face color can be the most effective rule based Color scheme system to diagnose disease. A standard solution for the researching conditions is suggested to reduce the variable which may occur depending on the differences between the researching conditions.

Distributed Contents Delivery Network based on Home gateway for a Sustainable Service (안정적인 서비스를 위한 홈 게이트웨이 기반의 분산 컨텐츠 전송 네트워크)

  • Kim, Myung-Won;Yoon, Young-Hyo;Ko, Joong-Sik;Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartA
    • /
    • v.15A no.5
    • /
    • pp.249-258
    • /
    • 2008
  • DCDN(Distributed Contents Delivery Network) as known the next generation of CDN is to exploit the resource of client PCs based on P2P technology to provide low cost, high scalability and high speed services when contents are delivered. This DCDN has two problems. One is that DCDN can't provide a sustainable service because client PCs are on/off irregularly and their on times tend to focus on specific time zone, and the other is that client PCs can not be accessed outside in DCDN if they are behind NAT or Firewall. In this paper, we present a distributed contents delivery network based on home gateway for a sustainable service. If home gateway is used in DCDN instead of client PC, it can solve the two existing problems of DCDN. That is, home gateway can provide a sustainable service because it is on during all day and it is not behind NAT and Firewall. The proposed method is implemented with ASUS WL-500GP, a wired/wireless router. Experimental results show the effectiveness of the proposed method compared to the existing method of DCDN.

Microarchitectural Defense and Recovery Against Buffer Overflow Attacks (버퍼 오버플로우 공격에 대한 마이크로구조적 방어 및 복구 기법)

  • Choi, Lynn;Shin, Yong;Lee, Sang-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.3
    • /
    • pp.178-192
    • /
    • 2006
  • The buffer overflow attack is the single most dominant and lethal form of security exploits as evidenced by recent worm outbreaks such as Code Red and SQL Stammer. In this paper, we propose microarchitectural techniques that can detect and recover from such malicious code attacks. The idea is that the buffer overflow attacks usually exhibit abnormal behaviors in the system. This kind of unusual signs can be easily detected by checking the safety of memory references at runtime, avoiding the potential data or control corruptions made by such attacks. Both the hardware cost and the performance penalty of enforcing the safety guards are negligible. In addition, we propose a more aggressive technique called corruption recovery buffer (CRB), which can further increase the level of security. Combined with the safety guards, the CRB can be used to save suspicious writes made by an attack and can restore the original architecture state before the attack. By performing detailed execution-driven simulations on the programs selected from SPEC CPU2000 benchmark, we evaluate the effectiveness of the proposed microarchitectural techniques. Experimental data shows that enforcing a single safety guard can reduce the number of system failures substantially by protecting the stack against return address corruptions made by the attacks. Furthermore, a small 1KB CRB can nullify additional data corruptions made by stack smashing attacks with only less than 2% performance penalty.

An Adaptive Server Clustering for Terminal Service in a Thin-Client Environment (썬-클라이언트 환경에서의 터미널 서비스를 위한 적응적 서버 클러스터링)

  • Jung Yunjae;Kwak Hukeun;Chung Kyusik
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.582-594
    • /
    • 2004
  • In school PC labs or other educational purpose PC labs with a few dozens of PCs, computers are configured in a distributed architecture so that they are set up, maintained and upgraded separately. As an alternative to the distributed architecture, we can consider a thin-client computing environment. In a thin-client computing environment, client side devices provide mainly I/O functions with user friendly GUI and multimedia processing support whereas remote servers called terminal server provide computing power. In order to support many clients in the environment, a cluster of terminal servers can be configured. In this architecture, it is difficult due to the characteristics of terminal session persistence and different pattern of computing usage of users so that the utilization of terminal server resources becomes low. To overcome this disadvantage, we propose an adaptive terminal cluster where terminal servers ,ire partitioned into groups and a terminal server in a light-loaded group can be dynamically reassigned to a heavy-loaded group at run time. The proposed adaptive scheme is compared with a generic terminal service cluster and a group based non-adaptive terminal server cluster. Experimental results show the effectiveness of the proposed scheme.

Effect of Security Manager's Servant Leadership on the Cohesion and Organization Outcome (시큐리티 관리자의 서번트 리더십이 응집력 및 조직성과에 미치는 영향)

  • Park, Young-Man
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.378-388
    • /
    • 2011
  • The purpose of this study is to clarify the impact on cohesiveness and organizational performance of the servant leadership of the security manager. The subjects of study selected final 287 persons by using the systematic random sampling for security companies in Seoul in 2009. However, the number of cases used in the final analysis is 256 persons. Reliability of the questionnaire used in this study showed that the value of Cronbach's ${\alpha}$ was above 0.796. The collected data used the methods such as factor analysis, reliability analysis, and multiple regression analysis etc. by using SPSSWIN 17.0. The conclusions are as follows. First, servant leadership has a positive impact on cohesiveness. Second, one of the factors of servant leadership, trust, has a positive impact on organizational performance. Third, individual, social cohesiveness and group cohesiveness among the factors of cohesiveness have a positive impact on organizational performance. Fourth, with the results of path analysis, servant leadership has direct impact on organizational effectiveness and indirect impact through cohesiveness. In other words, a servant leadership among the leaderships that a security worker is conscious of administrator affects cohesiveness and organizational performance in management to promote the management of the organization.