• Title/Summary/Keyword: Full security

Search Result 298, Processing Time 0.05 seconds

Study on Automation of Comprehensive IT Asset Management (포괄적 IT 자산관리의 자동화에 관한 연구)

  • Wonseop Hwang;Daihwan Min;Junghwan Kim;Hanjin Lee
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • The IT environment is changing due to the acceleration of digital transformation in enterprises and organizations. This expansion of the digital space makes centralized cybersecurity controls more difficult. For this reason, cyberattacks are increasing in frequency and severity and are becoming more sophisticated, such as ransomware and digital supply chain attacks. Even in large organizations with numerous security personnel and systems, security incidents continue to occur due to unmanaged and unknown threats and vulnerabilities to IT assets. It's time to move beyond the current focus on detecting and responding to security threats to managing the full range of cyber risks. This requires the implementation of asset Inventory for comprehensive management by collecting and integrating all IT assets of the enterprise and organization in a wide range. IT Asset Management(ITAM) systems exist to identify and manage various assets from a financial and administrative perspective. However, the asset information managed in this way is not complete, and there are problems with duplication of data. Also, it is insufficient to update of data-set, including Network Infrastructure, Active Directory, Virtualization Management, and Cloud Platforms. In this study, we, the researcher group propose a new framework for automated 'Comprehensive IT Asset Management(CITAM)' required for security operations by designing a process to automatically collect asset data-set. Such as the Hostname, IP, MAC address, Serial, OS, installed software information, last seen time, those are already distributed and stored in operating IT security systems. CITAM framwork could classify them into unique device units through analysis processes in term of aggregation, normalization, deduplication, validation, and integration.

Difference of Recognition of Subject and Device of Improvement in Security Activity of International Conference between Security Agency and Great-Sphere Self-Governing Body (국제회의 안전활동에 있어서 공안기관과 광역지자체간의 문제인식 차이 및 제고방안 -부산 APEC 행사를 중심으로-)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.389-412
    • /
    • 2007
  • This study's purpose is to present the improvement of effectiveness of security activity for international conference which can be held hereafter. On the basis of security activity problems originating in APEC that had been held in Pusan in 2005. I made up questions three times to on the members of the police, military, fire figher and Busan city civil servants who had participated in Busan APEC and recognition of possible problem and possibility of improvement on each item of questions was analyzed by Delphi Method. Also interviews with 4 security experts selected from each security agency were conducted to present improvement in each part of problem. The study result is as follows; First, the satisfactory cooperation between security agencies and self-governing body is needed for the basis of security activity in preparatory stage. Second, examining thoroughly security activity by function in activity stage. Third, giving full play to their genius by close cooperation between security agencies and self-governing body in enfourcement stage. Fourth, provision for events after this on the basis of effective estimation system in evaluation stage.

  • PDF

A Study on the Present Condition and Development Directions for Youth Allied Organization (청소년관련단체의 현황과 발전방향)

  • Lim, Hyung-Baek;Lee, Chang-Seek;Yang, Seung-Choon
    • Journal of Agricultural Extension & Community Development
    • /
    • v.9 no.1
    • /
    • pp.61-73
    • /
    • 2002
  • The objectives of this study were to explore the present condition and development direction of youth allied organizations such as Korea 4-H Club Federation, Clover Alumni Association and Korea 4-H Association. Researcher developed questionnaires were used to identify historical changes, present condition and development directions of the youth allied organizations. The data were collected from 105 purposively sampled representatives from the youth allied organizations, and SPSS/WIN program was employed to analyze the data. Major problems of the youth allied organization, according to the respondents, were financial difficulties and lack of full-time employee for the organizations. It was recommended that more full-time employees would be necessary for further development of youth allied organizations. Securing wider membership throughout the country and financial security were recommended for development of the youth allied organizations.

  • PDF

Security Analysis of Block Cipher MD-64 Suitable for Wireless Sensor Network Environments (무선 센서 네트워크 환경에 적합한 블록 암호 MD-64에 대한 안전성 분석)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.865-870
    • /
    • 2011
  • MD-64 is a 64-bit block cipher suitable for the efficient implementation in hardware environments such as WSN. In this paper, we propose a related-key amplified boomerang attack on the full-round MD-64. The attack on the full-round MD-64 requires $2^{45.5}$ related-key chosen plaintexts and $2^{95}$ MD-64 encryptions. This work is the first known cryptanalytic result on MD-64.

Improving Elasticsearch for Chinese, Japanese, and Korean Text Search through Language Detector

  • Kim, Ki-Ju;Cho, Young-Bok
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.33-38
    • /
    • 2020
  • Elasticsearch is an open source search and analytics engine that can search petabytes of data in near real time. It is designed as a distributed system horizontally scalable and highly available. It provides RESTful APIs, thereby making it programming-language agnostic. Full text search of multilingual text requires language-specific analyzers and field mappings appropriate for indexing and searching multilingual text. Additionally, a language detector can be used in conjunction with the analyzers to improve the multilingual text search. Elasticsearch provides more than 40 language analysis plugins that can process text and extract language-specific tokens and language detector plugins that can determine the language of the given text. This study investigates three different approaches to index and search Chinese, Japanese, and Korean (CJK) text (single analyzer, multi-fields, and language detector-based), and identifies the advantages of the language detector-based approach compared to the other two.

Security Analysis of Block Cipher KT-64 (블록 암호 KT-64에 대한 안전성 분석)

  • Kang, Jin-Keon;Jeong, Ki-Tae;Lee, Chang-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.55-62
    • /
    • 2012
  • KT-64 is a 64-bit block cipher which use CSPNs suitable for the efficient FPGA implementation. In this paper, we propose a related-key amplified boomerang attack on the full-round KT-64. The attack on the full-round KT-64 requires $2^{45.5}$ related-key chosen plaintexts and $2^{65.17}$ KT-64 encryptions. This work is the first known cryptanalytic result on KT-64.

Cloud-based Full Homomorphic Encryption Algorithm by Gene Matching

  • Pingping Li;Feng Zhang
    • Journal of Information Processing Systems
    • /
    • v.20 no.4
    • /
    • pp.432-441
    • /
    • 2024
  • To improve the security of gene information and the accuracy of matching, this paper designs a homomorphic encryption algorithm for gene matching based on cloud computing environment. Firstly, the gene sequences of cloud files entered by users are collected, which are converted into binary code by binary function, so that the encrypted text is obviously different from the original text. After that, the binary code of genes in the database is compared with the generated code to complete gene matching. Experimental analysis indicates that when the number of fragments in a 1 GB gene file is 65, the minimum encryption time of the algorithm is 80.13 ms. Aside from that, the gene matching time and energy consumption of this algorithm are the least, which are 85.69 ms and 237.89 J, respectively.

Counterfeit Detection Using Characterization of Safety Feature on Banknote with Full-field Optical Coherence Tomography

  • Choi, Woo-June;Min, Gi-Hyeon;Lee, Byeong-Ha;Eom, Jong-Hyun;Kim, Ju-Wan
    • Journal of the Optical Society of Korea
    • /
    • v.14 no.4
    • /
    • pp.316-320
    • /
    • 2010
  • We report an application of full-field optical coherence tomography (FF-OCT) for identifying counterfeit bank notes. The depth-resolved imaging capability of FF-OCT was used for tomographic identification of superficially-identical objects. By retrieving the internal structures of the security feature (cash hologram) of an original banknote, we could demonstrate the feasibility of FF-OCT to identify counterfeit money. The FF-OCT images showed that the hologram consisted of micron scale multi-coated layers including an air gap. Therefore, it is expected that FF-OCT has potential as a new non-invasive tool to discern imitation of currency, and it would find applications in a wide field of counterfeit sciences.

Wind loading on trees integrated with a building envelope

  • Aly, Aly Mousaad;Fossati, Fabio;Muggiasca, Sara;Argentini, Tommaso;Bitsuamlak, Girma;Franchi, Alberto;Longarini, Nicola;Crespi, Pietro;Chowdhury, Arindam Gan
    • Wind and Structures
    • /
    • v.17 no.1
    • /
    • pp.69-85
    • /
    • 2013
  • With the sustainability movement, vegetated building envelopes are gaining more popularity. This requires special wind effect investigations, both from sustainability and resiliency perspectives. The current paper focuses on wind load estimation on small- and full-scale trees used as part of green roofs and balconies. Small-scale wind load assessment was carried out using a wind tunnel testing in a global-effect study to understand the interference effects from surrounding structures. Full-scale trees were investigated at a large open-jet facility in a local-effect study to account for the wind-tree interaction. The effect of Reynolds number combined with shape change on the overall loads measured at the base of the trees (near the roots) has been investigated by testing at different model-scales and wind speeds. In addition, high-speed tests were conducted to examine the security of the trees in soil and to assess the effectiveness of a proposed structural mitigation system. Results of the current research show that at relatively high wind speeds the load coefficients tend to be reduced, limiting the wind loads on trees. No resonance or vortex shedding was visually observed.

On the Korean Translations of Clausewitz's On War ("전쟁론" 번역서 유감1))

  • Kim, Man-Su
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.1-34
    • /
    • 2003
  • Clausewitz's On War is a very difficult classic. Because its manuscript was not completed by him, and the Korean translations are hard to understand. Seven Korean translations of the twelve, all of the Korean translations of On War, are the plagiarisms or very alike to the former translations. It remains only five translations, to that is worth reading. Even the five are composed of Korean, difficult to understand. Because they are full of japanese and chinese terms, the sentence structures too long and complex, and many of terms too 'military'. Now is the time to translate the book new, that is understandable with easy and simple terms and short sentences.

  • PDF