• Title/Summary/Keyword: ICT Company

Search Result 162, Processing Time 0.027 seconds

A Study of Countermeasures for Advanced Persistent Threats attacks by malicious code (악성코드의 유입경로 및 지능형 지속 공격에 대한 대응 방안)

  • Gu, MiSug;Li, YongZhen
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.37-42
    • /
    • 2015
  • Due to the advance of ICT, a variety of attacks have been developing and active. Recently, APT attacks using malicious codes have frequently occurred. Advanced Persistent Threat means that a hacker makes different security threats to attack a certain network of a company or an organization. Exploiting malicious codes or weaknesses, the hacker occupies an insider's PC of the company or the organization and accesses a server or a database through the PC to collect secrets or to destroy them. The paper suggested a countermeasure to cope with APT attacks through an APT attack process. It sought a countermeasure to delay the time to attack taken by the hacker and suggested the countermeasure able to detect and remove APT attacks.

  • PDF

Analysis of Influential Factors in the Relationship between Innovation Efforts Based on the Company's Environment and Company Performance: Focus on Small and Medium ICT Companies (기업의 환경적 특성에 따른 혁신활동과 기업성과간 영향요인 분석 : ICT분야 중소기업을 중심으로)

  • Kim, Eun-jung;Park, Ho-young
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2017.11a
    • /
    • pp.989-1018
    • /
    • 2017
  • 본 연구에서는 내 외부 환경, 혁신활동이 기업성과에 어떠한 영향을 미치는지를 파악하기 위해 탐색적 요인분석(Exploratory Factor Analysis), 군집분석(Cluster Analysis), 구조방정식모형(Structural Equation Modeling)을 이용하여 실증분석을 실시하였다. 탐색적 요인분석을 통해 7개의 요인이 추출하였으며, 추출된 요인을 기반으로 군집분석을 시도하였더니 총 4개의 군집(n=1,022)이 형성되었다. 군집 4개의 대해 구조방정식 모형을 활용하여 실증분석을 한 결과, 기술 경쟁 환경에 민감하며, 혁신적인 성향을 가진 군집1은 자체기술개발만이 기업성과에 긍정적 영향을 미치는 것으로 나타났다. 시장 환경에 민감하며, 내향적인 성향을 가진 군집2는 자체기술개발과 공동연구를 통해서만 기업성과에 긍정적 영향을 미치는 것으로 나타났다. 경쟁적인 환경에 민감하며, 혁신적이고 정부/관련기관과의 협력적 성향을 가진 군집3은 공동연구 그리고 매개변수인 정부지원프로그램 활용을 통해 기업성과에 긍정적 영향을 미치는 것으로 나타났으며, 기술도입은 기업성과에 부정적 영향을 미치는 것으로 나타났다. 개방적이고 외부협력적 성향이 강한 군집4는 자체기술개발과 매개변수인 네트워크 활용 및 정부지원프로그램 활용이 기업성과에 긍정적 영향을 미치는 것으로 나타났다.

  • PDF

Design and Implementation of Data Logger for Elevator Remote Monitoring (승강기 원격 관제를 위한 데이터 수집기 설계 및 구현)

  • Gu, Bongen
    • Journal of Platform Technology
    • /
    • v.8 no.4
    • /
    • pp.3-10
    • /
    • 2020
  • An elevator maintenance company maintains many types of elevators from many manufactures. So, they want to use manufacture- or type-independent elevator remote monitoring system. To do this, data logger, that receives elevator operating state data from sensor module installed in elevator and transfers the data to database, is required. In this paper, we design and implement data logger of elevator remote monitoring system for providing elevator operation state information to elevator maintenance company. Data logger receives elevator operation state data from sensor module installed in elevator, decodes data, and converts to API data for transferring elevator operation state data to server. In this paper, we describe the implementation of data logger using python, and show that our implementation of data logger is successfully operating in a real elevator operating environment via log message displayed at screen.

  • PDF

Development of Cyber Physical Systems(CPS) in Manufacturing using Asset Administration Shell(AAS) (자산관리쉘(AAS)을 이용한 제조 분야 가상 물리시스템(CPS)개발)

  • Woohyun Park;Jaehyun Kim;Kichang Park;Yongkwan Lee;Jeong Joon Lee
    • Annual Conference of KIPS
    • /
    • 2023.05a
    • /
    • pp.305-307
    • /
    • 2023
  • 현재 제조업에서 설비 라인 증축 및 최적화를 위해서는 공정 분석과 설비 시스템 테스트가 요구되며, 많은 시간과 비용이 소요된다. 이러한 문제를 해결하기 위해, 가상의 설비모델을 이용해 설비검증과 라인 테스트를 수행할 수 있는 다양한 CPS(Cyber Physical System)가 연구되고 있다. 본 논문에서는 다양한 설비 이해관계자 사이의 상호운용성을 확보하기 위해 독일의 Industry 4.0에서 제안한 표준 설비 명세인 AAS(Asset Administration Shell)를 활용한 CPS 구현을 제안한다. SMT(Surface Mounting Technology) 라인 중 Screen Printer를 대상으로, 총 3개의 서브 모델(Sub model)과 17개의 속성(Property)을 AAS 명세하고 이를 이용한 CPS를 구현하는 사례연구를 수행했다. 제안 방법은 표준명세를 활용한 제조 분야 CPS 구현에 적용될 수 있다.

Analysis Research on Preparation of 4th Wave (AI) of the Visegrad Group

  • Kim, Dong Hwa;Seo, Dae-Sung
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.5 no.4
    • /
    • pp.201-211
    • /
    • 2018
  • The paper suggests making a policy and strategies for a way of exporting Korean ICT product effectively in the EU and Eastern area, and an effective preparation of 4th industrial revolution through analysis of preparation status of 4th industrial revolution of the Visegrad group. Analyze policy, status, what they want for 4th preparation in the Visegrad group from comparing characteristics analysis of each country's official data, publication data, portal, paper, and etc. They have been preparing for 4th industrial revolution long time ago as basic research and business before 4th wave word. With these basic results, they are trying to apply such as, AI, S/W, security, ICT, etc. of 4th wave core technology. For the development of new export market in EU, the Korean team should research with university and research center or venture company. Through these cooperation, they should understand their personal characteristic, lifestyle, and what consumers want to purchase in EU. And this results can be used in South Asia and India that give a big effect to all over the world ICT market. The external impact of the 4th wave must have a long-term shift in manpower, and production policy is related to the EU's strategic role, or the preparation of the 4th wave to the V4 country in the short term.

Characteristics of Kapok Fibers According to Various Pretreatment Conditions (전처리 처리 조건에 따른 케이폭 섬유의 특성)

  • Hong, Seok Il;Lee, Hee Dong;Shim, Jae Yun;Seo, Won Jin;Lee, Beom Soo
    • Textile Coloration and Finishing
    • /
    • v.26 no.3
    • /
    • pp.230-236
    • /
    • 2014
  • The kapok fibers which are the functional fiber materials having natural hollows are environment friendly materials the demand and interest of which are increasing. The kapok fibers are environment friendly and natural hollow fibers which are 5-8 times lighter than cottons and have excellent performances in thermo keeping property, air permeability, bulkiness and resilience. In this study, the pretreatment according to the dyeing behaviors of kapok fibers were studied. Pretreatment(scouring, bleaching) were a variety of conditions. Scouring and bleaching, images of changed surfaces and cross-sections and dyeing behaviors of the dye-o-meter according to the concentration measured in meters and compared. Although the final exhaustion ratio of the kapok fibers scoured with a high concentration recipe was almost as same as that of the kapok fibers bleached with a high concentration recipe, the initial absorption speed of the kapok fibers scoured with the high concentration recipe was faster than that of the kapok fibers bleached with the high concentration recipe.

Strategic Development and SWOT Analysis for IT/ICT Programs in Universities of Mazandaran in Iran Using Digital Indices

  • Mahdavia, Iraj;Abbaspour-Ghomi, Hassanjan;Sahebjamnia, Navid;Eissazadeh-Roshan, Yousof;Fazlollahtabar, Hamed;Mahdavi-Amiri, Nezam;Hamzehpour, Amin
    • Journal of Digital Convergence
    • /
    • v.7 no.1
    • /
    • pp.31-47
    • /
    • 2009
  • The rapid growth of information and communication technologies prompted the need for developing the strategic implementation framework of IT/ICT programs in universities. Here, we propose a strategic framework for the development of the IT/ICT programs in the universities of the province of Mazandaran in Iran. We use the SWOT analysis to assist the formulation of the strategy, where the Analytic Hierarchy Process (AHP) is applied to weigh the SWOT factors and the fuzzy TOPSIS is used to evaluate the strategic plans. Based on Iran and Mazandaran Digital Indices (DI) and considering the SWOT matrix, four strategies are identified. Finally, an analytical concept, namely the strategy shooting, is considered to show the role of SWOT factors and strategic plans on the performance of the system.

  • PDF

A Study on Threat Containment through VDI for Security Management of Partner Companies Operating at Industrial Control System Facility

  • Lee, Sangdo;Huh, Jun-Ho
    • Annual Conference of KIPS
    • /
    • 2019.10a
    • /
    • pp.491-494
    • /
    • 2019
  • The results from the analysis of recent security breach cases of industrial control systems revealed that most of them were caused by the employees of a partner company who had been managing the control system. For this reason, the majority of the current company security management systems have been developed focusing on their performances. Despite such effort, many hacking attempts against a major company, public institution or financial institution are still attempted by the partner company or outsourced employees. Thus, the institutions or organizations that manage Industrial Control Systems (ICSs) associated with major national infrastructures involving traffic, water resources, energy, etc. are putting emphasis on their security management as the role of those partners is increasingly becoming important as outsourcing security task has become a common practice. However, in reality, it is also a fact that this is the point where security is most vulnerable and various security management plans have been continuously studied and proposed. A system that enhances the security level of a partner company with a Virtual Desktop Infrastructure (VDI) has been developed in this study through research on the past performances of partner companies stationed at various types of industrial control infrastructures and its performance outcomes were statistically compiled to propose an appropriate model for the current ICSs by comparing vulnerabilities, measures taken and their results before and after adopting the VDI.

Exploring the Strategy for Acquiring ISMS Certification through Probit Regression: Focusing on Organizational Characteristics (Probit 회귀분석을 통한 ISMS 인증 취득 전략 탐색: 조직 특성을 중심으로)

  • SunJoo Kim;Tae-Sung Kim
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.11-25
    • /
    • 2024
  • In the field of information security management systems, one of the representative certifications in Korea is ISMS-P certification, and internationally, ISO/IEC 27001 certification is recognized. When companies acquire both ISMS-P (or ISMS) and ISO/IEC 27001 certifications, budget and manpower are duplicated in similar areas. Therefore, it is necessary for the company to choose and invest in a certification that is suitable for its conditions. This paper proposes a strategy for obtaining information security management system certification that is suitable for the characteristics of the company, allowing for effective information security management based on the company's conditions. To achieve this, data were collected from the Ministry of Science and ICT's Information Security Disclosure System (ISDS), the Korea Internet & Security Agency (KISA), and the Financial Supervisory Service's Data Analysis, Retrieval and Transfer System (DART), and Probit regression analysis was conducted. During the Probit regression analysis, the relationships between seven independent variables and five cases of ISMS-P (or ISMS) acquisition, ISMS-P acquisition, ISMS acquisition, ISO/IEC 27001 acquisition, and both ISMS-P (or ISMS) and ISO/IEC 27001 acquisition were analyzed. The analysis results revealed the relationship between company characteristics, including industry, and certification acquisition in the ISMS field. Through this, strategies for certification acquisition based on company types could be suggested.

A study on making strategies for securing essential patent of standard in ICT (정보통신 표준특허 확보 전략 수립에 관한 연구)

  • Min, Jae-Hong;Cho, Pyung-Dong;Hahm, Jin-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.559-562
    • /
    • 2011
  • It is very essential issue in industrial advancement and company survival for international standard body to adopt standards including ICT that domestic company or our country owns. Also, advanced countries fiercely contest in order to include domestic technology in international standard and make every effort to secure essential patent relating to core and basic technology in international standard. In this circumstances, it is necessary to develop standardization strategies and take systematic approaches in an attempt to upgrade our country to strongly knowledge-based country in 21th century and achieve a leading position in ICT market. Therefore, this paper will suggest systematic and comprehensive approaches from planning of technology development to securing essential patent of international standard and have the purpose of making standardization base as well as promoting international standardization of domestic technology.

  • PDF