• Title/Summary/Keyword: IT융합 솔루션

Search Result 141, Processing Time 0.022 seconds

Research of Agent-less Network Access Control Using Network Switch Firmware (네트워크 펌웨어를 이용한 Agent-less 방식의 네트워크접근제어 구현에 관한 연구)

  • Kim, JinSeok;Min, Sung-Gi;Oh, Sang-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.703-705
    • /
    • 2011
  • 내부 네트워크의 IP관리를 위해 많은 네트워크 관리 방안 및 솔루션들이 기 구축되어 운영 중이고, 이를 위해 내부 네트워크에 연결된 모든 단말에 특정 Agent를 설치하여 IP를 관리하고 있어 단말(PC, IPT전화기 등)의 OS에 따른 기종별 Agent의 호환문제 및 단말에 기 설치 운영중인 응용프로그램과의 충돌문제가 발생한다. 본 연구에서는 이러한 네트워크 IP관리를 위해 Agent가 필요 없는 네트워크 관리 방식을 제안한다. 네트워크 Switch장비 Firmware의 포트차단 설정을 이용한 기법으로 Agent의 설치없이 Switch장비의 Firmware를 이용하여 네트워크의 접근제어가 가능함을 제안한다. 이를 위하여 인가되지 않은 IP를 Switch장비의 Firmware로 차단하여 네트워크의 접근제어가 가능함을 증명하였다.

Design and Implementation of Smart Factory MES Model Based on Process Visualizationa for Small and Medium Business in Korea (대한민국 중소기업을 위한 공정 시각화에 기초한 스마트팩토리 생산관리시스템의 설계 및 구축)

  • Kho, Jeong-Seog;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.135-141
    • /
    • 2019
  • South Korea's smart factory drive is at a very important point. While large-scale funds and manpower are invested to secure international competitiveness and revitalize manufacturing, software investments that are only approached by IT suppliers may end up creating systems that do not meet the actual conditions of the field. As a result, there are problems in the manufacturing sector that can cause consumers to feel the fatigue of innovation in the manufacturing sector. SMEs should check from scratch and establish a gradual integration system so that they can reduce failures in IT investments and implement OT-oriented smart factories that are well utilized in the field. To this end, a process visualization solution was proposed and a step-by-step innovation was proposed at the basic level and the ICT unapplied level.

A Research on the Exposure Status of Cybersecurity Risk of Process Control System and Its Counterplan (공정제어시스템의 사이버보안 위험 노출 현황 및 대응방안 연구)

  • Kim, Youngse;Park, Jinhyung;Kim, Sangki;Kim, Byungjick;Lee, Joonwon;Park, Kyoshik
    • Korean Chemical Engineering Research
    • /
    • v.60 no.4
    • /
    • pp.492-498
    • /
    • 2022
  • Process control systems used in most domestic petrochemical corporates today are based on the Windows platforms. As technology leans toward opened environment, the exposure risk of control systems is increasing. However, not many companies are preparing for various cyberattacks due to lack of awareness and misunderstanding of cyber intrusion. This study investigated the extent of how much exposed the petrochemical process control system is to security threats and suggested practical measures to reduce OT cybersecurity vulnerabilities. To identify the cyber threat status of process control systems, vulnerabilities of the Windows platform, a principal cyber threat factor, have been analyzed. For research, three major DCS providers in Korea and the discontinuation of Windows platform of 635 control systems were investigated. It was confirmed that 78% of the survey subjects were still operating in the discontinued windows platforms, and those process control systems were operated in a state vulnerable to cyber intrusions. In order to actively cope with these cyber threats, legal regulations such as designation of critical infrastructure for major petrochemical facilities which is implemented in advanced countries such as the United States are needed. Additionally, it is necessary to take the initiative in eradicating security threats to the process control systems by aggressively introducing security solutions provided from existing DCS suppliers. This paper was submitted to Professor Ko JaeWook's retirement anniversary issue.

A Study on the AI Home Care Solution for the Mobile Vulnerable (이동약자를 위한 AI 홈케어 솔루션에 관한 연구)

  • ChangBae Noh;Wonshik Na
    • Journal of Industrial Convergence
    • /
    • v.21 no.4
    • /
    • pp.165-170
    • /
    • 2023
  • There are cases where the mobility impaired have difficulty moving from the moment they leave the house. If guardians also do not have time to entrust their families, who are socially disadvantaged, to a shelter, the guardian has no choice but to check directly in order to know the location of the guardian. The AI home care solution was designed to relieve the anxiety and labor of caregivers and to provide convenience for protection facility officials and users. If more facilities distribute and use services free of charge to non-profit foundations and protective facilities, the concern of guardians will be reduced, and the burden of facility officials who have to manage facility users will be reduced. In this paper, we provide emergency notification services to guardians in the event of an emergency as well as location and status alarms for guardians, which are all data related to movement, in consideration of the mobility vulnerable. Furthermore, it is necessary to provide a service function that recommends the optimal route using a navigation function to ease the convenience and burden of facility officials. It is necessary to alleviate anxiety by providing necessary information to the guardian, such as the location of the shuttle used by the mobile weak and the time of getting on and off. In addition, while providing services for free, the goal is to improve the quality of service for facility managers and the quality of service for the mobility weak.

A Study on Methodology for Standardized Platform Design to Build Network Security Infrastructure (네트워크 보안 인프라 구성을 위한 표준화된 플랫폼 디자인 방법론에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.1
    • /
    • pp.203-211
    • /
    • 2012
  • Network security infrastructure is constantly developing based on the combination and blending of various types of devices. From the form of distributed control, the phased defense policy such as fire walls, virtual private communication network, invasion prevention system, invasion detection system, corporate security management, and TSM (Telebiometrics System Mechanism), now it consolidates security devices and solutions to be developed to the step of concentration and artificial intelligence. Therefore, this article suggests network security infrastructure design types concentrating security devices and solutions as platform types and provides network security infrastructure design selecting methodology, the foundational data to standardize platform design according to each situation so as to propose methodology that can realize and build the design which is readily applied and realized in the field and also can minimize the problems by controlling the interferences from invasion.

Study of Conversions Security Management System, Co-Relation Rule-Set scenario and architecture for incidence detection (융합보안관제환경을 위한 아키텍처 구축 및 활용 방안에 대한 연구)

  • Hwang, Donguk;Lee, Sanghun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.353-371
    • /
    • 2014
  • We already have seen many studies and articles about the methodology responding the security risks and threats. But we still have some controversial subjects to be settled. Now, we are living in the era that we should focus on how to use the security systems instead of how to make it. In this point of view, a company need to find out the answer for these questions, which security risks have to be handled in a corporate, which system is better for responding the security threats, and how we can build necessary security architecture in case of developing systems. In this article, we'd like to study on-site scenarios threatening the corporate assets, the limit on dealing with these threats, and how to consolidate the security events and information from enormous assets. Also, we'd like to search for the direction form the actual cases which have shown the desired effect from converging the assets and network informations.

An Analysis of Research Trends in Information Security Based on Behavioral Economics (행동경제학 기반 정보보안 연구 동향 분석)

  • Oh, Myeong Oak;Kim, Jung Duk
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.39-46
    • /
    • 2019
  • Recently, information security accidents are becoming more advanced as social engineering attacks using new types of malicious codes such as phishing. Organizations have made various efforts to prevent information security incidents, but tend to rely on technical solutions. Nevertheless, not all security incidents can be prevented completely. In order to overcome the limitations of the information security approach that depends on these technologies, many researchers are increasingly interested in People-Centric Security. On the other hand, some researchers have applied behavioral economics to the information security field to understand human behavior and identify the consequences of the behavior. This study is a trend analysis study to grasp the recent research trend applying the concept and idea of behavioral economics to information security. We analyzed the research trends, research themes, research methodology, etc. As a result, the most part of previous research is focused on 'operational security' topics, and in the future, it is required to expand research themes and combine behavioral economics with security behavioral issues to identify frameworks and influencing factors.

A Study on the Development of Customized Home Care Beauty Device (맞춤형 홈 케어 뷰티 디바이스 개발에 관한 연구)

  • Kim, Tae-Won;Kim, Hyun-Woong;Lee, Chun-Hee;Min, Hye-Jin;Kim, Da-Du;Kim, Dong-Hun;Park, Sang-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • Due to the regular usage of face masks during the COVID-19 pandemic, many people developed skin issues. As a result, interest in skin care which can be performed independently at home has increased. The purpose of this study is to design a customized home beauty care device to respond to these market trends. In order to do so, the double diamond model was applied in the design thinking process, and the design development process proceeded in the order of discovery, definition, development, and delivery. This study is meaningful in that it focused on the user-centered design development approach by fusing design thinking processes rather than styling-oriented design processes, and suggested new possibilities for design development using information based on the data measured.

Analysis of Technical Factors for Multidisplinary Cloud Service Model and Development of Service Model based on Use Case (유즈 케이스 기반의 융.복합 클라우드 서비스 모델을 위한 요소 기술 분석 및 서비스 모델 개발)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.545-550
    • /
    • 2012
  • The size of global IT convergence market is expected to increase more and more and cloud computing in industrial convergence environment provides the useful solutions to support convergence environment between other industries. It is necessary and important to predict and develop integrated service structures and types of combining cloud computing and other application technologies. Therefore this paper presents technical factors to provide cloud service. In additions, the requirement and technical factors for various convergence service models are introduced and analyzed using use case which is efficient modelling methodology to construct many system. Using the research results, we performed the case study to develop a convergence cloud service. Eventually, this study is expected to use the basic researches to develop the various the multidisplinary cloud service models based on use case to create the new values.

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.