• Title/Summary/Keyword: IT security

Search Result 11,399, Processing Time 0.042 seconds

A Study on the Development of Public Design Strategy Based on the Service Design Methodology -Focus on Signboard renovation Business Jungangro, Chung-yang (서비스 디자인 방법론을 활용한 지역 활성화 전략 연구 - 청양군 간판개선사업 중앙로 일대를 중심으로)

  • Chung, Yong-Jin;Kim, So-Yeon
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.3
    • /
    • pp.380-389
    • /
    • 2022
  • Service design refers to an activity to design a user's service experience and a design area for professionally executing it. In order to design services from the people's point of view away from the supplier-oriented policy decisions in the past, the recent public participation business model using the service design methodology is increasing. In particular, the Ministry of Public Administration and Security formed the 'National Design Team' in 2014 to design services from the perspective of the public throughout the policy process. The public participatory policy model is being operated in which the public as policy consumers, service designers and public officials as suppliers participate in the overall policy process to develop and develop public services through service design techniques. This study is meaningful in that it presented the developmental direction of the actual project site through the case of the National Design Team sign improvement project with the goal of establishing a regional revitalization strategy using the service design methodology. However, as this study is about the current project, verification of the application of future project sites and user satisfaction evaluation have not been conducted. When the project is completed in the future, it is necessary to conduct a project satisfaction survey targeting consumers.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.

The Design of Smart Factory System using AI Edge Device (AI 엣지 디바이스를 이용한 스마트 팩토리 시스템 설계)

  • Han, Seong-Il;Lee, Dae-Sik;Han, Ji-Hwan;Shin, Han Jae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.257-270
    • /
    • 2022
  • In this paper, we design a smart factory risk improvement system and risk improvement method using AI edge devices. The smart factory risk improvement system collects, analyzes, prevents, and promptly responds to the worker's work performance process in the smart factory using AI edge devices, and can reduce the risk that may occur during work with improving the defect rate when workers perfom jobs. In particular, based on worker image information, worker biometric information, equipment operation information, and quality information of manufactured products, it is possible to set an abnormal risk condition, and it is possible to improve the risk so that the work is efficient and for the accurate performance. In addition, all data collected from cameras and IoT sensors inside the smart factory are processed by the AI edge device instead of all data being sent to the cloud, and only necessary data can be transmitted to the cloud, so the processing speed is fast and it has the advantage that security problems are low. Additionally, the use of AI edge devices has the advantage of reducing of data communication costs and the costs of data transmission bandwidth acquisition due to decrease of the amount of data transmission to the cloud.

The Determinants of Ginseng Products Purchase during the Trip in Korea (인삼 제품 구매 선택과 결정 요인 분석)

  • Ho-Jung Yoon;Hyun Sung Cho;Sung Ah Lim
    • Journal of Ginseng Culture
    • /
    • v.5
    • /
    • pp.97-114
    • /
    • 2023
  • Despite numerous studies, research on ginseng in aspect of an economic and business perspective are insufficient. Recently, research to reveal the economic cause of ginseng products purchase is drawing attention. The purpose of this study is to analyze empirically the factors of ginseng products purchase by international consumers from a microeconomic perspective. Using the survey data, we empirically investigate the determinants of ginseng products purchase by international consumers visiting Korea. We use a multinomial logistic model to find the determinants that influence the purchase of ginseng products. This study finds the followings. First, the economic factor is an important determinant of ginseng products purchase. The average daily expenditure has a greater impact on ginseng products purchase than household income does. Even though the average daily expenditure is high, they tend to buy less ginseng products when they prefer other products. Second, demographically, gender and age are also important determinants of ginseng products purchase. It has been found that elderly male consumers are more likely to buy ginseng products. Third, international consumers for leisure purposes have a higher probability of buying ginseng products than tourism consumers for other purposes do. Finally, destination attributes such as security (safety), ease of use of mobile/Internet, and ease of finding directions are also important factors affecting ginseng products purchase. In addition, it is found that the convenience of using the mobile/Internet, the ease of finding directions, and the convenience of shopping increase the probability of buying ginseng products by international consumers. This study is meaningful in that it explored the determinants of ginseng products purchase by analyzing individual consumers' ginseng products choices.

A Study on the Crisis Management Standard Manual for Large-scale Human Accident at Workplace for Efficiency of Disaster Response (재난대응 효율화를 위한 사업장 대규모 인적사고 위기관리 표준매뉴얼 개정방안 연구)

  • Woo Sub Shim;Sang Beam Kim
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.656-664
    • /
    • 2023
  • Purpose: The Ministry of Employment and Labor manages disasters based on the standard manual for risk management of large-scale human accidents in workplaces when large-scale disasters such as fires and collapses occur in workplaces. We are going to check the standard manual currently in operation and suggest improvement plans for the insufficient items. Method: Accordingly, the standard manual was checked together with internal and external experts in the disaster management manual and disaster management staff at headquarters and local government offices, and items to be improved were identified with priority. Result: In case of a collapse accident, it is necessary for the Ministry of Public Administration and Security to accurately present the selection criteria in order to eliminate the controversy over the selection of the disaster management department. In addition, it seems necessary to supplement the details of the disaster safety communication network operation and evacuation guidelines. Conclusion: In the future, in order to improve the disaster management system that meets the public's eye level, it is expected to prepare a standard manual for risk management of large-scale human accidents in workplaces that guarantees the lives and safety of workers through the collection of opinions from experts in the relevant field, disaster management personnel, and the general public.

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF

Design and Implementation of Economical Smart Wall Switch with IEEE 802.11b/g/n

  • Myeong-Chul Park;Hyoun-Chul Choi;Cha-Hun Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.103-109
    • /
    • 2023
  • In this paper, we propose a smart wall switch based on IEEE 802.11b/g/n standard 2.4GHz band communication. As the 4th industrial era evolves, smart home solution development is actively underway, and application cases for smart wall switches are increasing. Most of the Chinese products that preoccupy the market through price competitiveness use Bluetooth and Zigbee communication switches. However, while ZigBee communication is low power, communication speed is slower than Bluetooth and network configuration through a separate hub is additionally required. The Bluetooth method has problems in that the communication range and speed are lower than Wi-Fi communication, the communication standby time is relatively long, and security is weak. In this study, an IEEE 802.11b/g/n smart wall switch applied with Wi-Fi communication technology was developed. In addition, through the two-wire structure, it is designed so that no additional cost is incurred through the construction of a separate neutral line in the building. The result of the study is more than 30% cheaper than the existing wall switch, so it is judged that it will be able to preoccupy the market not only in terms of technological competitiveness but also price competitiveness.

Considerations for Implementing Online Art-Based Peer Supervision (온라인 미술기반 동료 슈퍼비전 실행에 대한 고려사항)

  • Yoon, Ra-Mi;Kim, Soo-In;Jung, HeeJae
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.404-415
    • /
    • 2022
  • The purpose of this study is to propose considerations to help actual application based on the characteristics of the online art-based peer supervision execution process. Colleagues in the clinical art therapy doctoral program, including the researcher, attempted to repeatedly identify problems and apply improvements in the implementation process as research participants, and qualitatively analyzed the various data collected in the process. Looking at the characteristics of the analysis results, extensibility of materials and space was confirmed in terms of 'art-based' and initiative, convenience, and speed in terms of 'online'. The considerations identified through this are as follows. First, 'pre-structuring' should be based on clear boundaries and setting, prior consultation of the group, and self-directed preparation and attitude. Second, for the 'structural aspect of art', space and media to help immersion through creation, and stable implementation structure should be established. Third, in the 'technical aspect', it is necessary to apply a method that can deliver a work of art and a method that can communicate the creator's clear intention. Lastly, for the 'ethical aspect', it is necessary to use online software in accordance with the minimum security standards and to make efforts to repeatedly maintain confidentiality. This study is meaningful in that it suggested a practical method for maintaining the professional competence of art therapists and expanding networks among art therapists in various situations including pandemics.

Russia-Central Asia relations -Focusing on the period after the establishment of the EAEU in 2015- (러시아·중앙아시아 관계 -2015년 EAEU 창설 이후를 중심으로-)

  • Sang Nam Park
    • Analyses & Alternatives
    • /
    • v.7 no.3
    • /
    • pp.85-114
    • /
    • 2023
  • The purpose of this study is to analyze Russia-Central Asia relations since the launch of the EAEU in 2015 and forecast the future from a structural realism perspective. Bilateral relations have both elements of close cooperation and elements of conflict. Russia and Central Asia, which have the characteristics of an authoritarian alliance, also have a symbiotic relationship in which they have no choice but to cooperate with each other to maintain the regime. Based on this, Russia has made various efforts to reunify Central Asia. Central Asia also has no choice but to cooperate with Russia for its survival, but at the same time, it has expanded its scope of cooperation in the international community to avoid being subjugated to Russia again. However, as China's power expands, Russia's relative weakness, and wariness toward Russia increases after the Ukraine War, the gap in bilateral relations is widening. In particular, as China's influence grows, Russia's nervousness also increases. This is why Putin visits Central Asia and holds active summit talks even during the war in Ukraine. If competition between Russia and China surfaces, there is a high possibility that the international order in Central Asia will become unstable. However, it is still unlikely that the power of Russia and China will reverse in Central Asia. Above all, the security, historical, and cultural connections between Russia and Central Asia are areas that are difficult for China to catch up with. Therefore, a weakening of Russia's influence compared to the past is inevitable, but its superiority is expected to continue. If Russia breaks away from belligerence and transforms into an attractive cooperative partner, there is a possibility that bilateral relations will take an upward turn again. However, it seems unlikely that such changes and innovations will occur under the Putin regime. Therefore, the biggest obstacle to realizing Putin's goal of reunifying Central Asia is Putin himself.

A Study of the Monitoring Model for the Serious Civil Accidents (중대시민재해 모니터링 모델 연구)

  • ChangYeol Lee;GilJoo Park;Twehwan Kim;Jonggil Chae
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.834-843
    • /
    • 2023
  • Purpose: The Serious Civil Accidents consist of the public use facilities, the public transports, and the material and its products. According to the Serious Civil Accidents of the Serious Accidents Punishment Act, it must be constructed the safety and health management framework and execution system. In this study. we are design the model of the Serous Civil Accidents management and action system. Method: Firstly, we review from 8th article to 11th article of the enforcement ordinance of the Serious Accidents Punishment Act. From the articles, we design the visual and structural management system supporting the Act. Result: The Serious Civil Accidents apply to the system is consisted of 6 monitoring modules and 4 kinds DB modules. Conclusion: The Serious Civil Accidents are managed by the private enterprises, local governments, and public institutions. Specially, the CEO of restaurants, cafes, et al, do not know the detail information related to the Act. Also in case of the local governments, there are many facilities related the Act. It is not easy to the construct the management framework of the Act. This study provides the simple management structure for the Act.