• 제목/요약/키워드: Information Security Strategy

Search Result 473, Processing Time 0.026 seconds

A study on the Change of University Education Based on Fliped Learning Using AI (AI 쳇봇을 활용한 플립러닝 기반의 대학교육의 변화)

  • Kim, Ock-boon;Cho, Young-bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1618-1624
    • /
    • 2018
  • The undergraduate structure based on flipped learning should be a necessary course to cultivate value creation capability based on students' problem solving capability through the change of university education in the fourth industrial revolution era. Flipped learning stimulated the learner's high order thinking and activates communication between the faculty-student and the students through the use of activity oriented teaching strategy. Introduction and spread of Flipping Learning combining project-based learning with MOOC is required. The professor should be able to apply net teaching and learning methods using flipping learning and active learning, and develop class contents reflecting new knowledge, information and technology. As the introduction and spread of AI-based(E-Advisor, chat bot et al) learning consulting, Which is becoming increasingly advanced, the transition to "personalized education" that meets the 4th Industrial Revolution should be made.

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.

Countermeasure strategy for the international crime and terrorism by use of SNA and Big data analysis (소셜네트워크분석(SNA)과 빅데이터 분석을 통한 국제범죄와 테러리즘 대응전략)

  • Chung, Tae Jin
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.25-34
    • /
    • 2016
  • This study aims to prevent the serious threat from dangerous person or group by responding or blocking or separating illegal activities by use of SNA: Social Network Analysis. SNA enables to identify the complex social relation of suspect and individuals in order to enhance the effectiveness and efficiency of investigation. SNS has rapidly developed and expanded without restriction of physical distance and geo-location for making new relation among people and sharing large amount of information. As rise of SNS(facebook and twitter) related crimes, terrorist group 'ISIS' has used their website for promotion of their activity and recruitment. The use of SNS costs relatively lower than other methods to achieve their goals so it has been widely used by terrorist groups. Since it has a significant ripple effect, it is imperative to stop their activity. Therefore, this study precisely describes criminal and terrorist activities on SNS and demonstrates how effectively detect, block and respond against their activities. Further study is also suggested.

Low-weight Secure Encryption Protocol on RFID for Manufactory Automation (공장 자동화를 위한 RFID 경량 암호 프로토콜에 관한 연구)

  • Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.173-180
    • /
    • 2016
  • There has been a growing interest in automation of factories in the country. And, the development in this regard has been actively attempted. In particular, on the basis of the "innovation 3.0 strategy of manufacturing industry", interest in the smart of the manufacturing plant of small and medium-sized enterprises has increased rapidly. As well as policy for building smart plant, technical, seeking a strategic approach. But, in order to introduce such a smart plant or factory automation systems, manufacturing plant security with vulnerability and personal information protection problems, it should always be top priority there. Accordingly, we provide the applicable lightweight secure protocols in RFID communication. It is a wireless communication technology that is most often introduced for factory automation. Our proposed lightweight secure protocol in this study, less the number of calculations in comparison with the existing public key-based and the symmetric key encryption algorithm. And it is fast in compare with the existing protocol. Furthermore, we design that it system can support to low power consumption and small consume the memory size.

Conceptual design of a dual drum-controlled space molten salt reactor (D2 -SMSR): Neutron physics and thermal hydraulics

  • Yongnian Song;Nailiang Zhuang;Hangbin Zhao;Chen Ji;Haoyue Deng;Xiaobin Tang
    • Nuclear Engineering and Technology
    • /
    • v.55 no.6
    • /
    • pp.2315-2324
    • /
    • 2023
  • Space nuclear reactors are becoming popular in deep space exploration owing to their advantages of high-power density and stability. Following the fourth-generation nuclear reactor technology, a conceptual design of the dual drum-controlled space molten salt reactor (D2-SMSR) is proposed. The reactor concept uses molten salt as fuel and heat pipes for cooling. A new reactivity control strategy that combines control drums and safety drums was adopted. Critical physical characteristics such as neutron energy spectrum, neutron flux distribution, power distribution and burnup depth were calculated. Flow and heat transfer characteristics such as natural convection, velocity and temperature distribution of the D2-SMSR under low gravity conditions were analyzed. The reactivity control effect of the dual-drums strategy was evaluated. Results showed that the D2-SMSR with a fast spectrum could operate for 10 years at the full power of 40 kWth. The D2-SMSR has a high heat transfer coefficient between molten salt and heat pipe, which means that the core has a good heat-exchange performance. The new reactivity control strategy can achieve shutdown with one safety drum or three control drums, ensuring high-security standards. The present study can provide a theoretical reference for the design of space nuclear reactors.

Prediction of the Future Topology of Internet Reflecting Non-monotony (비단조 변화성을 이용한 인터넷의 미래 위상 예측)

  • 조인숙;이문호
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.205-214
    • /
    • 2004
  • Internet evolves into the huge network with new nodes inserted or deleted depending on specific situations. A new model of network topology is needed in order to analyze time-varying Internet more realistically and effectively. In this study the non-monotony models are proposed which can describe topological changes of Internet such as node insertion and deletion, and can be used for predicting its future topology. Simulation is performed to analyze the topology generated by our model. Simulation results show that our proposed model conform the power law of realistic Internet better than conventional ones. The non-monotony model can be utilized for designing Internet protocols and networks with better security.

  • PDF

Motion Detection using Adaptive Background Image and Pixel Space (적응적 배경영상과 픽셀 간격을 이용한 움직임 검출)

  • 지정규;이창수;오해석
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.3
    • /
    • pp.45-54
    • /
    • 2003
  • Security system with web camera remarkably has been developed at an Internet era. Using transmitted images from remote camera, the system can recognize current situation and take a proper action through web. Existing motion detection methods use simply difference image, background image techniques or block matching algorithm which establish initial block by set search area and find similar block. But these methods are difficult to detect exact motion because of useless noise. In this paper, the proposed method is updating changed background image as much as $N{\times}M$pixel mask as time goes on after get a difference between imput image and first background image. And checking image pixel can efficiently detect motion by computing fixed distance pixel instead of operate all pixel.

  • PDF

A Study on Constructing Approach of Enterprise Document Management Architecture in Semiconductor Business (반도체 산업에서의 Enterprise Document Management Architecture 구현에 관한 연구)

  • 장현성;이영중;송하석;한영준;안정삼
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.11-14
    • /
    • 2001
  • A systematic construction and re-use of technology related to the product development and production has been the most important for the semiconductor industry dependent on process and equipment. Therefore, numerous outputs in the form of paper has been produced in the process of information management ranging from the creation to recycling and disposal of technologies. In this research, the technology and documents necessary for the business management in the field of semiconductor manufacturing were classified in an effort to solve problems while the modeling of document management architecture at the enterprise level was performed by properly setting up the security system to prevent the unauthorized disclosure of the product development technology to the third parties. Especially, the product and process specification are designed in such a way as to ensure a real-time response in interface with the production system in order to shorten the development lead-time and improve the productivity. This paper is to discuss the modeling approach, the strategy to construct the system and its results.

  • PDF

An Empirical Study on Managerial Factors Affecting Performance of Defense R&D Projects (국방연구개발 사업성과에 영향을 미치는 사업관리 요인에 관한 실증연구)

  • Pyun, Wan-Joo;Kim, Sung-Kun;Lee, John-Hearn
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.223-244
    • /
    • 2009
  • Defense R&D is an essential investment for the national security. Recently our nation has also begun to initiate a number of defense R&D projects. As a lot of fund and resources are allocated to these projects, we need to identify which projects to initiate and then how to manage these projects well. Though there have been a number of studies on R&D projects in commercial sector, there are only a few studies in defense R&D sector. Moreover, these existing defense R&D studies mainly deal with the former issues, which are occurring at the stage of project planing. We are more concerned with project management issues, such as how to manage projects that had already been evaluated to undertake at the planning stage. Specifically our study aims to identify project management factors leading to the success of defense R&D projects. Results of the empirical analysis indicate that management support, user-driven requirements management, and project planning capability are key elements for project performance.

  • PDF

A Study on CRM in TV Home Shopping (Part 1) (TV 홈쇼핑에서의 패션제품 CRM에 관한 연구(제1보))

  • Lee, Seung-Hee;Park, Soo-Kyeong
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.31 no.4 s.163
    • /
    • pp.594-603
    • /
    • 2007
  • The purpose of this study was to examine which variables affect customer relationship management in TV home shopping. Three hundred customers who had purchased fashion products in TV home shopping had participated in this study. The data was analyzed by factor analysis, t-test, correlation analysis and path analysis using SPSS program. As the result, 'service', 'information', 'contents', 'reputation', and 'benefits' variables had the effects on 'trust': especially, 'service' had the major effects on 'trust' The 'trust' and 'security' had the effects on 'commitment'. The 'price' variable had only effect on relationship maintenance. Also, 'trust' and 'commitment' had the 'relationship maintenance' Specifically 'commitment' had higher effect on relationship maintenance than 'trust' did. The results of this study would provide CRM marketing strategy for fashion marketers of TV home shopping.