• Title/Summary/Keyword: Infrastructure as Code

Search Result 100, Processing Time 0.025 seconds

IaC-VIMF: IaC-Based Virtual Infrastructure Mutagenesis Framework for Cyber Defense Training (IaC-VIMF: 사이버 공방훈련을 위한 IaC 기반 가상 인프라 변이 생성 프레임워크)

  • Joo-Young Roh;Se-Han Lee;Ki-Woong Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.527-535
    • /
    • 2023
  • To develop experts capable of responding to cyber security incidents, numerous institutions have established cyber training facilities to cultivate security professionals equipped with effective defense strategies. However, these challenges such as limited resources, scenario-based content development, and cost constraints. To address these issues, this paper proposes a virtual infrastructure variation generation framework. It provides customized, diverse IT infrastructure environments for each organization, allowing cyber defense trainers to accumulate a wide range of experiences. By leveraging Infrastructure-as-Code (IaC) containers and employing Word2Vec, a natural language processing model, mutable code elements are extracted and trained, enabling the generation of new code and presenting novel container environments.

Numerical simulation of the behavior of failing rock blocks (암블록 낙석 거동에 대한 수치해석적 모사)

  • Kim, Soo-Lo;Chang, Buhm-Soo;Shin, Chang-Gun
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2005.03a
    • /
    • pp.751-758
    • /
    • 2005
  • In this study, the Discrete Element Code was applied to the analysis of falling rock blocks. The simulation was performed using the PFC2D computer code. Falling rock blocks should be applied as additional force to each others. The force affect the motion of falling rock blocks. This was used to find out the behavior of each blocks. This study revealed that the DEM can successfully capture the behavior of falling rock blocks.

  • PDF

Integrated QR Payment System (QRIS): Cashless Payment Solution in Developing Country from Merchant Perspective

  • Nathan Eleazar Rafferty;Ahmad Nurul Fajar
    • Asia pacific journal of information systems
    • /
    • v.32 no.3
    • /
    • pp.630-655
    • /
    • 2022
  • This paper examines the integrated QR code payment service (QRIS) adoption by retailers in Indonesia. Indonesia started its cashless journey in 2017 by using electric money in card form. As the country keeps developing, Indonesia has planned to integrate its payment towards a cross-border payment using QR codes by 2025 in the South East Asian region. Facing government vision, MSMEs that act as the significant economy wheel in Indonesia was required to be prepared to face the multi-cultural, multi-currency, and the new tech innovation for doing transactions. However, as a developing country, Indonesia faced significant problems with its infrastructure, which made it hard for merchants to access digital payment. As infrastructure was a common problem for developing countries, Indonesia also faced financial inclusion, lack of digital knowledge, a high amount of cash use, and socialization that made low digital payment penetration. Therefore, as there was a need to increase digital payment penetration for ASEAN integrated payment, this study found that merchant compatibility, facilitating conditions, trust, and relative advantages are drivers for MSMEs using this payment method. Further, this research provides propositions for banks, financial institutions, and governments to develop and evolve towards a cashless ecosystem, especially for a country lacking infrastructure.

A Study on the Security Framework Design for Stable Operation of Critical Infrastructure Service (주요기반시설 서비스의 안정적 운영을 위한 보안 프레임워크 설계에 관한 연구)

  • Lee, Suyeon;Yoo, Jiyeon;Lim, Jongin
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.63-72
    • /
    • 2016
  • Critical infrastructure has been operating in a closed environment with a completely separate information system and in the private area. However, with the current ICT environment changes due to convergence and open platforms it has increased the threats and risks to critical infrastructure. The importance of cyber security is increasing in the infrastructure control system, such as the outbreak of Ukraine blackout in 2015 by a malicious code called 'black energy'. This thesis aims to recognize the importance and necessity of protecting the critical infrastructure service, designing a security framework reflecting environmental and characteristic changes, and analyzing the management system suitable for a security framework. We also propose a theoretical basis for constructing a new security framework by comparing and analyzing seven international security management system standards, such as NIST 800-82 and IEC 62443-2-1, which are used in the control system. As a result, the environment surrounding critical infrastructure changes with the characteristics of connectivity, openness, and finality was studied, and as a response to this, many scholars and institutions present critical infrastructure security frameworks as cycle enhancement type structures, risk management structures, and management domain expansion structures. In response, the security framework encompassing these structures, CISF (Critical Infrastructure Security Framework), was designed. Additionally, through the security related international standard and criterion analysis, as a newly designed security standard suitable for CISF, IEC 62443-2-1 is reviewed and suggestions are made.

Research on Applying Code Signing Technology to National PKI (코드 서명 기술의 국내 PKI 적용 방안 비교 연구)

  • Lee, Rae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.27-40
    • /
    • 2004
  • Nowadays most web rages provide various services by downloading the applications program such as ActiveX Control or Java Applet. To provide code integrity and publisher authentication of downloaded software in internet, we need code signing technology. In this paper, Authenticode technology of Microsoft is lust analyzed. Based on the analysis, we propose code signing certificate profile and applying method for National Public Key Infrastructure.

Building Code Typology and Application for Open BIM based Code Checking (개방형BIM기반의 건축법규검토를 위한 법규유형화 및 적용방안)

  • Kim, Inhan;Kim, Yongha;Choi, Jungsik
    • Korean Journal of Computational Design and Engineering
    • /
    • v.19 no.3
    • /
    • pp.224-235
    • /
    • 2014
  • Recently, Productivity of the construction industry has been decreasing than other industries. Because of this, BIM is being spread in the construction industry. However, quality criteria for BIM data is insufficient. Regulation information is an important factor for initial architectural design evaluations. However, building code and related regulation are numerous. National building code structure in Korea is much more complex than other countries. The purpose of this study is to suggest the typology method of building code and apply to real regulations. To achieve this purpose, the authors have extracted required information to from original regulation for code checking and suggested mapping methods between extracted information and information of IFC scheme. In addition, the authors have represented EXPRESS-G diagram for extracting information from IFC scheme and suggested code checking method through stair case. Output of this study can be used as a base line data for automated code checking system based on open BIM. Automated code checking system will be utilized in architectural design evaluations and supported to increase design quality. It can be used to mount in SEUMTER that is the construction administration system of Ministry of Land, Infrastructure and Transport (MOLIT).

Optimal Design of Prefabricated Passenger Car-overpass Structures (승용차 전용 조립식 고가도로의 최적설계)

  • 조성배;김영우;신영석
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2004.10a
    • /
    • pp.163-170
    • /
    • 2004
  • The main objective of this research is to determine the optimal sections of infrastructure (the pier and foundation) for orthotropic steel decks which is a part of prefabricated passenger car overpasses. Since the bridge to be designed allows only passenger cars, design loads are determined according to this condition. The total volume of the infrastructure is formulated as the objective function and the design constraints are based on the 'Korean Bridge Design Code' and 'Design Manual of Steel Framed Pier'. The programs used in this research are MATLAB 6.5 and MIDAS CIVIL.

  • PDF

An Exploratory Study of Perceived Benefits and Risks for QR Code based Virtual Fashion Stores (QR코드 기반 가상패션점포의 지각된 혜택과 위험요소에 대한 탐색적 연구)

  • Kim, Eun Young;Lee, MiYoung
    • Korean Journal of Human Ecology
    • /
    • v.22 no.5
    • /
    • pp.477-490
    • /
    • 2013
  • This study explores critical and success factor of benefits and risks for predicting the acceptance of QR code virtual fashion stores. As an exploratory approach, this study conducted focus group interviews(FGI) with 21 panels who had experience with selected QR virtual stores (e.g., Home plus, 11th Street, Pin & Fit). Content analysis was used to generate 184 excerpts and classify into benefits and risks related to QR code virtual stores. With respect to benefits, content analysis identified four factors: Affective appeal, perceived usefulness, ubiquity, and brand promotion. Also, contents regarding perceived risks were classified into four factors: Complexity, lack of information, lack of technology infrastructure, and perceived cost. A managerial implication was discussed for predicting consumer technology acceptance of a QR code virtual store in the fashion retailing market.

QR code as speckle pattern for reinforced concrete beams using digital image correlation

  • Krishna, B. Murali;Tezeswi, T.P.;Kumar, P. Rathish;Gopikrishna, K.;Sivakumar, M.V.N.;Shashi, M.
    • Structural Monitoring and Maintenance
    • /
    • v.6 no.1
    • /
    • pp.67-84
    • /
    • 2019
  • Digital Image Correlation technique (DIC) is a non-contact optical method for rapid structural health monitoring of critical infrastructure. An innovative approach to DIC is presented using QR (Quick Response) code based random speckle pattern. Reinforced Cement Concrete (RCC) beams of size $1800mm{\times}150mm{\times}200mm$ are tested in flexure. DIC is used to extract Moment (M) - Curvature (${\kappa}$) relationships using random speckle patterns and QR code based random speckle patterns. The QR code based random speckle pattern is evaluated for 2D DIC measurements and the QR code speckle pattern performs satisfactorily in comparison with random speckle pattern when considered in the context of serving a dual purpose. Characteristics of QR code based random speckle pattern are quantified and its applicability to DIC is explored. The ultimate moment-curvature values computed from the QR code based random speckled pattern are found to be in good agreement with conventional measurements. QR code encrypts the structural information which enables integration with building information modelling (BIM).

A Study on N-Channel Data Correlators for Multirate in IMT-2000 (IMT-2000에서 Multirate를 위한 N-채널 데이터 상관기에 관한 연구)

  • 김종엽;이선근;김환용
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.49-52
    • /
    • 2000
  • The Multi-Code CDMA systems that are proposed as an effective transmission methodology in the IMT-2000 systems allow higher rate services under the IS-95 CDMA infrastructure. The Multi-Code CDMA systems convert the higher rate data into the lower rate by serial to parallel operation and spread the converted data streams by the multiple walsh codes, and its mobile receiver needs multiple walsh generators and data correlators to demodulate simultaneously multiple walsh code channels. Therefore, the number of data correlators is increased as the number of traffic channels increases. In this paper, we proposed the new structure of the data correlators using walsh overlay coding, the shared accumulator, and FWHT(Fast Walsh Hadamard Transform) algorithm for reducing the bottle-neck effect resulting the increase of the number of data correlators.

  • PDF