• Title/Summary/Keyword: Internal Network Information

Search Result 506, Processing Time 0.026 seconds

Correspondence Strategy for Big Data's New Customer Value and Creation of Business (빅 데이터의 새로운 고객 가치와 비즈니스 창출을 위한 대응 전략)

  • Koh, Joon-Cheol;Lee, Hae-Uk;Jeong, Jee-Youn;Kim, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.4
    • /
    • pp.229-238
    • /
    • 2012
  • Within last 10 years, internet has become a daily activity, and humankind had to face the Data Deluge, a dramatic increase of digital data (Economist 2012). Due to exponential increase in amount of digital data, large scale data has become a big issue and hence the term 'big data' appeared. There is no official agreement in quantitative and detailed definition of the 'big data', but the meaning is expanding to its value and efficacy. Big data not only has the standardized personal information (internal) like customer information, but also has complex data of external, atypical, social, and real time data. Big data's technology has the concept that covers wide range technology, including 'data achievement, save/manage, analysis, and application'. To define the connected technology of 'big data', there are Big Table, Cassandra, Hadoop, MapReduce, Hbase, and NoSQL, and for the sub-techniques, Text Mining, Opinion Mining, Social Network Analysis, Cluster Analysis are gaining attention. The three features that 'bid data' needs to have is about creating large amounts of individual elements (high-resolution) to variety of high-frequency data. Big data has three defining features of volume, variety, and velocity, which is called the '3V'. There is increase in complexity as the 4th feature, and as all 4features are satisfied, it becomes more suitable to a 'big data'. In this study, we have looked at various reasons why companies need to impose 'big data', ways of application, and advanced cases of domestic and foreign applications. To correspond effectively to 'big data' revolution, paradigm shift in areas of data production, distribution, and consumption is needed, and insight of unfolding and preparing future business by considering the unpredictable market of technology, industry environment, and flow of social demand is desperately needed.

Design and Implementation of eBPF-based Virtual TAP for Inter-VM Traffic Monitoring (가상 네트워크 트래픽 모니터링을 위한 eBPF 기반 Virtual TAP 설계 및 구현)

  • Hong, Jibum;Jeong, Seyeon;Yoo, Jae-Hyung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.26-34
    • /
    • 2018
  • With the proliferation of cloud computing and services, the internet traffic and the demand for better quality of service are increasing. For this reason, server virtualization and network virtualization technology, which uses the resources of internal servers in the data center more efficiently, is receiving increased attention. However, the existing hardware Test Access Port (TAP) equipment is unfit for deployment in the virtual datapaths configured for server virtualization. Virtual TAP (vTAP), which is a software version of the hardware TAP, overcomes this problem by duplicating packets in a virtual switch. However, implementation of vTAP in a virtual switch has a performance problem because it shares the computing resources of the host machines with virtual switch and other VMs. We propose a vTAP implementation technique based on the extended Berkeley Packet Filter (eBPF), which is a high-speed packet processing technology, and compare its performance with that of the existing vTAP.

A Study on the Countermeasures against APT Attacks in Industrial Management Environment (산업경영환경에서 지속적 APT 공격에 대한 대응방안 연구)

  • Hong, Sunghyuck
    • Journal of Industrial Convergence
    • /
    • v.16 no.2
    • /
    • pp.25-31
    • /
    • 2018
  • An APT attack is a new hacking technique that continuously attacks specific targets and is called an APT attack in which a hacker exploits various security threats to continually attack a company or organization's network. Protect employees in a specific organization and access their internal servers or databases until they acquire significant assets of the company or organization, such as personal information leaks or critical data breaches. Also, APT attacks are not attacked at once, and it is difficult to detect hacking over the years. This white paper examines ongoing APT attacks and identifies, educates, and proposes measures to build a security management system, from the executives of each organization to the general staff. It also provides security updates and up-to-date antivirus software to prevent malicious code from infiltrating your company or organization, which can exploit vulnerabilities in your organization that could infect malicious code. And provides an environment to respond to APT attacks.

Management of the Processes on the Quality Provision of the Logistic Activity in the Context of Socio-Economic Interaction of Their Participants

  • Savin, Stanislav;Kravchyk, Yurii;Dzhereliuk, Yuliia;Dyagileva, Olena;Naboka, Ruslan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.45-52
    • /
    • 2021
  • The article proves the relevance of developing conceptual frameworks for managing the quality assurance of logistics activities in the context of socio-economic interaction of their participants. It is established that the fundamental difference of the logistic approach in management from traditional approaches is the allocation of a single management function of previously separated, disparate material flows, as well as economic, technological, information integration of chain links into a single system capable of effective management of these flows. It is substantiated that the functioning of the enterprise as a logistics system can be represented in the form of a triad of logistics components, namely: supply logistics, production logistics, sales logistics. Management of quality assurance processes of logistics activities in the context of socio-economic interaction of their participants is a functional component of the entire logistics system due to the quality of work and interaction of all participants in the implementation of certain activities. The quality of logistics activities will affect the level of economic potential, rationalization and optimization of all logistics flows. It is proved that the management of quality assurance processes of logistics activities in the context of socio-economic interaction of their participants involves the following main areas: the introduction of a quality system of logistics processes; development and implementation of the general strategy of quality improvement at the enterprise; internal integration; controlling. Management of quality assurance processes of logistics activities in the context of socio-economic interaction of its participants requires compliance with the following requirements: systematic and comprehensive management of all flow processes; coordination of criteria and indicators for assessing the effectiveness of the entire logistics system; dissemination of the use and application of information technology; ensuring partnerships and close interaction of all participants in sales networks.

Formation of Resilience in the Context of Volunteer Activities Using Information and Communications Technology

  • Lazarenko, NataLiia;Sabat, Nataliia;Sabat, Nadiia;Sylenko, Nadiia;Rundong, Wang;Duchenko, Anna;Shuppe, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.374-381
    • /
    • 2022
  • The article identifies and theoretically substantiates the trends of national resilience in the context of establishing the security of the country and its civilizational subjectivity. The strategy of development of the pedagogical university in the conditions of European integration into the European educational and scientific space based on certain characterological features of the personality of the volunteer in the context of allocation of personal resilience is developed. The analysis of both external and internal challenges and threats to the civilization of the country needs to be understood in the context of economic, socio-political, legal, military-political, spiritual-cultural, educational-scientific and network-information resilience. The concepts of "national resilience" and "national security" are quite close - at first glance, even identical. However, a deeper understanding clarifies the differences: national security is a state of protection of the country identity and its very existence, the realization of its national interests. In turn, resilience is a fairly effective strategy and a fundamental guarantee of national security. At the same time, it is extremely important to understand that both national security as a state and national resilience as a strategy are only means of achieving and developing a strong and humanistic civilizational subjectivity of the country. After all, such subjectivity opens for citizens the opportunity for development, dignified self-realization and a proper life. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The use of information and communication technologies in volunteering will contribute to the formation of resilience traits in the structure of personality formation. Directly to the personal traits of resilience should be included methodological competencies, which include methodological knowledge, skills and abilities (ability to define ultimate and intermediate goals, plan, conduct and analyze knowledge, establish and implement interdisciplinary links with disciplines of medical-psychological-pedagogical cycles, etc.). All these competencies form the professional resilience of the volunteer.

Personal Information System risk analysis standard supporting tool development (개인정보시스템 위험도 분석 기준 지원 도구 개발 연구)

  • Han, Kyung-Su;Jung, Hyun-Mi;Lee, Gang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.663-666
    • /
    • 2012
  • Since September 30 2011, depending on Personal Information Protection Act article 29 and Act standard securing personal information safety the fifth clause of article 7, in case personal information manager of public and private enterprise saves unique indentifying information to internal network, the manager can enforce that decide checking of cryptographic application and a range of application following risk analysis criteria result. Until December 31 2012, enterprises complete the application of cryptographic technology or the equivalent. The paper is research and development on supporting tool that suggest risk analysis criteria based on personal information risk analysis criteria that be provided by MOPAS(Ministry Of Public Administration and Security) and KISA(Korea Internet Security Agency) for personal information processing.

  • PDF

Development of High Speed Scalar Product Operation System for ECC Public Key (타원곡선 공개키 생성을 위한 고속 스칼라곱 연산 시스템 구현)

  • Kim, Kap-Yol;Lee, Chul-Soo;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.394-402
    • /
    • 2010
  • At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don't care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.

A study on the local government's Sustainable expansion plan of volunteer (지방정부의 지속가능한 자원봉사자 확대 방안에 관한 연구)

  • Kim, Seong-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.177-184
    • /
    • 2014
  • This study suggested the necessity of efficient volunteer management plan and continuous volunteer expansion plan to enhance the continuity of volunteer activity by local government and induce more systematic and stable volunteer activity. As a prior concrete plans for volunteer expansion, this study suggested establishing the incentive for expanding continuous volunteers through coexisting and cooperation, enhancing the propulsion will and providing an institutional strategy of local and metropolitan government heads, improving volunteer's internal capability, and reinforcing administrative support and financial aid. Also this study emphasized the effectiveness of various volunteer-related matters such as daring support and investment to drastically expand continuous volunteers and their activities.

Power Quality Monitoring with Electronic Watt-hour meter and Wireless communication module (전자식 전력량계와 무선모듈을 이용한 전력품질 표시 및 모니터링)

  • Jung, Deug-Il;Son, Young-Dae
    • Proceedings of the KIEE Conference
    • /
    • 2007.10c
    • /
    • pp.172-174
    • /
    • 2007
  • An electronic watt-hour meter with high-precision measurement technology can provide many valuable metering data of a real-time system measurements, such as per-phase voltage, ampere, active power, reactive power, apparent power, power factor, and system frequency. Also many of accumulated metering data such as active energy, reactive energy, apparent energy, and load profile can be gettable from an electronic watt-hour meter[1]. This paper presents an approach of the small-sized AMR (Automatic Meter Reading) that provides customers with a very valuable electrical service. This AMR service transmits lots of a valuable metering data by using ZigBee communication module, so that users resided in their premises can use the information to audit a power quality and improve their electrical conditions by using the PQ monitoring device equipped with ZigBee receiver. This PQ monitoring device shows metering data on LCD and transmits to the PC through an internal network. Also, the device can keep the valuable meter data into a built-in non-volatile memory. The final goal of this paper is to better understand the power quality of electrical systems and offer the power qualify information for the convenience of all power consumers.

  • PDF

Visualization Techniques for Massive Source Code (대용량 소스코드 시각화기법 연구)

  • Seo, Dong-Su
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.4
    • /
    • pp.63-70
    • /
    • 2015
  • Program source code is a set of complex syntactic information which are expressed in text forms, and contains complex logical structures. Structural and logical complexity inside source code become barriers in applying visualization techniques shown in traditional big-data approaches when the volume of source code become over ten-thousand lines of code. This paper suggests a procedure for making visualization of structural characteristics in source code. For this purpose, this paper defines internal data structures as well as inter-procedural relationships among functions. The paper also suggests a means of outlining the structural characteristics of source code by visualizing the source codes with network forms The result of the research work can be used as a means of controling and understanding the massive volume of source code.