• 제목/요약/키워드: Internet E-mail

검색결과 293건 처리시간 0.024초

무선공유기 보안공격 분석 및 무료와이파이 해킹 해결방안 (Security Attack Analysis for Wireless Router and Free Wi-Fi Hacking Solutions)

  • 배희라;김민영;송수경;이슬기;장영현
    • 문화기술의 융합
    • /
    • 제2권4호
    • /
    • pp.65-70
    • /
    • 2016
  • 공공와이파이를 이용한 메일확인과 인터넷뱅킹 등의 네트워크 통신량이 증가함에 따라 공공공유기 해킹의 위험성이 지속적으로 높아지고 있다. 국가적으로 공공공유기를 확대하는데 비해 사용자의 보안인식은 부족하여 개인정보 노출 위험성이 커지고 있다. 무선공유기는 접근성이 뛰어나지만 상대적으로 해킹이 용이하므로 대응차원의 해킹에 대한 분석이 중요하다. 본 논문에서는 와이파이에 사용되는 암호화 방식 및 무선공유기의 보안 공격에 대한 무료와이파이 해킹 사례분석 및 해결방안을 제안한다.

O/S 정보를 이용한 침입탐지 처리성능 향상에 관한 시스템 설계 및 구현 (Designing and Realization of the System for the Improvement of Processing Capability of Intrusion Detection by Using O/S Information)

  • 손만경;이동휘;김귀남
    • 융합보안논문지
    • /
    • 제6권2호
    • /
    • pp.91-99
    • /
    • 2006
  • 네트워크의 속도가 빨라지고 인터넷의 보편화로 인하여 웜, 이메일 바이러스 등 악의적인 공격이 급증하였으며. 네트워크의 악의적인 공격에 대한 방어로 기존의 방화벽을 비롯하여 최근 침입방지시스템에 이르기까지 수많은 방어기법이 생겨났다. 또한 악의적인 공격의 형태가 바뀜과 동시에 방어의 기법도 달라지게 된다. 가장 대표적인 방어 기법으로 Snort를 들 수 있으며 공격형태가 바뀜에 따라 Snort의 Rules 파일이 증가하게 된다. 따라서 탐지수행능력이 점점 떨어지게 된다. 본 논문에서는 Snort의 Rule 파일을 O/S별로 구분하여 처리성능 향상을 위한 구조를 제안하고 설계 및 구현한다. 이 시스템은 Snort의 기본 구성보다 처리성능을 향상시킬 수 있다.

  • PDF

한국근로자의 직장 내 유해인자 노출과 장기적인 건강문제의 관련성: 제5차 근로환경조사를 이용하여 (Relationship between Workplace Hazard Exposures and Chronic Health Problems in Korea: The Fifth Korean Working Conditions Survey)

  • 김윤희
    • 한국직업건강간호학회지
    • /
    • 제29권1호
    • /
    • pp.58-68
    • /
    • 2020
  • Purpose: Workers with chronic health problems find it difficult to maintain their work because of socioeconomic difficulties. The purpose of this study was to evaluate the relationships between physical, ergonomic, and mental health hazards in the workplace and chronic health problems of Korean workers. Methods: A total of 28,807 wage workers participated in the study and were selected using the Fifth Korean Working Conditions Survey (2017). Multiple logistic regression analysis was used to determine the associations between physical, ergonomic, and mental health hazards and chronic health problems. Results: Of the participants, 1,220 (4.23%) had chronic health problems. Even after adjusting the general characteristics, vibration, noise, high temperature, low temperature, dust, chemical and cigarette smoke, fatigue and painful posture, dragging or pushing or moving of heavy objects, repetitive hand or arm movements, working with a computer or smartphone, use of internet or e-mail, and anxiety situations increased the risk of chronic health problems. Conclusion: The study reaffirms that exposure of physical, ergonomic, and mental health hazards in the workplace significantly increases the risk of chronic health problems.

Vietnamese Consumer Attitudes towards Smartphone Advertising

  • GIAO, Ha Nam Khanh;VUONG, Bui Nhat
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권5호
    • /
    • pp.195-204
    • /
    • 2020
  • This research examines four specific objectives: (1) identifying factors that affect Vietnamese consumer attitudes towards smartphone advertising, (2) measuring the level of impact of the factors, (3) testing the difference of attitudes among groups of consumers with different characteristics in terms of gender, age, income, and academic level, and (4) proposing some managerial implications to have better Vietnamese consumer attitudes towards smartphone advertising. The study uses the online survey form via e-mail and Facebook in a convenience sampling method; the subjects surveyed are between the ages of 18 and 35, and all are in urban areas in Vietnam, and are using smartphones and accessing the internet and other phone applications. A sample of 490 respondents were valid and used for processing. The study employs a combination of qualitative and quantitative methods to analyze exploratory factors and linear multiple regression. The results reveal that there are five main factors affecting Vietnamese consumer attitudes towards smartphone advertising positively, arranged by reduced importance: entertainment, informativeness, credibility, non-irritation, permission and control. From that, the study offers some managerial suggestions for smartphone advertisers to improve their strategies and tatics to enhance their customer service, so that the smartphone advertising can attract people and help Vietnamese consumer in their buying behavior.

최적의 케이블 모뎀 PHY 성능 구현 및 케이블 망 측정 시스템 개발 (Developing the Measurement System with Establishing the PHY Performance of Best Proper Cable Modem)

  • 이경문;고재평;이장명
    • 제어로봇시스템학회논문지
    • /
    • 제14권2호
    • /
    • pp.205-211
    • /
    • 2008
  • This paper describes the method aimed at establishing the equipment measuring the parameter of Cable Network by Best proper Cable Modem and PDA through RS232 interface. In this paper, we propose our creative experimental configuration and develope the Cable Modem (DOCSIS 2.0) superior more performing than the referred Cable Modem (DOCSIS 1.0, 1.1) and the measuring equipment of HFC network compositing of Cable Modem and PDA through RS232 interface. This equipment analyzes Upstream (U/S) and Downstream (D/S) Signal quality and generates the signal of Upstream by CW signal. The paper also provides the experimental results to check the Best Proper Cable Modem and the displayed screen for parameters for SNR, BER and the demodulated IQ diagram of 256QAM through LCD of PDA. Henceforth, it'll be possible to support a variety of the functions for E-mail, Internet, the speed test of WEB connection and the transmission of the measured result real time by PDA.

FTS를 이용한 논리적 망 분리와 행위기반 탐지 시스템에 관한 연구 (A Study of Logical Network Partition and Behavior-based Detection System Using FTS)

  • 김민수;신상일;안정준;김귀남
    • 융합보안논문지
    • /
    • 제13권4호
    • /
    • pp.109-115
    • /
    • 2013
  • 인터넷망을 이용한 정보 전달의 대표적인 수단인 이메일 서비스 등을 통한 보안위협이 급증하고 있다. 이러한 보안위협의 공격 경로는 첨부된 문서파일에 악성코드를 삽입하고, 해당 응용프로그램의 취약점을 이용하여 사용자의 시스템을 감염시키게 된다. 따라서 본 연구에서는 파일 전송과정에서 위장악성코드의 감염을 차단하기 위해, 논리적 망 분리인 FTS(File Transfer System)를 이용한 무결성 검증 및 행위기반 탐지 시스템을 제안하고, 기존의 보안기법과의 비교 및 검증하고자 한다.

MPEG-4 표준을 이용한 멀티미디어 스트리밍 시스템 구현 (Implementation of A Multimedia Streaming System using MPEG-4)

  • 임동근;이정우;김선태;마평수;호요성
    • 방송공학회논문지
    • /
    • 제6권3호
    • /
    • pp.215-224
    • /
    • 2001
  • 최근 멀티미디어 분야의 연구개발 동향은 주로 비디오와 오디오 신호의 개별적인 부호화에 치중하던 이전의 기술적 동향에서 벗어나, 비디오, 오디오, 텍스트 등과 같은 여러 종류의 신호에 대하여 시간상 동기일치를 고려하여 다중화하는 시스템 기술의 중요성이 더욱 증가하고 있다. MPEG-4 영상압축 표준은 영상의 내용에 대한 이해를 바탕으로 내용기반 부호화에 중점을 두고 있다. 이 내용기반 부호화에서는 각 미디어 데이터 자체를 개체 단위로 나누어 처리할 수 있기 때문에 사용자의 의도에 따라 다양한 형태의 조작과 디스플레이가 가능하며 그 응용 분야가 매우 넓다. 본 논문에서는 MPEG-4 표준의 시스템 규격과 파일 포맷에 따라 구현된 멀티미디어 서비스 시스템을 기술하였다. 구현된 기술은 멀티미디어 데이터의 스트리밍, DVD, 영상전자메일, 디지털 방송과 같은 다양한 멀티미디어 서비스에 응용될 수 있는 기반 기술로서 그 중요성을 가진다.

  • PDF

Information Security and Its Aapplications on the Portal of the Deanship of Library Affairs at Northern Border University

  • Al Eawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.183-188
    • /
    • 2021
  • The study aimed to assess the state of electronic security for the website of the Deanship of Library Affairs at Northern Border University, as one of the university's electronic portals, which provides distinguished knowledge services to faculty members, through the Saudi Digital Library, and the integrated automated system for libraries (Symphony) with the definition of cyber security of the university, and the most important threats The study sought to analyze the opinions of a wide sample of faculty members, towards evaluating the state of electronic security for the Deanship of Library Affairs portal, through the use of both the analytical method, as well as the survey, using the questionnaire tool, and the study sample consisted of 95 A faculty member of all academic categories and degrees, and university faculties, and the study concluded that it is necessary to work to overcome the relative slowness of the university's Internet, with the faculty members notifying the information security services through e-mail and SMS service, with the continuous updating of operating systems, Apply and use the latest anti-spyware, hacking, and antivirus software at the university, while conducting extensive research studies towards information security services, and contracting It aims to introduce information security risks, and ways to combat and overcome them, and spread the culture of information security among faculty members.

전자상거래 활용에 따른 정보검색비용 절감효과에 관한 연구 (A Study on the Reduction Effects of Information Search Cost in Electronic Commerce Application)

  • 조원길
    • 정보학연구
    • /
    • 제2권2호
    • /
    • pp.199-215
    • /
    • 1999
  • 오늘날 기업들이 전자상거래를 활용함으로써 얻을 수 있는 경제적인 효과는 매우 다양하다. 이에 전자상거래를 활용하는 업체의 효율적인 거래처 선정방법을 위한 정보검색비용절감 정도에 연구하고, 그에 따른 각각의 결과적인 실태를 분석하여 향후 전자상거래 활용기업에게 방향을 제시하고자 한다.

  • PDF

도입주체에 따른 인터넷경로의 도입효과 (The Impact of the Internet Channel Introduction Depending on the Ownership of the Internet Channel)

  • 유원상
    • 마케팅과학연구
    • /
    • 제19권1호
    • /
    • pp.37-46
    • /
    • 2009
  • The Census Bureau of the Department of Commerce announced in May 2008 that U.S. retail e-commerce sales for 2006 reached $ 107 billion, up from $ 87 billion in 2005 - an increase of 22 percent. From 2001 to 2006, retail e-sales increased at an average annual growth rate of 25.4 percent. The explosive growth of E-Commerce has caused profound changes in marketing channel relationships and structures in many industries. Despite the great potential implications for both academicians and practitioners, there still exists a great deal of uncertainty about the impact of the Internet channel introduction on distribution channel management. The purpose of this study is to investigate how the ownership of the new Internet channel affects the existing channel members and consumers. To explore the above research questions, this study conducts well-controlled mathematical experiments to isolate the impact of the Internet channel by comparing before and after the Internet channel entry. The model consists of a monopolist manufacturer selling its product through a channel system including one independent physical store before the entry of an Internet store. The addition of the Internet store to this channel system results in a mixed channel comprised of two different types of channels. The new Internet store can be launched by the independent physical store such as Bestbuy. In this case, the physical retailer coordinates the two types of stores to maximize the joint profits from the two stores. The Internet store also can be introduced by an independent Internet retailer such as Amazon. In this case, a retail level competition occurs between the two types of stores. Although the manufacturer sells only one product, consumers view each product-outlet pair as a unique offering. Thus, the introduction of the Internet channel provides two product offerings for consumers. The channel structures analyzed in this study are illustrated in Fig.1. It is assumed that the manufacturer plays as a Stackelberg leader maximizing its own profits with the foresight of the independent retailer's optimal responses as typically assumed in previous analytical channel studies. As a Stackelberg follower, the independent physical retailer or independent Internet retailer maximizes its own profits, conditional on the manufacturer's wholesale price. The price competition between two the independent retailers is assumed to be a Bertrand Nash game. For simplicity, the marginal cost is set at zero, as typically assumed in this type of study. In order to explore the research questions above, this study develops a game theoretic model that possesses the following three key characteristics. First, the model explicitly captures the fact that an Internet channel and a physical store exist in two independent dimensions (one in physical space and the other in cyber space). This enables this model to demonstrate that the effect of adding an Internet store is different from that of adding another physical store. Second, the model reflects the fact that consumers are heterogeneous in their preferences for using a physical store and for using an Internet channel. Third, the model captures the vertical strategic interactions between an upstream manufacturer and a downstream retailer, making it possible to analyze the channel structure issues discussed in this paper. Although numerous previous models capture this vertical dimension of marketing channels, none simultaneously incorporates the three characteristics reflected in this model. The analysis results are summarized in Table 1. When the new Internet channel is introduced by the existing physical retailer and the retailer coordinates both types of stores to maximize the joint profits from the both stores, retail prices increase due to a combination of the coordination of the retail prices and the wider market coverage. The quantity sold does not significantly increase despite the wider market coverage, because the excessively high retail prices alleviate the market coverage effect to a degree. Interestingly, the coordinated total retail profits are lower than the combined retail profits of two competing independent retailers. This implies that when a physical retailer opens an Internet channel, the retailers could be better off managing the two channels separately rather than coordinating them, unless they have the foresight of the manufacturer's pricing behavior. It is also found that the introduction of an Internet channel affects the power balance of the channel. The retail competition is strong when an independent Internet store joins a channel with an independent physical retailer. This implies that each retailer in this structure has weak channel power. Due to intense retail competition, the manufacturer uses its channel power to increase its wholesale price to extract more profits from the total channel profit. However, the retailers cannot increase retail prices accordingly because of the intense retail level competition, leading to lower channel power. In this case, consumer welfare increases due to the wider market coverage and lower retail prices caused by the retail competition. The model employed for this study is not designed to capture all the characteristics of the Internet channel. The theoretical model in this study can also be applied for any stores that are not geographically constrained such as TV home shopping or catalog sales via mail. The reasons the model in this study is names as "Internet" are as follows: first, the most representative example of the stores that are not geographically constrained is the Internet. Second, catalog sales usually determine the target markets using the pre-specified mailing lists. In this aspect, the model used in this study is closer to the Internet than catalog sales. However, it would be a desirable future research direction to mathematically and theoretically distinguish the core differences among the stores that are not geographically constrained. The model is simplified by a set of assumptions to obtain mathematical traceability. First, this study assumes the price is the only strategic tool for competition. In the real world, however, various marketing variables can be used for competition. Therefore, a more realistic model can be designed if a model incorporates other various marketing variables such as service levels or operation costs. Second, this study assumes the market with one monopoly manufacturer. Therefore, the results from this study should be carefully interpreted considering this limitation. Future research could extend this limitation by introducing manufacturer level competition. Finally, some of the results are drawn from the assumption that the monopoly manufacturer is the Stackelberg leader. Although this is a standard assumption among game theoretic studies of this kind, we could gain deeper understanding and generalize our findings beyond this assumption if the model is analyzed by different game rules.

  • PDF