• Title/Summary/Keyword: Leakage management

Search Result 662, Processing Time 0.028 seconds

A Study of Effective Privacy Protection System on High Concurrent Transaction Database System (동시 트랜잭션이 많은 데이터베이스에서 효과적인 개인정보보호 시스템 연구)

  • Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.107-113
    • /
    • 2012
  • Recently, according to the establishment of personal information protection Act, the public and private organizations are taking a step to protect personal information rights and interests by employing the technical methods such as the access control mechanism, cryptography, etc. The result of the personal information leakage causes a serious damage for the organization image and also has to face with the responsibility by law. However, applying access control and cryptographic approach on the personal information item for every connection to large database system causes significant performance degradation in a large database system. In this paper, we designed and implemented the light weight system using JVM (Java Virtual Machine) for the Oracle DBMS environment which the concurrent transaction occurs many, thereby the proposed system provides the minimum impact on the system performance and meets the need of personal information protection. The proposed system was validated on the personal information protection system which sits on a 'A' public organization's portal site and personnel information management system.

A Study on a Plan for Improving an Unmanned Security System According to Security Threat (복합적 보안위협에 따른 기계경비 개선방안 연구)

  • Kong, Byung Seok;Hwang, Hyun Seok;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.71-76
    • /
    • 2014
  • In modern society, a social economic change is brought about, because time space limitation regarded to be restrictive in times past was overcome owing to its rapid development on the basis of IT technology. The creation of new knowledge became the basis of competitiveness of nations and companies. As competition intensifies among nations and countries in relation to the development of core technology, companies make investment with placing much weight on the development of new technology, but on the other hand, technology leakage incident continuously occurs due to a lack of understanding to protect technology. This is the largest cause of impeding the competitiveness of nations and companies. And now, it is urgent to take security measures against this. Therefore, this paper analyzes institution and system weakness in the physical security area in the integrated security environment, and then identifies all problems about this, and proposes a plan for solving these.

Design and Implementation of Blockchain for Securing Data of National Education Information System School Life Records (교육행정정보시스템 학교생활기록부 데이터의 안정성 확보를 위한 블록체인 설계 및 구현)

  • Kim, Heekyung;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.27-35
    • /
    • 2020
  • The purpose of this study is to study the technical implementation methods to prevent problems such as the record of important educational activities of the student life record department or the continuous illegal leakage and manipulation. To this end, in this paper, by applying a private blockchain that can be participated only by a given organization or individual, it prevents outsiders from participating in the block network, and creates legitimate authority by creating two types of block data: student information block and access record block in the life record book. We proposed a block mechanism that can be registered, modified, and accessed only by authorized staff members. As a result, we have prepared an alternative to prevent forgery and alteration of the living records by third parties and to secure the integrity of the living records. If applied to the educational administrative information system, social consensus will be established that the operation and management of the life record book is reliable.

Determinants of Municipal Water Prices and Costs (지자체간 수돗물 판매가격과 생산비용 격차의 결정 요인 분석)

  • Kwon, Oh-Sang
    • Environmental and Resource Economics Review
    • /
    • v.18 no.4
    • /
    • pp.695-713
    • /
    • 2009
  • This study investigates the determinants of municipal water prices and costs in Korea. A panel data set of 164 municipalities for the period 2000~2007 is used for the study. Both random and fixed effect models with an appropriate set of instruments are applied to the data. Substantial differences in prices and costs among municipalities are observed. The study finds that prices and costs increase if the leakage rate is high, the quality of primary water is bad, and the municipality has to purchase primary water from K-water which is the single creation and management corporation of water resources facilities in Korea. Prices and costs decline if the size of consumer is large, the proportion of paying consumer is high, and the amount of subsidy from the central government is large.

  • PDF

Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트팩토리 보안 요구사항 도출)

  • Park, Eun-ju;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1467-1482
    • /
    • 2017
  • Recently, Interests on The Fourth Industrial Revolution has been increased. In the manufacturing sector, the introduction of Smart Factory, which automates and intelligent all stages of manufacturing based on Cyber Physical System (CPS) technology, is spreading. The complexity and uncertainty of smart factories are likely to cause unexpected problems, which can lead to manufacturing process interruptions, malfunctions, and leakage of important information to the enterprise. It is emphasized that there is a need to perform systematic management by analyzing the threats to the Smart Factory. Therefore, this paper systematically identifies the threats using the STRIDE threat modeling technique using the data flow diagram of the overall production process procedure of Smart Factory. Then, using the Attack Tree, we analyze the risks and ultimately derive a checklist. The checklist provides quantitative data that can be used for future safety verification and security guideline production of Smart Factory.

Development of Ministry of National Defense Architecture Framework(MND AF) (국방아키텍처프레임워크의 개발)

  • Choi, Nam-Yong;Jin, Jong-Hyeon;Song, Young-Jae
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.407-414
    • /
    • 2004
  • The US DoD architecture framework defines architecture Products according to three viewpoints : operational view, system view, and technical view. But, its coarse-grained development process causes leakage of the details In transforming among different views. It also uses different methods for architecture products development, so that the levels of those products are not consistent. So. we propose MND AF(Ministry of National Defense Architecture Framework) for military environment to solve those problems. We propose additional architecture products to achieve consistency, including “architecture disciplines definition description,”“organization-to-activity relationships matrix,” “system definition description,” and “technical reference model,” etc. We also propose the architecture development process in more detail through seven steps. In addition, we propose the applicability of those products to the life cycle processes of the acquisition management. MND AF can provide consistency and traceability of architecture products, provide the basis for sl·stem integration and interoperability. Also, architecture developers can construct architecture in a more effective and efficient way through MND AF.

A Study on the Quantitative Risk Assessment of Hydrogen-CNG Complex Refueling Station (수소-CNG 복합충전소 정량적 위험성평가에 관한 연구)

  • Kang, Seung-Kyu;Huh, Yun-Sil
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.1
    • /
    • pp.41-48
    • /
    • 2020
  • This study performed a quantitative risk assessment for hydrogen-CNG complex refueling stations. Individual and societal risks were calculated by deriving accident scenarios that could occur at hydrogen and CNG refueling stations and by considering the frequency of accidents occurring for each scenario. As a result of the risk assessment, societal risk levels were within the acceptable range. However, individual risk has occurred outside the allowable range in some areas. To identify and manage risk components, high risk components were discovered through risk contribution analysis. High risks at the hydrogen-CNG complex refueling station were large leakage from CNG storage containers, compressors, and control panels. The sum of these risks contributed to approximately 88% of the overall risk of the fueling station. Therefore, periodic and intensive safety management should be performed for these high-risk elements.

Clinical Analysis of Spontaneous Pneumothorax -Comparison of VATS Versus Limited Thoracotomy- (자연기흉에서 비디오흉강경과 개흉술에 의한 기포제거술의 비교)

  • 이서원;이계선;정진악;금동윤;안정태;이재원
    • Journal of Chest Surgery
    • /
    • v.31 no.4
    • /
    • pp.369-373
    • /
    • 1998
  • The bullectomy through the limited transaxillary thoracotomy and video-assisted thoracic surgery(VATS) had been used in operative management of spontaneous pneumothorax from Jan. 1994 to July 1997. The study comprised a retrospective review of 42 cases which were treated by limited thoracotomy, and 61 cases treated by video-assisted thoracoscopic sugery. We retrospectively reviewed annual incidnce of bullectomy. Analysis of video-assised thoracoscopic surgery and open bullectomy including age, sex, operative sites, surgical indications, associated diseases, operative time, posoperatve complications and hospital courses. There was no significant difference for operation time in two groups, 98.3${\pm}$38.4 minutes in thoracotomy and 95.7${\pm}$31.5 minutes in VATS. Prolonged air leakage over 7 days was observed in 8 cases from thoracotomy group, 4 cases from VATS group. 3 cases of recurrent pneumothorax were found from VATS group, but no recurrence was occurred from open bullectomy group. There were significant differences in postoperative hospital stay (8.0${\pm}$3.9 day in thoracotomy vs 5.9${\pm}$2.4day in VATS(P=0.001)), and indwelling period of chest tube after operation( 5.8${\pm}$3.0day in thoracotomy vs 4.0${\pm}$2.0day in VATS(P=0.0006)).

  • PDF

IoT Environment and Security Countermeasures in 4th Industrial Revolution (4차 산업혁명 시대의 사물인터넷 현황 및 보안 대응책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.195-200
    • /
    • 2019
  • The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.

Development of Gas Leak Detecting System Based on Quantum Technology (양자기술기반 가스 누출 감지 시스템 개발)

  • Kwon, Oh Sung;Park, Min Young;Ban, Changwoo
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.5
    • /
    • pp.57-62
    • /
    • 2021
  • Gas is an energy source widely used in general households and industrial sites, and is also a process material widely used in petrochemical and semiconductor processes. However, while it is easy to use, it can cause large-scale human damage due to leakage, explosion, and human inhalation. Therefore, a gas facility safety management solution that can be safely used at home and industrial sites is essential. In particular, the need to develop advanced gas safety solutions is emerging as gas facilities are aging. In this paper, a technology was developed to measure the presence and concentration of gas leaks from a distance by irradiating photons, the minimum energy unit that can no longer be divided into gas facilities, and analyzing the number of reflected photons. This overcomes technical limitations such as short detection distance and inability to detect fine leaks, which are the limitations of conventional electric/chemical gas sensors or infrared-based gas leak detectors.