• Title/Summary/Keyword: National Information

Search Result 50,853, Processing Time 0.093 seconds

Information Sovereignty as the Basis of Modern State Information Security

  • Zozulia, Oleksandr;Zozulia, Ihor;Brusakova, Oksana;Kholod, Yurii;Berezhna, Yevheniia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.264-268
    • /
    • 2021
  • In the context of globalization of information processes, the prevalence of information wars and terrorism, there are new threats to national interests in the information sphere, which actualizes providing the information sovereignty of modern states. Therefore, the purpose of the article is an in-depth analysis of the features and content of information sovereignty as a component of state sovereignty, its relationship with freedom of information and information security, as well as a characterization of the bases and directions of providing information sovereignty. The information sovereignty of the modern state includes its activities to determine national interests in the information sphere, the formation and implementation of information policy, providing information security, regulation and control of information processes. The realization of information sovereignty should be based on real freedom of information, information privacy and the state obligation to provide them. Ensuring information sovereignty also requires solving the problems of formation of modern information legislation, which would comprehensively establish the bases and directions of providing information sovereignty, exceptional cases of restriction of freedom of information.

Efficient Script-File based Profiling for Web Attack Detection (스크립트 파일 기반의 효율적인 웹 공격 탐지 프로파일링)

  • Im, Jong-Hyuk;Park, Jae-Chul;Kim, Dong-Kook;Noh, Bong-Nam
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.511-514
    • /
    • 2006
  • 비정상행위 탐지를 위한 프로파일 기술은 침임탐지시스템의 성능 향상을 위한 핵심기술로서, 높은 공격 탐지율과 침입탐지시스템의 수행 시간 단축을 위해 반드시 요구되는 기술이다. 최근 인터넷의 보급과 활성화로 웹 어플리케이션 보안을 위한 연구가 활발히 진행되고 있으나, 웹 애플리케이션의 개발 언어와 공격 특성을 반영하지 못해 그 효율성이 저하되고 있다. 본 논문에서는 웹 공격 탐지를 위해 연구 되었던 서열정렬 알고리즘을 이용한 웹 공격 탐지의 성능 개선을 위하여 웹 애플리케이션 개발에 주로 사용되는 스크립트파일을 기반으로 한 프로파일 방법을 제안하고 실험 결과를 기술하였다.

  • PDF

Challenges in Construction of Omics data integration, and its standardization (농생명 오믹스데이터 통합 및 표준화)

  • Kim, Do-Wan;Lee, Tae-Ho;Kim, Chang-Kug;Seol, Young-Joo;Lee, Dong-Jun;Oh, Jae-Hyeon;Beak, Jung-Ho;Kim, Juna;Lee, Hong-Ro
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.768-770
    • /
    • 2015
  • We performed integration and standardization of the omics data related agriculture. To do this, we requires progressed computational methods and bioinformatics infrastructures for integration, standardization, mining, and analysis. It makes easier biological knowledge to find. we potentialize registration a row and processed data in NABIC (National Agricultural Biotechnology Information Center) and its processed analysis results were offered related researchers. And we also provided various analysis pipelines, NGS analysis (Reference assembly, RNA-seq), GWAS, Microbial community analysis. In addition, the our system was carried out based on the design and build the quality assurance in management omics information system and constructed the infrastructure for utilization of omics analyze system. We carried out major improvement quality of omics information system. First is Improvement quality of registration category for omics based information. Second is data processing and development platform for web UI about related omics data. Third is development of proprietary management information for omics registration database. Forth is management and development of the statistics module producers about omics data. Last is Improvement the standard upload/ download module for Large omics Registration information.

  • PDF

A Study on Key Management Technology for DRM (DRM에서 키 관리 기술에 관한 연구)

  • Yang, Seong-Hoon;Han, Dea-Yul;Kim, Seong-Hoon;Park, Ik-Su;Lee, Kyoung-Hyo;Jung, Seok-Won;Seo, Jae-Hyun;Kim, Jong-Hwa;Oh, Byeong-Kyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1177-1180
    • /
    • 2005
  • DRM에서 키 관리 기술은 중앙 집중 키 관리 방식, Enveloping 방식 등이 있다. 본 논문에서는 암호화 키를 콘텐츠에 함께 동봉하는 키 관리 방식을 기반으로 새로운 DRM 키 관리 기술을 제안한다. 제안하는 키 관리 기술은 사용자 인증에서 사용된 인증정보를 콘텐츠 암호화 키로 사용함으로 콘텐츠 암호화 키를 암호화하여 전송할 필요가 없는 장점이 있다.

  • PDF

Information Creation Matrix Analysis for Analyzing National R&D Information System (국가 연구개발 정보체계 분석을 위한 정보생성행렬 분석)

  • 김종우;주영진;이성용;정현수
    • Journal of Information Technology Applications and Management
    • /
    • v.9 no.2
    • /
    • pp.57-70
    • /
    • 2002
  • In this paper, we propose matrix analysis methods for analyzing national R&D information creation. In order to analyze R&D information creation at national level, it is necessary to analyze whether information is created systematically for each technical category and for each information type. In this paper, ‘uniformity’and ‘concentration’criterions are proposed to check national R&D information creation and we provide formulas to measure the criterions. The criterions are applied to domestic information creation in information and communication domain to show the utilization of the proposed method.

  • PDF

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.

Feature Analyze and Research of National Convergence R&D: With Focus on the Text Mining (국가 융합 R&D 특성 분석에 관한 연구: 텍스트분석을 중심으로)

  • Yoo, KiCheol;Lee, TaeHee;Choi, SangHyun;Lee, JungHwan
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.1
    • /
    • pp.59-73
    • /
    • 2020
  • There is a growing interest in convergence. National R & D is also providing various policies and institutional support to promote convergence research. Convergence research, however, does not clearly specify its characteristics at the academic and government levels. This research proceeds with the process of collecting, refining, analyzing, modeling, verifying and visualizing national R & D data through the National Science and Technology Information Service (NTIS). The method is to derive the convergence research characteristics and to derive through text mining, focusing on the unstructured information of national R & D project data. The study confirmed that there was a difference in perception between the definition of converged research and the research site. In order to improve this, the research suggested that convergence among research subjects, collaboration among research topics reflecting various backgrounds and characteristics of researchers, and analysis of characteristics of convergence research using information were suggested in the process of establishing convergence policy.

Experience of Theory and Practice of the Process of Implementing Information Technologies in the Educational Environment

  • Melnyk, Yaroslav;Drapak, Halyna;Sverdlyk, Zoriana;Tsilyna, Maryna;Varenko, Volodymyr;Boichuk, Nelia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.75-79
    • /
    • 2021
  • The article covered theoretical aspects use of information and communication technologies in teaching. Information and communication technologies are technologies that allow you to search, process and assimilate information from various sources, including the Internet. This is the presentation of information in electronic form, its processing and storage, the use of the computer, a variety of programs. The use of information and communication technologies in the work of a student gives an increase in motivation for learning; increased cognitive interest; evaluate their learning activities, identify the problems of their own educational activities; the formation of cognitive independence of students.

A Study on the multifunctional Treadmill Using Piezoelectric Elements (압전소자를 이용한 자가발전형 다기능 트레드밀 설계)

  • Jung, Sang-Jin;Kim, Young-Ho;Lee, Hyeun-Seok;Jo, Kye-Hwan;Kim, Han-Yeong;Kim, Young-Kwon;Shin, Chang-Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1284-1287
    • /
    • 2012
  • 본 논문에서는 트레드밀의 전원공급을 보조하는 압전소자를 이용한 자가발전형 트레드밀을 제안한다. 이를 위해 기존 트레드밀의 발판을 압전소자 발판으로 교체하고, 트레드밀의 발판에 발전된 전기를 저장하기 위한 충전지를 두며, 해당 발판의 압전소자를 이용하여 트레드밀에 재사용 할 수 있는 전원을 생산한다. 본 연구 결과로 트레드밀의 구동전력효율의 향상을 기대할 수 있다.