• 제목/요약/키워드: Outside protection and security system

검색결과 18건 처리시간 0.022초

루팅된 안드로이드 폰에서 SEAndroid를 이용한 효과적인 앱 데이터 보호 기법 (An Effective Technique for Protecting Application Data using Security Enhanced (SE) Android in Rooted Android Phones)

  • 정윤식;조성제
    • 정보과학회 논문지
    • /
    • 제44권4호
    • /
    • pp.352-362
    • /
    • 2017
  • 본 논문에서는 루팅된 단말 환경에서 SEAndroid의 보안 위협을 체계적으로 분석하고, 효과적으로 앱 데이터를 보호하는 기법을 제안한다. 루팅되지 않은 안드로이드 단말의 경우, 접근제어 모델에 의해 한 앱의 데이터는 해당 앱만이 접근할 수 있다. 하지만, 루팅된 단말의 경우 접근제어 모델이 무력화되어, 루트 권한 쉘이 임의로 다른 앱의 민감한 데이터에 접근하거나 악성 앱이 다른 앱의 데이터를 외부로 유출할 수도 있다. 이를 방어하기 위해, 본 논문에서는 기존 SEAndroid의 LSM(Linux Security Module) Hook 함수를 수정하여 제한된 프로세스만이 특정 앱 데이터를 접근할 수 있도록 하였다. 또한 새로운 도메인 타입의 관리 프로세스를 추가하였고, 해당 프로세스로 하여금 새로 설치되는 앱의 디렉토리 타입을 분리하여 관리하게 하였다. 실험을 통해, 제안 기법이 앱 데이터를 효과적으로 보호함과 성능 오버헤드가 2초 이내임을 보인다.

고효율 LED 방열효과 증대를 위한 융합형 Heat Sink 장치 방열 해석 (A Study on Analysis of Complex Heat Sink System for High Efficiency LED Thermal Effect)

  • 강창수;강기성
    • 전자공학회논문지 IE
    • /
    • 제48권2호
    • /
    • pp.12-18
    • /
    • 2011
  • 본 논문은 조명용 LED 모듈과 히트싱크 장치의 방열 특성을 확인하기 위한 수치 시뮬레이션을 하였다. 해석 케이스는 200 W급의 가로등 또는 보안등용 조명장치이며 용도에 따라 장치의 자세가 달라짐을 고려하여 발광면이 정상부를 향하는 경우와 정하부를 향하는 경우로 나누어서 해석이 진행되었고, 또한 발열소자의 체적이 큰 경우와 작은 경우로 나누어 해석하였다. 해석 결과 현재의 히트싱크 형상으로 충분히 LED의 발열량을 외부로 배출시킬 수 있음을 확인하였고, 장치의 자세와 발열소자의 크기에 따라 방열 성능의 차이가 나타남을 조사하였다.

생체정보를 이용한 RFID 정보보호 (RFID Information Protection using Biometric Information)

  • 안효창;이상범
    • 한국컴퓨터산업학회논문지
    • /
    • 제7권5호
    • /
    • pp.545-554
    • /
    • 2006
  • RFID는 정보통신 외에 물류, 유통, 교통, 환경 등 다양한 분야에 적용될 수 있기에 유비쿼터스 시대에 없어서는 안 되는 기술로 각광받고 있다. 하지만 최근들어 RFID 보안의 무제가 거론되고 있어서 RFID의 정보보가 필요하게 되었다. 본 논문에서는 RFID 태그에 얼굴 생체 특징 정보를 효율적으로 저장하여 인증성을 보장하고 개인의 정보를 보호할 수 있는 알고리즘을 제안한다. 데이터양이 많은 생체 특징 정보를 개선된 선형판별 분석방법을 이용하여 특징 정보 차원을 감소시킴으로써 데이터양을 효과적으로 줄여 RFID 태그의 적은 메모리 영역내에 특징 정보를 저장하였다. 실험결과 사용자 인증율이 92%를 보였으며, 출입통제 시스템 및 전자 신분증 등에 활용 가능한 시스템으로 적용 가능할 것으로 보인다.

  • PDF

통합 부식 모니터링 및 통합 제어 시스템의 개발 (Development of Integrated Corrosion Monitoring and Control System)

  • 유남현;김영훈
    • 한국해양공학회지
    • /
    • 제27권3호
    • /
    • pp.8-14
    • /
    • 2013
  • Although there are various factors that threaten the security of ships, one of the most harmful is corrosion. It is not easy to find corroding areas and the status of corrosion, even though corrosion causes serious problems such as submergence and marine pollution as a result of leaking oil and polluted water. To monitor the corrosion of ships, non-destructive inspection, weight loss coupons, electrical resistance, linear polarization resistance, zero resistance ammeter, and electrochemical impedance spectroscopy have been developed. However, these methods require much time to detect corrosion, and most are not appropriate for real time monitoring. Coating, sacrificial anode, and impressed current cathodic protection (ICCP) methods have been developed to control corrosion. The ICCP and sacrificial anode methods are the most popular ways to prevent ship corrosion. However, ICCP is only appropriate for the outside of a ship and cannot be used for complex structures such as ballast tanks because these are composed of many separate chambers. Sacrificial anodes have to be replaced periodically. This paper proposes an integrated corrosion monitoring and control system (ICMCS) that can detect corrosion in real time and is appropriate for complex structures such as ballast tanks. Because the system uses titanium for an anode, exhausted anodes do not need to be replaced.

중국 민간의료보험의 발전경로와 의료보장체계에서의 역할 (The Development Path of China's Private Health Insurance and Its Role in the Health Care System)

  • 정기택
    • 보건행정학회지
    • /
    • 제31권4호
    • /
    • pp.423-436
    • /
    • 2021
  • This article summarizes the structure of China's current social health insurance system and reviews the development status of China's private health insurance (PHI). China's medical security system is mainly composed of two parts: basic medical insurance (BMI) and PHI. Among them, the BMI provides reimbursement of basic medical expenses for the insured persons according to different proportions. PHI is a necessary supplement to the BMI and provides assistance to the insured persons in the event of illness or accident. By having PHI, people can obtain medical protection outside the coverage of BMI. In the development of PHI in China, the total medical cost is high and the insurance market size is large, but the proportion of PHI expenditure is low and the personal burden is high. Through this Chinese case, it will be helpful for mutual development between Korean PHI and national health insurance, for Korean insurance companies to enter the Chinese market, and for removing the medical burden on the people.

내부 기밀파일 유출 방지를 위한 USB DLP 기법 (A USB DLP Scheme for Preventing Loss of Internal Confidential Files)

  • 신규진;정구현;양동민;이봉환
    • 한국정보통신학회논문지
    • /
    • 제21권12호
    • /
    • pp.2333-2340
    • /
    • 2017
  • 최근 기업의 내부 중요 정보 유출이 날이 갈수록 심각해지고 있으며, 이러한 유출의 대부분은 내부자에 의해 발생되고 있다. 따라서 기업 내부의 정보를 보호하기 위해 다양한 기술적 방안들이 연구되고 있다. 본 논문에서는 다양한 내부정보 유출 경로 중 USB를 통한 파일 이동, 복사 작업을 수행할 때 해당 파일이 기밀파일로 분류된 경우 유출을 차단하는 기법을 제안한다. 구현한 기밀파일 유출차단시스템은 기밀파일 관리를 위해 시그너처를 삽입하는 시그니처 삽입 관리자와 기밀파일 탐지를 위한 기밀파일 탐지 관리자로 구성되어 있다. 시그너처 삽입 관리자는 기관에서 기밀 파일로 분류된 파일에 기밀 파일을 나타내는 특정 패턴을 삽입하는 기능을 한다. 한편, 기밀 파일 탐지관리자는 사용자가 기밀 파일을 USB로 이동 또는 복사할 경우 이를 탐지하고 차단하여 기밀 파일 유출을 방지한다. 본 연구 결과는 USB를 통한 기업 내부 기밀 파일 유출을 통한 피해를 줄이는데 기여할 수 있을 것이다.

테러리즘의 대응관리체제에 관한 고찰 - "9. 11 테러"를 중심으로 - (A Study Consequence Management System of the Terrorism)

  • 김이수;안병수;한남수
    • 시큐리티연구
    • /
    • 제7호
    • /
    • pp.95-124
    • /
    • 2004
  • It can be said that 'the September 11th Terrorist Attacks' in 2001 were not only the indiscriminate attacks on innocent people but also the whole - political, economical and military - attacks on human life. Also, 'the September 11th Terrorist Attacks' can be regarded as the significant events in the history of world, which were on the peak of the super-terrorism or new-terrorism that had emerged from the 1980s. However, if one would have analysed the developments of terrorism from the 1970s, they could have been foreknown without difficulty. The finding from this study can be summarized as the followings, First, in spite that the USA responsive system against terrorism had been assessed as perfect before 'the September 11th Terrorist Attacks', the fragilities were found in the aspects of the response on the new-terrorism or super-terrorism. The previous responsive system before 'the September 11th Terrorist Attacks' had the following defects as the followings: (1) it was impossible to establish the integrated strategy, because the organizations related to the response against terrorism had not integrated; (2) there were some weakness to collect and diffuse the informations related to terrorism; (3) the security system for the domestic airline service in USA and the responsive system of air defense against terrors on aircraft were very fragile. For these reasons, USA government established the 'Department of Homeland Security' of which the President is the head so that the many organizations related to terrorism were integrated into a single management system. And, it legislated a new act to protect security from terrors, which legalized of the wiretapping in spite of the risk of encroachment upon personal rights, increased the jail terms upon terrorists, froze the bank related to terrorist organization, and could censor e-mails. Second, it seem that Korean responsive system against terrors more fragile than that of USA. One of the reasons is that people have some perception that Korea is a safe zone from terrors, because there were little attacks from international terrorists in Korea. This can be found from the fact that the legal arrangement against terrorism is only the President's instruction No. 47. Under this responsive system against terrorism dependent on only the President's instruction, it is expected that there would be a poor response against terrors due to the lack of unified and integrated responsive agency as like the case of USA before 'the September 11th Terrorist Attacks'. And, where there is no legal countermeasure, it is impossible to expect the binding force on the outside of administrative agencies and the performances to prevent and hinder the terrorist actions can not but be limited. That is to say, the current responsive system can not counteract effectively against the new-terrorism and super-terrorism. Third, although there were some changes in Korean government's policies against terrorism. there still are problems. One of the most important problems is that the new responsive system against terrorism in Korea, different from that of USA, is not a permanent agency but a meeting body that is organized by a commission. This commission is controled by the Prime Minister and the substantial tasks are under the National Intelligence Service. Under this configuration, there can be the lack of strong leadership and control. Additionally, because there is no statute to response against terrorism, it is impossible to prevent and counteract effectively against terrorism. The above summarized suggests that, because the contemporary super-terrorism or new-terrorism makes numerous casualties of unspecified persons and enormous nationwide damages, the thorough prevention against terrorism is the most important challenge, and that the full range of legal and institutional arrangements for the ex post counteraction should be established. In order to do so, it is necessary for the government to make legal and institutional arrangements such as the permanent agency for protection from terrorism in which the related departments cooperates with together and the development of efficient anti-terror programs, and to show its willingness and ability that it can counteract upon any type of domestic and foreign terrorism so that obtain the active supports and confidence from citizens.

  • PDF

디지털 데이터 중심의 AI기반 환경인지 생산기술 개발 방향 (Development of AI-based Cognitive Production Technology for Digital Datadriven Agriculture, Livestock Farming, and Fisheries)

  • 김세한
    • 전자통신동향분석
    • /
    • 제36권1호
    • /
    • pp.54-63
    • /
    • 2021
  • Since the recent COVID-19 pandemic, countries have been strengthening trade protection for their security, and the importance of securing strategic materials, such as food, is drawing attention. In addition to the cultural aspects, the global preference for food produced in Korea is increasing because of the Korean Wave. Thus, the Korean food industry can be developed into a high-value-added export food industry. Currently, Korea has a low self-sufficiency rate for foodstuffs apart from rice. Korea also suffers from problems arising from population decline, aging, rapid climate change, and various animal and plant diseases. It is necessary to develop technologies that can overcome the production structures highly dependent on the outside world of food and foster them into export-type system industries. The global agricultural industry-related technologies are actively being modified via data accumulation, e.g., environmental data, production information, and distribution and consumption information in climate and production facilities, and by actively expanding the introduction of the latest information and communication technologies such as big data and artificial intelligence. However, long-term research and investment should precede the field of living organisms. Compared to other industries, it is necessary to overcome poor production and labor environment investment efficiency in the food industry with respect to the production cost, equipment postmanagement, development tailored to the eye level of field workers, and service models suitable for production facilities of various sizes. This paper discusses the flow of domestic and international technologies that form the core issues of the site centered on the 4th Industrial Revolution in the field of agriculture, livestock, and fisheries. It also explains the environmental awareness production technologies centered on sustainable intelligence platforms that link climate change responses, optimization of energy costs, and mass production for unmanned production, distribution, and consumption using the unstructured data obtained based on detection and growth measurement data.