• 제목/요약/키워드: Policy Information Services

Search Result 1,621, Processing Time 0.024 seconds

An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment (디지털 컴퓨팅 환경의 디지털 증거화를 위한 침해 데이터보증 메커니즘)

  • Jang, Eun-Gyeom
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.129-141
    • /
    • 2010
  • In digital computing environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

The Design and Implementation of a Cleaning Algorithm using NAND-Type Flash Memory (NAND-플래시 메모리를 이용한 클리닝 알고리즘의 구현 및 설계)

  • Koo, Yong-Wan;Han, Dae-Man
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.105-112
    • /
    • 2006
  • This paper be composed to file system by making a new i_node structure which can decrease Write frequency because this's can improved the file system efficiency if reduced Write operation frequency of flash memory in respect of file system, i-node is designed to realize Cleaning policy of data in order to perform Write operation. This paper suggest Cleaning Algorithm for Write operation through a new i_node structure. In addition, this paper have mode the oldest data cleaned and the most recent data maintained longest as a result of experiment that the recent applied program and data tend to be implemented again through the concept of regional and time space which appears automatically when applied program is implemented. Through experiment and realization of the Flash file system, this paper proved the efficiency of NAND-type flash file system which is required in on Embedded system.

  • PDF

The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization (가상화 환경 위험도 관리체계화를 위한 취약점 분석)

  • Park, Mi-Young;Seung, Hyen-Woo;Lim, Yang-Mi
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine's vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.

Perception and Behavior Regarding the Safety of Medical Devices among Medical Personnel at a Tertiary Care Hospital (의료기기 안전에 관한 대학병원 의료인들의 인식과 행동에 관한 연구)

  • Lim, Ji-Hye;Kim, Kyu-Sung;Kim, Sae-Rom;Kim, Young-Soon;Lee, Hun-Jae
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.11 no.4
    • /
    • pp.287-297
    • /
    • 2017
  • This exploratory study aimed to explore the perception (knowledge and attitude) and behaviors of medical personnel regarding medical device safety and to identify the differences in results linked with the type of their task. A questionnaire was administered to medical personnel working at a tertiary care hospital with 900 beds in Incheon, Korea, and 220 completed questionnaires were used for analysis. The results revealed that the majority of the medical personnel perceived the potential risk involved in different types of medical devices they use and stated that they need training programs for safe use of medical devices. Concerning the perception regarding medical devices across different positions within the hospital, it was found that the residents had a low awareness about safety issues, although the medical services they handled involve high risks, thereby calling for safety training. Further nationwide studies are needed to improve the quality and validity of data and eventually to provide important information required by policy makers and academicians to manage medical device safety.

Effect of MMS Addiction on User's Health and Academic Performance in an Era of Convergence (융복합 시대에 모바일 메신저 서비스 중독이 사용자들의 건강과 학업 성과에 미치는 영향)

  • Kim, Byoungsoo;Kang, Minhyung
    • Journal of Digital Convergence
    • /
    • v.14 no.1
    • /
    • pp.131-139
    • /
    • 2016
  • Given social problems of service addiction such as mobile messenger services(MMSs), many studies on service management and information systems have examined the negative outcomes of service addiction. MMS addiction significantly influences user's health and academic performance. In this regard, this study investigated the effects of MMS addiction on user's health and academic performance problems. We posit personal traits and service features as key antecedents of MMS addiction. The research framework was tested by using survey data collected from 162 university students who have frequently used Kakaotalk. The analysis results found that MMS addiction significantly influences users' health and academic performance problems. The findings of this study indicate that self-esteem and self-control play an important role in generating MMS addiction. While attention significantly affects MMS addiction, social relationship formation and perceived enjoyment are not significantly associated with MMS addiction. The analysis results help MMS providers and government establish policies or guidelines to induce healthy MMS use.

A Study of Cross-Country Comparison of ICT Usage in Family Context (가족적 맥락에서의 ICT 이용에 관한 국가 간 비교 연구)

  • Brady, John T.;Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.277-291
    • /
    • 2016
  • This study examined the impact of information and communications technology (ICT) on the sociocultural dimensions of the family by comparing ICT use in Korean, Chinese, and American families. This study investigated attitudes to ICT usage in the family context by country and explored how various consumers use ICT in the family context. The study explored how families can be clustered based on usage. ICT device ownership had differences in the use of ICT services including blogs and video chatting accounts. ICT usage in the family was also similar in all three countries in the study, but the depth of use differed. The cluster analysis indicated that users could be classified into four groups, however the proportion in each group differed by country. This study has implications for understanding ICT ownership and use by families in various countries and indicates that sociocultural elements are important in ICT use.

Security Core Technology Implementation for Hardware-based Smart Devices (HW기반 스마트 단말 보안 핵심기술 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.501-505
    • /
    • 2016
  • Recently, the frequency of dealing important information regarding financial services like paying through smart device or internet banking on smart device has been increasing. Also, with the development of smart device execution environment towards open software environment, it became easier for users to download and use random application software, and its security aspect appears to be weakening. This study inspects features of hardware-based smart device security technology. Furthermore, this study proposes a realization method in MTM hardware-based secure smart device execution environment for an application software that runs in smart devices. While existing MTM provides the root of trust function only for the mobile device, the MTM-based mobile security environment technology proposed in this paper can provide numerous security functions that application program needs in mobile device. The further researches on IoT devices that are compatible with security hardware, gateway security technology and methods that secure reliability and security applicable to varied IoT devices by advancing security hardware are the next plan to proceed.

A proposal of assurance model based on i-PIN assurance level (아이핀 보증 등급에 기반한 보증 모델)

  • Youm, Heung-Youl
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.287-299
    • /
    • 2016
  • The electronic transactions over the Internet are growing across the world recently. There have been a lot of identity theft incidents during these online transactions nowaday. Therefore, a high level of identity proofing shall be carried out when using online services to deal with these matter. To prevent this kind of incident, i-PIN was introduced in Korea, which is used as an Internet Personal Identification Number. The i-PIN is designated to provide an online identification of the Internet users. As such, the unique identification numbers are provided to the internet service providers. This paper is to analyze the capabilities that the i-PIN provides, to propose the assurance security model for i-PIN. Furthermore, the security analysis results are presented. The result of this paper can be applicable to improve the applicabilities of the i-PIN.

K-Defense Cloud Computing System Design through Cloud Modeling and Analysis of Social Network Service Application (소셜 네트워크 서비스 어플리케이션의 클라우드 모델링 및 분석을 통한 국방 클라우드 컴퓨탱 시스템 설계)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.37-43
    • /
    • 2013
  • In 2010, the Ministry of National Defense decided to build a MegaCenter including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. The Cloud computing system environment should be designed applying cloud computing technology and policy for an efficient infrastructure that many IT resources are available in the data center as a concentrated form. That is, the system should be designed in such a way that clouding services will be efficiently provided to meet the needs of users and there will not be unnecessary waste of resources. However, in order to build an optimal system, it should be possible to predict the service performance and the resource availability at the initial phase of system design. In this paper, using the CloudAnalyst simulator to predict availability of the K-defence cloud computing system service, conducts cloud modeling and analysis of the 'Facebook', one of the most famous social network service applications with most users in the world. An Optimal K-Defense cloud computing design model is proposed through simulation results.

A System of Authentication and Security threat solution for N-screen services (N-스크린을 위한 인증 및 보안 위협 해결 시스템)

  • Hwang, Deuk-Young;Moon, Jeong-Kyung;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.775-781
    • /
    • 2013
  • N-screen is a Service that can be provide for One Service Multi Device. If the network is changed or if the device is changed after authentication the device fits seamlessly send footage. Security threats that occur here have a problem with user authentication. In this paper proposes available in a multi-device the authentication system. Homomorphic Encryption Algorithm of authentication scheme used. Among the authentication mechanism that already exists is a simple and lightweight authentication mechanism. In addition, N-screen service that uses multiple devices is simple authentication process of the device. Review the results of proposed authentication protocol, encryption algorithm to process a small storage capacity and is easy to work in low processor. And was suitable for use with multiple devices.