• Title/Summary/Keyword: Portable Security System

Search Result 54, Processing Time 0.026 seconds

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

Realization of Hybrid Localization System with Lighting LEDs and Ad-Hoc Wireless Network (LED 조명과 애드혹 무선 네트워크를 사용한 하이브리드 측위 시스템 구현)

  • Lee, Yong Up;Park, Joohyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.9
    • /
    • pp.774-783
    • /
    • 2012
  • A simple, accurate, secure, long-lasting, and portable hybrid positioning system is proposed and designed in this paper. It consists of a lighting LED that generates visible light data corresponding to position information of a target and a Zigbee wireless network communication module with low power, security, and service area expansion characteristics. Under an indoor environment where there is 23.62m distance between an observer and the target, the presented hybrid positioning system is tested and is verified with the functions of Zigbee three hop wireless networking and visible light communication (VLC) scheme. The test results are analyzed and discussed.

Efficient Braille Keyboard of Smart Phone for the Blind (전맹인을 위한 효율적인 스마트폰 점자키보드 시스템 기술)

  • Koo, Min-Su;Kim, Byung-Gyu;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.11-17
    • /
    • 2015
  • According to NIA (National Information Society Agency) report, digital divide is a vicious circle which makes quality interval of human's life between people who have information and relatively not. Especially in a smart phone society, there is a big problem between disabled people and normal people. This paper suggests a braille keyboard system for the blind to solve these problems. It is designed for portable use, convenience and quick text typing based on bluetooth communication technique. In text input test, all texts (Korean, English, number) were accurately expressed and typing speed was about 22 [c/m](characters per a minute). Especially, we design text2voice function to provide more accurate key input system. Popular applications such as call, alarm, message, kakao talk, internet, music, were performed without carring problems using the proposed braille keyboard system. The proposed technique is thought to contribute to eliminating the digital divide through the expansion of smartphone users.

Study of Pre-Filtering Factor for Effectively Improving Dynamic Malware Analysis System (동적 악성코드 분석 시스템 효율성 향상을 위한 사전 필터링 요소 연구)

  • Youn, Kwang-Taek;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.563-577
    • /
    • 2017
  • Due to the Internet and computing capability, new and variant malware are discovered around 1 Million per day. Companies use dynamic analysis such as behavior analysis on virtual machines for unknown malware detection because attackers use unknown malware which is not detected by signature based AV effectively. But growing number of malware types are not only PE(Portable Executable) but also non-PE such as MS word or PDF therefore dynamic analysis must need more resources and computing powers to improve detection effectiveness. This study elicits the pre-filtering system evaluation factor to improve effective dynamic malware analysis system and presents and verifies the decision making model and the formula for solution selection using AHP(Analytics Hierarchy Process)

Moisturizing and Dryness Reduction Effect of Face Cream Containing Persicaria Perfoliata (L.) Extract (며느리배꼽추출물을 함유하는 페이스 크림의 보습 및 건조함 감소 효과)

  • Kim, Seong-Yun;Yoon, Hyun-Seo;Hyun, Sook-Kyung;Park, Chung-Mu
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.10 no.3
    • /
    • pp.27-36
    • /
    • 2022
  • Purpose : This study was aimed to analyze the effects of cosmetics containing Persicaria perfoliata water extract (PPWE) on the skin moisturizing and improvement of skin condition in clinical trials. Methods : Clinical trial was conducted for five weeks after IRB approval at Dong-Eui University. Out of a total of 64 people, 15 people each were assigned to four groups as follows; control group A, B, C and the experimental group A that using cosmetic containing PPWE. Skin condition was measured two times, before and after clinical trial, by a professional skin analyzer, SDM (skin diagnosis system). Moisture and oil value of participants was analyzed twice, each morning and evening, using a portable device on their cheeks. In addition, the survey was investigated subjective satisfaction on change in skin condition and the satisfaction on the use of cosmetics. Result : The experimental group exhibited subjectively significant changes before and after clinical trials on skin its dryness (p=.039), blush (p=.017), and redness (p<.001). In addition, subjective evaluation was also the highest satisfaction in aspects of number of application (p=.003), amount of application (p=.002), moisture maintenance, and skin scratching frequency. The satisfaction on the use of cosmetics was the highest in the intention to repurchase (p=.045), recommendation willingness to others (p=.020), and intention to use various products (p=.001). Skin moisture of the clinical trial participants using the SDM, moisture level and elasticity of the experimental group increased by 12.94 and 10.28. Moisture level, which was measured by a portable device, was the most potently increased in the experimental group. Conclusion : Consequently, PPWE containg cosmetics exhibited the effects of moisturization and attenuated skin dryness in clinical trials, which might be utilized as a fundamental data to develop numerous lines of cosmetics.

A Study on Wage System and Social Security for Precarious Workers: Focusing on the Award Wage of Construction Workers in Australia (불안정 노동자를 위한 임금 체계와 사회보장 사례 연구: 호주 건설 노동자의 어워드 임금 체계를 중심으로)

  • Lee, Gyunho;Lim, Woontaek
    • Korean Journal of Labor Studies
    • /
    • v.24 no.3
    • /
    • pp.109-142
    • /
    • 2018
  • This paper aims to analyze the Award wage system in Australia for construction workers. Considering low wages and precarious employment situation of construction workers in general, it is of advantage especially for them in Australia. Furthermore, it seems to be instructive for Korean construction workers, who stand in more precarious and unstable situation and furthermore are lack of fair wage and social safety. After strong and longstanding labour struggle in the late 19th century in Australia, it has been established a tripartite institution called as 'tribunal' between trade unions, employers, and the government. Under the highly institutionalized form of industrial relations, it functions as an arbitration and conciliation system between labour and management. The Award wage system stands in the middle point. This Award wage system including various welfare provisions is settled by the tribunal, today renamed as Fair Work Commission. In this wage system should be defined level of minimum wages according to the various skill levels, which are in turn connected with compulsory superannuation and Medicare as well as vocational education and training. Furthermore, it provides especially for the construction workers, who suffer from job instability, so-called 'portable benefits', which relate to long service leave and redundancy pay. Considering general conditions of precarious construction workers in Korea, In that respect, the Australian Award wage system would be very instructive for our social wage and safety system for construction workers.

Design and Implementation of File Access Control System using Java Card (자바카드를 이용한 파일 접근제어 시스템의 설계 및 구현)

  • Koo, Eun-Bee;Woo, Chan-Il
    • 전자공학회논문지 IE
    • /
    • v.43 no.1
    • /
    • pp.46-51
    • /
    • 2006
  • Recently, smart card system which is known as easy to portable and also safe from physical, electrical, and software attack is observed to manage information that becomes the target of security in safety. And java card graft upon java technology to smart card platform is having very good advantage with object-oriented techniques and also, java card have the open type OS that can show the same action in different hardware characteristic which allows various application programs. In this paper, we introduced independent execution characteristic of java platform because being set to each smart card was uncomfortable till now and we designed access control member card that allows several administrators in different access privilege by single card using java card. Several administrators can approach to various information of file type that is included on issued card to user by using different PIN. In the proposed method, confirmation of personal information, administration contents update, demand by contents, is possible by single card. At this moment, wish to do safer user certification that improve security limitation which is from PIN, used for user certification, and signature data. In the proposed method, as design and implementation of utilization technology of java card, biometrics, user certification which uses multi PIN, provide that more safety and conveniently.

Analysis of Cyber Incident Artifact Data Enrichment Mechanism for SIEM (SIEM 기반 사이버 침해사고 대응을 위한 데이터 보완 메커니즘 비교 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • As various services are linked to IoT(Internet of Things) and portable communication terminals, cyber attacks that exploit security vulnerabilities of the devices are rapidly increasing. In particular, cyber attacks targeting heterogeneous devices in large-scale network environments through advanced persistent threat (APT) attacks are on the rise. Therefore, in order to improve the effectiveness of the response system in the event of a breach, it is necessary to apply a data enrichment mechanism for the collected artifact data to improve threat analysis and detection performance. Therefore, in this study, by analyzing the data supplementation common elements performed in the existing incident management framework for the artifacts collected for the analysis of intrusion accidents, characteristic elements applicable to the actual system were derived, and based on this, an improved accident analysis framework The prototype structure was presented and the suitability of the derived data supplementary extension elements was verified. Through this, it is expected to improve the detection performance when analyzing cyber incidents targeting artifacts collected from heterogeneous devices.

A Development on Universal RF based Module for Wireless Network (계측 시스템의 무선통신을 위한 RF모듈 개발)

  • Park, Suk-Hyun;Shim, Woo-Hyuk;Seo, Young-Jo;Kim, Beung-Jin;Jeon, Hee-Jong
    • Proceedings of the KIEE Conference
    • /
    • 1999.07g
    • /
    • pp.3064-3066
    • /
    • 1999
  • The existing equipment with wire communication can expect the stability of data transmission. However, according to increasing a number of DTE (Data Terminal Equipment), wiring work becomes a heavy burden. Restriction to application about portable DTE and the lack of flexibility are another drawback of wire communication. This paper presents the design and implementation of a RF (Radio Frequency) based wireless communication system. The RF based module is designed to the multi communication between DTEs. The RF based module consists of RF circuit and microprocessor. The main properties of RF circuit are maximum 5Kbps transmission rate, maximum 90m transmission distance and 433MHz frequency band. The microprocessor rearrange the data into AHDLC(Advanced High level Data Link Control) format and then instructs RF circuits to transmit/receive the data. The RF module have a wide application field such as fire/security alarm, remote control/measurement etc..

  • PDF

Container Vulnerability Intruder Detection Framework based on Memory Trap Technique (메모리 트랩기법을 활용한 컨테이너 취약점 침입 탐지 프레임워크)

  • Choi, Sang-Hoon;Jeon, Woo-Jin;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.3
    • /
    • pp.26-33
    • /
    • 2017
  • Recently container technologies have been receiving attention for efficient use of the cloud platform. Container virtualization technology has the advantage of a highly portable, high density when compared with the existing hypervisor. Container virtualization technology, however, uses a virtualization technology at the operating system level, which is shared by a single kernel to run multiple instances. For this reason, the feature of container is that the attacker can obtain the root privilege of the host operating system internal the container. Due to the characteristics of the container, the attacker can attack the root privilege of the host operating system in the container utilizing the vulnerability of the kernel. In this paper, we propose a framework for efficiently detecting and responding to root privilege attacks of a host operating system in a container. This framework uses a memory trap technique to detect changes in a specific memory area of a container and to suspend the operation of the container when it is detected.