• Title/Summary/Keyword: Public cloud

Search Result 303, Processing Time 0.023 seconds

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

Research on the introduction and use of Big Data for trade digital transformation (무역 디지털 트랜스포메이션을 위한 빅데이터 도입 및 활용에 관한 연구)

  • Joon-Mo Jung;Yoon-Say Jeong
    • Korea Trade Review
    • /
    • v.47 no.3
    • /
    • pp.57-73
    • /
    • 2022
  • The process and change of convergence in the economy and industry with the development of digital technology and combining with new technologies is called Digital Transformation. Specifically, it refers to innovating existing businesses and services by utilizing information and communication technologies such as big data analysis, Internet of Things, cloud computing, and artificial intelligence. Digital transformation is changing the shape of business and has a wide impact on businesses and consumers in all industries. Among them, the big data and analytics market is emerging as one of the most important growth drivers of digital transformation. Integrating intelligent data into an existing business is one of the key tasks of digital transformation, and it is important to collect and monitor data and learn from the collected data in order to efficiently operate a data-based business. In developed countries overseas, research on new business models using various data accumulated at the level of government and private companies is being actively conducted. However, although the trade and import/export data collected in the domestic public sector is being accumulated in various types and ranges, the establishment of an analysis and utilization model is still in its infancy. Currently, we are living in an era of massive amounts of big data. We intend to discuss the value of trade big data possessed from the past to the present, and suggest a strategy to activate trade big data for trade digital transformation and a new direction for future trade big data research.

A Study on the Response of Military Sexual Violence: Based on Big Data Analysis of Related Articles (군 성폭력 대응 실태연구: 관련 기사 빅 데이터 분석 중심)

  • Young-Ran Kim;Min-Sun Lee;Hyun Song
    • Industry Promotion Research
    • /
    • v.8 no.4
    • /
    • pp.131-137
    • /
    • 2023
  • This study collected and analyzed articles related to military sex crimes covered in the news from February 2019 to May 28, 2022 in order to identify problems arising from sexual crimes in the military. In order to understand the current status of military sexual violence reported in the media, articles were collected using BIGKinds, a news big data analysis system, and using the Textom program, the study was conducted using frequency analysis by period, word cloud, and semantic network analysis techniques for keywords. The study was conducted using the technique. As a result of data analysis, first, it was confirmed that the public's attention was focused on the victims in reports related to sex crimes within the military. Second, the problem of the lukewarm system of the relevant authorities in responding to sex crimes was revealed. Third, there was a lack of support for victims of sex crimes.

A Study of the Advanced Strategy for ICT-based Public Compensation Business (ICT 기반 공익사업 보상업무 첨단화 방안 연구)

  • Seo, Myoung Bae
    • Smart Media Journal
    • /
    • v.9 no.1
    • /
    • pp.75-83
    • /
    • 2020
  • Compensation services that are indispensable during large-scale public utilities projects have been gradually increasing with the recent increase in construction, but there are no systematic compensation services due to the complicated procedures and manual work. For this reason, various problems such as construction period delays due to various complaints, corruption in compensation work, and impossible to trace the history of compensation data in the past are emerging. In this paper, in order to solve this problem, in-depth interviews and questionnaires were conducted to find out the problems of each compensation status. Based on this, 3 core technologies and 10 technical needs based on ICT were selected to improve the compensation work by deriving STEEP analysis and Issue Tree. The three core technologies are big data-based decision-making and prediction technology, advanced measurement technology, and open cloud-based compensation platform technology. In order to introduce the derived technologies to the institutions in charge of compensation, the possibility of technology diffusion by project operators was suggested based on the results of the current status of informatization by institution. Based on the core technology derived from this paper, it is necessary to make a prototype that can be advanced in compensation work and apply it to each institution and analyze the effect.

National Agenda Service Model Development Research of Policy Information Portal of National Sejong Library (국립세종도서관 정책정보포털 국정과제 서비스 모형개발 연구)

  • Younghee, Noh;Inho, Chang;Hyojung, Sim
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.4
    • /
    • pp.73-92
    • /
    • 2022
  • This study intends to design a model that can effectively service policy data necessary for the implementation of new national agenda in order to provide high-quality policy information services that go beyond those of the existing Policy Information Portal (POINT) of National Sejong Library. To this end, it was determined that providing an integrated search environment, in lieu of data search through individual access, was necessary. Subsequently, four possible models for a national agenda service model were presented. First, designing a computerized system for both interface and electronic information source aspects was proposed for the national agenda service system operation. Second, designing the Linked Open Data system and the time-series service system for national policy information, providing the translation service of overseas original data, and securing the researcher's desired data were presented for the national agenda service information source operation. Third, strengthening public relations for policy users, building and promoting the site brand, operating SNS channels, and reinforcing the activation of auxiliary materials and the accessibility of external services were proposed for public relations of national agenda service. Fourth, expanding the information network with Open API, cloud service, and overseas libraries was proposed for collaborating and cooperating with the agenda service.

A Study on the Awareness of Librarians for the Establishment of the Policy of the Joint Preservation Archive in Chungnam Library (충남도서관 공동보존자료관 운영정책 수립을 위한 사서 인식조사 연구)

  • Kwak, Seung-Jin;Noh, Younghee;Kang, Eun Yeong;Kim, Jeong-Taek;Kwak, Woojung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.54 no.4
    • /
    • pp.27-51
    • /
    • 2020
  • Regional representative libraries are installing joint preservation archives to solve the problem of lack of preservation space in libraries. This study conducted a survey of public library librarians through a questionnaire survey and an FGI method in order to prepare specific operational policies and implementation plans for the Chungnam Library Joint Preservation Archive, which is a regional representative library. Based on this, an operation policy and implementation plan suitable for the common preservation and use of printed and digital data, which is the goal of the Common Preservation Archive, was proposed. As a result of the study, first, the joint preservation library of the Chungnam Library should first transfer books and serials along with ownership in consideration of the condition and demand of the preservation space of participating libraries. Second, it is necessary to establish an operation management system that can be used by all participating libraries in order to quickly and conveniently operate the joint preservation data center and connect it with a cloud-based integrated data management system. Third, a plan for digitizing and archiving data that was judged to be digitized in the Common Preservation Archive was proposed.

An Analysis on RAW Image File of DLSR Camera and Development of a RAW Image Viewer for an Embedded Device (DLSR 카메라의 RAW 이미지 파일 분석 및 임베디드 장치용 RAW 이미지 뷰어 개발)

  • Ro, Kwang-Hyun;Kim, Seung-Cheon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1341-1349
    • /
    • 2011
  • This research is focused on an analysis on the structure of RAW image file and the development of a RAW image file viewer for an embedded device. Recently, several RAW image file formats are being used for saving and displaying the images created by various DSLR cameras, and the necessity of handing RAW images in mobile multimedia devices is increasing. For the development of RAW image decoding/encoding library applicable to WinCE-based embedded devices viewer, an analysis of RAW image file formats, such as CRW, CR2, PEF, NEF, MRW, have been performed because their formats are not released in public. By using the library, the analysis software which can extract RAW image data, 2~3 JPEG image files and other informations such as the specification of a camera and various photographic parameters from RAW image files, were developped and a RAW image file viewer which can run in WinCE-based embedded devices. The experimental result has shown that the viewer could encode and decode RAW image files successfully and it took approximately 10secs to load them to the screen in S3C6410 based embedded platform. The outcomes of this research cloud be a good information and solution to multimedia application developers.

Multiple Layer File Format for Safe Collaborative Design (안전한 협업 디자인 작업을 위한 다중 레이어 파일 포맷)

  • Kim, Kichang;Yoo, Sang Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.45-65
    • /
    • 2013
  • A design file can get larger in size as the complexity of the target object increases. A large design file may reside in a large parallel computing system, such as cloud computing systems, and many designers may work concurrently on the same design file. In such a case, it is obvious that we need some kind of protection mechanism so that each user can access only the area of the file he or she is entitled to. Two approaches can be taken for this problem: one is the traditional access control mechanisms and the other encryption techniques. We take the latter approach to ensure the safety of the file even in public domain such as clouding systems, and in this paper, we suggest an encryption scheme for a file where the file is encrypted in multi-layer so that each user is allowed to access the file only at the layer for which the user has the proper access right. Each layer of the file is encrypted with different keys and these keys are exposed only to those who have the right access permit. The paper explains the necessary file format to achieve this goal and discusses the file manipulation functions to handle this new file format.

Interactive Statistics Laboratory using R and Sage (R을 활용한 '대화형 통계학 입문 실습실' 개발과 활용)

  • Lee, Sang-Gu;Lee, Geung-Hee;Choi, Yong-Seok;Lee, Jae Hwa;Lee, Jenny Jyoung
    • Communications of Mathematical Education
    • /
    • v.29 no.4
    • /
    • pp.573-588
    • /
    • 2015
  • In this paper, we introduce development process and application of a simple and effective model of a statistics laboratory using open source software R, one of leading language and environment for statistical computing and graphics. This model consists of HTML files, including Sage cells, video lectures and enough internet resources. Users do not have to install statistical softwares to run their code. Clicking 'evaluate' button in the web page displays the result that is calculated through cloud-computing environment. Hence, with any type of mobile equipment and internet, learners can freely practice statistical concepts and theorems via various examples with sample R (or Sage) codes which were given, while instructors can easily design and modify it for his/her lectures, only gathering many existing resources and editing HTML file. This will be a resonable model of laboratory for studying statistics. This model with bunch of provided materials will reduce the time and effort needed for R-beginners to be acquainted with and understand R language and also stimulate beginners' interest in statistics. We introduce this interactive statistical laboratory as an useful model for beginners to learn basic statistical concepts and R.

A Study of 3D Modeling of Compressed Urban LiDAR Data Using VRML (VRML을 이용한 도심지역 LiDAR 압축자료의 3차원 표현)

  • Jang, Young-Woon;Choi, Yun-Woong;Cho, Gi-Sung
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.19 no.2
    • /
    • pp.3-8
    • /
    • 2011
  • Recently, the demand for enterprise for service map providing and portal site services of a 3D virtual city model for public users has been expanding. Also, accuracy of the data, transfer rate and the update for the update for the lapse of time emerge are considered as more impertant factors, by providing 3D information with the web or mobile devices. With the latest technology, we have seen various 3D data through the web. With the VRML progressing actively, because it can provide a virtual display of the world and all aspects of interaction with web. It offers installation of simple plug-in without extra cost on the web. LiDAR system can obtain spatial data easily and accurately, as supprted by numerous researches and applications. However, in general, LiDAR data is obtained in the form of an irregular point cloud. So, in case of using data without converting, high processor is needed for presenting 2D forms from point data composed of 3D data and the data increase. This study expresses urban LiDAR data in 3D, 2D raster data that was applied by compressing algorithm that was used for solving the problems of large storage space and processing. For expressing 3D, algorithm that converts compressed LiDAR data into code Suited to VRML was made. Finally, urban area was expressed in 3D with expressing ground and feature separately.