• 제목/요약/키워드: Security Assurance

Search Result 230, Processing Time 0.029 seconds

Relevance of E- Learning and Quality Development in Higher Education

  • Arshi Naim;Sahar Mohammed Alshawaf
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.187-195
    • /
    • 2024
  • This is an extended paper explaining the role of E-learning and quality development in the current situation. Amid Covid:19, E-Learning has achieved a new miles stone in imparting education and all levels of institutions have transformed their learning platform from face to face to virtual learning. In this scenario E-Learning is facing two major challenges, first to ensure the ability of computer systems or software to exchange and make use of information on virtual platform (interoperability) and secondly, developing quality learning through e-Learning. To impart learning and teaching (L&T) through E-learning, Middle East University (MEU) has adopted Learning Management Services (LMS) through Blackboard. The university has three types of L&T methods; full online, Blended and Supportive. This research studies the concept, scope and dimensions of interoperability (InT) of E-Learning in MEU then the connection and interdependence between with quality development. In this paper we have described the support and the importance of finest standards and specifications for the objectives of InT of E-Learning and quality development in MEU. The research is based principally on secondary data observed from MEU E-Learning deanship. Also sample of 20 E-Learning experts at MEU were given closed ended as well as semi closed questionnaires for evaluating the assurance of InT of E-Learning and quality development. These experts are mainly certified online facilitators and admin staff. Results provide the verification of application and presence of InT of E-Learning and assured the quality development process in MEU.

A Study on the Implications and Trends of Logistics Security Assurance Programs for International Trade Facilitation (국제물류보안 인증제도 동향 및 시사점에 관한 연구)

  • Ko, Hyun-Jeung
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.2
    • /
    • pp.333-354
    • /
    • 2011
  • After the terrorist attack of 9/11 on the USA, the security concern to global trade has been raised. In particular, the USA has actively promoted a series of initiatives and rules such as CSI, 24 hour rule, C-TPAT, and so on in the area of logistics activities, which aimed to better protect the country against the potential terrorist threats. While implementing such schemes called as a multi-layed logistics security strategy, a large number of countries trading with USA are facing with the issues of additional time and costs for inspecting cargos in their logistics facilities. As a result, most countries all over the world have sought a way to minimize the impacts from such strategy. The Korea also is preparing the several security programs operated by various ministries, which are aiming to not only improve the efficiency of trade flows but also to ensure supply chain security. However, many companies are expressing the inefficiency of operating such programs. Thus, this paper analyzed several global supply chain security programs currently adopted by international organizations(ISO, WCO, and IMO) and major countries(USA, EU, and Singapore) and suggested a guideline for developing the national logistics security system.

3-D Laser Measurement using Mode Image Segmentation Method

  • Moon Hak-Yong;Park Jong-Chan;Han Wun-Dong;Cho Heung-Gi;Jeon Hee-Jong
    • Proceedings of the KIPE Conference
    • /
    • 2001.10a
    • /
    • pp.104-108
    • /
    • 2001
  • In this paper, the 3-D measurement method of moving object with a laser and one camera system for image processing method is presented. The method of segmentation image in conventional method, the error are generated by the threshold values. In this paper, to improve these problem for segmentation image, the calculation of weighting factor using brightness distribution by histogram of stored images are proposed. Therefore the image erosion and spread are improved, the correct and reliable informations can be measured. In this paper, the system of 3-D extracting information using the proposed algorithm can be applied to manufactory automation, building automation, security guard system, and detecting information system for all of the industry areas.

  • PDF

The Security Technology For QoS Assurance on Distance Learning Network (원격교육 망에서 QoS 보장을 위한 보안 기법)

  • 이근무;박수영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.11b
    • /
    • pp.690-693
    • /
    • 2002
  • 차세대 인터넷에서 DiffServ 네트워크는 서비스 품질(QoS: Quality of Service) 제공을 위한 확장성이 높은 구조를 제시하고 있다. 차세대 네트워크에서는 음성이나 비디오 전송 같은 많은 응용들을 지원하기 위하여 QoS 보장 서비스가 필요하다. 차세대 인터넷에서 QoS 제공을 위하여 RSVP(Resource Reservation Protocol), MPLS(Multi-Protocol Label Switching), DiffServ 및 QoS 라우팅 등의 기법이 개발되고 표준화되고 있다. 원격 교육 역시 주로 인터넷이 주도하고 있다는 면에서는 QoS의 문제를 피해 갈 수 없는 것이다. 그러나, 국내에서는 이러한 QoS 능력을 안전하게 제공하기 위한 기법에 대한 연구가 거의 없는 실정이다. 따라서, 본 논문에서는 QoS를 안전하게 제공하기 위한 보안 기법을 DiffServ 네트워크를 중심으로 제시하고 원격교육에 적용시의 문제들을 고려하고자 한다.

  • PDF

온라인 아동 보호

  • Nah, Jae Hoon;Lee, Sang-Woo;Na, Jung Chan;Kim, Jeong Nyeo;KIM, TAE KYUNG
    • Review of KIISC
    • /
    • v.25 no.4
    • /
    • pp.32-37
    • /
    • 2015
  • 본 논문에서는 ITU-T, ISO/IEC JTC1 SC27, GSMA, 및 OECD에서 진행되고 있는 온라인 아동 및 청소년들을 보호하기 위한 국제표준화 동향을 소개하고자 한다. 현재 ITU-T SG17 및 ISO/IEC JTC1 SC27에서 온라인 아동 보호 표준과 관련하여 우리나라가 주도적인 역할을 수행하고 있으며, ITU-T SG17에서는 새로운 국제표준 제정을 위해 계속적으로 기고서를 제출하고 있다. 또한 ISO/IEC JTC1 SC27에서는 2013년 10월 송도회의에서 연령검증이 SP(Study Period) 아이템으로 선정되었으며, 2015년 4월 회의에서 Anonymous attribute assurance 제목의 SP로 진행 되고 있다. 인터넷 상에서 유해정보 차단 및 안전한 이용자 환경을 제공하기 위해서는 온라인 아동 보호 표준에 대한 국제 및 국내표준의 제정이 필요하며, 효과적인 표준의 개발을 위해서는 게임업체 및 콘텐츠 서비스를 제공하는 기업들의 참여가 필요하다.

Design and Implementation of FakePort for Efficient Port Control Based on Linux Server (리눅스 서버의 효율적인 포트제어를 위한 페이크포트 설계 및 구현)

  • 김완경;소우영;김환국;서동일
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.319-324
    • /
    • 2004
  • Internet is spread by the rapid development of information telecommunication infrastructure. But there are swinging damages becuase of most of the user has a shortage of knowledge. Especially, in proportion to increase of Linux user as PC, that is exposed to various threatener and is target of malicious attacker. In this paper, design and implement Fakeport based on Linux to control port efficiently and easily for protection against attack.

  • PDF

Design and Implementation of Internet Worm Traffic Generation System (인터넷 웜 트래픽 분석을 위한 웜 생성도구 설계 및 구현)

  • 최병철;최양서;서동일
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.333-337
    • /
    • 2004
  • The Internet worm is changed rapidly and virus vaccine can not defense the whole Internet worm. To prevent them form spreading into network and analysis specifications, we design and implement the Internet Worm Traffic Generator. In this research, we offer the real worm propagation environment through protocol and scenario specification.

  • PDF

Design of ClientCA Operation and Mechanism for e-Commerce Certificate Management (전자거래 인증서 관리를 위한 ClientCA 운영 메커니즘 설계)

  • 김점구;나상엽
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.71-76
    • /
    • 2004
  • A certificate is important media for the purpose of offering user-authentication service on PKI system. In the paper we analyzed management implement which could make the efficient use of a certificate. This implement called ClientCA will make efficient use of the service about user-authentication consisting of the basis in the age of information through efficient management and partial use of each certificates. Especially, ClientCA could be used efficiently by grafting a small group of PKI system which is operated with particular purposes.

  • PDF

A Design of Multi-tier e-Learning System (다계층 e-러닝 시스템의 설계)

  • 고일석;나윤지
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.97-101
    • /
    • 2004
  • In this study, we designed A multi-tier e-learning system using hybrid multimedia method, The proposal system can provide an interaction and adaptability of a web-based system and high quality multimedia services of an off-line-based system. The proposal system improved quality of a multimedia, a user's convenience, adaptability and an interaction on e-learning system.

  • PDF

Multi-level Protection Infrastructure for Virus Protection (다단계 바이러스 차단 구조 연구)

  • 노시춘;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.187-198
    • /
    • 2004
  • Virus protection infrastructure management is network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Unproved virus protection infrastructure fitters unnecessary mail at the gateway stage to reduce the toad on server. As a result, number of transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF