• Title/Summary/Keyword: Security Companies

Search Result 1,036, Processing Time 0.027 seconds

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

Memory-Free Skin-Detection Algorithm and Implementation of Hardware Design for Small-Sized Display Device (소형 DISPLAY 장치를 위한 비 메모리 피부 검출 알고리즘 및 HARDWARE 구현)

  • Im, Jeong-Uk;Song, Jin-Gun;Ha, Joo-Young;Kang, Bong-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1456-1464
    • /
    • 2007
  • The research of skin-tone detection has been conducting continuously to enlarge the importance in security, surveillance and administration of the information and 'Password Control System' for using face and skin recognition in airports, harbors and general companies. As well as tile rapid diffusion of the application range in image communications and an electron transaction using wide range of communication network, the importance of the accurate detection of skin color has been augmenting recently. In this paper, it will set up the boundaries of skin colors using the information of Cb and Cr in YCbCr color model of human skin color which is from hundreds compiled portrait images for each race, and suggest a efficient yet simple structure about the skin detection which has been followed by whether the comprehension of the boundaries of skin or not with adaptive skin-range set. With the possibility of the 1D Processes which does not use any memory, it is able to be applied to relatively small-sized hardware and system such as mobile apparatuses. To add the selective mode, it is not only available the improvement of tie skin detection, but also showing the correspondent results about previous face recognition technologies using complicated algorithm.

Leased Line Traffic Prediction Using a Recurrent Deep Neural Network Model (순환 심층 신경망 모델을 이용한 전용회선 트래픽 예측)

  • Lee, In-Gyu;Song, Mi-Hwa
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.10
    • /
    • pp.391-398
    • /
    • 2021
  • Since the leased line is a structure that exclusively uses two connected areas for data transmission, a stable quality level and security are ensured, and despite the rapid increase in the number of switched lines, it is a line method that is continuously used a lot in companies. However, because the cost is relatively high, one of the important roles of the network operator in the enterprise is to maintain the optimal state by properly arranging and utilizing the resources of the network leased line. In other words, in order to properly support business service requirements, it is essential to properly manage bandwidth resources of leased lines from the viewpoint of data transmission, and properly predicting and managing leased line usage becomes a key factor. Therefore, in this study, various prediction models were applied and performance was evaluated based on the actual usage rate data of leased lines used in corporate networks. In general, the performance of each prediction was measured and compared by applying the smoothing model and ARIMA model, which are widely used as statistical methods, and the representative models of deep learning based on artificial neural networks, which are being studied a lot these days. In addition, based on the experimental results, we proposed the items to be considered in order for each model to achieve good performance for prediction from the viewpoint of effective operation of leased line resources.

A Study on Improving Architect Property Insurance for Safety Accidents of Building (건축물 안전사고에 대비한 건축사 손해보험 개선 연구)

  • Kim, Myeongsoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.20 no.1
    • /
    • pp.32-40
    • /
    • 2019
  • This study analyzed operating condition and the problems of damage compensation insunace (property insurance) for qualified architect and derived some suggsetions for improvement. The Certified Architects Act requires all building design and construction supervision to buy property insurance. This study proposes following suggestions to solve problems of current architect property insurance. Firstly, we need to increase the insurance purchasing rate of damage compensation insurance for qualified architect. It is necessary to clearly specify the matters concerning the submission of insurance policies by the architects, which is currently carried out by the Minister's official letter, in the form of official announcement. Secondly, proper insured amount should be adjusted. In order to insured substantial compensation capacity, total amount of insurance should be enlarged. Thirdly, the insurance period should be extended to one year after completion of building to allow compensation for accidents due to design negligence. Generally, the design defect can mostly be identified within one year after completion. Fourthly, insurance coverage should be extended. In the long run, it is essential to enlarge the scope of the security not only to property damage but also to human losses. Finally, an accident record sharing system should be established among insurance companies, so that proper insurance premiums or discounts can be made based on the system.

Efficient Information System Sizing Selection Using Cloud Computing Platform (클라우드 컴퓨팅 플랫폼을 이용한 효율적인 정보시스템 용량 산정 방법에 관한 연구)

  • Seong, Baek-min;Lee, Min-gyu;Sohn, Hyo-jung;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.79-81
    • /
    • 2014
  • Recently, It is built various information systems evolve IT skills. But When you build the information system, Difficult to determine whether the appropriate scale and problems that rely heavily on SI companies and professionals. To solve this problem, Korea Information Security Agency, etc., based on the primary objective was to develop H/W Capacity Equation formally to each system type. But the problems are to present H/W capacity equation by discussion of the expert group of suppliers and relatively long that it is difficult to formally apply in the situation now so it is no longer the limit. In this study, we proposes proper capacity planning techniques, which can guarantee the best performance compared to the budget invested. For this purpose, we derived the proper H/W capacity equation by regression analysis to gather performance metrics and cost of various cases by simulation of a virtual environment in the cloud. Through this study, when capacity planning, It is possible to reduce costs that It is possible to build an information system based on the digitized data and build information system in an environment that does not rely on the SI business or professional.

  • PDF

Analysis of relative importance priority based on blockchain technology characteristics using AHP technique (AHP 기법을 이용한 블록체인 기술 특성 기반 상대적 중요도 우선순위 분석)

  • Oh, Kyoung-Sang;Lee, Dong-Myung
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.239-250
    • /
    • 2021
  • When considering the introduction of a new technology, it is important to accurately grasp and selectively apply the technical characteristics related to the technology in order to fully utilize the advantages of the technology. In this study, the technical characteristics of high relative importance were analyzed in order to increase the efficiency of new application of blockchain technology by companies. The technical characteristics of the blockchain identified through previous research were reclassified from the perspective of the system hierarchy, and sub-factors of the technical characteristics were derived. In addition, a questionnaire survey on the relative importance of technical characteristics was conducted for internal experts and SI experts using the Analytical Hierarchy Process (AHP) technique. As a result of the analysis, respondents evaluated data protection as the most important factor in the threat of hacking related to security. In addition, it was different that the comparison results of the importance of the technical characteristics between the experts in the company and the SI experts and the priority of the technical characteristics between the expert groups by industry. It is expected that the results of this study will be usefully utilized when using blockchain technology in enterprises in line with the upcoming changes of the 4th industrial revolution. An empirical analysis of the internal and external factors required for adoption of blockchain technology by industry and the effect of technology introduction will be a meaningful study.

Convergence Plan of IT Social Safety and SIB by Expanding Sharing Information Data (공유정보 데이터 확대로 인한 IT와 SIB의 사회인식)

  • Seo, DaeSung;Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.97-105
    • /
    • 2022
  • This study deals with the credibility of citizens when investing in uncertain project companies, as well as the Social Performance Compensation Project (SIB) and the IT sharing economy. This allows the convergence of the three sectors to address investment inequalities in economic effectiveness and social security. Activates the model of the overall Social Impact Bond (SIB) process that successfully activates the exchange of information. The empirical presentation of the operations and techniques for social IT service finance examines how the innovation ecosystem can be created with social performance and reward projects. The analysis shows that small sharing institutions or citizens can participate directly to create the ability to connect with private investors, identify the possibility of recognizing non-shared barriers to participation, and show the great impact of citizen trust in IT sharing projects in uncertain areas. As a result, for the sake of social sharing and IT cooperation promoted by the City of Seoul, before the project has the ability to design directly, it will be responsible for reliability and safety in the planning of the project. Therefore, non-shared citizens can also participate in the platform that has been effectively constructed and created.

Classification of Critically Important Antimicrobials and their Use in Food Safety (중요 항생제의 분류와 식품안전분야에서 활용)

  • Hyo-Sun Kwak;Jun-Hyeok Ham;Eiseul Kim;Yinhua Cai;Sang-Hee Jeong;Hae-Yeong Kim
    • Journal of Food Hygiene and Safety
    • /
    • v.38 no.4
    • /
    • pp.193-201
    • /
    • 2023
  • Antimicrobials in human medicine are classified by The World Health Organization (WHO) into three groups: critically important antimicrobials (CIA), highly important antimicrobials (HIA), and important antimicrobials (IA). CIA are antibiotic classes that satisfy two main criteria: that they are the sole or the only available limited therapeutic option to effectively treat severe bacterial infections in humans (Criterion 1), and infections where bacteria are transmitted to humans from non-human sources or have the potential to acquire resistance genes from non-human sources (Criterion 2). WHO emphasizes the need for cautious and responsible use of the CIA to mitigate risk and safeguard human health. Specific antimicrobials within the CIA with a high priority for management are reclassified as "highest priority critically important antimicrobials (HP-CIA)" and include the 3rd generation of cephalosporins and the next generation of macrolides, quinolones, glycopeptides, and polymyxins. The CIA list is the scientific basis for risk assessment and risk management policies that warrant using antimicrobials to reduce antimicrobial resistance in several countries. In addition, the CIA list ensures food safety in the food industry, including for the popular food chain companies McDonald's and KFC. The continuous update of the CIA list reflects the advancement in research and emerging future challenges. Thus, active and deliberate evaluation of antimicrobial resistance and the construction of a list that reflects the specific circumstances of a country are essential to safeguarding food security.

A Study on Improving Strategies of Itinerant Librarians' Job Environment at Small Libraries (작은도서관 순회사서 직무환경 개선방안 연구)

  • Chae, Hee-ra;Kim, You-seung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.71-94
    • /
    • 2022
  • While small libraries have steadily increased in quantity, parts of qualitative growth such as lack of manpower and poor operation have been pointed out as problems. Accordingly, with the aim of establishing a foundation for linkage and cooperation between public libraries and small libraries, the small library itinerant librarians project has been promoted since 2010, and its scale has been continuously expanding. However, the lack of manpower and poor operation still remain tasks to be solved, and the poor treatment and job environment of itinerant librarians have not improved. In this context, this study aims to examine the problems of small libraries and job problems experienced by itinerant librarians and to find ways to improve the job environment of itinerant librarians based on this. Through the analysis of previous studies, small libraries and net companies were investigated, and in-depth interviews were conducted with participants related to itinerant librarians and small libraries. Through interview data analysis, a total of 17 meaning topics were extracted, including 'lack of work authority', 'lack of work manual', 'lack of communication, community', 'lack of integrated operating system', 'poor treatment and working environment', 'malicious user', and 'lack of belonging'. Based on this, four improvement measures were proposed, including the improvement of the job authority and standard regulations of itinerant librarians, the establishment of a community organization, job security guarantees, and job education reinforcement.

Risks and Network Effect upon Cloud ERP Investments: Real Options Approach (위험 및 네트워크 효과가 클라우드 ERP 투자에 미치는 효과에 대한 연구)

  • Seunghyeon Nam;Taeha Kim
    • Information Systems Review
    • /
    • v.20 no.4
    • /
    • pp.43-57
    • /
    • 2018
  • We propose network effects upon the investment decision of cloud-based ERP. Using the survey data collected from 82 companies in 2015, we examine whether IT managers have an intention to adopt real options in order to manage the risk of cloud-based ERP investments and how the network effects influence upon the intention to adopt real options. Based on prior literature, we propose a research model with 4 hypotheses. We find partial support of the hypotheses from the empirical analysis: technological risks has a positive impact upon the adoption of real options such as defer, contract, and abandon. In contrast, we find no significant impact of security risks upon real options. We validate positive network effects upon the adoption of real options such as defer, contract, and abandon. This work empirically find that IT managers in Korean middle and small sized firms have an intention to adopt real options when the managers realize economic, technological, and relationship risks and when they expect network effects.