• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.026 seconds

TPM-Based Anti-Tampering Solutions to Protect Weapon Systems Technologies (TPM 기반 안티탬퍼링 솔루션을 통한 무기체계 기술 보호)

  • J.H. Lee;D.H. Kim;H.S. Lee;J.H. Han;Y.S. Kim;C. Ryu;Y.S. Choi;Y.K. Lee;J.N. Kim
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.5
    • /
    • pp.49-60
    • /
    • 2024
  • Protecting weapon system technologies is essential for national security. Advancements in artificial intelligence and South Korea's growing role in the global defense market underscore the importance of anti-tampering technologies. TPM-based anti-tampering ensures the integrity and confidentiality of weapon systems. This paper analyzes the concept of anti-tampering and the current standards and technologies related to TCG's TPM/TSS. With mandatory integration requirements for exported weapon systems, TPM-based anti-tampering solutions provide cost-effective, high-level security while effectively safeguarding K-Defense technologies.

Trends in Privacy-Preserving Quantum Computing Research (프라이버시 보호 양자 컴퓨팅 연구 동향)

  • Y.K. Lee
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.5
    • /
    • pp.40-48
    • /
    • 2024
  • Quantum computers can likely perform computations that are unattainable by classical computers, and they represent the next generation of computing technologies. Due to high costs and complex maintenance, direct ownership of quantum computers by individuals users is challenging. Future utilization is predicted to involve quantum computing servers performing delegated computations for clients lacking quantum capabilities, similar to the current utilization of supercomputing. This delegation model allows several users to benefit from quantum computing without requiring ownership, thereby providing innovation potential in various fields. Ensuring data privacy and computational integrity in this model is critical for ensuring the reliability of quantum cloud computing services. However, these requirements are difficult to achieve because classical security techniques cannot be directly applied to quantum computing. We review research on security protocols for the delegation of quantum computing with focus on data privacy and integrity verification. Our analysis covers the background of quantum computing, privacy-preserving quantum computational models, and recent research trends. Finally, we discuss challenges and future directions for secure quantum delegated computations, highlighting their importance for the commercialization and widespread adoption of quantum computing.

Match-Fixing in Korean Football: Corruption in the K-League and the Importance of Maintaining Sporting Integrity

  • Brooks, Graham;Lee, Ju-Lak;Kim, Hak-Kyong
    • International Journal of Contents
    • /
    • v.8 no.2
    • /
    • pp.82-88
    • /
    • 2012
  • Fraud and corruption is a problem that undermines the credibility and integrity of all sport. It affects fans, owners, shareholders, officials, and players. With the recent scandal in the K-League in Korea, the importance of maintaining the integrity of Korean football is presently of great importance. While other European or Asian football leagues have been plagued with fraud and corruption, Korea has maintained its professional sporting integrity successfully until recent times. This paper is an examination as to why players in the K-League succumbed to match- fixing in 2011. Firstly, we discuss the important role of sport in Korea, which is not to be underestimated. Secondly, we briefly illustrate the range and types of fraud and corruption in international football. Thirdly, we focus on the match-fixing and gambling scandal currently engulfing the K-League. Fourthly, we make some practical suggestions on how to combat and increase resilience to fraud and corruption in football. Finally, in the conclusion, we suggest that much needs to be done to reduce the incident of fraud and corruption in football worldwide, particularly through employing a clear counter fraud strategy.

A Study on the Derivation of Valuation Factor in Urban Regeneration Plan -Focused on he Questionnaire of Gwangju Metropolitan City- (도심재생계획 평가요인 도출에 관한 연구 -광주광역시의 설문조사내용을 중심으로-)

  • Bae, Young-Nam;Shin, Nam-Soo
    • Journal of the Korean housing association
    • /
    • v.19 no.5
    • /
    • pp.37-46
    • /
    • 2008
  • The purpose of this study is to derive and adapt the Valuation Factor of urban regeneration scientifically and synthetically, which is the basis of developing a rational plan for urban revitalization. For this, we have selected 37 factors relating to urban regeneration as outlined in preceding studies and inquiry about importance of factors. we analysed he Valuation factors influencing he importance of urban revitalization through a questionnaire which was completed by inhabitants and expert groups in Gwangju Metropolitan City. From he results of he Factor analysis using SPSSWIN(VER.14.0), it was found that the factors which influence the importance of urban regeneration are Environment, Function, Resources and Policy Factors. Environment Factor comprises amenity, culture, beauty and convenience, The while the Function Factor comprises interchange, information, complexity and security. This classification has credibility because of the high factor loading through the Varimax Factor Analysis and is due to a high Cronbach's coefficient. There is a strong correlation between the classified factors through correlation analysis. Finally, through AMOS (Analysis of Moment Structure) 16.0 it was found that the upper classification is credible because main suitability index confirms recommending an admission standard.

Purchase Satisfaction of Apparel for Internet Fashion Shopping Mall Users - focused on 20's~30's Men and Women (인터넷 패션 쇼핑몰 이용자의 의류구매 만족도 -20~30대 남녀를 중심으로-)

  • 신수연;김민정
    • The Research Journal of the Costume Culture
    • /
    • v.11 no.4
    • /
    • pp.487-499
    • /
    • 2003
  • The purpose of this study was to suggest marketing strategies to internet fashion shopping malls identifying factors that customers consider important. Data were collected by survey questionnaire and the subjects were 322 men and women in their twenties and thirties living in Seoul and Kyung-gi. SPSS 10.0 package were used and reliability, frequency, cross tabulation, chi-square, paired t-test, ANOV A and Duncan test were conducted for data analysis. The results were as follows. I) Subjects placed the most importance on providing the precise and detail information of products but its satisfaction level was low. 2) Subjects considered the ‘low price’ very importantly but its satisfaction level of it was not high. 3) Subject's importance and satisfaction level of ‘point system’ were about an average. 'Point system' has to be activated by using systems such as 'point network system' by pointbanking co. as one of price-cutting strategies. 4) Internet fashion shopping mall users treated 'the security system of personal data' importantly while they were not sufficiently satisfied with the system. 5) Female placed more importance on design and color of products and suppliance of the trendy items.

  • PDF

Importance of food science and technology in sustainable and resilient food systems - a Northeast Asian perspective (지속가능한 식량체계를 위한 식품과학기술의 중요성 - 동북아시아의 관점)

  • Lee, Cherl-Ho
    • Food Science and Industry
    • /
    • v.54 no.3
    • /
    • pp.196-209
    • /
    • 2021
  • The origines of the Western roasting culture and East Asian boiling culture were studied and the importance of primitive pottery culture (8000-5000 BCE) in the Korea Strait coastal region was discussed. The primitive pottery culture probably initiated the Jjigae (stew) culture and the production of salt. It can be also postulated that fish fermentation, kimchi fermentation, and cereal alcohol fermentation originated during this period. Soybean culture emerged ca. 2,000 BCE in South Manchuria and the Korean Peninsula. This paper focuses on the role of Korean foodways in the food science and technology development for the sustainable and resilient food systems. We are facing a global food crisis caused by population growth, climate change, and high animal food consumption. Studies on the meat analog and cultured meat are the new trend in Food Science and Technology. The importance of the wisdom learned through the Northeast Asian traditional foods, for example, soybean curd (tofu) and meaty flavor production by fermentation for the research on the novel sustainable and resilient food systems are discussed.

A Study on the Improvement of Wired and Wireless Network Survivability using Integrated IP Management (IP 통합 관리를 통한 유·무선 네트워크의 생존성 향상에 관한 연구)

  • Kim, Si-hung;Koo, Ja-Hwan;Park, Byung-Yeon;Park, Hark-Soo;Choi, Jang-Won;Lee, Jae Young
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.43-50
    • /
    • 2003
  • Computer Communications and networks have been revolutionized by technological advances in the last decade. There has been an increasing interest in the network security because of the growing popularity of Internet and the importance of networking in business area. With this growing interest, Network engineers come to more concern about improving network survivability. In this paper, we suggest the method that improves the survivability of wired and wireless network. To achieve this goal, we propose the integrated IP management with monitoring network nodes in the same network and controlling its activities.

  • PDF

A Study of Secure Group Key Management Based on Key-Chain for Multicast Data Transmission (멀티캐스트 전송을 위한 키 체인 기반의 안전한 그룹 키 관리방안 연구)

  • Kim, Bo-Seung;Kim, Jeong-Jai;Lee, Ki-Young;Shin, Yong-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3495-3501
    • /
    • 2010
  • Because the application simultaneously to transmit large amounts of data (Video conferencing, Internet broadcasting, Online games etc.) to multiple users increases, the importance and utilization of group communication was greater. So the security was recognized as a important issue. To provide security in multicast environment, A study of single group management server using protocol based on Key Tree Scheme was proposed. But the paper proposes secure group key management scheme to be a relatively low-overhead. Therefore proposed paper is demonstrated to be excellent by comparing the effectiveness of existing and proposed group key management scheme.

Quantitative Scoring System on the Importance of Software Vulnerabilities (보안취약점 중요도 정량 평가 체계 연구)

  • Ahn, Joonseon;Chang, Byeong-Mo;Lee, Eunyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.921-932
    • /
    • 2015
  • We proposed a new scoring system on software vulnerabilities, which calculates quantitatively the severity of software vulnerabilities. The proposed scoring system consists of metrics for vulnerability severity and scoring equations; the metrics are designed to measure the severity of a software vulnerability considering the prevalence of the vulnerability, the risk level of the vulnerability, the domestic market share of the software and the frequency of the software. We applied the proposed scoring system to domestically reported software vulnerabilities, and discussed the effectiveness of the scoring system, comparing it with CVSS and CWSS. We also suggested the prospective utilization areas of the proposed scoring system.

Design and Implementation of Alert Analysis System using Correlation (연관성을 이용한 침입탐지 정보 분석 시스템의 설계 및 구현)

  • 이수진;정병천;김희열;이윤호;윤현수;김도환;이은영;박응기
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.438-449
    • /
    • 2004
  • With the growing deployment of network and internet, the importance of security is also increased. But, recent intrusion detection systems which have an important position in security countermeasure can't provide proper analysis and effective defence mechanism. Instead, they have overwhelmed human operator by large volume of intrusion detection alerts. In this paper, we propose an efficient alert analysis system that can produce high level information by analyzing and processing the large volume of alerts and can detect large-scale attacks such as DDoS in early stage. And we have measured processing rate of each elementary module and carried out a scenario-based test in order to analyzing efficiency of our proposed system.