• 제목/요약/키워드: Security Practice

검색결과 374건 처리시간 0.027초

사용자 보안을 강화한 다중 계정 서비스 구성을 통해 이루어진 공학 교육 실천 방법론에 관한 연구 (A Study on the Practical Methodology of Engineering Education through Multi-account Service Composition with Enhanced User Security)

  • 강경보;박재순;장은영
    • 실천공학교육논문지
    • /
    • 제10권1호
    • /
    • pp.1-7
    • /
    • 2018
  • 사용자의 계정 정보를 관리하고 NFC(Near Field Communication)와 OTP(One Time Password)를 이용한 이중 보안 시스템을 제안 하고, NFC의 1m 미만의 범위 내에서 인식하는 특징과 NFC 자체의 높은 보안성을 이용하여, 사용자 인증 단계를 강화한 결과물은 4년제 학부체계의 전자공학 전공에서 2인 1조로 1년 6개월 동안 진행한 졸업작품 설계과정에서 이루어졌다. 본 학회의 학술대회를 포함하여 국내 전문학회 학술발표대회 및 논문경진 대회에 3회 참가하여, 중간 결과들을 발표하였고, 지도교수가 포함된 6인의 전공교수들에 의한 3차 심사단계를 거쳐 졸업 작품으로 합격하였다. 합격된 사항은 발표논문 체계로 구성하여 합격한 다른 인원들과 함께 졸업 논문집을 발간하였다. 이러한 단계를 거쳐 얻어진 설계 및 제작의 경험을 통해, 자신감을 얻고 취업 기회를 적극적으로 모색하는 성장의 단계를 갖는 계기가 되었으며, 취업을 통해 공학교육을 실천하는 하나의 방법론을 제시하였다.

호주 민간경비산업 고품질 규제수단 검토 및 시사점 (Australian Case Study in Regulatory Techniques to the Security Industry Reform and Policy Implications)

  • 김대운
    • 시큐리티연구
    • /
    • 제47호
    • /
    • pp.7-36
    • /
    • 2016
  • 흔히 '성장의 한계가 없는 고도 성장산업'으로 불리는 민간경비업은 1980년대 이래 쉼 없는 양적 팽창을 거듭해왔다. 현대에서 민간경비의 역할은 생활안전 뿐 아니라 안보에도 중요한 위치를 차지하고 있으며, 그 교량적 기능은 가속화되고 있다. 치안서비스의 한 축으로써, 민간경비산업의 건전한 육성발전을 촉진하기 위해 세계 각국은 고유의 필요에 따라 각기 독특한 자격제도와 규제수단을 마련해 운영해오고 있다. 그간 우리나라에는 민간경비산업이 고도로 활성화 된 주요국의 규제개혁 사례가 다수 소개된 바 있다. 하지만 지금까지 소개된 선진국의 제도정비연구는 전반적으로 영미와 독일, 이웃 일본 중심이었다. 그러나 경비산업의 활성화 논의와 규제해법 담론을 이끌고 있는 많은 선도국들이 있으며, 그 중 대표적으로 일찍이 경비서비스를 공공재로 인식하여 단계적 제도개선 노력을 지속해온 광대한 인구부족 국가 호주를 꼽을 수 있다. 이러한 맥락에서, 본 연구에서는 1980년대부터 민경 역할분담을 확대해온 호주의 경비산업규제 접근방식을 살펴보고 이로부터 민간경비 산업 전반의 리스크 관리와 거시건전성 감독정책 방향에 대해 국내에 주는 시사점을 도출하였다. 연구결과, 호주의 경비산업 관리 운영은 (1) 의심스런 경비업자 측근에 대한 강도 높은 모니터링과 지문을 날인하는 제도의 운영, (2) 무영장 경비업체 압수수색제도, (3) 부적격자 삼진아웃 퇴출제도 등을 특징으로 하였다. 민간경비는 사회 안전을 보장하는 공공재적 성격이 강하므로, 서비스의 균일한 신뢰성 담보를 위해서는 정부주도의 보다 전문적인 관리와 선제적 개입이 요구된다. 이에 본 연구에서는 호주의 사례를 바탕으로, (1) 규제 프로그램의 리스크 유형별 효과성 측정을 토대로 한 규제품질평가에 대한 필요성, (2) 중장기적 규제영향분석을 위한 전담기구의 설립, (3) 규제준수 유도를 위해 활용될 수 있는 규제 믹스(regulatory mix) 전략에 관한 가이드라인을 제시하여 정책적 시사점을 도출하였다.

  • PDF

종속고장을 고려한 전력시스템의 신뢰도 평가 (Reliability Analysis of Power System with Dependent Failure)

  • 손현일;권기량;김진오
    • 조명전기설비학회논문지
    • /
    • 제25권9호
    • /
    • pp.62-68
    • /
    • 2011
  • Power system needs to sustain high reliability due to its complexity and security. The reliability prediction method is usually based on independent failure. However, in practice, the Common Cause Failures(CCF) and Cascading failure occur to the facilities in power system as well as independent failures in many cases. The CCF and Cascading failure turn out the system collapse seriously in a wide range. Therefore to improve the reliability of the power system practically, it is required that the analysis is conducted by using the CCF and Cascading failure. This paper describes the CCF and Cascading failure modeling combined with independent failure. The incorporated model of independent failure, CCF and cascading failure is proposed and analyzed, and it is applied to the distribution power system in order to examine this method.

Prevalence of child malnutrition in agro-pastoral households in Afar Regional State of Ethiopia

  • Fentaw, Rabia;Bogale, Ayalneh;Abebaw, Degnet
    • Nutrition Research and Practice
    • /
    • 제7권2호
    • /
    • pp.122-131
    • /
    • 2013
  • Based on data generated from 180 randomly selected households with children age under five years old in Aysaita district of Afar region of Ethiopia, this study explored prevalence of malnutrition and scrutinized household characteristics, maternal characteristics, specifics of the child and economic variables associated with child malnutrition. The height-for-age Z-scores (HAZ), weight-for-height Z-scores (WHZ) and weight-for-age Z-scores (WAZ) were used to measure the extent of stunting, wasting and underweight, respectively. The results revealed that prevalence of long term nutritional imbalance and malnutrition status indicator (i.e. stunting) was 67.8%. The short term measure (wasting) was found to be 12.8% and underweight was found to be 46.1%. Moreover, children in households which are headed by women, and characterized by more dependency ratio, less access to assets, health services and institutions are more likely to be undernourished.

전자무역의 활성화를 위한 제 모델의 특성별 비교 (Characteristic Comparison of some models for e-trading Activation)

  • 이종섭;최홍섭;심국보
    • 통상정보연구
    • /
    • 제4권2호
    • /
    • pp.97-119
    • /
    • 2002
  • This research purposes on comparing some e-trailing models in character and presenting the obstacles of e-trailing activation and the solutions, e-trailing models this research has studied are 1) Bolero, 2) TradeCard, 3) BeXcom, 4) Identrus, and 5) TEDI etc. Comparing characteristic points of the e-trading models are as follows ; 1) Access ways as a global e-trading model, 2) Structural characteristic, 3) Functional characteristic, 4) Role as a global e-trading model, 5) Legal issues, 6) Application issues in practice, 7) Security issues for Technology.

  • PDF

An Empirical Investigation of Task-Technology Fit: Context of RFID in Disaster Management

  • Ahmed, Ashir
    • Asia pacific journal of information systems
    • /
    • 제24권3호
    • /
    • pp.345-370
    • /
    • 2014
  • The notion of technological adoption such as Radio Frequency Identification (RFID) has been examined in various domains such as supply chain management, inventory management and health care. However, there are several unanswered questions surrounding how this technology is adopted in disaster management. This study attempts to explore the potential of RFID in disaster management. The notion of Task-Technology Fit (TTF) is deemed suitable for this purpose and thus used as the theoretical framework that is further validated by employing multiple case studies. The empirical findings indicate that there are six key factors influencing the decision to adopt RFID in disaster management. Some relate to aspects of RFID when it is put into practice, namely cost, compatibility, standardisation, implementation and locatability; while the other key factor relates to privacy and security aspect of information. It is hoped that the findings of this research will inform disaster management organizations to better plan the adoption of RFID for their operations.

A Provably Secure and Practical Signature Scheme for Smart Cards

  • You, Yong Kuk;Hahn, Sang Geun
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제2권1호
    • /
    • pp.15-26
    • /
    • 1998
  • By "secure", we mean that some well-defined computational assumption can be shown to be sufficient for the scheme not to be existentially forgeable, even under an adaptive chosen message attack. Most, if not all, signature schemes used in practice are based on a computational assumption that is certainly necessary for this kind of security, not known to be sufficient. Since the work of Goldwasser, Micali and Rivest[?], many researches have been done for the secure signature schemes. We modify the Cramer-Damg$\dot{a}$rd scheme to implement a practical and secure signature scheme for smart cards.

  • PDF

배전선로의 유도뢰 해석 (Analysis on Overvoltage induced on Power Distribution line by Lightning surge)

  • 김헌준;최상열;정호성;신명철;박남옥
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1998년도 추계학술대회 논문집 학회본부A
    • /
    • pp.279-281
    • /
    • 1998
  • This paper present overvoltage induced on distribution power line by lightning surge. It is important problem that overvoltage threatens credit and security of the power system. In this paper induced overvoltage was calculated. From the line being modeled in really actual practice. Also, the proper suppressing effects of a surge arrester against lightning induced voltages were suggested.

  • PDF

Diffractive Optical Element for Noise-reduced Beam Shaping of Multi-array Point Light Source

  • Lee, Jonghyun;Hahn, Joonku;Kim, Hwi
    • Current Optics and Photonics
    • /
    • 제5권5호
    • /
    • pp.506-513
    • /
    • 2021
  • An arrayed diffractive optical element design for the beam-shaping of a multi-array light source is proposed. This is an essential device for recent optical security and face recognition applications. In practice, we devise a DC noise reduction technique featuring high fabrication error tolerance regarding the multi-array light source diffractive optical elements, as a necessary part of the proposed design method. The spherical diverging illumination leads to DC-conjugate noise spreading. The main idea is tested experimentally, and the multi-array light source diffraction pattern is investigated numerically.

NFC에서 무선 핑거프린팅 기술 적용을 위한 GAN 기반 채널데이터 증강방안 (GAN based Data Augmentation of Channel Data for the Application of RF Finger-printing in NFC)

  • Lee, Woongsup
    • 한국정보통신학회논문지
    • /
    • 제25권9호
    • /
    • pp.1271-1274
    • /
    • 2021
  • RF fingerprinting based on deep learning (DL) has gained interests as a means to improve the security of near field communication (NFC) by allowing identification of NFC tags based on unique physical characteristics. To achieve high accuracy in the identification of NFC tags, it is crucial to utilize a large number of training data, however it is hard to collect such dataset in practice. In this study, we have provided new methodology to generate RF waveform from NFC tags, i.e., data augmentation, based on a conditional generative adversarial network (CGAN). By using the RF waveform of NFC tags which is collected from the testbed with software defined radio (SDR), we have confirmed that the realistic RF waveform can be generated through our proposed scheme.