• Title/Summary/Keyword: Security Program

Search Result 1,232, Processing Time 0.029 seconds

Analysis of Technology and Security Threats on Blockchain (블록체인 기술 및 보안 위협 분석)

  • Jun, Euna;Lee, Cheulhee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.47-56
    • /
    • 2018
  • We analyzed security threats and suggested countermeasures about the block chain technologies which has emerged as a core technology of the fourth industrial revolution. We know that increasing the security leads to slow down program processing rate in the block chain systems. The block chain system which is currently an early stage of technological development, to become an economic and social infrastructure, development of technology and active policy implementation will be necessary. We studied on the security threats and countermeasures of the Bit Coin based on block chain. Further research should be undertaken on the possibility that future studies could have a real adverse effect on the integrity of the data.

A Survey of Cybersecurity Vulnerabilities in Healthcare Systems

  • Adwan Alownie Alanazi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.155-161
    • /
    • 2023
  • In the process of remarkable progress in the medical and technical field and activating the role of technology in health care services and applications, and since the safety of medical data and its protection from security violations plays a major role in assessing the security of health facilities and the safety of medical servers Thus, it is necessary to know the cyber vulnerabilities in health information systems and other related services to prevent and address them in addition to obtaining the best solutions and practices to reach a high level of cybersecurity against attackers, especially due to the digital transformation of health care systems and the rest of the dealings. This research is about what cyberattacks are and the purpose of them, in addition to the methods of penetration. Then challenges, solutions and some of the security issues will be discussed in general, and a special highlight will be given to obtaining a safe infrastructure to enjoy safe systems in return.

Long-term Policy Development for the Aged on Medical and Health Care Security (노인의료보장 및 건강관리를 위한 장$cdot$단기 대책)

  • Rhee Seonja;Lee Yoon Sook
    • Journal of Korean Public Health Nursing
    • /
    • v.5 no.1
    • /
    • pp.70-95
    • /
    • 1991
  • The ageing problem of the population has been emerging in Korea since 1970's so that it is expecting the elderly 65 years and over among the total population from $4.5\%$ in 1988 to be $6.3\%$ in year 2000. This study was conducted to provide secure policy development in coming years for the aged on medical and health care aspects based on the examining current status of the aged problems and health care policies and systems. The study divided into four parts; The first part examined the medical insurance program and public assistance program of the health services in relation to the aged. The second part emphasized on reduction of medical care cost for the aged. The third part studied the regular health check-up program and health education for the aged. The fourth part examined the chronic disease management programs for the aged and strategies of the health care service quality improvement and specialized programs. The following recommendations made as the results of the study. 1. At present, the medical insurance program and public assistance program for the medically indigent is not appropriate to the elderly because it is a part of general medical insurance program so that Health Security Law for the Aged is proposed. 2. Medical cost will be increased due to the high occupancy rate of hospital beds and long stay of the elderly so that it is recommended to develop an early discharge program, home health care program, Health hospice and an althernative programs. 3. At present, a regular health check-ups for the elderly is not included in medical insurance program so that it is recommended to be included in the insurance program and at the same time health education program thoroughly developed for the aged. 4. To make proper medical and nursing services on chronic diseases for the elderly, it is recommended manpower development, specialized clinics or hospitals, nursing homes and an equivalent long term care facilitices should be established on the community based and a research institutions also to be related to supper the care programs.

  • PDF

Implementation of Source Analysis Tool for Vulnerability Search of Web Program (웹 프로그램의 취약점 검색을 위한 소스분석 툴 구현)

  • Kim, Soung-Uk;Hoang, Tae-Moon;Kim, Pan-Kyu;Park, Sang-Su;Lee, Jong-Hyeok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.776-779
    • /
    • 2005
  • The Program language for web, such as PHP, JSP, ASP and so on, make it possible to offer more user interactive page by using with HTML. These language and program have been developed with great speed, but security part could not catch up with this development. As a result, it has brought a problem which is expose many server systems to the outside. In this research, we implement Web and SQL analysis program which can analysis hacking causing factor. With this analysis program, we will show you how much efficient it has compared with security patch for server system.

  • PDF

DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1402-1411
    • /
    • 2014
  • Buyer-seller watermarking protocol is defined as the practice of imperceptible altering a digital content to embed a message using watermarking in the encryption domain. This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce. Buyer-seller watermarking protocol is fundamentally based on public-key cryptosystem that is operating using the algebraic property of an integer. However, in general usage, digital contents which are handled in watermarking scheme mostly exist as real numbers in frequency domain through DCT, DFT, DWT, etc. Therefore, in order to use the watermarking scheme in a cryptographic protocol, digital contents that exist as real number must be transformed into integer type through preprocessing beforehand. In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol. We applied integral-processing in order to modify the decimal layer. And we designed a direction-adaptive watermarking scheme by analyzing distribution property of the frequency coefficients in a block using JND threshold. From the experimental results, the proposed scheme was confirmed to have a good robustness and invisibility.

Fingerprint Recognition Using Artificial Neural Network (인공신경망을 이용한 지문인식)

  • Jung, Jung-hyun;Choi, Byung-Yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.417-420
    • /
    • 2014
  • Importance of security system to prevent recently increased financial security accident is increasing. Biometric system between the security systems is focused. Fingerprint recognition has many useful aspects such as security, reliability and portability. In this treatise, fingerprint recognition technique is realized by using artificial neural network. Artificial Neural Network(ANN) is a mathematics learning model that makes specific patterns that a program can recognize to show a nerve network's characteristic on a computer. Input fingerprint images have a preprocessing process such as equalization, binarization and thinning. We extract minutiae feature in the images and program can recognize a fingerprint through ANN.

  • PDF

CBDC Model with Enhanced Anonymity Using ID Certificate andBlockchain Encryption (익명인증서 및 블록체인 암호화로 익명성이 강화된 디지털화폐 모델)

  • Jae-ho Yoon;Yong-min Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.139-149
    • /
    • 2023
  • CBDC has characteristics similar to e-payments in which all records are kept by logs, so it is difficult to satisfy the anonymity level of cash. Therefore, in this study, the CBDC model that encrypts all transaction contents using the Diffie-Hellman key sharing algorithm was presented to enhance anonymity. The proposed model provides unlinkability anduntraceability. In addition, a CBDC certificate that uses pseudonym is used. Through this certificate, illegal transactions that require tracking can be tracked later by authorized institutions.

The effect on a job performance of the Education training satisfaction of Private Security (민간경비원의 교육훈련만족도가 직무수행에 미치는 영향)

  • Lee, Sae-Hwan;Lee, Seung-Chal;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.139-163
    • /
    • 2009
  • The purpose of this study is to build up the expert system with more subdivided qualifications and improved qualities with the development of the security industry. And also it is to analyze a survey measuring how satisfied they are with curriculum, teaching faculty, educational administration, facilities among 439 private guards completing a course in Korea private guard educational institution and registered in the National Police Agency in Seoul, Gyeonggi, Chungcheong, Gyeongsang, Jeolla province. For this, SPSS(Statistical Packages for Social Science) 15.0 Version was adapted to analyze and other analysis methods used for this study are like these: frequency, reliability analysis, regressive analysis, moderated multiple regression, post hoc test for categorizing the performance changes, looking into the characteristics, examining closely job performance, intention to quit one's job, and inquiring into the influence how satisfaction measurement at education training satisfaction makes on carrying out one's job. Firstly, The Effect Satisfaction at The Program has on Performing One's Duty With respect to job performance, curriculum, educational administration, teaching abilities have positive influences on it. On the other hand, with respect to quitting one's job, curriculum just makes positive effects on leaving one's work statistically. It indicates that systematic and effective curriculum, administration, teaching faculty or contents with high quality rather than just education facilities would make the task performance excellent and satisfaction at the program well in regards to making effects on the task performance. Secondly, The Effect Satisfaction at The Program has on Performing One's Duty with Social Supports Despite being the fact that statistically any strong correlation between curriculum and social supports, one between education facilities and social supports, one between teaching abilities and social supports, and one between educational administration and social supports do not have influences on carrying out job performance, it turns out that satisfaction at the program and social supports make positive effects on performing one's task. In conclusion, the entire social system and support need to be improved and some institutions appropriate for satisfaction at the program should be established as soon as possible.

  • PDF

A Study on the Secure Coding for Security Improvement of Delphi XE2 DataSnap Server (델파이 XE2 DataSnap 서버의 보안성 개선을 위한 시큐어 코딩에 관한 연구)

  • Jung, Myoung-Gyu;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.706-715
    • /
    • 2014
  • It is used to lead to serious structural vulnerability of the system security of security-critical system when we have quickly developed software system according to urgent release schedule without appropriate security planning, management, and assurance processes. The Data Set and Provider of DataSnap, which is a middleware of Delphi XE2 of the Embarcadero Technologies Co., certainly help to develop an easy and fast-paced procedure, but it is difficult to apply security program and vulnerable to control software system security when the connection structure Database-DataSnap server-SQL Connection-SQL Data set-Provider is applied. This is due to that all kinds of information of Provider are exposed on the moment when DataSnap Server Port is sure to malicious attackers. This exposure becomes a window capable of running SQL Command. Thus, it should not be used Data Set and Provider in the DataSnap Server in consideration of all aspects of security management. In this paper, we study on the verification of the security vulnerabilities for Client and Server DataSnap in Dlephi XE2, and we propose a secure coding method to improve security vulnerability in the DataSnap server system.

A Study on the Physical Training for the Security Agents of the Security Headquaters in the North Korea (북한 호위사령부의 경호요원 체육교육에 관한 연구)

  • Kim, Jung-Hyun
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.45-64
    • /
    • 2004
  • The pivotal emphasis of the physical training for the security agents of the security headquarters in the North Korea is to inspire them with the defense physical training-centered ideology and the war spirit. Their special martial arts is the protectee-centered offensive arts rather than the self-centered arts. It puts emphasis on training black belt-holders in diverse martial arts rather than in a certain martial art. Thus, the physical training for security agents in the South Korea should be also developed into the ways to rear them as black belt-holders in diverse martial arts rather than to foster them as high grade-holders in a certain martial art. And also, professors majoring in security and physical science have to develop jointly the measures to improve the physical and mental agility and the basic physical strength to inspire rapid handling and perseverance, to develop the physical training program to reduce mental and physical stress of security guards, to develop the standard for the examination of physical strength suitable for the body figures of Korean people and the regular evaluation with the standard and to apply traditional folk-games such as the swing and the seesaw to the physical training for security guards.

  • PDF