• Title/Summary/Keyword: Security Program

Search Result 1,232, Processing Time 0.027 seconds

Development of Test Software Program and Digital Signal Processing Board for Array Module Signal Processing System (Array 검출 모듈 신호처리 시스템의 테스트 소프트웨어 프로그램 개발 및 디지털 신호처리 보드 개발)

  • Park, Geo;Kim, Young-kil;Lee, Jean
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.499-505
    • /
    • 2018
  • Shipping and logistics safety, security system is strengthening worldwide, the development of shipping and logistics safety security core technology for national security logistics system construction has been carried out. In addition, it is necessary to localize the Array Detection System, which is a core component of the container search machine, to cope with the 100% pre-inspection of the container scheduled for 2018 in the United States. In this research, we propose a test software program developed by using TI-RTOS (Texas Instruments - Real Time Operating System) with a test digital signal processing board which is developed self development. We have developed a program that can test GPIO, SRAM, TCP/IP, and SDcard using M4 MCU. Also we propose a study on a self-developed Digital Signal Processing Board among the array detection systems that replace foreign products. We have developed a test board that can test M4 MCU and developed an X-Ray Detector Digital Signal Processing Board that combines MCU and FPGA.

An Implementation of JTAG API to Perform Dynamic Program Analysis for Embedded Systems (임베디드 시스템 동적 프로그램 분석을 위한 JTAG API 구현)

  • Kim, Hyung Chan;Park, Il Hwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.2
    • /
    • pp.31-42
    • /
    • 2014
  • Debugger systems are necessary to apply dynamic program analysis when evaluating security properties of embedded system software. It may be possible to make the use of software-based debugger and/or DBI framework if target devices support general purpose operating systems, however, constraints on applicability as well as environmental transparency might be incurred thereby hindering overall analyzability. Analysis with JTAG (IEEE 1149.1) debugging devices can overcome these difficulties in that no change would be involved in terms of internal software environment. In that sense, JTAG API can facilitate to practically perform dynamic program analysis for evaluating security properties of target device software. In this paper, we introduce an implementation of JTAG API to enable analysis of ARM core based embedded systems. The API function set includes the categories of debugger and target device controls: debugging environment and operation. To verify API applicability, we also provide example analysis tool implementations: our JTAG API could be used to build kernel function fuzzing and live memory forensics modules.

A Study on the Trade-Economic Effects and Utilization of AEO Mutual Recognition Agreements

  • LEE, Chul-Hun;HUH, Moo-Yul
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.2
    • /
    • pp.25-31
    • /
    • 2020
  • Purpose: The AEO (Authorized Economic Operator) program, created in 2001 in the United States due to 9.11 terrorist's attack, fundamentally changed the trade environment. Korea, which introduced AEO program in 2009, has become one of the world's top countries in the program by ranking 6th in the number of AEO certified companies and the world's No. 1 in MRA (Mutual Recognition Agreement) conclusions. In this paper, we examined what trade-economic and non-economic effects the AEO program and its MRA have in Korea. Research design, data and methodology: In this study we developed a model to verify the impact between utilization of AEO and trade-economic effects of the AEO and its MRA. After analyzing the validity and reliability of the model through Structural Equation Model we conducted a survey to request AEO companies to respond their experience on the effects of AEO program and MRA. As a result, 196 responses were received from 176 AEO companies and utilized in the analysis. Results: With regard to economic effects, the AEO program and the MRA have not been directly linked to financial performance, such as increased sales, increased export and import volumes, reduced management costs, and increased operating profit margins. However, it was analyzed that the positive effects of supply chain management were evident, such as strengthening self-security, monitoring and evaluating risks regularly, strengthening cooperation with trading companies, enhancing cargo tracking capabilities, and reducing the time required for export and import. Conclusions: When it comes to the trade-economic effects of AEO program and its MRA, AEO companies did not satisfy with direct effects, such as increased sales and volume of imports and exports, reduced logistics costs. However, non-economic effects, such as reduced time in customs clearance, freight tracking capability, enhanced security in supply chain are still appears to be big for them. In a rapidly changing trade environment the AEO and MRA are still useful. Therefore the government needs to encourage non-AEO companies to join the AEO program, expand MRA conclusion with AEO adopted countries especially developing ones and help AEO companies make good use of AEO and MRA.

A Study on Development of National Examination Security Service (국가시험 보안업무의 발전적 방안연구)

  • Ha, jeong hoon
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.75-95
    • /
    • 2018
  • The purpose of this study is to find the development of the examination security business plan based on the problem that guards are now aware of examination security service. To achieve the purpose of this study, the interview was conducted by interviewing interviews with five field related graduates and seven field specialists who are currently engaged in the examination for more than six years. The guard who perform national examination security service proposed a development plan of national examination security services as follows. First, the security guards at the national examination must complete an education program suitable for the nature of the workplace. Second, disaster and emergency response training should be added. Third, national examination security guards should be provided with mental training, search equipment and advanced equipment. Fourth, The National Examination Security Service should be specified in the Security Law so that laws and regulations can actively respond. Fifth, the related organization (contracting party) must raise the cost of service according to reality after realizing the property. Sixth, The national security service should ensure that security guards who have completed the security guards' training will be recruited.

A Study on Specialized Human Rights Education for Practicing Aviation Security Personnel's Human Rights Perspective (항공보안요원 인권관점 실천을 위한 특화된 인권교육에 관한 연구)

  • Young-Chun Kim;Min-Woo Park;Wontae Park
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.30 no.4
    • /
    • pp.117-131
    • /
    • 2022
  • Human rights education is to acquire understanding and knowledge about human rights, to develop values, attitudes and character that respect human rights, to develop the ability to overcome human rights violations and discriminatory acts, and to protect and promote the human rights of others. In order to prevent human rights violations of the transportation vulnerable, such as the disabled, it is necessary to develop specialized human rights education plans for aviation security personnel to practice human rights perspectives. Therefore, in accordance with the 「National Civil Aviation Security Education and Training Guidelines」, specialized human rights education should be included in the initial aviation security education and regular education courses. The point is that there is a need to reexamine the aviation security education program for aviation security personnel based on the essential knowledge and educational contents for aviation security personnel to perform security screening tasks in the aviation security education course. When this happens, various efforts must be made to improve the human rights of the transportation vulnerable, such as the disabled, during the security screening process, so that human rights violations will be significantly reduced. In particular, it is necessary to enhance the ability to detect dangerous terrorist items such as weapons or explosives that can be used for illegal sabotage through practical security screening training. For aviation security and aircraft safety, efforts to improve the quality of aviation security personnel training, such as human rights training, must be continuously made while thoroughly preparing for terrorism in advance.

Depression and Anxiety Related with Married Women's Attachment Security and Self-esteem : Focused on the Mothers of Elementary School Students (기혼여성의 애착안정성과 자아존중감에 따른 우울, 불안 : 초등학생 어머니를 중심으로)

  • Kwahk, So-Hyeon;Kim, Soon-Ok
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.7
    • /
    • pp.35-48
    • /
    • 2007
  • The purpose of this study was to examine the difference between the depression and anxiety related with maternal attachment security and those with self-esteem. The study subjects were 240 children's mothers from seven Community Social Welfare Service Centers in Seoul, Incheon, and Pyeongtaek, including those from 1st graders to 6th graders of 2 elementary schools in Seoul. Consequently, a total of 200 mothers were selected for this study. The data in this study were analyzed with SPSS 12.0 program by frequency analysis, technical statistics analysis, Cronbach's $\alpha$, Pearson's correlations, partial correlation analysis, and two-way ANOVA. The results of this study are as follows: (1) Paternal attachment security and maternal attachment security indicated a moderate level of negative correlation with depression and anxiety. Self-esteem showed a high level of negative correlation with depression and anxiety. For self-esteem, we divided the subjects into two groups of high and low self-esteem. In the former, anxiety was significantly negatively correlated with paternal attachment security and depression was not significantly correlated with maternal attachment security and paternal attachment security. In the low group, neither depression nor anxiety showed meaningful correlation with paternal attachment security and maternal attachment security. (2) Married women's depression and anxiety had a main effect both in paternal attachment security and self-esteem level, and in maternal attachment security and self-esteem level. However they had no interactive effect in paternal attachment security and self-esteem level, and in maternal attachment security and self-esteem level.

An Exploratory Research on Factors Influence Perceived Compliance Cost and Information Security Awareness in Small and Medium Enterprise (보안정책 준수 비용과 정보보안 중요성 인식 수준에 미치는 요인에 관한 연구: 중소기업을 중심으로)

  • Yim, Myung-Seong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.69-81
    • /
    • 2018
  • The ultimate intention of this research is to identify the factors that have a significant effect on the perceived importance of information security as the antecedent of intention to information security policy compliance. We found that the effectiveness of information security training program did not have statistically significant effect on the perceived cost of policy compliance. Second, the effectiveness of information security policy has significant influence on the perceived cost of policy compliance. Third, perceived vulnerability has a significant effect on the perceived cost of policy compliance. Fourth, perceived cost of policy compliance has a significant effect on perceived importance of information security. Fifth, supervisor's attitude toward information security silence has a significant effect on employee silent behavior towards information security. Sixth, communication opportunities towards information security has a significant influence on employee silent behavior towards information security. Finally, it was shown that employee silent behavior towards information security had a significant influence on the perceived importance of information security.

Enhanced Security Measurement of Web Application Testing by Outsourcing (외주 개발 웹 어플리케이션 테스팅의 보안성 강화 방안)

  • Choi, Kyong-Ho;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.3-9
    • /
    • 2015
  • A web application that allows a web service created by a internal developer who has security awareness show certain level of security. However, in the case of development by outsourcing, it is inevitable to implement the development centered on requested function rather than the issue of security. Thus in this paper, we improve the software testing process focusing on security for exclusion the leakage of important information and using an unauthorized service that results from the use of the vulnerable web application. The proposed model is able to consider security in the initial stage of development even when outsourced web application, especially, It can prevent the development schedule delay caused by the occurrence of modification for program created by programer who has low security awareness. This result shows that this model can be applied to the national defense area for increasing demand web application centered resource management system to be able to prevent service of web application with security vulnerability based on high test.

A Study on Improvement of Information Security awareness through Game: Focusing on Changes in Awareness of Information Security Policies (게임을 통한 정보보안인식 향상에 관한 연구: 개별 정보보안정책에 대한 인식변화를 중심으로)

  • Choi, Jong-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.951-962
    • /
    • 2018
  • In order to strengthen the information security of the organization, it is important to invest in the information security facility, but the information security awareness of the organization members is also very important. Effective education is needed to raise awareness of this information security. However, the method of collective education utilized by most organizations is not very effective. Educational methods using serious games can be a good alternative. Educational methods using serious games have already proved effective through various cases and researches and are used in many fields. In this paper, we design and implement a game program to improve the awareness of individual information security policy importance. The training was conducted for the members of the organization and the change of awareness about the importance of individual information security policy was examined through analysis of evaluation data before and after the training.

A Study on a Countermeasure Program using the Martial Arts for a Security Guard Caused by an Accidental Situation (우발상황시 경호무도 대응방안)

  • Park, Jun-Seok;Kang, Young-Gil
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.327-340
    • /
    • 2003
  • As a countermeasure under accidental occurrence situation, First, as application form of martial arts, A security guard foster ability that can protect a target person of guard and own body under accidental occurrence situation through incessant martial arts practice. To achieve this purpose, incessant training mental power and physical strength reinforcement should be kept on to prevent, therefore make a safety control function for such as weapon, small arms, explosive, vehicles terror etc. happened under accidental occurrence situation. Second, according to the contents of training based on the classification category of martial arts for security guard under accidental situation, a security guard must keep safety distance necessarily lest a target person of gurad should be attacked by attacker, therefore, intercept an attack opportunity if a safety distance between a target person of guard and attacker is not kept. Third, It is to practice confrontation techniques based on the type of attack. A security guard must develp situation disposal ability that can cope properly with the attack using empty hands, murderous weapon, small arms, explosive by case or individual or mass of threat that impose danger and injury in a target person's body of guard.

  • PDF