• Title/Summary/Keyword: Security Program

Search Result 1,236, Processing Time 0.033 seconds

A method for improving security of the NateOn authentication scheme (네이트온 인증 방식의 보안 취약점에 대한 대응 방안)

  • Noh, Jae-Min;Moon, Jeung-Il;Lim, Dong-Hyoun;Kim, Mi-Ji;Park, Hye-Lim
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.05a
    • /
    • pp.582-585
    • /
    • 2008
  • Nate-on is one of the most widely used messenger system in Korea. A recent research, however, shows that Nate-on messenger has some security vulnerabilities in its mechanism for user authentication. From the present paper found on which the certify method of nate-on messenger program and its weakness. This paper aims to propose new certified protocol and find a solution to the problems that it has by reviewing the way to authenticate the nate-on messenger program and its weak points. In this work, we present a new authentication protocol designed to resolve the security problem with the Nate-on system.

  • PDF

Windows Program Package Development for Optimal Pourer Flour Analysis (최적전력조류 해석을 위한 원도우프로그램 팩키지 개발)

  • Kim, Gyu-Ho;Lee, Sang-Bong;Lee, Jae-Gyu;Yu, Seok-Gu
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.50 no.12
    • /
    • pp.584-590
    • /
    • 2001
  • This paper presents a windows program package for solving security constrained OPF in interconnected Power systems, which is based on the combined application of evolutionary programming(EP) and sequential quadratic programming(SQP). The objective functions are the minimization of generation fuel costs and system power losses. The control variables are the active power of the generating units, the voltage magnitude of the generator, transformer tap settings and SYC setting. The state variables are the bus voltage magnitude, the reactive power of the generating unit, line flows and the tie line flow In OPF considering security, the outages are selected by contingency ranking method. The resulting optimal operating point has to be feasible after outages such as any single line outage(respect of voltage magnitude, reactive power generation and power flow limits). The OPF package proposed is applied to IEEE 14 buses and 10 machines 39 buses model system.

  • PDF

Method of Vulnerability Analysis from Layer Scanning (Layer별 Scanning을 사용한 취약성 분석 방법)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.277-280
    • /
    • 2010
  • Network based on the OSI 7 Layer communication protocol is implemented, and the Internet TCP / IP Layer Based on the vulnerability is discovered and attacked. In this paper, using the programs on the network Layer Scanning conducted by the Layer-by each subsequent vulnerability analysis. Layer by Scanning each vulnerability analysis program to analyze the differences will be studied. Scanning for the studies in the program reflects the characteristics of the Scanning Features of way, and security countermeasures by each Layer is presented. The results of this study was to analyze its vulnerability to hackers and security for defense policy as the data is utilized to enhance the security of the network will contribute.

  • PDF

Predicting Employment Status of Injured Workers Following a Case Management Intervention

  • Awang, Halimah;Mansor, Norma
    • Safety and Health at Work
    • /
    • v.9 no.3
    • /
    • pp.347-351
    • /
    • 2018
  • Background: The success of an injury intervention program can be measured by the proportion of successful return to work (RTW). This study examined factors of successful return to employment among workers suffering from work-related injuries. Methods: Data were obtained from the Social Security Organization, Malaysia database consisting of 10,049 RTW program participants in 2010-2014. The dependent variable was the RTW outcome which consisted of RTW with same employer, RTW with new employer or unsuccessful return. Multinomial logistic regression was performed to test the likelihood of successful return with same employer and new employer against unsuccessful return. Results: Overall, 65.3% of injured workers were successfully returned to employment, 52.8% to the same employer and 12.5% to new employer. Employer interest; motivation; age 30-49 years; intervention less than 9 months; occupational disease; injuries in the lower limbs, upper limbs, and general injuries; and working in the manufacturing, services, and electrical/electronics were associated with returning to work with the same employer against unsuccessful return. Male, employer interest, motivation, age 49 years or younger, intervention less than 6 months, occupational disease, injuries in the upper limbs and services sector of employment were associated with returning to new employer against unsuccessful return. Conclusion: There is a need to strengthen employer commitment for early and intensified intervention that will lead to improvement in the RTW outcome.

Study on Selftest Requirements in Cryptographic Module Validation Program with FIPS-OpenSSL Source Code Analysis (FIPS-OpenSSL 코드 분석을 통한 암호모듈 자가시험 보안요구사항 분석)

  • Seo, Seog Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.985-996
    • /
    • 2019
  • This paper analyzes the source code of FIPS-OpenSSL cryptographic module approved as FIPS cryptographic module in USA and shows how the selftest requirements are implemented as software cryptographic library with respect to pre-operational test and conditional tests. Even though FIPS-OpenSSL follows FIPS 140-2 standard, lots of security requirements are similar between FIPS 140-2 and Korean cryptographic module validation standards. Therefore, analysis from this paper contributes to help Korean cryptographic module vendors develop correct and secure selftest functions on their own cryptographic modules, which results in reducing the test period.

Challenges in nuclear energy adoption: Why nuclear energy newcomer countries put nuclear power programs on hold?

  • Philseo Kim;Hanna Yasmine;Man-Sung Yim;Sunil S. Chirayath
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1234-1243
    • /
    • 2024
  • The pressing need to mitigate greenhouse gas emissions has stimulated a renewed interest in nuclear energy worldwide. However, while numerous countries have shown interest in nuclear power over the course of history, many of them have not continued their pursuit and chosen to defer or abandon their peaceful nuclear power projects. Scrapping a national nuclear power program after making initial efforts implies significant challenges in such a course or a waste of national resources. Therefore, this study aims to identify the crucial factors that influence a country's decision to terminate or hold off its peaceful nuclear power programs. Our empirical analyses demonstrate that major nuclear accidents and leadership changes are significant factors that lead countries to terminate or defer their nuclear power programs. Additionally, we highlight that domestic politics (democracy), lack of military alliance with major nuclear suppliers, low electricity demand, and national energy security environments (energy import, crude oil price) can hamper a country's possibility of regaining interest in a nuclear power program after it has been scrapped, suspended, or deferred. The findings of this study have significant implications for policymakers and stakeholders in the energy sector as they strive to balance the competing demands of energy security, and environmental sustainability.

Analysis of Security Weakness on Secure Deduplication Schemes in Cloud Storage (클라우드 스토리지에서 안전한 중복 제거 기법들에 대한 보안 취약점 분석)

  • Park, Ji Sun;Shin, Sang Uk
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.909-916
    • /
    • 2018
  • Cloud storage services have many advantages. As a result, the amount of data stored in the storage of the cloud service provider is increasing rapidly. This increase in demand forces cloud storage providers to apply deduplication technology for efficient use of storages. However, deduplication technology has inherent security and privacy concerns. Several schemes have been proposed to solve these problems, but there are still some vulnerabilities to well-known attacks on deduplication techniques. In this paper, we examine some of the existing schemes and analyze their security weaknesses.

Food Security and Nutrition Information and Knowledge Management in Case of Cambodia

  • Vong, Sokha
    • Agribusiness and Information Management
    • /
    • v.2 no.1
    • /
    • pp.117-128
    • /
    • 2010
  • Coordination has been identified as a concern in the cross-cutting issues of food security and nutrition (FSN) in Cambodia. Food Security and Nutrition Information System (FSNIS) in Cambodia is the only "entry portal" to support policy formulation and decision-making with regard to FSN. While this knowledge and information management system has earned a respectful reputation, Council for Agricultural and Rural Development (CARD) faces many challenges in the implementation of the system. This paper will present how FSNIS has been developed and impacts on policy or strategy related to FSN. In addition, sustainability of the system is a key challenge for FSNIS; yet it is interesting to see how it works. Along with a success story, FSNIS is recognized by its stakeholders as the most successful knowledge and information management system in the field of FSN in Cambodia.

  • PDF

The Security Policy for Big data of US Government (미정부의 빅데이터를 위한 보안정책)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.403-409
    • /
    • 2013
  • This paper review about big data policy and security issue of US government. It is introduced Big data R&D initiative strategy and plan, NITRD program, and big data strategy of government. It is presented operation environment of big data in US government, big data information for military operation, major research organization and topic, security guideline and so on.

Development of an Industrial Control System Information Security Management System Program (산업제어시스템 정보보안 관리체계 프로그램 개발)

  • Chun, Se-In;Joo, Soyoung;Kim, Min-Ju;Baek, Ji-Yeon;Shin, Jaeun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.397-400
    • /
    • 2019
  • 주요기반시설 산업제어시스템의 운영환경 변화에 따라 보안 위협의 양상이 다양해지고 있다. 따라서 이를 반영한 보안 관리체계가 새로이 요구된다. 이에 본 논문은 미국 을 참조한 산업제어시스템의 정보보안 관리체계 프로그램을 제안한다. 프로그램의 기능은 다음과 같다. 첫째, 산업제어시스템 자산 관리 기능, 둘째, 보안상태 평가 기능, 셋째, 보안조치 관리 기능이다. 해당 프로그램을 통해 국내 산업제어시스템의 보안 수준 향상을 기대한다.