• Title/Summary/Keyword: Security Service Model

Search Result 753, Processing Time 0.019 seconds

Convergence Plan of IT Social Safety and SIB by Expanding Sharing Information Data (공유정보 데이터 확대로 인한 IT와 SIB의 사회인식)

  • Seo, DaeSung;Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.97-105
    • /
    • 2022
  • This study deals with the credibility of citizens when investing in uncertain project companies, as well as the Social Performance Compensation Project (SIB) and the IT sharing economy. This allows the convergence of the three sectors to address investment inequalities in economic effectiveness and social security. Activates the model of the overall Social Impact Bond (SIB) process that successfully activates the exchange of information. The empirical presentation of the operations and techniques for social IT service finance examines how the innovation ecosystem can be created with social performance and reward projects. The analysis shows that small sharing institutions or citizens can participate directly to create the ability to connect with private investors, identify the possibility of recognizing non-shared barriers to participation, and show the great impact of citizen trust in IT sharing projects in uncertain areas. As a result, for the sake of social sharing and IT cooperation promoted by the City of Seoul, before the project has the ability to design directly, it will be responsible for reliability and safety in the planning of the project. Therefore, non-shared citizens can also participate in the platform that has been effectively constructed and created.

College-bound Curriculum Developement for Training of Atomic Industry Technician (원자력산업 중견전문인력 양성을 위한 전문대학 교육과정 개발)

  • Lyu, Kwang-Yeul;Kim, Sung-Soo;Ahn, Sung-Min
    • Journal of radiological science and technology
    • /
    • v.28 no.1
    • /
    • pp.33-44
    • /
    • 2005
  • The objective of this study is to supply the good quality of experts the radiation industries in Korea and develop the major subject matter needed in the radiation industries and the curriculum in order to execute it for the variation of fields of employment at the department of radiation in the junior college and the development of the percentage of employment. In addition, this study is to improve the level of radiation experts engaged in the industries in quality, and it is to improve the social recognition of radiation rather negative now because of the development of radiation industry. As for the core results of this research, it was to suggest the detailed choice method curriculum proper to the service fields of radiation industries, but it may be subject to change due to each college's property and the educational objectives. From the result of this research above, it may be summed up as follows. First, as for the detailed curriculum by the service field, this study was to organize two subject matters: 1. the subject matter proper to the field of using the radiation, and 2. the subject matters proper to the safety control field of radiation. Second, as for the detailed curriculum by the pattern of industries, this study was to organize the four subject matters: 1. the subject matter needed in the manufactures, 2. the subject matter needed in the nondestructive testing industries, 3. the subject matter needed in the sales agencies, and 4. the subject matter needed in the laboratories. This study was to suggest the operational model about the curriculum in order to execute these subject matters. It could be executed as two methods below. First, one method is to execute the major systems by the medical field and industrial field in the third course at the department of radiation in the junior college now. Second, the other method is to make them specialize the industrial radiation in the Advanced Course(one year course) after the graduation of junior college. To operate these curricula successively it needs to assume the deeper research and the development of materials about the subject matters related to the nuclear radiation industries hereafter. In addition, it needs to solve the security of finance like the manpower of professor, space for practice, and the educational appliances, etc. needed in the operation of subject matters. Finally, the effect and result from the development or revision of college curriculum did not come out in a short time. It will require considerable time until the undergraduates at the department in the junior college finish a set of curriculum newly developed, and graduate the university, and can get the results while they engage in their works in the industrial sites. Accordingly, all the interested parties have to anticipate the results of this research with the patience in long-standing point of view. Also, this researcher considers it as it is willing to give them the continuous interest and support.

  • PDF

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.