• Title/Summary/Keyword: Security Target

Search Result 702, Processing Time 0.025 seconds

A study on Special guards that interpersonal skills to communicate your organization's job satisfaction and job commitment through the effect parameter impact (특수경비원이 지각한 조직 내 의사소통이 대인관계 능력의 매개효과를 통한 직무만족과 직무몰입에 미치는 영향)

  • Yang, Mun-Seung;Oh, Sei-Youen;Yun, Gyeong-Hui
    • Korean Security Journal
    • /
    • no.45
    • /
    • pp.87-106
    • /
    • 2015
  • In this study, the special guard duties and duties within the Organization of communication influence on immersed in the interpersonal skills to discover the effects of the parameters of the educational facilities in the airport traffic facilities, and anything that increases the special guards, September 20-target 2015 2015 October 20 poll. The study compared the results of analysis are as follows. Analyze the effect of model parameter, interpersonal skills are also satisfied with the saturated model, duties (duty immersion) interpersonal skills for the parameters of the effect analysis when you look at the results, the higher the level of communication and interpersonal relationships and job satisfaction, but also high level of (job immersive) interpersonal communication in interpersonal relationships, higher levels are high. SMC, job satisfaction, job commitment 23.9% 7.2%, 19.3% of interpersonal relationships. In addition, the duties of immersive interpersonal skills for the parameters of the effect the results of the analysis of communication and its impact on job satisfaction (duty of immersion) in interpersonal work parameters can verify that it exists. Communication on direct interpersonal relationships, keep in mind that the statistical effect also appeared. If you look at the overall results of this study, special communication organization of job satisfaction and security guard job influence on interpersonal skills immersed the parameters of the effect.

  • PDF

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

Effect of Cognitive-Bias (Anchoring Bias) to N. Korea on Reunification Perception (북한에 대한 인지편향(기준점편향) 이 통일인식에 미치는 영향)

  • Han, Seung Jo;Bae, Young Min
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.201-208
    • /
    • 2021
  • The purpose of this study is to investigate reunification perception among groups with different cognitive bias(anchoring bias) through empirical studies. This study assumes that cognitive bias occurs according to the content of N. Korea provided in school education, and that the cognitive bias formed in youth creates a difference in perception of N. Korea and reunification. For empirical study, a survey of reunification awareness conducted by the Institute for Peace an Unification Studies-Seoul National University was used, and the two groups are divided into A-group that chose "anti-communism or security" and B-group that did "reunification interests, multi-culturalism and understanding North Korea" according to N. Korea content which was encountered in school education during adolescence. A-group recognized N. Korea as a hostile target even after becoming an adult, while B-group regarded N. Korea as a one of dialogue and cooperation. This analysis illustrates the existence of cognitive bias between the two groups because of N. Korea content which was given in school education. A-group had a lower percentage than B-group in terms of the benefits of reunification to S. Korea and the need for more dialogue and compromise with N. Korea. However, there was no difference between two groups in terms of acceptance of N. Korean defectors. This research result could be a reference to the direction of school education policies relating to reunification in that early school education affects reunification awareness and perception related with N. Korea even in adulthood.

Enhanced and Practical Alignment Method for Differential Power Analysis (차분 전력 분석 공격을 위한 향상되고 실제적인 신호 정렬 방법)

  • Park, Jea-Hoon;Moon, Sang-Jae;Ha, Jae-Cheol;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.93-101
    • /
    • 2008
  • Side channel attacks are well known as one of the most powerful physical attacks against low-power cryptographic devices and do not take into account of the target's theoretical security. As an important succeeding factor in side channel attacks (specifically in DPAs), exact time-axis alignment methods are used to overcome misalignments caused by trigger jittering, noise and even some countermeasures intentionally applied to defend against side channel attacks such as random clock generation. However, the currently existing alignment methods consider only on the position of signals on time-axis, which is ineffective for certain countermeasures based on time-axis misalignments. This paper proposes a new signal alignment method based on interpolation and decimation techniques. Our proposal can align the size as well as the signals' position on time-axis. The validity of our proposed method is then evaluated experimentally with a smart card chip, and the results demonstrated that the proposed method is more efficient than the existing alignment methods.

Research on illegal copyright distributor tracking and profiling technology (불법저작물 유포자 행위분석 프로파일링 기술 연구)

  • Kim, Jin-gang;Hwang, Chan-woong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.75-83
    • /
    • 2021
  • With the development of the IT industry and the increase of cultural activities, the demand for works increases, and they can be used easily and conveniently in an online environment. Accordingly, copyright infringement is seriously occurring due to the ease of copying and distribution of works. Some special types of Online Service Providers (OSP) use filtering-based technology to protect copyrights, but they can easily bypass them, and there are limits to blocking all illegal works, making it increasingly difficult to protect copyrights. Recently, most of the distributors of illegal works are a certain minority, and profits are obtained by distributing illegal works through many OSP and majority ID. In this paper, we propose a profiling technique for heavy uploader, which is a major analysis target based on illegal works. Creates a feature containing information on overall illegal works and identifies major heavy uploader. Among these, clustering technology is used to identify heavy uploader that are presumed to be the same person. In addition, heavy uploaders with high priority can be analyzed through illegal work Distributor tracking and behavior analysis. In the future, it is expected that copyright damage will be minimized by identifying and blocking heavy uploader that distribute a large amount of illegal works.

Recharge Potential Assessment of Artificial Recharge System for Agricultural Drought Adaptation (농업가뭄대응을 위한 인공함양 시스템의 함양능력 평가)

  • Lee, Jae Young;Kim, Gyoo Bum
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.1
    • /
    • pp.61-72
    • /
    • 2021
  • There is an increasing need for water supply plan using sustainable groundwater to resolve water shortage problem caused by drought due to climate change and artificial aquifer recharge has recently emerged as an alternative. This study deals with recharge potential assessment for artificial recharge system and quantitative assessment for securing stable water and efficient agricultural water supply adapt to drought finding optimal operating condition by numerical modeling to reflect recharge scenarios considering climate condition, target water intake, injection rate, and injection duration. In order to assess recharge potential of injection well, numerical simulation was performed to predict groundwater level changes in injection and observation well respect to injection scenarios (Case 1~4) for a given total injection rate (10,000 m3). The results indicate that groundwater levels for each case are maintained for 25~42 days and optimal injection rate is 50 m3/day for Case 3 resulted in groundwater level rise less than 1 m below surface. The results also show that influential area of groundwater level rise due to injection was estimated at 113.5 m and groundwater storage and elapsed time were respectively increased by 6 times and 4 times after installation of low permeable barrier. The proposed assessment method can be contributed to sustainable agricultural water supply and stable water security for drought adaptation.

A study on Korean welfare policy examined through Mokminsimseo (목민심서를 통해 한국적 복지정책에 대한 연구)

  • kim Bong wha
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.669-674
    • /
    • 2023
  • This study examined the specific contents of social welfare policies of the Joseon Dynasty through the analysis of Mokminsimseo, Aemin Sixjo and Jinhwang Yukjo, and identified the connection between them and today's social welfare policies. As a result, In the Care of the People, it contained the basic contents of the Elderly Welfare Act and welfare services for the elderly, and in the Freedom, it included welfare policy services related to infants and children, and the value system of welfare for the disabled through government affairs. The policy direction was confirmed, and it was found that disaster relief calls for social integration in response to social crises and disasters. This also confirmed that major areas of social welfare policy such as family safety, income security, health policy, and social integration have been emphasized through social welfare policy indicators. In addition, through the analysis of Qinhwangyukjo, it was found that it contains not only the basic ideology and values of the social security system and social insurance system in terms of visa, scale, and power, but also the details of specific policy implementation. Today's social welfare policies and social service policies, which are equipped with social welfare facilities and are implementing systematic social welfare services for each target, were able to confirm their foundation through the Qinhwangyukjo. This confirms that the emphasis on social integration and income security is prominent in the Qinhwangyukjo through the social welfare policy indicators of the current policy system.

Feeding the extra billions: strategies to improve crops and enhance future food security

  • Stamm, Petra;Ramamoorthy, Rengasamy;Kumar, Prakash P.
    • Plant Biotechnology Reports
    • /
    • v.5 no.2
    • /
    • pp.107-120
    • /
    • 2011
  • The ability to feed an expanding world population poses one of the greatest challenges to mankind in the future. Accompanying the increased demand for food by the expected nine billion inhabitants of Earth in 2050 will be a continual decrease in arable land area, together with a decline in crop yield due to a variety of stresses. For these formidable challenges to be met, future crops should not only by high-yielding, but also stress-tolerant and disease-resistant. In this review, we highlight the importance of genetic engineering as an indispensable tool to generate just such future crops. We briefly discuss strategies and available tools for biotechnological crop improvement and identify selected examples of candidate genes that may be manipulated so that current biological maxima in yield may be surpassed by comfortable margins. Future prospects and the necessity for basic research aimed at identifying novel target genes are also discussed.

Detection And Countermeasure Scheme For Call-Disruption Attacks On SIP-Based Voip Services

  • Ryu, Jea-Tek;Roh, Byeong-Hee;Ryu, Ki-Yeol;Yoon, Myung-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1854-1873
    • /
    • 2012
  • Owing to its simplicity and flexibility, the session initiation protocol (SIP) has been widely adopted as a major session-management protocol for Internet telephony or Voice-over IP (VoIP) services. However, SIP has faced various types of security threats. Call-disruption attacks are some of the most severe threats they face, and can greatly inconvenience consumers. In this paper, we analyze such SIP call-disruption attacks, and propose a method for detecting and counteracting them by extending the SIP INFO method with authentication. Using the proposed method, both the target user and the SIP server can detect the existence of a call-disruption attack on a user and counteract the attack. We demonstrate the effectiveness of the proposed method from the viewpoint of computational complexity by configuring a test-bed with an Asterisk SIP proxy server and an SIP performance (SIPp) emulator.

A Study on the Korean CALS Conception and Introduction Policy Trend (한국적CALS의 개념 정립과 도입정책방향에 대한 연구)

  • 김철환;김부국;임영석
    • The Journal of Society for e-Business Studies
    • /
    • v.1 no.1
    • /
    • pp.5-26
    • /
    • 1996
  • This paper aims to present a prospective trend to establish a proper CALS conception and an efficient CALS environment in Korea.. It is crucial at this point for Korea to develop a comprehensive CALS conception which considers our present economic and social situation, national security, and our national emotion. Korean CALS has been developed and led mainly by the government and private industry. It is now necessary to improve CALS conception in Korea by making CALS standard more interchangeable among international as well as domestic business fields through EDI and the automation of the industries along with the government. In this regard, this paper proposes three potential methods to accomplish this goal and discuss each of them in detail. First, we suggest to establish a proper CALS introduction policy on the government level. We propose an introduction policy with three phases such as introduction, spreading and target which will cover through the year 1996 to 2007. Second. we suggest to establish a proper CALS standardization policy by improving the acquisition of digital data and process, and modernizing infrastructure. Third, we suggest that the government should amend and enforce the necessary laws and acts for more efficient CALS implementation in Korea. Government should arrange for these acts to be applied not optionally but obligatorily to Korean enterprises so that they survive the harsh and competitive world market in the upcoming 21th century.

  • PDF