• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.033 seconds

A Study on Design Medical Tourism Strategy and Business Service Model (의료관광 전략 수립 및 비즈니스 서비스 모델 설계에 관한 연구)

  • Chang, Sae Kyung;Baek, Jong Sun
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.3
    • /
    • pp.43-55
    • /
    • 2017
  • The market for medical tourism services in the world is steadily increasing and the medical tourism market in the South Korea is also showing high growth. However, they have also problem such as informal various information and services, irregularity price competition etc. In order to solve this problem, We have designed a medical tourism service model based on ICT specific on domestic medical ecosystem. First, analysis trends of domestic and overseas medical ecosystem and identify current problem of medical tourism. In order to solve existed problem we also have designed a medical tourism strategy. Based on the strategy, we have designed business service model based on ICT platform for as fit as Korea medical tourism status. The proposed medical tourism business service model can provide usability to customer and also can solve current medical tourism problem. We expect industrial effect and contribution to the activation.

Design and Evaluation of a Weighted Intrusion Detection Method for VANETs (VANETs을 위한 가중치 기반 침입탐지 방법의 설계 및 평가)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.181-188
    • /
    • 2011
  • With the rapid proliferation of wireless networks and mobile computing applications, the landscape of the network security has greatly changed recently. Especially, Vehicular Ad Hoc Networks maintaining network topology with vehicle nodes of high mobility are self-organizing Peer-to-Peer networks that typically have short-lasting and unstable communication links. VANETs are formed with neither fixed infrastructure, centralized administration, nor dedicated routing equipment, and vehicle nodes are moving, joining and leaving the network with very high speed over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connection without centralized control. In this paper, we propose a weighted intrusion detection method using rough set that can identify malicious behavior of vehicle node's activity and detect intrusions efficiently in VANETs. The performance of the proposed scheme is evaluated by a simulation study in terms of intrusion detection rate and false alarm rate for the threshold of deviation number ${\epsilon}$.

A Realtime Traffic Shaping Method for VPN Tunneling on Smart Gateway Supporting IoT (사물인터넷지원 스마트게이트웨이의 VPN 터널링 실시간 속도제어 방법)

  • Yang, Seungeui;Kang, Inshik;Goh, Byungoh;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1121-1126
    • /
    • 2017
  • Recently, the importance of smart gateways that link these with the big data and the development of the Internet of things is getting bigger. The smart gateway includes a network function such as a router and a router, and a sensor network function that links various objects such as a sensor. As the internet market has expanded, network stability and security problems have arisen and VPN technology has been proposed as one of the ways to solve these security problems. Efficient design is needed to implement VPN in low-end smart gateway and SOHO-level Internet environment with poor line quality. In this paper, we propose the concept and principle of VPN tunneling implementation and real - time traffic shaping method according to internet line condition in the Smart Gateway that supports IOT developed based on OpenWRT, the implementation and measured performance indicators are presented.

Cause and Countermeasures on the Korean Peninsula Earthquake (한반도 지진에 대한 원인 및 대처방안)

  • Yang, Won-Jik;Heo, Dae-Wook
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.2
    • /
    • pp.9-13
    • /
    • 2016
  • The recent earthquakes in the peninsula've called safe areas prone to earthquakes occurred the unprecedented human and material damage. It does not have the seismic design of buildings for less than three layers, with the exception of some experts and organizations, and it does not have to read about the seriousness and evacuation tips for earthquake damage is thought to have been weighted. As mentioned above, most people are unaware of the evacuation tips or saengjonbeop, emergency supplies, such as earthquakes compared to a situation without the various needs education. So we were prepared for an earthquake is now managing investigate the cause and correct entities for the earthquake is considered as the time to prepare and formulate a policy. In this study, we investigated the cause to frequent earthquakes with respect to the Korean Peninsula and to organize for our government and local governments, NGOs, the media and individuals on how to proceed.

Design and Implementation of Verification System for Malicious URL and Modified APK File on Cloud Platform (클라우드 플랫폼을 이용한 악성 URL 및 수정된 APK 파일 검증 시스템 설계 및 구현)

  • Je, Seolah;Nguyen, Vu Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.921-928
    • /
    • 2016
  • Over the past few years, Smishing attacks such as malicious url and malicious application have been emerged as a major problem in South Korea since it caused big problems such as leakage of personal information and financial loss. Users are susceptible to Smishing attacks due to the fact that text message may contain curios content. Because of that reason, user could follow the url, download and install malicious APK file without any doubt or verification process. However currently Anti-Smishing App that adopted post-processing method is difficult to respond quickly. Users need a system that can determine whether the modification of the APK file and malicious url in real time because the Smishing can cause financial damage. This paper present the cloud-based system for verifying malicious url and malicious APK file in user device to prevent secondary damage such as smishing attacks and privacy information leakage.

Design of Miniaturized Microwave Amplifier Using Capacitively-Coupled Match Circuit(CCMC) under Conditionally Stable State (조건 안정 상태에서의 용량성 결합 정합 회로를 이용한 소형 마이크로파 증폭기 설계에 관한 연구)

  • Ryu, Seung-Kab;Hwang, In-Ho;Kim, Yong-Hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.10 s.113
    • /
    • pp.929-934
    • /
    • 2006
  • In the paper, we suggest a simpler synthesis technique for capacitively-coupled match circuit(CCMC) which have a function of DC block and impedance matching simultaneously, and introduce a stability margin analysis technique for designing microwave amplifier under conditionally stable state. Stability margin analysis is used to determine optimum match point that ensure maximum gain under the given stability margin. It can reduce time consuming work for selecting match points in the conditionally stable state. Also, suggested miniaturization scheme of matching network is distinguished from previous work with respect to reducing deterministic parameters for CCMC synthesis. To verify utility of suggested method, 24 GHz gain block is fabricated under conditionally stable state using an internal thin-film fabrication process, Measured results show a stable gain of 10 dB and flatness of 1 dB, which is well coincident with simulated one.

Design and Implementation of Permission Delegation in Role-Based Access Control Model (권한의 위임을 위한 역할-기반 접근 제어 모델의 설계 및 구현)

  • 나상엽
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.1-10
    • /
    • 2003
  • In the distributed-computing environment, applications or users have to share resources and communicate with each other in order to perform their jobs more efficiently. In this case, it is important to keep resources and information integrity from the unexpected use by the unauthorized user. Therefore, there is a steady increase in need for a reasonable way to authentication and access control of distributed-shared resources. In RBAC, there are role hierarchies in which a higher case role can perform permissions of a lower case role. No vise versa. Actually, however, it is necessary for a lower case role to perform a higher case role's permission, which is not allowed to a lower case role basically. In this paper, we will propose a permission delegation method, which is a permission delegation server, and a permission delegation protocols with the secret key system. As the result of a permission delegation, junior roles can perform senior role's permissions or senior role itself on the exceptional condition in a dedicated interval.

  • PDF

An EPG Configuration Constructing Method and Structure for Dynamically Implementing Viewer Chosen EPG Configurations (시청자 선택 기반의 EPG 형상의 동적 구현을 위한 EPG형상 제작 방법과 구조)

  • Ko, Kwang-Il
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.51-58
    • /
    • 2011
  • Due to the digital technology, the TV broadcasting platform is evolving to the digital-TV, which is supporting data broadcasting service. Although the data broadcasting services (i.e., games, wether information, stock trading service) provide rich entertainment to viewers, they make the operation manners of digital-TV so complex that some viewers feel difficulty in using their TV sets. Several researches have been performed to address the problem by improving the functions of EPG such as searching and reserving programs, applying gesture and voice recognition technologies to operating EPG, guiding the design of the EPG's user interface, and developing agents helping EPG to behave intelligently. A research, however, that tries to address the problem that viewers have different familiarities with IT services has not been performed yet. The paper tackles the problem by letting a viewer to choose an EPG configuration (among the several EPG configurations provided by a broadcasting network) and designing an EPG that implements an EPG configuration based on the choice.

A Study on Building a Well-organized, Open and Integrated Counter-terrorism System in South Korea (개방·통합형 한국 테러대응시스템 모델 구축 방안)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.213-240
    • /
    • 2014
  • How will South Korea design well-organized, open, and integrated counterterrorism system? Does this system work well in the emergent situation? These are very significant issues. It is likely that this system would give the solution. A legal basis needs to be established to have a well-organized, open, and integrated counterterrorism system. The core part of a well-organized, open, and integrated counterterrorism system is to minimize and eliminate damage caused by terror through preventiveness, preparation, action, and restoration. For having this system, they need to be divided into two section: an open one and an integration one. In this study, there will be a discussion on a new and appropriate counterterrorism system fit in South Korea a subordinate system: legal, organized, civil aspects need to be provided on the basis of an well-organized, open, and integrated counterterrorism system and an analysis on the current system of the States, England and the following implications.

  • PDF

Hacking Mail Profiling by Applying Case Based Reasoning (사례기반추론기법을 적용한 해킹메일 프로파일링)

  • Park, Hyong-Su;Kim, Huy-Kang;Kim, Eun-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.107-122
    • /
    • 2015
  • Many defensive mechanisms have been evolved as new attack methods are developed. However, APT attacks using e-mail are still hard to detect and prevent. Recently, many organizations in the government sector or private sector have been hacked by malicious e-mail based APT attacks. In this paper, first, we built hacking e-mail database based on the real e-mail data which were used in attacks on the Korean government organizations in recent years. Then, we extracted features from the hacking e-mails for profiling them. We design a case vector that can describe the specific characteristics of hacking e-mails well. Finally, based on case based reasoning, we made an algorithm for retrieving the most similar case from the hacking e-mail database when a new hacking e-mail is found. As a result, hacking e-mails have common characteristics in several features such as geo-location information, and these features can be used for classifying benign e-mails and malicious e-mails. Furthermore, this proposed case based reasoning algorithm can be useful for making a decision to analyze suspicious e-mails.