• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.028 seconds

A Study on the RAM Analysis for Effective Integrated Logistics Support(ILS) (효과적인 종합군수지원을 위한 RAM 분석 연구)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.67-74
    • /
    • 2016
  • The development of weapon systems that look only be introduced as a huge budget directly related to combat rea diness. If we develop the expensive equipment it will not be the same state or have to wait a lot of time in mainten ance facilities for maintenance, which will have a profound impact on the exercise Efficiency. In order to solve this problem, the operation and use state of the weapon system requires effort to successfully p erform the duties held by the defined and assigned, Further analysis should be conducted RAM in order to reduce m aintenance manpower and logistic support costs. The role of business is to increase the RAM system reliability by L ee to Fig system failure rate from the development and maintenance, and reduced life cycle costs. Therefore, the present study was to determine the RAM to perform analysis procedures and methods and limita tions of each element, such as to maximize the effectiveness of comprehensive logistics support and help to study to become an effective logistics support.

A Study of Logical Network Monitoring System Architecture for Research Group (응용연구 그룹별 논리 네트워크 모니터링 시스템 구조 연구)

  • Kang, Hyun-Joong;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.75-83
    • /
    • 2012
  • Recent science technology research network moves to establish logical private network among specific research groups such as high energy physics and climate, requiring to implement private network by group for each purpose. Up to now, national research networks such as KREONET service high capacity logical private networks. Therefore standardized configuration and management scheme is essential for the deployment of logical private network. In this study, we propose the core service element and protocols for the logical networks over Layer 2 networks. We also propose system architecture that make monitoring and management easier. After that we design and implement monitoring map for logical network based on scheme. For this purpose, we also propose the description system for logical research network to provide data such as operation information, formation information, performance information and failure information of network infrastructure resource.

Study on Improved Decryption Method of WeChat Messenger and Deleted Message Recovery Using SQLite Full Text Search Data (WeChat 메신저의 향상된 복호화 방안과 SQLite Full Text Search 데이터를 이용한 삭제된 메시지 복구에 관한 연구)

  • Hur, Uk;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.405-415
    • /
    • 2020
  • With the increase in smartphone user, mobile forensics has become an essential element in modern digital forensic investigation. Mobile messenger data is very important data in mobile forensics because it can acquire information such as user's life pattern and mental state. In order to analyze messenger data, a decryption technique of an encrypted messenger data is required. Since most messengers provide a message deleting function, a technique for recovering deleted messages is required. WeChat Messenger, a messenger used by about 1 billion people around the world, uses IMEI (International Mobile Equipment Identity) information to encrypt data and provides message deletion function. In this paper, we propose a data decryption method in the absence of IMEI information and propose a method for recovering deleted messages using FTS (Full Text Search) database created for full-text search function of SQLite database.

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

A Study on Application Methods of Drone Technology (드론기술 적용 방안 연구)

  • Kim, Hee-Wan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.601-608
    • /
    • 2017
  • In the fourth industrial revolution, drones are an important element to lead the industry by converging with information technology. Drones are developing various technologies by combining with communication / navigation / traffic management technology, control and detection / avoidance technology, sensor technology, SW and application technology. However, there are various problems in order to settle the drone technology. In this paper, it will be examined the problems of application of drones through application fields of drones, domestic and foreign cases, and core technologies of drones. The growth of the drone market requires improvement of laws and institutions. This paper proposed security vulnerability, privacy and safety problem in wireless communication, and present technical and management problems for drone service in the Korean environment in particular.

Are There Any Solutions for the Cybersecurity Education Gap in the Public Sector? (공공부문의 사이버보안 교육격차 해소를 위한 탐색적 연구)

  • Lee, Song-ha;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.973-985
    • /
    • 2021
  • South Korea has been guaranteed the efficiency and the convenience of administrative work based on long-term experience and well-established ICT infrastructure. Vice versa, South Korea is always exposed to various scale cyber-attacks. It is an important element of national competitiveness to secure cybersecurity resilience and response in the public sector. For this, the well-trained cybersecurity professionals' retention and support for their capacity development through retraining are critical. As the Special Act on Balanced National Development, most public agencies moved to provincial areas, but the provincial areas are not ready for this, thus the workforce can't get enough retaining courses. We study to analyze whether there is a gap in cybersecurity educational opportunities or needs in the public sector depending on regions, institution type, and personal traits. This paper aims to suggest solutions for the cybersecurity education gap in the public sector based on the empirical analysis results.

A Study on the Prediction of Power Demand for Electric Vehicles Using Exponential Smoothing Techniques (Exponential Smoothing기법을 이용한 전기자동차 전력 수요량 예측에 관한 연구)

  • Lee, Byung-Hyun;Jung, Se-Jin;Kim, Byung-Sik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.2
    • /
    • pp.35-42
    • /
    • 2021
  • In order to produce electric vehicle demand forecasting information, which is an important element of the plan to expand charging facilities for electric vehicles, a model for predicting electric vehicle demand was proposed using Exponential Smoothing. In order to establish input data for the model, the monthly power demand of cities and counties was applied as independent variables, monthly electric vehicle charging stations, monthly electric vehicle charging stations, and monthly electric vehicle registration data. To verify the accuracy of the electric vehicle power demand prediction model, we compare the results of the statistical methods Exponential Smoothing (ETS) and ARIMA models with error rates of 12% and 21%, confirming that the ETS presented in this paper is 9% more accurate as electric vehicle power demand prediction models. It is expected that it will be used in terms of operation and management from planning to install charging stations for electric vehicles using this model in the future.

Efficiency Improvement Using Two Balanced Subsets (두 개의 balanced subset을 이용한 효율성 개선)

  • Kim, HongTae
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.13-18
    • /
    • 2018
  • Efficiency is one of the most important factors in cryptographic systems. Cheon et al. proposed a new exponent form for speeding up the exponentiation operation in discrete logarithm based cryptosystems. It is called split exponent with the form $e_1+{\alpha}e_2$ for a fixed element ${\alpha}$ and two elements $e_1$, $e_2$ with low Hamming weight representations. They chose $e_1$, $e_2$ in two unbalanced subsets $S_1$, $S_2$ of $Z_p$, respectively. We achieve efficiency improvement making $S_1$, $S_2$ balanced subsets of $Z_p$. As a result, speedup for exponentiations on binary fields is 9.1% and speedup for scalar multiplications on Koblitz Curves is 12.1%.

  • PDF

The Study on the improvement plan for Military combat power by base of NCW against the future War (미래전쟁을 대비한 NCW기반 전투력 발전방안 연구)

  • Heo, Yeong Dae
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.153-161
    • /
    • 2017
  • The gain a decision by a prediction supposition future combat. Take a future combat by the method fighting of U.S. Army in the Irak war. A make combat progress is from real time information to precision bombing for a guided weapon by GPS, a intelligence satellite, a pilotless scout plane, real time simultaneous and unification combat power are the kernel element of gain a decision fighting power by network in the ground, sky, marine, universe, cyberspace. The NCW is in a sense network center war organic be connected by networking a factor of operation. Any where networking information collection, command and decision, blow system. The Study on the improvement plan for Military combat power by base of NCW abainst the future War. Construct an integrate intelligence network apply to future combat.

A Study on the Drift of Cybersecurity Law by Element Analysis of Political Gridlock (입법교착 요소로 분석한 사이버안보법 표류에 관한 연구)

  • Bang, Hyu;Kwon, Hun-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.801-816
    • /
    • 2021
  • This study analyzes the political and legislative progress that although basic acts to establish an integrated system of cybersecurity are steadily being proposed, they have not been passed as legislative deadlocks under the two major parties. It shall be analyzed through Korea's legislative system, including differences in contents and interests of the disposal act, the timing and cycle of election ect. The study analyzes why the basic cybersecurity law was previously scrapped and faced political gridlock situation by analyzing the differences in the contents and interests of the two major parties, and the timing and cycle of the proposed legislation.