• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.033 seconds

Personal Information Protection by Privacy Impact Assessment in Information System Audit (정보시스템 감리에서 개인정보 영향평가를 통한 개인정보 보호)

  • Kim, Hee-Wan;Ryu, Jae-Sung;Kim, Dong-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.3
    • /
    • pp.84-99
    • /
    • 2011
  • As the integrated and large-scale information is extended due to an advanced information system, a possibility of leaking out privacy increases as the time passes by. As a result, the necessity of using a privacy impact assessment (PIA) is emphasized because it can analyze and minimize the element of invasion of privacy. However, an essential audit for personal information protection is not fulfilled because most of the information system audit supervises over physical, managerial, and technical security items of system architecture area so that general items are the only things being checked. Consequently, this paper proposes that in order to minimize the invasion of personal information, the privacy impact assessment should be done. It also presents a procedure and method of personal information protection audit according to the result of the assessment. After applying the suggested method to two projects, it was confirmed that the improvements for protecting personal information were drawn from this paper.

A Study on Solution of Impeachment Evidence in Criminal Proceedings for Employ by the Convergence (소송절차상 탄핵증거사용 문제에 있어서 융합적 해결에 대한 소고)

  • Lee, Chan-Yeub
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.5
    • /
    • pp.207-217
    • /
    • 2015
  • A Study on Problem of Impeachment Evidence in Criminal Proceedings for Employ by the Convergence Meaning of impeachment evidence in criminal proceedings is liking the spread of the branches moment. The first, there is to set limits of impeachment evidence. The amicable solution is to accept moving flexibly. In a concrete way must to make away with a constituent element unlawfulness. The second, problem a return to probative force exist. This problem agree in principle to resolve an issue for the testimony of an eyewitness. The third, how to admit that institution of criminal investigation after the testimony of an eyewitness exist. This attendant conditions are to eliminate illegality for the authenticity in he testimony of an eyewitness and for the observe due process. Therefore, we must observe due process without illegality to solve the problem for the convergence.

A Study on Standardization of Copyright Collective Management for Digital Contents (디지털콘덴츠 집중관리를 위한 표준화에 관한 연구)

  • 조윤희;황도열
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.301-320
    • /
    • 2003
  • The rapidly increasing use of the Internet and advancement of the communication network, the explosive growth of digital contents from personal home pages to professional information service the emerging file exchange service and the development of hacking techniques . these are some of the trends contributing to the spread of illegal reproduction and distribution of digital contents, thus threatening the exclusive copyrights of the creative works that should be legally protected Accordingly, there is urgent need for a digital copyright management system designed to provide centralized management while playing the role of bridge between the copyright owners and users for smooth trading of the rights to digital contents, reliable billing, security measures, and monitoring of illegal use. Therefore, in this study, I examined the requirements of laws and systems for the introduction of the centralized management system to support smooth distribution of digital contents, and also researched on the current status of domestic and international centralized management system for copyrights. Furthermore, 1 tried to provide basic materials for the standardization of digital contents copyright management information through the examination of the essential elements of the centralized digital contents management such as the system for unique identification the standardization for data elements, and the digital rights management (DHM) .

Analysis and Measurement on the Evaluation of the Information Technology (정보기술(IT)의 가치평가분석 및 측정에 관한 연구 - 특허기술을 중심으로 -)

  • Kim, Seung-Hwan;Kim, Bok-Su;Lee, Joo-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.5
    • /
    • pp.106-116
    • /
    • 2008
  • 21 century is as time of infinite competition the knowledge base society where the creation knowledge and information become source of competitive power (Knowledge-based society) and the world-wide various nations leads and knowledge intensification of voice and existing industry of knowledge industry leadership grasp of competitive power high position security and world economy it concentrates a hazard national ability from new economic environment inside. Also, world economy the economic border collapsed with opening anger liberalization and the integration of world economy was accelerated and the restraint of advanced nation, pursuit of the late start developing country and competition from the enterprise for strategy helping each other back international market more were aggravating and information and knowledge with production element or the goods were wide in the economic whole and information knowledge revolution which circulates was developed and it followed hereupon and with the vitality where the knowledge base industry growth is new it rose to the surface.

  • PDF

Dictionary Attack on Huang-Wei's Key Exchange and Authentication Scheme (Huang-Wei의 키 교환 및 인증 방식에 대한 사전공격)

  • Kim, Mi-Jin;Nam, Jung-Hyun;Won, Dong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.83-88
    • /
    • 2008
  • Session initiation protocol (SIP) is an application-layer prolocol to initiate and control multimedia client session. When client ask to use a SIP service, they need to be authenticated in order to get service from the server. Authentication in a SIP application is the process in which a client agent present credentials to another SIP element to establish a session or be granted access to the network service. In 2005, Yang et al. proposed a key exchange and authentication scheme for use in SIP applications, which is based on the Diffie-Hellman protocol. But, Yang et al.'s scheme is not suitable for the hardware-limited client and severs, since it requires the protocol participant to perform significant amount of computations (i.e., four modular exponentiations). Based on this observation. Huang and Wei have recently proposed a new efficient key exchange and authentication scheme thor improves on Yang et al.'s scheme. As for security, Huang and Wei claimed, among others, that their scheme is resistant to offline dictionary attacks. However, the claim turned out to be untrue. In this paper, we show thor Huang and Wei's key exchange and authentication scheme is vulnerable to on offline dictionary attack and forward secrecy.

  • PDF

A Suggestions for Building Regulation through the Analysis of Problems among the Building Evacuation Laws (건축물 피난규정간 문제점 분석을 통한 법령 개선방향 설정에 관한 연구)

  • Hwang, Eun-Kyoung;Kim, Dae-Hee;Cho, Jeong-Hoon;Hwang, Keum-Sook
    • Fire Science and Engineering
    • /
    • v.21 no.4
    • /
    • pp.105-114
    • /
    • 2007
  • Recently the consideration for occupants' security has been raised as very important design element from the fire by building's large sized, higher storied, and its compounded. But the domestic Laws regulated the predicative laws according to the technical standard which has no difference from the past domestic evacuation regulations. Therefore when big fire occurs, it is not enough to guarantee for occupants to escape safely. Specially since domestic escape relevant laws are divided into Architect relevant law and fire fighting relevant law, it has caused to bring various problems. So This study will show the problems of the evacuation regulation which is registrated in the Architect relevant law and fire fighting relevant law. And also later, when Architect escape relevant laws re-registrate, this study will be used as foundational materials.

A Study on the Awareness of the Middle Aged for the Digital home System and Well-being Apartment Design Elements (디지털홈 시스템과 웰빙아파트 계획요소에 대한 중년층 의식 연구)

  • Cho, Sung-Heui;Lee, Tae-Kyung
    • Journal of the Korean housing association
    • /
    • v.18 no.2
    • /
    • pp.93-103
    • /
    • 2007
  • This study examined the awareness of the middle aged about the digital home system and well-being apartment design elements in order to suggest the design guidelines for planning of the elderly housing environment. By literature review, the concept and characteristics of the digital home system and well-being Apartment design elements were summarized the degree of satisfaction and preference of middle aged for these characteristics were investigated and analyzed. For this study, a questionnaire survey of 156 housewives living in apartment complex of Busan was carried out. The results of this study are as follows: The middle aged were generally short of recognition for digital skill and service, and also they showed positive evaluations to a few useful items of digital home system. These items belong under safety security system and interior environment control system and provided for convenient & comfortable life. Accordingly, satisfied digital home system can apply basic design element for housing for elderly. Whereas, the middle-aged were not satisfied with housework help system and cultural life system because items of these systems were not various and complicate to us. So, for the improvement of not satisfied digital home system, we needed development of digital contents and marketing & management for high accessibility and easy useability. The middle aged will concern about health & environment friendly continuously and become to stay long in their housing as the characteristics of elderly. So, It is necessary to be considered well-being apartment design elements of health & environment friendly very actively and lastingly in elderly housing environment design. Also, the awareness of middle aged for digital home system and well-being apartment design elements varied according to the background characteristics. This suggests housing environment for elderly life is considered differently as various background characteristics of middle aged.

A Study on the Necessity of Limitation for Legal Liability in Marine Accidents (해양사고에 있어서 책임귀속의 제한 필요성에 관한 연구)

  • Ji, Sang-Won
    • Journal of Navigation and Port Research
    • /
    • v.34 no.3
    • /
    • pp.251-255
    • /
    • 2010
  • A marine accident is caused various legal liability such as compensation for damages on civil law, responsibility on the Criminal Code and administrative sanctions. The results occurred by any acts is not connected directly to the legal responsibility. As a prior condition for these legal liabilities, it is required the causation between the act caused and the occurrence of the effect. It is very difficult to find out the cause in marine accidents, because of trouble of a proof security, the place occurred, time difference between accident and investigation point of time etc.. However, finding out the correct cause is an element important to prevent similar accident and to determine the liability reverted. The logical concept of the causation is not limited, but there is early necessity to limit it in the liability reverted. Therefore, this study aims to suggest reasonable standard to determine liability reverted in marine accidents.

Seismic response control of transmission tower-line system using SMA-based TMD

  • Tian, Li;Zhou, Mengyao;Qiu, Canxing;Pan, Haiyang;Rong, Kunjie
    • Structural Engineering and Mechanics
    • /
    • v.74 no.1
    • /
    • pp.129-143
    • /
    • 2020
  • This study proposes a new shape memory alloy-tuned mass damper (SMA-TMD) and investigates the effectiveness of this damper in reducing and controlling the vibrations of a transmission tower-line system under various seismic excitations. Based on a practical transmission line system and considering the geometric nonlinearity of this system, the finite element (FE) software ANSYS is used to create an FE model of the transmission tower-line system and simulate the proposed SMA-TMD. Additionally, the parameters of the SMA springs are optimized. The effectiveness of a conventional TMD and the proposed SMA-TMD in reducing and controlling the vibrations of the transmission tower-line system under seismic excitations is investigated. Moreover, the effects of the ground motion intensity and frequency ratio on the reduction ratio (η) of the SMA-TMD are studied. The vibration reduction effect of the SMA-TMD under various seismic excitations is superior to that of the conventional TMD. Changes in the ground motion intensity and frequency ratio have a significant impact on the η of the SMA-TMD. As the ground motion intensity and frequency ratio increase, the η values of the SMA-TMD first increase and then decrease. Studying the vibration reduction effects of the SMA-TMD can provide a reference for the practical engineering application of this damper.

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.117-126
    • /
    • 2007
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBs. Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch, BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these Paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF