• Title/Summary/Keyword: Security plan

Search Result 979, Processing Time 0.028 seconds

A Study on Treatment Way of a Malicious Code to injected in Windows System File (Windows 시스템 파일에 기생하는 악성코드의 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.255-262
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs. or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe. csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment way that experimented on at these papers and a plan to solve will become a researcher or the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

Design and Implementation of Virus Test Simulation using VMware (VMware를 이용한 바이러스 테스트 시뮬레이션 설계 및 구현)

  • 이중식;이종일;김홍윤;전완근
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.199-207
    • /
    • 2002
  • Comes in into recent times and there is on with a level where the attack against the computer virus and the hacking which stand is serious. The recently computer virus specific event knows is the substantial damage it will be able to occur from our life inside is a possibility of feeling. The virus which appears specially in 1999 year after seemed the change which is various, also the virus of the form which progresses appeared plentifully The part virus does it uses the password anger technique which relocates the cord of the oneself. Hereupon consequently the vaccine programs in older decode anger to do the password anger of the virus again are using emulation engine. The password anger technique which the like this virus is complicated and decode anger technique follow in type of O.S. and the type is various. It uses a multi emulation engine branch operation setup consequently from one system and to respect it will be able to use a multiple operation setup together it will use the VMware which is an application software which it does as a favor there is a possibility where it will plan 'Virus Test Simulation' and it will embody.

  • PDF

Study on Police Officer's Organizational Learning and Maximization Plan within Organization (경찰공무원의 조직학습과 조직내 극대화 방안에 관한 연구)

  • Park, Young-Jin;Cho, Cheol-Kyu;Kim, Pyong-Soo
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.15-24
    • /
    • 2014
  • This research aimed at investigating the relation between police officer's organizational learning and organizational effectiveness based on hypothetical model about the influence of police officer's organizational learning on organizational effectiveness. In order to achieve this purpose, the researcher selected 163 police officers as the test group, who are in active service at Gwangju District Police Agency from July 14~August 15, 2013. As the sampling method, the researcher used random sampling method and conducted a survey based on self-administrated method, and the finally analyzed data was analyzed through SPSS for Win Version 17.0 statistical program. The research results are as follows. First, it was comprehended that police officer's higher level of organizational learning influenced organizational commitment more, lower factor of organizational effectiveness, significantly. Second, it was analyzed that police officer's learning ability significantly influenced job satisfaction, lower factor of organizational effectiveness, besides organizational commitment.

A Study on the Implementation Method of Artificial Intelligence Shipboard Combat System (인공지능 함정전투체계 구현 방안에 관한 연구)

  • Kwon, Pan Gum;Jang, Kyoung Sun;Kim, Seung Woo;Kim, Jun Young;Yun, Won Hyuk;Rhee, Kye Jin
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.123-135
    • /
    • 2020
  • Since AlphaGo's Match in 2016, there has been a growing calls for artificial intelligence applications in various industries, and research related to it has been actively conducted. The same is true in the military field, and since there has been no weapon system with artificial intelligence so far, effort to implement it are posing a challenge. Meanwhile, AlphaGo Zero, which beat AlphaGo, showed that artificial intelligence's self-training data-based approach can lead to better results than the knowledge-based approach by humans. Taking this point into consideration, this paper proposes to apply Reinforcement Learning, which is the basis of AlphaGo Zero, to the Shipboard Combat System or Combat Management System. This is how an artificial intelligence application to the Shipboard Combat System or Combat Management System that allows the optimal tactical assist with a constant win rate to be recommended to the user, that is, the commanding officer and operation personnel. To this end, the definition of the combat performance of the system, the design plan for the Shipboard Combat System, the mapping with the real system, and the training system are presented to smoothly apply the current operations.

De-identification Policy Comparison and Activation Plan for Big Data Industry (비식별화 정책 비교 및 빅데이터 산업 활성화 방안)

  • Lee, So-Jin;Jin, Chae-Eun;Jeon, Min-Ji;Lee, Jo-Eun;Kim, Su-Jeong;Lee, Sang-Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.71-76
    • /
    • 2016
  • In this study, de-identification policies of the US, the UK, Japan, China and Korea are compared to suggest a future direction of de-identification regulations and a method for vitalizing the big data industry. Efficiently using the de-identification technology and the standard of adequacy evaluation contributes to using personal information for the industry to develop services and technology while not violating the right of private lives and avoiding the restrictions specified in the Personal Information Protection Act. As a counteraction, the re-identification issue may occur, for re-identifying each person as a de-identified data collection. From the perspective of business, it is necessary to mitigate schemes for discarding some regulations and using big data, and also necessary to strengthen security and refine regulations from the perspective of information security.

A Study on Facilitators and Inhibitors to the Introduction of Outsourcing in the Hospital Information Systems in Korea (병원 정보시스템 아웃소싱 도입의 촉진 요인과 저해 요인에 관한 연구)

  • Choy, Soon;Shin, Hyeong-Sik;Choi, In-Young;Kim, Suk-Il
    • Journal of Preventive Medicine and Public Health
    • /
    • v.40 no.1
    • /
    • pp.64-70
    • /
    • 2007
  • Objectives : This study was conducted to investigate the current status of outsourcing in Korean hospital information systems and the factors influencing its introduction. Methods : The authors surveyed 136 hospitals located in Seoul and its surrounding vicinities from June 7 to June 23, 2006. The facilitators and inhibitors to outsourcing in hospital information systems were derived from literature and expert reviews. Multiple logistic regression analysis was applied to identify the major influencing factors on outsourcing in hospital information systems. Results : Eighty-six (63.2%) of the 136 hospitals surveyed, which were mainly tertiary hospitals, responded to using outsourcing for their hospital information systems. "Hardware and software maintenance and support," "application development," and "management of service and staff" were the major areas of outsourcing. Outsourcing had been employed for $4\sim7$ years by 45.5% of the hospitals and the proportion of the budget used for outsourcing was less than 20%. A need for an extension in outsourcing was agreed on by 76.5% of the hospitals. The multiple logistic regression analysis showed that both consumer satisfaction and security risk have an influence on hospital information system outsourcing. Conclusions : Outsourcing in hospital information systems is expected to increase just as in other industries. One primary facilitator to outsourcing in other industries is consumer satisfaction. We found that this was also a facilitator to outsourcing in hospital information systems. Security risk, which is usually considered an inhibitor to information technology outsourcing, was proven to be an inhibitor here as well. The results of this study may help hospital information systems establish a strategy and management plan for outsourcing.

A Study of Correctional Education for Juvenile Delinquents in Korea (우리나라 소년범(少年犯) 교정교육(稿正敎育)의 실태(實態) 문제점(問題點))

  • Kim, Kyung-Hoe
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.1-16
    • /
    • 1997
  • Nowdays the prison is the only correctional for juvenile delinquents not to be the second offenders in Korea. Originally the correctional education aims to let criminals go back to the society as a decent citizen after correcting them and prevent them from comminitting crimes repeatedly. Being considered to increase the second offenders in juvenile delinquency, the purpose of this study is to investigate the actual condition and problems of juvenile correctional education in Korea and to find out the solution of problems. First of all, this study examines the actual condition of the juvenile delinquency in Korea. The number of juvenile crimes has been increased from 1985 to 1995. In 1997, the current education in correctinal institutions for juvenile delinquents is inferior to that of developed countries. On the basis of this investigation, improvement plans which will be fit for the circumstances in Korea are suggested. The conclusion of this study are summarized as follows 1. Correctional institutions will be improved to accommodate the proper number of convicts. 2. Correctional officers should be qualified proffessinals who can achieve the aim of correctional education successfully. 3. In order to cultivate he social adaptability of convicts, the expansion of open prison is needed. 4. It is neccessary to classify convicts by means of moderized and scientific methods. 5. Correctinal education consist of various practical courses on jobs, After complenting these vocatinal training, the convict can obtain certificates. 6. The government has to has to plan policies that the released convicts can get jobs for living. 7. Owing to keeping prisons sanitary, it is very helpful for convicts to have thebelief that they are not abandoned by the member of their society. 8. Convicts are given opportunities to participate religious activities by their free-will. If above improvement plans are sufficiently accomplished, correctinal education will obtain good results, It is also effective to minimize the repetition of offence by ex-convicts.

  • PDF

A Study on the Determination of Water Storage-Supply Capacity of Agricultural Reservoir (소규모 농업용 저수지의 저류량-용수공급능력 결정에 관한 연구)

  • 안승섭;정순돌;이증석;윤경덕;장인수
    • Journal of Environmental Science International
    • /
    • v.11 no.12
    • /
    • pp.1217-1226
    • /
    • 2002
  • This study aims at the effective estimation of water supply capacity of small scale reservoir and the proposal of the data which is necessary to establish the water resources management plan of down stream area of the reservoir in the future by comparison and examination about reservoir operation technique for the security of agricultural water in small scale reservoir. The result of flow calculation by Tank model is used for the input data as the inflow data which is needed for the analysis of water supply capacity. Stochastic method, simulation method, and optimization method are used to examine the water supply capacity, and water security amount is compared with each method. From the analyses of water supply capacities by each method, slightly different results are shown in spite of the effort to compare them equally using input data such as inflow data under equal conditions, and the comparison of water supply capacities by each method are as follows; linear planning method, simulation method, and transition probability matrix method in the order of amount from the largest. It is thought that the simulation method in which comparatively reasonable application of the inflow data is possible and is simulated in successive time series dam operation of the three methods used in this study thus, simulation model is proper to estimate the water supply capacity of agricultural small scale reservoir. And it is judged that the heightening of efficiency of water resources utilization according to the development of downstream area of dam may be possible using the upward readjusted water supply amount of $55.18{\tiems}10^6ton$ and $63.7{\times}10^6ton$ at 95% and 90% supply reliability respectively which are above the planning water supply amount of $50.0{\times}10^6$ton when the simulation method is introduced as the standard.

The Enhancement Strategy on National Cyber Capability Using Hybrid Methodology of AHP and TOPSIS (AHP와 TOPSIS 융합 방법론을 이용한 국가 사이버 역량 강화 방안)

  • Bae, Sunha;Park, SangDon;Kim, So Jeong
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.43-55
    • /
    • 2015
  • The effective cyber capability assessment methodology does not exist, it's difficult to check the current state of the our country's cyber capabilities and to establish cyber capability enhancement plan based on the result of assessment. The cyber capability assessment is necessary in order to determine the current level of the country, establish policy directions and provide the basis for effective budgeting. But assessment of national cyber capability is multi-criteria decision makink problem. In this paper develops an assessment model based on the AHP and TOPSIS. AHP is used to determine weight of the criteria and TOPSIS method is used to obtain final ranking. We also introduce the result of four major nations cyber capability assessment using the proposed methodology. The experiment used the virtual experimental data. And the result show that the proposed methodology can expand the number of criteria and alternatives for assessment and provide more sophisticated mathematical base for objective assessment comparing methodology using AHP only.

A construction Plan for the integrated information network of sports industry (스포츠산업 통합정보망 구축 방안)

  • Jun, Sunhye;Kang, SeungAe;Kim, Hyuncheol;Kwon, Hyungil;Kang, Sunyoung;Kim, Yeojin;Jeon, Heejun
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.63-69
    • /
    • 2013
  • This research analyze the current status pertaining to the sport industry's information system and information network in Korea to propose integrated information network of sport industry construction measures with the goal of optimizing vertical and horizontal network formation, and knowledge information sharing and dissemination. To construct integrated information network of sport industry, literature examination and meeting of experts to search for measures are utilized. This paper analyze the realities of the sport industry's information system and information network in Korea to propose the following when it comes to the measures to realize sport industry's information integration. First, DB for sport industry relate information that factored in the Ontology is being developed. In other words, it is necessary to design a DB that factors in the Semantic Web. Second, once the DB relate to the sport industry that factored in the Ontology is developed, it is necessary to build RSS/Atom based active network that enables exchange of organic information among them.