• Title/Summary/Keyword: Security plan

Search Result 979, Processing Time 0.031 seconds

Implementation of RBAC Certification & DB Security Based on PMI for NEIS (NEIS를 위한 PMI 기반의 RBAC 인증과 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.981-992
    • /
    • 2004
  • The established NEIS has a lot of problems in the management of security. It does not realize access control in following authority because it only uses PKI certification in user certification and the use of central concentration DBMS and plain text are increased hacking possibility in NEIS. So, This paper suggests a new NEIS for the secure management of data and authority certification. First, we suggest the approached authority in AC pf PMI and user certification in following the role, RBAC. Second, we realize DB encryption plan by digital signature for the purpose of preventig DB hacking. Third, we suggest SQL counterfeit prevention by one-way hash function and safe data transmission per-formed DB encryption by digital signature.

Extracting the Risk Factor of Ground Excavation Construction and Confidence Analysis using Statistical Test Procedure (지반굴착공사 위험요소 도출 및 통계적 검정 방법을 통한 신뢰성 분석)

  • Kim, Dong-Min;Kim, Woo-Seok;Baek, Yong
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.11-17
    • /
    • 2017
  • The case study on ground subsidence was conducted and the cause of ground subsidence was evaluated, main cause were insufficient site exploration, inaccurate strength parameters, defective temporary wall, insufficient reaction for boiling and heaving, excessive excavation and so on. Risk factors during excavation were identified from the cause of ground subsidence and risk factors were site exploration, selecting excavation method, structure analysis, measurement plan, excavation method construction, underground water level change, natural disaster and construction management. The survey of the experts on risk factors identified was conducted to evaluate the importance of risk factors, and confidence analysis was performed to evaluate the significance level between survey result and survey respondent using Chi-square Test.

Strategic Business Process Based on Business Intelligence by Connected with BPM & 6 Sigma (BPM과 6 Sigma 연계에 의한 BI기반의 전략적 비즈니스 프로세스)

  • Park, Sang-Min;Nam, Ho-Ki;Shin, Seung-Ho;Kim, Qui-Nam
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.27-37
    • /
    • 2007
  • Companies have to take agility against change of environment and build up the capacity of new value creation in today's management environment. Until now, there are so many management method for efficiency of management, rationality of management and IT (information technology) supported this method by integration of enterprise task and process automation. but company's competitiveness through the efficiency of management realized the limitations recently. so companies needs the new management method to raise core value of enterprise. This study applies strategy intelligence which is some part of Business Intelligence. We can identify the core value driver by using this method. and the core value driver is connected the KPI (key performance indicator) of processes in BPM (Business Process Management). This help the management of process focused on value driver. and some part of activity driver that effect the process performance can be use the Six Sigma method to strategic business process. This study first introduces the concept of Business Intelligence, Business Process Management and Six Sigma. and then efficient connection plan for value based strategic business process is introduces.

  • PDF

Curriculum development group specializing in the Department of Hu-man Resources plan (군 전문인력 양성학과 교육과정 개발 방안)

  • Kim, Young Joung
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.195-202
    • /
    • 2013
  • Defense reform our military for the globalization of information. Scientific command structure, troop structure, unit structure, step-by-step into the power structure while promoting a history of quantitative-oriented structure, and structure of the quality of state-of-the-art technology-driven transition in the middle of the bottle numberplans about the current 3.3-fold increase in reducing the cadre(officers and NCOs). NCO groups in the executive, especially expanding the current level of 100% increase in the rate of long-serving, while ensuring a stable job and to superior resources to secure a stable policy through science. Military alliance is now underway. In the midst of this group, and urged the group at the University of the leading military and specialized resources to ensure each agreement required by subjects to reflect. Thus effectively improve the quality of education and the demands of the job analysis, DACUM curriculum development methods and procedures can be applied at the time of urgent need for foster an excellent resource for the discharge of curriculum development at the University of Selected as a core job, career, and job classification configuration inside of Duty according to KST derived from the group reflect on the training courses to meet the requirements in the curriculum through the development of curriculum, job definition, job model set to propose.

A Study of Retirement Pathways for Military Personnel (직업군인의 노후대비실태에 관한 고찰)

  • Jung, Jae Keak
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.185-193
    • /
    • 2013
  • Military personnel work in high stress situations and carry great responsibilites, leaving them little time to plan effectively for their retirement; typically, they tend to assume that their employer (the government) will do that planning for them. Focussing intensely on their jobs, retirement often finds them ill-prepared, and this in spite of the recent increase in discussion in society at large about retirement and how to deal with it. Government therefore needs to be more proactive in assisting these occupational groups in their exit from the workforce, especially because, as the baby-boomers age, the rate of retirements will increase dramatically. As well, whereas in the past, an average retirement extended for roughly a decade, today, a retirement could last as long as twenty-five to thirty years, with attendant cost pressures on retirement funds. This in turn will increase the burden on the rising generation, who will have to pay for those pensions. But while government has a role to play, retirees also have to be more active in planning for their retirement, and in particular, planning for second careers, rather than simple retirement. Government can assist here by developing programs to help military personel find a second career, thus reducing their reliance on pension funds, and reducing financial pressures too. As well, such planning would emphasize and enhance self-reliance, which can only be to the good of the larger society.

A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique (DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.251-258
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment wav that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

A Study of Improving Safety Management in Taekwondo Events (태권도 이벤트의 안전관리 개선 방안)

  • Cho, Hyun-Joo;Kim, Doo-Han
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.231-251
    • /
    • 2017
  • Taekwondo has developed into a global sport that sports 80 million people from 208 countries around the world. Korea is the mother country of Taekwondo, and there are many international Taekwondo events in Korea. As important as the image of Taekwondo contents, it will be operation plan and management for event facilities. In particular, safety management for participants is more important than anything else. In case of Taekwondo where there are many national events, there are many foreign visitors, so safety management in facilities and running programs needs to be important. In this study, we conducted in - depth interviews with experts with a career in Taekwondo events. Based on the in - depth interviews, we analyzed the safety management problems of the international Taekwondo events and suggested improvement directions to overcome them. Based on the results of these researches, the improvement direction of Taekwondo event safety management proposed in the first category is a demand for improving safety and injury related system construction. The second category, the safety improvement of visitors, is to secure professional manpower and secure budgets. Also, what is important in the third category, facility safety area, is the proposal to introduce facility safety certification system.

  • PDF

K-Defense Cloud Computing System Design through Cloud Modeling and Analysis of Social Network Service Application (소셜 네트워크 서비스 어플리케이션의 클라우드 모델링 및 분석을 통한 국방 클라우드 컴퓨탱 시스템 설계)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.37-43
    • /
    • 2013
  • In 2010, the Ministry of National Defense decided to build a MegaCenter including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. The Cloud computing system environment should be designed applying cloud computing technology and policy for an efficient infrastructure that many IT resources are available in the data center as a concentrated form. That is, the system should be designed in such a way that clouding services will be efficiently provided to meet the needs of users and there will not be unnecessary waste of resources. However, in order to build an optimal system, it should be possible to predict the service performance and the resource availability at the initial phase of system design. In this paper, using the CloudAnalyst simulator to predict availability of the K-defence cloud computing system service, conducts cloud modeling and analysis of the 'Facebook', one of the most famous social network service applications with most users in the world. An Optimal K-Defense cloud computing design model is proposed through simulation results.

The role of the People's Liberation Army during the Korean War and Prospect of China's Role in the event of Contingency in North Korea (6.25 전쟁 시 중공군의 역할과 북한 유사시 중국의 역할 전망)

  • Choi, Kyung-Sik
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.169-238
    • /
    • 2010
  • The year 2010 is the 60th anniversary commemorating the Korean War. China intervened in the Korean War with the logics such as "To Resist the U.S.'s Aggression and Aid North Korea," "Save Endangered Home & defend Nation," and "If the Lips Are Gone, the Teeth Will Be Exposed to the Cold or If One of Them Falls, the Other is in Danger." However, China had a deep and long connection with North Korea through 1st Chinese Civil War, war against Japan imperialism, and 2nd Chinese Civil War. China has consulted with Kim Il-sung on his invasion of South Korea at the initial stage of development and played a casting vote role in the execution of the invasion plan. During the Korean War, the PLA supported the North Korea's regime by its action, and made the Korea Peninsula divide into two semi-permanently. Even after the war, China continues to maintain relations with North Korea by helping North Korea build the Kim Il-sung's Kingdom. Currently, whenever any issue related to North Korea rises in the international society, China definitely gets involved in those issues and exercises its power. Conditionally 'either armed aggression or, and wartime' in North Korea, China would follow the "Clause of Military Auto Intervention." In addition, China is very likely to establish refugee camps for North Koreans in the Northeastern-Three-Province and to provide rear bases or guerrilla camps for pro-Chinese sects. Furthermore, voluntarily playing a role as spokesman of North Korean Regime in the international society, China will exercise enormous influence on the reunification of the Korean Peninsula.

  • PDF

Analysis of K-Defense Cloud Computing Service Availability Considering of Cloud Computing Traffic Growth (클라우드 컴퓨팅 트래픽 증가를 고려한 국방 클라우드 컴퓨팅 서비스 가용성 분석)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.93-100
    • /
    • 2013
  • In 2012, According to 'Cisco Global Cloud Index 2011-2016', the Cisco company forecasted that global data center traffic will nearly quadruple and cloud traffic will nearly sextuple by 2016. Such a rapid growing of traffic is caused by traffic inside the data center and cloud computing workloads. In 2010, the Ministry of National Defense decided to build a Mega Center including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. One of the factors to consider is cloud computing traffic to build a Mega Center. Since the K-defense cloud computing system is built, K-defense cloud computing traffic will increase steadily. This paper, analyzed the availability of K-defense cloud computing service with the K-defense cloud computing traffic increasing using K-Defense cloud computing test system and CloudAnalyst simulation tool. Created 3 scenarios and Simulated with these scenarios, the results are derived that the availability of K-defense cloud computing test system is fulfilled, even cloud workloads are increased as muh as forecasted cloud traffic growth from now until 2016.