• Title/Summary/Keyword: Technical Security Criteria

Search Result 42, Processing Time 0.024 seconds

A Study on Evaluation of Information Security Awareness and Security Level about Legislative Authority (입법기관의 보안성 평가와 정보보호 인식 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.269-273
    • /
    • 2010
  • 7.7 DDoS incident due to recent events and the emerging importance of privacy and Privacy laws are being discussed in the National Assembly. In this study, Legislative Assembly Secretariat support organization focused on using the system, such as the Internet network and the administrative, technical and physical security elements on the status of confidentiality, availability, integrity and security criteria to identify and follow and We are analyzing. In addition, the Internet, including network and use the system primarily for use, Legislative support agency, The National Assembly Secretariat staff awareness about information security and privacy on the survey for compliance with codes of conduct and We are analyzing. Through this analysis of legislative support agencies' security status, and social responsibility as an institution will wish to encourage the role.

  • PDF

A Study on Quality Evaluation Model of Mobile Device Management for BYOD (BYOD 환경의 MDM 보안솔루션의 품질평가모델에 관한 연구)

  • Rha, HyeonDae;Kang, SuKyoung;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.93-102
    • /
    • 2014
  • A mobile office environment using mobile devices, such as tablet PC, mobile phone is gradually increased in enterprises, banking and public institutions etc which is no limitation on places. It occurs advanced and persist security threats that are required effective security management policy and technical solution to be secure. For BYOD (Bring Your Own Device) environment, technical security management solutions of network control based, MDM (Mobile Device Management), MAM (Mobile Application Management), MCM (Mobile Contents Management) were released, evolved and mixed used. In perspective of integrated security management solution, mobile security product should be selected to consider user experience and environment and correct quality evaluation model of product is needed which is provided standards and guidance on the selection criteria when it was introduced. In this paper, the most widely used MDM solution is selected to take a look at its features and it was reviewed the product attributes with related international standard ISO/IEC25010 software quality attributes. And then it was derived evaluation elements and calculated the related metrics based on the quality analysis model. For the verification of quality evaluation model, security checks list and testing procedures were established; it applied metrics and analyzed the testing result through scenario based case study.

  • PDF

A Study on the Actuating Device Technology in Guided Weapon System (유도무기체계 구동장치 기술에 관한 연구)

  • Lee, Young-Uk
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.145-154
    • /
    • 2007
  • In this paper, a study on the actuator device technology in guided weapon system development. Hydraulic and pressure, electric motor device had been mostly used, but recently due to high output to weight ratio, pressure actuator device is widely used except for small tactical guided ammunition which needed small power. And now the actuator design concept and technical level is changed because of high mobility of guided ammunition, development of magnetic materials which used new material for requirement of despondence, progress of control and electrodynamics technology, and digitalize and integrity. In this paper we clearly proposed the actuator design criteria and detailed technology development trend for next generation guided weapon system.

  • PDF

Cost Analysis for the Reformation of CCTV Transmission Systems (CCTV 전송방식 전환에 따른 비용 분석)

  • Lee, Dong-Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.6
    • /
    • pp.748-755
    • /
    • 2019
  • CCTV Systems have been operated in the variety of serveillance fields of the apartment, transportation, safety, physical security, and so on. And their uses are largely increasing as the CCTV transmission technology has been changed from analog to IP network way. Domestic industry has been working to upgrade from analog CCTV systems to High-Definition(HD) CCTV systems for recent years, which involves a few issues such as mixing with several transmission technologies and duplicated investment in each area because the technological analysis and criteria are specifically not arranged. This paper examines the technical issues of the transmission method between HD analog and HD IP CCTV systems, and induces the criteria of the cost analysis and its weighting factors for HD CCTV reformation. By simulating the cost analysis results of both the HD CCTV systems on apartment environment, this paper proposes the reference for the choice of HD CCTV system reformation.

The Systematic Evaluation of the SCADA Proposals for Dam and Water Supply Office (감시제어 시스템의 체계적 기술평가 방안)

  • Paik, D.H.;Lee, E.W.;Lim, J.I.
    • Proceedings of the KIEE Conference
    • /
    • 1997.07a
    • /
    • pp.149-151
    • /
    • 1997
  • Korea Water Resources Corporation (KOWACO) has used hard wired sequential control system for dams and SCADA / DCS for water supply offices. The control system, which consists of automatic control, communication and computer science, has to look for the security of operation and the quality of generated power and treated water. In this paper, we would like to propose the systematic evaluation of technical proposals such as purpose, method/procedure, evaluation criteria and report preparation.

  • PDF

Research on the Use of Pseudonym Data - Focusing on Technical Processing Methods and Corporate Utilization Directions - (가명 데이터 활용연구 - 기술적 처리방법 및 기업의 활용방향을 중심으로 -)

  • Kim, Jung-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.253-261
    • /
    • 2020
  • This study examines the technologies and application processes related to the use of pseudonym data of companies after the passage of the Data 3 Act to activate the data economy in earnest, and what companies should prepare to use pseudonym data and what will happen in the process It was intended to contribute to the elimination of uncertainty. In the future, companies will need to extend the information security management system from the perspective of the existing IT system to manage and control data privacy protection and management from a third party provisioning perspective. In addition, proper pseudonym data use control should be implemented even in the data use environment utilized by internal users. The economic effect of market change and heterogeneous data combination due to the use of pseudonymized data will be very large, and standards for appropriate non-identification measures and risk assessment criteria for data utilization and transaction activation should be prepared in a short time.

A Study on the Decision Factors for AI-based SaMD Adoption Using Delphi Surveys and AHP Analysis (델파이 조사와 AHP 분석을 활용한 인공지능 기반 SaMD 도입 의사결정 요인에 관한 연구)

  • Byung-Oh Woo;Jay In Oh
    • The Journal of Bigdata
    • /
    • v.8 no.1
    • /
    • pp.111-129
    • /
    • 2023
  • With the diffusion of digital innovation, the adoption of innovative medical technologies based on artificial intelligence is increasing in the medical field. This is driving the launch and adoption of AI-based SaMD(Software as a Medical Device), but there is a lack of research on the factors that influence the adoption of SaMD by medical institutions. The purpose of this study is to identify key factors that influence medical institutions' decisions to adopt AI-based SaMDs, and to analyze the weights and priorities of these factors. For this purpose, we conducted Delphi surveys based on the results of literature studies on technology acceptance models in healthcare industry, medical AI and SaMD, and developed a research model by combining HOTE(Human, Organization, Technology and Environment) framework and HABIO(Holistic Approach {Business, Information, Organizational}) framework. Based on the research model with 5 main criteria and 22 sub-criteria, we conducted an AHP(Analytical Hierarchy Process) analysis among the experts from domestic medical institutions and SaMD providers to empirically analyze SaMD adoption factors. The results of this study showed that the priority of the main criteria for determining the adoption of AI-based SaMD was in the order of technical factors, economic factors, human factors, organizational factors, and environmental factors. The priority of sub-criteria was in the order of reliability, cost reduction, medical staff's acceptance, safety, top management's support, security, and licensing & regulatory levels. Specifically, technical factors such as reliability, safety, and security were found to be the most important factors for SaMD adoption. In addition, the comparisons and analyses of the weights and priorities of each group showed that the weights and priorities of SaMD adoption factors varied by type of institution, type of medical institution, and type of job in the medical institution.

Development of an Imaging Based Gang Protection System

  • Grimm, M.;Pelz, M.
    • International Journal of Railway
    • /
    • v.1 no.4
    • /
    • pp.149-156
    • /
    • 2008
  • During maintenance or construction works in or at the tracks of railways, high risks for passengers and railway staff, especially for the workers on the construction site exist. The high risks result out of the movement of rail vehicles, like trains or construction vehicles, which must be faced by using any available technical and operational technologies for securing them against the environment. Therefore, it is necessary to evaluate the level of protection continuously and to identify new and innovative methods and technologies for the protection of the gang (construction worker, machines and material). Especially on construction sites at line sections with two or more parallel tracks but also with single tracks, there are still a lot of incidents and accidents mostly with seriously injured persons or fatalities. These were mainly gang members that breach the railway-loading gage. By using proper warning or protection systems, the avoidance of such accidents must be achieved. The latest developments. in gang protection systems concern on the one hand fixed barriers in the middle between the construction site and the operated track and on the other hand construction vehicles equipped with automatic warning systems. The disadvantage of such protection methods is that the gang can be warned against an approaching train but a monitoring of the gang members cannot be performed. Only one part of a potential dangerous situation will be detected. If the gang members will overhear the acoustic warning signal of the security staff and the workers will not leave the danger zone in the track, the driver of the approaching train had no chance to react to the dangerous situation. An accident is often inevitable. While the detection of acoustic warning signals by the gang members working on a construction site is very difficult, the acoustical planning of an automatic warning system has to be designed for an acoustic short range level of one meter besides the construction vehicle. The decision about the use of today's technical warning system (fixed systems, automatic warning systems, etc.) must be geared to the technical feasibility and the level of safety which is needed. Criteria for decision guidance to block a track should be developed by danger estimation and economical variables. To realize the actual jurisdiction and to minimize the hazards of railway operations by the use of construction vehicles near the tracks further developments are needed. This means, that the warning systems have to be enhanced to systems for protection, which monitor the realization of the warning signal as a precondition for giving a movement authority to a train. This method can protect against accidents caused by predictable wrongdoing. The actual state of the art technique of using a collective warning combined with additional security staff is no longer acceptable. Therefore, the Institute of Transportation System of the German Aerospace Center in Braunschweig (Germany) will develop a gang warning and protection system based upon imaging methods, with optical sensors such as video in visible and invisible ranges, radar, laser, and other. The advantage of such a system based on the possibility to monitor both the gang itself and the railway-loading gauge either of the parallel track or of the same track still in use. By monitoring both situations, the system will be able to generate a warning message for the approaching train, that there are obstacles in the track, so that the train can be stopped to prevent an accident. And also the gang workers will be warned, while they breach their area.

  • PDF

Pedagogical Conditions for Formation of Design Competence of Qualified Workers with the Use of Information Technologies

  • Slipchyshyn, Lidiia;Honcharuk, Oksana;Anikina, Inessa;Yakymenko, Polina;Breslavska, Hanna;Yakymenko, Svitlana;Opria, Ihor
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.79-88
    • /
    • 2022
  • Modern production requires production staff who have design competence, experience and skills to work in various types of work integrated into professional activities. Possession of digital design methods significantly expands the opportunities for professional activities of qualified workers. The purpose of our study was to study the impact of pedagogical conditions on the formation of design competence of future qualified workers in a group work. We have identified a set of pedagogical conditions that promote the development of professionally oriented artistic and technical creativity of workers in the conditions of curricular and extracurricular activities, which include motivational-target, procedural-semantic, organizational-technological, and subject-oriented. It is shown that the formation of design competence is determined by motivational, informational-active and reflection criteria, which are aimed at motivational-value, cognitive, operational-active, creative, social and emotional components of this competence. The methodology of the research is highlighted, which includes the use of the following methods: determination of the personality's motivational sphere in order to identify strong and weak motives of students activity; multiple intelligence to identify students talents in the direction of practical intelligence, which is important for design competence; determining the level of creative activity to identify manifestations of students creative abilities; identifying the type of students innovative thinking in order to develop motivation for success; factor-criterion model, developed on the basis of a qualimetric approach, which is used to identify the level of design competence formation in accordance with its components. The results of the study showed that the creation of separate pedagogical conditions in the institution of vocational education and training (VET) had a positive impact on the development of design competence, which shows the potential of artistic and technical design in the development of professional creativity of future qualified workers taking into account the environmental approach.

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.