• Title/Summary/Keyword: information protection countermeasures

Search Result 86, Processing Time 0.021 seconds

Biometric Template Security for Personal Information Protection (개인정보 보호를 위한 바이오인식 템플릿 보안)

  • Shin, Yong-Nyuo;Lee, Yong-Jun;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.4
    • /
    • pp.437-444
    • /
    • 2008
  • This paper deals with the biometric template protection in the biometric system which has been widely used for personal authentication. First, we consider the structure of the biometric system and the function of its sub-systems and define the biometric template and identification(ID) information. And then, we describe the biometric template attack points of a biometric system and attack examples and provide their countermeasures. From this, we classify the vulnerability which can be protected by encryption and hashing techniques. For more detail investigation of these at real operating situations, we analyze them and suggest several protection methods for the typical application scheme of biometric systems such as local model, download model, attached model, and center model. Finally, we also handle the privacy problem which is most controversy issue related to the biometric systems and suggest some guidances of safeguarding procedures on establishing privacy sympathy biometric systems.

Semantic Analysis of Information Assurance Concept : A Literature Review (문헌 연구를 통한 정보보증 개념의 구문 분석)

  • Kang, Ji-Won;Choi, Heon-jun;Lee, Hanhee
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.31-40
    • /
    • 2019
  • Today, information security (INFOSEC) as a discipline is gaining more and more importance according to the emergence and extension of the cyberspace. Originated from Joint Doctrine for Information Operation (Joint Pub 3-13) by the U.S. Department of Defense, 'information assurance (IA)' is the concept widely used in the relevant field. Grown from the practice of information security, it encompasses broader and more proactive protection that includes countermeasures and repair, security management throughout an information system (IS)'s life-cycle, and trustworthiness of an IS in the process of risk analysis. In Korea, many industry professionals tend to misunderstand IA, remaining unaware of the conceptual differences between IA and INFOSEC. On this account, the current study attempted to provide a combined definition of IA by reviewing relevant literature. This study showed the validity of the wordings used in the proposed definition phrase by phrase.

Application of Multi-Attribute Utility Analysis for the Decision Support of Countermeasures in Early Phase of a Nuclear Emergency (원자력 사고시 초기 비상대응 결정지원을 위한 다속성 효용 분석법의 적용)

  • Hwang, Won-Tae;Kim, Eun-Han;Suh, Kyung-Suk;Jeong, Hyo-Joon;Han, Moon-Hee;Lee, Chang-Woo
    • Journal of Radiation Protection and Research
    • /
    • v.29 no.1
    • /
    • pp.65-71
    • /
    • 2004
  • A multi-attribute utility analysis was investigated as a tool for the decision support of countermeasures in early phase of a nuclear accident. The utility function of attributes was assumed to be the second order polynomial expressions, and the weighting constant of attributes was determined using a swing weighting method. Because the main objective of this study focuses on the applicability of a multi-attribute utility analysis as a tool for the decision support of countermeasures in early phase of a nuclear accident, less quantifiable attributes were not included due to lack of information. In postulated accidental scenarios for the application of the designed methodology, the variation of the numerical values of total utility for the considered actions, e.g. sheltering, evacuation and no action, was investigated according to the variation of attributes. As a result, it was shown that the numerical values of total utility for the actions are distinctly different depending on the exposure dose and monetary value of dose. As increasing in both attributes, the rank of the numerical values of total utility increased for evacuation, which is more extreme action than for sheltering, while that of no action decreased. As expected probability of high dose is higher, the break-even values for the monetary value of dose, which are the monetary value of dose when the ranking of actions is changed, were lower. In audition, as aversion psychology for dose is higher, the break-even values for dose were lower.

Status of Radiation Dose and Radioactive Contamination due to the Fukushima Accident

  • Baba, Mamoru
    • Journal of Radiation Protection and Research
    • /
    • v.41 no.2
    • /
    • pp.133-140
    • /
    • 2016
  • Backgrounds: The accident at Fukushima Daiichi Nuclear Power Plant (NPP), March 2011, caused serious radioactive contamination over wide area in east Japan. Therefore, it is important to know the effect of the accident and the status of NPP. Materials and Methods: This paper provides a review on the status of radiation dose and radioactive contamination caused by the accident on the basis of publicized information. Results and Discussion: Monitoring of radiation dose and exposure dose of residents has been conducted extensively by the governments and various organizations. The effective dose of general residents due to the accident proved to be less than a mSv both for external and internal dose. The equivalent committed dose of thyroid was evaluated to be a few mSv in mean value and less than 50 mSv even for children. Monitoring of radioactivity concentration has been carried out on food ingredients, milk and tap water, and actual meal. These studies indicated the percentage of foods above the regulation standard was over 10% in 2011 but decreasing steadily with time. The internal dose due to foods proved to be tens of ${\mu}Sv$ and much less than that due to natural $^{40}K$ even in the Fukushima area and decreasing steadily, although high level concentration is still observed in wild plants, wild mushrooms, animals and some kind of fishes. Conclusion: According to extensive studies, not only the effect of the accident but also the pathway and countermeasures against radioactive contamination have been revealed, and they are applied very effectively for restoration of environment and reconstruction of the area.

A Cryptography Algorithm using Telescoping Series (망원급수를 이용한 암호화 알고리즘)

  • Choi, Eun Jung;Sakong, Yung;Park, Wang Keun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.103-110
    • /
    • 2013
  • In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.

A Study on the Improvement of Field Activity for Firemen in Sandwich Panel Warehouse (샌드위치패널 창고 소방대원 현장활동 대응력 제고 방안)

  • An, Byung-Kug;Kim, Woon-Hyung;Yang, So-Jin;Ham, En-Gu
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.3
    • /
    • pp.421-429
    • /
    • 2020
  • Purpose: The purpose of this study is to present step-by-step countermeasures to prevent fires in sandwich panel warehouses and to enhance on-site fire response capabilities. Method: Interviews of firefighters related to fire sites, advice from fire experts, and experiments on protection performance were conducted to draw up measures for each element to strengthen on-site response capabilities. Result: The fire safety management checklist for warehouse fire safety managers and the installation standards for wall protection of sandwich panel warehouses are presented. In addition, Standard Operational Procedures(SOP) for fire application of sandwich panel warehouses were established for firefighters on-site. Conclusion: Through this study, step-by-step fire safety measures were established for preventing, protecting and suppressing fires in sandwich panel warehouses.

A Comparative Analysis of Korea-Japan Seismic Recovery System (한일 지진 복구체계의 비교 분석)

  • Lee, JunBeom
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.3
    • /
    • pp.458-471
    • /
    • 2020
  • Purpose: In Korea, the frequency and frequency of earthquakes are increasing every year. Therefore, the purpose of this study was to compare and analyze the characteristics and examples of earthquakes in Korea and Japan, and to propose improvements to the earthquake prevention policy in Korea. Method: In this study, we investigate and evaluate Japan's response in two cases: the Kobe earthquake and the East Japan earthquake. After surveying and evaluating the nation's countermeasures in the two events, Gyeongju and Pohang, they were compared. Result: When comparing recovery systems in Korea and Japan, there were significant differences in plans for restoration of road transport networks, regional disaster prevention plans, and the introduction of Conclusion: considering the physical distance between Korea's earthquake-prone areas and the capital, the government should quickly come up with countermeasures to ensure that immediate earthquake response in the region is enhanced through the detailed establishment of the Functional Continuity Plan (COOP), and that administrative functions will function normally in the event of a disaster through the introduction of the administrative BCP concept.

Financial and Economic Risk Prevention and Countermeasures Based on Big Data and Internet of Things

  • Songyan Liu;Pengfei Liu;Hecheng Wang
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.391-398
    • /
    • 2024
  • Given the further promotion of economic globalization, China's financial market has also expanded. However, at present, this market faces substantial risks. The main financial and economic risks in China are in the areas of policy, credit, exchange rates, accounting, and interest rates. The current status of China's financial market is as follows: insufficient attention from upper management; insufficient innovation in the development of the financial economy; and lack of a sound financial and economic risk protection system. To further understand the current situation of China's financial market, we conducted a questionnaire survey on the financial market and reached the following conclusions. A comprehensive enterprise questionnaire from the government's perspective, the enterprise's perspective and the individual's perspective showed that the following problems exist in the financial and economic risk prevention aspects of big data and Internet of Things in China. The political system at the country's grassroots level is not comprehensive enough. The legal regulatory system is not comprehensive enough, leading to serious incidents of loan fraud. The top management of enterprises does not pay enough attention to financial risk prevention. Therefore, we constructed a financial and economic risk prevention model based on big data and Internet of Things that has effective preventive capabilities for both enterprises and individuals. The concept reflected in the model is to obtain data through Internet of Things, use big data for screening, and then pass these data to the big data analysis system at the grassroots level for analysis. The data initially screened as big data are analyzed in depth, and we obtain the original data that can be used to make decisions. Finally, we put forward the corresponding opinions, and their main contents represent the following points: the key is to build a sound national financial and economic risk prevention and assessment system, the guarantee is to strengthen the supervision of national financial risks, and the purpose is to promote the marketization of financial interest rates.

Realization of Torsional Response based on Multi-mass Modeling of Turbine-Generator Shaft System (터빈 발전기 축 시스템의 다중 질량체 모델링을 통한 비틀림 응답 구현)

  • Park, Ji-Kyung;Cho, Gyu-Jung;Sohn, Seung-Hyun;Chung, Se-Jin;Kim, Chul-Hwan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.2
    • /
    • pp.201-207
    • /
    • 2015
  • Turbine-generator torsional response is caused by interaction between electrical transient air-gap torque and mechanical characteristics of turbine-generator shafts. If torsional shaft torque exceeds a certain threshold, the loss of fatigue life may occur and, in the end, it is possible to happen permanent shaft failure. Therefore, it is required to understand the torsional response for reliable operation and protection of turbine-generator shaft system. In this paper, we introduced multi-mass modeling method of turbine-generator shaft system using mechanical-electrical analogy and state-space equation to verify the transient torsional response based on ElectroMagnetic Transient Program (EMTP). These simple realization methods for turbine-generator shaft torsional response could be helpful to understand torsional interaction phenomena and develop the transient torque reduction countermeasures for turbine-generator shaft system.

A Study on the Recognition of Athletes toward Human Rights Violations in Korea

  • KWON, Yeon Taek;KWON, Ki Hyun;SEO, Won Jae
    • Journal of Sport and Applied Science
    • /
    • v.5 no.2
    • /
    • pp.31-38
    • /
    • 2021
  • Purpose: A new form of sports human rights platform is needed for policy-related officials, athletes, leaders, and parents to easily share information on sports human rights and to promote communication between the sports community and the outside. Research design, data, and methodology: Participants were collected from athletes (n=3,007) who were registered in Korean Sport & Olympic Committee. Participants were asked to respond the survey items measuring their experiences of human right violations in sport. Descriptive analysis, t-test, and ANOVA were used to analyze data. Results: The platform should include information on prevention and safety of human rights violations during sports activities, procedures and methods for reporting damage, countermeasures, leader education programs, human rights protection guidelines, roles and supervision of sports organizations and institutions, and related statues. It can form a community as well as exchange information in the Internet space through the operation of bulletin boards by professional athletes, student athletes, parents, and leaders, and plays a role in crisis counseling or information provision. Given the reality that players can be blocked from the outside world, information communication channels on SNS can be a useful means of protecting and improving players' human rights. Conclusions: Therefore, it is necessary to provide a foundation for creating related platforms so that sports human rights sites or SNS can be operated voluntarily. Implications and future directions were discussed.