• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.034 seconds

A Study on Securing Stability following the proposal and Application of Integration Procedure following the Diversification Process of Information Security Policies (정보보안 정책의 다변화 과정에 따른 일원화 절차의 제안과 적용에 따른 안전성 확보에 대한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.405-410
    • /
    • 2018
  • Distribution of a series of procedure for establishment and revision for various instructions on information security for public institutions and diversified process of performance system following the compliance with the instruction are applied to the integrated procedure that any revision or change has led to the studies that are applied on the basis of all environment requirements and the facilitation of such studies in the integrated procedure for the entire information security. However, as the difference of possessing the work territory for each institution, maintaining and securing the security with the heterogeneous type for subject, the information still displays the issues to link to a series of process to the procedure to secure the foregoing as stability, In addition, the notice should be made by the public institutions for the result structured and notified on the basis of budget and the additional time and expenses for re-distributing to the private institutions would be another issue for the part to accomplish the purpose of such study. Therefore, under this study, the subject of information security of similar institutions should be sorted out and statistically classified, and it proposes the integration procedure through a series of diversity and multi-change process and summarize the same in the proposed procedure to engage in studies to secure the optimal stability.

Performance Enhancement Architecture including Location Information Secrecy for HLR System (위치 정보의 보안성이 고려된 가입자 위치등록기 시스템의 새로운 구조)

  • 김자환
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.103-108
    • /
    • 2004
  • A Home Location Register(HLR) database system manages each subscriber's location information, which continuously changes in a cellular network. For this purpose, the HLR database system provides table management, index management, and backup management facilities. In this thesis, I propose using a two-level index method for the mobile directory number(MDN) as a suitable method and a chained bucket hashing method for the electronic serial number(ESN). Both the MDN and the ESN are used as keys in the HLR database system. I also propose an efficient backup method that takes into account the characteristics of HLR database transactions. The retrieval speed and the memory usage of the two-level index method are better than those of the T-tree index method. The insertion and deletion overhead of the chained bucket hashing method is less than that of the modified linear hashing method. In the proposed backup method, I use two kinds of dirty flags in order to solvethe performance degradation problem caused by frequent registration-location operations. I also propose using additional attributes in the HLR database scheme for location information secrecy as a suitable security method.

  • PDF

Legal examination of personal information disclosure system of administrative (행정상 인적사항공개제도에 대한 법률적 검토)

  • Ryu, Gi Hwan;Shin, Mi Ae
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.89-97
    • /
    • 2016
  • Disclosure of personal information to be carried out in one of the Administrative Publicity, Administrative agency as specific information about the person who has violated the obligation imposed by the law is an unspecified number people know is through the direct or Internet media it is to be disclosed in an unspecified number of people. This is, indirect sanctions so as to fulfill its obligations by the addition of psychological pressure that exposes the personal information of the fact that in breach of his obligations to the breach of duty and it has been an unspecified number of people know it is a means. However, publication of these personal information, infringement of the moral rights of the Constitution guarantees an individual, of course, not only a matter of law that the right to self-determination of the personal information, has continued also doubts for the effectiveness of the system. As a result, in this paper, to discuss legal issues with the disclosure of management personal information and its improvement measures, and expected to be able to take advantage of the efficient development of the future of personal information disclosure system.

Improving Public Medical and Social Services Market Management: Application of Information Technologies

  • Barzylovych, Anastasiia;Malinina, Olena;Gnyloskurenko, Ganna;Borysiuk, Iryna;Yuriy, Rayisa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.257-266
    • /
    • 2021
  • This article examines the features of improving the public management of the market of medical and social services using information technology to improve the efficiency of public activity in modern conditions. The interpretation of the essence of the categories "information technologies" and "information support" is analyzed. The importance of the organization of information support of public authorities in the insurance of the state apparatus of information management for the adoption and solution of state issues of the market of medical and social services has been studied. Issues and system of information support of public management of the market of medical and social services are considered. The stages of the ICT implementation process in the market of medical and social services are described. The tools of state regulation in the market of medical and social services and the introduction of targeted programs for the development of the social sphere and health care are highlighted. Recommendations for improvement are formulated public management of the market of medical services and social way introduction of ICT tools, which provide for the implementation of a set of measures aimed at intellectualizing the entire system public data management spheres. The necessity of development of innovative tools of public management of the market of medical and social services of Ukraine for the purpose of working out of strategies of increase of quality of medical and social services in the XXI century is substantiated. A number of benefits from the implementation of an effective process of application of information support of public management of the market of medical and social services to ensure the efficiency of public authorities of Ukraine. It is proposed to create a "Department of information support of self-government" and electronic health care system (e-Health) to improve the management decision-making process, which will provide an opportunity to accumulate, process, analyze, and as a result, get the expected effect in the form of balanced management decisions by public authorities of Ukraine.

A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel (군장병 휴대전화 사용제도 시행에 따른 개인정보 안정성 확보 방안 연구)

  • Hwangbo, Wongyu;Shin, Dong-Kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • As military service members are fully permitted to use mobile phones for sickness after work, it is time to minimize the direct collection of personal information from telecommunication companies when opening mobile phones to secure the safety of military service personnel's personal information. Prior to introducing the use of mobile phones by soldiers after work, the Ministry of National Defense established a security control system such as blocking the mobile phone shooting function to prevent security accidents and concerns about some adverse functions such as illegal cyber gambling, game addiction, and viewing pornography. come. Mobile telecommunications companies entrust personal information processing tasks, such as opening mobile phones, to telecommunications agencies and carry out management and supervision, such as checking the status of personal information protection measures. When a military service member opens a mobile phone, a personal information management agency is newly established using the right to portability of personal information, and a system for requesting the transmission of personal information from the military service member is proposed.

Communication Security for Video-Teleconferencing System (영상회의에 대한 통신보안 대책)

  • 김경희;김영희;류송분;오정환
    • Review of KIISC
    • /
    • v.2 no.4
    • /
    • pp.37-47
    • /
    • 1992
  • 이 논문에서 우리는 여러 가지 분할 항등식을 유도했고 제한된 분할에 관한 새로운 항등식을 증명하고, 분할의 기본적인 이론과 분할함수(Partition Number Function)가 다항식 함수가 아니라는 것을 보이며, n의 분할의 수 p(n)에 대한 ㅎ계(Lower Bound)를 얻기 위해 Stirling의 n !에 대한 근사값을 소개한다. 그리고Hardy-Ramanujan 공식, Euler 항등식과 p(n)의 순환식을 유도하며, 그리고 d$_{m}$ (n)이 n을 m개의 부분으로 분할하는 분할의 수를 나타낼 때 우리는 d$_{m}$ (n) 에 관한 일반적인 공식을 p(n)과 함께 행렬식의 형태로 표현한다.

  • PDF

SEcurity System for the inbound/Outbound links of VSAT Satellite Networks (VAST 위성통신망의 Inbound/Outbond 링크 보호시스템)

  • Mun, Sang-Jae;Park, Jong-Tae;Cho, Yu-Je
    • Review of KIISC
    • /
    • v.2 no.2
    • /
    • pp.19-23
    • /
    • 1992
  • 본 논문은 VIST 위성통신의 기본 보호망 구성과 Inboune/Outbound 링크 보호시스템의 구조, 기능 및 키분배에 대해 논하였다. 그 구성 및 보호관리는 OSI 모델에 준하며, SDNS 의 서비스도 수용될 수 있다. 링크 보호서비스는Inbound/Outbound 링크보호모뉼에 의해 수행되나, 보호관리는 HUB host의 응용계층에 있는 보호관리응용에 의해 전적으로 이루어진다.

  • PDF

P2P Network for OSGi-based Healthcare System in Ubiquitous Environments (유비쿼터스 환경에서 OSGi 기반 헬스케어 시스템을 위한 P2P 네트워크)

  • Kim, Nam-Ho;Song, Seung-Jae;Ryu, Sang-Hwan;Shin, Dong-Ryeol
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.779-780
    • /
    • 2006
  • In comparison with a existing passive Healthcare system, a healthcare system applied OSGi framework is spontaneous and excellently expandable. But, OSGi-based healthcare system has security vulnerability which OSGi has the technical feature and restriction in the service support area. In this paper, in order to overcome these vulnerability, we propose the technique that applies JXTA standardized P2P platform in OSGi-based healthcare system.

  • PDF

Meta Data Modeling for Weapon System Design/Configuration Data Management System (무기체계 설계/형상정보 관리 시스템을 위한 메타 데이터 모델링)

  • Kim Ghiback
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.7 no.2 s.17
    • /
    • pp.65-73
    • /
    • 2004
  • In general, weapon system design/configuration data consist of system structure information which is linked to Part information, documents and drawings. For configuration management, version and revision control are necessary and access control of users to information should be managed for information security. Configuration data of weapon systems have various kinds of different meta data which are contained in the structure as well as attributes of parts and documents information. If neutral types of meta data models be used for building configuration management system, they can be applied to many different kinds of weapon systems with a little customization. In this paper, five meta data models are supposed and implementation results of them by using CBD(component based design) methodology are presented.

Effective Detecting Method of Nmap Idle Scan

  • Hwang, Jungsik;Kim, Minsoo
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.9 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • In recent years, information collection of attacks through stealth port scanning technology has become more sophisticated. The most commonly used Nmap port scanner supports a variety of stealth scanning technologies along with the existing scanning techniques. Nmap also supports Idle scan that is different from conventional stealth scans. This is a more sophisticated stealth scan technique by applying the SYN scan and ACK scan techniques. In previous studies, the detection of Idle scanning was on zombie system, but was not on victim system. In this paper, we propose an effective detection method of Idle scan on victim system. The Idle scanning is composed of two stages; they are probing the zombie and victim system and scanning the victim system. We analyzed the characteristics of the two stages. The characteristics, we captured, are that SYN and RST packets are different from normal packet. We applied them to detection method, then Idle scanning is detected effectively.