• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.034 seconds

Impact of Personal Health Information Security Awareness on Convenience (개인의료정보보안인식이 편의성에 미치는 영향)

  • Park, Jung-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.600-612
    • /
    • 2017
  • The purpose of the research is that how awareness of importance of personal medical data, laws regarding personal medical data and perception gap regarding information of medical data system may affect usage of hospital convenience between a regular patient who has experienced hospital service and medical professionals. Preceding research analysis was conducted previous on establishing research model; 150 questionnaires to a regular patient and 150 questionnaires for a medical professional, total of 300 questionnaires were gathered for conducting a question investigation. First of all, the research concluded that there are a regular perception differences between a regular patient and medical professional. Moreover, there are perception differences among the different gender, age, and area of residence. Furthermore, medical professionals tend to consider that convenience of hospital usage will be increased if user strengthens recognition of security of personal medical data. Results of hypothesis stress that higher awareness of exposure of personal medical data and medical information system affect decision making convenience for a better usage of hospital. On the other side, awareness of laws related with personal medical information security does not affect decision making convenience of hospital usage and transaction. The results of the research analyzes with proof that strengthening awareness of personal medical data security positively increase convenience of decision making and transactions in selection of provided medical service.

Design and Implement of Secure helper using Smart-phone Auto recording App (스마트폰 자동 녹음 앱을 이용한 생활 안전 도우미 설계 및 구현)

  • Moon, Jeong-Kyung;Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.111-118
    • /
    • 2015
  • The violent crime has increased dramatically in our society. This is because our society has to change quickly. Strong police force, but this is not enough to solve the crime. And there are a lot of police to investigate the situation difficult to go out to the crime scene. So inevitably increase in the risk of crime. Researchers have conducted a number of studies to solve this problem. However, the proposed study how realistic are many points still lacking. herefore, we to take advantage of smartphones and high-speed Internet access technology to provide security services using the push service for rapid identification and crime situation in this study. Therefore, we would like to provide rapid service to identify criminal security situation using smart-phone app and push services on the high speed internet environments. The proposed system is to record the voice information received from the smart phone near the user presses the hot key is set in advance in real-time, and stores the audio information stored in the LBS information to the server through the authentication procedure. And the server uses the stored voice data and LBS Push service information to inform their families. We have completed the design of the proposed system. And it has implemented a smart phone app, the user authentication server. And using the state in which the push service from the authentication server by transmitting a message to a user to inform a family. But more must examine whether the proposed research is relevant in future studies.

Security For Storage Area Networking System (SAN환경에서의 보안)

  • Sung, Chun-Ho;Jun, Sung-Tag
    • Annual Conference of KIPS
    • /
    • 2002.11c
    • /
    • pp.1705-1708
    • /
    • 2002
  • 오늘날 점점 방대해지고 커지는 DATA의 처리를 위해 네트워크 스토리지 시스템의 요구가 증대됨에 따라 네트워크 스토리지의 보안문제가 대두되고 있다. 네트워크 스토리지중 그 성장이 두드러지는 SAN 스토리지의 보안을 위해 정보보호 서비스 구현의 상세한 지식을 필요로 하지 않는 장점을 가진 GSS-API인증 시스템을 이용하여 SAN 스토리지 보안문제에 접근해 보았다.

  • PDF

The Extraction of Train information using FFT (FFT를 이용한 열차 정보 추출 방법)

  • 임관수;김기승;박상진;조용기
    • Proceedings of the KSR Conference
    • /
    • 1998.05a
    • /
    • pp.419-426
    • /
    • 1998
  • The information for operating the train should be transmitted to train, with extreme security. In our system, The information, such that the allowable velocity of the train, train existence in current area, and other data necessary for operating train, is transmitted in the form of FM signal. Received by the receiver located on train, the signal is filtered, demodulated, and analyzed for extracting the original information. The analysis of the demodulated signal is done through FFT algorithm using sliding slot. The simulation results shows the validity of the algorithm.

  • PDF

Large-Scale Security Log For Log Analysis System Design (대용량 보안로그를 위한 로그분석 시스템 설계)

  • Choe, Yong-Gyu;Lee, Bong-Hwan
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.37-40
    • /
    • 2013
  • 다양한 보안 장비 내에서 발생하는 보안 로그의 양이 점차적으로 증가하고 있음에 따라, 보안 로그를 수집하여 실시간으로 공격을 분석을 통하여 대응해야한다. 그리하여 본 논문에서는 기존의 관계형 데이터베이스를 사용하지 않으며, 디스크 방식과 인-메모리방식을 혼용함으로써 초기구축비용을 절감할 수 있는 Map/Reduce 기반의 실시간 대용량 보안로그 분석 시스템을 제안하고자 한다.

A Study on Research on digital health care and information security (디지털 헬스케어와 정보보호에 관한 연구)

  • Kim, Ki-hwan;Kim, Il-Hwan;Shin, Yongtae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.219-220
    • /
    • 2021
  • 본 논문에서는 디지털헬스케어의 정의와 핵심기술, 그리고 정보보호 방안을 제안하고자 한다. 디지털 헬스케어 기기·서비스를 대상으로 하여 다양한 취약점에 대하여 사이버공격이 가능하다. 본제안의 경우 인프라공격에 대한 대응뿐만아니라 관리적인 정보보호체계수립을 통하여 보다 효과적이며, 지속적으로 대응할 수 있을 것으로 전망된다.

  • PDF

A study on the evolution and prospects of security system (영상보안장비의 변천과정과 발전방안)

  • Kang, Young-Goo;Lee, Ha-Yong;Yang, Hae-Sool
    • Annual Conference of KIPS
    • /
    • 2007.05a
    • /
    • pp.389-391
    • /
    • 2007
  • 본 연구는 보안장비의 변천사를 통하여 현상황을 파악하며, 하루가 바뀌는 디지털 혁명시대를 맞이하여 도래하는 유비쿼터스시대에 맞추어 보안장비의 향후 발전 방향에 대해 제시하였다.

A System for SSL/TLS Vulnerability Detection of Servers (서버 SSL/TLS 취약점 자동 탐지를 위한 시스템 개발)

  • Cho, Sungwon;Choi, Hyunsang;Heo, Gyu;Cho, Sanghyun;Kim, Young-Gab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.145-153
    • /
    • 2018
  • SSL (Secure Socket Layer) and TLS (Transport Layer Security) are widely used protocols for secure and encrypted communication over a computer network. However, there have been reported several security vulnerabilities of SSL/TLS over the years. The vulnerabilities can let an adversary carry out critical attacks on SSL/TLS enabled servers. In this paper, we have developed a system which can periodically scan SSL/TLS vulnerabilities on internal network servers and quickly detects, reports and visualizes the vulnerabilities. We have evaluated the system on working servers of Naver services and analyzed detected vulnerabilities. 816 vulnerabilities are found on 213 internal server domains (4.2 vulnerabilities on average) and most vulnerable servers are not opened to public. However, 46 server domains have old vulnerabilites which were found 2016. We could patch and response to SSL/TLS vulnerabilites of servers by leveraging the proposed system.

Proposal of Security Orchestration Service Model based on Cyber Security Framework (사이버보안 프레임워크 기반의 보안 오케스트레이션 서비스 모델 제안)

  • Lee, Se-Ho;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.618-628
    • /
    • 2020
  • The purpose of this paper is to propose a new security orchestration service model by combining various security solutions that have been introduced and operated individually as a basis for cyber security framework. At present, in order to respond to various and intelligent cyber attacks, various single security devices and SIEM and AI solutions that integrate and manage them have been built. In addition, a cyber security framework and a security control center were opened for systematic prevention and response. However, due to the document-oriented cybersecurity framework and limited security personnel, the reality is that it is difficult to escape from the control form of fragmentary infringement response of important detection events of TMS / IPS. To improve these problems, based on the model of this paper, select the targets to be protected through work characteristics and vulnerable asset identification, and then collect logs with SIEM. Based on asset information, we established proactive methods and three detection strategies through threat information. AI and SIEM are used to quickly determine whether an attack has occurred, and an automatic blocking function is linked to the firewall and IPS. In addition, through the automatic learning of TMS / IPS detection events through machine learning supervised learning, we improved the efficiency of control work and established a threat hunting work system centered on big data analysis through machine learning unsupervised learning results.

A construction Plan for the integrated information network of sports industry (스포츠산업 통합정보망 구축 방안)

  • Jun, Sunhye;Kang, SeungAe;Kim, Hyuncheol;Kwon, Hyungil;Kang, Sunyoung;Kim, Yeojin;Jeon, Heejun
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.63-69
    • /
    • 2013
  • This research analyze the current status pertaining to the sport industry's information system and information network in Korea to propose integrated information network of sport industry construction measures with the goal of optimizing vertical and horizontal network formation, and knowledge information sharing and dissemination. To construct integrated information network of sport industry, literature examination and meeting of experts to search for measures are utilized. This paper analyze the realities of the sport industry's information system and information network in Korea to propose the following when it comes to the measures to realize sport industry's information integration. First, DB for sport industry relate information that factored in the Ontology is being developed. In other words, it is necessary to design a DB that factors in the Semantic Web. Second, once the DB relate to the sport industry that factored in the Ontology is developed, it is necessary to build RSS/Atom based active network that enables exchange of organic information among them.