• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.04 seconds

A Design of Integration Management System for Security Information (보안정보 통합관리 시스템의 설계)

  • 김주한;문기영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.99-102
    • /
    • 2004
  • 현재의 보안정보에 관리는 크게 공개키를 기반으로 공개키 쌍의 관리만이 표준화된 형식으로 사용되고 있을 뿐, 다양한 시스템들 및 사용자들이 필요한 대부분의 보안정보들은 시스템별 흑은 사용되는 보안 서비스들의 따라 달리 관리되고 있다. 본 논문에서는 여러 종류의 보안정보들을 통합 관리하는 보안 정보 통합 관리 시스템을 설계하였다.

  • PDF

ISO/IEC의 IDS 기술 표준 동향

  • 김윤정;이기한
    • Review of KIISC
    • /
    • v.14 no.2
    • /
    • pp.6-11
    • /
    • 2004
  • 본 고에서는 ISO/IEC의 IDS(Intrusion Detection System) 표준화 동향에 대한 내용을 기술한다. ISO/IEC에서는 IDS를 국제표준 형식이 아닌, 기술문서 형식으로 구성하고 있으며, 이들 문서들은 IDS 기본 구조에 대한 것(IT intrusion detection framework)과 기업 등에서 IDS를 선정하고 배치, 운영하는데 도움을 주는 것(Guidelines for the selection, deployment and operation of IDS)의 크게 2 가지로 구성된다.

A Study On Developing Korean Standardized Integrated Response System For Disaster Site (한국형 재난현장 통합대응 표준체계 개발연구)

  • Kang, Seong Kyung;Lee, Young Jai
    • Journal of Korean Society of Disaster and Security
    • /
    • v.8 no.2
    • /
    • pp.1-10
    • /
    • 2015
  • Every year, the complexity and scale of disasters are growing. Cooperation between institutions must occur in order to adequately respond to urgent situations caused by these disasters. However, agencies and institutions tend to operate separately, which impose limitations to an integrated disaster response. To combat this problem, the subject of this study: 'Korean standardized integrated response system For disaster site' proposes to develop a response system that is applicable to disasters of all types and scales. Standard Formation, SOP (Standard Operation Procedure), and Standard Terms have been developed to be applicable to various institutions and agencies. The necessity for legal and institutional support to actualize the standardized system is focused on. Utilizing a standardized integrated response system will enable a unified command and control structure at disaster sites, clarify each institution's response tasks, and allow clear and efficient communication among response entities. Ultimately, these benefits will improve efficiency and performance in disaster response efforts.

The Novel Configuration of Integrated Network for Building Energy System (빌딩 에너지시스템 통합네트워크 구축에 관한 연구)

  • Hong, Won-Pyo
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2008.10a
    • /
    • pp.229-234
    • /
    • 2008
  • The new millennium has started with several innovations driven by fast evolution of the technologies in energy sector. A strong impulse towards the diffusion of new economical efficient technologies regulatory incentives related to energy production from renewable source and a small scale building trigeneration and to promotion of more sustainable environmental-friendly generation solutions, the evolution of electricity markets, more and more binding local emission constraints, and the need for improving the security of supply to reduce the energy system vulnerability. The 24 percentage energy quantify of total energy consumption consumes in commercial buildings and residential houses and the 30% portion of total $CO_2$ emissions covers also in the commercial buildings and residential houses sector. To cope with efficiently this energy sinuation in building sector, Building microgrid or building tooling, heating & power(BCHP) system has been interested in recent day due to meeting thermal and electric energy requirements efficiently and with appropriate energy quality. A multi agent system is a collective of intelligent agents that communicate with each other and work cooperatively to achieve common goals. Also, it is to medicate and coordinate communication between Control Areas and Security Coordinators for teal-time control of the BCHP system and the power pid. In this new circumstance, it is very important to integrate the power and energy delivery system and the information system(communication, networks, and intelligent equipment) that controls it. Therefore, development of smart control modules with open communication protocol and seamlessly interchange the data and information between control network and data network including extranet and intranet give a great meanings. We designed and developed the TCP/IP-CAN IED agent modules and ModBus./LonTalk/(TCP/IP) IED agent ones to configure the multi-agent system based smart energy network of commercial buildings and also intelligent algorithms for inverter fault diagnostics which ran be operated in control level or agent level network.

  • PDF

Design and implementation of access control systems using decentralized identifier technology (탈중앙화 신원증명을 이용한 출입통제 시스템의 설계 및 구현)

  • Lee, Sang-Geun;Kim, Do-Hyeong;Jung, Soon-Ki
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.37-46
    • /
    • 2021
  • Decentralized Identifier (DID) technology is a technology that uses blockchain technology to prove an individual's identity through information owned by the individual rather than through a central system. In this paper, we would like to present an access control system using decentralized identifier technology. The access control system using decentralized identifier technology (DID access control system) is a system that allows users to verify their identity from the DID blockchain server through their smartphone (mobile employee ID) and access when they are confirmed to be registered in the access control system. Through this, access control can be managed only by verifying identification with smartphones (mobile employee ID) and DID blockchain servers without having to store information to prove an individual's identity in the access control system.

Legal System of Blockchain and Domestic and Foreign Blockchain Legal System - Focusing on Industrial Revitalization - (블록체인의 법률체계와 국내외 블록체인 법제 현황 -산업 활성화를 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.67-75
    • /
    • 2019
  • As 4th industrial revolution has emerged as a hot topic, the blockchain technology capable of enabling super intelligence as a premiere has been an attracting attention. With the interest in blockchains, various platforms using blockchains are emerging. Reflecting this trend, several countries including US, EU, China, and Japan are preparing blockchain and related laws or amending existing laws. In Korea, the platform business based on blockchain is being done, but the related laws are insufficient. In this study, we first present the legal system of the blockchain, examine each component, and then compare the current state of the legal system in US, EU, China, and Japan based on the blockchain legal system. Finally, we propose a brief improvement plan of the legal system for industrial development by commercialization of blockchain. In the future, we would like to study the individual legal system about the blockchain.

SoC Implementation of Fingerprint Feature Extraction System with Ridge Following (융선추적을 이용한 지문 특징점 추출기의 SoC 구현)

  • 김기철;박덕수;정용화;반성범
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.97-107
    • /
    • 2004
  • This paper presents an System-on-Chip(SoC) implementation of fingerprint feature extraction system. Typical fingerprint feature extraction systems employ binarization and thinning processes which cause many extraction errors for low qualify fingerprint images and degrade the accuracy of the entire fingerprint recognition system. To solve these problems, an algorithm directly following ridgelines without the binarization and thinning process has been proposed. However, the computational requirement of the algorithm makes it hard to implement it on SoCs by using software only. This paper presents an implementation of the ridge-following algorithm onto SoCs. The algorithm has been modified to increase the efficiency of hardwares. Each function block of the algorithm has been implemented in hardware or in software by considering its computational complexity, cost and utilization of the hardware, and efficiency of the entire system. The fingerprint feature extraction system has been developed as an IP for SoCs, hence it can be used on many kinds of SoCs for smart cards.

A Study on the Impact of Applying Network Address Mutation Technology within the Network Protection System (네트워크 보호체계에서 네트워크 주소변이 기술 적용에 대한 영향성 연구)

  • Suwon Lee;Seyoung Hwang;SeukGue Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.939-946
    • /
    • 2023
  • In the hyper-connected network, which network equipment is diverse and network structure is complex, the attack surface has also increased. In this environment, MTD(Moving Target Defense) technology is being researched as a method to fundamentally defend against cyber attacks by actively changing the attack surface. network-based MTD technologies are being widely studied. However, in order for network address mutation technology to be applied within the existing fixed IP-based system, research is needed to determine what impact it will have. In this paper, we studied the impact of applying network address mutation technology to the existing network protection system. As a result of the study, factors to be considered when firewall, NAC, IPS, and network address mutation technologies are operated together were derived, and elements that must be managed in network address mutation technology for interoperability with the network analysis system were suggested.