• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.035 seconds

A Study on the Support Policy for the Realization of Right to Learn of Youth Migrants in Korea: Focusing on Parents, Teachers and Experts (중도입국 청소년의 학습권 실현을 위한 지원방안 연구: 학부모, 교사 등 관계자를 중심으로)

  • Kim, HyunJin;Noh, Giseop
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.533-538
    • /
    • 2021
  • The purpose of this study is to consider the perception, which education-related workers and parents have, associated with guaranteeing the right to learn for youth migrants in Korea. The study was especially intended to analyze the opportunities and adaptions of youth migrants and make policy suggestions accordingly. To this purpose, this study implemented one-on-one in-depth interviews with research participants to collect and analyze data. This research yielded four categories: initial settlement, social security support as a fundamental right, learning rights guarantees, and psychological support. Also, seven subcategories were elicited. The suggestions based on results are followings: first, the legal basis for learning support for middle-aged adolescents; second, curriculum composition for school maladjusted middle-aged adolescents; third, individualized support system; fourth, the active promotion of support systems such as information provision; fifth, the diversification of policy for psychological stability.

Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis (이상 탐지 분석에서 알려지지 않는 공격을 식별하기 위한 이산 웨이블릿 변환 적용 연구)

  • Kim, Dong-Wook;Shin, Gun-Yoon;Yun, Ji-Young;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.45-52
    • /
    • 2021
  • Although many studies have been conducted to identify unknown attacks in cyber security intrusion detection systems, studies based on outliers are attracting attention. Accordingly, we identify outliers by defining categories for unknown attacks. The unknown attacks were investigated in two categories: first, there are factors that generate variant attacks, and second, studies that classify them into new types. We have conducted outlier studies that can identify similar data, such as variants, in the category of studies that generate variant attacks. The big problem of identifying anomalies in the intrusion detection system is that normal and aggressive behavior share the same space. For this, we applied a technique that can be divided into clear types for normal and attack by discrete wavelet transformation and detected anomalies. As a result, we confirmed that the outliers can be identified through One-Class SVM in the data reconstructed by discrete wavelet transform.

A study on the analysis of heat flow in X-ray tube (X-ray tube 내 열유동 해석에 관한 연구)

  • Yun, Dong-Min;Seo, Byung-Suk;Jeon, Yong-Han
    • Design & Manufacturing
    • /
    • v.15 no.1
    • /
    • pp.26-31
    • /
    • 2021
  • As the aging ages, the disease also increases, and the development of AI technology and X-ray equipment used to treat patients' diseases is also progressing a lot. X-ray tube converts only 1% of electron energy into X-ray and 99% into thermal energy. Therefore, when the cooling time of the anode and the X-ray tube are frequently used in large hospitals, the amount of X-ray emission increases due to temperature rise, the image quality deteriorates due to the difference in X-ray dose, and the lifespan of the overheated X-ray tube may be shortened. Therefore, in this study, temperature rise and cooling time of 60kW, 75kW, and 90kW of X-ray tube anode input power were studied. In the X-ray Tube One shot 0.1s, the section where the temperature rises fastest is 0.03s from 0s, and it is judged that the temperature has risen by more than 50%. The section in which the temperature drop changes most rapidly at 20 seconds of cooling time for the X-ray tube is 0.1 seconds to 0.2 seconds, and it is judged that a high temperature drop of about 65% or more has occurred. After 20 seconds of cooling time from 0 seconds to 0.1 seconds of the X-ray tube, the temperature is expected to rise by more than 3.7% from the beginning. In particular, since 90kW can be damaged by thermal shock at high temperatures, it is necessary to increase the surface area of the anode or to require an efficient cooling system.

Development of a Portable Detection System for Simultaneous Measurements of Neutrons and Gamma Rays (중성자선과 감마선 동시측정이 가능한 휴대용 계측시스템 개발에 관한 연구)

  • Kim, Hui-Gyeong;Hong, Yong-Ho;Jung, Young-Seok;Kim, Jae-Hyun;Park, Sooyeun
    • Journal of radiological science and technology
    • /
    • v.43 no.6
    • /
    • pp.481-487
    • /
    • 2020
  • Radiation measurement technology has steadily improved and its usage is expanding in various industries such as nuclear medicine, security search, satellite, nondestructive testing, environmental industries and the domain of nuclear power plants (NPPs). Especially, the simultaneous measurements of gamma rays and neutrons can be even more critical for nuclear safety management of spent nuclear fuel and monitoring of the nuclear material. A semiconductor detector comprising cadmium, zinc, and tellurium (CZT) enables to detect gamma-rays due to the significant atomic weight of the elements via immediate neutron and gamma-ray detection. Semiconductor sensors might be used for nuclear safety management by monitoring nuclear materials and spent nuclear fuel with high spatial resolution as well as providing real-time measurements. We aim to introduce a portable nuclide-analysis device that enables the simultaneous measurements of neutrons and gamma rays using a CZT sensor. The detector has a high density and wide energy band gap, and thus exhibits highly sensitive physical characteristics and characteristics are required for performing neutron and gamma-ray detection. Portable nuclide-analysis device is used on NPP-decommissioning sites or the purpose of nuclear nonproliferation, it will rapidly detect the nuclear material and provide radioactive-material information. Eventually, portable nuclide-analysis device can reduce measurement time and economic costs by providing a basis for rational decision making.

A Study on Life and Health Status of Welfare Recipients after COVID-19: Focus on Group Differences by Gender, Living with Children and Household Type (코로나19 이후 복지대상자의 생활 및 건강에 대한 연구: 성별, 자녀유무, 가구형태에 따른 집단 간 차이를 중심으로)

  • Kim, HeeJoo;Jang, Yeon Jin
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.384-394
    • /
    • 2022
  • This study aimed to examine how COVID-19 affected life and health of welfare recipients by comparing groups associated with sex, living with children, and household type and suggest directions for welfare policy and services. Researchers collected a random sample of 500 recipients from 𐩒𐩒gu, Seoul who are registered in Haengbok E-eum, the social security information system and conducted a survey on overall life domains and physical and mental health. For data analysis, t-test, Anova and chi-square test were used. The results showed that factors of sex, living with children, and household type made significant differences in difficulties of employment status, child care, leisure and cultural activities and overall social activities. In terms of health status, mental health status and life satisfaction have been decreased after COVID-19. There were statistical differences in COVID blue and thinking about death among different groups. Based on these findings, this study suggested directions for welfare services for the future New Normal society.

Designing a Longitudinal Database for Cohort Construction in Medical Education (의학교육의 코호트 구축을 위한 종단 데이터베이스 설계방안 연구)

  • Hanna Jung;Hae Won Kim;I Re Lee;Shinki An
    • Korean Medical Education Review
    • /
    • v.25 no.2
    • /
    • pp.84-101
    • /
    • 2023
  • Longitudinal data can provide important evidence with the potential to stimulate innovation and affect policies in medical education and can serve as a driving force for further developments in medical education through evidence-based decisions. Tracking and observing cohorts of students and graduates using longitudinal data can be a way to link the past, present, and future of medical education. This study reviewed practical methods and technical, administrative, and ethical considerations for the establishment and operation of a longitudinal database and presented examples of longitudinal databases. Cohort study design methods and previous examples of research using longitudinal databases to explore major topics in medical education were also reviewed. The implications of this study are as follows: (1) a systematic design process is required to establish longitudinal data, and each university should engage in ongoing deliberation about this issue; (2) efforts are needed to alleviate "survey fatigue" among respondents and reduce the administrative burden of those conducting data collection and analysis; (3) it is necessary to regularly review issues of personal information protection, data security, and ethics regarding the survey respondents; and (4) a system should be established that integrates and manages a longitudinal database of medical education at the national level. The hope is that establishing longitudinal data and cohorts at individual medical schools will not be a temporary phenomenon, but rather that they will be well utilized at the national level to innovate and implement ongoing changes in medical education.

A Heuristic Method of In-situ Drought Using Mass Media Information

  • Lee, Jiwan;Kim, Seong-Joon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.168-168
    • /
    • 2020
  • This study is to evaluate the drought-related bigdata characteristics published from South Korean by developing crawler. The 5 years (2013 ~ 2017) drought-related posted articles were collected from Korean internet search engine 'NAVER' which contains 13 main and 81 local daily newspapers. During the 5 years period, total 40,219 news articles including 'drought' word were found using crawler. To filter the homonyms liken drought to soccer goal drought in sports, money drought economics, and policy drought in politics often used in South Korea, the quality control was processed and 47.8 % articles were filtered. After, the 20,999 (52.2 %) drought news articles of this study were classified into four categories of water deficit (WD), water security and support (WSS), economic damage and impact (EDI), and environmental and sanitation impact (ESI) with 27, 15, 13, and 18 drought-related keywords in each category. The WD, WSS, EDI, and ESI occupied 41.4 %, 34.5 %, 14.8 %, and 9.3 % respectively. The drought articles were mostly posted in June 2015 and June 2017 with 22.7 % (15,097) and 15.9 % (10,619) respectively. The drought news articles were spatiotemporally compared with SPI (Standardized Precipitation Index) and RDI (Reservoir Drought Index) were calculated. They were classified into administration boundaries of 8 main cities and 9 provinces in South Korea because the drought response works based on local government unit. The space-time clustering between news articles (WD, WSS, EDI, and ESI) and indices (SPI and RDI) were tried how much they have correlation each other. The spatiotemporal clusters detection was applied using SaTScan software (Kulldorff, 2015). The retrospective and prospective cluster analyses were conducted for past and present time to understand how much they are intensive in clusters. The news articles of WD, WSS and EDI had strong clusters in provinces, and ESI in cities.

  • PDF

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

An adaptive digital watermark using the spatial masking (공간 마스킹을 이용한 적응적 디지털 워터 마크)

  • 김현태
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.39-52
    • /
    • 1999
  • In this paper we propose a new watermarking technique for copyright protection of images. The proposed technique is based on a spatial masking method with a spatial scale parameter. In general it becomes more robust against various attacks but with some degradations on the image quality as the amplitude of the watermark increases. On the other hand it becomes perceptually more invisible but more vulnerable to various attacks as the amplitude of the watermark decreases. Thus it is quite complex to decide the compromise between the robustness of watermark and its visibility. We note that watermarking using the spread spectrum is not robust enought. That is there may be some areas in the image that are tolerable to strong watermark signals. However large smooth areas may not be strong enough. Thus in order to enhance the invisibility of watermarked image for those areas the spatial masking characteristics of the HVS(Human Visual System) should be exploited. That is for texture regions the magnitude of the watermark can be large whereas for those smooth regions the magnitude of the watermark can be small. As a result the proposed watermarking algorithm is intend to satisfy both the robustness of watermark and the quality of the image. The experimental results show that the proposed algorithm is robust to image deformations(such as compression adding noise image scaling clipping and collusion attack).

A Research in Applying Big Data and Artificial Intelligence on Defense Metadata using Multi Repository Meta-Data Management (MRMM) (국방 빅데이터/인공지능 활성화를 위한 다중메타데이터 저장소 관리시스템(MRMM) 기술 연구)

  • Shin, Philip Wootaek;Lee, Jinhee;Kim, Jeongwoo;Shin, Dongsun;Lee, Youngsang;Hwang, Seung Ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.169-178
    • /
    • 2020
  • The reductions of troops/human resources, and improvement in combat power have made Korean Department of Defense actively adapt 4th Industrial Revolution technology (Artificial Intelligence, Big Data). The defense information system has been developed in various ways according to the task and the uniqueness of each military. In order to take full advantage of the 4th Industrial Revolution technology, it is necessary to improve the closed defense datamanagement system.However, the establishment and usage of data standards in all information systems for the utilization of defense big data and artificial intelligence has limitations due to security issues, business characteristics of each military, anddifficulty in standardizing large-scale systems. Based on the interworking requirements of each system, data sharing is limited through direct linkage through interoperability agreement between systems. In order to implement smart defense using the 4th Industrial Revolution technology, it is urgent to prepare a system that can share defense data and make good use of it. To technically support the defense, it is critical to develop Multi Repository Meta-Data Management (MRMM) that supports systematic standard management of defense data that manages enterprise standard and standard mapping for each system and promotes data interoperability through linkage between standards which obeys the Defense Interoperability Management Development Guidelines. We introduced MRMM, and implemented by using vocabulary similarity using machine learning and statistical approach. Based on MRMM, We expect to simplify the standardization integration of all military databases using artificial intelligence and bigdata. This will lead to huge reduction of defense budget while increasing combat power for implementing smart defense.