• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.025 seconds

An Improvement of the Guideline of Secure Software Development for Korea E-Government (대한민국 전자정부 소프트웨어 개발보안 가이드 개선 방안 연구)

  • Han, Kyung Sook;Kim, Taehwan;Han, Ki Young;Lim, Jae Myung;Pyo, Changwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1179-1189
    • /
    • 2012
  • We propose an improvement on the Guideline of Secure Software Development for Korea e-Government that is under revision by the Ministry of Public Administration and Security in 2012. We adopted a rule-oriented organization instead shifting from the current weakness-oriented one. The correspondence between the weakness and coding rules is identified. Also, added is the coverage of diagnostic tools over the rules to facilitate the usage by programmers during coding period When the proposed guideline is applied to secure software development, the weakness would be controlled indirectly by enforcing coding rules. Programmers responsibility would be limited to the compliance of the rules, while the current version implies that it is programmers responsibility to guarantee being free from the weakness, which is hard to achieve at reasonable cost.

Research on Major Weakness Rules for Secure Software Development (소프트웨어 개발 보안성 강화를 위한 주요 보안약점 진단규칙 연구)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.10
    • /
    • pp.831-840
    • /
    • 2013
  • Recently, to enhance the security of software, static analysis tools for removing weaknesses, the cause of vulnerability, have been used a lot in the software development stage. Therefore, the tools need to have the rules being able to diagnose various weaknesses. Top 5 weaknesses found in the software developed by major domestic information projects from 2011 to 2012 is 76% of top 10 weaknesses per year. Software security can be improved a lot if top 5 weaknesses just are removed properly in software development. In this paper, we propose the PMD's rules for diagnosing the major weaknesses and present the results of its performance test.

Fingerprint Image Enhancement using a Modified Anisotropic Gaussian Filter (개선된 Anisotropic Gaussian 필터를 이용한 지문 영상 향상)

  • 조희덕;김상희;박원우
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.293-296
    • /
    • 2003
  • The enhancement of fingerprint image is necessary to improve the performance of fingerprint recognition. The enhancement of fingerprint image with Gabor Filter(GF) is widely used. However GF has the weakness such as long processing time and the sensitivity to ridge frequency. To overcome these weaknesses, we propose a Modified Anisotropic Gaussian Filter(MAGF) which is modified from Anisotropic Filter proposed by S. Greenburg's(SAF). This proposed MAGF can reduce the calculation time of ridge frequency and improve the weakness of sensitivity to ridge frequency. We also explained that MAGF is better than others mathematically and experimentally.

  • PDF

Development of the wireless data control system for wireless A/V LCD TV (무선 A/V LCD TV용 무선데이터 제어 시스템 설계 및 제작)

  • 김태선;홍영호;최덕규;박차훈;조재민
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.2279-2282
    • /
    • 2003
  • This paper is research to control method between wireless LCD TV and Set-Top-Box. Audio and Video signal control of wireless LCD TV through Set-Top-Box, usually two systems fairly be away, there is weakness that must go to set-top-box for operation. In this paper design and manufacture to solve this weakness.

  • PDF

The Security Establishment for Cloud Computing through CASE Study

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.6
    • /
    • pp.89-99
    • /
    • 2020
  • Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.

A Study on the Works of Smart Devices Weakness and Hardware Solution (스마트 디바이스의 취약점 분석과 하드웨어적 해결 방안 연구)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.705-707
    • /
    • 2011
  • Smart devices have the characteristics of duality of fire and the property of double-sided swords. They also both conveniency and the weakness at a time due to the structure of the devices. Although there have not been a big threat with the smart devices, but they have potential enough to destroy the network society. This is because of the fact that the devices mainly depend on the applications and the applications can abuse the devices' critical hardware sections such as camera, file system, etc.. In this contribution, we analyze the issues and the problems of the weakness of smart devices and discuss a method to solve the issues.

  • PDF

Quantitative Scoring Criteria on the Importance of Software Weaknesses (소프트웨어 보안약점의 중요도에 대한 정량 평가 기준 연구)

  • Ahn, Joonseon;Bang, Ji-Ho;Lee, Eunyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1407-1417
    • /
    • 2012
  • In order to protect a software system from security attacks, it is important to remove the software security weaknesses through the entire life cycle of software development. To remove the software weaknesses more effectively, software weaknesses are prioritized and sorted continuously. In this paper, we introduce the existing scoring systems for software weakness and software vulnerability, and propose a new quantitative standard for the scoring system, which helps evaluate the importance of software weakness objectively. We also demonstrate the practicability of the proposed standard by scoring 2011 CWE/SANS Top 25 list with the proposed standard and comparing it to the original score of MITRE.

A Study on Private Security Guards' Working Position - Focusing on the Prevention and Management of Low Back Pain Caused by Working in a Standing Position - (민간경호원의 근무 자세에 관한 연구 - 선자세로 인한 요통의 예방과 관리를 중심으로 -)

  • Song, Sang wook;Roh, Jung gu;Lee, Sang bin
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.142-158
    • /
    • 2009
  • The increasing number of crimes in rapidly changing modern society is enhancing people's desire for safety. As of 2008, 2,900 private security businesses with 133,000 employees operated in the private security industry which emerged in response to growing demands from society and people. Of the employees, bodyguards (hereinafter referred to as "private security guard") accounted for about 10% or 13,000. Most private security guards were suffering from various occupational diseases. Especially as they needed to guard their clients many hours a day and worked in a standing position for a long time, private security guards often complained of low back pain. Under the pain, they were hardly expected to perform their tasks efficiently. There are several causes of low back pain. The most prevalent cause is muscle weakness and imbalance around low back. Especially because private security work often requires security guards to maintain a standing position for a long time, many of them are suffering from low back pain. This study pursued the following purposes. First, it tried to identify the pathogenesis of low back pain caused by muscle weakness and imbalance around low back. Second, it tried to provide private security guards, who can hardly have personal time at work, with an easy method to prevent and manage low back pain any time by researching an effective therapy for low back pain caused by muscle weakness and imbalance around low back.

  • PDF

A Study on the Survey for efficient Management of the Information Resource in Pubic Sector (공공부문의 효율적인 정보자원관리를 위한 조사 개선방안 연구)

  • Choi, Young-Jin;Ra, Jong-Hei
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.269-277
    • /
    • 2007
  • In this days, information resources are very important in the organization. So, firms and public department eager to management and use the information resources. Our country is surveyed on Information Resource status from 1997 in the public sector. Information Resource survey contributed to check the status. But, the survey has some weakness. thus we have to redesign the Information Resource survey. In this paper, we analyzed the IRM researches, checked the IR survey's weakness, and studied the improvement methods.

  • PDF

Effect of Hip Flexion and Internal Rotation on the Hip Abductor Muscle Activity During Side-Lying Hip Abduction in Subjects With Gluteus Medius Weakness

  • Park, Hye-jin;Cho, Sang-hyun
    • Physical Therapy Korea
    • /
    • v.23 no.3
    • /
    • pp.57-67
    • /
    • 2016
  • Background: Many previous studies recommended the side-lying hip abduction (SHA) exercise for targeting the gluteus medius (Gmed) and gluteus maximus (Gmax) muscle activity while the decreasing tensor fasciae latae (TFL) activation. Mischoice of hip position and angle in SHA may increase the risk of lower extremity injuries and undesirable muscle activation. However, information is limited on the effect of composite hip flexion angles and hip rotation on the gluteal muscle activity during SHA. Objects: This study aimed to compare muscle activity (Gmed, TFL, and Gmax) and activity ratios (Gmed/TFL, Gmax/TFL, and Gmed/Gmax) using surface electromyography (EMG) during SHA exercise at three different hip flexion angles either with or without internal rotation (IR) in subjects with Gmed weakness. We hypothesized that applying hip flexion and IR during SHA would increase gluteal muscle activity and decrease TFL activity. Methods: Muscle activity and activity ratios in 20 volunteers with Gmed weakness during 6 different SHA were investigated with surface EMG. One-way repeated-measures analysis of variance was used to determine the statistical significance. Results: Significant differences were found among the six different exercises for Gmed ($F_{2,41}=11.817$, p<.001) and Gmax ($F_{3,52}=5.513$, p=.003) muscle activity, and Gmed/TFL ($F_{3,54}=8.735$, p<.001) and Gmax/TFL ($F_{2,37}=4.019$, p=.028) activity ratios. Conclusion: Applying hip flexion is an effective method for increasing gluteal activity, and it elicits great Gmed/TFL and Gmax/TFL activity ratios during SHA in subjects with Gmed weakness.