• Title/Summary/Keyword: privilege

Search Result 200, Processing Time 0.024 seconds

Analysis of Demand-Supply Status for Improving the Effectiveness of Plans for Supply and Demand of Reginal Patient Beds (지역병상수급계획 실효성 제고를 위한 수요공급 현황 분석)

  • Jeong Min Yang;Jae Hyun Kim
    • Health Policy and Management
    • /
    • v.33 no.4
    • /
    • pp.411-420
    • /
    • 2023
  • Background: The purpose of this study was to analyze the demand and supply status of patient beds by type of medical institution, categorized into 70 clinical privilege, in order to understand the regional bed supply situation. Methods: Utilizing the 70 clinical privilege defined by the Ministry of Health and Welfare, we calculated bed demand and supply quantities from 2019 to 2021 using data from Statistics Korea and the Health Insurance Statistical Yearbook. The bed demand calculation formula was based on the detailed guidelines for the medical sector by the Korea Development Institute and the 3rd edition of bed supply basic policies announced by the Ministry of Health and Welfare. Additionally, to mitigate distorted bed supply situations caused by factors such as regional levels and patient outflows, we classified bed supply types using the population decrease index indicator published by the Ministry of Public Administration and Security. Results: Among the 70 clinical privilege, it was analyzed that a relatively balanced bed supply situation exists overall, irrespective of the type of healthcare institution. However, in medical institutions at or above the level of hospitals, regions with bed supply ratios exceeding 20% compared to demand, particularly in institutions at or above the level of general hospitals, showed a relatively high rate of demand diversion. Conclusion: We have identified the bed supply types in the 70 clinical privilege in South Korea. Based on the results of this study, we emphasize the need for bed supply policies that consider regional characteristics. It is expected that this research can serve as fundamental data for future efforts aimed at managing or rectifying bed supply imbalances on a regional basis.

A Study on Impersonation Attack of Linux Sudoers Through Shadow File Manipulation (Shadow 파일 조작을 통한 리눅스 Sudoer의 위장공격에 대한 연구)

  • Kim, Sanghun;Cho, Taenam
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.149-156
    • /
    • 2020
  • All operating systems have privileged administrator accounts for efficient management. Dangerous or sensitive tasks or resources should be banned from normal users and should only be accessible by administrators. One example of this privilege is to reset a user's password when the user loses his/her password. In this paper, the privileges of the sudoer group, the administrator group of Linux Ubuntu, and the management system of the sudoer group were analyzed. We show the danger that a sudoer can use the privilege to change the password of other users, including other sudoers, and modify the log, and suggest a countermeasure to prevent the manipulation of shadow files as a solution to this. In addition, the proposed method was implemented and the possibility of practical use was confirmed with excellent performance.

A Study of Security Checks for Android Least Privilege - focusing on mobile financial services - (모바일 앱 최소권한 사전검증에 관한 연구 - 금융, 안드로이드 운영체제 중심으로 -)

  • Cho, Byung-chul;Choi, Jin-young
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.91-99
    • /
    • 2016
  • A security system in Android OS adopts sandbox and an permission model. In particular, the permission model operates the confirmation of installation time and all-or-nothing policy. Accordingly, the Android OS requires a user agreement for permission when installing an application, however there is very low level of user awareness for the permission. In this paper, the current status of permission requirement within mobile apps will be discovered, and the key inspection list with an appropriate method, when a mobile service provider autonomously inspects the violation of least privilege around financial companies, and its usefulness will be explored.

DroidSecure: A Technique to Mitigate Privilege Escalation in Android Application (DroidSecure: 안드로이드 어플리케이션 권한 상승 완화를 위한 기술에 대한 연구)

  • Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.169-176
    • /
    • 2016
  • Android platform is designed to be user-friendly, yet sometimes its convenience introduces vulnerabilities that normal users cannot justify. In this paper, after making an overview of popular open source analysis tools for android applications, we point out the dangerous use of Permission Group in current Google Policy, and suggest a technique to mitigate the risks of privilege escalation that attackers are taking advantage of. By conducting the investigation of 21,064 malware samples, we conclude that the proposed technique is considered effective in detecting insecure application update, as well as giving users the heads-up in security awareness.

Performance Improvement of Infusion Detection System based on Hidden Markov Model through Privilege Flows Modeling (권한이동 모델링을 통한 은닉 마르코프 모델 기반 침입탐지 시스템의 성능 향상)

  • 박혁장;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.674-684
    • /
    • 2002
  • Anomaly detection techniques have teen devised to address the limitations of misuse detection approach for intrusion detection. An HMM is a useful tool to model sequence information whose generation mechanism is not observable and is an optimal modeling technique to minimize false-positive error and to maximize detection rate, However, HMM has the short-coming of login training time. This paper proposes an effective HMM-based IDS that improves the modeling time and performance by only considering the events of privilege flows based on the domain knowledge of attacks. Experimental results show that training with the proposed method is significantly faster than the conventional method trained with all data, as well as no loss of recognition performance.

A Modeling of Role Based Access Privileges for Separation of Duties (의무 분리를 위한 직무 기반 접근권한의 모델링)

  • Cheon, Eun-Hong;Kim, Dong-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.7
    • /
    • pp.1801-1812
    • /
    • 1998
  • 기존의 접근 제어 메커니즘인 강제적 접근 제어와 임의적 접근 제어는 무결성을 요구하는 상용 환경의 정보 보안에는 부족하여 이의 대안으로 직무 기반 접근 제어 (RBAC:Role Based Access Control)가 주목 받고 있으며, 직무를 수행하는 사용자의 의무 분리(Separation of Duty)에 대한 연구가 최근 이루어지고 있다. RBAC에서 사용자는 직무에 배정된 접근권한(Privilege) 만을 수행하여야 하는데 상호 배타적(Mutual exclusive)특성을 갖는 직무는 표현 및 접근 권한의 직무 배정과 수행에 있어서 어려움이 있다. 본 논문에서는 RBAC의 기본 특성을 분석하여 직무에 접근권한을 부여하고 사용자를 직무에 배정하는데 따른 안전한 접근 제어를 위하여 반순서 관계를 갖는 직무의 승계 속성에 따라 직무의 계층 형태를 분류하고, 직무에 배정되는 접근권한의 표현과 관리를 용이하게 하기 위하여 객체에 부여된 객체 접근권한을 분석하여 방향성 그래프를 이용하여 기본 접근권한으로 모델링한다. 접근권한 그래프(Privilege Graph)로 표현된 기본 접근권한에 직무를 배정하면 상호 배타적 직무의 접근권한과 의무 분리의 표현 및 관리를 용이하게 할 수 있다. 이를 기반으로 의무 분리를 포함한 RBAC의 안정성 특성과 접근권한 그래프를 이용한 직무의 의무 분리를 위한 직무 관리 알고리즘을 제시한다.

  • PDF

The Relation between Narcissism and Alienations (자기애적 성격성향과 소외감과의 관계)

  • CHA, Ta-Soon
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.14 no.1
    • /
    • pp.27-42
    • /
    • 2002
  • The psychiatry features of narcissism are molded by the outcome of a mismatch or lack of tension between the realistic self and the ideal self, and it is related to the problems of alienation. That is, the problems of alienation lead to the outcome of a mismatch between the realistic self and the ideal self by the unindividuality which lose a senses of the reality in all every things, and it make man to even more to give up the realistic self and to be alive powerlessness living. In this views, this study examined the relationship between narcissism and alienations or subfactors, and the concrete subscale of the Narcissistic Personality Scale which had a influence on the alienations to experientially investigate the relation between narcissism and alienations. Juveniles were administered both the Narcissistic Personality Scale and the Alienations Scale. The results showed a positive relationship between narcissism and alienations, and the alienations was influenced of the self-centeredness and the exploitation/Privilege subscale of the Narcissistic Personality Scale. Therefore, narcissists feel alienations too much, and the more a person has self-centeredness and exploitation/Privilege of narcissistic traits, the higher alienations is.

Consumers' Narcissistic Orientation and Apparel Products Benefits Sought (소비자의 나르시시즘성향과 의류제품추구혜택)

  • Hwang, Yeon-Soon;Ku, Yang-Suk
    • Fashion & Textile Research Journal
    • /
    • v.12 no.3
    • /
    • pp.338-346
    • /
    • 2010
  • The primary purpose of this study was to investigate consumers' narcissistic orientation group and apparel products benefits sought. The data were collected from 272 female consumers in Pusan, Daegu and Ulsan. The aforementioned were analyzed utilizing frequency, factor analysis, cluster analysis, MANOVA using SPSS Win 12.0. The results were as follows. First, cluster analysis on narcissism orientation identified four groups such as non-narcissism group, high narcissism group, privilege conscious group and achievable desire conscious group. Second, the groups related to their apparel products benefits sought were high narcissism group and privilege conscious group. There were significantly differences between the groups and apparel products benefits sought such as social prestige, impressive improvement and personality.