• Title/Summary/Keyword: safety and security management

Search Result 735, Processing Time 0.03 seconds

A Study on AES-based Mutual Authentication Protocol for IoT Devices (사물인터넷 디바이스를 위한 AES 기반 상호인증 프로토콜)

  • Oh, Se-Jin;Lee, Seung-Woo
    • Journal of Industrial Convergence
    • /
    • v.18 no.5
    • /
    • pp.23-29
    • /
    • 2020
  • The Internet of things (IoT) is the extension of Internet connectivity into various devices and everyday objects. Embedded with electronics, Internet connectivity and other forms of hardware. The IoT poses significant risk to the entire digital ecosystem. This is because so many of these devices are designed without a built-in security system to keep them from being hijacked by hackers. This paper proposed a mutual authentication protocol for IoT Devices using symmetric-key algorithm. The proposed protocol use symmetric key cryptographic algorithm to securely encrypt data on radio channel. In addition, the secret key used for encryption is random number of devices that improves security by using variable secret keys. The proposed protocol blocked attacker and enabled legal deives to communicate because only authenticated devices transmit data by a mutual authentication protocol. Finally, our scheme is safe for attacks such as eavesdropping attack, location tracking, replay attack, spoofing attack and denial of service attack and we confirmed the safety by attack scenario.

A Study on Institutional Foundation on the Korea Counter-Terrorism System (한국 테러대응 시스템의 제도적 구축방안)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.27-61
    • /
    • 2010
  • This study looks at plans for the efficient functions of the current terror response system in Korea. The results are derived from by comparing and analyzing American, British, German, Japanese, and Korean terror response systems. It focuses especially on addressing some problems with Korea's terror response system and how to operate it effectively. The study will systematically compare and analyze each nation's terror countermeasure studying organizational, functional, and legal aspects as standards. This study shows that there is not an exclusive terror response center in Korea compared with other nations such as America, the United Kingdom, Germany, and Japan. Also it is difficult to expect effective and vigorous operations due to weak cooperation across the relevant organizations. The presidential directive of the state's anti-terrorism action guidelines is legally ineffective. This means that on legal grounds, it is difficult to take actions to prevent the terrorism. Therefore, keys to counteracting terrorism derived from this study are summarized below. In the first place, an integrated terror response system should be set up for expansion of information sharing which leads to emergence effect. In the second place, the superior legislative systems should be made for the cleardefinition and extent of what the terror is, rigid enforcement of investigation, immigration, and keeping an eye on the funds raised by terrorists and tracking down the terrorists, the plan for eco-terrorism. In the third place, to augment security of vital facilities and peoples' awareness of terrorism safety should be emphasized and a cooperative system between civil and government organizations need to be built. In the fourth place, system for crisis management must be provided in an effort to maximize management system of terrorism and unify a decentralized emergency countermeasures effectively.

  • PDF

A Study on the Principle of Application of Privacy by Design According to the Life Cycle of Pseudonymization Information (가명정보 생명주기에 따른 개인정보보호 중심 설계 적용 원칙에 관한 연구)

  • Kim, Dong-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.329-339
    • /
    • 2022
  • Recently, as personal information has been used as data, various new industries have been discovered, but cases of personal information leakage and misuse have occurred one after another due to insufficient systematic management system establishment. In addition, services that use personal information anonymously and anonymously have emerged since the enforcement of the Data 3 Act in August 2020, but personal information issues have arisen due to insufficient alias processing, safety measures for alias information processing, and insufficient hate expression. Therefore, this study proposed a new PbD principle that can be applied to the pseudonym information life cycle based on the Privacy by Design (PbD) principle proposed by Ann Cavoukian [1] of Canada to safely utilize personal information. In addition, the significance of the proposed method was confirmed through a survey of 30 experts related to personal information protection.

Present Condition of Theft Loss at Construction Sites and a Situation Analysis of Prevention Measures (건설현장 절도 피해실태와 예방대책의 현황분석)

  • Jang, Dong Hyeok;Kim, Han Soo;Nguyen, Tan Khoa;Jung, Sung Won
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.1
    • /
    • pp.64-73
    • /
    • 2015
  • The theft of construction equipments and materials at construction sites is one of the risk factors that may affect to the productivity as well as the progress of the project. However, managers of the construction site have paid little attention to the security measure, therefore the theft loss at construction sites has been occurred repeatedly every year. In this study the situation analysis has been carried out for the present condition of theft loss of construction equipments and materials as well as its prevention measure based on the questionnaire survey targeting field managers, experienced theft loss at the site, as a part of base study to set up a security measure of construction sites. The main content of this study is analyzing characteristics of theft loss and the degree of impact and risk by it at construction sites, then reviewing the direction of the prevention plan establishment for the future through the analysis of the importance and utilization level of prevention measures. The result of this study would give an opportunity to create an awareness against the theft loss at construction sites as well as can be utilized as a basic survey for the systematic development of concerned prevention measures.

Extracting of Interest Issues Related to Patient Medical Services for Small and Medium Hospital by SNS Big Data Text Mining and Social Networking (중소병원 환자의료서비스에 관한 관심 이슈 도출을 위한 SNS 빅 데이터 텍스트 마이닝과 사회적 연결망 적용)

  • Hwang, Sang Won
    • Korea Journal of Hospital Management
    • /
    • v.23 no.4
    • /
    • pp.26-39
    • /
    • 2018
  • Purposes: The purpose of this study is to analyze the issue of interest in patient medical service of small and medium hospitals using big data. Methods: The method of this study was implemented by data mining and social network using SNS big data. The analysis tool were extracted key keywords and analyzed correlation by using Textom, Ucinet6 and NetDraw program. Findings: In the results of frequency, the network-centered and closeness centrality analysis, It was shown that the government center is interested in the major explanations and evaluations of the technology, information, security, safety, cost and problems of small and medium hospitals, coping with infections, and actual involvement in bank settlement. And, were extracted care for disabilities such as pediatrics, dentistry, obstetrics and gynecology, dementia, nursing, the elderly, and rehabilitation. Practical Implications: Future studies will be more useful if analyzed the needs of customers for medical services in the metropolitan area and provinces may be different in the small and medium hospitals to be studied, further classification studies.

Factors Affecting the Quality of Social Network Service on User Satisfaction and Continuance Usage Intention (SNS 품질 특성이 사용자 만족도와 지속적 사용의도에 영향을 미치는 요인에 관한 연구)

  • Kim, Byung-Gon;Yoon, Il-Ki
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.1
    • /
    • pp.35-51
    • /
    • 2014
  • The popularity of Social Network Service (SNS) providing web sites has increased continuously by using a variety of mobile devices. The study results show that security of SNS, efficiency of SNS, safety, empathy of SNS quality, easy of use of SNS, assurance of SNS, service variety of SNS are having positive impact to some degree on the user satisfaction. Further, the user satisfaction of SNS users have a positive impact on the continuance usage intention of SNS users. This results show that various SNS qualities are necessary to actively explore and obtain further information that users intend to find, while they are insufficient in function to provide the information other users require or exchange information with other users through the SNS.

Effective Ship Security Audit and Training (효과적인 선박보안(ISPS)심사 및 교육에 관한 고찰)

  • Lee, Young-Sun
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2004.11a
    • /
    • pp.13-16
    • /
    • 2004
  • 2001년 9월 11일 미국에 대한 항공기 데러 이후 해상화물운송선박 및 항만시설에 대한 해상 테레에 대비하고자 IMO에서 "국제선박 및 항만시설보안 코드(ISPS Code)"를 제정 및 채택하여 2004년1월 1일부터 발효 중이다. 이와 관련하여 선박에서 이를 적용하기 위하여 해운선사에서는 많은 노력을 경주하였으며 보안시스템을 효과적으로 운영하는가에 대한 검증은 선박보안심사를 통하여 이루어지고 있다. 또한 보안시스템을 운영하고자 할 경우에는 회사보안책임자, 선박보안책임자 및 해상종사자에 대한 효과적인 사전교육이 반드시 필요한 실정이다. 따라서 향후 선박보안심사는 ISM 심사와의 차이를 고려하여 시스템의 이해 및 운영, 보안설비 정비, 보안사건 발생시 비상대응 및 시스템활동기록의 검증에 집중하여야 하며 ISM 심사와의 통합형태가 되어야 할 것이다. 또한 선박보안교육의 경우에는 교육기관을 통한 보안교육에만 의존할 것이 아니라 승선 전 및 승선 후 교육을 통하여 보안의식을 고양시키어야 한다.

  • PDF

Real-time Network Middleware Supporting Fault-Tolerant Operations for Personal Robot System

  • Choo, Seong-Ho;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.756-760
    • /
    • 2005
  • By development of a robot technology, personal robot is being developed very actively. Various infra-technologies are accumulated in hardware and software how by internal a lot of research and development efforts, and it is circumstance that actual commodity is announced. But, personal robot is applied to be acting near human, and takes charge of safety and connected directly a lot of works of home security, gas-leakage, fire-warning facilities, or/and etc. So personal robot must do safe and stable action even if any unexpected accidents are happened, important functions are always operated. In this paper, we are wished to show design structures for supporting fault-tolerant operation from our real-time robot middleware viewpoint. Personal robot, in being developed, was designed by module structure to do to interconnect and to interoperate among each module that is mutually implemented by each research facilities or company. Also, each modules can use appreciate network system that is fit for handling and communicating its data. To guarantee this, we have being developed a real-time network middleware, for especially personal robot. Recent our working is to add and to adjust some functions like connection management, distributed routing mechanism, remote object management, and making platform independent robot application execution environment with self-moving of robot application, for fault-tolerant personal robot.

  • PDF

Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations

  • Bui, Quy-Anh;Lee, Wei-Bin;Lee, Jung-San;Wu, Hsiao-Ling;Liu, Jo-Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.437-454
    • /
    • 2020
  • According to the privacy regulations of the health insurance portability and accountability act (HIPAA), patients' control over electronic health data is one of the major concern issues. Currently, remote access authorization is considered as the best solution to guarantee the patients' control over their health data. In this paper, a new biometric-based key management scheme is proposed to facilitate remote access authorization anytime and anywhere. First, patients and doctors can use their biometric information to verify the authenticity of communication partners through real-time video communication technology. Second, a safety channel is provided in delivering their access authorization and secret data between patient and doctor. In the designed scheme, the user's public key is authenticated by the corresponding biometric information without the help of public key infrastructure (PKI). Therefore, our proposed scheme does not have the costs of certificate storage, certificate delivery, and certificate revocation. In addition, the implementation time of our proposed system can be significantly reduced.

Analysis of Dental Care Clinic Visits and Causes of Tooth Injuries by Age and Sex (외상에 의한 치아손상의 연령 및 성별에 따른 의료이용분석)

  • Kim, Young-Hee;Bea, Sang-Sook
    • The Korean Journal of Health Service Management
    • /
    • v.14 no.1
    • /
    • pp.67-78
    • /
    • 2020
  • Objectives: Using data from the 1styear of the 7th National Health and Nutrition Survey, this study administered a questionnaire to patients with oral damage and examined the type of medical care used based on the nature of the injury, further characterized by age group and sex. Methods: Of the 8,150 respondents, this study selected those who participated in the health survey and oral exam survey, excluding surveys with missing values, and set 7,681 people as the research participants. This study used SPSS Windows version 23.0(SPSS Inc. IL, USA) as the statistics program and applied the chi-square test (p) based on a complex sample and logistic regression analysis. Results: In the analysis of the type of tooth damage, there was a significant difference (p<.001) in the number of male patients who were injured due to exercise, violence, and safety accidents compared to females. However, there was no significant difference in their type of medical security and whether or not they visited a dental clinic. The patients with private insurance showed relatively high use for tooth extraction and oral surgery (p<.001). Conclusions: The best way to prevent tooth damage is to prevent the accident. For sports or exercises which may cause tooth damage, protective gear, such as a mouthpiece, should be used to prevent tooth damage.