• 제목/요약/키워드: social security information system

검색결과 347건 처리시간 0.031초

무기체계 운용시험평가 개선전략 도출 및 우선순위 결정 (A Study on the Strategy for Improvement of Operational Test and Evaluation of Weapon System and the Determination of Priority)

  • 이강경;김금률;윤상돈;설현주
    • 융합보안논문지
    • /
    • 제21권1호
    • /
    • pp.177-189
    • /
    • 2021
  • 국방 연구개발은 변화하는 미래 전장환경에 대응하기 위해 중·장기 소요로 결정된 무기체계를 확보하기 위한 핵심과정이다. 특히 시험평가는 무기체계 연구개발의 마지막 관문으로서 전력화 전환여부를 결정하는데 필요한 정보를 제공해주고 무기체계의 수명주기와 연계된 성능보장을 위해서도 중요한 역할을 수행한다. 한편 최근 한반도 작전환경 및 국방 획득환경의 변화를 살펴보면, 크게 3가지 특징을 확인할 수 있다. 먼저 무기체계 전력화 운용시 지속적인 안전사고가 발생하여 전투원 안전에 대한 사회적 관심이 증대되었고, 획득비용의 증가에 따라 한정된 국방예산의 효율적 집행이 요구되고 있다. 또한 로봇·자율무기체계(RAS), 사이버 보안 시험평가 등 미래 전장환경에 대응하기 위한 전략적 접근이 필요하다. 따라서 본 연구에서는 최근 변화된 안보환경의 특징을 고찰하여 무기체계 운용시험평가의 개선전략을 제시하고자 한다. 이를 위해 현행 무기체계 운용시험평가 시스템의 보완소요를 다차원 모형으로 분석하여 개선전략을 도출하였고 계층적 분석기법(AHP)을 통해 우선순위를 결정하였다.

하둡 분산 파일 시스템에서 그룹키 기반 Permission Management 시스템 설계 (A Design of Permission Management System Based on Group Key in Hadoop Distributed File System)

  • 김형주;강정호;유한나;전문석
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제4권4호
    • /
    • pp.141-146
    • /
    • 2015
  • 최근 스마트 기기 및 소셜 네트워크 서비스, 스트리밍 서비스 등 IT 기술의 발달로 인해 데이터가 급증하였다. 이러한 환경에 맞춰 대용량 데이터를 처리할 수 있는 기술도 함께 주목받고 있는데, 가장 대표적인 기술이 하둡이다. 하둡은 오픈 소스 기반으로 리눅스 기반의 범용 컴퓨터에서 실행할 수 있도록 설계되었다. 초기 하둡은 보안이 거의 도입되지 않았으나, 사용자가 늘어남에 따라 보안이 필요한 데이터가 증가하면서 2009년 커버로스와 토큰 시스템을 도입한 새로운 버전이 나왔다. 그러나 이 방식은 하나의 비밀키만을 사용하고, 사용자마다 블록에 대한 접근허가를 지정할 수 없다는 문제점과 재전송 공격 및 위장 공격 등이 가능하다는 취약점을 가지고 있다. 따라서 본 논문에서는 이러한 취약점을 보안하면서 성능을 유지하기 위해 사용자들을 논리적인 그룹으로 묶어서 인증하고, 이를 토큰에 반영하는 그룹키 기반의 프로토콜을 제안하였다. 성능평가 결과 키 생성에 따른 오버헤드가 없고, 비밀키 유출에 대한 취약점을 해결하였음을 확인하였다.

불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로- (Digital forensic framework for illegal footage -Focused On Android Smartphone-)

  • 김종만;이상진
    • 디지털포렌식연구
    • /
    • 제12권3호
    • /
    • pp.39-54
    • /
    • 2018
  • 최근 불법촬영 사건 근절을 위한 논의가 사회 각 분야에서 이루어지고 있다. 수사기관과 정부 관계부처에서도 불법촬영과 같은 사이버 성폭력 범죄 근절을 위한 종합대책을 수립하고, 핵심과제를 선정하여 추진하고 있다. 학계에서도 사이버 성폭력 처벌법을 정비해서라도 범죄자들에 대한 처벌을 강화해야 한다는 연구를 발표하고 있다. 이렇듯 불법촬영 사건에 대한 사회적인 관심이 높아지고 있으나, 현장수사관과 전문분석관은 불법촬영물 은닉 어플리케이션(앱)들이 마켓과 커뮤니티 사이트를 중심으로 끊임없이 유포되고 있어 증거 수집과 분석에 많은 어려움을 겪고 있는 실정이다. 본 논문은 폭발적으로 늘어나고 있는 불법촬영 사건 수사에 실질적인 도움을 주기 위해 불법촬영 사건의 증거 수집 및 분석 프레임워크를 제안하였다. 또한 증거 수집 및 분석에 있어, 주요 방해 요인 중 하나인 무음 및 은닉앱을 탐지할 수 있는 시스템을 제안하였다. 탐지 시스템의 실효성을 평가하기 위해 탐지 도구를 함께 개발하였으며, 상용 은닉앱을 사용해 탐지 시스템의 실효성과 확장 가능성을 확인하였다.

Innovative Educational Technologies in Management Training: Experience of EU Countries

  • Vitaliy, Kryvoshein;Nataliia, Vdovenko;Ievgen, Buriak;Volodymyr, Saienko;Anna, Kolesnyk
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.45-50
    • /
    • 2022
  • The article substantiates the feasibility of using and actively implementing innovative technologies in the practice of organizing the educational process. The need for the use of telecommunication technologies, which provide constant communication between students and the teacher outside the classroom, has been identified. Particular attention is paid to the latest approaches to the use of various forms of multimedia technologies in student education, which intensify the process of acceptance and assimilation of educational material by foreign students. The advantages of using innovative means of distance education are determined, which thanks to modern electronic educational systems allow students to receive quality higher education. Innovative technologies promote the development of cognitive interest in students, they learn to systematize and summarize the material studied, discuss and debate. In this regard, the reorientation of the system of higher education in Europe towards innovation is becoming the most important tool in ensuring the competitiveness of graduates in the labor market. In addition, the investment attractiveness of a university often depends on the innovative nature of the development of scientific, educational and practical activities of the subjects of the educational process, their inclusion in the national innovation system. The article analyzes that in the universities of the European Union in the training of specialists in the management of basic interactive methods, forms and tools are binary lecture, briefing, webinar, video conference, video lecture, virtual consultation, virtual tutorial, slide lecture, comp. utheric tests. Various classes on slide technology took active forms during the training of management specialists.

협업 및 콘텐츠 공유를 위한 XMPP기반 차량용 메시징 시스템 (XMPP-based Vehicle messaging System for Collaboration and Contents Sharing)

  • 정헌;박해우;구자효
    • 한국정보컨버전스학회논문지
    • /
    • 제5권2호
    • /
    • pp.67-76
    • /
    • 2012
  • XML 기반의 오픈 프로토콜인 XMPP는 사용자가 다른 사용자에게 메시지를 전달할 수 있음을 의미하는 분산화 된 통신 네트워크이자 이를 가능하게 하는 네트워크 인프라라고 할 수 있다. 또한, XMPP 서버는 전문 서버 투 서버 프로토콜을 사용하여 서로 통신할 수 있으며, 분산화 된 소셜 네트워크와 협업 프레임워크에 중요한 가능성을 제공한다. 따라서 본 논문에서는 XMPP 메시지 프로토콜의 특징을 차량용 텔레매틱스 단말기에 적용 가능한 XMPP 기반 플랫폼을 설계하고, 양방향 통신을 위한 지점의 프레전스 문제, 지점 간 세션 설정 문제, 보안문제, 호환성 문제, 확장성 문제를 해결하기 위한 XMPP 기반 메시징 시스템을 구현하였다.

  • PDF

Integrated Management Systems - Theoretical and Practical Implications

  • Eriksson, Henrik;Hansson, Jonas
    • International Journal of Quality Innovation
    • /
    • 제7권2호
    • /
    • pp.69-82
    • /
    • 2006
  • Organisations worldwide strive to develop their management systems for business functions, ranging from quality and environment to safety, information security and social responsibility. During the latest decade a considerable amount of these efforts has been concentrated on introducing and applying standards such as the ISO 9001 and ISO 14001. The need for Integrated Management Systems (IMS) often arises as a result of decisions to implement Environmental Management System (EMS) and/or an occupational health and safety management system in addition to a Quality Management System (QMS). At the end of 2003, approximately 3200 organisations in Sweden had an ISO 9001 certificate, and approximately 3400 organisations had a certificate based on an EMS. Dealing with separate management systems and ensuring that they align with the organisation's strategies and goals, has proved difficult. Owing to the large number of organisations certified according to multiple types of systems, an increasing number of organisations are establishing IMS. There are examples of companies, which chose to integrate EMS and QMS into a co-ordinated implementation approach, and although sparse, the research within this area indicates potential benefits of using an integrated approach. This paper presents both a theoretical and an empirical investigation with the aim to elucidate problems related to the integration of management systems. Furthermore, the paper will present recommendations for succeeding in such integrations and, hence, contributing to an increased understanding on how IMSs should be designed and implemented.

해외근무(海外覲務) 기업체(企業體)에 대(對)한 테러 방지책(防止策) - 최근(最近) 소수민족분리주의운동지역(小數民族分離主義運動地域)을 중심(中心)으로 - (The Preventive Measures On Terrorism Against Overseas Korean Businessmen(A view of recent ethnic minority separation movement))

  • 최윤수
    • 시큐리티연구
    • /
    • 제1호
    • /
    • pp.351-370
    • /
    • 1997
  • This study concerns possible measures to prevent separatists' terrorist acts against overseas Korean businessmen. Of late, many Korean enterprises are helping a number of foreign countries develop their economy, by building factories and manning regional offices in those countries. But recent development of terrorism especially against Korean businessmen is alarming. This report discusses the need for Korean enterprises heading overseas to prepare themselves with awareness of terrorism and possible protective measures against it, besides their routine pursuance of profits; and for the government and prospective enterprises to refrain from investing in those countries having active separatist movements. If an investment has become inevitable, a careful survey of the region in conflict should be conducted and self-protective measures should be put in place through security information exchange, emergency coordination and training of personnel, etc. This study will first review the past terrorist incidents involving employees of overseas Korean enterprises, and then will focuss on seeking effective measures on the basis of the reported incidents. In carrying out the study, related literature from both home and abroad have been used along with the preliminary materials reported and known on the Internet from recent incidents. 1. The separatist movements of minority groups Lately, minority separatist groups are increasingly resorting to terrorism to draw international attention with the political aim of gaining extended self rule or independence. 2. The state of terrorism against overseas Korean enterprises and Koreans Korean enterprises are now operating businesses, and having their own personnel stationed, in 85 countries including those in South East Asia and Middle East regions. In Sri Lanka, where a Korean enterprise recently became a target of terrorist bombing, there are 75 business firms from Korea and some 700 Korean employees are stationed as of August 1996. A total of 19 different terrorist incidents have taken place against Koreans abroad since 1990. 3. Terrorism preventive measures Terrorism preventive measures are discussed in two ways: measures by the government and by the enterprises. ${\blacktriangleleft}$ Measures by the government - Possible measures at governmental level can include collection and dissemination of terrorist activity information. Emphasis should be given to the information on North Korean activities in particular. ${\blacktriangleleft}$ Measures by individual enterprises - Organizational security plan must be established by individual enterprises and there should also be an increase of security budget. A reason for reluctant effort toward positive security plan is the perception that the security budget is not immediately linked to an increment of profit gain. Ensuring safety for overseas personnel is a fundamental obligation of an enterprise. Consultation and information exchange on security plan, and an emergency support system at a threat to security must be sought after and implemented. 4. Conclusion Today's terrorism varies widely depending on reasons and causes, and its means has become increasingly informationalized and scientific as well while its method is becoming more clandestine and violent. Terrorist organizations are increasingly aiming at enterprises for acquisition of budgets needed for their activities. Korean enterprises have extended their business realm to foreign countries since 1970, exposing themselves to terrorism. Enterprises and their employees, therefore, should establish their own security measures on the one hand while the government must provide general measures, on the other, for the protection of the life and property of Korean residents abroad from terrorist attacks. In this regard, set-up of a counter terrorist organization that coordinates the efforts of government authorities in various levels in planning and executing counter terrorist measures is desired. Since 1965, when the hostile North Korea began to step up its terrorist activities against South Koreans, there have been 7 different occasions of assassination attempt on South Korean presidents and some 500 cases of various kidnappings and attempted kidnappings. North Korea, nervous over the continued economic growth and social stabilization of South Korea, is now concentrating its efforts in the destruction and deterioration of the national power of South Korea for its earlier realization of reunification by force. The possibility of North Korean terrorism can be divided into external terrorist acts and internal terrorist acts depending on the nationality of the terrorists it uses. The external terrorist acts include those committed directly by North Korean agents in South Korea and abroad and those committed by dissident Koreans, hired Korean residents, or international professionals or independent international terrorists bought or instigated by North Korea. To protect the life and property of Korean enterprises and their employees abroad from the threat of terrorism, the government's administrative support and the organizational efforts of enterprises should necessarily be directed toward the planning of proper security measures and training of employees. Also, proper actions should be taken against possible terrorist acts toward Korean business employees abroad as long as there are ongoing hostilities from minority groups against their governments.

  • PDF

항쟁의 에토스와 공동체 1980년 5월 광주의 마음을 찾아서 (The Ethos of Uprising and the Community Searching for the Heart of May 18th in Gwangju)

  • 박경섭
    • 한국언론정보학보
    • /
    • 제71권
    • /
    • pp.33-51
    • /
    • 2015
  • 근래에 한국에서는 마을 만들기와 공동체 사업이 지역과 마을에서 중요한 이슈가 되고 있다. 사업과 프로젝트로 건축되거나 조성될 공동체는 사회의 불평등, 복지, 건강 등의 사회문제에 대한 묘약처럼 보인다. 하지만 이러한 공동체 담론과 실천들은 국가의 역할과 기능을 사회가 나누어 짊어지는 선한 거버넌스(good governance)이면서 권력이 사회를 관리하고 조절하는 신자유주의적 통치 테크놀로지이기도 하다. 공동체의 역설이라고도 부를 수 있는 이러한 상황에 대한 성찰은 한국 사회에서 공동체에 대한 근본적 질문을 던지고 있는 1980년 5월 광주의 어떤 공동체(whatever community)에 대한 이해와 무관하지 않다. 이 글에서는 공동체의 몸과 마음을 드러내는 광주민중항쟁과 관련된 사료에 대한 분석을 통해 광주민중항쟁의 에토스를 살펴보고 공동체를 다시 문제화하고자 한다. 공동체에 대한 기획과 실천에서 중요한 요소인 주민과 시민의 자발성과 참여, 나눔과 소통은 공동체 구성과 연관된 마음과 몸의 문제이기도 하다. 최근 공동체에 대한 논의에서 누락되어 있는 해방과 자유의 문제 또한 5월 광주의 어떤 공동체가 던지는 질문 중 하나다.

  • PDF

Hate Speech Detection Using Modified Principal Component Analysis and Enhanced Convolution Neural Network on Twitter Dataset

  • Majed, Alowaidi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.112-119
    • /
    • 2023
  • Traditionally used for networking computers and communications, the Internet has been evolving from the beginning. Internet is the backbone for many things on the web including social media. The concept of social networking which started in the early 1990s has also been growing with the internet. Social Networking Sites (SNSs) sprung and stayed back to an important element of internet usage mainly due to the services or provisions they allow on the web. Twitter and Facebook have become the primary means by which most individuals keep in touch with others and carry on substantive conversations. These sites allow the posting of photos, videos and support audio and video storage on the sites which can be shared amongst users. Although an attractive option, these provisions have also culminated in issues for these sites like posting offensive material. Though not always, users of SNSs have their share in promoting hate by their words or speeches which is difficult to be curtailed after being uploaded in the media. Hence, this article outlines a process for extracting user reviews from the Twitter corpus in order to identify instances of hate speech. Through the use of MPCA (Modified Principal Component Analysis) and ECNN, we are able to identify instances of hate speech in the text (Enhanced Convolutional Neural Network). With the use of NLP, a fully autonomous system for assessing syntax and meaning can be established (NLP). There is a strong emphasis on pre-processing, feature extraction, and classification. Cleansing the text by removing extra spaces, punctuation, and stop words is what normalization is all about. In the process of extracting features, these features that have already been processed are used. During the feature extraction process, the MPCA algorithm is used. It takes a set of related features and pulls out the ones that tell us the most about the dataset we give itThe proposed categorization method is then put forth as a means of detecting instances of hate speech or abusive language. It is argued that ECNN is superior to other methods for identifying hateful content online. It can take in massive amounts of data and quickly return accurate results, especially for larger datasets. As a result, the proposed MPCA+ECNN algorithm improves not only the F-measure values, but also the accuracy, precision, and recall.

Normative-Legal and Information Security of Socio-Political Processes in Ukraine: a Comparative Aspect

  • Goshovska, Valentyna;Danylenko, Lydiia;Chukhrai, Ihor;Chukhrai, Nataliia;Kononenko, Pavlo
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.57-66
    • /
    • 2022
  • The aim of the article is to investigate socio-political processes in Ukraine on the basis of institutional and behavioral approaches, in particular their regulatory and informational support. Methodology. To determine the nature and content of sociopolitical processes, the following approaches have been used: 1. Institutional approach in order to analyze the development of Ukraine's political institutions. 2. The behavioral approach has been used for the analysis of socio-political processes in Ukraine in the context of political behavior of citizens, their political activity which forms the political culture of the country. Results. The general features of the socio-political situation in Ukraine are as follows: the formed model of government, which can be conditionally described as "presidential"; public demand for new leaders remains at a high level; the society has no common vision of further development; significant tendency of reduction of real incomes of a significant part of the society and strengthening of fiscal pressure on businessmen will get a public response after some time. Increasing levels of voice, accountability, efficiency of governance and the quality of the regulatory environment indicate a slow change in the political system, which will have a positive impact on public sentiment in the future. At the same time, there has been little change in the quality of Ukraine's institutions to ensure political stability, the rule of law and control of corruption. There are no cardinal changes in the development of the institution of property rights, protection of intellectual rights, changes in the sphere of ethics and control of corruption. Thus, Ukraine's political institutions have not been able to bring about any change in the social-political processes. Accordingly, an average level of trust and confidence of citizens in political institutions and negative public sentiment regarding their perception and future change can be traced in Ukraine.