• Title/Summary/Keyword: strength of security

Search Result 281, Processing Time 0.026 seconds

The Effect of Veterans' Positive Psychological Capital on the Will to Re-employment (제대군인의 긍정심리자본이 재취업 의지에 미치는 영향 -정보보안관련업체 취업희망자를 중심으로-)

  • Kim Bo Ram;Hahn Jae Phil
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.101-108
    • /
    • 2023
  • Military organizations have stricter ranks than other organizations, and the age of retirement is lower than that of civil servants in other fields. In a rapidly changing society with a high unemployment rate, it is very important to prepare psychological resources for self-management by improving individual positive strengths throughout life, including job search activities. Various studies are being attempted on positive psychological capital, employment, and productivity that emphasize the strength of positive resources and, from this point of view, contribute to productivity improvement. In this study, the effect of the positive psychological capital of discharged soldiers on their will to re-employment was investigated through questionnaires targeting actual veterans. As a result, it is found that hope, self-efficacy, resilience, and optimism influenced the will to re-employment in the order.

A Study of DES(Data Encryption Standard) Property, Diagnosis and How to Apply Enhanced Symmetric Key Encryption Algorithm (DES(Data Encryption Standard) 속성 진단과 강화된 대칭키 암호 알고리즘 적용방법)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.85-90
    • /
    • 2012
  • DES is a 64-bit binary, and each block is divided into units of time are encrypted through an encryption algorithm. The same key as the symmetric algorithm for encryption and decryption algorithms are used. Conversely, when decryption keys, and some differences may apply. The key length of 64 bits are represented by two ten thousand an d two 56-bit is actually being used as the key remaining 8 bits are used as parity check bits. The 64-bit block and 56-bit encryption key that is based on a total of 16 times 16 modifier and spread through the chaos is completed. DES algorithm was chosen on the strength of the password is questionable because the most widely available commercially, but has been used. In addition to the basic DES algorithm adopted in the future in the field by a considerable period are expected to continue to take advantage of the DES algorithm effectively measures are expected to be in the field note.

Optical CBC Block Encryption Method using Free Space Parallel Processing of XOR Operations (XOR 연산의 자유 공간 병렬 처리를 이용한 광학적 CBC 블록 암호화 기법)

  • Gil, Sang Keun
    • Korean Journal of Optics and Photonics
    • /
    • v.24 no.5
    • /
    • pp.262-270
    • /
    • 2013
  • In this paper, we propose a modified optical CBC(Cipher Block Chaining) encryption method using optical XOR logic operations. The proposed method is optically implemented by using dual encoding and a free-space interconnected optical logic gate technique in order to process XOR operations in parallel. Also, we suggest a CBC encryption/decryption optical module which can be fabricated with simple optical architecture. The proposed method makes it possible to encrypt and decrypt vast two-dimensional data very quickly due to the fast optical parallel processing property, and provides more security strength than the conventional electronic CBC algorithm because of the longer security key with the two-dimensional array. Computer simulations show that the proposed method is very effective in CBC encryption processing and can be applied to even ECB(Electronic Code Book) mode and CFB(Cipher Feedback Block) mode.

A Study on Efficient Network Topology Visualization using Node Centrality (노드 중심성을 이용한 효율적 네트워크 토폴로지 시각화 연구)

  • Chang, Beom-Hwan;Ryu, Jemin;Kwon, Koohyung
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.47-56
    • /
    • 2021
  • Network topology visualization has been studied a lot since the past and developed with many tools. The network topology has strength in understanding the overall structure of a network physically and is useful for understanding data flow between nodes logically. Although there are existing tools, not many can be utilized efficiently while using the general network node data structure and express the topology similar to the actual network structure. In this paper, we propose an efficient method to visualize topology using only connection information of network nodes. The method finds the central node by using the centrality, the influence of nodes in the network, and visualizes the topology by dynamically segmenting all nodes and placing network nodes in 3D space using the weight of the child node. It is a straightforward method, yet it effectively visualizes in the form of an actual network structure.

Design and Implementation of Sinkhole Router based IP Tracing System (싱크홀 라우터 기반 IP 추적 시스템 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2733-2740
    • /
    • 2009
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhance its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. In this study, we proposed an advanced IP Tracing mechanism based on Bloom filter and Sinkhole routing mechanism. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the Tracing performance also can be enhanced compared with previously suggested mechanism.

The Long Distance Face Recognition using Multiple Distance Face Images Acquired from a Zoom Camera (줌 카메라를 통해 획득된 거리별 얼굴 영상을 이용한 원거리 얼굴 인식 기술)

  • Moon, Hae-Min;Pan, Sung Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1139-1145
    • /
    • 2014
  • User recognition technology, which identifies or verifies a certain individual is absolutely essential under robotic environments for intelligent services. The conventional face recognition algorithm using single distance face image as training images has a problem that face recognition rate decreases as distance increases. The face recognition algorithm using face images by actual distance as training images shows good performance but this has a problem that it requires user cooperation. This paper proposes the LDA-based long distance face recognition method which uses multiple distance face images from a zoom camera for training face images. The proposed face recognition technique generated better performance by average 7.8% than the technique using the existing single distance face image as training. Compared with the technique that used face images by distance as training, the performance fell average 8.0%. However, the proposed method has a strength that it spends less time and requires less cooperation to users when taking face images.

Developing an AR based Command Post eXercise(CPX) Simulator (증강현실 기반 지휘통제훈련 시뮬레이터 개발)

  • Park, Sangjun;Shin, Kyuyoung;Kim, Dongwook;Kim, Tai Hyo;Roh, Hyo Bin;Lee, Wonwoo
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.53-60
    • /
    • 2018
  • As science and technology develops, it is expected that more precise and various weapons will be used in a much more complicate future battlefield environment. C4I is a system that provides the proper and necessary information to commanders and their staffs to recognize the battlefield situation by connecting and visualizing the complex battlefield environment and various weapon systems together. Commanders and staffs perform battle command training based on a computer or paper map to better utilize the C4I system and Command Post eXercise(CPX) is a process of the training. This is the way for them to improve command control and decision making skills. Analyzing of line of sight(LOS), identifying communication fringe area, deploying troop strength, and determining unit maneuver are highly restricted under the 2D based CPX. In recent years, however, three-dimensional (3D) CPX simulators have been developed to overcome these drawbacks. In response to this trend, this paper proposes a multi-user based CPX simulator using augmented reality (AR) glass, which can be used as a practical war game simulator.

  • PDF

Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks (DDoS 공격 대응을 위한 Sinkhole 역추적 프로토콜 설계 및 구현)

  • Lee, Hyung-Woo;Kim, Tae-Su
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.85-98
    • /
    • 2010
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhancing its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. Therefore, advanced traceback and network management mechanism also should be necessary on All-IP network environments against DDoS attacks. In this study, we studied and proposed a new IP traceback mechanism on All-IP network environments based on existing SPIE and Sinkhole routing model when diverse DDoS attacks would be happen. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Proposed mechanism uses simplified and optimized memory for storing and memorizing the packet's hash value on bloom filter, with which we can find and determine the attacker's real location on open network. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the traceback performance also can be enhanced compared with previously suggested mechanism.

Relations between Physical and Mechanical Properties of Core Samples from the Bukpyeong and Pohang Basins (북평분지와 포항분지 시추코어의 물리적 성질과 역학적 성질간의 관계)

  • Kim, Hyunjin;Song, Insun;Chang, Chandong;Lee, Hikweon;Kim, Taehee
    • The Journal of Engineering Geology
    • /
    • v.23 no.4
    • /
    • pp.329-340
    • /
    • 2013
  • A geologic survey of the Bukpyeong and Pohang basins, as candidate basins for the geological storage of $CO_2$, was performed to evaluate storage capacity and security. To analyze the mechanical stability of the storage reservoir and cap rocks, we measured the porosity, seismic velocity, uniaxial strength, internal frictional angle, and Young's modulus of core samples recovered from the two basins. It is costly and sometimes impossible to conduct tests over the entire range of drill holes, and continuous logging data do not yield the mechanical parameters directly. In this study, to derive the mechanical properties of geologic formations from the geophysical logging data, we determined the empirical relations between the physical properties (seismic velocity, porosity, and dynamic modulus) and the mechanical properties (uniaxial strength, internal friction angle) of the core samples. From the comparison with our core test data, the best fits to the two basins were selected from the relations suggested in previous studies. The relations between uniaxial strength, Young's modulus, and porosity of samples from the Bukpyeong and Pohang basins are more consistent with certain rock types than with the locality of the basins. The relations between the physical and mechanical properties were used to estimate the mechanical rock properties of geologic formations from seismic logging data. We expect that the mechanical properties could also be used as input data for a modeling study to understand the mechanical instability of rock formations prior to $CO_2$ injection.

A study of the fresh properties of Recycled ready-mixed soil materials (RRMSM)

  • Huang, Wen-Ling;Wang, Her-Yung;Chen, Jheng-Hung
    • Computers and Concrete
    • /
    • v.17 no.6
    • /
    • pp.787-799
    • /
    • 2016
  • Climate anomalies in recent years, numerous natural disasters caused by landslides and a large amount of entrained sands and stones in Taiwan have created significant disasters and greater difficulties in subsequent reconstruction. How to respond to these problems efficaciously is an important issue. In this study, the sands and stones were doped with recycled materials (waste LCD glass sand, slag powder), and material was mixed for recycled ready-mixed soil. The study is based on security and economic principles, using flowability test to determine the water-binder ratio (W/B=2.4, 2.6, and 2.8), a fixed soil: sand ratio of 6:4 and a soil: sand: glass ratio of 6:2:2 as fine aggregate. Slag (at concentrations of 0%, 20%, and 40%) replaced the cement. The following tests were conducted: flowability, initial setting time, unit weight, drop-weight and compressive strength. The results show that the slump values are 220 -290 mm, the slump flow values are 460 -1030 mm, and the tube flow values are 240-590 mm, all conforming to the objectives of the design. The initial setting times are 945-1695 min. The unit weight deviations are 0.1-0.6%. The three groups of mixtures conform to the specification, being below 7.6 cm in the drop-weight test. In the compressive strength test, the water-binder ratios for 2.4 are optimal ($13.78-17.84kgf/cm^2$). The results show that Recycled ready-mixed soil materials (RRMSM) possesses excellent flowability. The other properties, applied to backfill engineering, can effectively save costs and are conducive to environmental protection.