RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재후보
      • KCI등재

        사회공학적 공격에 대한 산업기술 보호방안

        허진아(Heo, Jin A),주성빈(Joo, Seong Bhin),이정민(Lee, Jung Min),박찬혁(Park, Chan Hyuk) 동국대학교 사회과학연구원 2016 사회과학연구 Vol.23 No.1

        이 연구는 특정행위를 하거나 기밀정보를 누설하도록 사람들을 조정하는 산업기술 유출방법인 ‘사회공학적 공격(social engineering attacks)’ 방법에 대하여 살펴보고자 한다. 사회공학적 공격방법은 기존의 산업기술 유출 방법과는 달리 산업기술 유출 주체가 컴퓨터 전문 지식을 갖추는 것보다는 신뢰할 수 있는 기관의 직원으로 사칭하거나 개인적인 친분이 있는 사람으로 가장하여 타인으로 하여금 자신의 목적을 달성시키기 위해 심리적인 측면을 악용하는 범죄유형이라고 볼 수 있다. 이는 보안시스템이 잘 갖춰진 기업이라 할지라도 이를 사용하는 주체도 사람이며, 사람의 취약성으로 인해 이러한 장치들이 무용지물이 될 수 있다는 점에서 심각한 기술유출 범죄 유형으로 부각되고 있는 것이다. 일반적으로 알려진 사회공학적 공격방법의 단계는 다음과 같다. 첫째는 정보수집(Information Gathering) 단계이다. 둘째는 관계형성(Development of Relationship) 단계로 1단계인 정보 수집 단계에서 공격자는 공격 대상과 관련된 다양한 정보들을 충분히 수집하였다고 판단할 경우 공격자는 이제 공격 대상과 직접적인 관계를 형성하기 위해 2단계인 관계 형성 단계로 발전하게 된다. 세 번째 단계인 공격(Exploitation)은 공격자가 수집한 다양한 정보들을 바탕으로 공격 대상과 충분한 신뢰감을 형성하였다고 판단 할 경우에 진행하게 된다. 마지막인 실행(Execution) 단계에서 공격 대상은 공격자가 요청한 사항에 대해 직접적인 실행으로 옮김으로써 이로 인해 실질적인 피해가 발생하게 된다. 이러한 사회공학적 공격방법에 의한 산업기술 유출상황에 대한 대응방안으로는 변화된 공격 패턴에 대한 인지 및 유형화, 취약성 감소 방안 마련, 수준별 대응방안의 마련을 들 수 있다. This study demonstrated that the social engineering is a technique depends greatly on the interaction among people which often includes others cheating for breaking the standard security procedures. The process of using social engineering is a way which doesn’t require any prior or deep knowledge of all computer techniques types, it depends on some of the psychological and social facts of people as well as it is one of the risks which directly cannot be expected. There are no complete systems to prevent the trickery operation from taking place. Today, social engineering that is considered the great security threat to people and organizations is one of the powerful attack method of the security industry. Social engineering is the art of tricking, luring or manipulating end-users to reveal his password or to divulge other valuable corporate information by appealing to their sense of social norms, with the aim of gaining access to one’s system. In other words, It is a technique in which an unauthorized person manages to pose as an insider or an authority to sucessfully get access to information or resources. This principal strategies of the social engineering can be summarized in four basic steps. First, To gather information. This can be information from public sources(phone book, web pages or previous other social engineering attacks etc.). this information will be used to develop a relationship with the target. Second, To develop a relationship(create rapport and trust etc.). Third, To exploit the relationship(reveal secret informations, passwords etc.). Fourth, execution for achievement of target. There are several steps a industrial circles should take to countermeasure the threat of social engineering. They are understand changes of ocial engineering attacks, reduce vulnerabilities by social engineering attacks and countermeasures per attacks level. Generally, you will find company penetration tests help the most vulnerable access points and to develop defenses to prevent confidential information from being stolen. We concluded that there are some basic guidelines to protect against social engineering.

      • 서울 지하철공사 발파공법의 표준화

        허진,Heo, Jin 한국기술사회 1983 技術士 Vol.16 No.3

        On the Seoul Metropolitan Subway Construction of No. 3, 4 Line, the total length is 57 Km and it is now undergoing almost 55% progress. The working method is classified into Open Cut of 70% and the rest of 30% tunnelling method in the 48 job site. Above tunnelling method is execute by American Steel Support System and the rest of 10 job site carried out by New Austria Tunnelling Method. This paper describes Blasting Standardizations works on the above Tunnelling ' Open Cut Method under big slogan, first safety, second execution. As a superintendent, I strived standardization of works with Better powder, Better Drills ' Better Pattern. Geological structure of Seoul area is composed by Jurassic Granite and also the above rockgroup are over burden by Alluviums as a Unconformity. First of all, I carried out the standard amount of powder and burden through experimental standard blasting by each powder as following Blasting works in the subway construction is surrounding shop Building, under pass the city river and also under pass highest building basement floor. I made allowable Blasting Vibration Value by West-Germany Vornorm DIN 4150, Teil 3 and should measure each blasting works as fellows all of powder is used basically Low-Gravity and Low Velocity such as Slurry, Ammonium Nitrate ' Finex I, II. for Smooth Blasting Instead of Gelatin Dynamite. Electric Detonation Cap is used basically M/S Delay Cup instead of Electric delay ' Simultaneous cap. I applied following formula V=KW3/4 $D^{-2}$ V=Particle Velocity (Cm/sec) K=Ginh Huh's Value W=Delay Charge (Kg) D=Distance(m) In the Open Cut, within 1m distance from H-pile I made to use the Concrete breaker, as following V=7W/$^{0.5}$V/$^{-1.75}$ On the Concentrate Building area, I advise to use Light class drill ø36m Bit and advance 1.1m per round blasting the three boom jumbo drill over ø45mm used only suburb of city.e Light class drill ø36m Bit and advance 1.1m per round blasting the three boom jumbo drill over ø45mm used only suburb of city.

      • 촉매제에 의한 연탄깨스 제거에 관한 연구

        허진,Heo, Jin 한국기술사회 1972 技術士 Vol.5 No.19

        1. Purposes and importances of the study. In gaining heating resources by combustion of briquette, which is the necessaries of every day's life, victims occur from poisonous affection of combustion gas (carbon mono-oxide) in every year and this gas attributable to increase death rate proportion to the high demand of briquette usage. It arise great problem ill point of national sanitation. Therefore, the study has a big aim to accomplish depressing CO gas or stimulating comlete combustion by both the methods of physical improvement of present combustion devices and chemical improvement by using V$_2$O$\sub$5/ catalyst to depress CO gas or fasten complete combustion Progress. Sucessful result of this study will not only to decrease the death rate but also to contribute fearless handling of briquette combustion so as to perform improving public Welfare. 2. Contents and scope of study. A. comparison of present and improved fuel hole device. B. Examination of effectness of improved elements. C. Effectness of miffed usage of catalyst. D. Comparison of Catalyst effectness. E. Examination of effectness of black slate containing V$_2$O$\sub$5/. 3. Results and recommendations of the study A. Absolute necessity of supplying secondary air by improved combustion device. B. Oxide Vanadium (V$_2$O$\sub$5/) has the greatest effectness to eliminate CO gas. C. Most effective catalyst of V$_2$O$\sub$5/ containing slate comes from "Samgoe" coal mine. D. By plastering catalyst on the cover plate of fire hole, it stimulate chemical reaction of re-combustion and preserving heat. E. Recommend to continute further precise study to practice with low-cost and handy devices to be applied the study results.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼