摘要:
Provided are a method and apparatus for determining a security solution. The method and apparatus generate a security solution analysis model for analyzing effects on investment of security solution combinations consisting of several security solution candidates on the basis of integer programming (IP), standardize various constraints that have significant effects on security solution determination on the basis of IP, and apply the standardized constraints to the security solution analysis model, thereby determining a security solution combination having the smallest residual risk while satisfying the constraints as an optimum security solution combination.According to the method and apparatus, an optimum security solution combination that can minimize a residual risk while satisfying various constraints is rapidly and accurately determined. Thus, it is possible to support effective determination in information security investment.
摘要:
Provided are an apparatus, system and method for blocking malicious code. The apparatus includes a first malicious code detector for determining whether or not a received e-mail includes malicious code, on the basis of previously stored malicious code patterns, a second malicious code detector for performing second malicious code detection on a received e-mail determined by the first malicious code detector not to include malicious code, a pattern extractor for extracting a new malicious code pattern from malicious code detected by the second malicious code detector, and a transceiver for transferring the extracted new malicious code pattern to a pattern providing server. According to the apparatus, system and method, when one terminal detects a new malicious code pattern, a pattern providing server rapidly provides the new malicious code pattern to other terminals, and thus it is possible to rapidly and flexibly cope with the spread of malicious codes having new patterns
摘要:
Provided is a method for enabling a user terminal to avoid exposure to a malicious code, by classifying web pages including a malicious code and blocking user access to the web pages including the malicious code when a user searches for a web page using a search engine. A method for managing malicious-code spreading sites using a search engine includes: analyzing a currently accessed web site to determine whether a malicious code is included in the web site; if the malicious code is included in the currently accessed web site, registering the web site as a malicious-code spreading site; and, if the web site registered as a malicious-code spreading site is included in a web-site search result from a search engine, blocking user access to the web site. Web pages including a malicious code are classified and user access to the web pages including the malicious code is blocked when a user searches for a web page using a search engine, thereby preventing a user terminal from being exposed to the malicious code.
摘要:
Provided are a web server vulnerability detecting device and method which detect vulnerability of a plurality of high-performance web servers in real-time using a plurality of search engines simultaneously and automatically provide the updated detailed information on detected vulnerability. The device includes: a web server examination module for requesting a plurality of different search engines to examine a file with a likelihood of vulnerability, in response to an input search word, and receiving from the search engines URLs of web servers on which the file with a likelihood of vulnerability is located; an optimal information collection module for optimizing the URLs of the web servers received from the search engines to obtain optimal information; a web server vulnerability detecting module for detecting vulnerability of a web server corresponding to the optimal information; and a vulnerability information collection module for collecting and providing the latest detailed information on the detected vulnerability.According to the device and method, damage caused by web server intrusions can be reduced, the vulnerability of web servers can be more precisely detected using a plurality of different search engines, and the updated latest detailed information can be provided.
摘要:
Provided is a web firewall for automatically checking for vulnerabilities, including: an administrating server scheduling part for ordering the examination of an administrating web server according to a predetermined examination schedule; a vulnerability search database calling part for calling a vulnerability search database previously stored according to the order of the administrating server scheduling part; a vulnerability searching part for searching for potential vulnerabilities of the administrating web server corresponding to data included in the called vulnerability search database; a vulnerability information deducing part for optimizing the results searched in the vulnerability searching part to deduce vulnerability information; a vulnerability checking part for checking the vulnerabilities of the administrating web server based on the results deduced from the vulnerability information deducing part; and a detailed vulnerability information reporting part for reporting detailed information on the checked vulnerabilities.
摘要:
The present invention relates to a garment. More specifically, a garment having a shape-transformable collar according to an embodiment of the present invention may comprise a body part and a collar, wherein the collar includes an upper collar and a collar band, and the upper collar and the collar band are formed to have different shapes, so as to enable transformation into various collar shapes through mutually corresponding coupling between a linear portion and a curved portion thereof. In particular, the curved portions of the upper collar and the collar band are formed to have different curvatures. However, the upper collar and the collar band are coupled to correspond to each other, so that the shape of the collar is stably maintained even when the collar is erected or laid down, whereby the present invention can have a fine appearance and also provide an excellent cold weather protection effect.