• Title/Summary/Keyword: 개인 컴퓨터 보안

Search Result 494, Processing Time 0.03 seconds

Sender Authentication Mechanism based on SW Security Card with PGP for Secure E-mail (SW 형태의 보안카드와 PGP 기반 안전한 E-mail 송신자 인증 기법)

  • Lee, Hyung-Woo
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.3
    • /
    • pp.57-66
    • /
    • 2007
  • E-mail system is considered as a most important communication media, which can be used to transmit personal information by internet. But e-mail attack also has been increased by spoofing e-mail sender address. Therefore, this work proposes sender verification faculty for spam mail protection at sender's MTA by using security card for protection forged sender and also for authenticating legal sender. Sender's mail MT A requests security card's code number to sender. Then sender input code number and generate session key after sender verification. Session key is used to encrypt sender's signature and secure message transmission. This work can provide efficient and secure e-mail sender authentication with sender verification and message encryption.

  • PDF

The Study on Searching Algorithm of the center of Pupil for the Iris Recognition (홍채 인식을 위한 동공 중심점 탐색 알고리즘에 관한 연구)

  • Cho, Meen-Hwan;Hur, Jung-Youn
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.19-25
    • /
    • 2006
  • Iris recognition is a bio metric personal identification which uses iris pattern of the pupil, and it is recognized as one of the best technology in personal identification and information security field. Before iris recognition, it is very important to search center of pupil. In recent years, there was developed many searching algorithms of center of pupil, but all most method are too many processing time. In this paper, we proposed a new method for searching center of pupil. This method is greatly reduced processing time about 30% compared with other algorithm using Hough transformation.

  • PDF

Analysis and Considerations for a Vulnerability of SSL/TLS Transmission Interval on Smartphones (스마트폰에서의 SSL/TLS 전송구간 취약점 분석 및 고찰)

  • Kang, Won Min;Jeong, Hwa Young;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.890-891
    • /
    • 2013
  • 인터넷이 발달함에 따라 사용자들은 웹에서 여러 가지 일의 처리가 가능하게 되었다. 최근에는 휴대폰의 성능과 기능이 발달하고 스마트폰의 보급이 급속히 확산되면서 스마트폰을 사용하여 많은 양의 데이터들의 전달이 이루어지고 있다. 이러한 처리 과정에서 개인 및 기업정보들이 유출될 수 있는 위험이 증가하고, 스마트폰과 클라이언트 사이에서의 개인, 기밀 정보가 SSL (Secure Sockets Layer) 또는 TLS (Transport Layer Security)프로토콜을 통해 암호화 되어 전송 되어도 프록시 서버에서 인증서 변조를 통하여 유출될 가능성이 점점 높아지고 있다. 본 논문에서는 스마트폰 상의 안전한 통신을 위해 많이 이용되는 SSL/TLS의 전송구간에 대한 취약점 분석 등 보안 이슈와 연구 방향에 대해 논의한다.

Security Reinforcement Technics against WDA in Mobile Communication System (이동통신 시스템에서의 WDA에 따른 보안 강화 기법)

  • Kim, Young Seok;Shim, Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1090-1093
    • /
    • 2010
  • 인터넷의 급격한 발전과 이용자의 증가로 인터넷은 이미 우리 사회에서 없어서는 안 될 중요한 요소가 되었다. 이러한 인터넷의 발달은 IT산업의 핵심요소가 되었으며 그 중요성이 점점 부각되고 있다. 특히 무선 네트워크는 다양한 단말기(노트북, PDA, 스마트폰)가 대중화되었고 이를 지원하는 표준이 만들어졌으며, 무선 네트워크 사용지역의 확대로 인하여 언제 어디에서나 정보환경에 가까이 접근할 수 있는 여건이 마련되었다. 그러나 이동성이 좋고 편리한 무선 네트워크의 장점의 이면에는 개인정보가 유출될 수 있는 치명적인 문제점들이 드러나기 시작했는데, 케이블을 사용하는 유선환경과는 달리 무선환경에서는 전파를 이용하여 통신하는 점을 악용하여 무선 AP를 도청하거나 패킷을 스니핑하여 개인정보를 유출하는 사례가 빈번하게 일어나고 있다. 본 논문에서는 현재 사용되고 있는 무선 네트워크의 기술표준을 분석해보고 실제 무선환경에서 개인정보가 얼마나 쉽게 노출될 수 있는가를 알아보기 위해 제작한 사설 안테나를 사용하여 무선 AP의 신호를 가로채 패킷을 분석하는 방법을 시연한다. 또한 안테나 각각의 지름을 달리하여 신호강도의 차이가 얼마나 있는지 분석하고, 개인정보를 보호하기 위한 방법을 제시한다.

Study on the Application of a Decentralized Identity System within University Based on Zero-Knowledge Proof for Self-Sovereign Identity Assurance (자기주권 신원 보장을 위한 영지식증명 기반의 대학 내 DID 시스템 적용방안 연구)

  • Im Sung Sik;Kim Seo Yeon;Kim Dong Woo;Han Su Jin;Lee Ki Chan;Oh Soo Hyun
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.141-150
    • /
    • 2024
  • With the increasing frequency of incidents related to personal information leaks, there is a growing concern about personal information protection. Moreover, with the emergence of blockchain technology, there is a heightened interest in self-sovereign identity models applied through blockchain, with ongoing research on Decentralized Identifiers (DID) to achieve this. However, despite universities storing and utilizing significant information such as personal data, their computer systems are operated and managed based on centralized systems, leading to annual occurrences of personal data breaches. Therefore, this paper proposes and implements a DID-based computing system applicable within universities. Additionally, it establishes and executes prominent services within the university context. The proposed system ensures users' self-sovereign identities through verifiable credentials, enabling the establishment of a secure integrated information system within the university, departing from traditional centralized systems.

Optical Character Recognition based Security Document Image File Management System (광학문자인식 기반 보안문서 이미지 파일 관리 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.7-14
    • /
    • 2019
  • With the development of information and communication technology, we have been able to access and manage documents containing corporate information anytime and anywhere using smart devices. As the work environment changes to smart work, the scope of information distribution is expanded, and more efforts are needed to manage security. This paper proposes a file sharing system that enables users who have smart devices to manage and share files through mutual cooperation. Proposed file sharing system, the user can add a partner to share files with each other when uploading files kept by spliting the part of the file and the other uses an algorithm to store on the server. After converting the file to be uploaded to base64, it splits it into encrypted files among users, and then transmits it to the server when it wants to share. It is easy to manage and control files using dedicated application to view files and has high security. Using the system developed with proposed algorithm, it is possible to build a system with high efficiency even for SMEs(small and medium-sized enterprises) that can not pay much money for security.

OTP Authentication Protocol using PingPong-128 (PingPong-128을 이용한 OTP 인증 프로토콜)

  • Lee, Jang-Chun;Lee, Hoon-Jae;Lim, Hyo-Taek;Lee, Sang-Gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.661-669
    • /
    • 2008
  • Nowadays, authentication is essential to identify the legal users in a network communication. Usually, there are few wars to achieve authentication over a publicly accessible network system in order to protect certain private data from the unauthorized users, ranging from simple ID/Password to Biometrics System. One of the most active areas in OTP(One Time Password) research today aims at exploiting OTP to provide authentication in the finance and security industry. OTP is usually discarded once it has been used. this prevents huge loophole of traditional authentication system which employs the same ID and Password every time. However this OTP system also has its weaknesses in surviving some attacks. this paper proposes an advanced OTP protocol using PingPong-128 without loop hole of pre-existing OTP.

Systematic and Comprehensive Comparisons of the MOIS Security Vulnerability Inspection Criteria and Open-Source Security Bug Detectors for Java Web Applications (행정안전부 소프트웨어 보안 취약점 진단기준과 Java 웹 어플리케이션 대상 오픈소스 보안 결함 검출기 검출대상의 총체적 비교)

  • Lee, Jaehun;Choe, Hansol;Hong, Shin
    • Journal of Software Engineering Society
    • /
    • v.28 no.1
    • /
    • pp.13-22
    • /
    • 2019
  • To enhance effective and efficient applications of automated security vulnerability checkers in highly competitive and fast-evolving IT industry, this paper studies a comprehensive set of security bug checkers in open-source static analysis frameworks and how they can be utilized for source code inspections according to the security vulnerability inspection guidelines by MOIS. This paper clarifies the relationship be tween all 42 inspection criteria in the MOIS guideline and total 323 security bug checkers in 4 popular open-source static analysis frameworks for Java web applications. Based on the result, this paper also discuss the current challenges and issues in the MOIS guideline, the comparison among the four security bug checker frameworks, and also the ideas to improve the security inspection methodologies using the MOIS guideline and open-source static security bug checkers.

Who Cares More about Security?: Effects of Personality Traits on PC Security Intention (누가 보안에 더 신경을 쓰는가?: 성격특성이 PC보안의도에 미치는 영향)

  • June-Young Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.99-114
    • /
    • 2018
  • Technical measures for computer security are essential, but they are not a sufficient condition for security. Therefore, a personal approach to user's security behavior should be developed. Personality, which is a human aspect, is a behavioral characteristic that characterizes each individual and facilitates prediction of how an individual will behave in certain situations. Protection motivation theory has been used extensively in the security research on human behavior. The present study discusses how protection motivation was formed from personality traits. Thus, organizations can refer the result of this study for their HRD and HRM concerns.

A Study on the Development of the Information Security Department Curriculum for Junior College (전문대학 정보보안과 교과과정 개발에 관한 연구)

  • 김경호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.3-15
    • /
    • 2003
  • This study aims at the development of new curricula for information security department at colleges. For this purpose, the curricula for information security of the seven colleges in Korea were first examined. Then, questionnaires from the fifteen information security companies and professors were put into place. With these results, a new curricula for the information security department was developed. A curriculum that developed in this study will also provide changes and improvements for the future curricula of information suity department at colleges in Korea.