• Title/Summary/Keyword: 기밀성능

Search Result 212, Processing Time 0.028 seconds

A Study on Web Service Security Testing Methodology for Performance Evaluation (웹 서비스 보안 성능 평가 테스트 방법론 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.31-37
    • /
    • 2010
  • The risks and threats in IT security systems to protect, prevent damage and Risk should be minimized. Context of information security products such as information processing, storage, delivery, and in the process of information system security standards, That is the basic confidentiality, availability, integrity and secondary clarity, potential evidence, detection, warning and defense capabilities, to ensure sufficient and should be. Web services are the most important elements in the security, the web nature of port 80 for the service to keep the door open as a structure, Web applications, web sources and servers, networks, and to hold all the elements are fundamental weaknesses. Accordingly, these elements through a set of Web application development errors and set-up errors and vulnerabilities in Web applications using their own home pages and web servers to prevent hacking and to improve the efficiency of Web services is proposed methodology performs security BMT.

상용화를 위한 진공펌프 신뢰성평가에 관한연구

  • Im, Jong-Yeon;In, Sang-Yeol;Im, Seong-Gyu;Kim, Wan-Jung;Jeong, Wan-Seop;Hong, Seung-Su;Go, Deuk-Yong
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.02a
    • /
    • pp.249-249
    • /
    • 2013
  • 지식경제부의 청정제조기반 산업원천개발사업의 일환으로 진행 중인 "초고진공펌프 개발" 과제 중 제 3 세부 과제인 "고진공펌프종합특성평가시스템 설계, 진단기술 개발" 과제에서 진행되고 있는 연구수행결과 및 기 구축 돈 저진공펌프 종합특성평가시스템을 활용한 진공펌프의 상용화를 위한 신뢰성 평가에 관하여 소개한다. 10(3) mbar~ 10(-10) mbar 영역의 국내 진공펌프 개발 수준의 선진화를 위한 모든 특성평가장치의 국제적 신뢰성이 있는 완벽한 성능평가의 구현에 있다고 할 수 있다. 고진공펌프개발 총괄과제의 대명제는 "국제적 신뢰성을 가지는 상용화 제품의 완성"이며, 전체 사업 추진기간 동안 제품 개발 주체인 산업체에 상용화를 위한 신뢰성 기반기술의 완벽한 구현의 제공에 있다고 할 수 있다. 이러한 고진공펌프의 신뢰성 평가는 저진공펌프의신뢰성 평가기술에 기반을 두고 있으며, 기 개발 완료된 특성평가뿐만 아니라 실질적으로 공정현장에서 판단할 수 있는 내구성진단 및 제작회사에서의 기계적 신뢰성 진단기술의 복합적인 요인들의 집합적인 분석에 기인하고 있다고 판단할 수 있다. 상용화 단계의 내구성 및 신뢰성 확보를 위한 전제 조건은 대외적으로 공표할 수 있는 시험평가 데이터와 개발 주체에서 기밀 수준으로 유지해야만 하는 민감한 자료의 상시 생산 infra의 구축으로 볼 수 있다. 이러한 진공펌프개발이라는 과제의 대명제를 완성하기 위하여 추진 연구개발 방향 등 진행형인 2년간의 최종 상용화에 필요한 국제 신뢰성, 공정대응성 확보 등 핵심사업 추진내용을 소개하고자 한다.

  • PDF

Security Threats in the Mobile Cloud Service Environment (모바일 클라우드 서비스 환경에서의 보안위협에 관한 연구)

  • Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.263-269
    • /
    • 2014
  • Mobile Cloud Service will provide cloud services through mobile devices. Because storage space constraints and computing process performance limitations of mobile devices, this service will process in the cloud environment after moving works and data that have to process in mobile terminal. The obstacles of mobile cloud service activity will have concerned high about the reliability service, data security, and the confidentiality security. In particular, in convergence of mobile services and cloud services, each threats are expected to be generated complicatedly. In this paper, we define the type of mobile cloud services as well as security threats that can occur in mobile cloud. Also we suggest security countermeasures in mobile app. and enterprises countermeasures. We suggest verification of mobile applications for user information protection about security countermeasures in mobile app. Also we describe the cloud providers responsibility and user responsibility about enterprises countermeasures.

Research on User Data Leakage Prevention through Memory Initialization (메모리 초기화를 이용한 사용자 데이터 유출 방지에 관한 연구)

  • Yang, Dae-Yeop;Chung, Man-Hyun;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.7
    • /
    • pp.71-79
    • /
    • 2012
  • As advances in computer technology, dissemination of smartphones and tablet PCs has increased and digital media has become easily accessible. The performance of computer hardware is improved and the form of hardware is changed, but basically the change in mechanism was not occurred. Typically, the data used in the program is resident in memory during the operation because of the operating system efficiency. So, these data in memory is accessible through the memory dumps or real-time memory analysis. The user's personal information or confidential data may be leaked by exploiting data; thus, the countermeasures should be provided. In this paper, we proposed the method that minimizes user's data leakage through finding the physical memory address of the process using virtual memory address, and initializing memory data of the process.

Text Document Classification Scheme using TF-IDF and Naïve Bayes Classifier (TF-IDF와 Naïve Bayes 분류기를 활용한 문서 분류 기법)

  • Yoo, Jong-Yeol;Hyun, Sang-Hyun;Yang, Dong-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.242-245
    • /
    • 2015
  • Recently due to large-scale data spread in digital economy, the era of big data is coming. Through big data, unstructured text data consisting of technical text document, confidential document, false information documents are experiencing serious problems in the runoff. To prevent this, the need of art to sort and process the document consisting of unstructured text data has increased. In this paper, we propose a novel text classification scheme which learns some data sets and correctly classifies unstructured text data into two different categories, True and False. For the performance evaluation, we implement our proposed scheme using $Na{\ddot{i}}ve$ Bayes document classifier and TF-IDF modules in Python library, and compare it with the existing document classifier.

  • PDF

Implementation of an Expert System for COTS Fault Diagnosis (COTS 고장진단을 위한 전문가 시스템 구현)

  • Kim, A-Ram;Roh, Jin-Song;Rhee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.275-281
    • /
    • 2013
  • This space is for the of your study in English. If simple menu item changes or the addition of check items are necessary on GUI menu of existing test equipments for military facilities that are programmed by using RAD tools such as Visual C++, they should go through complex steps, such as numerous conducting steps, coding, flash design modification, recompiling and distribution. It is cumbersome process and waste much time. Also, on implementing them, it was worried about leaking secrets because a number of military security considerations were included. To solve such as the above problem, we proposed commercial RIA technologies and a COTS fault diagnostic knowledge-based system that implemented by the XML data design technique in this research. The proposed approach solves the problem of existing methods, reduced inspection time, and improved performance, usability, and maintainability.

An Advanced Color Watermarking Technique using Various Spatial Encryption Techniques (다양한 공간적 암호화 기법을 적용한 개선된 컬러 영상 워터마킹 기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.3
    • /
    • pp.262-266
    • /
    • 2020
  • In this paper, we proposed an effective technique for hiding the watermark in the LSB of a color image by applying spatial encryption techniques. Even if the watermark hidden in the LSB of the image is extracted, the information of the extracted watermark cannot be decrypted because the watermark is encrypted using various spatial encryption techniques. Therefore, if the watermark is concealed in the LSB using the spatial encryption techniques proposed in this paper, the security is greatly improved compared to the existing technique of embedding the watermark in the LSB. When watermarking is performed by applying the proposed technique, the image quality of the watermark-concealed image is very good, so it is impossible to distinguish it from the original image, and the watermark, which is confidential data, can be extracted from the watermarked image without loss. The performance of the proposed technique was mathematically analyzed and the superiority of the proposed technique was confirmed through experiments. When the watermark was concealed by applying the proposed technique to Lenna, airplane, Tiffany, and pepper images having a size of 512×512, the PSNR values of the watermarked images were 53.91dB, 54.10dB, 54.09dB, and 54.13dB, respectively.

Wireless Security Transmission Using Algorithm of Multiple-Key Exchange (다중 키 교환 알고리즘을 이용한 무선 보안 전송 기법)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Noh, Bong-Nam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.807-810
    • /
    • 2005
  • Constructed network test environment of wireless base for confidentiality guarantee of data and safe transmission that is transmited at Mobile node of Wireless Network environment in this paper. And, progressed research about IKEv2's Multiple-Key Exchange mechanism for efficient security transmission that use IPSec that is built-in to basis to IPv6 of Mobile environment. Have several key to single terminal to solve that is seam at hand off packet transmission process of Mobile Node in Wireless Network and Re-setting for Key and Re-exchange problem that happen frequently and studied technology that move. Key exchange protocol that is used for an experiment loads basically in MIPv6 and used IKEv2 protocol that is used for management and distribution of reliable encryption key between both end. Using network simulator of SSFNet(Scalable Simulation Framework Network Models) in this paper Key exchange delay value of IKEv2's security transmission analyzing comparison Performance measure and studied about problem and improvement way accordingly.

  • PDF

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things (사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술)

  • Park, Jiye;Shin, Saemi;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.707-714
    • /
    • 2013
  • IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.

Design and Implementation of Security System for Wargame Simulation System (워게임 시뮬레이션 시스템을 위한 보안시스템 설계 및 구현)

  • Song Jong Seok;Kim Jin Soo;Shin Moon Sun;Ryu Keun Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.369-378
    • /
    • 2005
  • War simulation system is a virtual space that my tactical simulation exercise is held. The data used in this system are considered sensitive and needs to be protected. But suity vulnerabilities and possible security loopholes were not considered when designing the war game simulation system. So currently the systemis highly vulnerable against hackers and data leakages. This paper proposed a security system for war game simulation system based on considering the currently vulunerabilities and possible suity leakages. The proposed security system supports security patches. In this paper, we analyze vulunerabilities of the running environment of current system and we design and implement the security system that is consisted of three components : Authentication System, Encryption System and Network Security System. The security patches are safe and there are no negative effects on the system's performance. The patches are proved to be effective and very reliable towards solving the security vulnerabilities.