• Title/Summary/Keyword: 보안교육

Search Result 657, Processing Time 0.034 seconds

Digital voice data security techniques with secret key distribution function applicable to military communication (군 통신에 적용 가능한 비밀 키 분배 기능을 갖는 디지털 음성 데이터 보안 기법)

  • Im Sung Yeal
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.15-22
    • /
    • 2021
  • Security of voice communication content in the military's voice communication network will be essential. There is no proposed study on voice data security of military communication networks, but security of voice data will be essential when communicating. This paper is about to an encryption/decryption technique of digital voice data to provide security in case of voice calls in a military communication network. In addition, by using a symmetric key algorithm using AES, a secret key is required, and it has the function of transmitting this key to the receiving end before setting it as a voice call, solving the difficulty of distributing the secret key. This paper proposes a security technique for digital voice data that applies a synchronous stream encryption method that is relatively easy to restore synchronization even in the event of loss of synchronization among stream encryption techniques.

Development Plan for the Identity and Future of Security Science (경호학의 정체성과 미래에 대한 발전 방안)

  • Kwon, Hyuck-Bin;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.145-172
    • /
    • 2017
  • In 2015 the Department of Education announced that it will make downsizing efforts by recommending classified downsizing ratio according to the evaluation of universities for active support toward autonomous efforts of universities with the possibilities of reform and qualitative structural reform for customized human resource cultivation according to the social demands. This is the preemtive structural reform preparing against the rapid decrease of the number of students, and the preparation for changing into competitive universities so that customized human resource that is needed in the society can be trained. Security Science Departments of Korea, first established in 1996, need changes in curriculum in order to prepare for the fourth revolution of the future, and are stagnant on the education goal and employment course. Therefore the adoption of related certificates, curriculum, NCS, and professional curriculum is needed. For example, Hansei University, Chung-Ang University, and Far East University have established the Department of Industrial Security, and Kyonggi University and Sungshin Women's University have established the Department of Convergence Security. Also, Konkuk University has established the Graduate School of Security and Disasters, the Graduate School of Information and Policy, the Graduate School of Criminal Justice, Gachon University the Graduate School of National Security, Sungkyunkwan University the Graduate School of Strategic Studies. This shows that the field of Security Science should not settle for itself. This article analyzes current curriculum and subjects of security, police, industrial security, military related academic departments of key universities. It is necessary to prepare for the future by predicting the change from the merge of academic departments and the demands of the times. As technical colleges are adopting NCS, this is the time to seek for systematic collaboration between universities and technical colleges and between industry, government, and academida.

  • PDF

The Security Technology For QoS Assurance on Distance Learning Network (원격교육 망에서 QoS 보장을 위한 보안 기법)

  • 이근무;박수영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.11b
    • /
    • pp.690-693
    • /
    • 2002
  • 차세대 인터넷에서 DiffServ 네트워크는 서비스 품질(QoS: Quality of Service) 제공을 위한 확장성이 높은 구조를 제시하고 있다. 차세대 네트워크에서는 음성이나 비디오 전송 같은 많은 응용들을 지원하기 위하여 QoS 보장 서비스가 필요하다. 차세대 인터넷에서 QoS 제공을 위하여 RSVP(Resource Reservation Protocol), MPLS(Multi-Protocol Label Switching), DiffServ 및 QoS 라우팅 등의 기법이 개발되고 표준화되고 있다. 원격 교육 역시 주로 인터넷이 주도하고 있다는 면에서는 QoS의 문제를 피해 갈 수 없는 것이다. 그러나, 국내에서는 이러한 QoS 능력을 안전하게 제공하기 위한 기법에 대한 연구가 거의 없는 실정이다. 따라서, 본 논문에서는 QoS를 안전하게 제공하기 위한 보안 기법을 DiffServ 네트워크를 중심으로 제시하고 원격교육에 적용시의 문제들을 고려하고자 한다.

  • PDF

A Study on the selection of cadets 3 Army Military Academies (육군 3사관학교 생도선발에 관한 고찰)

  • Jung, Jae Keak
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.87-92
    • /
    • 2019
  • The Army 3 Military Academy is a government-approved transfer school. After two years of education as an officer training institution, I will be graduated from college and concurrently be called as an army. In order to become a Korean officer, I would like to examine the recruitment of cadets who are trained through various educational institutions and who will become the backbone of the future army.

The Study of Developing an Index for Evaluating the Security of the Network (네트워크 보안성평가 지표개발에 관한 연구)

  • 박동석;안성진;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.17-33
    • /
    • 2002
  • The major goal of this study is to develop an index that can evaluate the quality of the appropriate network in a series of projections that analyze, design, and then build a network. The existing software engineering and/or the methods of developing a system are limited. The process of defining the requirements in building a network, designing the system, and building the network focuses on arranging the methods of building a network. Based upon this, we tried to develop a necessary index to evaluate the security of a network.

  • PDF

A Study on the Security Regulatory Issues in WiFi Network (WiFi의 보안문제와 개선방안 연구)

  • Kim, Sung Chul;MIn, Dae Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.678-681
    • /
    • 2009
  • WiFi는 무선인터넷 접속(Wireless LAN) 방식의 하나로서 이동성, 설치용이성, 유연성 등으로 인하여 널리 사용되고 있다. 더욱이 기존 다양한 디지털 기기들이 WiFi 기반의 application을 탑재하여 각종 온라인 콘텐츠를 이용할 수 있게 하면서 점차 보편적인 인터넷 접속수단으로서 변모하고 있는 상황이다. WiFi의 편리성으로 인하여 기업, 공공기관, 교육기관 등에서 네트워크 구축에 WiFi를 사용하는데 그 추세가 개인부문에서 기업부문으로 확산되고 있다. 하지만 유선인터넷이 케이블이라는 매체를 통해 연결되어 외부와 차폐된데 비해 WiFi는 주파수를 매개로하기 때문에 네트워크 접근이 용이하며 이로인해 보안이 취약해 질 수 있다는 것이다. 이로 인하여 일명 워드라이빙(war driving)이라 불리는 서비스의 무단사용뿐만 아니라 악의를 가진 네트워크 침입이 가능해져 개인정보나 사유재산이 침해 가능성이 높다고 할 수 있다. 이에 본 연구에서는 해외의 WiFi의 보안관련 법제도를 살펴보고 이로부터 국내 WiFi보안을 위한 대안을 제시하고자 한다.

  • PDF

The Research for Cyber Security Experts (소프트웨어 취약점의 보안성 강화를 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.347-350
    • /
    • 2016
  • Analysis of vulnerability of the software for risk. The weakness of the software material, the importance of strengthening security in accordance with financial damage occurred is emerging. There is a potential risk factor not only from the case, the manufacturing to use the software company that appropriate to use a software business and personal risk of loss to size.In this paper due to diagnose and vulnerabilities in software, diagnosis, the curriculum and to cultivate a diagnostic guide, and security vulnerabilities in software.Proposal system for increased.

  • PDF

A Study on Security Checker for Source Code (소스코드 보안성 검사 도구에 관한 연구)

  • Bang, Ki-Seok;Kong, Jin-San;Kang, In-Hye
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1150-1153
    • /
    • 2010
  • 정보시스템의 취약성을 사전에 예방하고 보안을 강화하기 위해 여러 가지 방안이 제시되고 있다. 본 연구에서는 소프트웨어의 소스코드 수준에서의 보안성을 확보하기 위해 소스코드 자체의 보안 위험성을 검사하는 도구를 제안한다. 개발자에 의해 무심코 사용되는 위험 함수들을 검출하고 그 대안을 제시하여 소프트웨어 내부에 잠재되는 보안 위협을 예방하는 도구를 개발하고자 한다.

The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance (정보보호 아키텍처 구성과 보안활동이 정보자산보호 및 조직성과에 미치는 영향)

  • Jeong, Gu-Heon;Yi, Dong-Wook;Jeong, Seung-Ryul
    • The KIPS Transactions:PartD
    • /
    • v.17D no.3
    • /
    • pp.223-232
    • /
    • 2010
  • This study was carried out for the purpose of inquiring into the effect of composition and security activities for information security architecture on information asset protection and organizational performance in terms of general information security. This study made a survey on 300 workers in the government, public institutions and private companies, which it showed that management factors of risk identification and risk analysis, in general, have an usefulness to composition and security activities for information security architecture to prevent inside information leakage. And the understanding and training factors of IT architecture and its component were rejected, requiring the limited composition and security activities for information security architecture. In other words, from the reality, which most institutions and organizations are introducing and operating the information security architecture, and restrictively carrying out the training in this, the training for a new understanding of architecture and its component as an independent variable made so much importance, or it did not greatly contribute to the control or management activities for information security as the generalized process, but strict security activities through the generalization of risk identification and risk analysis management had a so much big effect on the significant organizational performance.

Multiplex Certification System Using XML For WBI (WBI에서의 XML 다중인증 시스템)

  • 신영준;이동휘;김정재;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.297-302
    • /
    • 2004
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence abount an age of information demand is a education focused on a learner and remote education based on information technology. WBI(Web Based Instruction) is a formation that remotly educate a learner using web, possible mutual reaction between instructor and learner, submint various studying material, has a good point to overcome spatial restriction. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. And XML electronic signature raise interworking between digital signature systems used by various field of using XML document. Using these merit and complementing defect are main contents that users have to pay about Certification service to get CA certificate from 2004 june. This paper propose multiplex Certification remote education agent system using XML digital signature to satisfy security requirement.

  • PDF