• Title/Summary/Keyword: 보안성강화

Search Result 830, Processing Time 0.038 seconds

Design of Door Lock Module using One Time Password Method (OTP를 이용한 디지털 도어락 모듈의 설계)

  • Ko, Joung-Hyun;Ko, Seong-Min;Kim, Seok-Jun;Kim, Jeong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.16-19
    • /
    • 2020
  • 사회에서 다양한 디지털 도어락 관련 범죄들이 꾸준히 늘어나면서 소비자들은 보안성이 강화된 도어락을 요구하고 있다. 이에 따라 도어락 시장도 보안성을 강화한 스마트 도어락을 개발하는 데 집중하고 있다. 본 연구에서는 사람이 보안을 위해 사용하는 OTP(One-Time-Password) 라는 검증된 암호시스템을 사용하여 비밀번호의 노출, 비밀번호의 분실의 위험이 없는 보안성과 편의성을 강화한 OTP 스마트 도어락 모듈을 구현하였다.

인터넷을 이용한 금융 거래 시 보안성 강화 수단에 관한 고찰

  • 이상진
    • Review of KIISC
    • /
    • v.15 no.4
    • /
    • pp.39-43
    • /
    • 2005
  • 최근 국내의 인터넷 뱅킹에 대한 해킹 사고를 계기로 시스템의 문제점을 진단하고 이에 따른 대응책을 기술한다. 이러한 시도는 특히 근간의 PKI 체계를 보완/강화하는 방향으로 진행하는 것이 바람직하다. 또한 인터넷 뱅킹의 궁극적은 안전성 보장을 위한 별도의 부가적인 보안장치의 특징과 장/단점을 소개함으로써 개인의 정보보호를 위한 대안을 제시한다.

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF

The Effect on the IS Role Stress on the IS Compliance Intention Through IS Self-determination: Focusing on the Moderation of Person-organization Fit (정보보안 역할 스트레스가 자기 결정성을 통해 준수 의도에 미치는 영향: 개인조직 적합성의 조절 효과)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.375-386
    • /
    • 2022
  • As information asset protection is recognized as an important management factor for organizations, organizations are increasing their investments in information security(IS) policies and technologies. However, strict application of IS may cause non-compliance behavior through IS stress on employees of the organization. Accordingly, this study suggests a mechanism by which employee stress affects IS compliance intentions through self-determination, and a method to reinforce IS compliance intentions through person-organization fit. We conducted an online survey of employees working at companies that adopted IS policies and tested hypotheses using 475 samples. First, as a result of analyzing the main effects of applying the structural equation model, role stress affected IS compliance intention through self-determination. Second, as a result of analyzing the moderating effect of applying Process 3.1, personal organization fit strengthened the relationship between self-determination and IS compliance intention. The research suggests a direction for achieving internal IS goals by confirming the influence of IS stress and behavioral causes of employees.

Performance of privacy Amplification in Quantum Key Distribution Systems (양자 키 분배 시스템에서 보안성 증폭의 성능 분석)

  • Lee, Sun-Yui;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.111-116
    • /
    • 2018
  • This paper introduces the concept of a random universal hash function to amplify security in a quantum key distribution system. It seems to provide security amplification using the relationship between quantum error correction and security. In addition, the approach in terms of security amplification shows that phase error correction offers better security. We explain how the universal hash function enhances security using the BB84 protocol, which is a typical example of QKD(Quantum Key Distribution). Finally, we show that the BB84 protocol using random privacy amplification is safe at higher key rates than Mayers' performance at the same error rate.

A Study on The Security of ATM-Metro Service (ATM-Metro 서비스 보안성 분석)

  • Roh, Sun-Sik;Cho, Jung-Ho;Lee, Dong-Eun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.917-920
    • /
    • 2005
  • 본 논문에서는 광대역통합국가망에서 ATM-Metro 서비스의 망 구조 및 서비스 제공 방식을 분석한다. ATM-Metro 서비스를 제공함에 있어서 존재하는 보안 취약점 및 보안 공격을 분석하며, 이를 기반으로 안전하게 ATM-Metro 서비스를 제공하기 위한 일반적인 보안 강화 방안을 제시하고, ATM 접속 방식과 이더넷 접속 방식의 ATM 구간에서 보안 기능을 강호하기 위한 보안 모델을 제시한다. 또한 ATM-Metro Ethernet 구간에서 기본적인 보안 기능을 제공할 수 있는 VLAN 적용 방안을 제시하고, ATM-Metro서비스 전구간에서 보안성을 강화할 수 있는 방안을 제시한다.

  • PDF

Research on Major Weakness Rules for Secure Software Development (소프트웨어 개발 보안성 강화를 위한 주요 보안약점 진단규칙 연구)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.10
    • /
    • pp.831-840
    • /
    • 2013
  • Recently, to enhance the security of software, static analysis tools for removing weaknesses, the cause of vulnerability, have been used a lot in the software development stage. Therefore, the tools need to have the rules being able to diagnose various weaknesses. Top 5 weaknesses found in the software developed by major domestic information projects from 2011 to 2012 is 76% of top 10 weaknesses per year. Software security can be improved a lot if top 5 weaknesses just are removed properly in software development. In this paper, we propose the PMD's rules for diagnosing the major weaknesses and present the results of its performance test.

A Study on method for network authentication (중간자 공격에 대한 공인인증서 네트워크 보안 강화 연구)

  • Kim, Jee-Yeon;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.486-489
    • /
    • 2014
  • 최근 전자 금융 사기로 인한 피해자들이 증가하면서 전자 금융 안전성 확보를 위해 추가 대책 마련이 시급한 상황이다. 이에 본 논문은 현재 사용되고 있는 공인 인증서의 네트워크 보안측면에서 보안방식을 살펴보고 취약점 분석을 통하여 현 네트워크 시스템의 보안을 강화시킬 수 있는 방안을 도출 하고자 한다. 이를 위해 먼저 관련연구를 통해 공인인증서 시스템의 인증원리와 공개키 기반구조, 중간자 공격(Man In The Middle Attack, MITM)에 대해서 알아보고 이를 토대로 현 네트워크 시스템의 취약점 및 문제점을 분석한다. 분석한 문제점에 대해 새로운 프로토콜을 적용하여 공인인증서의 안전성을 강화시키는 방법을 제안한다.

Exploratory Study on Enhancing Cyber Security for Busan Port Container Terminals (부산항 컨테이너 터미널 사이버 보안 강화를 위한 탐색적 연구)

  • Do-Yeon Ha;Yul-Seong Kim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.437-447
    • /
    • 2023
  • By actively adopting technologies from the Fourth Industrial Revolution, the port industry is trending toward new types of ports, such as automated and smart ports. However, behind the development of these ports, there is an increasing risk of cyber security incidents and threats within ports and container terminals, including information leakage through cargo handling equipment and ransomware attacks leading to disruptions in terminal operations. Despite the necessity of research to enhance cyber security within ports, there is a lack of such studies in the domestic context. This study focuses on Busan Port, a representative port in South Korea that actively incorporates technology from the Fourth Industrial Revolution, in order to discover variables for improving cyber security in container terminals. The research results categorized factors for enhancing cyber security in Busan Port's container terminals into network construction and policy support, standardization of education and personnel training, and legal and regulatory factors. Subsequently, multiple regression analysis was conducted based on these factors, leading to the identification of detailed factors for securing and enhancing safety, reliability, performance, and satisfaction in Busan Port's container terminals. The significance of this study lies in providing direction for enhancing cyber security in Busan Port's container terminals and addressing the increasing incidents of cyber security attacks within ports and container terminals.

Enhancement of Security Monitoring & Control System in Zero Trust Security Models (제로트러스트 보안 모델에서 보안관제 시스템 강화 연구)

  • Wonhyung Park
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.51-57
    • /
    • 2022
  • Recently, the concept of zero trust has been introduced, and it is necessary to strengthen the security elements required for the next-generation security control system. Also, the security paradigm in the era of the 4th industrial revolution is changing. Cloud computing and the cybersecurity problems caused by the dramatic changes in the work environment due to the corona 19 virus continue to occur. And at the same time, new cyber attack techniques are becoming more intelligent and advanced, so a future security control system is needed to strengthen security. Based on the core concept of doubting and trusting everything, Zero Trust Security increases security by monitoring all communications and allowing strict authentication and minimal access rights for access requesters. In this paper, we propose a security enhancement plan in the security control field through a zero trust security model that can understand the problems of the existing security control system and solve them.