• Title/Summary/Keyword: 보안영역

Search Result 806, Processing Time 0.03 seconds

A Server-Independent Password Authentication Method for Access-Controlled Web Pages Using the SHA-1 Algorithm (SHA-1 방식을 이용한 제한된 웹 페이지에 접근하기 위한 서버 독립적인 패스워드 인정 방안)

  • 하창승;조익성
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.146-153
    • /
    • 2001
  • A new password authentication method Is proposed in this paper for the purpose of providing web page authors the convenience in deploying password-protected Web realms at a web server. According to this method. a web realm is mapped to a secret directory at the web server. in which access-controlled web pages are stored. A password is used to construct the name of the secret directory. A javaScript code is embedded in a sign-in web pageoutside the secret directory, which converts the user-entered password into the directory name and forms a complete URL pointing to an access-controlled web page inside the secret directory. Thus, only users knowing the password can compose a valid URL and retrieve the access-controlled web page. Using this method, web page authors can deploy password-protected web realms in a server-independent manner.

  • PDF

유비쿼터스 컴퓨팅의 발전 전망과 보안에 대한 이슈

  • 김완석;김정국
    • Review of KIISC
    • /
    • v.14 no.1
    • /
    • pp.1-11
    • /
    • 2004
  • NGN 프로젝트를 이어 BCN 프로젝트에 의하여 백엔드 영역은 IP 기반의 네트워크와 브로드밴드접속 서비스의 고도화가 실현될 것이다. 한편 프론트엔드 영역인 비 IP 기반의 네트워크인 NFC에 대한 인프라 구축과 기반기술개발, 유비쿼터스 서비스와 응용에 대한 사업 준비가 요구되는 상황이다. 그래서 차세대 W 서비스와 응용의 세계인 프론트엔드 영역에서 유비쿼터스 컴퓨팅 인프라 구축과 관련 산업 활성화를 위하여 유비쿼터스 컴퓨팅 서비스에 특성에 따라 센서네트워크, 단말 등에 대한 물리적인 보안에 대한 연구가 요구되고 있다.

A Methodology for a Emerging Technology Search through Science and Technology Information Analysis (과학기술 정보분석을 통한 유망연구영역 탐색 방법론)

  • Lee U-Hyeong;Mun Yeong-Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.05a
    • /
    • pp.379-384
    • /
    • 2006
  • 본 논문에서는 과학기술 정보분석을 위한 방법론 중의 하나인 지식맵을 기반으로 유망연구영역을 탐색하는 방법론을 다룬다. 이를 위해 정보보안 분야를 대상으로 지식맵을 작성하고, 또한 허브탐색을 통한 정보보안 분야의 유망연구영역을 제안하였다.

  • PDF

Studies on the effect of information security investment executive (정보보호의 투자 집행 효과에 관한 연구)

  • Jeong, Seong-Hoon;Yoon, Joon-Sub;Lim, Jong-In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1271-1284
    • /
    • 2014
  • This paper classifies technical, administrative and physical areas of defects and advices made by an external audit (ISO27001) and internal audit (performed by a security team) in a company which has the management system of information security. With the classified data it finds the correlation between the budget and investment of information security, and analyze the correlation. As a result of the analysis, it has been found that as time goes on there is a consistent correlation between a administrative area and technical area of security. Specially, it has been confirmed that the relation between the scale of the budget which is not executed and the number of the defects and advices made by the audit is in direct proportion. Therefore, in this paper, so as to provide a model that can be used for validating the effectiveness of the protective investment information by statistically calculating the similarity based on the results of correlation analysis. This research is intended to help that a company makes a precise decision when it establishes a policy of information security and systematic methodology of the investment in information security.

ISP Network's Vulnerabilities and Security Issues (ISP 망의 취약성 및 보안 이슈)

  • 이승민;남택용;손승원
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.497-500
    • /
    • 2003
  • 최근의 인터넷을 통한 사이버 공격 유형은 시스템 위주의 공격에서 네트워크 공격으로 변화하고 있다. 이에 따라 망을 소유하고 인터넷 서비스를 제공하는 ISP 관점의 보안이 중요한 변수로 등장하기 시작하였다. 본 논문에서는 1.25 인터넷 대란과 같은 국가차원의 사태 재발 방지를 위하여 현재 인터넷망의 취약성을 분석하고 이에 대한 보안 해결책으로서 보안 시스템의 성능, 기능 관점의 보안 이슈와 서비스 관점에서 보안 요구 사항을 살펴보았다. 또한 이를 종합하여 네트워크 영역 관점에서 앞으로 중점적으로 다뤄야 할 보안 연구 분야를 제시하였다.

  • PDF

Design of ebXML Security System applying XML Information Security Technologies (XML 정보보호 기술을 적용한 ebXML 보안 시스템의 설계)

  • 송준홍;김동수;박범대;윤정희;신동일;신동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.538-540
    • /
    • 2002
  • 매년 폭발적 성장률을 유지하고있는 인터넷 기반의 B2B 전자상거래 분야는 현재 그 영역을 기업대 기업, 국가 대 국가의 영역으로 확대하고 있다. ebXML로 대변되는 차세대 XML 기반의 국제적 표준 전자상거래 프레임워크의 활발한 표준화를 통해 이는 더욱 가속화될 전망이다. 그러나 다양한 보안 요소를 만족하는 안전한 거래를 위해 선행되어야 할 XML 기반의 전자상거래 모델에 최적화된 보안 기술에 대한 연구가 다른 분야에 비해 미진한 것이 현실이다 따라서 본 연구에서는 ebXML 메시징 및 등록기/저장소를 중심으로 보안 요소를 분석하고 XML기반의 보안 기술 적용 시스템을 설계함으로써 신뢰성 있고 안전한 ebXML 거래 모델을 제시한다.

  • PDF

A Study on Enhancing Cybersecurity of Weapon Systems for Life-Cycle (무기체계 수명주기 간 사이버보안 적용 개선방안)

  • Jung, Yong-Tae;Jung, Hyun-Sik;Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.67-75
    • /
    • 2019
  • Recently, the Ministry of National Defense has included embedded software for weapon systems as targets for the Defense cyber security. The Concept has been extended and evolved from the cyber security area that was previously limited to the information domain. The software is becoming increasingly important in weapon systems, and it is clear that they are subject to cyber threats. Therefore, We would like to suggest a improvement direction by diagnosing problems in terms of cyber security of the weapon systems for the life cycle. In order to improve cyber security of weapon systems, comprehensive policy including the weapon embedded software management should be established and the involved stakeholder should be participated in the activities.

A Business-Logic Separated Security Framework for Smart Banking (스마트 금융을 위한 비즈니스 로직과 분리된 보안프레임워크)

  • Seo, Dong-Hyun;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.669-679
    • /
    • 2014
  • This study introduces server-side security-oriented framework for smart financial service. Most of domestic financial institutions providing e-banking services have employed server-side framework which implement service-oriented architecture. Because such architecture accommodates business and security requirements at the same time, institutions are struggling to cope with the security incidents efficiently. The thesis suggests that separating security areas from business areas in the frameworks makes users to be able to apply security policies in real time without considering how these policies may affect business transactions. Security-oriented frameworks support rapid and effective countermeasures against security threats. Furthermore, plans to avoid significant changes on existing system when institutions implement these frameworks are discussed in the report.

Development of requirements for information security management system (ISO 27001) with CPTED in account (셉테드(CPTED)를 고려한 정보보안 관리시스템(ISO 27001)의 요구사항 개발)

  • Lim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.19-24
    • /
    • 2021
  • The purpose of this study was to add CPTED to the information security area. The control items of ISO 27001 (11 types) and the application principles of CPTED (6 types) were mapped. And the relevance between the items was verified through the FGI meeting through 12 security experts. As a result of the survey, the control items with a relevance of at least 60% on average are security policy, physical and environmental security, accident management, and conformity. As a result, the comprehensive policy was shared with CPTED's items as a whole. The specialized control items are security organization, asset management, personnel security, operation management, access control, system maintenance, and continuity management. However, specialized control items were mapped with each item of CPTED. Therefore, information security certification and septed are related. As a result, environmental security can be added to the three major areas of security: administrative security, technical security, and physical security.

Response Methodology against Spoofed IP Attack using Active Networks Mechanism (액티브 네트워크를 이용한 위조 IP 공격 대응 메커니즘)

  • Park, Sang-Hyun;Ko, Haeng-Seok;Kwon, Oh-Seok
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.69-81
    • /
    • 2008
  • It has become more difficult to correspond a cyber attack quickly as patterns of attack become various and complex. However, current security mechanism just have passive defense functionalities. In this paper, we propose new network security mechanism to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed mechanism makes it possible to deal effectively with cyber attacks such as IP spoofing, by using active packet technology including a mobile code on active network. Also, it is designed to hove more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

  • PDF