• Title/Summary/Keyword: 보안우려

Search Result 205, Processing Time 0.021 seconds

Security and Trust on Non-Contact Financial Transaction (금융보안과 신뢰가 비대면 금융거래에 미치는 영향)

  • John, Yong-Jean
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.147-154
    • /
    • 2021
  • The pandemic age came to us after the COVID19 broke out in the early of 2020, which resulted in many changes in our everyday life. One of the changes is non-contact transactions in economic activities, especially contact-free financial transactions are ever-increasing activities in the pandemic age. In non-contact financial transactions, security and trust are important issues that users are concerned about the most. So the paper examines how security and trust have effects on the attitudes of bank customers who use mobile banking applications on their smartphones. The study conducted factor ananlysis to extract research constructs using survey data gathered during Nobember of 2020 through February of 2021 across the nation. After extracting the constructs, the study checked validity, sampling adequacy, and internal reliability with KMO, Bartlett's test, and Crombach Alpha respectively. To make sure the purpose of the study, I do regression analysis. All factors of attitude had impacts on willingness on both of transactions and purchasing financial products. The results could give guidelines banks which want to attract more customers in open-banking environment through ever-more secure and trusty mobile banking application.

A Security Architecture of the inter-VTS System for shore side collaboration of e-Navigation (안전한 e-Navigation을 위한 해상교통관제 시스템의 정보교환 보안구조 설계)

  • Lee, Byung-Gil;Han, Jong-Wook;Cho, Hyun-Suk;Park, Nam-Je
    • Journal of Navigation and Port Research
    • /
    • v.36 no.1
    • /
    • pp.1-7
    • /
    • 2012
  • A concept of the "e-Navigation" was introduced in 2005 and implementation strategies are under way by IMO/IALA in the maritime safety area. Specially VTS is an important maritime traffic monitoring and aids to navigation system which is aims to improve safety, navigation efficiency and protect the marine environment. The demand of the inter-VTS networking has been increased and standardization is underway for realization of shore side collaboration for maritime safety in IALA. But there may be security problems in the inter-VTS networks if they have not proper security mechanism. The hacking of realtime ship position and sensitive maritime surveillance information caused a critical accident of vessel, human life and environment by terrorist. This paper aims to design of a secure inter-VTS network structure and related security protocol for secure sharing of sensitive maritime data.

A Study on Models for Strengthening Infrastructure Protection through Analysis of Cyber Intrusions (침해사고 분석을 통한 기반시설 보호 강화 모델 연구)

  • Yoon, Oh Jun;Han, Bok Dong;Park, Jeong Keun;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.29-36
    • /
    • 2015
  • The hacking threats made against the Korea Hydro & Nuclear Power(KNDP) and the leakage of critical information on nuclear power safety raised the public awareness on the importance of protecting and managing national infrastructure necessary for sustaining the state and society. Cyber security activities and relevant institutions in the ROK, however, are still insufficient, because of which there is a possibility that similar incidents would reoccur and cause serious damages. Hence, a grave and direct threat is posed to the national security of the ROK. In this thesis, I would like to give my analysis and assessment on the recent cyber intrusions against infrastructure at home and abroad, measures established in response and their implementation, and the deficiency of the existing infrastructure protection system ; and lastly propose measures to reinforce infrastructure protection of the ROK.

Analysis and Study on Invasion Threat and Security Measures for Smart Home Services in IoT Environment (사물인터넷 환경에서의 스마트홈 서비스 침해위협 분석 및 보안 대책 연구)

  • Lee, Myongyeal;Park, Jaepyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.27-32
    • /
    • 2016
  • In general, IoT(Internet of things) designate the intelligence technologies and services which interact all necessity information between human and things, things and thing and things and systems with all things connecting through the internet based. The smart home in present of IoT environment fuses the daily supplies/equipment which needs to use for the private life with the internet of things that is the fruit of the converged business through all most private consumption related in vastly. The concept of smart home has been built around early 2000s due to the spread of high speed internet and advanced of smart electronics and internet, furthermore influencing by the enhancement of wireless network and smart devices, it is advanced as a smart home within the internet of things environment. Smart home service inside the house which most closely implemented with personal life is being developed and advanced in various forms. These developments may exert a positive effect, but if it does not resolve the security issues for the smart home service, then it may cause a big plague of privacy and personal life.

A study on Activation Measures of Local Mobile Easy-to-use Payment (국내 모바일 간편결제 활성화 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.73-82
    • /
    • 2015
  • Thanks to popularization of smart phone, mobile payment market is growing rapidly. As the obligatory use of digital certificate is abolished, easy-to-use payment that can settle with only password is being launched one after another. But its spreading speed is not fast highly. Because of concern about personal information leakage and security, unchangeability of payment habit, insufficiency of consumer protection, inadequacy of payment infrastructure and all sorts of regulations, easy-to-use payment is not activated. Recently global IT companys are entering mobile payment market competitively. It is because the sense of crisis that their survival can be dangerous from now on if they get left behind Fintech innovation and the mentality that they try to take the leadership of mobile payment market process. In this situation, the thorough preparation and a lot of effort are required to promote our autonomous easy-to-use payment growth without dependance on foreign country's. In this paper, the problems of local mobile easy-to-use payment are addressed in depth and the activation measures such as flexible and discriminative security, construction of customer protection system, law system maintenance, service differentiation are proposed.

A Study on the Factors Affecting the Intention to use public Institution staff's Cloud Computing Service (공공기관 조직구성원의 클라우드 컴퓨팅 서비스 이용의도에 영향을 미치는 요인에 관한 연구)

  • Choi, Hyukra;Kim, SeonMyung
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.49-66
    • /
    • 2014
  • In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. However, as more and more information on individuals and companies are placed in the cloud, concerns on just how safe the computing environment is have gradually increased. In this study, it will be explored if key characteristics of cloud computing services would affect the behavioral intention to use public cloud computing services. A conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that perceived risk has statistically significant effect on the privacy concern of users and the privacy concern has a negative influence on the trust. Finally, the trust has a positive effect on the attitude and the attitude has statistically significant effect on use intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

Security Analysis on 'Privacy-Preserving Contact Tracing Specifications by Apple and Google' and Improvement with Verifiable Computations ('애플과 구글의 코로나 접촉 추적 사양'에 대한 보안성 평가 및 검증 가능한 연산을 이용한 개선)

  • Kim, Byeong Yeon;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.291-307
    • /
    • 2021
  • There has been global efforts to prevent the further spread of the COVID-19 and get society back to normal. 'Contact tracing' is a crucial way to detect the infected person. However the contact tracing makes another concern about the privacy violation of the personal data of infected people, released by governments. Therefore Google and Apple are announcing a joint effort to enable the use of Bluetooth technology to help governments and health agencies reduce the spread of the virus, with user privacy and security central to the design. However, in order to provide the improved tracing application, it is necessary to identify potential security threats and investigate vulnerabilities for systematically. In this paper, we provide security analysis of Privacy-Preserving COVID-19 Contact Tracing App with STRIDE and LINDDUN threat models. Based on the analysis, we propose to adopt a verifiable computation scheme, Zero-knowledge Succinctness Non-interactive Arguments of Knowledges (zkSNARKs) and Public Key Infrastructure (PKI) to ensure both data integrity and privacy protection in a more practical way.

Real-time Anomaly Detection System Using HITL Simulation-Based UAV Packet Data (HITL 시뮬레이션 기반 무인비행체 패킷 데이터를 활용한 실시간 이상 탐지 시스템)

  • Daekyeong Park;Byeongjin Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.103-113
    • /
    • 2023
  • In recent years, Unmanned Aerial Vehicles (UAV) have been widely used in various industries. However, as the depend ence on UAV increases rapidly, concerns about the security and safety of UAV are growing. Currently, various vulnerabili ties such as stealing the control right of the UAV or the right to communicate with the UAV in the web application are being disclosed. However, there is a lack of research related to the security of UAV. Therefore, in this paper, a study was conducted to determine whether the packet data was normal or abnormal by collecting packet data of an unmanned aerial vehicle in a HITL(Hardware In The Loop) simulation environment similar to the real environment. In addition, this paper proposes a method for reducing computational cost in the modeling process and increasing the ease of data interpretation, a machine learning-based anomaly detection model that detects abnormal data by learning only normal data, and optimized hyperparameter values.

Implementation of Delivery Information Security System using DRM (DRM을 활용한 택배정보보안시스템 구현 방안)

  • Park, Doo-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.846-847
    • /
    • 2012
  • The domestic courier market, large and small companies working in more than 100 leading logistics service market is fully open. Year since 2001 has increased by 10%. 1.3 billion per year in 2011 saying the shipping box, and the market size is about 3 trillion won. Courier in 2012 with the growth of online shopping is expected to develop the industry further. However, these courier industry in appearance, but the consumer's personal growth and exposure, exploiting the fears of crime is high. In this paper, using DRM (Digital Rights Management) delivery method to implement information security system is proposed.

  • PDF

A Study on the Application of School Guard to School Police System (학교지킴이의 청원경찰 적용 방안에 관한 연구)

  • Park, Yong Soo
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.177-186
    • /
    • 2013
  • It has been long time since the social concern about school safety was fully raised in our country. The accidents, such as sexual violence against young children, traffic accident when going to and from school, psychological violence by bullying, extorting money & violence and so on, frequently happen. Under the circumstances that this kind of school safety problems are concerned greatly by society, it is very important for schools to create the environment in which children can have a safe living. The study focuses on the necessity and introduction of a professional school police system to establish the sexual violence prevention system in advance. The system, practically and systematically organized, can prevent various kinds of safety accidents and form the agreement of family, regional society, and related institutions alike. It is also supposed to emphasize the strengthening of school safety by its operation.