• Title/Summary/Keyword: 보안우려

Search Result 205, Processing Time 0.025 seconds

Development of Security Audit Agent for the Safety in School Network (학내전산망의 안전성 확보를 위한 보안진단 에이전트 개발)

  • Park, Jong-O;Lee, Chul-Hyun;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.1
    • /
    • pp.27-34
    • /
    • 2002
  • Internet has being grown explosively in recent years, hence it becomes easy to search and access information. But it is happening frequently to access illegally into the systems and data, there are many damage caused by them. So, it is very important that we construct security plan for the systems and data. It is not exception on school network being diffused to all schools. But, we have weakness about security to manage server and network safely. So it is causing much anxieties. In this paper, we searched security points make sure of safety of school network, and developed security audit agent helping management of security. Through simple registration process, this agent is able to audit basic and important security problems about not only server systems but also pc systems, and notify to administrator automatically. It is expected to provide efficiency in managing school network.

  • PDF

The Effect of Perceived Information Control on the Knowledge Sharing Intention of the Social Network Service Users (인지된 정보 통제가 소셜 네트워크 이용자의 정보 제공 의도에 미치는 영향)

  • Lee, Un-Kon;Kim, Kyong Kyu;Song, Ho Hyeon
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.107-127
    • /
    • 2013
  • The evolution of IT facilitated the communication and knowledge sharing between the social network service (SNS) users. When the more information about SNS users had been posted in SNS site, SNS users had sometimes exposed in the risk of privacy invasion. To remedy this problem, we had introduced the information control mechanisms from the prior studies in data management to the SNS area and empirically validated the effect of these mechanisms in this research. Three information control mechanisms had been elected as access control, reference control and diffusion control. We had conducted a survey to the Facebook users which is the most famous SNS site. 459 data had been gathered and analyzed by PLS algorism. As the results, reference control and diffusion control has significantly increased the trust on SNS providers and decrease the privacy concern. This change could significantly affect on the satisfaction with the SNS site and knowledge sharing intention of SNS users. This study could introduce the new perspective about privacy protection issues in SNS area. Also, the information control mechanisms suggested in this study could contribute to make more robust privacy protection mechanisms in SNS site in practice.

The Effect of Privacy Concerns on Using Mobile Payment Services: Moderating Effect of Multidimensional Consumer Innovativeness (프라이버시 우려가 모바일 간편결제 서비스 이용에 미치는 영향: 소비자 혁신성의 다차원적 조절효과를 중심으로)

  • Heo, Deok-Won;Sung, Wook-Joon
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.22-42
    • /
    • 2021
  • The purpose of this study is to investigate the effects of privacy concerns on the use of mobile payment services. In particular, paying attention to the multidimensionality of consumer innovation, we analyzed the effects of hierarchical logistic regression by gender. The results show that there is a positive (+) relationship for hedonic innovativeness regardless of gender, and that there is a negative (-) relationship for functional innovativeness overall and in the female group. In all groups regardless of gender, a positive (+) relationship was found for the hedonic innovativeness, and one negative (-) relationship was found in the functional innovativeness overall group and the female group. Second, in the male group, there is a moderating effect of privacy concerns and functional innovativeness. This suggests that the relationship between privacy concerns and the usage of mobile payment services may vary depending on functional innovativeness. This study is useful in that it can explain and predict consumers' patterns of use of new technology-based services in various and balanced ways by taking privacy concerns and multidimensional consumer innovation into consideration. In addition, it suggests that mobile payment companies should make efforts to ensure that their services are secure, useful, and fun to use so that consumers can feel confident using the services in various situations.

스마트 그리드에서의 프라이버시 보호

  • Park, Nam-Je;Ahn, Gil-Joon
    • Review of KIISC
    • /
    • v.20 no.3
    • /
    • pp.62-78
    • /
    • 2010
  • 최근 그린 IT에 대한 관심이 고조되면서 저탄소 녹색성장의 완성을 위해 지능형 전력망으로 불리는 스마트 그리드(Smart Grid) 기술을 도입하여 빠른 환경 변화에 한발 앞서가고 있다. 스마트 그리드를 통해 전력망이 진화하고 있지만 사이버 공격과 비고의적인 위험노출에 대한 우려도 일각에서 제기되고 있는 상황이다. 전력망이 갈수록 복잡해지고 서로 연결됨에 따라 유틸리티 공급업체의 사이버 보안 위협을 위한 노력이 점차로 중요하게 될 것이다. 이에 본 연구에서는 스마트 그리드의 개인정보보호 필요성과 침해 유형들을 살펴보고, 스마트 그리드에서의 프라이버시 보호에 대한 고려사항과 보호 제공방안을 고찰하도록 한다.

모바일 혁명시대의 공인인증서 이용 현황 및 정책 방향

  • Kang, Pil-Yong
    • Review of KIISC
    • /
    • v.21 no.1
    • /
    • pp.51-56
    • /
    • 2011
  • '손안의 PC'로 비유되는 스마트폰의 등장 및 폭발적인 보급과 함께 온라인 정보서비스 패러다임이 모바일 환경으로 급속히 전환되고 있다. 이러한 모바일 환경은 시간 및 공간의 제약없이 정보서비스를 받을 수 있는 장점이 있는 반면, 상대적으로 취약한 보안 환경으로 인한 정보보호에 대한 우려도 증가하고 있다. 이에 사이버 인감증명서로 비유되는 공인인증서는 여전히 보편적인 신뢰수단으로 그 위상을 유지할 것으로 전망되고 있으며, 본 고에서는 모바일 환경에서의 공인인증서비스 현황 몇 안전성 신뢰성 제고를 위한 정책 방향을 소개한다.

Study of Security Algorism For RFID/USN (RFID/USN 정보 보안 알고리즘)

  • Choi, Sung;Kim, Il-Kwon
    • Proceedings of the KAIS Fall Conference
    • /
    • 2008.11a
    • /
    • pp.310-312
    • /
    • 2008
  • RFID 태그의 사용에 있어서 사용자 개인의 프라이버시 문제(위치정보 또는 구매이력 노출 등)을 심각하게 인식하여야 하며 RFID 태그의 ID는 쉽게 식별되며 태그는 사용자가 알지 못하는 사이에 모든 리더에게 자동적으로 응답한다. 이러한 우려들이 RFID의 상용화에 걸림돌이 되며 성공적인 산업화를 위해서는 제반 프라이버시 문제를 해결해야 하는 것이 선결 과제로 되고 있다.

  • PDF

스턱스넷(Stunxet)의 감염 경로와 대응방안

  • Heo, Jae-Jun;Lee, Sang-Choul
    • Review of KIISC
    • /
    • v.21 no.7
    • /
    • pp.23-29
    • /
    • 2011
  • 2010년에 최초로 발견된 스턱스넷(Stuxent)은 2011년 한해 동안 보안업계 사이에서 많은 논란이 되었다. 이는 악성코드가 사이버 무기가 될 수 있다는 가능성을 현실로 만들었고, 기술적으로도 현존하는 악성코드의 모든 기술이 포함 될 정도로 정교하고 복잡한 것으로 평가받고 있다. 특히 2011년에는 스턱스넷의 소스코드 일부가 공개되어 스턱스넷의 두 번째 버전으로 알려진 변형 Duqu가 나타나기도 하여 변형에 따른 공격 우려도 높아지고 있다. 이번 논문에서는 과거 발생한 스턱스넷을 알아보고 유사한 사이버 공격에 대비하기 위한 대응 방안도 함께 살펴 볼 예정이다.

블록체인 탈중앙화 거래소 DEX의 취약점과 MEV 공격 기법 분석

  • Nakhoon Choi;Heeyoul Kim
    • Review of KIISC
    • /
    • v.34 no.1
    • /
    • pp.53-59
    • /
    • 2024
  • 블록체인 기술의 발전과 중앙집중형 금융서비스의 취약성과 불신에 대한 우려가 커지면서 탈중앙화 금융(DeFi)과 탈중앙화 거래소(DEX)가 유망한 대안으로 떠올랐다. 본 논문에서는 특히 Uniswap에 초점을 맞춰 DeFi 내의 과제와 문제를 살펴본다. 우리는 DeFi 및 DEX의 현재 상태에 대한 배경 지식을 제공하여 MEV(Maximal Extractable Value) 공격에 대한 취약성을 강조한다. 우리의 접근 방식에는 MEV 공격 패턴을 식별하고 분석하기 위한 Uniswap에 구조 분석이 포함된다. 이 연구는 DEX 보안을 강화하고 MEV 위험을 완화하기 위한 귀중한 지침을 제공하여 DeFi 생태계의 이해관계자에게 필수적인 리소스 역할을 한다.

The Study of a Development Plan of the Industrial Security Expert System (산업보안관리사 자격제도 발전 방안에 대한 고찰)

  • Cho, Yong-Sun
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.175-207
    • /
    • 2014
  • This paper focuses on the study of a development direction of the industrial security Expert system. First of all, in order to manage Industrial security system, we need to have law, criminology, business and engineering professionals as well as IT experts, which are the multi-dimensional convergence professionals. Secondly, industrial organizations need to have workforce who can perform security strategy; security plan; security training; security services; or security system management and operations. Industrial security certification system can contribute to cultivate above mentioned professional workforce. Currently Industrial Security Expert(ISE) is a private qualification. However, the author argued that it have to be changed to national qualification. In addition, it is necessary that the system should be given credibility with verifying the personnel whether they are proper or not in the their field. In terms of quality innovation, it is also necessary that distinguish the levels of utilization of rating system of the industrial security coordinator through a long-term examination. With respect to grading criteria, we could consider the requirements as following: whether they must hold the degree of the industrial security-related areas of undergraduate or postgraduate (or to be); what or how many industrial security-related courses they should complete through a credit bank system. If the plan of completing certain industrial security-related credits simply through the credit bank system, without establishing a new industrial security-related department, has established, then industrial security study would be spreaded and advanced. For private certification holders, the problem of the qualification succeeding process is important matter. Additionally, it is necessary to introduce the certifying system of ISMS(Industrial Security Management System) which is a specialized system for protecting industrial technology. To sum up, when the industrial security management system links the industrial security management certification, industrial security would realize in the companies and research institutions dealing with national key technology. Then, a group synergy effect would occurs.

  • PDF

The Relationship between Use of Internet Banking and Security Anxiety: Extending TAM (인터넷 뱅킹 사용과 보안우려의 관계: 기술수용모형의 확장)

  • Hwang Ha Jin;Lee Ung Gyu
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2003.05a
    • /
    • pp.93-105
    • /
    • 2003
  • Although, recently, studies on Internet banking users' behavior have been frequently found in some academic journals, most of them have ignored security anxiety which may be considered as important factors influencing usages of Internet banking. We propose an research model for Internet banking users which is an extended version of the Technology Acceptance Model(TAM) by adding new variable, security anxiety. For empirical support of our model, we survey for 298 samples and analyze it by structured equation model(SEM). In result, our proposed model is proved as a valid one in which all hypotheses except one are accepted and the values of model fitness are relatively high.

  • PDF