• 제목/요약/키워드: 보안우려

검색결과 206건 처리시간 0.024초

생체신호를 이용한 텔레바이오인식기술 동향 및 전망

  • Kim, Jason;Lee, Saewoom
    • Review of KIISC
    • /
    • 제26권4호
    • /
    • pp.41-46
    • /
    • 2016
  • 전통적으로 바이오인식기술은 출입국심사(전자여권, 승무원 승객 신원확인), 출입통제(도어락, 출입통제 근태관리), 행정(무인민원발급, 전자조달), 사회복지(미아찾기, 복지기금관리), 의료(원격의료, 의료진 환자 신원확인), 정보통신(휴대폰 PC 인터넷 인증), 금융(온라인 뱅킹, ATM 현금인출) 등 다방면에서 폭넓게 보급되어 실생활에서 널리 활용되고 있다. [그림1]은 신체적 특징(Physiological biometrics)과 행동적 특징(Behavioral biometrics)을 이용한 사용자 인증기술인 바이오인식기술의 유형과 함께 각 기술별 보안취약점(괄호 안 빨강색글자)을 나타내고 있다. 최근 들어, 모바일 지급결제서비스 ATM 인출기 인터넷전문은행 등과 같은 핀테크 분야에서 비대면 인증기술로 바이오인식기술이 각광을 받기 시작했다. 한편, 가짜지문 등 기존의 신체적 특징을 이용한 바이오인식기술의 위변조 위협에 대한 우려 존재함에 따라 뇌파 심전도 근전도 맥박 등 살아있는 사람의 행동적(신체의 기능적) 특징을 이용한 생체신호를 이용하여 비대면 인증기술로서 활용하기 위하여 주요 선진국에서 차세대 바이오인식 기술개발이 가속화되고 있는 추세이다.[1] 또한, 이러한 생체신호는 최근에 삼성전자, LG전자, 애플 등에서 스마트워치를 통해 심장박동수를 측정하고 스마트폰을 통하여 모바일 지급결제, 헬스케어 등과 같은 IoT 모바일 융복합 응용서비스에 활용될 전망이다. 본고에서는 뇌파 심전도(심박수)와 같은 생체신호를 측정하는 스마트워치 밴드형 의복형 또는 패치형태의 웨어러블 디바이스와 같은 생체신호센서, 생체신호 인증기술 및 관련표준화 동향을 고찰해 보기로 한다. 국내외 관련기술과 표준화 동향을 면밀히 분석하여 지난 2015년 5월29일에 발족한 국내외 전문가그룹인 KISA"모바일 생체신호 인증기술 표준연구회"(이하 KISA 표준연구회)가 구심점이 되어 한국형 생체신호를 이용한 차세대 텔레바이오인식기술에 대한 연구개발과 국내외 표준화 추진에 박차를 가할 계획이다.

Ransomware attack analysis and countermeasures of defensive aspects (랜섬웨어 공격분석 및 방어적 측면의 대응방안)

  • Hong, Sunghyuck;Yu, Jin-a
    • Journal of Convergence for Information Technology
    • /
    • 제8권1호
    • /
    • pp.139-145
    • /
    • 2018
  • Ransomeware is a kind of malware. Computers infected with Ransomware have limited system access. It is a malicious program that must provide a money to the malicious code maker in order to release it. On May 12, 2017, with the largest Ransomware attack ever, concerns about the Internet security environment are growing. The types of Ransomware and countermeasures to prevent cyber terrorism are discussed. Ransomware, which has a strong infectious nature and has been constantly attacked in recent years, is typically in the form of Locky, Petya, Cerber, Samam, and Jigsaw. As of now, Ransomware defense is not 100% free. However, it can counter to Ransomware through automatic updates, installation of vaccines, and periodic backups. There is a need to find a multi-layered approach to minimize the risk of reaching the network and the system. Learn how to prevent Ransomware from corporate and individual users.

The Effects of Characteristics of User and System on the Perceived Cognition and the Continuous Use Intention of Fintech (핀테크(fintech) 사용자와 시스템 특성이 지각된 인식과 지속사용의도에 미치는 영향)

  • Lee, Jun-Sang;Park, Jun-Hong
    • Journal of the Korea Convergence Society
    • /
    • 제9권1호
    • /
    • pp.291-301
    • /
    • 2018
  • The purpose of this study is to investigate the factors that affect the perceived awareness and the intention of continuous use by FinTech users and system characteristics. Data collection was carried out by targeting and surveying 600 people living in Gwangju, and office workers using smartphones. As a result, first, self-efficacy, innovation, and fitness for Fin-Tech services were found to influence the degree of perceptual awareness and intent to use of Fin-tech service users. Second, the system characteristics have a positive effect on perceived awareness and intention of using FinTech service. Third, the hypothesis about the dangers in the user attributes and system properties were dismissed. It seems that the priority concern was regarding the leakage of personal information and security as privacy and the increasing damage cases of financial fraud by electronic financial transactions spill. Therefore, in order to spread FinTech services, it would be effective if a Fin-Tech service strategy could eliminate inconveniences such as the risk of hindering convenience and intention to use by the marketing strategy established by the company.

A Study on the Industrial Revitalization through the Performance Analysis of the Korean Government's Cloud Policy in Service Consumer's Perspective (국내 클라우드 정책의 성과 분석을 통한 수요자 관점의 산업 활성화 연구)

  • Joe, Moon Jeung
    • Journal of Internet Computing and Services
    • /
    • 제21권1호
    • /
    • pp.159-167
    • /
    • 2020
  • The Korean government has pursued various policies to revitalize the cloud industry since 2009. In particular, the government enacted the 'Cloud Computing and Privacy Security Act' for the first time in the world in 2015, creating institutions and support programs to boost the cloud industry. As a result, the volume of the cloud industry has increased significantly, and the number of companies and professionals have increased. In this paper, the researches analyzed the situation of Korean cloud market, usage of cloud computing in enterprises, effects and problems of cloud-enabled companies based on the industrial survey conducted from 2016 to 2019, In this study, the results showed concerns of security, uncertainty about cost savings, and IT capabilities of enterprises as problems in revitalizing the cloud industry. The researches also propose strategies, perception changes, and development processes for companies to resolve the problems.

A Study of Machine Learning based Hardware Trojans Detection Mechanisms for FPGAs (FPGA의 Hardware Trojan 대응을 위한 기계학습 기반 탐지 기술 연구)

  • Jang, Jaedong;Cho, Mingi;Seo, Yezee;Jeong, Seyeon;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • 제21권2호
    • /
    • pp.109-119
    • /
    • 2020
  • The FPGAs are semiconductors that can be redesigned after initial fabrication. It is used in various embedded systems such as signal processing, automotive industry, defense and military systems. However, as the complexity of hardware design increases and the design and manufacturing process globalizes, there is a growing concern about hardware trojan inserted into hardware. Many detection methods have been proposed to mitigate this threat. However, existing methods are mostly targeted at IC chips, therefore it is difficult to apply to FPGAs that have different components from IC chips, and there are few detection studies targeting FPGA chips. In this paper, we propose a method to detect hardware trojan by learning the static features of hardware trojan in LUT-level netlist of FPGA using machine learning.

Analysis of Autonomous Driving Vehicle and Korea's Competitiveness Strategy (자율주행차 현황분석과 한국의 경쟁력 확보 전략)

  • Yang, Eun-ji;Kang, Su-jin;Kwon, So-ei;Kim, Da-yeon;Kim, Ji-won;Lee, Yu-jeong;Hwang, Hye-jeong;Chang, Young-hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • 제3권2호
    • /
    • pp.49-54
    • /
    • 2017
  • In Korea, partial self-driving feature is added on Genesis G80, Tivoli 2017, and others, and full implementation is under evaluation. Tesla already completed test for full self-driving car, Tesla Model 'X'. Further adoption of self-driving car in market will bring benefits to the elderly and disabled, meanwhile traffic accident will be decreased. However, related regulations for traffic accident with autonomous car including ethical responsibility is not fully established yet. In addition, security and privacy issue of self-driving cars should be improved as well. In this paper, domestic researches and analysis status on autonomous car will be summarized, and proper activation model will be proposed for the previously described issues.

A Study on the U-City Information Characterization for the Effective Information Management (효율적 정보관리를 위한 U-City 정보 특성분석에 관한 연구)

  • Ahn, Jong-Wook;Shin, Dong-Bin;Kim, Jung-Hoon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • 제18권1호
    • /
    • pp.119-127
    • /
    • 2010
  • In this study, U-City to effectively manage information as a basis for studies of U-City Info characteristics were analyzed. U-City services are currently being discussed which is about 228. Short-term possibility of applying these services, the service's practicality and availability of services based on public services analyzed, 39 were selected. Next, the selected U-City to target services to analyze the flow of information and analysis based on the characteristics of U-City information was derived. U-City information derived from this study, the characteristics of real-time information, and service-specific mandatory and optional information, melting complex information, dynamic information, large amounts of data, user-customized information, and information security vulnerabilities, revealing personal information and privacy is. The results of this study, governments and municipalities to promote the construction of the U-City can be used effectively. To do so, considering the characteristics of U-City information, information management standards should be established.

Authentication Method using Multiple Biometric Information in FIDO Environment (FIDO 환경에서 다중 생체정보를 이용한 인증 방법)

  • Chae, Cheol-Joo;Cho, Han-Jin;Jung, Hyun Mi
    • Journal of Digital Convergence
    • /
    • 제16권1호
    • /
    • pp.159-164
    • /
    • 2018
  • Biometric information does not need to be stored separately, and there is no risk of loss and no theft. For this reason, it has been attracting attention as an alternative authentication means for existing authentication means such as passwords and authorized certificates. However, there may be a privacy problem due to leakage of personal information stored in the server. To overcome these weaknesses, FIDO solved the problem of leakage of personal information on the server by using biometric information stored on the user device and authenticating. In this paper, we propose a multiple biometric authentication method that can be used in FIDO environment. In order to utilize multiple biometric information, fingerprints and EEG signals can be generated and used in FIDO system. The proposed method can solve the problem due to limitations of existing 2-factor authentication system by authentication using multiple biometric information.

The evaluation on the impact of introduction of 8VSB transmission method on the broadcast market -Focusing on the in-depth interviews with experts- (8VSB 도입이 방송시장에 미치는 영향에 대한 평가 -전문가 심층 인터뷰를 중심으로-)

  • Kim, HeeKyung;Kim, DugMo
    • Journal of Digital Convergence
    • /
    • 제12권5호
    • /
    • pp.501-515
    • /
    • 2014
  • The enforcement of the digital switch been two years, but more than half of the viewers are still not enjoying the benefits of it. Therefore, the government proposed that 8VSB transmission method so that majority of the viewer is able to enjoy the benefits of a digital switch. However, the claim has been suggested that 8VSB transmission method will have negative impacts on broadcast market feedback. In this regard, this study verified the effect of 8VSB and the method of minimization on the broadcast market. This study has conducted in-depth interviews concerned experts to achieve this purpose. Results of an interview revealed that the negative impact on the market of content and platforms, network is very small. In other words, the majority of the experts argued that the policy of government about 8VSB transmission are inadequate and it is improved to broaden the choice of the broadcast consumer.

Implementation of an Expert System for COTS Fault Diagnosis (COTS 고장진단을 위한 전문가 시스템 구현)

  • Kim, A-Ram;Roh, Jin-Song;Rhee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • 제11권1호
    • /
    • pp.275-281
    • /
    • 2013
  • This space is for the of your study in English. If simple menu item changes or the addition of check items are necessary on GUI menu of existing test equipments for military facilities that are programmed by using RAD tools such as Visual C++, they should go through complex steps, such as numerous conducting steps, coding, flash design modification, recompiling and distribution. It is cumbersome process and waste much time. Also, on implementing them, it was worried about leaking secrets because a number of military security considerations were included. To solve such as the above problem, we proposed commercial RIA technologies and a COTS fault diagnostic knowledge-based system that implemented by the XML data design technique in this research. The proposed approach solves the problem of existing methods, reduced inspection time, and improved performance, usability, and maintainability.