• Title/Summary/Keyword: 보안인식

Search Result 1,350, Processing Time 0.036 seconds

A Design of Peer-to-Peer Network Security Model using Fingerprint Recognition (지문 인식을 이용한 Peer to Peer Network 보안 모델의 설계)

  • 박정재;구하성
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.06a
    • /
    • pp.481-487
    • /
    • 2001
  • 본 논문은 현재까지 제시되어진 peer to peer network model들을 정리하고 대표적인 peer to peer network model에 지문인식을 적용하여 개인에 대한 신원 인증 절차를 수행함으로써 보안에 대한 새로운 해결책을 제안하였다. 기존의 peer to peer network model은 개인 대 개인간의 효율적인 network검색 기능과 분산 computing 환경을 제공하지만 보안에 관해서는 아직까지도 많은 연구가 필요하다. 본 연구에서는 기존의 peer to peer network model들에 지문인식을 사용한 새로운 보안 model을 설계하였다.

  • PDF

Analysis of Optical Encryption System using JTC Architecture (JTC 구조를 사용하는 광암호화 시스템의 분석)

  • 주성현;유재성;정만호
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2003.02a
    • /
    • pp.68-69
    • /
    • 2003
  • 사회의 정보화가 진전됨에 따라 개인 정보의 보안이 중요한 문제로 대두되고 있고, 이를 위한 보안 시스템들이 활발하게 연구되고 있다. 이 중에서 지문인식이나 얼굴인식과 같은 생체인식을 이용한 시스템들이 차세대 보안시스템으로 채택되는 것은 거스를 수 없는 대세로 받아들여지고 있다. 또한 이러한 보안시스템들이 정상적으로 운영되기 위해서는 외부로 노출되는 반드시 생체패턴을 보호하기 위한 방법이 필요하게 된다. (중략)

  • PDF

The improved pre-treatment method for the finger vein pattern (지정맥 패턴 인식을 위한 개선된 전처리 방법)

  • Lee, Sunbum;Kang, Bongsoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.365-367
    • /
    • 2016
  • Recently, the importance of personal information security has emerged. In particular, the importance of biometrics such as voice recognition, fingerprint recognition, face recognition has been highlighted in various fields such as access control, banking security, personal PC security and so on. But if such conventional security techniques are likely to be recognized by an external factor failure. In contrast, if the vein recognition is impossible to copy and counterfeit. Therefore less likely to fail due to external factors has the advantage. In this paper, propose a preprocessing method to improve on the existing vein pattern recognition with high reliability than existing biometric technologies.

  • PDF

Hospital Security System using Biometric Technology (바이오메트릭스 기술을 이용한 병원보안시스템)

  • Jung, Yong-Gyu;Kang, Jeong-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.219-224
    • /
    • 2011
  • Recently increasing importance of information security, personal security is researched. Among them, biometrics research is very good at recognition and security particularly in terms of iris recognition. Recent hospital physicians and employees for access control is emphasized. But most of them, easy-employee card access control systems are used. It has difficulties of iris recognition on the issue of accurate iris recognition algorithm to eliminate noise and inaccuracy of pretreatment methods for recognition from existing research. Therefore, this paper complements existing encryption methods to the disadvantages of biometric iris recognition using high-access records in the hospital management system is applied. In addition to conventional pretreatment process to increase recognition eyebrows when mask line component added to the extraction mask, the correct preparation method, and accordingly proposed to improve the recognition of records management systems offer access to the hospital.

An empirical study on the relationship of personal optimistic bias and information security awareness and behavior in the activity of information ethics (정보윤리 활동에서 개인의 낙관적 편견과 정보보안 인식 및 정보보안 행위와의 관련성에 관한 실증 연구)

  • Choi, Jong-Geun;Che, Myung-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.538-547
    • /
    • 2016
  • With respect to the factors affecting information security awareness and behavior, the study of the relevance of the concept of optimistic bias is actively used in psychology. In other words, this study examines whether the optimistic bias of individuals affects information security in the field. In this sense, this study attempted to demonstrate the relevance of optimistic bias in information security behavior and awareness. A questionnaire survey was conducted targeting 111 people engaged in domestic private enterprises. The survey results showed that this personalized optimistic bias exists because of empirical factors related to personal security. Optimistic bias affects the security awareness information. The greater the optimistic bias, the lower the awareness and recognition of information security. In other words, optimistic bias affects information security awareness. Reducing the effects of optimistic bias is expected to reduce information security incidents, such as information leakages. However, the variety of information related ethical activities of a company did not have any effect on the information security awareness. Most previous studies have only examined the effect optimistic bias in the field of health. Therefore, this study fills an important gap in research in IT.

An Investigation into the Role of Technostress in Information Security Context (기술스트레스가 정보보안에 미치는 영향에 관한 연구)

  • Park, Chul-Ju;Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.37-51
    • /
    • 2012
  • The purpose of this study is to approach information security from a more comprehensive perspective. Particularly, information countermeasures includes a technological tool for end users, thereby increasing the end users' technological stresses. Based on the technostress framework, we investigate a effect of security awareness training on technostress, and also examine a effect of technostress on the persistent security compliance. Results showed that security awareness training influenced on techno-overload and techno-uncertainty. We also found that techno-overload and techno-uncertainty have a significant effect on the persistent security compliance. Conclusion and implications are discussed.

The reinforcement of existing fingerprint recognition system by the supplementary information (추가 정보를 이용한 개선된 지문인식 시스템)

  • Lee, Jin-Young;Kim, Bo-Nam;Kim, Ga-Won;Shim, Hoon;Kim, Heung-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.639-642
    • /
    • 2007
  • 오늘날 네트워크의 급속한 발전에 더불어 정보화의 가속화는 보안 문제가 크게 부각하고 있다. 이에 마그네틱 카드, IC 카드 등을 이용하여 개인을 식별하는 다양한 보안 시스템들이 개발되고 있으나 분실, 복사, 고의적 양도에 의한 부정사용 등의 문제로 인해 그 해결책이 되지 않고 있으며 이에 대한 해결책으로 생체인식(Biometrics)을 이용한 개인식별 시스템[1]이 제안되어 연구가 진행되고 있다. 본 논문은 기존의 생체인식 시스템 중 가장 활발하게 활용되고 있는 지문인식 시스템이 가지고 있는 환경적인 요소나 물리적 요소에 의한 인식률 저하를 보안할 수 있는 시스템을 새롭게 제안한다. 지문인식은 사용의 편리함과 저가의 초기 투자비용, 그리고 소형화의 가능으로 생체인식 중에서 실생활에 사용되기 가장 적합한 기법으로 여겨져 다양한 응용 범위에 널려 사용되고 있다. 따라서, 제안 시스템은 기존의 지문인식 시스템을 기반으로 하여 손가락에서 추가적인 생체정보를 이용함으로써 지문인식 시스템이 갖은 단점을 보안하면서 인식률 향상과 효율적인 활용이 가능한 시스템을 제안한다.

  • PDF

The Impact of Cognitive Factors of IS Security Risk Management(ISM) on Awareness and Intention to Develop ISM (보안관리 인지 요인이 조직의 정보시스템 보안위험관리에 대한 인식 및 개발의지에 미치는 영향)

  • Kim, Sanghyun;Song, Youngmi
    • Information Systems Review
    • /
    • v.14 no.2
    • /
    • pp.21-46
    • /
    • 2012
  • Organizations that make widely use of information technologies can be more efficient. But, the dependence of information technologies leads to an increase in threat of security. This is the reason why organizations are investing in security risk management (SRM) which is designed to protect of information assets. Noting a lack of empirical research in SRM, we investigate the key factors having a direct effect on performance of SRM. Particularly, this study focused on identifying factors influencing awareness of SRM and Intention to develop SRM in Organization. Based on relevant literature review, six motivating factors, including Behavior for Security Management, Compliance with Security Policy, perceived Benefits, Perceived Sacrifice, Social Pressure, Experience of Security Risks, were initially identified. The results indicated that most perception factors were positively related to Organization's intention to develop SRM and awareness of SRM, which then had positive impact on performance of SRM. But Perceived Sacrifice was not significantly related to two variables which is Organization's intention to develop SRM and awareness of SRM.

  • PDF

Design and Implementation of Biometrics Security System Using photoplethysmogram (광용적맥파를 이용한 생체인식 보안시스템의 설계 및 구현)

  • Kim, Hyen-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.4
    • /
    • pp.53-60
    • /
    • 2010
  • Biometrics are methods of recognizing a person based on the physiological or behavioral characteristics of his of her body. They are highly secure with little risk of loss or falsification by others. This paper has designed and implemented a security system of biometrics by precisely measuring heartbeat signals at two fingertips and using a photoplethysmogram, which is applicable to biometrics. A performance evaluation has led to the following result. The security system of biometrics for personal authentication which has been designed and implemented by this study has achieved a recognition rate of 90.5%. The security system of biometrics suggested here has merits of time saving and easy accessibility. The system is touch-based and collects the necessary biometrics information by simply touching the machine with fingers, so anyone can utilize the system without any difficulty.

Context-Aware Security Service using FCM Clustering and Multivariate Fuzzy Decision Tree (FCM 클러스터링과 다변량 퍼지결정트리를 이용한 상황인식 보안 서비스)

  • Yang, Seokhwan;Chung, Mokdong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1527-1530
    • /
    • 2009
  • 유비쿼터스 환경의 확산에 따른 다양한 보안문제의 발생은 센서의 정보를 이용한 상황인식 보안 서비스의 필요성을 증대시키고 있다. 본 논문에서는 FCM (Fuzzy C-Means) 클러스터링과 다변량 퍼지 결정트리 (Multivariate Fuzzy Decision Tree)를 이용하여 센서의 정보를 분류함으로써 사용자의 상황을 인식하고, 사용자가 처한 상황에 따라 다양한 수준의 보안기술을 유연하게 적용할 수 있는 상황인식 보안 서비스를 제안한다. 제안 모델은 기존에 많이 연구되어 오던 고정된 규칙을 기반으로 하는 RBAC(Role-Based Access Control)계열의 모델보다 더욱 유연하고 적합한 결과를 보여주고 있다.