• Title/Summary/Keyword: 보안인식

Search Result 1,350, Processing Time 0.041 seconds

A Study on Improvement of Information Security awareness through Game: Focusing on Changes in Awareness of Information Security Policies (게임을 통한 정보보안인식 향상에 관한 연구: 개별 정보보안정책에 대한 인식변화를 중심으로)

  • Choi, Jong-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.951-962
    • /
    • 2018
  • In order to strengthen the information security of the organization, it is important to invest in the information security facility, but the information security awareness of the organization members is also very important. Effective education is needed to raise awareness of this information security. However, the method of collective education utilized by most organizations is not very effective. Educational methods using serious games can be a good alternative. Educational methods using serious games have already proved effective through various cases and researches and are used in many fields. In this paper, we design and implement a game program to improve the awareness of individual information security policy importance. The training was conducted for the members of the organization and the change of awareness about the importance of individual information security policy was examined through analysis of evaluation data before and after the training.

A study on the perception of the Korean industrial security ecosystem using Delphi Method (전문가 델파이기법을 활용한 한국 산업보안 생태계 인식 조사연구)

  • Kang, Min Ji;Park, Chansoo
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.89-97
    • /
    • 2020
  • Recently, security issues on industrial technology are undergoing rapid changes around the world. Developed countries are establishing response strategies to protect their own core technologies while creating conflicts with global value chains and foreign capital movement. Also in Korea, we are approaching industrial security issues in the mid- to long-term industrial competitiveness. The purpose of this study is to survey on the awareness of the industrial security ecosystem and derive key policy issues. Based on a three round survey, four policies were suggested as followings : systemization of industrial security control tower, enhancement of security company's technical skills and training of security specialists, improvement of technology leakage prevention system through retirement personnel and M&A, reinforcement of research security in R&D process and proactive technology protection. It is hoped that this study will serve as a basis for policy-making as an evidence-based study reflecting the policy demands of industrial security.

The Research on Security Cognition and Management Status of Technology Outflow about Small-medium Companies in New IT Environment (신정보화 환경에서 중소기업 기술유출에 대한 인식과 관리 실태에 관한 연구)

  • Kim, Ki Ho;Ha, Kyu Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.305-312
    • /
    • 2013
  • This research suggests the security countermeasures for solving technology outflow of small-medium companies in New IT Environment through level comparison of security cognition and security management between small-medium companies and major big companies. According to analysis results, it is poor for small-medium companies' level of security cognition and security management compared with major big companies. Small-medium companies need to manage technology outflow to major big companies' level in New IT Environment. Small-medium companies has started to build New IT Environment recently and it must build the appropriate security system for small-medium companies at the same time. Small-medium company has more problem with budget and proffessionals to maintain the security of technology outflow. Therefore government has to support systematic management for the security of technology outflow to Small-medium companies

Analysis of the Effects of Information Security Policy Awareness, Information Security Involvement, and Compliance Behavioral Intention on Information Security behavior : Focursing on Reward and Fairness (정보보안 정책 인식과 정보보안 관여성, 준수 의도성이 정보보안 행동에 미치는 영향 분석: 보상 차원과 공정성 차원을 중심으로)

  • Hu, Sung-ho;Hwang, In-ho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.91-99
    • /
    • 2020
  • The aim of this study to assess the effect of information security policy awareness, information security involvement, compliance behavioral intention on information security behavior The research method is composed of a cross-sectional design of reward and fairness. This paper focuses on the process of organizational policy on the information security compliance intention in the individual decision-making process. As a result, the reward had a significant effect on compliance behavioral intention, and it was found that influence of the psychological reward-based condition was greater than the material reward-based condition. The fairness had a significant effect on information security policy awareness, information security involvement, information security behavior, and it was found that influence of the equity-based condition was greater than the equality-based condition. The exploration model was verified as a multiple mediation model. In addition, the discussion presented the necessary research direction from the perspective of synergy by the cultural environment of individuals and organizations.

Design of 2D face recognition security planning to vulnerability (2차원 안면인식의 취약성 보안 방안 설계)

  • Lee, Jaeung;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.243-245
    • /
    • 2017
  • In the face recognition technology, which has been studied a lot, the security of the face recognition technology is improved by receiving the depth data as a weak point for the 2D. In this paper, we expect the effect of cost reduction by enhancing the security of 2D by taking new features of eye flicker that each person possesses as new data information.

  • PDF

Development of Fingerprint Recognition-Based OTP System for Financial Institutions (금융기관에서 사용하는 지문인식 기반 OTP 시스템 개발)

  • Sang-Hoon Han;Chea-Young Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.723-726
    • /
    • 2023
  • 본 논문은 기존의 OTP(One-Time Password) 시스템의 한계와 약점을 해결하기 위하여 지문인식을 활용한 OTP 시스템에 대하여 연구를 진행하였다. OTP 시스템 자체가 높은 보안성을 가지고 있지만, 은행에서 발급하는 OTP는 생성 버튼만 누르면 비밀번호가 생성되기 때문에, 분실 및 도난 상황에서 2차 인증에 대한 보안이 허술해 질 수 밖에 없다. 본 연구에서는 지문인식 기반 OTP 시스템의 개발 방법을 마련하여 사회적으로 보안에 대한 인식을 높이고, 동시에 사용자의 편의성을 높이기 위한 방법을 제시하고자 한다.

  • PDF

Development of Integrated Preservation System for Fingerprint Recognition (지문인식 통합 보안 시스템 개발)

  • Kang, Young-Goo;Jin, Jin-Yu;Yang, Hae-Sool
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.22-24
    • /
    • 2008
  • 인문 인식기술은 생체인식기술 가운데 안전성과 편리성 면에서 기능이 뛰어나고, 가장 간편하면서도 비용이 많이 들지 않으며, 다양한 분야에 적용이 가능하다는 장점이 있다. 적용 범위는 출입통제, 근태관리, 빌딩통합시스템, 금융자동화기기, 컴퓨터보안 분야, 전자상거래 인증, 공항정보 시스템 등 다양하다. 본 연구에서는 출입보안 및 대여금고, ATM(금융자동화기기)에 지문인식 기술을 적용을 통해 고객이 영업점을 방문하지 않고 가정에서도 금융업무가 가능한 인터넷뱅킹, 전자상거래 등과 같은 서비스에 인문인식 기술이 도입한 통합보안시템을 구축하며 활용방안을 제시하고자 한다.

The Influence of Information Security Behaviors on Information Security Performance in Shipping and Port Organization (해운항만조직의 정보보안이행이 정보보안성과에 미치는 영향)

  • Kang, Da-Yeon;Chang, Myung-Hee
    • Journal of Navigation and Port Research
    • /
    • v.40 no.4
    • /
    • pp.213-222
    • /
    • 2016
  • Recently, as cases of organizations' information disclosure occur continuously, it is urgent to manage security of information and establish measures to enhance security of information by an organization itself. Especially, members of an organization should be prepared with measures for information security, and an organization should do its efforts to raise its members' awareness toward information security. I set a research model to verify what effects an organization's fulfillment of regulations to secure information brings to performance of information security and selected members from maritime and port organizations and financial and insurance institutes as sample. Results of the analysis to identify factors affecting information security performance among members of maritime and port organizations are as follows. Firstly, I found that the factors affecting information security awareness are information security attitude and information security standards. Secondly, the factor giving influence on information security policy of an organization was found to be information security standards. In contrast, information security punishments and information security training were verified not to give influence on compliance of information security policy. Thirdly, information security awareness was identified to give significant influence on compliance of information security policy, information security competence and information security behavior. Fourthly, compliance of information security policy was verified to be those factors that give influence on information security competence and information security behavior. Lastly, information security competence and information security behavior were found to be such factors that give influence on information security performance.

Optical Character Recognition based Security Document Image File Management System (광학문자인식 기반 보안문서 이미지 파일 관리 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.7-14
    • /
    • 2019
  • With the development of information and communication technology, we have been able to access and manage documents containing corporate information anytime and anywhere using smart devices. As the work environment changes to smart work, the scope of information distribution is expanded, and more efforts are needed to manage security. This paper proposes a file sharing system that enables users who have smart devices to manage and share files through mutual cooperation. Proposed file sharing system, the user can add a partner to share files with each other when uploading files kept by spliting the part of the file and the other uses an algorithm to store on the server. After converting the file to be uploaded to base64, it splits it into encrypted files among users, and then transmits it to the server when it wants to share. It is easy to manage and control files using dedicated application to view files and has high security. Using the system developed with proposed algorithm, it is possible to build a system with high efficiency even for SMEs(small and medium-sized enterprises) that can not pay much money for security.

웹 2.0 환경에서의 보안 문제와 효율적 웹 검사 방안

  • Lee, Chang-Woo;Kim, Daniel;Lee, Jun-Ho
    • Review of KIISC
    • /
    • v.18 no.3
    • /
    • pp.25-33
    • /
    • 2008
  • 인터넷에 대한 지식 없이도 누구나 직접 참여하고 생성하고 공유할 수 있는 웹 2.0 환경은 새로운 사용자들을 웹으로 끌어 들이게 되었고 이로 인해 웹은 또 다른 보안 위협의 유통 채널로 확고하게 자리 잡게 되었다. 이와 같은 웹의 보안 문제는 기존의 웹 1.0의 보안 솔루션으로는 웹 2.0의 동적인 페이지와 복잡해진 서버 환경에 대응하기에 한계가 존재한다. 하지만 웹 보안에 대한 인식 부족 및 사용자와 웹 서비스 업체의 보안 불감증으로 인하여 웹 보안에 대한 연구와 솔루션이 부족한 실정이다. 본 논문에서는 웹 2.0 환경에서의 보안 문제를 분석하고 보안 문제 해결을 위한 효율적 웹 검사 방안을 제지해본다. 이와 같은 연구로 제시된 내용을 통해 현재 웹 2.0환경에서의 보안 문제에 대한 '백신'이외의 또 하나의 필수 보안 솔루션이 필요하다는 사회적 인지와 인식이 확립되고 웹 브라우저 보안 문제 해결을 위한 서비스가 보다 많이 제공되길 기대해 본다.