• Title/Summary/Keyword: 서비스 취약요소

Search Result 169, Processing Time 0.025 seconds

발명하는 사람들-제44호

  • Han, Mi-Yeong
    • The Inventors News
    • /
    • no.44
    • /
    • pp.1-16
    • /
    • 2006
  • 한국여성발명협회,제7회 정기총회 개최/2006 대한민국 여성발명품 박람회/제12회 여성발명 우수사례 발표회/새롭게 바뀐 특허분류, 무엇이 달라졌나/해외 특허, 3월부터 무료로 검색 서비스/'디자인 등록증' 취업에 필수 요소 되다/전상우 특허청장 취임식 갖다/인라인 스케이트에도 특허 열풍/김종갑 전 특허청장, 산자부 제 1차관에 임명/공익변리사에게 무료 특허상담 받으세요/전상우 특허청장, 2006년 업무계획 발표/'제41회 발명의 날' 포상계획 공고/특허기술동향조사 확대/상표 불사용 취소심판 제도 개선/한국특허정보원, 한양대학교와 업무협약 체결/담배 상표, 다등록업체 1위KT&G/계절 관련 상표 출원, '봄'을 가장 선호/사회적 취약 계층, 심판.소송 비용 지원/국제문화대학원대학교,'국제 특허.경영학, 통해 전문가 과정 양성/'2006 대한민국 특허기술 이전박람회' 신청 접수/산업재산권분쟁조정 효력, '재판상 화해'로 강화/점차 늘고 있는 '유방암' 자가 진단법/'태국 발명가의 날 전시회' 한국발명진흥회 참가/'상표 판결문 요지집' 발간/역사 속의 발명품/하루 10분 발명교실/특허Q&A/'신뢰와 성실로 지식재산의 권리화를 돕겠습니다'/설봉초등학교 발명교실/아이디어 착상 및 발명 기법/사업화 지원 제도를 제대로 활용하려면/손님의 주문으로 만든 다니의 단팥죽/일본과 유럽, 브라질 디지털 방송 쟁탈전/미국, 도요타 흔들기 나섰다/새집증후군, 시스템 환기로 줄인다/공무원이 대나무로 분뇨 구린내 잡았다/획기적인 '기능성 목발' 탄생/발광 현수막, 눈에 띄네/리빙 아이디어/특허기술평가수수료 지원/한국여성발명협회 회원사 발명품 가이드

  • PDF

The Performance Evaluation of XML-based Digital Signature System on Mobile Environment (모바일 환경에서 XML 기반 전자 서명 시스템의 성능 평가)

  • 김남윤;황기태
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.570-580
    • /
    • 2004
  • Due to development of internet and mobile communication, M-commerce applications that utilize the digital signature are widely used these days. The mobile environment is weaker than the wired internet environment. Thus, it is highly required to systematically analyze the effect of processing the digital document and the digital signature algorithm, and low bandwidth of the mobile network on the system performance. In this paper, we have constructed the mobile contract system which has the XML based digital contract and the RSA signature algorithm as the test system. And we have derived the performance parameters and then measured in detail the runtime performance of the mobile digital signature system with the Compaq iPAQ 3850 PDA and CDMA 2000 1x mobile network.

The Study on the Security Model for ActiveX Control Management through Security Authentication (보안 인증을 통한 ActiveX Control 보안 관리 모델에 관한 연구)

  • Park, Sung-Yong;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.113-119
    • /
    • 2009
  • In recent years, to provide visitors with the various and dynamic services, many ActiveX Controls are developed and distributed in most of the web sites such as e-Government Internet banking Portal in Korea. However, unsecure ActiveX Controls may be critical security threats on Internet User. Although hacking incidents increase sharply for these vulnerable ActiveX Controls, there are not enough national security actions or policies. Thus, in this paper we propose the technical method to design 'Security model for ActiveX Control Managemnet through Security Authentication' to be able safe and useful security management in three aspects of development distribution using.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

A Study on the Status and Gap Analysis of Public Library in Chungcheongnam-do (충청남도 공공도서관 현황 및 격차 분석 연구)

  • Oh, Seon-Kyung
    • Journal of Korean Library and Information Science Society
    • /
    • v.53 no.2
    • /
    • pp.215-239
    • /
    • 2022
  • All public libraries are local public goods and cultural infrastructures whose ideological pillars are publicly operated, free, and open to all. This identity is justified when the public library provides various knowledge information, various programs, and community space to local residents within the service area, and ultimately contributes to the cultural development of the nation and society. To this end, the country and local governments must expand the number of individuals that meet legal standards, deploy competent professionals, and provide facilities and spaces that are easy to access and use. However, if there is a gap in infrastructure and services between regional public libraries, it causes inequality in access and use of residents, which inevitably leads to information gap and cultural welfare gap. Therefore, this study was analyzed the relative gap using the location quotient, key infrastructure indicators and service indicators of public libraries of regional government in Korea and basic local government in the Chungnam region from the viewpoint that the balanced development and capacity building of public libraries must precede the establishment of a public library in Chungnam region as a life-friendly knowledge information service institution, culture enjoyment and lifelong learning space. Based on the results, a method to resolve the gap was suggested by dividing the elements of gaps in public libraries into accessibility, core infrastructure, and services, focusing on vulnerable cities and counties in the Chungnam region.

A Study on Utilization Strategy of Big Data for Local Administration by Analyzing Cases (사례분석을 통한 지방행정의 빅데이터 활용 전략)

  • Noh, Kyoo-Sung
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.89-97
    • /
    • 2014
  • As Big Data's value is perceived and Government 3.0 is announced, there is a growing interest in Big Data. However, it won't be easy for each public institute or local government to apply Big Data systematically and make a successful achievement despite lacking of specific alternative plan or strategy. So, this study tried to suggest strategies to use Big Data after arranging the area which local government utilize it in. As a result, utilization areas of local administration's Big Data are divided into four areas; recognizing and corresponding the abnormal phenomenon, predicting and corresponding the close future, corresponding analyzed situation and developing new policy(administration service), and citizen customized service. In addition, strategies about how to use Big Data are suggested; stepwise approach, user's requirements analysis, critical success factors based implementation, pilot project, result evaluation, performance based incentive, building common infrastructure.

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

How to Cope with Ransomware in the Healthcare Industry (의료산업에서의 랜섬웨어 대응 방법)

  • Jeon, In-seok;Kim, Dong-won;Han, Keun-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.155-165
    • /
    • 2018
  • As medical healthcare industry is growing up rapidly these days, providing various new healthcare service is considered carefully. Health information is considered to be more important than financial information; therefore, protecting health information becomes a very significant task. Ransomware is now targeting industry groups that have high information value. Especially, ransomware has grown in various ways since entering maturity in 2017. Healthcare industry is highly vulnerable to ransomeware since most healthcare organizations are configured in closed network with lack of malware protection. Only meeting the security criteria is not the solution. In the case of a successful attack, restoration process must be prepared to minimize damages as soon as possible. Ransomware is growing rapidly and becoming more complex that protection must be improved much faster. Based on ISO 27799 and 27002 standard, we extract and present security measures against advanced ransomware to maintain and manage healthcare system more effectively.

Analysis of Security Technology for Internet of things (사물인터넷 보안 기술 분석)

  • Lee, Ho-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.43-48
    • /
    • 2017
  • Today our society is approaching new intelligence information society, which has been caused by the Fourth Industrial Revolution along with the development of information and communication technology(ICT). And this has just opened a new era of Internet of Things(IoT) that connects between human and objects and between objects through network, allowing transmission and reception of information beyond the limits of space. However, many crises occurred in the existing communication environment may threaten the security of Internet of Things, by violating the three components of information security. In this paper, this study aims to analyze security technology to achieve advanced security by dividing IoT security technology for coping with security vulnerability found in different components into three groups.

A Study on fine dust data collection and analysis using Drone (드론을 활용한 미세먼지 데이터 수집 및 분석에 관한 연구)

  • Kyoung-mok Kim;Ho-beom Jeon;Geun-Seun Lim
    • Journal of the Health Care and Life Science
    • /
    • v.9 no.2
    • /
    • pp.231-235
    • /
    • 2021
  • This study collects and provides environmental data related to weather by measuring the concentration levels of fine dust at different altitudes, with the aim of forecasting fine dust concentration changes, particularly in the areas where the vulnerable reside. Institutions in the healthcare-related fields can use the real-time data on the changing fine dust concentration, which is collected through different combinations of various measuring devices and drone technologies, which have recently developed at a rapid pace. The study first collects data on the following: PM1 (fine dust particles <1 ㎛ in size), PM2.5 (fine dust particles <2.5 ㎛ in size), and PM10 (fine dust particles <10 ㎛ in size) and predicts respective changes and suggests data on various high levels. The device that was used in the study measured fine dust concentration, humidity, temperature, atmospheric pressure, carbon dioxide, total volatile organic compounds (TVoc), and formaldehyde.