• Title/Summary/Keyword: 애플리케이션 보안

Search Result 284, Processing Time 0.029 seconds

A Study of Quality-based Software Architecture Design Model under Web Application Development Environment (품질기반 웹 애플리케이션 개발을 위한 소프트웨어아키텍쳐 설계절차 예제 정립)

  • Moon, Song Chul;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.115-122
    • /
    • 2012
  • As the most common application development of software development time, error-free quality, adaptability to frequent maintenance, such as the need for large and complex software challenges have been raised. When developing web applications to respond to software reusability, reliability, scalability, simplicity, these quality issues do not take into account such aspects traditionally. In this situation, the traditional development methodology to solve the same quality because it has limited development of new methodologies is needed. Quality of applications the application logic, data, and architecture in the entire area as a separate methodology can achieve your goals if you do not respond. In this study secure coding, the big issue, web application factors to deal with security vulnerabilities, web application architecture, design procedure is proposed. This proposal is based on a series of ISO/IEC9000, a web application architecture design process.

A Study on Development of Application Model for Prevention and Management of Obesity in Children with Disabilities (장애아동 비만 예방·관리를 위한 애플리케이션 모형 개발에 관한 연구)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.85-90
    • /
    • 2020
  • The purpose of this study was to provide information necessary for development of the applications that could facilitate the prevention and management of obesity in children with intellectual disabilities and to present improvement measure for development of practical applications. Mobile applications for prevention and management of obesity for children with intellectual disabilities need to be configured to enable effective flow of information and services delivered between parents and children with disabilities through applications. This configuration is expected to allow effective obesity control to be derived through parental involvement in the process of motivation.. The composition of contents consists of three parts: nutrition, exercise(physical activity), and lifestyle. It is desirable for each content to be applied in a simple but easy-to-understand method, reflecting the characteristics of an intellectually disabled child. In addition, this study presented the user expansion and their continuous involvement through interface simplification, alert function, reward, voice recognition and subtitle support strategies in consideration of the characteristics of the children with intellectual disabilities.

A Web application vulnerability scoring framework by categorizing vulnerabilities according to privilege acquisition (취약점의 권한 획득 정도에 따른 웹 애플리케이션 취약성 수치화 프레임워크)

  • Cho, Sung-Young;Yoo, Su-Yeon;Jeon, Sang-Hun;Lim, Chae-Ho;Kim, Se-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.601-613
    • /
    • 2012
  • It is required to design and implement secure web applications to provide safe web services. For this reason, there are several scoring frameworks to measure vulnerabilities in web applications. However, these frameworks do not classify according to seriousness of vulnerability because these frameworks simply accumulate score of individual factors in a vulnerability. We rate and score vulnerabilities according to probability of privilege acquisition so that we can prioritize vulnerabilities found in web applications. Also, our proposed framework provides a method to score all web applications provided by an organization so that which web applications is the worst secure and should be treated first. Our scoring framework is applied to the data which lists vulnerabilities in web applications found by a web scanner based on crawling, and we show the importance of categorizing vulnerabilities according to privilege acquisition.

Artifacts Analysis of GoToWebinar and GoToMeeting (화상 회의 애플리케이션 GoToWebinar 및 GoToMeeting 아티팩트 분석 )

  • Soojin Kang;Giyoon Kim;Yangsun Lee
    • Journal of Platform Technology
    • /
    • v.11 no.1
    • /
    • pp.11-22
    • /
    • 2023
  • Various video conferencing and collaboration applications have emerged due to the global epidemic of new viral infections. In addition to real-time video conferencing, video conferencing applications provide features such as chat and file sharing on various platforms. Because various personal information is stored through functions such as chatting, file and screen sharing, these video conferencing applications are the major target of analysis from a digital forensic investigation. In the case of applications that provide cross-platform, the form of stored data is different depending on the platform. Therefore, to utilize data of video conferencing application for forensic investigation, preliminary research on artifacts stored by platform is required. In this paper, we used the video conferencing applications GoToWebinar and GoToMeeting and analyzed the artifacts generated. As a result, we list the main data from a digital forensic investigation. We identify data stored for each platform provided by GoToWebinar and GoToMeeting and organize artifacts that can estimate user behavior. Also, we classify the data that can be acquired according to the role and environment within the video conference.

  • PDF

School Bus Reservation Android Application (통학 버스 예약 안드로이드 애플리케이션)

  • Choie, Jae-Hyeok
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.969-971
    • /
    • 2021
  • 본 논문은 통학버스 예약 시스템으로 안드로이드 모바일 애플리케이션을 통하여 직관성 있는 UI와 빠른 피드백을 제공하는 실시간 서비스를 이용하여 통학버스를 이용하는 학생에게 간편하고 빠른 자리 예약 서비스를 제공한다.

A Study on countermeasures against Mobile Application's SSL Pinning bypass (모바일 애플리케이션의 SSL Pinning 우회에 대한 대응방안 연구)

  • Shin, Sang-Gil;Kim, Mun-Hyeon
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.270-272
    • /
    • 2017
  • 스마트폰 애플리케이션의 종류가 다양해지고 사용 빈도수가 높아지는 만큼 정보보안에 대한 중요성도 나날이 증가하고 있다. 최근 기업, 금융기관들은 스마트폰 애플리케이션 서비스에서 사용자와 서버 간 통신 시 MITM공격에 대비하기 위해 SSL Pinning 기술을 사용하고 있는데 본 연구에서는 이를 우회할 수 있는 방법을 소개하고 시연하며, 이에 대한 대응방안을 소개한다.

A Study on SMiShing Detection Technique using TaintDroid (테인트드로이드를 이용한 스미싱 탐지 기법 연구)

  • Cho, Jiho;Shin, Jiyong;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.3-9
    • /
    • 2015
  • In this paper, a detection technique of smishing using a TaintDroid is suggested. Suggesting system detects malicious acts by transmitting a URL to the TaintDroid server and installing a relevant application to a virtual device of the TaintDroid server, when a smartphone user receives a text message including the URL suspected as a smishing. Through this we want to distinguish an application that can not install because of suspicion of a smishing in an actual smartphone whether said application is malicious application or not by testing with the virtual device of said system. The detection technique of a smishing using the TaintDroid suggested in this paper is possible to detect in a new form a smishing with a text message and to identifying which application it is through analysis of results from a user.

Consideration for Web Services Security (웹 서비스 보안기술에 대한 고찰)

  • 이대하;문진영;박찬규;조현규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.85-87
    • /
    • 2003
  • 최근 이 기종 시스템 및 애플리케이션에 상관없이 동일한 서비스를 제공할 수 있는 웹 서비스에 대한 관심이 고조되어 가고 있다. 하지만, 웹의 편리함과 동시에 누구에게나 접근 가능한 웹의 개방성은 보안에 대한 문제점을 야기 시키는데, 웹 서비스 보안기술은 이에 대한 해결책을 제시하고 있다. 본고에서는 웹 서비스 보안 기술의 구성요소 및 보안 메커니즘에 대해 살펴보고자 한다.

  • PDF

스마트폰을 위한 보안 키패드의 안전성 분석

  • Lee, Dong-Hyun;Bae, Dong-Hwan;Yoo, Seung-Lok;Chae, Jin-Young;Lee, Yun-Ho;Yang, Hyung-Gyu
    • Review of KIISC
    • /
    • v.21 no.7
    • /
    • pp.30-37
    • /
    • 2011
  • 보안 키패드는 사용자가 스마트폰을 이용하여 금융 거래를 할 때 사용자가 입력한 패스워드의 터치 좌표가 노출되더라도 키 값을 유추할 수 없도록 한 보안 애플리케이션이다. 하지만, 현재 상용화된 보안 키패드는 좌표값 노출에 따른 키값 노출을 막기 어려우며, 특히 휴리스틱 분석이나 사전 공격(dictionary attack)등에 취약한 문제가 있다. 본 논문에서는 현재 사용되는 보안 키패드의 취약점을 분석하고, 이러한 취약점을 해결하기 위한 몇 가지 개선 방안을 제안한다.

Development of the Elements to Improve the Usability of RFIO Business-Aware Framework (RFID Business-Aware Framework의 사용성 향상을 위한 보완요소 개발)

  • Kim Seong-Jin;Yeom Keun-Hyuk;Moon Mi-Kyeong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.214-216
    • /
    • 2006
  • RFID기술은 21세기 유비쿼터스세상의 핵심적인 수단으로 대두되고 있고 물류, 보안, 상품인식 등 생활과 산업 등의 모든 분야에 접목이 가능하다. 지금까지의 RFID시장은 리더, 태그 중심의 하드웨어 중심이었으나 최근 여러 Global 소프트웨어업체들의 참여로 소프트웨어 부분이 강화되고 있는 추세이다. Business Aware Framework(BizAF)는 RFID리더를 제어하고 RFID이벤트를 필터링하는 RFID 미들웨어와 애플리케이션 중간단계에서 효율적이고 빠른 RFID 애플리케이션 개발을 지원한다. BizAF는 RFID이벤트로부터 애플리케이션이 이용 가능한 고수준의 이벤트를 생성함으로써 RFID기술 사용로직 구성을 도와준다. 그러나 현재의 BizAF는 고수준의 이벤트 생성이라는 기능에만 집중함으로써 BizAF를 적용하여 RFID 애플리케이션을 개발할 때 접근이 용이하지 않다. 본 논문에서는 BizAF의 사용성 향상을 위한 보완요소를 분석하고 구현하여 BizAF에 포함시킴으로써, 궁극적으로 빠르고 효율적인 RFID 애플리케이션 개발에 기여하고자 한다.

  • PDF