• Title/Summary/Keyword: 위.변조 방지

Search Result 104, Processing Time 0.025 seconds

The Effect of Information Security Breach and Security Investment Announcement on the Market Value of Korean Firms (정보보안 사고와 사고방지 관련 투자가 기업가치에 미치는 영향)

  • Kwon, Young-Ok;Kim, Byung-Do
    • Information Systems Review
    • /
    • v.9 no.1
    • /
    • pp.105-120
    • /
    • 2007
  • With the fast development of the Internet and the increasing dependence on information infrastructures, companies are faced with various information security threats such as information leakages, modifications, and information breaches. South Korea is one of the leading countries in the Internet usage, but is ranked relatively low when it comes to information security. In fact, many Korean firms have suffered financial losses and damaged corporate images from the information security breaches. However, because of the difficulties in quantifying the costs of the information security breaches, Korean companies tend to delay their investment decisions on information security. The purpose of this study is to measure the cost of information security breach and the economic value of security investment using the event study methodology. Our results show that the announcement of an information security breach negatively influenced the market value of the corresponding company. The effect was statistically significant at the significance level of p=0.05. The breached companies lose, on average, 0.86% of their market values on the day of the announcement - an average loss in market capitalization of $55 million. On the other hand, the investment on information security had no effect on the stock price or the market value of the firm.

Study on the effect of p-type doping in mid-infrared InAs/GaSb superlattice photodetectors

  • Han, Im-Sik;Lee, Yong-Seok;Nguyen, Tien Dai;Lee, Hun;Kim, Jun-O;Kim, Jong-Su;Gang, Sang-U;Choe, Jeong-U;Kim, Ha-Sul;Ku, Zahyun;Lee, Sang-Jun
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2015.08a
    • /
    • pp.170.1-170.1
    • /
    • 2015
  • 안티모니 (Sb)를 기반으로 한 제2형 초격자 (Type II superlattice, T2SL)구조 적외선 검출기 연구는 2000년대 들어 Sb 계열의 화합물 반도체 성장 기술이 발전함에 따라 HgCdTe (MCT), InSb, 양자우물 적외선 검출기 (QWIP)를 대체할 수 있는 고성능의 양자형 적외선 검출 소재로 부상하였으며, 현재 전 세계적으로 활발한 연구가 진행되고 있다. 특히, 기존의 양자형 적외선 검출소자에 비해 전자의 유효질량이 상대적으로 커서 밴드 간의 투과전류가 줄어들 뿐만 아니라, 전자와 정공이 서로 다른 물질 영역에 분포하여 Auger 재결합률을 효과적으로 줄일 수 있어 상온 동작이 가능한 소재로 주목을 받고 있다. 또한, T2SL 구조는 초격자를 구성하는 물질의 두께나 조성 변화를 통한 밴드갭 변조가 용이하여 단파장에서 장파장 적외선에 이르는 광범위한 파장 대역에서 동작이 가능할 뿐만 아니라 구조적 변화를 통해 이중 대역을 동시에 검출 할 수 있는 차세대 적외선 열영상 소자로 알려져 있다. 본 연구에서는 분자선 에피택시(MBE)법을 이용하여 300 주기의 InAs/GaSb (10/10 ML) 제2형 초격자 구조를 성장하여 적외선 검출소자를 제작하였다. 제2형 초격자 구조를 구성하는 물질계에 p-type dopant인 Be을 이용하여 각각 도핑 농도가 다른 시료를 성장하였다. 이때 p-type 도핑 농도는 각각 $1/5/10{\times}10^{15}cm^{-3}$로 변화를 주었다. 성장된 시료의 구조적 특성 분석을 위해 고분해능 X선 회절 (High resolution X-ray diffraction, HRXRD)법을 이용하였으며, 초격자 한 주기의 두께가 6.2~6.4 nm 로 설계된 구조와 동일하게 성장됨을 확인 하였으며, 1차 위성피크의 반치폭은 30~80 arcsec로 우수한 결정성을 가짐을 확인하였다. 적외선 검출을 위한 $410{\times}410{\mu}m^2$ 크기의 단위 소자 공정을 진행하였으며 이때 적외선의 전면 입사를 위해 소자 위에 $300{\mu}m$의 윈도우 창을 제작하였다. 단위 소자의 측벽에는 표면 누설 전류가 흐르는데 이를 방지하기 위해서 표면보호막을 증착하였다. 적외선 검출 소자의 전기적 특성 평가를 위해 각각의 시료의 암전류 (dark current)와 파장별 반응 (spectral response)을 온도별로 측정하여 비교 및 분석하였다.

  • PDF

Analysis on Power Consumption Characteristics of SHA-3 Candidates and Low-Power Architecture (SHA-3 해쉬함수 소비전력 특성 분석 및 저전력 구조 기법)

  • Kim, Sung-Ho;Cho, Sung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.115-125
    • /
    • 2011
  • Cryptographic hash functions are also called one-way functions and they ensure the integrity of communication data and command by detecting or blocking forgery. Also hash functions can be used with other security protocols for signature, authentication, and key distribution. The SHA-1 was widely used until it was found to be cryptographically broken by Wang, et. al, 2005. For this reason, NIST launched the SHA-3 competition in November 2007 to develop new secure hash function by 2012. Many SHA-3 hash functions were proposed and currently in review process. To choose new SHA-3 hash function among the proposed hash functions, there have been many efforts to analyze the cryptographic secureness, hardware/software characteristics on each proposed one. However there are few research efforts on the SHA-3 from the point of power consumption, which is a crucial metric on hardware module. In this paper, we analyze the power consumption characteristics of the SHA-3 hash functions when they are made in the form of ASIC hardware module. Also we propose power efficient hardware architecture on Luffa, which is strong candidate as a new SHA-3 hash function. Our proposed low power architecture for Luffa achieves 10% less power consumption than previous Luffa hardware architecture.

A Quantization-adaptive Watermarking Algorithm to Protect MPEG Moving Picture Contents (MPEG 동영상 컨텐츠 보호를 위한 양자화-적응적 워터마킹 알고리즘)

  • Kim Joo-Hyuk;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.149-158
    • /
    • 2005
  • This paper proposed a blind watermarking method for video contents which satisfies both the invisibility and the robustness to attacks to prohibit counterfeiting, modification, illegal usage and illegal re-production of video contents. This watermarking algorithm targets MPEG compression system and was designed to control the amount of watermarking to be inserted according to the adaptive quantization scale code to follow the adaptive quantization of the compression system. The inserting positions of the watermark were chosen by considering the frequency property of an image and horizontal, vertical and diagonal property of a $8{\times}8$ image block. Also the amount of watermarking for each watermark bit was decided by considering the quantization step. This algorithm was implemented by C++ and experimented for invisibility and robustness with MPEG-2 system. The experiment results showed that the method satisfied enough the invisibility of the inserted watermark and robustness against attacks. For the general attacks, the error rate of the extracted watermark was less than $10\%$, which is enough in robustness against the attacks. Therefore, this algorithm is expected to be used effectively as a part in many MPEG systems for real-time watermarking, especially in the sensitive applications to the network environments.