• Title/Summary/Keyword: 정보보안 관여도

Search Result 126, Processing Time 0.025 seconds

Security-intensified SSL VPN and WLCAPT Virtual Server Design (SSL VPN의 보안 강화와 WLCAPT 가상 서버 설계)

  • Jeong Eun-Hee;Choi Eun-Sil;Lee Byung-Kwan
    • Journal of Internet Computing and Services
    • /
    • v.5 no.6
    • /
    • pp.45-58
    • /
    • 2004
  • This paper consists of two parts, One is the ECC( GF(2/sup m/)) algorithm to improve the security strength and the processing time of SSL VPN and the other is the WLCAPT algorithm instead of LSNAT for the security strength of virtual server. In general when corporates use SSL protocol in order to build VPN, they use RSA algorithm with the problem of security and processing time about authentication and confidentiality, In this paper, a shared public key is generated with ECSPK which uses ECC( GF(2/sup m/)) algorithm to improve the security and processing time instead of RSA In addition, WLCAPT algorithm proposed in this paper is applied to virtual server which resides in the server side and then after NAT translation, the actual server of headquarter is securely communicated with it.

  • PDF

A Study on Utilizing SNS to Vitalize Smart Learning (스마트러닝 활성화를 위한 SNS활용 방안 연구)

  • Kang, Jung-Hwa
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.265-274
    • /
    • 2011
  • Smart-Learning has been increasing with the growth of smartphone usage. Looking at previous research, this study established the concept of smart learning, current understanding of smart learning and the requirements for smart learning. Subsequently, It was established a concept of SNS, reviewing future education, self-directed learning by using social network, and suggests policies of vitalizing smart-learning by using SNS. In order to use SNS in smart learning, first it is proposed the need for smart learning laws and institutions, particularly with young people considering their emotions in order to expand what is proposed. secondly, the need for SNS usage to be socially and culturally relevant. third and finally, the need for strengthening information security with co-operation from the government.

A Design of MAC based SDAP(Secure Data Aggregation Protocol) for security and communication efficiency on VANET (VANET에서 보안과 통신효율을 고려한 MAC기반 SDAP(Secure Data Aggregation Protocol) 설계)

  • Lee, Byung-kwan;Ahn, Heui-hak;Jeong, Eun-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.650-652
    • /
    • 2013
  • As VANET(Vehicular Ad-hoc NETwork) improves road safety, efficiency, and comfort, and provides a value-added service such as commerce information or internet access. it is the most important technology in ITS(Intelligent Transportation System). But, In VANETs, better communication efficiency can be achieved by sacrificing security and vice versa. VANETs cannot get started without either of them. Therefore, to solve these problems simultaneously, this paper proposes MAC(Message Authentication Code) based SDAP(Secure Data Aggregation Protocol) which removes redundant data or abnormal data between vehicles and verifies the integrity of message. The MAC based SDAP not only improves the efficiency of data delivery but also enhances the security by detecting malicious attacks such as propagation jamming attack, forgery attack, and disguised attack.

  • PDF

An Adaptive Watermarking with Improved Quality (화질이 개선된 적응적 워터마킹)

  • 고종관;이규대;김진업
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.11b
    • /
    • pp.234-237
    • /
    • 2002
  • 디지털 워터마크는 멀티미디어 콘텐츠에 대한 저작권 보호와 인증의 목적으로 최근에 제안되었다. 워터마킹 기술은 공간영역이나 주파수 영역에서 워터마크를 삽입하는 알고리즘으로 구성된다. 본 논문에서는 기존의 공간영역의 워터마킹 방법을 보안, 개선하였고, 주변화소의 밝기를 고려하여 워터마크의 정보를 삽입하는 방법을 이용하였다. 실험은 영상의 화질저하를 추정하기 위해 PSNR을 계산하고, 제안하는 알고리즘으로 삽입된 영상의 화질이 개선됨을 보이고 외부의 공격에도 워터마크가 추출됨을 보인다.

  • PDF

A Study on the Effects of Earnings Management in Outside Directors System for Information Security Company (정보보안기업의 사외이사제도가 이익조정에 미치는 영향에 관한 연구)

  • Kim, Dong Young
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.2
    • /
    • pp.143-158
    • /
    • 2014
  • Country ownership and management of information security companies generally do not clearly separate from the Board of Directors to function smoothly controlling shareholders do not participate in management decision-making and internal control board does not perform the task correctly, they said the issue was raised. The purpose of this study is to improve corporate governance, information security companies of the outside director system was introduced as part of the transparency of accounting information to investigate whether the effectiveness of the overall business management is also part of the efficient management of operations and earnings being with respect to the empirical data would be analyzed using the. This means that with the specific purpose of the characteristics of a technology-intensive company focusing on information security proportion of outside directors and outside directors of the board of directors of the board of directors of the target attendance rate for identifying the relationship between earnings management purposes. The empirical results is the ratio of outside directors and the relationship between discretionary accruals as a temporary negative (-) boyimyeo significant relationship, so was adopted. is discretionary accruals and attendance of outside directors, as is the hypothesis that the regression coefficient negative (-) shows the relationship between the mind, so was adopted.

테마연재 / 에셜론[Echelon]에 의한 도·감청 및 프라이버시 침해..

  • Kim, Yeon-Su
    • Digital Contents
    • /
    • no.10 s.101
    • /
    • pp.76-83
    • /
    • 2001
  • 미국 NSA는 미 국방부 산하 비밀정보기관으로 그중 하나인 국방정보국(DIA)와 함께 미국의 (대외)전자정보 첩보활동 기능을 하고 있다.워싱턴과 볼티모어 중간의 메릴랜드주 포트 미드에 본부를 두고 있으며 3만 8천명의 인원과 1년 예산 41조원으로 운영되고, 6000평의 지하에 설치된 수퍼컴퓨터들을 작동하고 있는 것으로 알려졌다.FBI나 CIA와는 별개의 조직이며 미 육군 안전국 및 해군과 공국의 통신정보기구에 대해서도 광범위한 감독권을 갖는다. 에셜론에 대한 관리 및 그 존재에 대한 의구심은 에셜론이 네트워크를 통하여 자국민은 물론 다른 나라의 국가 기업 기밀을 포착하고 있으리라는 추측을 불러 일으키고 있음에도 불구하고 미국과 영국은 에셜론의 실체 및 에셜론을 통한 정보탐지 여부를 철저하게 부인해 왔으나 호주 및 뉴질랜드 정부가 이사실을 인정하기 시작하였고 영국 BBC방송사는 1999년 11월 2일 오스트레일리아 정보보안부 감찰관 빌 블릭이 NSA를 중심으로 하는 세계적인 통신감청망 에셜론이 존재하며 자신이 일했던 호주 방위통신대도 이 감청망의 일부라고 확인했다고 보도했다.

  • PDF

The Communication study of The Tactical Communication Curriculum for Petty Officer in Community college (전문대학 부사관과의 전술적 의사소통을 통한 말하기 교육방안 연구)

  • Yu, Yong-tae
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.53-62
    • /
    • 2017
  • The goal of this study is to seek an educational method that bring major improvements of the tactical communication through setting a definition on the tactical communication and developing ways of the communication methods to petty officer majoring students in community college level. The study is formed a concept of the tactical communication based on the tactical soften influence and, set up three steps; Goal - Act - Achieving the purpose. The study clarifies that the tactical communication is formed by repeating three steps of 'Recognition - Understanding - Regarding - Act.' To suggest an efficient way of the tactical communication by reducing the repeating communication steps, the study proposes 'OODA loop' communication. The curriculum of Petty officer major students has three steps, Change - Apply - Present steps, with using the concept of 'OODA loop.' The curriculum method offers a way of improvement state on interpersonal and problem-solving abilities. This education method presents variety developed OODA loop situations to minimize the act step on conversing informations through objective perspective and helping faster decision making process.

The Study on Reading Education Method to Improve the Cognitive Ability for the Petty officer Majoring Students in Community College (전문대학 부사관과의 인지 능력 향상을 위한 읽기 교육방안 연구)

  • Yu, Yong-tae
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.123-131
    • /
    • 2018
  • The goal of this study is to look deeper into a reading education method for improving cognitive abilities of petty officer majoring students in community college level. Lack of the cognitive ability through the passing status of reading information processing highly can cause a problem for understanding information of context. Therefore, this study redefines the reading step to improve the cognitive ability. also, it sets up progress steps; material selection - learning - inspection - practice based on the cognitive abilities. To achieve those goals, there are two major ways. The first, setting up a proper reading assignment that is suitable for petty officer major students in community college level is a key step for this study. Second, the instructor leads the students to judge their own cognitive ability objectively by using a portfolio curriculum which contains a checking list of the portfolio, structuring a curriculum based on weekly achievements, self-checking, and setting up a direction of practice. The two presented ways are the most effective ways to develop students' cognitive ability based on continuous reading and checking. For the last, the study mentions a proposal for further tasks in this field of the study.

  • PDF

A Study on Building a Cyber Attack Database using Open Source Intelligence (OSINT) (공개출처정보를 활용한 사이버공격 데이터베이스 구축방안 연구)

  • Shin, Kyuyong;Yoo, Jincheol;Han, Changhee;Kim, Kyoung Min;Kang, Sungrok;Moon, Minam;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.113-121
    • /
    • 2019
  • With the development of the Internet and Information Communication Technology, there has been an increase in the amount of Open Source Intelligence(OSINT). OSINT can be highly effective, if well refined and utilized. Recently, it has been assumed that almost 95% of all information comes from public sources and the utilization of open sources has sharply increased. The ISVG and START programs, for example, collect information about open sources related to terrorism or crime, effectively used to detect terrorists and prevent crime. The open source information related to the cyber attacks is, however, quite different from that in terrorism (or crime) in that it is difficult to clearly identify the attacker, the purpose of attack, and the range of damage. In addition, the data itself of cyber attacks is relatively unstructured. So, a totally new approach is required to establish and utilize an OSINT database for cyber attacks, which is proposed in this paper.

Design of the Secure and Efficient Library Circulation System based on Moblie RFID (모바일 RFID 기반의 안전하고 효율적인 도서대출시스템 설계)

  • Jang, Seon-Ju;Kim, Kyu-Seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.233-236
    • /
    • 2013
  • 현대사회가 언제 어디서나 정보를 주고 받는 유비쿼터스 사회로 변화하면서 센싱기술, 통신기술, 서비스 기술 등을 이용하여 우리가 볼 수 있는 모든 사물을 사람과 통신 가능하게 해주는 IoT기술이 부각되고 있다. IoT는 일반적으로 사람의 관여 없이 사물 간에 이루어지는 통신을 뜻하는 것으로 국내에선 개념적으로 USN기술과 흡사하다. 본 논문에서는 USN 분야 중 하나인 모바일 RFID 기술을 이용한 도서 대출 시스템을 제안하고 무선으로 정보를 주고 받는 모바일 RFID의 특성을 고려하여 태그와 리더 간의 인증 프로토콜을 제시한다.

  • PDF