• Title/Summary/Keyword: 탈취

Search Result 439, Processing Time 0.026 seconds

Improvement the Security Service of Cash Delivery Using Real-time Binary CDMA Monitoring (실시간 Binary CDMA 모니터링을 통한 현금호송 보안업무 개선방안)

  • Kim, Min-Su;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.53-60
    • /
    • 2012
  • Financial institutions keep putting efforts to filling cash into ATMs and branches in order to provide customers with better service. This kind of job usually required an automobile unit to be done, and financial institutions employee perform this task directly or sourcing out to professional security service companies. However, the job has been of ten a target of criminals because it deals with cash. In fact, since 2003, there were several cash truck robberies occurred. This circumstances made the public be aware of the necessity of creative research and the strict management of financial institutions and security companies. However, the existing studies on security service of cash delivery suggest only how to improve the job legally and in operation, and the technological aspect of the improving way has not been studied. Therefore, this study aimed at suggesting an improvement the security service of cash delivery using real-time binary CDMA monitoring for providing better safety service to customers.

A Study of a Secure Smart Car System using Attribute-based Delegation Method (속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.71-79
    • /
    • 2019
  • The demand of smart cars is increasing rapidly. International stand organize such as 3GPP and 5GAA are proposing standard communication protocvols for connected-car, and automotive network infrastructure. But Smart car network have many security threats and more dangerous against the existed wire communication network. Typically, peripheral devices of a smart car may disguise their identity and steal location information and personal information about the vehicle. In addition, the infrastructure elements around smart cars can conspire and put driving cars in danger, threatening lives. This is a very serious security threat. Therefore, in order to solve these problems, we proposed a system that is secure from collusion and tampering attacks using attribute-based authorize delegation method and threshold encryption algorithms. We have demonstrated using a semantic safety model that the proposed system can be safe from collusion attack.

A Study on Implementation of Fraud Detection System (FDS) Applying BigData Platform (빅데이터 기술을 활용한 이상금융거래 탐지시스템 구축 연구)

  • Kang, Jae-Goo;Lee, Ji-Yean;You, Yen-Yoo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.4
    • /
    • pp.19-24
    • /
    • 2017
  • The growing number of electronic financial transactions (e-banking) has entailed the rapid increase in security threats such as extortion and falsification of financial transaction data. Against such background, rigid security and countermeasures to hedge against such problems have risen as urgent tasks. Thus, this study aims to implement an improved case model by applying the Fraud Detection System (hereinafter, FDS) in a financial corporation 'A' using big data technique (e.g. the function to collect/store various types of typical/atypical financial transaction event data in real time regarding the external intrusion, outflow of internal data, and fraud financial transactions). As a result, There was reduction effect in terms of previous scenario detection target by minimizing false alarm via advanced scenario analysis. And further suggest the future direction of the enhanced FDS.

Studies on the Refining and Utilization of Filefish Viscera Oil 1. The Refining of Filefish Viscera Oil - (말쥐치 내장유의 정제 및 이용에 관한 연구 1. 말쥐치 내장유의 정제)

  • 강훈이;대도해명;소천천추;김동연;이응호
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.21 no.2
    • /
    • pp.175-180
    • /
    • 1992
  • For the effective utilizing of polyunsaturated lipids in filefish viscera wasted from marine manufactory the conditions of degumming, deacidification, decoloring and deodorization for the processing of refined viscera oil were investigated. In the process of refining degumming with 20$m\ell$ of 4% oxalic acid per 100$m\ell$ of crude filefish viscera oil resulted in the lowest residual phosphorus content as 115.8 ppm and optimal condition to neutralize the filefish viscera oil was treating for 30min at 60$^{\circ}C$ with 0.5% excess of 4M sodium hydroxide solution. Decoloring was optimized by adding 10% bleaching earth and treating for 20min at 60$^{\circ}C$ under vacuum, and deodorizing was done by steam distillation at 180$^{\circ}C$ under 4 torr of vacuum.

  • PDF

RFID Distance Bounding Protocol Secure Against Mafia and Terrorist Fraud (테러리스트 공격과 마피아 공격에 안전한 RFID 거리 제한 프로토콜)

  • Kwon, Hye Jin;Kim, Soon Ja
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.11
    • /
    • pp.660-674
    • /
    • 2014
  • RFID system has been used in a variety of services. So, a lot of attacks like a free ride on the service, leakage of property or personal information are known. Therefore, the solutions that address these attacks have been proposed. Among the attacks, mafia fraud, a kind of relay attack, can not be addressed by common authentication protocol. So, Hancke and Kuhn used distance bounding protocol for RFID authentication. After that, Munilla and Peinado modified HK protocol by adding void challenge. So the mafia fraud success probability of adversary is lower than probability of HK protocol. Ahn et al. proposed a protocol that reduces number of a hash computation and traffic than MP protocol. Here, we show that MP protocol can not defend the terrorist fraud and is vulnerable to noise. And we show that also AYBN protocol is vulnerable to mafia fraud and key leakage. Moreover, we propose a new protocol and our experimental results show that our protocol is secure to terrorist and mafia fraud.

A Study on Secure and Improved Single Sign-On Authentication System against Replay Attack (재전송 공격에 안전하고 개선된 Single Sign-On 인증 시스템에 관한 연구)

  • Kim, Hyun-Jin;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.769-780
    • /
    • 2014
  • In general, internet users need to remember several IDs and passwords when they use diverse web sites. From an effective management perspective, SSO system was suggested to reduce user inconvenience. Kerberos authentication, which uses centralized system management, is a typical example of a broker-based SSO authentication model. However, further research is required, because the existing Kerberos authentication system has security vulnerability problems of password and replay attacks. In SSO authentication systems, a major security vulnerability is the replay attack. When user credentials are seized by attackers, an authorized session can be obtained through a replay attack. In this paper, an improved SSO authentication model based on the broker-based model and a secure lightweight SSO mechanism against credential replay attack is proposed.

A Side Channel Attack with Vibration Signal on Card Terminal (진동 신호를 이용한 카드 단말기 부채널 공격)

  • Jang, Soohee;Ha, Youngmok;Yoon, Jiwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1045-1053
    • /
    • 2014
  • In this paper, we assume that the information leakage through side-channel signal may occur from the card payment terminal and newly introduce a real application attack model. The attack model is a side channel attack based on vibration signals, which are detected by a small sensor attached on card terminal by attacker. This study is similar to some other studies regarding side channel attack. However, this paper is different in that it is based on the non-language model. Because the financial transaction information such as a card number, password, mobile phone number and etc cannot have a constant pattern. In addition, there was no study about card terminal. Therefore, this new study is meaningful. We collected vibration signals on card terminal with a small wireless sensor and analyzed signal data with statistical signal processing techniques using spectrum of frequency domain and principal component analysis and pattern recognition algorithms. Finally, we evaluated the performances by using real data from the sensor.

A study on Password Input Method to Protect Keyboard hooking (Keyboard hooking 방지를 위한 패스워드 입력 방법 연구)

  • Kang, Seung-Gu;Kwak, Jin-Suk;Lee, Young-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.241-244
    • /
    • 2011
  • Recently, Due to development of Internet techniques, user suddenly increased that Used of Web services and with out constraints of place and time has been provided. typically, Web services used ID/Password authentication. User confirmed personal data Stored on Web servers after user authorized. web service provider is to provide variety security techniques for the protection personal information. However, recently accident has happened is the malicious attackers may capture user information such as users entered personal information through new keyboard hooking. In this paper, we propose a keyboard hooking protected password input method using CAPTCHA. The proposed password input method is based on entering the password using mouse click or touch pad on the CAPTCHA image. The mapping of CAPTCHA image pixels is random.

  • PDF

A Design of Integrated Security Policies for Enabling Adaptive Security in Campus Environment (캠퍼스 환경에서 적응적인 정보보안을 위한 통합 보안정책의 설계)

  • Ko, Bong-Koo;Park, Jong-Seon;Chung, Seung-Jong;Cho, Gi-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.617-624
    • /
    • 2014
  • A campus network nowadays adapts the security policies in detail and even in variety, along with firewall based access control. Nevertheless, security threats, such as information hacking, intrusion and DoS, are not decreasing yet. This paper proposes an enabling method of discriminative security policies to enforce an adaptive security for security objects on basis of the security elements. The security level of a security devices is decided based on the mapping between the users and the objects. The proposed security policies could improve the security effect in terms of investment in creative campus environment, and aim to provide fast and stable services to users.

The Preparation of Antibacterial Activated Carbon fibers and Their Application (항균성 탄소섬유의 제조와 그의 응용)

  • 오원춘;김범수;장원철
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.1 no.1
    • /
    • pp.43-48
    • /
    • 2000
  • Upon the Preparation of activated carbon fiber(ACF) using chemical activation method and vapour activation method, the fiber obtained from the vapour activation method shows excellent surface Properties. The preparation of antibacterial activated carbon fiber was tried to open the new areas in application of carbon materials. The BET specific surface area and the average pore radius of the antibacterial ACFs were in the range of 844.27~1575.6 $cm^2$/g and 10.6~12.9 (equation omitted), respectively. From the adsorption studies on the antibacterial ACFs, typical Type I isotherms were obtained. And, from the SEM morphology results, it was observed that the surface of ACFs was partially coated by antibacterial materials after the treatment. Finally, from the antibacterial effects of antibacteral ACFs against E. coli, excellent antibacterial activity was shown. Concerning the above results, antibacterial ACFs can have wide application in the areas of sterilization, anti-fragrant. anti-insects.

  • PDF