• Title/Summary/Keyword: Control System Security

Search Result 1,725, Processing Time 0.022 seconds

Study on Token based KMS for Information Sharing (정보 공유를 위한 토큰 기반 KMS 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.29-34
    • /
    • 2023
  • KMS (Knowledge Management System) is used by various organizations to share information. This KMS includes important information as well as basic information used by each organization. To protect infortant information stored in KMS, many KMS use user identification and authentication features. In such a KMS security environment, if the account information of a user who can access the KMS is leaked, a malicious attacker using the account information can access the KMS and access all authorized important information. In this study, we propose KMS with user access control function that can protect important information even if user account information is leaked. The KMS with the user access control function proposed in this study protects the stored files in the KMS by applying an encryption algorithm. Users can access important documents by using tokens after logging in. A malicious attacker without a Token cannot access important files. As a result of checking the unit function for the target user access control function for effectiveness verification, it was confirmed that the access control function to be provided by KMS is normally provided.

Distinction between HAPS and LEO Satellite Communications under Dust and Sand Storms Levels and other Attenuations

  • Harb, Kamal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.382-388
    • /
    • 2022
  • Satellite communication for high altitude platform stations (HAPS) and low earth orbit (LEO) systems suffer from dust and sand (DU&SA) storms in the desert regions such as Saudi Arabia. These attenuations have a distorting effect on signal fidelity at high frequency of operations. This results signal to noise ratio (SNR) to dramatically decreasing and leads to wireless transmission error. The main focus in this paper is to propose common relations between HAPS and LEO for the atmospheric impairments affecting the satellite communication networks operating above Ku-band crossing the propagation path. A double phase three dimensional relationship for HAPS and LEO systems is then presented. The comparison model present the analysis of atmospheric attenuation with specific focus on sand and dust based on particular size, visibility, adding gaseous effects for different frequency, and propagation angle to provide system operations with a predicted vision of satellite parameters' values. Skillful decision and control system (SD&CS) is proposed to control applied parameters that lead to improve satellite network performance and to get the ultimate receiving wireless signal under bad weather condition.

An Embedded System for Sensor Networks (센서 네트워크를 위한 임베디드 시스템)

  • Lee, Jong-Chan;Park, Sang-Joon
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.37-41
    • /
    • 2010
  • The object of this paper is to design a embedded system based on sensor networks. The proposed system can manage the heating by sensing and analyzing the temperature and humidity in apartment house and others. For implementing this system, we devide JAVA API into the platform-independent JAVA part and platform-dependent native part for the implementation of JAVA API to manage the linux based embedded system devices, and focus on the control of the embedded system devices using JAVA API.

A Study on Security Threat Elements Analysis and Security Architecture in Satellite Communication Network (위성 통신망 보안 위협요소 분석 및 보안망 구조에 관한 연구)

  • 손태식;최홍민;채송화;서정택;유승화;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.15-31
    • /
    • 2001
  • In this paper we classify security threat elements of satellite communication into four parts; Level-0(satellite propagation signal), Level-1(satellite control data), Level-2(satellite application data) and ground network security level according to the personality and data of the satellite communication network. And we analyze each security levels. Using analyzed security threat elements, we divide security requirements into signal security level and information security level separately. And then above the existent signal security level countermeasure, we establish the countermeasure on the basis of information security policy such as satellite network security policy, satellite system security policy and satellite data security policy in information security level. In this paper we propose secure satellite communication network through the countermeasure based on information security policy.

Network Group Access Control system using piggy-backing prevention technique based on Infrared-Ray (적외선 기반 피기백킹 방지 기법을 적용한 네트워크 그룹 접근통제 시스템)

  • Kim, JongMin;Choi, KyongHo;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.109-114
    • /
    • 2012
  • Information society in recent times, lots of important information have been stored in information systems. In this situation, unauthorized person can obtains important information by piggy-backing and shoulder surfing in specific area of organization. Therefore, in this study, we proposed network group access control system by combining RFID and infrared-ray for blocking information leakage due to unauthorized access by internal threats and enhancing personnel security. So it can provides a more secure internal network environment.

A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns (SSL VPN기반의 행위.순서패턴을 활용한 접근제어에 관한 연구)

  • Jang, Eun-Gyeom;Cho, Min-Hee;Park, Young-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.125-136
    • /
    • 2013
  • In this paper, we proposed SSL VPN-based network access control technology which can verify user authentication and integrity of user terminal. Using this technology, user can carry out a safety test to check security services such as security patch and virus vaccine for user authentication and user terminal, during the VPN-based access to an internal network. Moreover, this system protects a system from external security threats, by detecting malicious codes, based on behavioral patterns from user terminal's window API information, and comparing the similarity of sequential patterns to improve the reliability of detection.

The Analysis of Face Recognition Rate according to Distance and Interpolation using PCA in Surveillance System (감시카메라 시스템에서 PCA에 의한 보간법과 거리별 얼굴인식률 분석)

  • Moon, Hae-Min;Kwak, Keun-Chang;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.153-160
    • /
    • 2011
  • Recently, the use of security surveillance system including CCTV is increasing due to the increase of terrors and crimes. At the same time, interest of face recognition at a distance using surveillance cameras has been increasing. Accordingly, we analyzed the performance of face recognition according to distance using PCA-based face recognition and interpolation. In this paper, we used Nearest, Bilinear, Bicubic, Lanczos3 interpolations to interpolate face image. As a result, we confirmed that existing interpolation have an few effect on performance of PCA-based face recognition and performance of PCA-based face recognition is improved by including face image according to distance in traning data.

Study on security framework for cyber-hacking control facilities (제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구)

  • Lee, Sang-Do;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.285-296
    • /
    • 2018
  • Among many hacking attempts carried out in the past few years, the cyber-attacks that could have caused a national-level disaster were the attacks against nuclear facilities including nuclear power plants. The most typical one was the Stuxnet attack against Iranian nuclear facility and the cyber threat targeting one of the facilities operated by Korea Hydro and Nuclear Power Co., Ltd (Republic of Korea; ROK). Although the latter was just a threat, it made many Korean people anxious while the former showed that the operation of nuclear plant can be actually stopped by direct cyber-attacks. After these incidents, the possibility of cyber-attacks against industrial control systems has become a reality and the security for these systems has been tightened based on the idea that the operations by network-isolated systems are no longer safe from the cyber terrorism. The ROK government has established a realistic control systems defense concept and in the US, the relevant authorities have set up several security frameworks to prepare for the threats. This paper presented various cyber security attack cases and their scenarios against control systems, along with the analysis of countermeasures for them. Though this task, we attempt to identify the items that need to be considered when designing a domestic security framework to improve security and secure stability.

Practice and Improvement Scheme of Management of Human Resources in Korean Private Security Service Industry (한국 민간경비 인적자원 확보관리의 실태 및 개선방안)

  • Suh, Sang-Yul;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.81-99
    • /
    • 2008
  • Despite its legal, systematic and quantitative growth, Korean private security has not been showing satisfactory level of qualitative growth comparing to quantitative growth as it socially shocked with recent occurrence of the events and accidents. People on demand of security are making use of private security service to offset insufficient supply of security power as, especially, the incendiarism at Sungryemun last February brought out security issues for nationally important facilities and cultural assets, and other cases showed that the police would not cope with the appropriate security services under the current security system for protecting the life and property of people. For the supplementation of security power, the private security service is prevalent, but lots of service providers would not overcome its small business scale, except some large-sized security providers. There are some problem occurred as some providers employed staff who would not have the stuff for performing security service and they even committed illegal actions. Some opinions pointed out that it should come up with measures as they socially lose their credit. Therefore, this research suggests the recognition of the importance and the improvement measures of human resources management as follows. Security Service needs: 1. control of criteria for the employment/recruitment of human resources; 2. inducement of qualitative improvement of security service by ensuring excellent quality of human resources; 3. elevation of morale of organizational members with the operation of efficient promotion system; 4. introduction of professional certification system for the inflow of excellent quality of human resources.

  • PDF

Implementation and Evaluation of Multi-level Secure Linux (다중등급 보안 리눅스 구현 및 시험평가)

  • 손형길;박태규;이금석
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.311-321
    • /
    • 2003
  • A current firewall or IDS (intrusion detection system) of the network level suffers from many vulnerabilities in internal computing servers. For a secure Linux implementation using system call hooking, this paper defines two requirements such as the multi-level security function of TCSEC B1 and a prevention of hacking attacks. This paper evaluates the secure Linux implemented in terms of the mandatory access control, anti-hacking and performance overhead, and thus shows the security, stability and availability of the multi-level secure Linux. At the kernel level this system protects various hacking attacks such as using Setuid programs, inserting back-door and via-attacks. The performance degradation is an average 1.18% less than other secure OS product.