• 제목/요약/키워드: Full security

검색결과 294건 처리시간 0.022초

Knowledge Management System Security

  • 이재욱
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2001년도 춘계학술대회 E-Business 활성화를 위한 첨단 정보기술
    • /
    • pp.27-28
    • /
    • 2001
  • No Abstract. See Full-text

  • PDF

A study on classification of the security controls for the effective implementation to nuclear power plant

  • Han, Sang Min;Lee, Chanyoung;Chae, Young Ho;Seong, Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • 제54권4호
    • /
    • pp.1245-1252
    • /
    • 2022
  • As regulatory bodies require full implementation of security controls in nuclear power plants (NPPs), security functions for critical digital assets are currently being developed. For the ultimate introduction of security controls, not alternative measures, it is important to understand the relationship between possible cyber threats to NPPs and security controls to prevent them. To address the effectiveness of the security control implementation, this study investigated the types of cyber threats that can be prevented when the security controls are implemented through the mapping of the reorganized security controls in RS-015 to cyber threats on NPPs. Through this work, the cyber threat that each security control can prevent was confirmed, and the effectiveness of several strategies for implementing the security controls were compared. This study will be a useful reference for utilities or researchers who cannot use design basis threat (DBT) directly and be helpful when introducing security controls to NPPs that do not have actual security functions.

블록암호 ABCD에 대한 포화 공격 (Saturation Attack against Full-Round ABCD)

  • 이제상;이창훈;홍석희;성재철;이상진
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.511-514
    • /
    • 2006
  • ABCD는 FGCS'2004에 이장두 등에 의하여 제안된 블록 암호이다. ABCD는 256비트의 평문을 입력받아 128비트의 키를 사용하여 256비트의 암호문을 출력하는 블록암호이다. ABCD는 지금가지 분석 결과가 알려져 있지 않으며, 본 논문에서는 $7{\times}2^{8}$의 선택 평문을 이용하여, 공격복잡도 $2^{54}$을 갖는 전체 라운드 포화공격을 소개한다.

  • PDF

Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications

  • Kim, Sungwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권10호
    • /
    • pp.4177-4190
    • /
    • 2015
  • Current research on Internet of Things (IoT) has primarily addressed the means to enhancing smart resource allocation, automatic network operation, and secure service provisioning. In particular, providing satisfactory security service in IoT systems is indispensable to its mission critical applications. However, limited resources prevent full security coverage at all times. Therefore, these limited resources must be deployed intelligently by considering differences in priorities of targets that require security coverage. In this study, we have developed a new application of Cognitive Radio (CR) technology for IoT systems and provide an appropriate security solution that will enable IoT to be more affordable and applicable than it is currently. To resolve the security-related resource allocation problem, game theory is a suitable and effective tool. Based on the Blotto game model, we propose a new strategic power allocation scheme to ensure secure CR communications. A simulation shows that our proposed scheme can effectively respond to current system conditions and perform more effectively than other existing schemes in dynamically changeable IoT environments.

불법 흥신소 및 심부름센터 개선방안에 관한 연구 (A Study on the Improvement for An Illegality Detective Agency and Messenger Office)

  • 김일곤;정귀영
    • 융합보안논문지
    • /
    • 제14권6_2호
    • /
    • pp.53-62
    • /
    • 2014
  • 이 연구의 목표는 다양한 사회적 문제를 양산하고 있는 현재의 불법행위 흥신소 및 심부름센터의 선진화 방안에 대한 고찰이다. 연구결과는 다음과 같다. 첫째, 관련업종의 불법적 위법 행위룰 방지하기 위해 유사 업종인 산업근거법인 경비업법 적용의 고려이다. 둘째, 해당업종 종사자에 대한 전문자격제도의 도입이다. 셋째, 흥신소 및 심부름센터와 같은 기존의 직업군을 새로운 직업군으로 창출하여 양성화하는 것이다. 넷째, 관할감독기관 선정과 엄격한 관리 감독이다.

효율적인 Delta-CRL 발급 시스템 (Efficient Delta-CRL Issuing System)

  • 현상우;김락현;이용;엄희정;염홍열
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2001년도 종합학술발표회논문집
    • /
    • pp.355-365
    • /
    • 2001
  • 본 논문은 현재 국내에서 개발되고 있는 인증서 발급 시스템에서 인증서가 취소되었을 경우에 발급되는 인증서 취소목록(Certificate Revocation List : CRL)에 따른 문제점 중, 유통되는 트래픽 부하를 줄이고, 발급되는 CRL의 크기를 감소시키며, 또한 전체 CRL의 발급 시간을 연장시킬 수 있는 Delta-CRL 발급 시스템의 정책, 운영 방안 및 발급 방법을 제시한다. 제안된 운영 방안은 Full-CRL의 Distribution Point를 이용하여 Base-CRL을 가리키고 Base-CRL의 Delta-CRL distribution point를 이용하여 Delta-CRL의 위치를 확인한다. 그리고 세 가지 Delta-CRL 발급 시스템의 동작 방법들을 분석하였다.

  • PDF

Improved Multi-layer Authentication Scheme by Merging One-time Password with Voice Biometric Factor

  • ALRUWAILI, Amal;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.346-353
    • /
    • 2021
  • In this proposal, we aim to enhance the security of systems accounts by improving the authentication techniques. We mainly intend to enhance the accuracy of the one-time passwords via including voice biometric and recognition techniques. The recognition will be performed on the server to avoid redirecting voice signatures by hackers. Further, to enhance the privacy of data and to ensure that the active user is legitimate, we propose to periodically update the activated sessions using a user-selected biometric factor. Finally, we recommend adding a pre-transaction re-authentication which will guarantee enhanced security for sensitive operations. The main novelty of this proposal is the use of the voice factor in the verification of the one-time password and the various levels of authentications for a full-security guarantee. The improvement provided by this proposal is mainly designed for sensitive applications. From conducted simulations, findings prove the efficiency of the proposed scheme in reducing the probability of hacking users' sessions.

패스워드 인증 키교환 프로토콜의 안전성에 관한 고찰 (Remark on the Security of Password Schemes)

  • 이희정
    • 정보보호학회논문지
    • /
    • 제13권4호
    • /
    • pp.161-168
    • /
    • 2003
  • We discuss the security of two famous password authenticated key exchange protocols, EKE2 and PAK. We introduce ′insider assisted attack′ Based on this assumption we point out weakness of the security of EKE2 and PAK protocols. More precisely, when the legitimate user wants to find other user′s password, called "insider-assisted attacker", the attacker can find out many ephemeral secrets of the server and then after monitoring on line other legitimate user and snatching some messages, he can guess a valid password of the user using the previous information. Of course for this kind of attack there are some constraints. Here we present a full description of the attack and point out that on the formal model, one should be very careful in describing the adversary′s behavior.

다양한 환경에 적용 가능한 블록 암호 Piccolo-128에 대한 안전성 분석 (Security Analysis of Block Cipher Piccolo-128 Applicable to Various Environments)

  • 정기태
    • 한국항행학회논문지
    • /
    • 제16권5호
    • /
    • pp.787-793
    • /
    • 2012
  • 64-비트 블록 암호 Piccolo-128은 무선 센서 네트워크 환경과 같이 제한된 환경에 적합하도록 설계된 경량 블록 암호이다. 본 논문에서는 Piccolo-128에 대한 biclique 공격을 제안한다. 본 논문에서 제안하는 공격은 $2^{24}$개의 선택 평문과 약 $2^{127.35}$의 계산 복잡도를 이용하여 Piccolo-128의 비밀키를 복구한다. 본 논문의 공격 결과는 Piccolo-128의 전체 라운드에 대한 첫 번째 이론적인 분석 결과이다.

Publication Indicators under Web of Science, SCOPUS Databases at Northern Border University: 2008-2020

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.90-97
    • /
    • 2021
  • The study aimed to analyze the reality of the scientific publishing of the faculty members of the Northern Border University, in both the Web of Science database and the SCOPUS database, with the analysis of publishing indicators and trends for the period between 2008-2020, and the researcher's keenness to apply the bibliometric study research methodology to obtain an account Full and detailed publications indicators under the two databases, including a full analysis of scientific publishing through objective, temporal, quantitative, authors, languages, open access journals, information forms, the most productive authors, the most published scientific journals, the most scientific bodies involved with the university. The study found results, the most important of which is the existence of a high increase in scientific publishing, starting from 2015, with an increase in publishing in the scientific field compared to other disciplines, and that the vast majority of publishing is in the form of articles, as well as publishing in English for the rest of the languages.