• Title/Summary/Keyword: Game Security

Search Result 252, Processing Time 0.027 seconds

Implementation of Database Security using the Query Hiding Technique on the WeLink (쿼리 은폐 기법을 활용한 위링크의 데이터베이스 보안 구현)

  • Lim, Bock-Chool;Kim, In-Koo;Kim, Soon-Gohn
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.356-357
    • /
    • 2016
  • 기존에 PC나 서버에 설치하여 제공되던 방식에서 클라우드 컴퓨팅 환경의 서비스 방식이 일반화되어가고 있다. 클라우드 환경에서 발생하는 데이터는 형태와 양이 기존 방식처럼 관리하는 것은 불가능에 가깝다. 이러한 시대적 흐름에 발맞춰 데이터의 처리 및 저장과 관련된 기술의 중요성도 더욱 커져가고 있다. 본 논문에서는 중소기업을 위한 프레임워크인 위링크(WeLink)내에서 데이터 저장, 조회, 수정, 삭제 등을 위한 보안방안을 모색하였다. 또한 프레임워크 기반으로 데이터 보안을 위한 쿼리나 데이터베이스에 상관없이 서비스를 제공할 수 방법을 제안하였다.

개방형 스마트 폰 환경에서 안전한 금융 어플리케이션 실행을 위한 보안 시스템

  • Kim, Jin Hyung;Kim, Tae Ho
    • Review of KIISC
    • /
    • v.23 no.1
    • /
    • pp.28-34
    • /
    • 2013
  • SNS, Game, Media Play, DMB, 모바일 결제 등 다양한 기능을 손쉽게 설치하여 이용할 수 있는 스마트 폰의 장점으로 인해 스마트 폰 이용률이 급증하고 있다. 특히 안드로이드 운영체제 기반의 스마트 폰 환경에서는 오픈소스로 인하여 더욱 손쉽게 어플리케이션을 개발 및 배포가 가능하여 수많은 사용자들이 다양한 어플리케이션을 이용하고 있다. 하지만 이런 장점의 이면에는 악의적인 어플리케이션의 개발 및 배포, 또한 용이하여 보안사고의 위험성도 존재한다. 앞으로도 스마트 폰의 취약점을 이용한 개인정보 유출 및 위 변조 공격들이 더욱 정교해지고 다양화될 것으로 예상되어 이를 대응할 수 있는 보안기술의 개발이 요구되고 있다. 특히 민감한 정보를 다루는 금융 어플리케이션을 실행하는 데에는 높은 보안을 제공하는 기술 도입이 더욱더 필요하다. 기존에 제안된 방식들은 소프트웨어로 구현되어 있어 악의적인 공격에 대응하는 데에는 한계가 있다. 높은 보안성으로 주목받는 기술로, 하드웨어 기반의 보안 기술이 있지만 아직 하드웨어적인 자원의 부족 등으로 활성화에 한계가 있다. 본 논문에서는 자원 제약이 있는 하드웨어 보안 기술을 효과적으로 활용하여 보다 안전하게 금융 어플리케이션을 실행 및 관리를 할 수 있는 보안 시스템을 제안하고자 한다.

A New Lightweight Mutual Authentication Protocol for Home Network (홈네트워크를 위한 새로운 경량화된 상호인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2384-2389
    • /
    • 2009
  • In this paper, we propose a lightweight mutual authentication protocol for secure and efficient home network service. Lee et al. recently proposed an attribute-base authentication key agreement protocol using public key in home network. Its protocol provided forward secrecy but don't diminish conspicious overhead of operation using ticket. Therefore the proposed protocol provided the security and efficiency using hash function and counter. Also it can provide secure home network service by check consumer electronics control level of users after created session key.

A Study on Computer Game Policy Considering Information Security in Web System Environment (웹기반 하에서 정보보호를 고려한 컴퓨터 게임 정책에 관한 연구)

  • Lee, Myeong-Suk;Shin, Seung-Jung;Ryu, Dae-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1531-1534
    • /
    • 2009
  • 컴퓨터 게임은 정보화의 진전, IT기술의 발전과 더불어 그 파급 속도와 사회적 영향력이 가중되고 있으며, 그 특성으로 인한 프라이버시 침해, 해킹 등 정보화의 역기능이 심각해지고 있다. 이 같은 다양한 정보화의 역기능은 u-society에 대한 새로운 도전으로 작용하고 있어 새로운 위협이 상존하는 유비쿼터스 환경 하에서 안심하고 u-IT 혜택을 누릴 수 있도록 하기 위해 보다 심층적인 정보보호 정책마련이 필요하다. 본 연구는 전문가들의 의견을 수렴하여 정보보호 정책이 정보지수에 미치는 영향을 분석, 도출된 결과를 바탕으로 기업이나 국가에서 정보보호 관련 정책 수립 시 적용할 수 있게 함으로써 국내 정보보호에 대한 수준을 보다 향상시키고자 한다.

The Rise of Drone Swarms: Military Applications, Countermeasures, and Strategic Implications

  • Hwang Hyun-Ho
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.318-325
    • /
    • 2024
  • The rapid advancement of drone technology has led to the emergence of drone swarms, a game-changing concept in modern warfare. This study explores the military applications, countermeasures, and strategic implications of drone swarms. By examining the current trends in drone swarm development and deployment, this research highlights the potential of this technology to revolutionize the battlefield. The study also investigates the challenges and vulnerabilities associated with drone swarms, emphasizing the need for effective countermeasures. Through an analysis of multi-sensor fusion, directed energy weapons, and artificial intelligence, this research proposes comprehensive strategies to counter the threats posed by drone swarms. Furthermore, the study delves into the ethical and legal issues surrounding the use of autonomous drone swarms, underscoring the necessity for international norms and regulations. The findings of this research contribute to the understanding of the transformative impact of drone swarms on military strategy and national security, while providing valuable insights for policymakers, military strategists, and researchers in the field.

The Quantum Computing Industry from a Market Perspective (시장 측면에서 본 양자컴퓨팅 산업)

  • B.S. Cho;S.J. Lee;S.H. Jeong
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.3
    • /
    • pp.58-68
    • /
    • 2024
  • Quantum computing can be a game changer in all areas of economy security, and society, and it is expected to bring innovation to the entire industrial ecosystem. The competition in this industry is accelerating with various countries pushing for policies to preempt technology and maintain a technological advantage. The quantum computing market is expected to show commercial gains in 2027 as an inflection point. Initially, it is expected to replace the high-performance computing market. However the continuous growth of quantum computing will depend on the development innovative services such as ChatGPT in AI, and technological breakthroughs. We examine the definition and outlook, evolution and dynamics, and supply chain structure of the quantum computing industry in an attempt to unveil implications for its development.

Creation of Natural Terrain by Erosion Simulation (자연스러운 지형 생성을 위한 침식 시뮬레이션)

  • Han, Yeong-Deok
    • Journal of Korea Game Society
    • /
    • v.15 no.6
    • /
    • pp.171-182
    • /
    • 2015
  • Existing hydraulic terrain erosion simulations mainly focus on small scale terrain deformations. In this paper, we propose a simulation method combining hydraulic terrain erosion and thermal erosion, by which a natural large scale terrain of mountainous regions with river networks can be created. For water movement we use the pipe model of shallow water simulation, and for the easy formation of watercourse we use velocity dependent erosion, also we apply thermal erosion for the formation of V-form slopes in the vicinity of stream lines. As a result, we can obtain good natural shaped terrains for certain ranges of $K_c$(sediment capacity constant) and $K_v$(velocity dependent erosion strength) values. Also we present improved thermal erosion method, and suggest a way to avoid problems caused by large $K_c$value.

Coalition based Optimization of Resource Allocation with Malicious User Detection in Cognitive Radio Networks

  • Huang, Xiaoge;Chen, Liping;Chen, Qianbin;Shen, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4661-4680
    • /
    • 2016
  • Cognitive radio (CR) technology is an effective solution to the spectrum scarcity issue. Collaborative spectrum sensing is known as a promising technique to improve the performance of spectrum sensing in cognitive radio networks (CRNs). However, collaborative spectrum sensing is vulnerable to spectrum data falsification (SSDF) attack, where malicious users (MUs) may send false sensing data to mislead other secondary users (SUs) to make an incorrect decision about primary user (PUs) activity, which is one of the key adversaries to the performance of CRNs. In this paper, we propose a coalition based malicious users detection (CMD) algorithm to detect the malicious user in CRNs. The proposed CMD algorithm can efficiently detect MUs base on the Geary'C theory and be modeled as a coalition formation game. Specifically, SSDF attack is one of the key issues to affect the resource allocation process. Focusing on the security issues, in this paper, we analyze the power allocation problem with MUs, and propose MUs detection based power allocation (MPA) algorithm. The MPA algorithm is divided into two steps: the MUs detection step and the optimal power allocation step. Firstly, in the MUs detection step, by the CMD algorithm we can obtain the MUs detection probability and the energy consumption of MUs detection. Secondly, in the optimal power allocation step, we use the Lagrange dual decomposition method to obtain the optimal transmission power of each SU and achieve the maximum utility of the whole CRN. Numerical simulation results show that the proposed CMD and MPA scheme can achieve a considerable performance improvement in MUs detection and power allocation.

BlockChain Technology Core Principle Education of Elementary School Student Using Gamification (게이미피케이션을 활용한 초등학생 블록체인기술 핵심원리 교육 탐구)

  • Kim, Jinsu;Park, Namje
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.2
    • /
    • pp.141-148
    • /
    • 2019
  • We proposed a curriculum that can learn the principle of blockchain by using the gamification which can bring up the interest and concentration of the students by connecting the contents of the class with the game. The proposed method is to educate the blockchain in a game format and to solve the problem that can be easily accessed in everyday life by applying the blockchain. By strengthening the thinking ability of computing, By growing information processing capacity, communication capacity, and community capacity, students can naturally enhance their education capacity. It is expected that the blockchain curriculum using the proposed gamification can be used to improve the information curriculum.

Comprehensive Measures the Elimination of Violence in Schools validated - Centered on the fundamental countermeasures - (학교폭력 근절 종합대책에 대한 유효성 검증 - 근본대책을 중심으로 -)

  • Jung, Sung Sook
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.187-196
    • /
    • 2013
  • Recently, school violence has come to the fore as a social phenomenon. "Comprehensive countermeasures for eradication of school violence" as a policy safety are created by Safety Administration bureau and Ministry of Education, Science and Technology under the chairmanship of the Office of Prime Minister on Feb,2012. This policy is supposed to be test-operated for a year from March, 2012. but voices of concern about effectiveness have been brought up by some critics greatly. So 172 teachers in high school in Seoul were surveyed in order to examine the effectiveness of "Comprehensive countermeasures for eradication of school violence" with a questionnaire composed of 5 point Likert-type. Among the fundamental measures, there were a total of 12 countermeasures about 'Practices for personality education' (with the exception of unrelated one question). 'Expanding opportunities of various art education and Supporting reading activities' of them ranked highest on average. Then, 'Reflecting results of special feature related to character develops to the Selection of Admission officers and Self-directed learning was the next. And among the three countermeasures about 'Reinforcement of roles of the family and society', 'Pan governmental conducting annual campaign related to broadcast, press, civic group to combat school violence was highest. Finally, among the 7 countermeasures about 'Countermeasure about harmful factors of games and internet addiction', 'Reinforcement of preventive discipline about game and internet addiction' was highest and 'Development and Promotion of various educational contents for preventive discipline about game and internet addiction' was the next.