• Title/Summary/Keyword: Hacking protection

Search Result 88, Processing Time 0.025 seconds

A Study on the Application of Block Chain Ethereum Technology to Activate Digital Contents Trading as Sharing economy - data encryption and modify merkle tree-

  • Min, Youn-a;Baek, Yeong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.10
    • /
    • pp.73-80
    • /
    • 2018
  • The shared economy began with the concept of sharing the physical and intellectual assets of individuals with others. Nowadays, the concept of shared economy is becoming one of the industries as an enterprise type. Especially, with the development of the Internet and smart devices, various forms of shared economy have been developed in accordance with the need of sharing of individual income. Digital content is also a shareable commodity and it is seeking to utilize it as an item of shared economy. Accordingly, when digital contents are used as a shared economy, there are various possible threats -security threats that may arise in the course of transactions, potential for theft, alteration and hacking of contents. In this paper, we propose transaction method and content protection method using block chain-ethereum technology to reduce security threats and transparent transactions that can occur in digital contents transactions. Through the proposed method, the trust of the consumer and the supplier can be measured and the encryption can be performed considering the characteristics of the data to be traded. Through this paper, it is possible to increase the transparency of smart transaction of digital contents and to reduce the risk of content distortion, hacking, etc.

A Study Medium-based safe File Management Security System on the cloud Environment (클라우드 환경에서 매체기반의 안전한 파일관리 보안 시스템에 대한 연구)

  • Kim, Hee-Chul
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.142-150
    • /
    • 2019
  • This study is a file management security system that encrypts and decrypts computer and cloud data by using Bluetooth based cryptographic module. It is a necessary solution in terms of abuse of personal information and protection of social and national information. We developed H/W and S/W for SFMS(: Safe File Management Security) related Bluetooth module in cloud environment and implemented firmware development, encryption key generation and issuance, client program for system mobile and key management system. In the terminal internal encryption and decryption, SFMS was developed to ensure high security that the hacking itself is not possible because key values exist separately for each file.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Real Estate Industry in the Era of Technology 5.0

  • Sun Ju KIM
    • The Journal of Economics, Marketing and Management
    • /
    • v.11 no.6
    • /
    • pp.9-22
    • /
    • 2023
  • Purpose: This paper aims to suggest ways to apply the leading technologies of Industry 5.0 to the housing welfare field, tasks for this, and policy implications. Research design, data, and methodology: The analysis method of this study is a literature study. The analysis steps are as follows. Technology trends and characteristics of Industry 5.0 were investigated and analyzed. The following is a method of applying technology 5.0 in the industrial field. Finally, the application areas of each technology and the challenges to be solved in the process were presented. Results: The results of the analysis are 1) the accessibility and diffusion of technology. This means that all citizens have equal access to and use of the latest technology. To this end, the appropriate use of technology and the development of a user-centered interface are needed. 2) Data protection and privacy. Residential welfare-related technologies may face risks such as personal information leakage and hacking in the process of collecting and analyzing residents' data. 3) Stability, economic feasibility, and sustainability of the technology. Conclusions: The policy implications include: 1) Enhancing technology education and promotion to improve tech accessibility for groups like the low-income, rural areas, and the elderly, 2) Strengthening security policies and regulations to safeguard resident data and mitigate hacking risks, 3) Standardization of technology, 4) Investment and support in R&D.

A Authentication technique of Internal Information Hacking Protection based on H/W Information (H/W 정보의 인증을 통한 내부정보유출 방지 기법)

  • Yang, Sun Ok;Choi, Nak Gui;Park, Jae Pyo;Choi, Hyung Il
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.71-81
    • /
    • 2009
  • To the cause of the development of IT technology and the Internet, information leakage of industry is also facing a serious situation. However, most of the existing techniques to prevent leakage of information disclosure after finding the cause of defense. Therefore, in this paper by adding information about the Hardware to offer a way to protect the information. User authentication information to access the data according to different security policies to reflect a little more to strengthen security. And the security agent for the data by using a log of all actions by the record was so easy to analyze. It also analyzes and apply the different scenarios possible. And the analysis of how to implement and how to block. The future without the use of security agents to be able to control access to data and H/W information will be updated for the study will be done.

sDBMS for Hacking Prevention Based on PMI for Web Contents Protection (Web컨텐츠 보호를 위한 PMI 기반의 해킹방지 sDBMS)

  • Eyoo, Du-Gyu;Jun, Mun-Suk
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.8
    • /
    • pp.829-840
    • /
    • 2004
  • Business model in Web environments is usually provided by digital data. Information exchange of users and service providers should be performed by encryted data. Encrypted protection. In this paper, We have prevented using contents by users is not accessed based on RBAC. in this paper, We propose a new DB encryption scheme which use RBAC and digital signature based on PMI.

  • PDF

sDBMS for Hacking Prevention on Based PMI for Contents Protection in Web Environment (Web 환경에서 컨텐츠 보호를 위한 PMI 기반의 해킹방지 sDBMS)

  • Ryoo Du-Gyu;Kim Young-Chul;Jun Moon-Seog
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.5
    • /
    • pp.679-690
    • /
    • 2005
  • Business model in Web environments is usually provided by multimedia data. Information exchange between users and service providers should be made in encrypted data. Encrypted data are secure from being hacked. Application of DB encryption is a main technology for contents protection. We have applied the access control based on RBAC and prevented the unauthorized users from using the contents. In this paper, we propose a new DB encryption scheme which uses RHAC and digital signature based on PMI.

  • PDF

Building protection system and Understanding information protection through simulation hacking (정보보호시스템 구축 및 모의해킹을 통한 정보보호이해)

  • Jung, Sang-Mi;Kim, Chang-Hyeon;Noh, Hyeon-Woo;Choi, Jin-Woo;Jung, Yu-Jin;Moon, Eui-Seong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.211-213
    • /
    • 2017
  • 최근 보안적 이슈에 따른 피해가 지속적으로 늘어남에 따라 사람들이 보안에 관심이 많아 지기 시작했다. 모의해킹 분야의 경우 기존에 문제 풀이 웹 사이트들이 존재하지만 회원 가입 단계로부터 입문자들이 시작하기에는 높은 진입장벽이 존재한다. 본 연구에서는 방 탈출 게임의 컨셉을 모의해킹에 적용하여 모의해킹 문제를 게임을 푸는 방식으로 접근하여 입문자들도 쉽게 모의해킹 분야를 시작할 수 있도록 하였다. 웹 서버는 오픈소스 웹 방화벽인 ModSecurity와 Spring Security로 서버보안을 강화하였다.

Authentication Template Protection Using Function Encryption (함수암호를 이용한 인증정보 Template 보호 기술)

  • Park, Dong Hee;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1319-1326
    • /
    • 2019
  • Recently, biometrics and location information are being used for authentication in many devices. However, these information are stored as plaintext in safe device or, stored as ciphertext in authentication server it is used for authentication in plaintext by decrypting. Therefore, the leakage of authentication information as well as hacking can cause fatal privacy problems. In this paper, we propose a technique that can be authenticated without exposing authentication information to ciphertext using function encryption.

Audit Method for Personal Information Protection in On-line Games (온라인게임에서 개인정보보호 감리 모형)

  • Kim, Hee-Wan;Shin, Joong-Won;Kim, Dong-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.23-37
    • /
    • 2012
  • Illegal game players' hacking and propagation of malignant code in online game exposes privacy of online game customers. So, online game companies have to support the standardized systems and operations of customers' privacies. Since online game companies implement authentication of information protection, which focuses on assets or physical, systemic security, they need a more professional system that is related to protection of individual privacy. We analyzed the individual information protection system, which includes ISO27001, ISMS of KISA, GMITS, ePrivacy, online game privacy protection guide, and BS10012. Using the suggested systems, we proposed the systemic tools that measure the level of individual information protection, which includes process and check items of each phase.