• Title/Summary/Keyword: Information Recovery

Search Result 2,225, Processing Time 0.037 seconds

A Study on the Critical Success Factors and Practical Method of Information System Disaster Recovery : Assuring Business Continuity of Information System Interface Specification Modeling (정보시스템 재해복구의 핵심성공요인(CSF)과 실천방안에 관한 연구)

  • Jeong, Young-Hee;Lee, Jung-Hoon;Kim, Eun-Young
    • Journal of Information Technology Services
    • /
    • v.10 no.4
    • /
    • pp.83-101
    • /
    • 2011
  • Since most of companies these days are utilizing the Information system actively, Information System is the most important factor which should be recovered in terms of Business Continuity. However, a lot of enterprises have been outsourcing their Disaster Recovery Center. Therefore, it is highly possible that the information system can not work well and result in the discontinuity of business when any trouble arises because of seperated plan of Business Continuity and Disaster Recovery. The study draws critical success factors for successful disaster recovery through researches of 42 documents. Then, factors are reviewed through interviews with consultants, experts of Business Continuity Plan and the information system officers of domestic banks. Domestic companies can make use of the study when they develop or renew Disaster Recovery Plan or Information System in terms of Business continuity.

Development of a Key Recovery System for Recovery of Encrypted Data (암호화된 정보의 복구를 위한 키복구 시스템 개발)

  • Kang, Sang-Seung;Lim, Shin-Young;Ko, Jeong-Ho;Jun, Eun-Ah;Lee, Gang-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.4
    • /
    • pp.324-335
    • /
    • 2001
  • Information systems, which support information security functions such as CALS and EC systems, should have cryptographic functions for information in order to storage and communicate securely. Additionally, including recovery of lost keys, lots of cryptographic keys should be securely managed. In this paper, we present some results of development of a key recovery system for recovery of encrypted data. The proposed system, in a type of key encapsulation approach, confirms to NIST's RKRP(Requirements for Key Recovery Products) that is a defecto international key recovery standard, as well as CC 2.0 that is a international security evaluation criteria. A message sender secretly choices two or more key recovery agents from a pool of key recovery agents. The key recovery information is generated by using the recovering key, random keys and public keys of the chosen agents. A message receiver can not know which key recovery agents are involved in his key recovery service. We have developed two versions of prototype of key recovery system such as C/Unix and Java/NT versions. Our systems can be used for recovery of communicating informations as well as storing informations, and as a new security service solution for electronic commerce service infrastructures.

  • PDF

Key Recovery Technology for Enterprise Information Infrastructure(EII) (기업 정보체계의 키 복구 기술)

  • 임신영;강상승;하영국;함호상;박상봉
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.3
    • /
    • pp.159-178
    • /
    • 1999
  • As Electronic Commerce is getting larger, the volume of Internet-based commerce by enterprise is also getting larger. This phenomenon applies to Internet EDI, Global Internet Business, and CALS information services. In this paper, a new type of cryptographic key recovery mechanism satisfying requirements of business environment is proposed. It is also applied to enterprise information infrastructure for managing employees' task related to handling official properties of electronic enterprise documents exchange. This technology needs to be complied to information management policy of a certain enterprise environment because behavior of cryptographic key recovery can cause interruption of the employees' privacy. However, the cryptographic key recovery mechanism is able to applied to any kind of information service, the application areas of key recovery technology must be seriously considered as not disturbing user's privacy It will depend on the policy of enterprise information management of a specific company.

  • PDF

Development and Evaluation of Key Recovery System for Secure Recovery of Cryptographic Files in PC (PC상의 암호파일의 안전한 복구를 위한 키복구 시스템의 개발 및 평가)

  • 장수진;고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.167-186
    • /
    • 2002
  • The encryption of a file on a PC before saving can maintain security of the file. However, if the key for the encrypted file is lost or damaged, the encrypted file can not be decrypted, resulting in serious economical loss to the user or the user group. In order to minimize the economical loss a secure and reliable key recovery technology is required. Presented in this paper is the development and evaluation of PKRS (PC based Key Recovery System) which supports encryption and decryption of file and recovery of the encrypted file in emergency. The encapsulating method, which attaches key recovery information to encrypted file, is applied to the PKRS. In addition, the PKRS is developed and evaluated according to the requirements of Requirements for Key Recovery Products proposed by NIST and requirements of Common Criteria 2.0 to prove the safety and reliability of the information security system. This system is applicable to a PC and can be further extended to internet or intranet environment information system where in encryption and recovery of file is possible.

  • PDF

Key Recovery Compatible with IP Security

  • Rhee, Yoon-Jung;Chan Koh;Kim, Tai-Yun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.229-231
    • /
    • 2001
  • IPSec is a security protocol suite that provides encryption and authentication services for IP messages at the network layer of the Internet. Key recovery has been the subject of a lot of discussion, of much controversy and of extensive research. Key recovery, however, might be needed at a corporate level, as a from of key management. The basic observation of the present paper is that cryptographic solutions that have been proposed so far completely ignore the communication context. Static systems are put forward fur key recovery at network layer and solutions that require connections with a server are proposed at application layer. We propose example to provide key recovery capability by adding key recovery information to an IP datagram. It is possible to take advantage of the communication environment in order to design key recovery protocols that are better suited and more efficient.

  • PDF

Development of a Set of Data for Verifying Partition Recovery Tool and Evaluation of Recovery Tool (파티션 복구 도구 검증용 데이터 세트 개발 및 도구 평가)

  • Park, Songyee;Hur, Gimin;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1397-1404
    • /
    • 2017
  • When a digital forensic investigation is conducted on a damaged storage medium, recovery is performed using a recovery tool. But the result of each recovery tool is different depending on the tools. Therefore, it is necessary to identify and use the performance and limitations of the tool for accurate investigation. In this paper, we propose a scenario considering the disk recognition type such as MBR, GPT and the structural characteristics of FAT32 and NTFS filesystem to verify the performance of the partition recovery tool. And then We validate the existing tools with the data set built on the scenarios.

1 Gb/s gated-oscillator burst mode CDR for half-rate clock recovery

  • Han, Pyung-Su;Choi, Woo-Young
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.4 no.4
    • /
    • pp.275-279
    • /
    • 2004
  • A new burst mode clock and data recovery circuit is realized that improves the previousldy-known gated-oscilletor technique with half rate clock recovery, The circuit was fabricated with 0.25um CMOS technology, and its functions were confirmed up to 1 Gbps.

Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery

  • Wang, Chengyou;Zhang, Heng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.510-522
    • /
    • 2018
  • As the major source of information, digital images play an indispensable role in our lives. However, with the development of image processing techniques, people can optionally retouch or even forge an image by using image processing software. Therefore, the authenticity and integrity of digital images are facing severe challenge. To resolve this issue, the fragile watermarking schemes for image authentication have been proposed. According to different purposes, the fragile watermarking can be divided into two categories: fragile watermarking for tamper localization and fragile watermarking with recovery ability. The fragile watermarking for image tamper localization can only identify and locate the tampered regions, but it cannot further restore the modified regions. In some cases, image recovery for tampered regions is very essential. Generally, the fragile watermarking for image authentication and recovery includes three procedures: watermark generation and embedding, tamper localization, and image self-recovery. In this article, we make a review on self-embedding fragile watermarking methods. The basic model and the evaluation indexes of this watermarking scheme are presented in this paper. Some related works proposed in recent years and their advantages and disadvantages are described in detail to help the future research in this field. Based on the analysis, we give the future research prospects and suggestions in the end.

A Study on the Influence of the Recovery Methods of Information Service Failure on Online User Justice and Satisfaction (정보서비스 실패에 대한 회복 방법이 온라인 이용자의 공정성과 만족도에 미치는 영향에 관한 연구)

  • Kim, Young-Gon
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.2
    • /
    • pp.35-59
    • /
    • 2013
  • The aim of this study is to investigate the role of information service failure severity within existing framework of service recovery justice research and analyse the effects of the attribution of service recoveries on recovered user satisfaction and revisit. For empirical analysis, A total of 452 valid questionnaires were used to analyse the data gathered from university students who experienced the information service failures of university library. Some findings of the research are as follows: First, service failure severity has negative effect on service recovery justice. Second, procedural and interactional recovery justice has positive effect on recovered user satisfaction. Third, service recovery justice has significant influence on procedural and interactional justice. Finally, recovered user satisfaction has positive effect on user revisit and mouth of word.

The method of recovery for deleted record in Oracle Database (Oracle 데이터베이스의 삭제된 레코드 복구 기법)

  • Choi, Jong-Hyun;Jeong, Doo Won;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.947-955
    • /
    • 2013
  • Most of the enterprise information is stored in the database. Therefore, in order to investigate the company's criminal behavior, forensic analysis is important for the database and delete record is a need to develop recovery techniques. This paper is explained structure of the oracle database tablespace file and analyzed system tables that stored table information. Further, we suggests a method of recovery for deleted record in oracle tablespace.