• Title/Summary/Keyword: Information Security Check

Search Result 298, Processing Time 0.022 seconds

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

Key Bit-dependent Attack on Side-Channel Analysis-Resistant Hardware Binary Scalar Multiplication Algorithm using a Single-Trace (부채널 분석에 안전한 하드웨어 이진 스칼라 곱셈 알고리즘에 대한 단일 파형 비밀 키 비트 종속 공격)

  • Sim, Bo-Yeon;Kang, Junki;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1079-1087
    • /
    • 2018
  • Binary scalar multiplication which is the main operation of elliptic curve cryptography is vulnerable to the side-channel analysis. Especially, it is vulnerable to the side-channel analysis which uses power consumption and electromagnetic emission patterns. Thus, various countermeasures have been studied. However, they have focused on eliminating patterns of data dependent branches, statistical characteristic according to intermediate values, or the interrelationships between data. No countermeasure have been taken into account for the secure design of the key bit check phase, although the secret scalar bits are directly loaded during that phase. Therefore, in this paper, we demonstrate that we can extract secret scalar bits with 100% success rate using a single power or a single electromagnetic trace by performing key bit-dependent attack on hardware implementation of binary scalar multiplication algorithm. Experiments are focused on the $Montgomery-L{\acute{o}}pez-Dahab$ ladder algorithm protected by scalar randomization. Our attack does not require sophisticated pre-processing and can defeat existing countermeasures using a single-trace. As a result, we propose a countermeasure and suggest that it should be applied.

Protecting Fingerprint Data for Remote Applications (원격응용에 적합한 지문 정보 보호)

  • Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Lee, Han-Sung;Yang, Jong-Won;Choi, Eun-Wha;Seo, Chang-Ho;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.63-71
    • /
    • 2006
  • In this paper, we propose a secure solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the sensor holder or the server. To protect possible attacks launched at the untrusted client, our solution makes the fingerprint sensor validate the result computed by the client for the feature extraction. However, the validation should be simple so that the resource-constrained fingerprint sensor can validate it in real-time. To solve this problem, we separate the feature extraction into binarization and minutiae extraction, and assign the time-consuming binarization to the client. After receiving the result of binarization from the client, the sensor conducts a simple validation to check the result, performs the minutiae extraction with the received binary image from the client, and then sends the extracted minutiae to the server. Based on the experimental results, the proposed solution for fingerprint verification can be performed on the sensor-client-server model securely and in real-time with the aid of an untrusted client.

Cloud-Based Reservation and Notification System for Efficient Testing of Infectious Diseases (효율적인 감염병 검사 예약을 위해 클라우드에 기반한 예약 및 알림 시스템)

  • Je-Seong Hwangbo;Ho-Yoon Kim;Seung-Soo Shin
    • Journal of Industrial Convergence
    • /
    • v.21 no.1
    • /
    • pp.67-76
    • /
    • 2023
  • COVID-19, which occurred in 2019, has a strong contagious power, has serious symptoms of infection and after-effects, and death in severe cases depending on the underlying disease and symptoms. As COVID-19 is highly contagious, in Korea, screening clinics have been set up across the country to determine whether or not to be positive for COVID-19 and isolate the infected to prevent the spread of COVID-19. However, there are cases where COVID-19 test applicants flock to screening clinics and cannot receive tests due to longer waiting times, and there is a risk that secondary infections may occur in the atmosphere. In this study, the reservation and notification system can be applied from the existing screening care system to solve spatial constraints, reducing waiting time with screening appointments, and solving population bottlenecks to screening clinics. Taking the COVID-19 pandemic as an experience, we propose a system that can present directions in future pandemic situations. To process real-time data, we use Google's Firebase to use Realtime Database in the cloud environment. Because a real-time database is used, users can check the status of screening clinics in real time through the app, make reservations, and receive notifications about test reservations.

A Study on the Appropriate Management of Maritime Police Authority in Korea Coast Guard: Focusing on the Japan Coast Guard (해양경비안전본부의 해양경찰권 적정 운영방안에 관한 연구: -일본 해상보안청과의 비교를 중심으로-)

  • Son, Yeong-Tae
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.361-391
    • /
    • 2015
  • Regarding the [Government Organization Act; which is legislated on 19th November, 2014] Korea Coast Guard(KCG) has been re-organized and belong from Korea Coast Guard shall be established under the Minister of Oceans and Fisheries to Ministry of Public Safety and Security. Furthermore, National Police Agency(NPA) Commissioner has the right for administer duties concerning investigation and information by succession from Korea Coast Guard Commissioner. That means that main rule has been moved from prior KCG to Ministry of Public Safety and Security(MPSS) and NPA currently which is dual structure. Meanwhile, This kind of organization change has been effective to investigative agency which exert KCG's call of duty and causes needs of variety problems. In other words, There are quite huge changes such as KCG's reduction of their work, call of duty and re-organization regarding revised government organization act. However this change - including re-organization by government, was not able to take current MPSS's special features such as organization specialty and legal rights. It means, the current change has not been taken present law system CRIMINAL PROCEDURE LAW and there was no preparation to stable maritime police authority action as well. To sum up, this revised GOVERNMENT ORGANIZATION ACT is supposed to provide total, quick security service by establishing strong disasters and safety control tower. However they only contains few area such as organization revision regarding 'Sewol Ferry Disaster', they was not able to contain the other parts of Society. Therefore, in this article I would like to check the part of re-evaluation of current change made by KCC's organization revision. It is supposed to provide better legal stability by making clear of work area by government agencies who acts maritime police authority.

  • PDF

Android Based Mobile Combination Login Application (안드로이드 기반 모바일 통합로그인 애플리케이션)

  • Lim, Jung-Gun;Choi, Chang-Suk;Park, Tae-Eun;Ki, Hyo-Sun;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.151-156
    • /
    • 2013
  • Android that was made by Google and Open Handset Alliance is the open source software toolkit for mobile phone. In a few years, Android will be used by millions of Android mobile phones and other mobile devices, and become the main platform for application developers. In this paper, the integrated login application based on Google's Android platform is developed. The main features of the mobile combination login application content based on Android are as follows. First, the application has more convenient login functionality than the functionality of general web browser as the web browser of the mobile-based applications(web browser style applications) as well as security features and faster screen(view) capability by reducing the amount of data transfer. Second, the application is so useful for management of ID and Password, and it can easily manage multiple ID information such as message, mail, profile. The results of performance evaluation of the developed application show the functionality that can login many kinds of portal sites simultaneously as well as the ability that can maintain login continuously. Currently, we are trying to develope a couple of the technologies that can insert multiple accounts into one ID and check all information on one screen.

Research on Effective Scientific Investigation Methods with Regards to Explosion Accidents (폭발사고시 효과적인 과학수사 방법에 관한 연구)

  • Jun, Sang-Gun;Chae, Jong-Min
    • Journal of forensic and investigative science
    • /
    • v.1 no.1
    • /
    • pp.72-87
    • /
    • 2006
  • Accidents and terrorist acts that utilize explosives have a great influence on society and thus require a prompt investigation for the arrest of the culprit. However, such investigations are often met with difficulties due to the vastness of the crime scene, restrictions on approaching the scene, fragility of the evidence, complexity of investigation, and the lack of expertise. In spite of such facts, scientific investigation regarding explosives have not been widely studied in Korea. Therefore, the focus of this research primarily concerns the effective scientific investigation methods in cases of accidents that involve chemical explosives. Although the a systematic investigation method is at the heart of scientific investigation in cases of explosive accidents, it is only at its rudimentary stage. Therefore, in this research, a systematic investigation method is put forth for the 'scene investigation, the documentation of the scene, and the collection and processing of evidence. Further, I have set forth a 'scene investigation check list' the ensure a thorough scene investigation and to promote an exhaustive evidence collection that would guarantee the admissibility of such evidence in court. The above efforts were aimed at simplifying the currently complicated investigation system. 1) In the future, a guidebook that can be generally applied to accidents involving explosives in Korea ught to be produced, a continual systematic education and integrated training excises for investigators ought to be established, laws that require additives in explosives ought to be instituted so that the type, components, and source of explosives can be identified, and lastly, a database that contain information on former explosion accidents, trends, and techniques of criminal activities that involve explosion accidents should be compiled.

  • PDF

Intelligent Emergency Alarm System based on Multimedia IoT for Smart City

  • Kim, Shin;Yoon, Kyoungro
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.3
    • /
    • pp.122-126
    • /
    • 2019
  • These-days technology related to IoT (Internet of Thing) is widely used and there are many types of smart system based IoT like smart health, smart building and so on. In smart health system, it is possible to check someone's health by analyzing data from wearable IoT device like smart watch. Smart building system aims to collect data from sensor such as humidity, temperature, human counter like that and control the building for energy efficiency, security, safety and so forth. Furthermore, smart city system can comprise several smart systems like smart building, smart health, smart mobility, smart energy and etc. In this paper, we propose multimedia IoT based intelligent emergency alarm system for smart city. In existing IoT based smart system, it communicates lightweight data like text data. In the past, due to network's limitations lightweight IoT protocol was proposed for communicating data between things but now network technology develops, problem which is to communicate heavy data is solving. The proposed system obtains video from IP cameras/CCTVs, analyses the video by exploiting AI algorithm for detecting emergencies and prevents them which cause damage or death. If emergency is detected, the proposed system sends warning message that emergency may occur to people or agencies. We built prototype of the intelligent emergency alarm system based on MQTT and assured that the system detected dangerous situation and sent alarm messages. From the test results, it is expected that the system can prevent damages of people, nature and save human life from emergency.

Accessibility Information Element & a PNC Selection Method in the High Rate WPAN (WPAN에서 통신가능성 정보 요소와 PNC 선택 방법)

  • Jeong, Heon-Ju;Cho, Moo-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.639-647
    • /
    • 2005
  • When a DEV associates with an existing WPAN, the PNC checks the capabilities of the new DEV to see if it is more capable to be the PNC of the piconet based on the criteria defined in the IEEE Std 802.15. If the new DEV is more capable and the current security policies allow it, then the PNC has the option of handing over control of the piconet to the DEV that has just joined. And, If the PNC is shutting down or wants to leave the WPAN, it also uses the handover process to give control to another DEV in the piconet. However, IEEE 802.15.3 checks only DEV capability information for more PNC capable. For PNC selection, it should consider the radio coverage of new PNC capable DEVs. So, we propose the method of PNC selection with accessibility check. This method manages PNC candidate list in the current piconet. In this paper, we analyze accessibility problems for PNC selection in section 2. In section 3, we explain CI(Configuration Inquiry) process which is proposed by Sony Corporation and propose PCI(PNC Candidate Inquiry) process. Also, we perform numerical analysis to compare PCI process with CI process in section 4. Finally, we conclude in section 5.

Research Suggestion for Disaster Prediction using Safety Report of Korea Government (안전신문고를 이용한 재난 예측 방법론 제안)

  • Lee, Jun;Shin, Jindong;Cho, Sangmyeong;Lee, Sanghwa
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.4
    • /
    • pp.15-26
    • /
    • 2019
  • Anjunshinmungo (The safety e-report) has been in operation since 2014, and there are about 1 million cumulative reports by June 2019. This study analyzes the contents of more than 1 million safety newspapers reported at the present time of information age to determine how powerful and meaningful the people's voice and interest are. In particular, we are interested in forecasting ability. We wanted to check whether the report of the safety newspaper was related to possible disasters. To this end, the researchers received data reported in the safety newspaper as text and analyzed it by natural language analysis methodology. Based on this, the newspaper articles during the analysis of the safety newspaper were analyzed, and the correlation between the contents of the newspaper and the newspaper was analyzed. As a result, accidents occurred within a few months as the number of reports related to response and confirmation increased, and analyzing the contents of safety reports previously reported on social instability can be used to predict future disasters.