• Title/Summary/Keyword: Information Security Committee

Search Result 61, Processing Time 0.021 seconds

Information technology - Security techniques - Hash-functions - Part 2 : Hash-functions using an n-bit block cipher algorithm (ISO/IEC JTC1/SC27의 국제표준소개 (11) : ISO/IEC IS 10118-2 정보기술 - 보안기술 - 해쉬함수, 제 2 부 : n-비트 블럭 암호 알고리즘을 이용한 해쉬함수)

  • 이필중
    • Review of KIISC
    • /
    • v.6 no.1
    • /
    • pp.79-88
    • /
    • 1996
  • 작년 6월호에 ISO/IEC 10118의 제 1 부인 개론이 소개되었고 이번호에는 바로 표준이 된 제 2 부를 소개한다. 이 과제는 1990년에 CD(Committee Draft), 1992년에 DIS(Draft IS)가 되었고, 1994년에 IS(International Standard)가 되었으며 1998년에 1차 검토가 있을 예정이다.

  • PDF

(Information technology - Security techniques - Entity authentication, Part 4 : Mechanisms using a cryptographic check function) (ISO/IEC JTC1/SC27의 국제표준소개 (9) : ISO/IEC IS9798-4 정보기술 - 보안기술 - 실체인증 기법, 제 4 부: 암호학적 확인 참수를 이용한 인증)

  • 이필중
    • Review of KIISC
    • /
    • v.5 no.3
    • /
    • pp.107-121
    • /
    • 1995
  • 제 5권 제 1호에 이어 상대방이 자신이라고 주장한 실체가 정말 그 실체인지를 인증하기 위한 기법을 표준화하는 과제 중의 네번째로 "암호학적 화인 함수를 이용한 인증"을 소개한다. 이 과제는 제 2부인 "대칭형 암호기술을 이용한 인증"과 많이 유사하므로 쉽게 진행되어 1993년에 CD(Committee Draft), 1994년 DIS(Draft for International Standard)가 되었고 1995년에 IS(International Standard)가 되었으며 1999년에 1차 검토가 있을 예정이다.99년에 1차 검토가 있을 예정이다.

  • PDF

Proposed Method for Mobile Forensics Investigation Analysis of Remnant Data on Google Drive Client

  • Gandeva Bayu Satrya;Soo Young Shin
    • Journal of Internet Technology
    • /
    • v.19 no.6
    • /
    • pp.1741-1752
    • /
    • 2018
  • The best known software developers all offer cloud storage services. Microsoft offers Onedrive to its users, Apple offers iCloud Drive and Google offers Google Drive or GDrive. The battle between these software developers is ongoing and they will always strive to give the best services to their users. It is not only technology that is evolving, however, but also ways in which security can be breached and data abused. The security of information on the Internet is increasingly at risk and there are many threats to cloud storage platforms. This research used the mobile forensics approach to help in identifying and analyzing user behavior that may occur while using GDrive application for cybercrime. The novelty of comparison and analyzing methods performed in this research can help to find remnant data from all activities performed by GDrive users in Android smartphones. Hence, this proposed method can assist investigators in finding remnant data on GDrive client and can provide knowledge for legal practitioners.

A Study on the Security Technology of Real-time Biometric Data in IoT Environment

  • Shin, Yoon-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.85-90
    • /
    • 2016
  • In this paper, the biometric data is transmitted in real time from the IoT environment is runoff, forgery, alteration, prevention of the factors that can be generated from a denial-of-service in advance, and the security strategy for the biometric data to protect the biometric data secure from security threats offer. The convenience of living in our surroundings to life with the development of ubiquitous computing and smart devices are available in real-time. And is also increasing interest in the IOT. IOT environment is giving the convenience of life. However, security threats to privacy also are exposed for 24 hours. This paper examines the security threats to biological data to be transmitted in real time from IOT environment. The technology for such security requirements and security technology according to the analysis of the threat. And with respect to the biometric data transmitted in real time on the IoT environment proposes a security strategy to ensure the stability against security threats and described with respect to its efficiency.

(Infirmation Technology- Security techniques- Data integrity mechanism using a cryptographic check function employing a block ciipher algorithm) (IOS/IEC JTC1/SC27의 국제표준소개 (2) : 정보기술-보안기술-블럭 암호화 알고리즘을 사용하여 만든 암호학적 검산 함수를 이용한 데이타 무결성 기법)

  • 이필중
    • Review of KIISC
    • /
    • v.3 no.3
    • /
    • pp.31-39
    • /
    • 1993
  • IOS/IEC JTC1/SC27의 국제표준소개의 첫번째 편으로 DIS 9797을 소개한다. 이것은 1989년에 1차로 국제표준이 되었다가 결함이 발견되어 다시 작업이 시작되어 1992년 10월 SC27정기총회에서 CD(Committee Draft)에서 수정후 DIS(Draft Internationa Standard) 수준으로 올리기로 하여 1993년 3월 DIS로서 표결에 부쳐진 문서이다. 이해를 돕기 위하여 국문뒤에 원문을 덧붙였다. 번역이 적절하지 않거나 더 좋은 표현이 있으면 역자에게 알려주면 참고하여 추후의 수정본에 반영하겠다.

  • PDF

A Study on the Improvement of Police Committee System in Korea - Focus on the National Police Committee -

  • Lee, Young-Woo;Jang, Su-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.143-146
    • /
    • 2021
  • Korean police have been established as a national police system since the liberation of Korea and have been operated as a centralized police system for a long time, and a police committee was established under the enactment of the Police Act in 1991. However, the National Police Commission has a problem that it cannot perform the functions of the original National Police Commission because it is only a simple advisory body, not an institution that reviews and decides major policies related to police administration. As a result, despite the passage of a full amendment to the Police Act in 2020 and the revision of the Act to the Organization and Operation of the National Police and Local Police, operational and compositional problems still exist. Therefore, this study intends to propose the current state of operation and problems of the police committee system and measures for improvement.

Security Knowledge Classification Framework for Future Intelligent Environment (미래 융합보안 인력양성을 위한 보안교육과정 분류체계 설계)

  • Na, Onechul;Lee, Hyojik;Sung, Soyung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.47-58
    • /
    • 2015
  • Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology. Accordingly, new types of cybercrime are on the rise, and security breaches and other security-related incidents are increasing rapidly because of security problems like external cyberattacks, leakage by insiders, etc. These threats will continue to multiply as industry and technology converge. Thus, the main purpose of this paper is to design and present security subjects in order to train professional security management talent who can deal with the enhanced threat to information. To achieve this, the study first set key information security topics for business settings on the basis of an analysis of preceding studies and the results of a meeting of an expert committee. The information security curriculum taxonomy is developed with reference to an information security job taxonomy for domestic conditions in South Korea. The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.

A Study on Electronic Voting Protocol using Bit-Commitment (Bit-Commitment를 이용한 전자투표 프로토콜에 관한 연구)

  • 김대엽;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.53-62
    • /
    • 2001
  • Fast diffusion of personal computer and network, and developed security technology are augmenting specific gravity of convenient and safe electronic voting system supplementing much problems of existent off-line vote form. But in spite of enlargement of these weight, much limitations are extravagant. Specially, problem that secure voter\`s anonymousness and accuracy of poll can be important urea that judge if electronic voting system can be applied actually. Also, problems such as buying and selling of vote remain to subject that must solve yet. In this paper, we introduce items that is considered to design the safe electronic voting system, and present limitation of electronic polling system announced in [1]. And we propose improvement way. Improved protocol keeping advantages that is presented in [1], designed to keep away voter\`s anonymousness defamation by conspiracy of Election Administration Committee and Totaling Committee, and block unlawful election intervention as original.

A Study on Web Service Framework Security based on SAML (SAML기반의 웹서비스 프레임워크 보안에 관한 연구)

  • Kim, Hyun-Hee;Cha, Suk-Il;Song, Jun-Hong;Sung, Baek-Ho;Shin, Dong-Il;Shin, Dong-Kyoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.931-934
    • /
    • 2002
  • 현재의 e-비즈니스 환경은 단순히 웹사이트를 구축 및 운용하는 차원을 넘어, 시간이 지남에 따라 급격한 진화 과정을 거치고 있다. 진화의 초점으로 떠오르고 있는 웹서비스 중 SAML(Security Assertions Markup Language)은 사용자 인증 정보 교환에 관한 프레임워크로 OASIS XML 보안 서비스 기술 위원회(OASIS XML-Security Service Technical Committee)에서 표준화 작업을 진행하고 있다. SAML은 S2ML(Security Services Markup Language)의 원리와 구조를 재사용해서 S2ML의 이점을 공유 하고 Single Sign-On, 인증 서비스, B2B Transaction, Sessioning같은 기능을 가진다. 그로 인해 다양한 정책기반의 산업에서 보안 시스템, 자바 어플리케이션 서버, XML 메시징 프레임워크와 오퍼레이팅 플랫폼사이에 인증, 승인과 함께 프로필 정보를 교환하기 위해 사용된다. 본 논문에서는 SAML의 범위와 목적 그리고 유즈케이스 모델과 시나리오를 통해 기본 구조와 쓰임새에 대해서 알아본다.

  • PDF

The Use Plan of the Effective Computer Simulation Program for Strengthening the Disaster Field Response Strategy

  • Ham, Seung Hee;Park, Namkwun;Yoo, Myong O
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.2
    • /
    • pp.176-180
    • /
    • 2016
  • The full extent of damage depend greatly on the quick and rational decision making by the incident commander soon after the disaster. The decision that everybody should wait by the captain, not to enter into the ship by the first dispatched incident commander, broadcasting failure have brought about a huge loss of life at Sewol cruise ship incident. Thus this study reviews the training and education system supporting the rational crisis decision making performed by the incident commander to cut off the expansion of disaster which is caused by the failure of the incident situation awareness and the decision making described above.