• Title/Summary/Keyword: Information Security Contents

Search Result 703, Processing Time 0.025 seconds

Management Method for Private Key File of PKI using Container ID of USB memory (USB 메모리의 컨테이너ID를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.607-615
    • /
    • 2015
  • Mosts user of internet and smart phone has certificate, and uses it when money transfer, stock trading, on-line shopping, etc. Mosts user stores certificate in a hard disk drive of PC, or the external storage medium. In particular, the certification agencies are encouraged for user to store certificate in external storage media such as USB memory rather than a hard disk drive. User think that the external storage medium is safe, but when it is connect to a PC, certificate may be copied easily, and can be exposed to hackers through malware or pharming site. Moreover, if a hacker knows the user's password, he can use user's certificate without restrictions. In this paper, we suggest secure management scheme of the private key file using a password of the encrypted private key file, and a USB Memory's hardware information. The private key file is protected safely even if the encrypted private key file is copied or exposed by a hacker. Also, if the password of the private key file is exposed, USB Memory's container ID, additional authentication factor keeps the private key file safe. Therefore, suggested scheme can improve the security of the external storage media for certificate.

A Method for Scalar Multiplication on Elliptic Curves against Differential Power Analysis using Efficient Key-Randomization (효율적인 키-난수화를 사용한 차분 전력 분석 공격에 대응하는 타원곡선 위의 스칼라 곱셈 방법)

  • Jung, Seok Won
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.356-363
    • /
    • 2020
  • As a becoming era of Internet-of-Things, various devices are connected via wire or wirless networks. Although every day life is more convenient, security problems are also increasing such as privacy, information leak, denial of services. Since ECC, a kind of public key cryptosystem, has a smaller key size compared to RSA, it is widely used for environmentally constrained devices. The key of ECC in constrained devices can be exposed to power analysis attacks during scalar multiplication operation. In this paper, a key-randomization method is suggested for scalar multiplication on SECG parameters. It is against differential power analysis and has operational efficiency. In order to increase of operational efficiency, the proposed method uses the property 2lP=∓cP where the constant c is small compared to the order n of SECG parameters and n=2l±c. The number of operation for the Coron's key-randomization scalar multiplication algorithm is 21, but the number of operation for the proposed method in this paper is (3/2)l. It has efficiency about 25% compared to the Coron's method using full random numbers.

Direction of Elderly Education in the Age of Science and Technology (과학기술 시대 노인교육의 방향)

  • Yoon Ok Han
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.1-10
    • /
    • 2024
  • The purpose of this study is to explore the direction of elderly education in the age of science and technology. The research contents to achieve the research purpose are, first, to examine the current status of elderly education, and second, to suggest the direction of elderly education in the age of science and technology. Due to the current status of education for the elderly, education for the elderly continues to change and develop, and various programs and activities are provided to help the elderly enjoy a richer retirement life. According to the survey report on the elderly, 11.9% of all elderly people participate in learning activities. Senior welfare centers accounted for the largest number of institutions conducting learning activities for elderly education learning activities participants at 35.5%. First, in the direction of elderly education in the age of science and technology, education on the use of digital technology and information is necessary in the composition of elderly education contents. Second, in the case of elderly education methods, customized elderly education methods are needed. Third, in the case of operating elderly education institutions, specialized education centers for elderly education must be further strengthened and supported. The international community is already forming a consensus that the establishment of new social systems and financial investment due to the increase in the elderly population should be considered a new growth engine rather than a social crisis. Although there is a burden on the social security sector due to the increase in the elderly population, there is a shift in the direction of recognizing the potential capabilities and experiences of the elderly and returning them to social resources. Elderly education in the age of science and technology needs to change to a direction that can build a healthy and progressive society in the future.

A study on the impact of online contents characteristics on customer loyalty - Mediated effect of flow perspective - (고객충성도에 영향을 미치는 온라인 콘텐츠 특성에 관한연구 -몰입(Flow)의 매개효과를 중심으로 -)

  • Shin, Young-Chul;Jeong, Seung-Ryul
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.101-117
    • /
    • 2013
  • As the number of online game user has been rapidly increased thanks to the recent vitalization of online contents market, not only new business opportunity but also the opportunity to create high profits have been provided as well. However, the increase of the number of online game user and the rapid expansion of the market evoke a cutthroat completion among online game service providers, and also high barriers to entry to online game market have been erected. Thus, what kinds of efforts need for the business success and sales increase in online game market? In lots of researches regarding online contents business, the deepening of loyalty was considered as a critical factor for the business success. According to the study on user's behavior in online environment, users would experience the Flow while using online service, and then, if they were in state of the Flow, they would use the service constantly. High customer loyalty to online game means high will to use the online game too. The purpose of this research was i) to examine what factors enable users to be naturally immersed in online game while playing it, ii) to examine what properties of online game can make game more interesting and exciting, iii) to verify that such factors are critical in deepening customer loyalty, and iv) to suggest some essential factors to be fun and exciting games, on where the focus should be put, and the directionality for the development for sales expansion of online game developer or online game service provider. The research results are as below: First, the involvement and the perceived quality which were characteristics of brand appeared to be factors most affecting Flow. This shows that once game user get interested in online game that user has played frequently, even though new games are released, user will continuously flow the game not moving to new games, and also shows that users not only get more interested but also put more trust in games in the site to where users are frequently going than games in other sites, and consequently user can increasingly flow the game. Second, the compensation and graphics which are the characteristics of contents appeared to be factors affecting Flow. Proper compensation which is given to game users triggers fun and interests in game and makes them flow more and more. And graphics make users to feel game space as if real space and let them flow in game with more reality. Third, challenges, support, and the stability which are technical characteristics appeared to be factors affecting Flow. Challenges enable users to not only experience new virtual world but also solve various difficulties and obstacles. Once users feel fun and interests through this challenge, they can naturally flow games. In addition, the stability of network provides reliability in security and hacking. By doing so, it can induce users to flow more and more. Lastly, when aforementioned characteristics including contents characteristics, technical characteristics, and brand characteristics are organically combined each other, game users feel fun and total minutes are naturally increased, so that game users experience Flow, and consequently the customer loyalty will be deepened as well.

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

An Investigation of Social Commerce Service Quality on Consumer's Satisfaction (소셜커머스의 서비스품질과 소비자 만족도의 상관관계 분석)

  • Shin, Seung-Soo;Shin, Miyea;Jeong, Yoon-Su;Lee, Jihea
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.2
    • /
    • pp.27-32
    • /
    • 2015
  • Recently, service-related products have gained more attention than general products on the existing social commerce sites. Based on the situation, the effect that the service quality of social commerce has on customer satisfaction was analyzed in this study. It is a study that analyzes how much the service quality affects the customer satisfaction after the purchase, targeting consumers who have made purchases of social commerce products. In the case of social commerce, it is well-known that the diversity and convenience of products have a significant effect on customer satisfaction. Social commerce is currently being dumped beyond the 900 sites and dozens of cases of news, real-time searches of popular portal sites appeared not to be bored enough to related sites to drive the popularity coming quickly dug into our everyday lives of human beings. Yet the perception of social commerce seems not properly established because of the new concept was suddenly going to go through penetration without a collective interpretation and acceptance process. Most of the companies that often mimic the syoseol commerce is large, the blame did not depart from the forms of social shopping. We believe that personal and exhibit their skills and talents, and to wonder to see the social rather than the individuals who make unilateral companies.

  • PDF

A study on the navigation message contents of the future Korean navigation satellite (미래 한국형 항법위성을 위한 위성항법메세지에 대한 연구)

  • Jo, Jung-Hyun;Lee, Woo-Kyoung;Choe, Nam-Mi;Baek, Jeong-Ho
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.1
    • /
    • pp.108-115
    • /
    • 2012
  • Many studies relating the satellite navigation has been done by a relatively small research community in Korea. Most of domestic research has been focused on the application of the satellite navigation technology, but recently the topics of the next generation satellite navigation system are emphasized for its importance. Even opinions suggesting a future Korea's own satellite navigation system are not that uncommon. Due to the geographic, economic, and technological reasons, it is not widely discussed yet. However, a development technical roadmap regarding the Korea's own navigation satellite was established on the Korea Space Development Plan in general term. Currently four global navigation satellite systems are operating or being deployed. Several regional navigation satellite systems are in planning and development phase. Particularly in Asia, China has launched several satellites to complete their own global navigation satellite system, COMPASS until 2020. Japan launched one satellite and has planned to launch rest of set until 2013. It is proper time to develop Korea's own navigation satellite system to acquire the domestic space development technology and the security of navigational infrastructure. In this study, the validity or the feasibility of the Korea's own satellite navigation system is not discussed; rather the possibility and suitability of the additional information to the current operational navigation message is main target. For the first payload of the future Korea's satellite navigation satellite, a regional augmented system is more likely. This study also is focused on that aspect.

Forest Fire Monitoring System Using Satellite (위성활용 산불감시 시스템 구축)

  • Park, Beom-Sun;Cho, In-Je;Lim, Jae-Hwan;Kim, In-Bae
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.143-150
    • /
    • 2021
  • It introduces the contents of establishing a geostationary satellite-based forest fire monitoring system that can monitor areas of the Korean Peninsula 24 hours a day for forest fire monitoring, and describes how to establish a forest fire monitoring system and use it in various ways. In order to establish a satellite-utilized forest fire monitoring system, we will describe and draw conclusions on literature research, technical principles, forest fire monitoring means, and satellite forest fire monitoring system. The satellite-utilized forest fire monitoring system can consist of one geostationary satellite equipped with infrared detection optical sensors and a ground processing station that processes data received from satellites to spread surveillance information. Forest fire monitoring satellites are located in the country's geostationary orbit and should be operated 24 hours a day, 365 days a day. Forest fire monitoring technology is an infrared detection technology that can be used in national public interests such as forest fire monitoring and national security. It should be operated 24 hours a day, and to satisfy this, it is efficient to establish a geostationary satellite-based forest fire monitoring satellite system.

A Policy Study on the Implementation of Domestic Digital Platform Government: Focusing on the Classification of Domestic and Foreign Cases of Government as a Platform (GaaP) (국내 디지털플랫폼정부 구현을 위한 정책연구: 국내·외 플랫폼 정부 사례의 유형화를 중심으로)

  • Seo, Hyungjun
    • Informatization Policy
    • /
    • v.30 no.4
    • /
    • pp.113-137
    • /
    • 2023
  • This study aims to conduct the classification of Government as a Platform (GaaP) in a situation where the concept of GaaP can be diversely recognized. This is because inclusiveness and ambiguity in the concept of GaaP can hinder policy enforcement by working-level officials in the public sector. It drew the criteria for classification for GaaP based on literature and cases for GaaP. In the technical aspect, considering data as an overarching factor, the integrated system platform integrating the information system or websites of the public sector and the data platform as a single portal for open data to external stakeholders were sorted. In the governance aspect considering stakeholder as an overarching factor, the communication platform utilized for interaction between public and private sectors and the co-creation platform that encourages public-private partnership to create innovative outcomes were sorted. It suggested an actual implementation case and the policy implication according to each type of GaaP. Additionally, according to the classification of GaaP, it conducted contents analysis as to which type of GaaP the domestic Digital Platform Government belongs to based on its detailed assignment. Based on the classification of GaaP, it drew balanced implementation for various types of GaaP, plan for promoting the participation and collaboration of stakeholders, and necessity of restructuring and reinventing of the public sector as policy implications for the domestic digital platform government.

Comparative Analysis of Anti-Terrorism Act and its Enforcement Ordinance for Counter-Terrorism Activities (대테러 활동을 위한 테러 방지법과 시행령의 비교 분석)

  • Yoon, Hae-Sung
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.259-285
    • /
    • 2016
  • As the need for anti-terrorism legislation has been continuously argued, Anti-terrorism act has been enacted and enforced. On the other hand, there still remain a lot of points to be discussed regarding the definition of the concept of terrorism, matters of human rights violations, strengthening authority of the investigation and intelligence agencies, and mobilization military forces for the suppression of terrorism. Also, reviewing Anti-terrorism act and its enforcement ordinance draft, this legislation seems to regulate terrorist groups like IS. If so, in the case of terrorism of North Korea or domestic anti-government organizations, whether this law would be applied could become an issue. In the case of terrorism of North Korea, Ministry of National Defense has a right of commandership in the military operations, however, it is also possible to apply the article 4 of Natural Security Act a crime of performing objective-or a crime of foreign exchange on Criminal law as legal grounds for not military terrorisms but general investigations. Therefore, it is necessary to involve consideration about this matter. Furthermore, in the view of investigation, Anti-terrorism act and its enforcement ordinance draft do not mention Supreme Prosecutors Office and Ministry of Justice that conduct investigations. In the case of terrorism, the police and prosecution should conduct to arrest criminals and determine crimes at the investigation stage, however, any explicit article related to this content in Anti-terrorism act and its enforcement ordinance draft was unable to be found. Although Anti-terrorism act is certainly toward preventive aspects, considering some matters such as prevention, actions on the scene, maneuver after terrorism, arresting terrorists, investigation direction, cooperation, and mutual assistance, it is necessary to reflect these contents in Anti-terrorism act. In other words, immediately after terrorists attacks, it is possible to mobilize the military operations by Integrated Defense act in order to arrest them in the case of military terrorism. Nevertheless, because both military terrorism and general one are included in the investigation stage, it needs to begin an investigation under the direction of the prosecution. Therefore, above all, a device for finding out the truth behind the case at the investigation stage is not reflected in the current Anti-terrorism act and its enforcement ordinance draft. Accordingly, if National Intelligence Service approaches information at the prevention level in this situation, it may be necessary to come up with follow-up measures of the police, the prosecution, and military units.

  • PDF