• 제목/요약/키워드: Information Security Strategy

검색결과 467건 처리시간 0.024초

개도국의 공개키기반구조 도입 전략에 관한 연구: 말라위를 중심으로 (Research on Deployment Strategy of Public Key Infrastructure for Developing Country: Focused on Malawi)

  • 김현성;최해원
    • 디지털융복합연구
    • /
    • 제14권10호
    • /
    • pp.45-51
    • /
    • 2016
  • 본 논문에서는 말라위의 정보통신 인프라 현황에 맞는 공개키기반구조 도입전략을 수립하는데 그 목적이 있다. 이를 위해 말라위를 중심으로 한 개도국 및 극빈국의 정보통신 현황을 파악하고, 국가 정보보호 체계 수립에 효율적일 수 있는 모바일 기반 공개키기반구조 도입전략을 수립하고자 한다. 먼저 무선 통신에 적합한 공개키기반구조를 위한 보안 고려사항을 도출하고, 이를 토대로 말라위의 정보통신 환경에 적합한 모바일 기기를 중심으로 하는 경량의 국가 공개키기반구조에 대한 설계를 제시한다. 특히, 제안하는 모바일 기반 공개키기반구조는 스마트카드를 기반으로 인증서에 대한 모든 처리를 제시한다. 본 논문에서 제시한 모바일 통신에 적합한 공개키기반구조는 경량의 모바일 기기를 중심으로 유선네트워크 수준의 보안을 보장할 수 있다.

An Adaptive JPEG Steganographic Method Based on Weight Distribution for Embedding Costs

  • Sun, Yi;Tang, Guangming;Bian, Yuan;Xu, Xiaoyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2723-2740
    • /
    • 2017
  • Steganographic schemes which are based on minimizing an additive distortion function defined the overall impacts after embedding as the sum of embedding costs for individual image element. However, mutual impacts during embedding are often ignored. In this paper, an adaptive JPEG steganographic method based on weight distribution for embedding costs is proposed. The method takes mutual impacts during embedding in consideration. Firstly, an analysis is made about the factors that affect embedding fluctuations among JPEG coefficients. Then the Distortion Update Strategy (DUS) of updating the distortion costs is proposed, enabling to dynamically update the embedding costs group by group. At last, a kind of adaptive JPEG steganographic algorithm is designed combining with the update strategy and well-known additive distortion function. The experimental result illustrates that the proposed algorithm gains a superior performance in the fight against the current state-of-the-art steganalyzers with high-dimensional features.

Survey on Physical Layer Security in Downlink Networks

  • Abbas, Mohammed Adil;Hong, Jun-Pyo
    • Journal of information and communication convergence engineering
    • /
    • 제15권1호
    • /
    • pp.14-20
    • /
    • 2017
  • In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.

정보보호산업의 경제파급효과 (An analysis of Economic Ripple Effect on the Information Security Industry)

  • 김방룡;홍재표
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.86-87
    • /
    • 2014
  • 사회 복잡성이 증대되면서 정보보호 기술개발의 필요성은 부각되고 있으나, 우리나라에서는 당해 산업에 대한 산업적 연구는 일천하다. 그 이유는 정보보호 산업의 중요성으로 인하여 해당 산업에 대한 논의는 무성하지만, 아직까지 정보보호 산업에 관한 정의나 분류가 불분명하기 때문이라 판단된다. 본 연구의 목적은 정보보호 산업을 정의하고 그에 따른 산업분류를 시도한 후, 우리나라 정보보호 산업의 경제파급효과를 분석함으로써 국내 정보보호 산업의 육성을 위한 기초 정책 자료를 제공하는 것이다.

  • PDF

Factors for Better Adoption of Information Security on Custom-Made Software at SMEs: A Systematic Review and Framework

  • Fatimah Alghamdi;Moutasm Tamimi;Nermin Hamza
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.65-78
    • /
    • 2023
  • Investigations on information security factors re- main elusive at small and medium enterprises (SMEs), es- specially for custom-made software solutions. This article aims to investigate, classify, adopt factors from recent literature addressing information security resources. SMEs al- ready have information security in place, but they are not easy to adopt through the negotiation processes between the in-house software development companies and custom-made software clients at SMEs. This article proposes a strategic framework for implementing the process of adoption of the information security factors at SMEs after conducting a systematic snapshot approach for investigating and classifying the resources. The systematic snapshot was conducted using a search strategy with inclusion and exclusion criteria to retain 128 final reviewed papers from a large number of papers within the period of 2001-2022. These papers were analyzed based on a classification schema including management, organizational, development, and environmental categories in software development lifecycle (SDLC) phases in order to define new security factors. The reviewed articles addressed research gaps, trends, and common covered evidence-based decisions based on the findings of the systematic mapping. Hence, this paper boosts the broader cooperation between in-house software development companies and their clients to elicit, customize, and adopt the factors based on clients' demands.

The Effect of Security Awareness Training on the Use of Biometric Authentication: Focusing on the Protection Motivational Behaviors

  • Jung, Seungmin;Park, Joo Yeon
    • Journal of Information Technology Applications and Management
    • /
    • 제27권2호
    • /
    • pp.1-21
    • /
    • 2020
  • The purpose of this study is to investigate the behavioral factors affecting the security attitude and intention to use biometrics password based on the protection motivation theory. This study also investigates security awareness training to understand trust, privacy, and security vulnerability regarding biometric authentication password. This empirical analysis reveals security awareness training boosts the protection motivational factors that affect on the behavior and intention of using biometric authentication passwords. This study also indicates that biometric authentication passwords can be used when the overall belief in a biometric system is present. After all, security awareness training enhances the belief of biometric passwords and increase the motivation to protect security threats. The study will provide insights into protecting security vulnerability with security awareness training.

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

빅데이터 개인정보 취급에 따른 문제점 분석 (Analysis of problems caused by Big Data's private information handling)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제10권1호
    • /
    • pp.89-97
    • /
    • 2014
  • Recently, spread of Smartphones caused activation of mobile services, because of that Big Data such as clouding service able to proceed with large amount of data which are hard to collect, save, search and analyze. Many companies collected variety of private and personal information without users' agreement for their business strategy and marketing. This situation raised social issues. As companies use Big Data, numbers of damage cases are growing. In this Thesis, when Big Data process, methods of analyze and research of data are very important. This thesis will suggest that choices of security levels and algorithms are important for security of private informations. To use Big Data, it has to encrypt the personal data to emphasize the importance of security level and selection of algorithm. Thesis will also suggest that research of utilization of Big Data and protection of private informations and making guidelines for users are require for security of private information and activation of Big Data industries.

디지털 콘텐츠의 정보보호 분석 모델 (An Information Security Model for Digital Contents)

  • 윤석규;장희선
    • 융합보안논문지
    • /
    • 제10권3호
    • /
    • pp.9-14
    • /
    • 2010
  • 본 논문에서는 디지털 콘텐츠에 대한 안전하고 신뢰성 있는 유통, 전달, 취약성 점검을 위한 정보보호의 자동분석 방법을 위한 네트워크 구조와 분석 모델을 제시한다. 제시된 네트워크에서는 firewall과 IDS(Intrusion Detection System)를 이용하며, 자체적인 위협을 평가하기 위한 에이전트를 활용하는 방안을 제시하며, 주요 기능으로는 보안 범위 선정, 관련 데이터 수집/분석, 수준평가 및 대책 제시 등을 포함한다. 효율적인 자동화 분석 모델을 개발하기 위해서는 콘텐츠의 상호 유통과 웹서버-사용자간 트래픽 분석에 기초한 네트워크의 설계와 정보보호 및 자동분석 알고리즘의 개발 그리고 효율적인 DRM/PKI 등의 도구 개발이 필요함을 알 수 있다.

방화벽 로그를 이용한 침입탐지기법 연구 (A Study on the Intrusion Detection Method using Firewall Log)

  • 윤성종;김정호
    • Journal of Information Technology Applications and Management
    • /
    • 제13권4호
    • /
    • pp.141-153
    • /
    • 2006
  • According to supply of super high way internet service, importance of security becomes more emphasizing. Therefore, flawless security solution is needed for blocking information outflow when we send or receive data. large enterprise and public organizations can react to this problem, however, small organization with limited work force and capital can't. Therefore they need to elevate their level of information security by improving their information security system without additional money. No hackings can be done without passing invasion blocking system which installed at the very front of network. Therefore, if we manage.isolation log effective, we can recognize hacking trial at the step of pre-detection. In this paper, it supports information security manager to execute isolation log analysis very effectively. It also provides isolation log analysis module which notifies hacking attack by analyzing isolation log.

  • PDF