• Title/Summary/Keyword: Information weakness

Search Result 789, Processing Time 0.05 seconds

A Study for Effectiveness of Preliminary Security Assessment on Online Game Service Domain (온라인게임 서비스 분야에 정보보호 사전진단 적용시 효과성에 관한 연구)

  • Yoo, Dong-Young;Seo, Dong-Nam;Kim, Huy-Kang;Choi, Jin-Young
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.293-308
    • /
    • 2011
  • The preliminary security assessment is an information security process to analyze security weaknesses before beginning of services. Discovering security weakness through preliminary security assessment is highly required because it costs much when security incident occur in the middle of service operation. However, this assessment is not widely spread in the online game service domain yet. In this paper, we summarize the security risk existed in the online game service, and we classify the security requirements related to the each risk. Also, through the case study, we evaluated the effectiveness of preliminary security assessment in this domain. In addition, we suggest checklists that should be reviewed once in game-client side, network-side and game-server side for the purpose of security enhancement.

Secure Membership Protocol for ZigBee Network (ZigBee 네트워크에서의 안전한 멤버쉽 프로토콜)

  • Kim, Bong-Hwan;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.405-416
    • /
    • 2013
  • ZigBee is a wireless sensor network protocol recognized as a next-generation standard infrastructure for WBAN and Smart Grid. Security plays an important role in several ZigBee applications. Especially, strict membership control should be enforced when the membership is changed during the join and leave operations in ZigBee. In this paper, we investigate the security weakness of the current leave operation in ZigBee and propose a new security scheme to address it as well as its security and performance analysis.

Design of Kerberos Authentication Mechanism based on WPKI (WPKI 기반 Kerberos 인증 메커니즘 설계)

  • Lee, Cheol-Seung;Park, Chan-Mo;Lee, Ho-Young;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.986-992
    • /
    • 2003
  • In this paper we challenge the user Authentication using Kerberos V5 authentication protocol in WPKI environment. this paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a p개blem on the design that uses wireless public key-based structur and transmission hierarchical security back of a WAP forum, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 V3 with using WIM for complement an authentication protocol Kerberos V5 and its disadvantages.

Semiparametric mixture of experts with unspecified gate network

  • Jung, Dahai;Seo, Byungtae
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.3
    • /
    • pp.685-695
    • /
    • 2017
  • The traditional mixture of experts (ME) modeled the gate network using a certain parametric function. However, if the assumed parametric function does not properly reflect the true nature, the prediction strength of ME would become weak. For example, the parametric ME often uses logistic or multinomial logistic models for the network model. However, this could be very misleading if the true nature of the data is quite different from those models. Although, in this case, we may develop more flexible parametric models by extending the model at hand, we will never be free from such misspecification problems. In order to alleviate such weakness of the parametric ME, we propose to use the semi-parametric mixture of experts (SME) in which the gate network is estimated in a non-parametrical way. Based on this, we compared the performance of the SME with those of ME and neural networks via several simulation experiments and real data examples.

The Main Character and Evaluation of China's New Electronic Signature Legislation (중국 전자서명법의 주요내용 및 평가와 전망)

  • Han, Sang-Hyun
    • The Journal of Information Technology
    • /
    • v.9 no.3
    • /
    • pp.1-14
    • /
    • 2006
  • China has recently (28 August 2004) adopted a new act legalizing the electronic signature. This new act provides electronic signatures with the same legal status as handwritten signatures, and states that on-line certification providers will have to be created in order to ensure the security of on-line operations made using said signatures. This new act is intended to increase Chinese electronic business, and thus to raise the revenue China can expect from said business. And the law grants electronic signatures the same legal effect as handwritten signatures and seals in business transactions, and sets up the market access system for online certification providers to ensure the security of e-commerce. As Internet trade requires a reliable third party to identify the signers, the credibility of online certifying organizations is significant for the transaction security. So, considering the weakness of China's social credibility system, the law regulates that the online signatures certification providers should be approved and administered by governments.

  • PDF

An Empirical Analysis of Consumer Satisfaction for Internet Shopping Mall (인터넷 쇼핑몰의 소비자만족에 대한 실증적 분석)

  • 염창선;지효원
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.23 no.59
    • /
    • pp.69-77
    • /
    • 2000
  • To make internet shopping mall competitive, effective consumer service should be provided. The objective of this study is to analyse the consumer satisfaction for internet shopping mall. For this purpose, questionnaire survey has been used. For the statistical analysis, multivariate linear regression were utilized using the SAS program. According to the results in this study, the variables that positively affect toward consumer satisfaction are the quality of goods, the information of goods, the display method of goods, the convenience of ordering point of time and cancellation. On the contrary, the variables that negatively affect toward consumer satisfaction are the price of goods and the weakness of information security.

  • PDF

Implementation of Distributed Intrusion Detection System based on Protocols (프로토콜 기반 분산 침입탐지시스템 설계 및 구현)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.81-87
    • /
    • 2012
  • Intrusion Detection System that protects system safely is necessary as network technology is developed rapidly and application division is wide. Intrusion Detection System among others can construct system without participation of other severs. But it has weakness that big load in system happens and it has low efficient because every traffics are inspected in case that mass traffic happen. In this study, Distributed Intrusion Detection System based on protocol is proposed to reduce traffic of intrusion detection system and provide stabilized intrusion detection technique even though mass traffic happen. It also copes to attack actively by providing automatic update of using rules to detect intrusion in sub Intrusion Detection System.

Experimental Study on Bi-directional Filtered-x Least Mean Square Algorithm (양방향 Filtered-x 최소 평균 제곱 알고리듬에 대한 실험적인 연구)

  • Kwon, Oh Sang
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.197-205
    • /
    • 2014
  • In applications of adaptive noise control or active noise control, the presence of a transfer function in the secondary path following the adaptive controller and the error path, been shown to generally degrade the performance of the Least Mean Square (LMS) algorithm. Thus, the convergence rate is lowered, the residual power is increased, and the algorithm can become unstable. In general, in order to solve these problems, the filtered-x LMS (FX-LMS) type algorithms can be used. But these algorithms have slow convergence speed and weakness in the environment that the secondary path and error path are varied. Therefore, I present the new algorithm called the "Bi-directional Filtered-x (BFX) LMS" algorithm with nearly equal computation complexity. Through experimental study, the proposed BFX-LMS algorithm has better convergence speed and better performance than the conventional FX-LMS algorithm, especially when the secondary path or error path is varied and the impulsive disturbance is flow in.

Contour Plots of Objective Functions for Feed-Forward Neural Networks

  • Oh, Sang-Hoon
    • International Journal of Contents
    • /
    • v.8 no.4
    • /
    • pp.30-35
    • /
    • 2012
  • Error surfaces provide us with very important information for training of feed-forward neural networks (FNNs). In this paper, we draw the contour plots of various error or objective functions for training of FNNs. Firstly, when applying FNNs to classifications, the weakness of mean-squared error is explained with the viewpoint of error contour plot. And the classification figure of merit, mean log-square error, cross-entropy error, and n-th order extension of cross-entropy error objective functions are considered for the contour plots. Also, the recently proposed target node method is explained with the viewpoint of contour plot. Based on the contour plots, we can explain characteristics of various error or objective functions when training of FNNs proceeds.

Marketing Strategy of Entertainment Contents in Japan's Market (엔터테인먼트 콘텐츠의 대일본 진출 마케팅전략)

  • Lee, Chan-Do
    • International Commerce and Information Review
    • /
    • v.10 no.4
    • /
    • pp.251-275
    • /
    • 2008
  • South Korea has spend billions planing for entertainment contents development, exporting contents, developing strategies for overseas marketing. But one piece of the plan may be missing: The ability of corporations to continue to provide vital services. Over the years, a number of studies have examined korean waves and have reached the same conclusion: starting a activity without reasonable strategies tends to have effects on merchandising, income, image, etc. For the purpose of analysis, this study has adopted SWOT matrix, Japan's market, for instance, is mixed by variation factors-opportunities, threats, strengths, weakness. Fortunately, Because Japan's market, the most world's cultural contents, has an environmental condition of advanced level, If Our en-contents have a high level, through localization and strategic alliance, the marketing strategies for japan' market will do a good chance of success.

  • PDF