• Title/Summary/Keyword: Internet security

Search Result 3,818, Processing Time 0.033 seconds

Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure

  • Ryoo, Jung-Woo;Park, Eun-A
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.33-50
    • /
    • 2011
  • In this paper we applied our previously developed assessment framework to the data collected from an internet security readiness survey targeted at households. We used the assessment framework to compute an Internet Security Readiness index for each household, which was in turn derived from Internet Security Readiness capital, skill, and actual uptake/use of infrastructure indices. We then examined the relationships among overall Internet Security Readiness, and the capital, skill, and actual uptake/use of infrastructure related to Internet Security Readiness. In addition, we explored the influence of Internet usage level and experience on Internet Security Readiness.

A Study on Factors Influencing User's Security Intention for Internet Banking (인터넷 뱅킹 사용자의 보안의도에 영향을 마치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon;Jeon, Jin-Hwan
    • The Journal of Information Systems
    • /
    • v.18 no.2
    • /
    • pp.1-18
    • /
    • 2009
  • Recently, internet banking is growing rapidly. Moot banks in Korea provide internet banking services. Internet banking becomes a major trend in the financial marketplace. With advanced computer technology and declining communication costs, many customers prefer online alternatives such as internet banking, mobile banking or phone banking rather than going to banks by themselves. The number of customers using those alternatives is skyrocketing and domestic commercial banks encourage them of the use. As the internet is highly developed, customers demand higher quality services and banks develop and provide diverse services in order to respond to them. However, internet banking service users are still afraid of their personal and financial information being exposed on the internet. The purpose of this research is to empirically analyze the influence that appropriate internet banking affect user's security intention. The research model proposed in this study includes user's security intention which is influenced by self-efficacy, security trust, Internet banking attitude, perceived security and security intention. According to the result of this study, self-efficacy and security trust are related to the security attitude. There is a significant relationship between security attitude and perceived security. Also, user's security attitude and perceived security is significantly affected by security intention.

Service Identification of Internet-Connected Devices Based on Common Platform Enumeration

  • Na, Sarang;Kim, Taeeun;Kim, Hwankuk
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.740-750
    • /
    • 2018
  • There are a great number of Internet-connected devices and their information can be acquired through an Internet-wide scanning tool. By associating device information with publicly known security vulnerabilities, security experts are able to determine whether a particular device is vulnerable. Currently, the identification of the device information and its related vulnerabilities is manually carried out. It is necessary to automate the process to identify a huge number of Internet-connected devices in order to analyze more than one hundred thousand security vulnerabilities. In this paper, we propose a method of automatically generating device information in the Common Platform Enumeration (CPE) format from banner text to discover potentially weak devices having the Common Vulnerabilities Exposures (CVE) vulnerability. We demonstrated that our proposed method can distinguish as much adequate CPE information as possible in the service banner.

An Analysis of Security Protocol in Internet (인터넷에서 정보보호 프로토콜 분석)

  • 김상춘;권기현
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.21-32
    • /
    • 2003
  • The development of Internet has created a new world called the Cyber world. However, because of the weakness in the security service, Internet service users still reluctant to use Internet to accomplish high value business transactions. To overcome this situation we must develop various security services so that the Internet service users can use any services freely As the development of Internet, the corresponding technologies are available for the general public and this makes the security services more important than ever before. In this paper, we analyze the security protocols that are supposed to solve the Internet security problems.

  • PDF

Analysis on the Security threat factors of the Internet of Things (사물 인터넷의 보안 위협 요인들에 대한 분석)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.47-53
    • /
    • 2015
  • Recently, the Internet of Things is an important technology with a Cloud computing services and a Big data in the IT fields. and The Internet of Things is widely used in various industries. This trend may be referred to as the emergence of significant based technologies for realizing a ubiquitous times. But the security problems of Internet of things are expected to increase with being realized in a variety of industries. and it will be have to provide a corresponding technology to the security threat for this. Therefore, this paper will be analyzed to the security threats of the Internet of Things by the cases. Thereby this is expected to be utilized as a basis for the countermeasure of Internet of Things in a future.

Security Vulnerability of Internet of Things and Its Solution (사물인터넷 보안 문제제기와 대안)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.

Introduction to IPSEC(Internet Protocol Security) (인터넷 보안 프로토콜 IPSEC)

  • Choi, Y.B.;Hwang, S.O.;Lee, J.S.;Yoon, K.S.;Kim, M.J.
    • Electronics and Telecommunications Trends
    • /
    • v.14 no.6 s.60
    • /
    • pp.51-63
    • /
    • 1999
  • IPSEC (Internet Protocol Security) is a network layer security protocol that is designed to support secure TCP/IP environment over the Internet considering flexibility, scalability, and interoperability. IPSEC primarily supports security among hosts rather than users unlike the other security protocols. Recently, IPSEC is emphasized as one of the important security infrastructures in the NGI (Next Generation Internet). It also has suitable features to implement VPN (Virtual Private Network) efficiently and its application areas are expected to grow rapidly. In this paper, the basic concepts and related standard documents of IPSEC will be introduced.

Structural Dashboard Design for Monitoring Job Performance of Internet Web Security Diagnosis Team: An Empirical Study of an IT Security Service Provider

  • Lee, Jung-Gyu;Jeong, Seung-Ryul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.113-121
    • /
    • 2017
  • Company A's core competency is IT internet security services. The Web diagnosis team analyzes the vulnerability of customer's internet web servers and provides remedy reports. Traditionally, Company A management has utilized a simple table format report for resource planning. But these reports do not notify the timing of human resource commitment. So, upper management asked its team leader to organize a task team and design a visual dashboard for decision making with the help of outside professional. The Task team selected the web security diagnosis practice process as a pilot and designed a dashboard for performance evaluation. A structural design process was implemented during the heuristic working process. Some KPI (key performance indicators) for checking the productivity of internet web security vulnerability reporting are recommended with the calculation logics. This paper will contribute for security service management to plan and address KPI design policy, target process selection, and KPI calculation logics with actual sample data.

The Study on Security Vulnerabilities in IPv6 Autoconfiguration

  • Kim, Myung-Eun;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1545-1549
    • /
    • 2005
  • According as computer is supplied in a lot of homes and offices and Internet use increases, various service based on the Internet. Including wireless PDA in the future, many devices such as Internet telephone, TV, refrigerator and oven will be connected on the Internet and Internet address exhaustion will be raised to serious problem gradually. Today, the IPv4 address exhaustion problem has been solved partially using NAT (Network Address Translation) however, the transition to next Generation Internet will be accelerated because of advantages such as mobility, security service, QoS, and abundant IP addresses. In IPv6, all hosts are designed to create and set their address automatically without manager's intervention using Neighbor Discovery Protocol. But, when an IPv6 host sets its address automatically, there are serious security vulnerabilities. In this paper, we analysis security vulnerabilities in auto-configuration and provide security requirements for secure auto-configuration.

  • PDF

IP camera security: "Security Eyes"

  • Alshamrani, Sultan S
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.75-80
    • /
    • 2022
  • With the rapid growth of Internet of Things (IoT) applications and devices, there are still defects in safety and privacy. Current researches indicate that there are weak security mechanisms to protect these devices. Humans use the Internet of Things to control and connect their devices with the Internet. Using the Internet of things has been increased over time. Therefore, capture of sensitive user data has increased intentionally or not [1]. The IP Camera is a type of (IOT) devices. Therefore, in this paper we aim to create a "Security Eyes" application that protects IP Cameras from security attacks according to certain security mechanisms (increasing the strength of encryption and filling the usual security holes in IP cameras … etc) and alerts the user when the live broadcast is interrupted or an error occurs.