• Title/Summary/Keyword: Internet security

검색결과 3,823건 처리시간 0.038초

Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure

  • Ryoo, Jung-Woo;Park, Eun-A
    • Journal of Computing Science and Engineering
    • /
    • 제5권1호
    • /
    • pp.33-50
    • /
    • 2011
  • In this paper we applied our previously developed assessment framework to the data collected from an internet security readiness survey targeted at households. We used the assessment framework to compute an Internet Security Readiness index for each household, which was in turn derived from Internet Security Readiness capital, skill, and actual uptake/use of infrastructure indices. We then examined the relationships among overall Internet Security Readiness, and the capital, skill, and actual uptake/use of infrastructure related to Internet Security Readiness. In addition, we explored the influence of Internet usage level and experience on Internet Security Readiness.

인터넷 뱅킹 사용자의 보안의도에 영향을 마치는 요인에 관한 연구 (A Study on Factors Influencing User's Security Intention for Internet Banking)

  • 김종기;강다연;전진환
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제18권2호
    • /
    • pp.1-18
    • /
    • 2009
  • Recently, internet banking is growing rapidly. Moot banks in Korea provide internet banking services. Internet banking becomes a major trend in the financial marketplace. With advanced computer technology and declining communication costs, many customers prefer online alternatives such as internet banking, mobile banking or phone banking rather than going to banks by themselves. The number of customers using those alternatives is skyrocketing and domestic commercial banks encourage them of the use. As the internet is highly developed, customers demand higher quality services and banks develop and provide diverse services in order to respond to them. However, internet banking service users are still afraid of their personal and financial information being exposed on the internet. The purpose of this research is to empirically analyze the influence that appropriate internet banking affect user's security intention. The research model proposed in this study includes user's security intention which is influenced by self-efficacy, security trust, Internet banking attitude, perceived security and security intention. According to the result of this study, self-efficacy and security trust are related to the security attitude. There is a significant relationship between security attitude and perceived security. Also, user's security attitude and perceived security is significantly affected by security intention.

Service Identification of Internet-Connected Devices Based on Common Platform Enumeration

  • Na, Sarang;Kim, Taeeun;Kim, Hwankuk
    • Journal of Information Processing Systems
    • /
    • 제14권3호
    • /
    • pp.740-750
    • /
    • 2018
  • There are a great number of Internet-connected devices and their information can be acquired through an Internet-wide scanning tool. By associating device information with publicly known security vulnerabilities, security experts are able to determine whether a particular device is vulnerable. Currently, the identification of the device information and its related vulnerabilities is manually carried out. It is necessary to automate the process to identify a huge number of Internet-connected devices in order to analyze more than one hundred thousand security vulnerabilities. In this paper, we propose a method of automatically generating device information in the Common Platform Enumeration (CPE) format from banner text to discover potentially weak devices having the Common Vulnerabilities Exposures (CVE) vulnerability. We demonstrated that our proposed method can distinguish as much adequate CPE information as possible in the service banner.

인터넷에서 정보보호 프로토콜 분석 (An Analysis of Security Protocol in Internet)

  • 김상춘;권기현
    • 융합보안논문지
    • /
    • 제3권2호
    • /
    • pp.21-32
    • /
    • 2003
  • 인터넷이 발전해감에 따라 사이버 세계라고 하는 또 다른 세상이 창출되었다. 그러나 정보보호의 취약성 때문에 인터넷 서비스를 이용하는 사용자들의 안전성이 보장되지 않는다. 이처럼 불법 침입자들로부터 선의의 이용자를 보호하기 위해한 대응책을 숙지해야 할 것이다. 인터넷 기술의 발달에 따라 인터넷을 통하여 일반 사용자들도 이러한 정보들에 손쉽게 접근할 수 있게 됨으로 인해 인터넷에 대한 정보보호 문제는 더욱더 중요한 과제로 부각되고 있다. 이 논문에서는 인터넷 환경에서 정보보호 문제를 해결하기 위해 개발된 정보보호 프로토콜에 대하여 분석하는데 그 목적이 있다.

  • PDF

사물 인터넷의 보안 위협 요인들에 대한 분석 (Analysis on the Security threat factors of the Internet of Things)

  • 전정훈
    • 융합보안논문지
    • /
    • 제15권7호
    • /
    • pp.47-53
    • /
    • 2015
  • 최근 사물 인터넷(internet of things) 기술은 클라우드 컴퓨팅 서비스(cloud computing service) 및 빅 데이터(big data)와 함께 IT분야에 이슈가 되고 있는 기술 중에 하나로, 다양한 산업분야에서 응용 및 활성화되고 있다. 이러한 동향은 유비쿼터스(ubiquitous) 시대를 실현하는데 중요한 기반 기술의 등장이라 할 수 있다. 그러나 사물 인터넷은 다양한 산업분야에서 실현되고 있는 만큼 보안 문제 또한 다양할 것으로 예상되고 있는 가운데 이에 대한 보안 위협(security threats)들에 대한 대응 방안이 강구되어야 할 것이다. 따라서 본 논문은 사물 인터넷 기술의 적용분야에 대한 사례와 이에 따른 보안 위협들을 분석해 봄으로써, 향후, 사물 인터넷의 보안 대응 방안 마련에 활용될 것으로 기대한다.

사물인터넷 보안 문제제기와 대안 (Security Vulnerability of Internet of Things and Its Solution)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제11권1호
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.

인터넷 보안 프로토콜 IPSEC (Introduction to IPSEC(Internet Protocol Security))

  • 최영배;황성운;이준석;윤기송;김명준
    • 전자통신동향분석
    • /
    • 제14권6호통권60호
    • /
    • pp.51-63
    • /
    • 1999
  • IPSEC (Internet Protocol Security) is a network layer security protocol that is designed to support secure TCP/IP environment over the Internet considering flexibility, scalability, and interoperability. IPSEC primarily supports security among hosts rather than users unlike the other security protocols. Recently, IPSEC is emphasized as one of the important security infrastructures in the NGI (Next Generation Internet). It also has suitable features to implement VPN (Virtual Private Network) efficiently and its application areas are expected to grow rapidly. In this paper, the basic concepts and related standard documents of IPSEC will be introduced.

Structural Dashboard Design for Monitoring Job Performance of Internet Web Security Diagnosis Team: An Empirical Study of an IT Security Service Provider

  • Lee, Jung-Gyu;Jeong, Seung-Ryul
    • 인터넷정보학회논문지
    • /
    • 제18권5호
    • /
    • pp.113-121
    • /
    • 2017
  • Company A's core competency is IT internet security services. The Web diagnosis team analyzes the vulnerability of customer's internet web servers and provides remedy reports. Traditionally, Company A management has utilized a simple table format report for resource planning. But these reports do not notify the timing of human resource commitment. So, upper management asked its team leader to organize a task team and design a visual dashboard for decision making with the help of outside professional. The Task team selected the web security diagnosis practice process as a pilot and designed a dashboard for performance evaluation. A structural design process was implemented during the heuristic working process. Some KPI (key performance indicators) for checking the productivity of internet web security vulnerability reporting are recommended with the calculation logics. This paper will contribute for security service management to plan and address KPI design policy, target process selection, and KPI calculation logics with actual sample data.

The Study on Security Vulnerabilities in IPv6 Autoconfiguration

  • Kim, Myung-Eun;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1545-1549
    • /
    • 2005
  • According as computer is supplied in a lot of homes and offices and Internet use increases, various service based on the Internet. Including wireless PDA in the future, many devices such as Internet telephone, TV, refrigerator and oven will be connected on the Internet and Internet address exhaustion will be raised to serious problem gradually. Today, the IPv4 address exhaustion problem has been solved partially using NAT (Network Address Translation) however, the transition to next Generation Internet will be accelerated because of advantages such as mobility, security service, QoS, and abundant IP addresses. In IPv6, all hosts are designed to create and set their address automatically without manager's intervention using Neighbor Discovery Protocol. But, when an IPv6 host sets its address automatically, there are serious security vulnerabilities. In this paper, we analysis security vulnerabilities in auto-configuration and provide security requirements for secure auto-configuration.

  • PDF

IP camera security: "Security Eyes"

  • Alshamrani, Sultan S
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.75-80
    • /
    • 2022
  • With the rapid growth of Internet of Things (IoT) applications and devices, there are still defects in safety and privacy. Current researches indicate that there are weak security mechanisms to protect these devices. Humans use the Internet of Things to control and connect their devices with the Internet. Using the Internet of things has been increased over time. Therefore, capture of sensitive user data has increased intentionally or not [1]. The IP Camera is a type of (IOT) devices. Therefore, in this paper we aim to create a "Security Eyes" application that protects IP Cameras from security attacks according to certain security mechanisms (increasing the strength of encryption and filling the usual security holes in IP cameras … etc) and alerts the user when the live broadcast is interrupted or an error occurs.