• 제목/요약/키워드: Managing Security

검색결과 340건 처리시간 0.029초

리눅스 보안 시스템을 위한 RBAC_Linux 설계 (A Design of RBAC_Linux for Linux Security Systems)

  • 오석균;김성열
    • 한국산업정보학회논문지
    • /
    • 제4권4호
    • /
    • pp.137-142
    • /
    • 1999
  • 본 논문은 리눅스 서버 환경에서 여러 분야의 업무를 운영하려고 할 때에 발생되는 보안 문제를 해결하기 위해서 역할기반 접근제어(Role-Based Access Control : RBAC) 기법을 이용하여, 리눅스 환경에서 운영 가능한 RBAC_Linux 보안 시스템을 설계하였다. 본 논문에서 RBAC_Linux는 RBAC 기법을 리눅스 환경에 적용하여 설계되었으며, 적용한 RBAC 모델로는 Sandhu 등이 제안한 RBAC96모델을 이용한다. 따라서 리눅스 서버 시스템에 설계 제안된 RBAC_Linux 보안 시스템을 이용하면 서버의 소스코드를 수정없이 구현 가능하여, 이식성이 높으며, 보안 관리가 단순하고 용이하다는 장점을 갖는다.

  • PDF

보안 문서의 보안 수준 변환을 위한 기법 연구 (A Study of Security Level Conversion Scheme for Security Documents)

  • 조도은;여상수
    • 한국항행학회논문지
    • /
    • 제15권3호
    • /
    • pp.405-411
    • /
    • 2011
  • 현재의 정보화 사회에서는 정보의 가치는 매우 높아졌으며, 정보를 획득, 관리, 사용하는 것에 대한 많은 연구 개발이 이루어지고 있다. 특정 기업(또는 기관)에서는 기업 내의 정보가 담긴 문서들의 보안 레벨을 엄격하게 규정하고 이에 대한 보안을 철저히 지키고 있다. 본 논문에서는, 상위 보안 레벨의 보안 문서를 하위 보안 레벨로 변환할 경우를 위해, 효과적으로 문서를 검열하고 특정 보안 키워드를 일반적인 단어로 변경하는데 필요한 요소 기술에 대해 소개한다.

Understanding Security Knowledge and National Culture: A Comparative Investigation between Korea and the U.S

  • Kwak, Dong-Heon;Kizzier, Donna Mcalister;Zo, Hang-Jung;Jung, Eui-Sung
    • Asia pacific journal of information systems
    • /
    • 제21권3호
    • /
    • pp.51-69
    • /
    • 2011
  • Security has been considered one of the most critical issues for managing IT resources in many organizations. Despite a growing interest and extensive research on security at various levels, little research has focused on the comparison of security knowledge levels between different cultures. The current study investigates and compares the security knowledge level between Korea and the U.S. Based on the literature review of spyware, Hofstede's cultural dimensions, and security knowledge, this study identifies three constructs (i.e., security familiarity, spyware awareness, and spyware knowledge) to examine the difference of security knowledge levels between Korea and the U.S. Six hundred ninety-six respondents from Korea and the U.S. participated in the survey, and an in-depth analysis based on analysis of covariance (ANCOVA) was carried out. The results show that the levels of security familiarity, spyware awareness, and spyware knowledge are significantly lower in Korea than in the U.S., as expected. These findings present a significant association between national culture and security knowledge, and the degree of individualism (or collectivism) plays an especially critical role in the perception of security. A number of implications for academia and practitioners emerge. Limitations and future research directions are discussed in the conclusion.

Integrated Security Management Framework for Secure Networking

  • Jo, Su-Hyung;Kim, Jeong-Nyeo;Sohn, Sung-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2174-2177
    • /
    • 2003
  • Internet is exposed to network attacks as Internet has a security weakness. Network attacks which are virus, system intrusion, and deny of service, put Internet in the risk of hacking, so the damage of public organization and banking facilities are more increased. So, it is necessary that the security technologies about intrusion detection and controlling attacks minimize the damage of hacking. Router is the network device of managing traffic between Internets or Intranets. The damage of router attack causes the problem of the entire network. The security technology about router is necessary to defend Internet against network attacks. Router has the need of access control and security skills that prevent from illegal attacks. We developed integrated security management framework for secure networking and kernel-level security engine that filters the network packets, detects the network intrusion, and reports the network intrusion. The security engine on the router protects router or gateway from the network attacks and provides secure networking environments. It manages the network with security policy and handles the network attacks dynamically.

  • PDF

Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network

  • Jin, Seung-Hun;Park, Chan-Il;Choi, Dae-Seon;Chung, Kyo-Il;Yoon, Hyun-Soo
    • ETRI Journal
    • /
    • 제27권4호
    • /
    • pp.465-468
    • /
    • 2005
  • This paper presents a new trust evaluation scheme in an ad hoc network. To overcome the limited information about unfamiliar nodes and to reduce the required memory space, we propose a cluster-based trust evaluation scheme, in which neighboring nodes form a cluster and select one node as a cluster head. The head issues a trust value certificate that can be referred to by its non-neighbor nodes. In this way, an evaluation of an unfamiliar node's trust can be done very efficiently and precisely. In this paper, we present a trust evaluation metric using this scheme and some operations for forming and managing a cluster. An analysis of the proposed scheme over some security problems is also presented.

  • PDF

Spring Boot 기반의 오픈소스 소프트웨어 보안 취약점 및 패치 정보 제공 웹 어플리케이션 개발 (Spring Boot-based Web Application Development for providing information on Security Vulnerabilities and Patches for Open Source Software)

  • 심완;최웅철
    • 디지털산업정보학회논문지
    • /
    • 제17권4호
    • /
    • pp.77-83
    • /
    • 2021
  • As Open Source Software(OSS) recently invigorates, many companies actively use the OSSes in their business software. With such OSS invigoration, our web application is developed in order to provide the safety in using the OSSes, and update the information on the new vulnerabilities and the patches at all times by crawling the web pages of the relevant OSS home pages and the managing organizations of the vulnerabilities. By providing the updated information, our application helps the OSS users and developers to be aware of such security issues, and gives them to work in the safer environment from security risks. In addition, our application can be used as a security platform to greatly contribute to preventing potential security incidents not only for companies but also for individual developers.

전자정부 구현을 위한 효율적인 GPKI 구축 방안 (Implementation of Efficient GPKI for E-Government)

  • 장홍종;박인재;이정현
    • 정보보호학회논문지
    • /
    • 제10권4호
    • /
    • pp.113-127
    • /
    • 2000
  • 전자정부 구현에 있어 온라인 상에서 유통되는 각종 행정정보들에 대한 정보보호는 필수적인 선결 조건이다. 미국 등 각국에서는 전자정부의 정보보호 기반 구축을 위하여 가상행정 환경에서 당사자의 신원 확인, 기밀성, 무결성, 부인봉쇄 등을 보장하는 정부타원의 PKI(Public Key Infrastructure)를 구축 운영 중에 있다. 본 논문에서는 미국 등 선진 국의 사례 연구 분석을 통하여 우리나라 실정에 적합한 효율적인 GPKI(Government PKI) 구축방안을 제시하였다.

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

이동경로 기록 및 관리를 위한 Android 앱 개발 (Development of Android App for Recording and Managing Travel Routes)

  • 김서연;김아영;오민정;오샘;김성욱
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 춘계학술발표대회
    • /
    • pp.312-313
    • /
    • 2023
  • 이 프로젝트는 사용자의 위치 기록을 안전하게 기록 및 관리할 수 있는 앱으로, 사용자 기기의 로컬 데이터베이스를 활용하여 위치 정보에 관한 개인정보 보호 측면을 강화한다. 해당 앱은 사용자가 원할 때 기록 기록을 시작하고 종료할 수 있으며, 기기 내에 저장된 사진의 위치정보와 연동하여 이동경로와 기록 시간대에 맞는 사진을 한 눈에 볼 수 있다. 이 프로젝트는 구글 맵의 타임라인과 비슷하지만, 사용자의 위치 정보를 스스로 제어할 수 있는 부분에서 차별성이 존재한다.

A Study on Threat Containment through VDI for Security Management of Partner Companies Operating at Industrial Control System Facility

  • Lee, Sangdo;Huh, Jun-Ho
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2019년도 추계학술발표대회
    • /
    • pp.491-494
    • /
    • 2019
  • The results from the analysis of recent security breach cases of industrial control systems revealed that most of them were caused by the employees of a partner company who had been managing the control system. For this reason, the majority of the current company security management systems have been developed focusing on their performances. Despite such effort, many hacking attempts against a major company, public institution or financial institution are still attempted by the partner company or outsourced employees. Thus, the institutions or organizations that manage Industrial Control Systems (ICSs) associated with major national infrastructures involving traffic, water resources, energy, etc. are putting emphasis on their security management as the role of those partners is increasingly becoming important as outsourcing security task has become a common practice. However, in reality, it is also a fact that this is the point where security is most vulnerable and various security management plans have been continuously studied and proposed. A system that enhances the security level of a partner company with a Virtual Desktop Infrastructure (VDI) has been developed in this study through research on the past performances of partner companies stationed at various types of industrial control infrastructures and its performance outcomes were statistically compiled to propose an appropriate model for the current ICSs by comparing vulnerabilities, measures taken and their results before and after adopting the VDI.