• Title/Summary/Keyword: Multimedia Security

Search Result 732, Processing Time 0.031 seconds

Security Threats in Auto Vaccination Architecture Implemented in Handheld Device

  • Balitanas, Maricel O.;Choi, Min-Kyu;Alisherov, Farkhod;Kim, Seok-Soo;Kim, Tai-Hoon
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.730-733
    • /
    • 2009
  • This study focuses on the security issues of a handheld technology in auto vaccination scenario. Handheld or palm-based computing technology, commonly known as personal digital assistant (PDAs)are having tremendous impact in many personal, educational and business settings, the potential is particularly compelling for healthcare, specifically in the clinical settings. By exploring the development of the technology and its application, as well as the issue of its security would provide a better understanding of this technology.

  • PDF

Design of Security Management System

  • Kim Seok-Soo;Soh Woo-Young
    • International Journal of Contents
    • /
    • v.1 no.2
    • /
    • pp.22-25
    • /
    • 2005
  • Enterprise security management system: Enterprise Security Management (EMS) is centralized integrated management of other kind of security solutions such as intrusion cutoff system, intrusion detection system and virtual private network. With the system, it is possible to establish security policies for entire IT system through interlocking of solutions. A security system of company network is progressing as a ESM(Enterprise Security Management) in existing security solution foundation. The establishment of the security policy is occupying very important area in ESM of the security system. We tried to analyze existing ESM system for this and designed security solution structure for enhancing the inside security. We applied implementing directly IDS system and tested. This test set the focus about inside security

  • PDF

Certificate Revocation Scheme using MOT Protocol over T-DMB Infrastructure

  • Kim, Hyun-Gon;Kim, Min-Soo;Jung, Seok-Won;Seo, Jae-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1583-1590
    • /
    • 2011
  • A Certificate Revocation List(CRL) should be distributed quickly to all the vehicles for vehicular communications to protect them from malicious users and malfunctioning equipment as well as to increase the overall security and safety of vehicular networks. Thus, a major challenge in vehicular networks is how to efficiently distribute CRLs. This paper proposes a Multimedia Object Transfer(MOT) protocol based on CRL distribution scheme over T-DMB infrastructure. To complete the proposed scheme, a handoff method, CRL encoding rules based on the MOT protocol, and relative comparison are presented. The scheme can broaden breadth of network coverage and can get real-time delivery with enhanced transmission reliability. Even if road side units are sparsely deployed or, even not deployed, vehicles can obtain recent CRLs from T-DMB infrastructure effectively.

Importance-Based Security Level Verification in Web Services (웹 서비스에서 중요도 기반 보안수준 검증)

  • Hung, Pham Phuoc;Nasridinov, Aziz;Byun, Jeongyong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1279-1280
    • /
    • 2010
  • There are some cases when SOAP message, where WS-Security and WS-Policy elements are included, may consist of a sensitive and important data. In these cases, the message is highly recommended to be secured. The question exists of how to quickly identify that SOAP message satisfies security requirement and security level of a SOAP message. In this paper, we propose a technique called Bit-Stream which depends on the importance of SOAP elements to automatically identify the vulnerabilities and risks while offering advice for higher security.

A Study on the Information Security Control and Management Process in Mobile Banking Systems

  • Kim, So Young;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.218-232
    • /
    • 2015
  • According to the development of information processing technology and mobile communication technology, the utilization of mobile banking systems is drastically increasing in banking system. In the foreseeable future, it is expected to increase rapidly the demands of mobile banking in bank systems with the prevalence of smart devices and technologies. However, the keeping 'security' is very important in banking systems that handles personal information and financial assets. But it is very difficult to improve the security of banking systems only with the vulnerabilities and faults analysis methods of information security. Hence, in this paper, we accomplish the analysis of security risk factor and security vulnerability that occur in mobile banking system. With analyzed results, we propose the information security control and management processes for assessing and improving security based on the mechanisms which composes mobile banking system.

A Study on Improving the Security Vulnerabilities of Modbus-Based SCADA Control Systems (Modbus 기반 SCADA 제어 시스템의 보안 취약성 향상에 관한 연구)

  • Cagalaban, Giovanni A.;Kim, Seok-Soo;Ha, Kyung-Jae
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.421-424
    • /
    • 2009
  • SCADA control systems and protocols are developed based on reliability, availability, and speed but with no or little attention paid to security. Specifically in Modbus protocol, there are inherent security vulnerabilities in their design. The lack of common security mechanisms in the protocol such as authentication, confidentiality and integrity must be addressed. In this paper, security vulnerabilities of Modbus-based SCADA controls systems will be studied. An in-depth analysis of the message frame formats being sent between master and slave will be discussed to expose the security vulnerabilities. This will enable SCADA users to find ways to fix the security flaws of the protocol and design mitigation strategies to reduce the impact of the possible attacks. Security mechanisms are recommended to further enhance the security of SCADA control systems.

  • PDF

X-Ray Security Checkpoint System Using Storage Media Detection Method Based on Deep Learning for Information Security

  • Lee, Han-Sung;Kim Kang-San;Kim, Won-Chan;Woo, Tea-Kun;Jung, Se-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1433-1447
    • /
    • 2022
  • Recently, as the demand for physical security technology to prevent leakage of technical and business information of companies and public institutions increases, the high tech companies are operating X-ray security checkpoints at building entrances to protect their intellectual property and technology. X-ray security checkpoints are operated to detect cameras and storage media that may store or leak important technologies in the bags of people entering and leaving the building. In this study, we propose an X-ray security checkpoint system that automatically detects a storage medium in an X-ray image using a deep learning based object detection method. The proposed system consists of an edge computing unit and a cloud-computing unit. We employ the RetinaNet for automatic storage media detection in the X-ray security checkpoint images. The proposed approach achieved mAP of 95.92% on private dataset.

Multimedia Technologies As A Basis For The Development Of Modern It Education In Ukraine

  • Seiko, Nataliia;Yershov, Mykola-Oleg;Sakhnenko, Anna;Shevchenko, Marina;Bezsmertnyi, Roman;Kostyrya, Inna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.363-367
    • /
    • 2021
  • This article analyzes the state and development of multimedia technologies in the educational process. The reasons for the emergence of multimedia educational technologies are shown. The definition of the concept of "multimedia education" is given. The advantages and disadvantages of teaching using multimedia technologies are presented. The article, based on multimedia technologies, provides one of the ways to solve the problem of lack of classroom time for the presentation of all educational material in the process of teaching engineering students. The creation and application of educational videos in education is discussed, an example of teaching electrical engineering is given; the requirements for the development of video lessons, their advantages and importance in the educational process are indicated.

Securing RTP Packets Using Per-Packet Key Exchange for Real-Time Multimedia

  • Jung, Younchan;Festijo, Enrique;Atwood, J. William
    • ETRI Journal
    • /
    • v.35 no.4
    • /
    • pp.726-729
    • /
    • 2013
  • For secure multimedia communications, existing encryption techniques use an online session key for the key exchange, for which key size is limited to less than 10 digits to accommodate the latency condition caused by user devices only being able to handle low computational loads. This condition results in poor security of recorded encrypted data. In this letter, we propose a packet key scheme that encrypts real-time packets using a different key per packet for multimedia applications. Therefore, a key of a relatively small size can provide after-transmission confidentiality to data of a real-time session.