• Title/Summary/Keyword: PC Security

Search Result 458, Processing Time 0.021 seconds

A Security Assessment on the Designated PC service

  • Lee, Kyungroul;Yim, Kangbin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.61-66
    • /
    • 2015
  • In this paper, we draw a security assessment by analyzing possible vulnerabilities of the designated PC service which is supposed for strengthening security of current online identification methods that provide various areas such as the online banking and a game and so on. There is a difference between the designated PC service and online identification methods. Online identification methods authenticate an user by the user's private information or the user's knowledge-based information, though the designated PC service authenticates a hardware-based unique information of the user's PC. For this reason, high task significance services employ with online identification methods and the designated PC service for improving security multiply. Nevertheless, the security assessment of the designated PC service has been absent and possible vulnerabilities of the designated PC service are counterfeiter and falsification when the hardware-based unique-information is extracted on the user's PC and sent an authentication server. Therefore, in this paper, we analyze possible vulnerabilities of the designated PC service and draw the security assessment.

An Analysis of Security Threats and Security Requirements on the Designated PC Solution

  • Lee, Kyungroul;Lee, Sun-Young;Yim, Kangbin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.5
    • /
    • pp.29-39
    • /
    • 2017
  • In this paper, we analyse security threats and security requirements about the designated PC solution which restricts usable PCs that are only an user own PCs or a registered PC for online banking or very important services. Accordingly, causable threats of the designated PC solution are classified a process, a network layer, a software module, and an environment of platform, and we draw security requirements based on analysed security threats. Results of this research are considered utilization of criteria for improving security of the designated PC solution and standards for giving hint of imposition of the designated PC solution.

Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information) (PC보안솔루션 로그분석을 통한 보안정책 제안 (개인정보유출 방지))

  • Chae, Hyun Tak;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.961-968
    • /
    • 2014
  • In order to prevent leakage of personal information by insiders a large number of companies install pc security solutions like DRM(Digital Right Management), DLP(Data Loss Prevention), Personal information filtering software steadily. However, despite these investments anomalies personal information occurred. To establish proper security policy before implementing pc security solutions, companies can prevent personal information leakage. Furthermore by analyzing the log from the solutions, companies verify the policies implemented effectively and modify security policies. In this paper, we define the required security solutions installed on PC to prevent disclosure of personal information in a variety of PC security solution, plan to integrate operations of the solutions in the blocking personal information leakage point of view and propose security policies through PC security solution log analysis.

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF

Design and Implementation of Security System on PC-XINU Operating System (PC-XINU 운영체제에서의 보안시스템의 설계 및 구현)

  • 박용규;남길현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1991.11a
    • /
    • pp.215-228
    • /
    • 1991
  • 본 논문에서는 PC의 사용환경이 확대됨에 따른 PC보안의 필요성을 인식하고, PC에서 처리 운용되는 자료들을 보호하고 개인의 프라이버시를 보호할 수 있는 PC 보안시스템을 PC-XINU 운영체제상에서 설계하고 구현한다. 설계 구현하는 보안시스템은 인증, 엑세스 제어 및 정보 흐름 제어, 암호제어를 하도록 하였으며, 군과 같은 비밀체계에 적합하고 개인의 프라이버시를 보호할 수 있도록 하기 위한 정책을 적용하였다. 암호알고리즘은 DES를 이용하였다.

  • PDF

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.

Study on Improvement of Vulnerability Diagnosis Items for PC Security Enhancement (PC보안 강화를 위한 기술적 취약점 진단항목 개선 연구)

  • Cho, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.1-7
    • /
    • 2019
  • There are various cyber attacks on business PCs. In order to reduce the threat of PC security, we are preventing the vulnerability from being diagnosed beforehand. However, this guideline is difficult to cope with because the domestic vulnerability guide does not update the diagnostic items. In this paper, we examine the cyber infringement cases of PCs and the diagnostic items of foreign technical vulnerabilities in order to cope with security threats. In addition, an improved guide is provided by comparing the differences in the diagnostic items of technical vulnerability from abroad and domestic. Through 41 proposed technical vulnerability improvement items, it was found that various security threats can be coped with. Currently, it is mainly able to respond to only known vulnerabilities, but we hope that applying this guideline will reduce unknown security threats.

Design and Implementation about PC File Security System (PC화일보호시스템에 관한 설계 및 구현)

  • 손복만;남길현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1992.11a
    • /
    • pp.211-224
    • /
    • 1992
  • 컴퓨터의 이용이 대중화되면서 PC의 확대보급으로 데이타 보안의 필요성이 강조되고 있어 본 논문에서는 PC보안의 필요성을 인식하고 PC에서의 처리, 운용되는 자료들을 보호하기 위해서 패스워드 인증, 파일 속성 변경, DES암호 알고리즘을 이용한 파일 암호화 제어, 시스템 액세스 사용자 기록 등의 기능을 적용한 PC보안시스템을 설계 및 구현하였다. 특히 키 관리에 있어서는 인증을 위한 사용자_ID와 파일 암호화키를 사용자 패스워드로 재암호화 시켜 IC카드 대신 플로피 디스켓트에 저장 보관시키고 사용자 패스워드는 사용자 자신이 직접 보관하게 하는 혼용방법을 사용하였다.

  • PDF

A Study on Applying Windows PC Security Guidelines (Windows PC 보안 설정 가이드라인 적용 방안 연구)

  • Park, Seong-Ho;Lee, Soo-Yeon;Won, Yoo-Jae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.217-218
    • /
    • 2017
  • 본 논문에서는 Windows PC에 대해 보안을 설정하는 가이드라인을 적용하는 프로그램을 제안한다. 이 프로그램은 Windows PC의 보안 정책들을 USGCB를 기반으로 사용자 PC의 로컬그룹 정책을 점검하고, 자동으로 USGCB에 적합하게 설정을 바꿔 준다. 이 프로그램을 통해 체계적인 보안 점검 환경을 구축하여 보안성을 최적화할 기반을 마련하고 자동화된 관리를 통해 운영과 관리에 소요되는 비용을 절감하며, 보안 설정을 편리하게 관리할 수 있게 한다. 또한 PC보안 설정을 규격화함으로써 PC의 보안성을 일정하게 유지시키고 IT비용과 조달 기간을 단축한다. 본 논문에서는 PC보안 설정의 필요성과 국내외 현황, 프로그램에 사용한 보안 가이드라인(USGCB)에 대한 소개와이 밖에 프로그램에 대한 자세한 내용을 기술한다.

  • PDF

Who Cares More about Security?: Effects of Personality Traits on PC Security Intention (누가 보안에 더 신경을 쓰는가?: 성격특성이 PC보안의도에 미치는 영향)

  • June-Young Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.99-114
    • /
    • 2018
  • Technical measures for computer security are essential, but they are not a sufficient condition for security. Therefore, a personal approach to user's security behavior should be developed. Personality, which is a human aspect, is a behavioral characteristic that characterizes each individual and facilitates prediction of how an individual will behave in certain situations. Protection motivation theory has been used extensively in the security research on human behavior. The present study discusses how protection motivation was formed from personality traits. Thus, organizations can refer the result of this study for their HRD and HRM concerns.