• Title/Summary/Keyword: Private Security Service

Search Result 339, Processing Time 0.026 seconds

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

Implementation of the Electronic Prescription Security System Using by an If Card (IC 카드에 의한 원외 전자처방전 보안을 위한 시스템 구축)

  • Kang, Se-Na;Lee, Ki-Han
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.281-286
    • /
    • 2003
  • Nowadays, a patient's private medical data which is exposed to the outside world has a severe effect on not only the patient's private life but also his/her social activities and environment. So, it is important to securely protect the patient's private medical data from the illegal manipulation. This paper studies the method to store the electronic prescription information in an IC card. For that, an access control for users, such as a doctor, a nurse, a medical institute member, a pharmacy, a pharmacist, or a patient, is proposed to access the data stored in an IC card. The certificate is issued using the Crypto API of a certificate management model supported by Windows 2000. The public/private key is created by the Cryptographic Service Provider program, and the electronic prescription is signed using the digital signature. The proposed system, therefore, can improve the quality of medical services by securing the safety and integrity of the electronic prescription, stored in an IC card.

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

Enhancing Location Privacy through P2P Network and Caching in Anonymizer

  • Liu, Peiqian;Xie, Shangchen;Shen, Zihao;Wang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1653-1670
    • /
    • 2022
  • The fear that location privacy may be compromised greatly hinders the development of location-based service. Accordingly, some schemes based on the distributed architecture in peer-to-peer network for location privacy protection are proposed. Most of them assume that mobile terminals are mutually trusted, but this does not conform to realistic scenes, and they cannot make requirements for the level of location privacy protection. Therefore, this paper proposes a scheme for location attribute-based security authentication and private sharing data group, so that they trust each other in peer-to-peer network and the trusted but curious mobile terminal cannot access the initiator's query request. A new identifier is designed to allow mobile terminals to customize the protection strength. In addition, the caching mechanism is introduced considering the cache capacity, and a cache replacement policy based on deep reinforcement learning is proposed to reduce communications with location-based service server for achieving location privacy protection. Experiments show the effectiveness and efficiency of the proposed scheme.

A Study on the Safety Management Standards and Safety Indicators Private Lodging in Farming and Fishing Villages in Rural Area (농어촌민박의 안전관리 기준 및 안전지표에 관한 연구)

  • Suh, hey-sung;Lee, Yong-soo;Kim, Youna-ah
    • Journal of the Korea Institute of Construction Safety
    • /
    • v.3 no.1
    • /
    • pp.1-8
    • /
    • 2020
  • Various support is provided for the increase in the number of private lodging users in farming and fishing villages and related government policies. However, the bed-and-breakfast accommodation in rural areas lack safety standards or safety indicators for the service pension Gangneung, carbon monoxide leak accident in December 2018, 2020 East Sea in January, Pension. Large gas explosion, accident and is threatening the security of their citizens. Unlike lodging facilities, private lodging in farming and fishing villages is allowed to operate with certain requirements such as fire extinguishers and fire alarms. The purpose of this study is to present safety standards and safety indicators for lodging facilities in farming and fishing villages, which are necessary for the operation management and inspection of local governments and the government related to lodging in farming and fishing villages. Through the study, safety management areas of private lodging in farming and fishing villages were divided into facility safety, fire safety, food safety and living safety, and detailed inspection indicators were presented. There is an academic implication that research on safety management of lodging facilities has been expanded through safety research in areas related to private lodging in farming and fishing villages. It has practical implications in that it provides management standards and indicators that can be used for safety management of private lodging in farming and fishing villages. The limitations of this study are that more studies on private lodging in farming and fishing villages are expected to be conducted through the results of this study, and the lack of research on accommodation safety has prevented more detailed indicators from being derived.

A Study on the Civil Resource Utilization of Military Defense (국방 분야의 민간자원 활용에 관한 연구)

  • Park, Kyun Yong;Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.3-10
    • /
    • 2016
  • This study is to actively respond to changes in terms of age, it was to find a possible way to realize the effective application of research to expand the civilian use of resources in the defense sector. Utilization of civil resources were first introduced by the previous government institutions to be applied to the military, our country, the use of private resources began with the 1948 case of a consignment of rubbish. In particular, in the process of overcoming the economic crisis IMF 1990s the government increased its advantage in the public service sector while introducing elements of civil to the public sector. Meanwhile, the Pentagon was promoting policies that foster and promote the civil sector in defense of "defense reform law" in terms of the advancement of military operations. The results of the work carried establish schemes for the civil use of resources, which can be protected by legal and institutional supplement, it is determined that you need a dedicated organization for the construction of projects.

A Location based Two-Factor L-OTP Protocol (위치기반 Two-Factor L-OTP 프로토콜)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.327-330
    • /
    • 2011
  • After releasing the smart phone equipping the strong computational capability compared to traditional mobil phone, a field of services, which is available on the personal computers, is expanded to smart phone. The development of technology reduces the limited service utilization on time and space but it has a venerability exposing an information to malicious user. Especially we need to more attention when using the financial services which communicate the user's private information. To solve the security problem, OTP(One Time Pad), which uses a private key for a session, is recommended. OTP techniques in smart phone having focused on traditional environments have been proposed and implemented. However, security over mobile environments is more vulnerable to attack and has restriction on resources than traditional system. For this reason, definition of proper conceptual OTP on smart phone is required. In the paper, we present the L-OTP(Location-OTP) protocol, using T-OTP(Time One Time Pad) technique with location information. Proposal generates the OTP using unique location information which is obtained in smart phone.

A DDoS Attack Detection of private mobile network using Time Series Analysis (시계열 분석을 적용한 사설 모바일 네트워크의 DDoS 공격 탐지)

  • Kim, Dae Hwan;Lee, Soo Jin;Pyo, Sang Ho
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.17-24
    • /
    • 2016
  • Many companies and organizations are building a mobile office environment using the LTE network, the national disaster network and Air Force LTE network are built for public safety and national defense. However the recent threats on information security have been evolving from information leakage to DDoS attacks to neutralize the service. Especially, the type of device such as Smart phones, smart pad, tablet PC, and the numbers are growing exponentially and As performance of mobile device and speed of line develop rapidly, DDoS attacks in the mobile environment is becoming a threat. So far, universal countermeasure to DDoS attacks has been interception the network and server step, Yet problem regarding DDoS attack traffic on mobile network and expenditure of network resources still remains. Therefore, this paper analyzes the traffic type distributed in the private mobile network such as the National Disaster Network, and Air Force LTE network in order to preemptively detect DDoS attacks on terminal step. However, as direct analysis on traffic distributed in the National Disaster Network, and Air Force LTE network is restricted, transmission traffics in Minecraft and uploading video file upload which exhibit similar traffic information are analyzed in time series, thereby verifing its effectiveness through establishment of DDoS attacks standard in mobile network and application that detects and protects DDoS attacks

Voice and Video Call Continuity for Enterprise Users (기업형 사용자들을 위한 음성/영상 서비스 이동성 제공 방안)

  • Jung, Chang-Yong;Kim, Hyeon-Soo;Moon, Jeong-Hyeon;Kim, Hee-Dong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.99-103
    • /
    • 2009
  • Recently, as wired and wireless communication services have rapidly developed and multimodal mobile devices which have various characteristics have widely spread, the need for new convergence services increases. The growing population of VoIP technologies and the high communication expense yield that the market of IP based telephony such as WiFi phone and IP phone is substituted for one of the conventional PSTN telephony. With the help of this trend, the wireline network operators desire to find a market in mobile networks. Therefore, they focus on Fixed Mobile Convergence (FMC) service as one of the key factors to accomplish this goal. FMC services are able to provide the mobility of voice services between circuit switched and packet switched networks. IP Multimedia Subsystem (IMS) based Voice Call Continuity (VCC) is one of the schemes to embody FMC services. As Application Server (AS) which has this VCC function provides seamless handover of services between heterogeneous networks, FMC subscribers can communicate seamlessly with others m WiFi domain and COMA domain using WiFi-COMA dual phone. Most of enterprises have already introduced IP network infrastructure and IP-PBX (Private Branch eXchange) for telephony. However, the problems of high communication cost and work inefficiency due to frequent outside jobs or business trips have remained. In order to solve these problems, demands for enterprise FMC services increase. In this paper, we introduce a new IP-PBX based VCC model that can provide seamless handover of voice services between WiFi and COMA networks for enterprise users and we investigate some interworking and security issues between Soft Switch (SSW) and IMS, or between IMSs. In addition, we introduce a new service that can provide the continuity of voice sessions as well as video sessions using Multimedia Session Continuity (MMSC) technology which has evolved from VCC. This service is expected to be one of the next-generation personalized services based on user's context.

  • PDF

Trend of Technology in Video Surveillance System

  • Song, Jaemin;Park, Arum;Lee, Sae Bom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.57-64
    • /
    • 2020
  • Video surveillance is consists of cameras, transmission devices, storage and playback devices, and is used for crime prevention and disaster monitoring. Recently, it has been spreading to a wide variety of fields, and has developed into an intelligent video surveillance system that can automatically recognize or track characteristic objects of people and things. The purpose of this study was to investigate the cases of video surveillance service applying the latest technology by dividing it into the home, public, and private sectors. also this study tried to investigate and research what advantage it brings from a business perspective. By looking at the cases introduced in this study, it was confirmed that the viedo security service is developing intelligently, such as excellent compatibility with CCTV, multiple video surveillance, CCTV screen motion detection, and alarm through automatic analysis.