• Title/Summary/Keyword: Public Security

Search Result 2,562, Processing Time 0.029 seconds

Cloud computing Issues and Security measure (클라우드 컴퓨팅 보안 대책 연구)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.31-35
    • /
    • 2015
  • Cloud computing is internet-based computing technology. This is a form for exchanging service focused on the Internet. Because Cost is saved and use is easy there's a tendency that many companies are using. Cloud is in the form of a public cloud and private cloud and hybrid cloud. The service model is SaaS, PaaS, IaaS. Cloud computing use is simple but it has a security vulnerability. In particular, there is a vulnerability in virtualization and centralized information. In order to overcome this new security technology is to be developed. In particular, network security technology and authentication technology should be developed. Another way to overcome security responsibilities must be clearly and policies should be unified.

  • PDF

A Study on Public Key Cryptosystem for Computer Communication Networks (컴퓨터 통신 NETWORK를 위한 공개키 암호 시스템에 관한 연구)

  • 구기준;이영노;심수보
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.3
    • /
    • pp.206-212
    • /
    • 1992
  • In this paper, a public key cryptosystem for security in computer communication networks is proposed. This is based on the security to a difficulty of factorization. For the proposed public key polynomials and the random intergers, then the ciphertext is computed. The security of proposed public key knapsack cryptosystem is verified with digital simulation.

  • PDF

An Study on Radiation Application and Public Safety (방사선이용과 공공안전)

  • 류재수;양맹호
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2003.11a
    • /
    • pp.369-386
    • /
    • 2003
  • Radiation technologies are being utilized in a wide range of daily modern life and provide the public with valuable benefits through applications in fields of medical, industrial, agricultural, and science & engineering research. On the other hand, there is a high possibility that radioactive materials can be used for malevolent purposes such as dirty bombs. The International community, therefore, has made efforts to improve the security of radioactive sources aimed at protecting the public from radiological terrorism. The paper investigated high-risk radioactive sources which could be used as dirty bombs. The paper reviewed the possibility of radiological weapon attacks and analyzed international trends to enhance security of radioactive sources. This study also proposed our countermeasures to reduce the threat of radiological terrorism and to properly respond to the radiological emergency caused by the radiological weapon attack.

  • PDF

A new discrete logarithm problem with public parameter key-size reduction (공개 파라메터 키 크기를 줄인 새로운 이산대수문제)

  • 박영호;오상호;주학수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.91-98
    • /
    • 2003
  • We introduce a new public key system based on the discrete logarithm Problem(DLP) in a quotient group of finite fields. This system achieves savings not only in communication overhead by reducing public key size and transfer data by half but also in computational costs by performing efficient exponentiation. In particular, this system takes about 50% speed-up, compared to DSA which has the same security.

A Study on the Direction of Private Investigation System - Focus on the bill proposal in 2012·2013 (민간조사제도의 도입 방향에 관한 연구 - 제19대 국회 발의 법안을 중심으로(2012년·2013년))

  • Cho, Min-Sang;Oh, Youn-Sung
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.525-559
    • /
    • 2013
  • Modern society has been exposed to various dangers and crimes in the process of globalization, informationization, decentralization etc. along with the development of material civilization under rapid changing societal environment. These factors are exerting a lot of effects in public security environments, as result there are gradual interest about crime and crime prevention. Realization of responsibility who take charge of social safety, from public security to private security, appears important topic at the moment. The positive point of view which private security industry is responsible to cope with security spheres instead of public security has been emerged from the reason that the public security has limitation to solve security problems for themselves. It is the time to make effort to compromise the public security and the private security industry to forecast social change and prevent dangers in the advance. In Korea, there has been close cooperation between public security and private security for decades. Strongly emerging and interesting sphere is "Private Investigation(Private Detective)" in Korea at present. There has been some proposed legislations of private investigation for decreasing burden of public security and social sympathy about possibility of private investigation system is increasing now. In this study, we focused on the introduction of private investigation system through the analysis of bill proposals for last 14 years, for instance historical aspects, contents, the differences among bill proposals. Among these, a comparison on bill proposals of the 19th National Assembly's during 2012 - 2013 were analysed mainly. We examined the importance point at issue items for introduction of private investigation system. Suggestions for introduction of private investigation system is as follows. The necessity of independent bill for developmental private investigation system is needed and the main body should be a juristic person instead of a individual for the public interest and responsibility. For the good service of private investigation and to prevent the unqualified person become a private investigator, the recruiting system and examination of private investigator should be prepared well and take into consideration anticipated problems. Also the necessity of definite jurisdiction department's appointment to divide responsibility in operation.

  • PDF

Case Study Plan for Information Security SLA Performance System in Public Sector (공공부문 정보보안 SLA 성과체계 사례연구)

  • Jeong, Jae Ho;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.763-777
    • /
    • 2021
  • Information security started as an IT operation process and is now recognized as an important issue of information technology, and each international organization is newly defining the concept. Information security itself is a new combination of IT technologies, a set of technologies and a technology area. As IT outsourcing becomes common in many public sectors, SLAs are introduced to evaluate the level of IT services. In the area of information security, many studies have been conducted on the derivation and selection of SLA performance indicators, but it is difficult to find a way to apply the performance indicators to service level evaluation and performance systems. This thesis conducted a study on the application of a service evaluation system for information security performance indicators based on the public sector and a performance system including compensation regulations. It presents standards and rewards(incentive and penalty) that define expectation and targets of performance indicators that take into account the environment and characteristics of a specific public sector, and defines appropriate SLA costs. It proposes a change plan for the organizational structure for practical SLA application and service level improvement.

An Efficient Public Key Based Security Architecture for Wireless Sensor Networks

  • Haque, Mokammel;Pathan, Al-Sakib Khan;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1098-1099
    • /
    • 2007
  • In this paper, we propose a public key based security architecture for Wireless Sensor Networks (WSNs). The basic architecture comprises of two schemes; a key handshaking scheme based on simple linear operations for fast computation and an identity based cryptosystem which does not require any certificate authority. Our analysis shows that, the combined scheme ensures a good level of security and is very much suitable for the energy constrained trend of wireless sensor network.

  • PDF

A Securely Transferable Ebooks using Public-Key Infrastructure

  • Kim, Myungsun;Kim, Jongseong;Lee, Jungyeon;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.371-374
    • /
    • 2001
  • This paper shows how Ebooks contents can be securely transferred to consumers in wireless environment using public key infrastructure (PKI). In addition, we show the proposed scheme to be secure. The final goal is to show that our scheme satisfies all secure requirements of digital contents in any environments.

  • PDF

The System of Digital Management of the Enterprise's Labor Resources in the Context of Ensuring Personnel Security and Economic Development

  • Dziubenko, Oleg;Halaz, Lina;Bala, Olha;Zozulia, Ihor;Berezovskyi, Ruslan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.89-94
    • /
    • 2022
  • The main purpose of the article is to analyze the system of digital management of labor resources in the context of ensuring personnel security and economic development. In the context of the digital transformation of the economy, much attention is paid to the creation of an innovative personnel management system, as the competition between organizations is intensifying, the victory in which guarantees greater economic benefits. Based on the results of the study, the features and key aspects of the digital management system of the enterprise's labor resources were characterized in the context of ensuring personnel security and economic development. Further research will include consideration of the practical aspects of the digital management system of the enterprise's labor resources.

Network Security Practices through Anonymity

  • Smitha, G R;Suprith C Shekar;Ujwal Mirji
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.155-162
    • /
    • 2024
  • Anonymity online has been an ever so fundamental topic among journalists, experts, cybersecurity professionals, corporate whistleblowers. Highest degree of anonymity online can be obtained by mimicking a normal everyday user of the internet. Without raising any flags of suspicion and perfectly merging with the masses of public users. Online Security is a very diverse topic, with new exploits, malwares, ransomwares, zero-day attacks, breaches occurring every day, staying updated with the latest security measures against them is quite expensive and resource intensive. Network security through anonymity focuses on being unidentifiable by disguising or blending into the public to become invisible to the targeted attacks. By following strict digital discipline, we can avoid all the malicious attacks as a whole. In this paper we have demonstrated a proof of concept and feasibility of securing yourself on a network by being anonymous.