• Title/Summary/Keyword: SMB

Search Result 1,838, Processing Time 0.024 seconds

Analysis and Countermeasure of Malicious Code (악성코드 분석 및 대응 방안)

  • Hong, Sunghuyck
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.2
    • /
    • pp.13-18
    • /
    • 2014
  • Due to the development of information systems and the Internet, the Internet and smart phones can access networking in any where and any time. This causes the program to exploit various vulnerabilities and malicious code created to go out information, the disclosure of such crime increasing day by day. The proposed countermeasure model will be able to contribute to block all kinds of malicious code activities.

  • PDF

Security and Hacking on Wireless Networking for Small and Medium Business: Survey (중소기업형 무선 네트워크의 해킹과 보안)

  • Shin, Pan-Seop;Kim, Jeong-Min
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.15-20
    • /
    • 2014
  • Wireless network is convenient as compared to the wire, and it is also easy. Therefore, SMEs in the country is the trend that many SMEs prefer the radio using a lot of radio as an extension of the wired network modification felt the burden of fixed installations. Wireless networks are vulnerable to security together than a wired network, since it passes the packet through the broadcasting. Therefore, analyzing the vulnerability of wireless networks, and proposes countermeasures about wireless network security in small and medium-sized businesses.

  • PDF

The Software Architecture of A Secure and Efficient Group Key Agreement Protocol

  • Lopez-Benitez, Noe
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.21-25
    • /
    • 2014
  • Group communications are becoming popular in Internet applications such as video conferences, on-line chatting programs, games, and gambling. Secure and efficient group communication is needed for message integration, confidentiality, and system usability. However, the conventional group key agreement protocols are too much focused on minimizing the computational overhead by concentrating on generating the common group key efficiently for secure communication. As a result, the common group key is generated efficiently but a failure in authentication allows adversaries to obtain valuable information during the group communication. After achieving the secure group communication, the secure group communication should generate the group key efficiently and distribute it to group members securely, so the balance of security and system usage must be considered at the same time. Therefore, this research proposes the software architecture model of a secure and efficient group communication that will be imbedded into networking applications.

  • PDF

Theoretical study to utility of concept mapping for expected outcome draw of multi-organizations network : Focusing on integrated case management activities of community social welfare organizations (다조직 연대활동의 기대성과 도출을 위한 컨셉트 맵핑 활용에 대한 이론적 논의 : 지역사회 사회복지조직들의 통합사례관리 활동을 중심으로)

  • Kwon, Sun-AE;Jang, Yu-Mi
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.7-11
    • /
    • 2015
  • 본 연구는 여러 사회복지조직들이 연대성을 가지고 지역사회 차원의 사업을 구현해 낼 때 활동의 정체성과 방향을 설정하기 위하여 참여주체들이 기대하고 있는 성과를 어떻게 인식하고 있는지를 알아보기 위해 컨셉트 맵핑 활용에 대한 문헌고찰을 시도한다. 컨셉트 맵핑은 복잡하고 추상적인 아이디어를 개념화하는 의사결정방법이다. 이 방법을 활용하면 참여한 조직들의 개별적인 이해와 목적을 체계화시켜 합의된 성과를 도출해 내는데 유용할 수 있다. 컨셉트 맵핑을 활용한 의사결정과정에서 참여자들의 의견이 소외되지 않고 모두 채택되도록 하는 시스템 운용이 가능하며, 그로 인해 다양한 조직의 참여를 극대화 할 수 있다. 궁극적으로 사회복지조직의 성과에 대한 합의도출이 신속히 이루어지고 이후 활동에 대한 방향성도 명확하게 설정될 수 있는 것이다.

  • PDF

Distributed Attack Analysis and Countermeasure (분산처리 공격에 대한 방어방법 연구)

  • Shin, Miyea
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.19-23
    • /
    • 2015
  • Distributed Denial of Service attack is a form of denial of service attacks, the attacker to attack a place in a number of points of attack by a wide variety of forms over the network to perform a service on a point attack . Do not use a specific server or client attempts to make a connection to many services available that prevents this attack and so normally used . Corresponding methods of DDoS attacks has a corresponding managerial aspects and technical aspects of the proposed two.

  • PDF

Acceleration sensor, and embedded system using location-aware

  • He, Wei;Nayel, Mohamed
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.1
    • /
    • pp.23-30
    • /
    • 2013
  • In this paper, fuzzy entropy and similarity measure to measure the uncertainty and similarity of data as real value were introduced. Design of fuzzy entropy and similarity measure were illustrated and proved. Obtained measures were applied to the calculating process and discussed. Extension of data quantification results such as decision making and fuzzy game theory were also discussed.

  • PDF

A Design of Managerial Accounting Information Characteristics considered the Organizational Culture

  • Kim, Kyung-Ihl
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.7-12
    • /
    • 2014
  • This study empirically investigated cultural differences in the amount of information provided by managerial accounting information systems as well as the differences in organizational performance according to variations in the amount of information. Through cluster analysis, I classified sample firms into five organizational cultural types: Semi-innovative, innovative, bureaucratic, semi-bureaucratic and supportive. The results showed that in the semi-innovative firms, a greater amount of the traditional and advanced types of information is produced, while in bureaucratic firms, traditional information is much more provided than in the innovative, semi-bureaucratic and supportive firms. These results confirmed cultural differences in the amount of information produced. According to the results of this study, it was found that in organizational performance, the rankings of semi-innovative firms, which have the highest scores in the amount of information, are also the highest, and the performance scores in innovative firms are generally next to those of semi-innovative firms. Hence it is concluded that there are cultural differences in the amount of information provided and theses differences affect organizational performance

  • PDF

Efficient and Secure Group Key Generation Protocol for Small and Medium Business

  • Jung, Hyun Soo
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.19-23
    • /
    • 2014
  • Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, the integrity of messages, member authentication, and confidentiality must be provided among group members. To maintain message integrity, all group members use the Group Key (GK) for encrypting and decrypting messages while providing enough security to protect against passive attacks. Tree-based Group Diffie-Hellman (TGDH) is an efficient group key agreement protocol to generate the GK. TGDH assumes all members have an equal computing power. One of the characteristics of distributed computing and grid environments is heterogeneity; the member can be at a workstation, a laptop or even a mobile computer. Member reordering in the TDGH protocol could potentially lead to an improved protocol; such reordering should capture the heterogeneity of the network as well as latency. This research investigates dynamic reordering mechanisms to consider not only the overhead involved but also the scalability of the proposed protocol.

  • PDF

Biometric Certificate on Secure Group Communication

  • Han, Kun-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.25-29
    • /
    • 2014
  • Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distributed network environment. However, it has a well-known weakness, which only proves the belonging of a certificate. PKI cannot assure identity of a person. The conventional knowledge-based and token-based methods do not really provide positive personal identification because they rely on surrogate representations of the person's identity. Therefore, I propose a secure X.509 certificate with biometric information to assure the identity of the person who uses the X.509 certificate in a distributed computing environment.

  • PDF

Customized ERP System: An Alternative Solution for Small and Medium Business Firms

  • Kim, Gyu-C.;Kim, Sang-W.
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.287-298
    • /
    • 2010
  • As business needs are accelerating exponentially due to globalization and other market forces, companies regardless of its size need data which can operate flexibly and rapidly across disappearing physical and organizational borders. To meet the growing Enterprise Resource Planning [ERP] needs for small and medium sized firms, large ERP vendors have introduced new and inexpensive products to these markets. They can customize to businesses of all sizes as long as they have the need for the services and the budget to support the system. Based on the observations in this research, most ERP vendors, regardless of their size, are now focusing more on improving the implementation curve and reporting capabilities through compartmentalizing business applications along industry verticals. Also ERP systems are becoming more open thereby consultants and subject matter experts now have the opportunity to create modules based upon verticals to form a best-of-breed ERP implementation. of enterprises.