• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.035 seconds

An Internal Surveillance and Control System for Information Security and Information System Asset Management (정보보안 및 정보시스템자산 관리를 위한 내부 감시.통제시스템)

  • Yoon, Han-Seong
    • Information Systems Review
    • /
    • v.9 no.1
    • /
    • pp.121-137
    • /
    • 2007
  • Several security systems(firewall, intrusion detection system, vaccine for malicious codes and so on), whose purposes are to prevent the external information security threat, have gathered more technological concerns. However, they are little effective for the area of defending the internal information security threat which occurs more frequently and results in much more monetary damages. In this paper, a system for internal surveillance and control on the use of information systems is suggested and described with its architecture, features, necessary functions and development methods. And a case system is introduced to show the reality of this paper.

The survey on Intelligent Security System in the age of Big Data (빅데이터 시대의 지능형 보안시스템에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong-hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.776-779
    • /
    • 2012
  • Recently one of the hot topics of IT field is big data. The security's meaning changed a lot, so security tools which were used to protect the limit area traditionally, now don't have any effectiveness. In the age of Cloud Computing, big data will do the best work. This paper discusses the technology related to big data and the intelligent security system utilizing big data.

  • PDF

A Storage Method to Enhance Cookie File Security (쿠키파일의 보안성 향상을 위한 저장 방식)

  • Sim, Won-Tae;Choi, Yo-Han;Seo, Hee-Suk;Noh, Bong-Nam
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.1
    • /
    • pp.29-37
    • /
    • 2011
  • Cookie file can be properly protected by designing security zone to enhance the safety of cookie file vulnerable to cyber attacks. In this paper, the model, in which cookie file is stored in the security area and the current visiting page is closely linked with cookie, is proposed to help users utilize in the same existing way, as well as enhance the security of user cookie files. Even if attacker tries to compromise web browser's cookie folder, the security of other cookies can be preserved. It is possible since the folder has the only cookie for the current web page where user is visiting.

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

A Study on the Video Privacy Protective Mechanism (영상 프라이버시 보호 메커니즘에 관한 연구)

  • Kim, Minsu;Kim, Jongmin;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.49-55
    • /
    • 2017
  • In case of security of IoT-based areas in ICBM industry, the anxiety about safety goes to extremes in public and national safety area, so that the demand for security service related to disaster/safety management is increasing. Like this, as a security service for safety, CCTVs are installed/operated for the purpose of maintenance of public order and crime prevention. Especially, as the recorded images are presented as crucial evidences of crimes, they are rapidly increasing. However, as adverse effects of CCTVs, it is highly possible to unintentionally leak personal information in the process of performing the original purpose, or to violate someone's privacy in case when such technologies are abused. Therefore, it would be necessary to have researches on the multilaterally-combined mechanism for the protection of image privacy.

A Study on Interdependence of Private Security and Techniques of CPTED (민간경비와 환경설계를 통한 범죄예방(CPTED) 기법의 상호의존성에 관한 연구)

  • Lee, Jung-Duk;Lim, You-Seok
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.223-249
    • /
    • 2011
  • In modern society, citizens' quality of life aspects of safety and crime prevention activities are actively considering the incidence of crime prevention in advance. It also can be quite important elicit the interest of who community members through effective crime prevention strategies. For crime prevention policies and techniques over time as more scientific and advanced methods are made. Today, A typical crime prevention strategies is private security zones and Crime Prevention Through Environmental Design (CPTED) is a corresponding to the new strategy. CPTED is a diversification can be called a crime prevention approach that emphasizes the principle of natural surveillance, access control, territoriality, activity support, maintenance and management. The defensible space of the space area related to crime prevention setting the activities of private security and CPTED determine. Also, the reality of crime prevention and protection should be considered space. The emphasis on proactive prevention of crime in modern society for the prevention of crime how to approach differing perspectives and disparate aspects of private security and CPTED. Technical and professional areas that overlap to some extent in a homogeneous aspect. Ultimately, CPTED is a crime prevention through space and environmental approach for crime. In addition, Ultimate goal of convergence, crime prevention, with the same or higher is required to study for the area after looking for the characteristics and limitations of private security and CPTED.

  • PDF

Analysis of Debris Flow Affected Area Using Hyper KANAKO Model (Hyper KANAKO 모형을 이용한 토석류 피해지 분석)

  • Kang, Bae Dong;Jun, Kye Won;Kim, Young Hwan
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.1
    • /
    • pp.51-59
    • /
    • 2021
  • In Korea, where 64% of the soil is mountainous, typhoons and local rains concentrated in the summer season are frequent in mountainous disasters such as landslides and debris flow. The area of study was the area where the damage to the debris flow was caused by typhoon Mitag in October 2019, and all the houses located in the downstream area were damaged. In this study, numerical simulations were conducted on the area where the damage of earth and stone flow occurred using Hyper KANAKO model that can consider erosion and sedimentation, and the applicability of the model was examined by comparing the actual damage area and the analysis results of the model. As a result of the numerical simulation, the damage area of the debris flow in the target area was 53,875 m2, the maximum flow depth was 2.4 m, and the average flow depth was 1.7 m.

Design and Implementation of Internet Throats and Vulnerabilities Auto Collector for Cyber Threats Management (사이버위협 관리를 위한 인터넷 위협 및 취약점 정보 수집기 설계 및 구현)

  • Lee, Eun-Young;Paek, Seung-Hyun;Park, In-Sung;Yun, Joo-Beom;Oh, Hung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.21-28
    • /
    • 2006
  • Beginning flag security it was limited in Firewall but currently many information security solutions like Anti-virus, IDS, Firewall are come to be many. For efficiently managing different kinds of information security products ESM (Enterprise Security management) are developed and operated. Recently over the integrated security management system, TMS (Threat Management System) is rising in new area of interest. It follows in change of like this information security product and also collection information is being turning out diversification. For managing cyber threats, we have to analysis qualitative information (like vulnerabilities and malware codes, security news) as well as the quantity event logs which are from information security products of past. Information Threats and Vulnerability Auto Collector raises the accuracy of cyber threat judgement and can be utilized to respond the cyber threat which does not occur still by gathering qualitative information as well as quantity information.

  • PDF

Analysis of Information Security Technology Development for ICT Convergence Services (ICT 융합서비스 제공을 위한 정보보호 기술개발 현황분석)

  • Kim, Dong-Chul
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.27-33
    • /
    • 2015
  • In this paper, the development level of information security technology for internet of things(Iot), big data and clo ud services is analyzed, and the detail policy is proposed to be leader in area of patents and ICT standard. The conc ept of ICT convergence is defined frist, market and current state of technology for three convergence services is the n analyzed, and finally main function and security target for each technology are presented. The evaluation criteria a nd IPR are analyzed to diagnose the level of patent and standard for the technology. From the results, even though the domestic competence is inferior compared to other advanced country, the efficient policy should be presented by using our capability for the big data and cloud. Furthermore, the technology development for the IoT and cloud is ne eded in advance considering the market-technology influence effects. In addition to, M2M security framework in IoT, data security in big data and reliable networking in cloud should be developed in advance.

A Study on a Plan for Improving an Unmanned Security System According to Security Threat (복합적 보안위협에 따른 기계경비 개선방안 연구)

  • Kong, Byung Seok;Hwang, Hyun Seok;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.71-76
    • /
    • 2014
  • In modern society, a social economic change is brought about, because time space limitation regarded to be restrictive in times past was overcome owing to its rapid development on the basis of IT technology. The creation of new knowledge became the basis of competitiveness of nations and companies. As competition intensifies among nations and countries in relation to the development of core technology, companies make investment with placing much weight on the development of new technology, but on the other hand, technology leakage incident continuously occurs due to a lack of understanding to protect technology. This is the largest cause of impeding the competitiveness of nations and companies. And now, it is urgent to take security measures against this. Therefore, this paper analyzes institution and system weakness in the physical security area in the integrated security environment, and then identifies all problems about this, and proposes a plan for solving these.