• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.032 seconds

A Study on Hard Disk Drive ATA Passwords (하드디스크 드라이브 ATA 패스워드에 관한 연구)

  • Lee, Ju-young;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1059-1065
    • /
    • 2015
  • Hard disk passwords are commonly not well known. If the passwords are set, forensic investigators are not allowed to access data on hard disks, so they can be used to obstruct investigations. Expensive tools such as PC-3000 are necessary for unlocking such hard disk passwords. But it would be a burden on both organizations that should pay for these tools and forensic investigators that are unfamiliar with these tools. This paper discusses knowledge required for unlocking hard disk passwords and proposes methods for unlocking the passwords without high-priced tools. And with a vendor-specific method, this paper provides procedures for acquiring passwords and unlocking hard disk drives.

Privacy Control Using GRBAC In An Extended Role-Based Access Control Model (확장된 역할기반 접근제어 모델에서 GRBAC을 이용한 프라이버시 제어)

  • Park Chong hwa;Kim Ji hong;Kim Dong kyoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3C
    • /
    • pp.167-175
    • /
    • 2005
  • Privacy enforcement has been one of the most important problems in IT area. Privacy protection can be achieved by enforcing privacy policies within an organization's online and offline data processing systems. Traditional security models are more or less inappropriate for enforcing basic privacy requirements, such as purpose binding. This paper proposes a new approach in which a privacy control model is derived from integration of an existing security model. To this, we use an extended role-based access control model for existing security mechanism, in which this model provides context-based access control by combining RBAC and domain-type enforcement. For implementation of privacy control model we use GRBAC(Generalized Role-Based Access Control), which is expressive enough to deal with privacy preference. And small hospital model is considered for application of this model.

An Integrated Management Model of Administrative Role-Based Access Control and Delegation Policy (ARBAC과 위임 정책의 통합 관리 모델)

  • Oh, Se-Jong;Kim, Woo-Sung
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.177-182
    • /
    • 2004
  • Delegation is one of important security policies in the access control area. We propose a management model of delegation integrated with ARBAC model for environment of distributed access control. We Integrate PBDM delegation model with ARBAC97 model, and suggest integrity rules of delegation for preventing security threats in new model. Our model supports both free delegation for users without intervention of administrators, and controlling delegation for security administrators.

A study on the Extension of Information Ethics and Security Area of ISST - Forcused on a Information Teacher - (ISST 정보윤리.보안 영역 확장에 관한 연구 "교육정보담당교사를 중심으로\lrcorner$)

  • 권소화;안성진
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.167-172
    • /
    • 2004
  • In the process of presenting the additional criteria, ISST, developed to evaluate teachers' capacity of applying information, suggests the criteria without considering teacher's own task. Information Ethics and Security Model is made up of two parts. In one part, it deals with four areas concerning with Information Ethics evaluation to measure the sensibility of Information Ethics of Information Teacher In another part, it is divided Information Security Evaluation into three areas which estimate technical method to secure the information system tying in the environment of information-oriented education.

  • PDF

A Method of Internal Information Acquisition of Smartphones (스마트폰 내부 정보 추출 방법)

  • Lee, Yunho;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1057-1067
    • /
    • 2013
  • The market share of smartphones has been increasing more and more at the recent mobile market and smart devices and applications that are based on a variety of operating systems has been released. Given this reality, the importance of smart devices analysis is coming to the fore and the most important thing is to minimize data corruption when extracting data from the device in order to analyze user behavior. In this paper, we compare and analyze the area-specific changes that are the file system of collected image after obtaining root privileges on the Android OS and iOS based devices, and then propose the most efficient method to obtain root privileges.

A Study of Aspheric Mirror Optical Design to Improve Luminous Intensity Uniformity of LED Security Lights (LED 보안등의 광균일도 향상을 위한 비구면 Mirror형 광학 설계에 관한 연구)

  • Jung, In-Ho;Yoon, Cheol-Yong;Ye, In-Soo;Hyun, Dong-Hoon
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.20 no.1
    • /
    • pp.114-119
    • /
    • 2011
  • There is a limit to technology of improving luminous intensity uniformity and glare, known as a weakness of existing LED lamp. Because of Using many LED, LED lamp not only waste energy but have bad effect on efficiency. Our goal is to develop security lights solution which is contented with suitable area in KS(Korean Industrial Standards) and to remove glare by combining asphere in optical system with different concept. To improve luminous intensity uniformity, a reflect mirror system was used after an aspheric optical system design for this study. We made a mirror and measured it after analysing luminance changes depend on aspheric shapes with simulation program to see if aspheric shapes effect luminance distribution. We made progress to find problems and improve them by comparing measured data and analysed data. This result of the study will contribute to industry of LED lighting through developing solution of emotional illumination of LED security lights by knowing the importance of reflectivity with this study and improving luminous intensity uniformity with solving the problem.

Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems

  • Woo, Pil Sung;Kim, Balho H.;Hur, Don
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.888-894
    • /
    • 2015
  • This paper presents a unified model based assessment framework to quantify threats and vulnerabilities associated with control systems, especially in the SCADA (Supervisory Control and Data Acquisition) system. In the past, this system was primarily utilized as an isolated facility on a local basis, and then it started to be integrated with wide-area networks as the communication technology would make rapid progress. The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. However, an up-to-date power system often requires the real-time operations, which clearly implies that the cyber security would turn out to be a complicated but also crucial issue for the power system. In short, the purpose of this paper is to streamline a comprehensive approach to prioritizing cyber security risks which are expressed by the combination of threats, vulnerabilities, and values in the SCADA components.

Security and Privacy Issues of Fog Computing (포그 컴퓨팅 환경에서의 보안 및 프라이버시 이슈에 대한 연구)

  • Nam, Hyun-Jae;Choi, Ho-Yeol;Shin, Hyung-June;Kwon, Hyun-Soo;Jeong, Jong-Min;Hahn, Chang-Hee;Hur, Jun-Beom
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.257-267
    • /
    • 2017
  • With the development of IoT (Internet of Things) technology, the application area has been diversified and the number of users using this service also has increased greatly. Real time big data generated by many IoT devices is no longer suitable for processing in a cloud computing environment. To solve this issue, fog computing is suggested which minimizes response time and makes real time processing suitable. However, security requirement for new paradigm called fog computing is not established until now. In this paper, we define models for fog computing, and the security requirements for the defined model.

Research about the Financial Institution's Preparations for Electronic Financial Accidents under New e-Financial Transaction Act (새로운 전자금융거래법에서의 전자금융사고 대응 방안에 관한 연구)

  • Cho, Soung-In;Park, Tae-Hyoung;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.9-19
    • /
    • 2008
  • By e-Financial Transactions Act enacted in January 2007, the financial institutions are responsible for indemnifying user's damage to ensuring security of the electronic financial transactions and to protecting financial users when suffering from electronic financial accidents. However, when occurring unauthorized financial transactions or electronic financial accidents by user's moral hazard, it is difficult to determine where the accidents happened at and whether caused by the intention or gross negligence of users. To protecting financial parties and ensuring the security and reliability of electronic financial transactions, this paper attempts to propose the means, what enhance the notification process about financial transactions and to strengthen IT regulatory compliance by using area information about electronic financial transactions, to protect risk of the financial accidents.

  • PDF

Factors Influencing on Behavior Intention for Mobile Commerce (모바일 커머스의 이용의도에 영향을 미치는 요인)

  • Chung, Kyung-Soo;Lee, Won-Bin
    • The Journal of Information Systems
    • /
    • v.17 no.3
    • /
    • pp.153-174
    • /
    • 2008
  • Mobile commerce is defined as any direct or indirect transaction conducted and facilitated through a wireless telecommunication network such as payment, ticketing, auction and mobile banking. Despite the importance of mobile commerce, there have not been so many academic studies on the unique characteristics of mobile commerce environments. In this study, our research model is developed based on TAM(Technology Acceptance Model) to investigate the user's technology acceptance process in mobile commerce environment. The factors, such as ubiquity, compatibility, perceived usefulness, perceived ease of use, cost, security, attitude and behavior intention for mobile commerce were selected from pier study in information systems area. The data for empirical analysis of the research model is collected online-questionnaire of 167 mobile commerce users in South Korea. The hypotheses were analyzed using SPSS 15.0 and AMOS 7.0. The results of our study show that: (1) compatibility, perceived usefulness and security had influences on the attitude whereas perceived ease of use and cost did not have any significant impact on the attitude, (2) compatibility influenced perceived usefulness whereas perceived ease of use did not, and finally (3) ubiquity, perceived usefulness and attitude had considerable influences on intention for mobile commerce. Therefore, practitioners should focus on enhancing security, quality of contents and services as well as offering what mobile commerce users want. The results of this study may useful for academicians and practitioners alike.