• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.029 seconds

Methodology for Computer Security Incident Response Teams into IoT Strategy

  • Bernal, Alejandro Enciso;Monterrubio, Sergio Mauricio Martinez;Fuente, Javier Parra;Crespo, Ruben Gonzalez;Verdu, Elena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1909-1928
    • /
    • 2021
  • At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, with the surveillance entities of the Government of the Republic of Colombia such as the Joint Command of Cybernetic Operations (CCOCI) and the Cybernetic Emergencies Response Team of Colombia (ColCERT). This research presents the MS-CSIRT (Management System Computer Security Incident Response Teams) methodology, that is used to unify the guidelines of a CSIRT towards a joint communication command in cybersecurity for the surveillance of Information Technology (IT), Technological Operations (TO), Internet Connection Sharing (ICS) or Internet of Things (IoT) infrastructures. This methodology evaluates the level of maturity, by means of a roadmap, to establish a CSIRT as a reference framework for government entities and as a guide for the areas of information security, IT and TO to strengthen the growth of the industry 4.0. This allows the organizations to draw a line of cybersecurity policy with scope, objectives, controls, metrics, procedures and use cases for the correct coordination between ColCERT and CCOCI, as support entities in cybersecurity, and the different companies (ICS, IoT, gas and energy, mining, maritime, agro-industrial, among others) or government agencies that use this methodology.

1.5-factor Authentication Method using Secure Keypads and Biometric Authentication in the Fintech (핀테크 환경에서 보안 키패드와 생체인증을 이용한 1.5-factor 인증 기법)

  • Mun, Hyung-Jin
    • Journal of Industrial Convergence
    • /
    • v.20 no.11
    • /
    • pp.191-196
    • /
    • 2022
  • In the fintech field, financial transactions with smart phones are actively conducted. User authentication technology is essential for safe financial transactions. PIN authentication through the existing security keypads is convenient to input but has weaknesses in security and others. The biometric authentication technique is secure, but there is a possibility of false positive and false negative authentication. To compensate for this, two-factor authentication is used. In this paper, we propose the 1.5-factor authentication that can increase convenience and security through PIN input with biometric authentication. It provides the stability of fingerprint authentication and convenience of two or three PIN inputs, and this makes safe financial transaction possible. Since biometric authentication is performed at the same time when entering PIN, while security is required by applying fingerprint authentication to the area touched while entering PIN. The User authentication is performed while ensuring convenience to input through additional PIN input in situations where high safety is required, and Safe financial transactions are possible.

Study on UxNB Network Deployment Method toward Mobile IAB

  • Keewon Kim;Jonghyun Kim;Kyungmin Park;Tae-Keun Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.105-114
    • /
    • 2023
  • In this paper, we propose a deployment and operation scheme of UxNB network toward mobile IAB. By operating a UxNB network based on SDN(Software Defined Network), UxNBs are deployed in areas where mobile communication services are desired. After deploying UxNB in the service area, IAB can be set up to perform mobile communication services. For this purpose, this paper first proposes a UxNB Network Controller consisting of a UAV Controller and an SDN Controller, and proposes the necessary functions. Next, we present a scenario in which a UxNB network can be deployed and operated in detail step by step. We also discuss the location of the UxNB network controller, how to deliver control commands from the UAV controller to the UxNB, how to apply IAB for UxNB networks, optimization of UxNB networks, RLF(radio link failure) recovery in UxNB networks, and future research on security in UxNB networks. It is expected that the proposed UxNB Network Controller architecture and UxNB network deployment and operation will enable seamless integration of UxNB networks into Mobile IAB.

An Adaptive matrix-based Secure Keypad designed for Rollable and Bendable Display Environments (롤러블 및 벤더블 디스플레이 환경에 적합한 가변행렬 기반 보안 키패드)

  • Dong-Min Choi
    • Journal of Industrial Convergence
    • /
    • v.22 no.2
    • /
    • pp.63-71
    • /
    • 2024
  • Conventional methods like PIN used in conventional smartphone form factor have not considered the variation in display structure or screen size. As a result, when applied to recent variable display-based smartphones, the secret information input unit may get reduced or enlarged, leading to vulnerabilities for social engineering attacks due to deformation of the display area. This study proposes a secure keypad that responds to changes in display size in rollable and bendable smart phones. Firstly, the security problems that may arise when applying classical authentication methods to new form factors were analyzed, and corresponding security requirements were derived. The proposed security keypad addresses the key input error problem that can occur when the screen size is small. The arrangement and size of keys can be deformed with the spacing suitable for input depending on the display size of rollable and bendable smartphones. The study also considered the problem of leaking input information for social engineering attacks by irregularly distributing key input coordinates. The proposed method provides better user experience and security than existing methods and can be used in smartphones of various sizes and shapes.

Attack Datasets for ROS Intrusion Detection Systems (ROS 침입 탐지 시스템을 위한 공격 데이터셋 구축)

  • Hyunghoon Kim;Seungmin Lee;Jaewoong Heo;Hyo Jin Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.681-691
    • /
    • 2024
  • In recent decades, research and development in the field of industrial robotics, such as an unmanned ground vehicle (UGV) and an unmanned aerial vehicle (UAV), has been significant progress. In these advancements, it is important to use middleware, which facilitates communication and data management between different applications, and various industrial communication middleware protocols have been released. The robot operating system (ROS) is the most widely adopted as the main platform for robot system development among the communication middleware protocols. However, the ROS is known to be vulnerable to various cyber attacks, such as eavesdropping on communications and injecting malicious messages, because it was initially designed without security considerations. In response, numerous studies have proposed countermeasures to ROS vulnerabilities. In particular, some work has been proposed on generating ROS datasets for intrusion detection systems (IDS), but there is a lack of research in this area. In this paper, in order to contribute to improving the performance of ROS IDSs, we propose a new type of attack scenario that can occur in the ROS and build ROS attack datasets collected from a real robot system and make it available as an open dataset.

Breeding and Production Research Direction for Soybean Self-Sufficiency Improvement in Korea

  • Jee-Yeon Ko;Beom-Kyu Kang;Jeong-Hyun Seo;Jun-Hoi Kim;Su-Vin Heo;Man-Soo Choi;Jae-Bok Hwang ;Choon-Song Kim;Myeong-Gyu Oh
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.23-23
    • /
    • 2022
  • Recently, soybean production and market price are unstable, even if demand of soybean is maintained. Diverse conditions such as climate change, a decrease in rural population, and consuming affect food industry. In this situation, food security is soaring as important key-word again, and MAFRA is promoting policies for improving soybean self-sufficiency with the goal of 40% until 2030. The point of policy is to extend a production and stabilize a demand for soybean with supporting large-scale soybean paddy-field complex. According to the background, soybean breeding and production research in NICS are proceeded with three parts. First, production improvement with soybean cultivation land enlargement and high-yield cultivar development. Various growth period soybean cultivars for double cropping, irrigation management technologies in paddy field, and hyper-yield and specific-region adaptable cultivar development. Second, reduction of production expense with mechanized cultivation and digital-based field management technologies. Third, consumer-friendly and high quality soybeans with high protein cultivar for alternative protein usage and high food process-ability for soy milk, tofu, soybean sprouts, and grain usage. Each part need to be combined and advanced to improve soybean industry and soybean self-sufficiency.

  • PDF

Study on Legal Position of Aviation Security Subject in Aviation Safety and Security (공항보안요원의 법적 지위에 관한 연구)

  • Hwang, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.21 no.2
    • /
    • pp.157-179
    • /
    • 2006
  • According to the Annex 17 to the Convention on International Civil Aviation, an appropriate authority of each contracting state has to define and allocate tasks and coordinate activities between the departments, agencies and other organizations of the State, airport and aircraft operators and other entities concerned with or responsible for the implementation of various aspects of the national civil aviation security programme. The airport has to take leading role in implementing security tasks at airport area because the airport operator is the provider of airport facilities and services to its customer and the security activities belong to its services. So Republic of Korea Government enact the Law, Aviation Safety and Security. The Purpose of this Act is to prevent any unlawful act in airport facilities with international conventions, including the ICAO to provide for standards, procedures and mandatory matters needed to ensure the safety and security of civil aviation. But the Act has some error. So is this paper to review the revision of aviation security regulation and the changes of aviation security responsibilities and task assignment. There is the term "aviation security personnel", who are charged with the task of preventing any act of disrupting the order and safety in airport. But there is no term "security screening personnel" who performs to detect or search for dangerous object, such as weapons or explosives, which may be used for the unlawful obstruction.

  • PDF

The Korean Nationalist Characteristics of the Korean Blockbuster Films: Focusing on and (한국형 블록버스터 영화의 한국 민족주의적 특성: <공동경비구역 JSA>와 <한반도>를 중심으로)

  • Ryu, Jae-Hyung
    • Korean journal of communication and information
    • /
    • v.59
    • /
    • pp.116-137
    • /
    • 2012
  • What is 'nation' and 'nationalism?' What does 'korean nationalism' mean? And how is korean nationalism represented through a chain of films called 'the korean blockbuster films?' The purpose of this study is to answer to these questions. The characteristics of the korean blockbuster films have been studied for quite a long time and the researchers have agreed with the context about nationalism in a large sense. However, majority of the studies ends up in the journalistic or impressionistic criticism without any theoretical discussion. Few theoretical criticisms also have founded on the formation process of nation of the Western Europe and their nationalism. Hence I would like to add the discourse of korean nationalism and to seize more accurately the social/cultural/historical peculiarity of the korean blockbuster films. In addition, as non-nationalist narratives have recently emerged, korean blockbuster films are entering to the evolution process. On this, the significance of this study seems to exist in providing a cornerstone to the expected evolution theory of the korean blockbuster films by means of complementation and reestablishment of nationalism of their first generation. and , presenting socio-historical peculiarity of the Korean nation, are examined by the close textual analysis.

  • PDF

Effects of Local Governments Social Security Network on Safety life satisfaction - Mediating effect of regional disorder - (CPTED와 지자체 안전교육이 지역 무질서 및 안전생활 만족도에 미치는 영향: 지역 무질서의 매개효과)

  • Kang, hyeon;Kim, hyun-ho
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.77-99
    • /
    • 2018
  • This study is designed to examine the relationship between the social safety net and the 'satisfaction level of safety life' conducted by local governments and to examine the effects of anarchy on the indicators. To do this, 300 people were sampled using the random sample method in the metropolitan area using the population of residents in the metropolitan area in 2017, and a total of 276 copies were extracted except 24 copies in the final analysis. Regression analysis and path analysis were conducted through structural equation modeling. Bootstrapping was performed to investigate the significance of the mediator effect. In summary, 'CPTED' has a positive effect on 'disorder' and 'safety life satisfaction', but 'municipal safety education' has a positive effect on 'safety life satisfaction' Respectively. 'Local disorder' has a negative effect on 'safety life satisfaction'. As a result of path analysis, the same effect was found. In order to examine mediating effect, bootstrapping showed that regional disorder was mediated only in 'CPTED' and 'safety life'. This result suggests that there is a need for change in the safety education of the community and it supports the precedent study that it is an effective means of safety net for the safety life of the CPTED community in the community. It is one of the nation's most important policies to prepare measures for the safety of the people. The local governments should also ensure the safety of local residents. In this study, the relationship between the local safety net and the disorder and safety life satisfaction was investigated.

Checksum Signals Identification in CAN Messages (CAN 통신 메시지 내의 Checksum Signal 식별 방법 연구)

  • Gyeongyeon Lee;Hyunghoon Kim;Dong Hoon Lee;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.747-761
    • /
    • 2024
  • Recently, modern vehicles have been controlled by Electronic Control Units (ECUs), by which the safety and convenience of drivers are highly improved. It is known that a luxury vehicle has more than 100 ECUs to electronically control its function. However, the modern vehicles are getting targeted by cyber attacks because of this computer-based automotive system. To address the cyber attacks, automotive manufacturers have been developing some methods for securing their vehicles, such as automotive Intrusion Detection System (IDS). This development is only allowed to the automotive manufacturers because they have databases for their in-vehicle network (i.e., DBC Format File) which are highly confidential. This confidentiality poses a significant challenge to external researchers who attempt to conduct automotive security researches. To handle this restricted information, in this paper, we propose a method to partially understand the DBC Format File by analyzing in-vehicle network traffics. Our method is designed to analyze Controller Area Network (CAN) traffics so that checksum signals are identified in CAN Frame Data Field. Also, our method creates a Lookup Set by which a checksum signal is correctly estimated for a given message. We validate our method with the publicly accessible dataset as well as one from a real vehicle.