• Title/Summary/Keyword: Security Considerations

Search Result 162, Processing Time 0.042 seconds

Analysis on a New Intrinsic Vulnerability to Keyboard Security (PS/2 키보드에서의 RESEND 명령을 이용한 패스워드 유출 취약점 분석)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.177-182
    • /
    • 2011
  • This paper introduces a possibility for attackers to acquire the keyboard scan codes through using the RESEND command provided by the keyboard hardware itself, based on the PS/2 interface that is a dominant interface for input devices. Accordingly, a keyboard sniffing program using the introduced vulnerability is implemented to prove the severeness of the vulnerability, which shows that user passwords can be easily exposed. As one of the intrinsic vulnerabilities found on the existing platforms, for which there were little considerations on the security problems when they were designed, it is required to consider a hardware approach to countermeasure the introduced vulnerability.

Study on Development of GIS based Maritime Boundary Delimitation Support System (GIS 기반의 해양경계획정 지원시스템 개발에 관한 연구)

  • Lee, Dong-Chul;Kim, Kye-Hyun;Park, Yong-Gil
    • Journal of Ocean Engineering and Technology
    • /
    • v.26 no.4
    • /
    • pp.23-29
    • /
    • 2012
  • Korea has maritime jurisdiction over an area 4.5 times larger than the nation's inland area, but negotiations with surrounding nations on the maritime boundary delimitation have still not been completed satisfactorily. In particular, maritime boundary delimitation has become an important issue in terms of maritime security and resource exploration. Considering national interests, the delimitation of the maritime boundary is essential. However, no system to help the decision-makers involved in maritime boundary delimitation has yet been systematically constructed. Therefore, the aim of this study was the development of a system to support such decision-making. In this study, considerations related to maritime boundary delimitation were investigated through expert advice and international precedents. Based on these considerations, data were collected from several organizations, and a spatial database was systematically constructed. Finally, MBDSS (maritime boundary delimitation support system) was developed to support maritime boundary delimitation. This GIS-based system provides visual information about the considerations for the maritime boundary delimitation. Thus, it could help decision-makers to choose appropriate boundaries during the negotiation. Furthermore, this system is expected to be utilized as a scientific tool on the delimitation of maritime boundaries.

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

Design and Implementation of Image Communication System Based on Power Line Communication (전력선통신 기반 영상 송수신시스템 설계 및 구현)

  • Chang, Rak-Ju;Lee, Soon-Yi;Kang, Suk-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2010.05a
    • /
    • pp.31-33
    • /
    • 2010
  • The image communication system based on power line communication(PLC) that manages the status of workers in deteriorated. work environments such as high temperature and pressures as realtime is designed and implemented in this paper. The major design considerations for system design are such that the adaptation of simple architecture, simplicity of installation and movement, tolerances about high temperature and pressures, transmission of high quality image under various noise environments.

  • PDF

A Study on the Vulnerability and Security Considerations of Autonomous Vehicles (자율주행자동차의 취약점 및 보안 고려사항에 대한 연구)

  • Kim, YeaJi;Lee, YoungSook
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.164-167
    • /
    • 2017
  • 자율주행자동차는 운전자의 개입 없이 스스로 목적지까지 도착할 수 있는 차량으로 세계 여러나라의 자동차 업체 뿐만 아니라 IT분야에서도 개발중에 있다. 일반 자동차와는 달리 차량에 카메라와 GPS, 각종 센서 등 IT 기술들이 도입되어 운전자와 차량 간에 소통이 이루어지면서 편리함을 가져다 준다. 그러나 자율주행자동차는 하나의 스마트폰이 탑재되었다고 볼 수 있을 만큼 지능적이고 다양한 기술이 적용되어 있기 때문에 취약점과 위협 요소가 존재한다. 본 논문에서는 자율주행자동차의 운행으로 인해 야기될 수 있는 취약점을 분석하고 적용 가능한 보안 고려사항을 제시한다.

  • PDF

Threat Analysis of Mobile Environment (모바일 환경에서의 보안위협 분석)

  • Jeong Youn-Seo;Kim Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.749-753
    • /
    • 2006
  • Since the appearance of the first computer virus in 1986, a significant number of new viruses has appeared every year. Recently, there has been a marked increase in the number of mobile malicious code(virus, worm, trojan) in Mobile devices(smart phone, PDA). As a growing number of people use mobile device, we have to prepare for coming mobile attacks. In this paper, we study trends and characteristics of mobile malicious code. And, we describe considerations of on-device and network security in mobile environment.

  • PDF

Differences in Perception of Information Security Knowledge and Skills Between Academia and Industry (정보보호 전문인력의 소요 지식 및 기술에 대한 산업체와 교육기관의 관점 비교)

  • Yoo, Hye-Won;Kim, Tae-Sung
    • Information Systems Review
    • /
    • v.11 no.2
    • /
    • pp.113-129
    • /
    • 2009
  • With increasing interest in information security, many studies have been conducted on cultivation and management of information security manpower. The widespread application of information security made the activity of information security professionals more diverse. Therefore, it is essential to analyze the knowledge and skills that are necessary for information security professionals to carry out their job and we also need to take these into considerations for the development and operation of education programs. In this study, for analyzing the perception gaps of information security knowledge and skills level between academia and industry, we have derived 58 knowledge and skills by conducting the literature review and Delphi method and we also conducted a survey of information security knowledge and skills requirements for information security professionals who are now working in industries and educational organizations. As a result, we analyze the perception gaps between two groups of information security professionals and suggest some guidelines for establishing the demand-based curriculum for training information security professionals.

A Study on the Cost-Effective Security System for SME Hospital Acceptability in Convergence Medical Environment (의료융합 환경에서 수용성을 고려한 비용 효율적 보안체계구축 방안 연구: 중소의료기관을 중심으로)

  • Kim, Yanghoon;Ahn, Byung-Goo
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.75-81
    • /
    • 2018
  • As industries converge in recent years, the impact of the use of convergence tools among industries on the security of the organization is increasing. However, organizational members lack the ability to adapt to introduction of new system because they are operating business around existing systems, and thus, security considerations are an environment that will inevitably emerge as a follow-up priority. In this study, we studied cost-effective options for factors that should be considered first in order to establish a security system for small and medium-sized healthcare institutions in the healthcare convergence industry. Specifically, the current legal system was considered and the security status was analyzed through prior research, and the necessary security solution/system was derived from small and medium-sized healthcare institutions. In addition, it analyzed relative priorities for cost-efficient deployment of security systems to those involved in small and medium-sized healthcare institutions in actual business environments and presented measures to establish a overall security.

  • PDF

The Security Requirement for Implementation of Secure and Reliable e-Government (안전하고 신뢰성있는 전자정부 구축을 위한 보안 요구사항)

  • 김명은;오승희;정연서;서동일
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.243-249
    • /
    • 2004
  • According as information society has been raised, many countries of the world have taken a lot of interests in e-government implementation. The several guidance countries already have offered people various administrative service and popular enmity service in the Internet conveniently, People can use e-government service more conveniently by the Internet, but important personal information or state secret can be leaked in the Internet. Because of these security vulnerabilities, a lot of countries are constructing security infrastructure that can protect personal information. In this paper, we examine e-government construction trends of the several guidance countries, and propose security considerations to provide safe and reliable e-government service.

  • PDF

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.