• Title/Summary/Keyword: Security Design

Search Result 3,395, Processing Time 0.03 seconds

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.

A Design of Internet-Based Safety Guarantee Global Integrated Logistics Management System Framework (인터넷 기반의 안전보장 글로벌 통합물류관리시스템 프레임워크 설계)

  • Hong, Ho-Seon;Hong, Ki-Sung;Lee, Chulung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.103-111
    • /
    • 2013
  • This paper provide a framework for an IGILMS(internet-based global integrated logistics management system) which can access and mediate cargo transportations among small- and medium-sized domestic/international logistics corporations as regards cargo, registration and search for space, public tender and negotiation, contract, payment and safety-guarantee, transportation through the internet, wireless communication means, or smart phone etc. In addition, we describe a model to provide customized services in the B2B e-market for IGILMS and the structure and the control of its fulfillment process, and provide technical architecture of the IGILMS for an internet-based global logistics management system. To validate an efficiency of the proposed system, we develop a simulation model and analyze the performance of the proposed system.

An Analysis of Online Black Market: Using Data Mining and Social Network Analysis (온라인 해킹 불법 시장 분석: 데이터 마이닝과 소셜 네트워크 분석 활용)

  • Kim, Minsu;Kim, Hee-Woong
    • The Journal of Information Systems
    • /
    • v.29 no.2
    • /
    • pp.221-242
    • /
    • 2020
  • Purpose This study collects data of the recently activated online black market and analyzes it to present a specific method for preparing for a hacking attack. This study aims to make safe from the cyber attacks, including hacking, from the perspective of individuals and businesses by closely analyzing hacking methods and tools in a situation where they are easily shared. Design/methodology/approach To prepare for the hacking attack through the online black market, this study uses the routine activity theory to identify the opportunity factors of the hacking attack. Based on this, text mining and social network techniques are applied to reveal the most dangerous areas of security. It finds out suitable targets in routine activity theory through text mining techniques and motivated offenders through social network analysis. Lastly, the absence of guardians and the parts required by guardians are extracted using both analysis techniques simultaneously. Findings As a result of text mining, there was a large supply of hacking gift cards, and the demand to attack sites such as Amazon and Netflix was very high. In addition, interest in accounts and combos was in high demand and supply. As a result of social network analysis, users who actively share hacking information and tools can be identified. When these two analyzes were synthesized, it was found that specialized managers are required in the areas of proxy, maker and many managers are required for the buyer network, and skilled managers are required for the seller network.

Design of Real-time Disaster Safety management Solution in a Smart Environment (스마트 환경에서의 실시간 재난 안전 관리 솔루션 설계)

  • Seo, Ssang-Hee;Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.31-36
    • /
    • 2020
  • In recent years, increasing the variety of disasters and accidents that accompany large-scale damage. Disasters are accidents with uncertainty and have a direct impact on people's lives, safety and property protection. Therefore, it is necessary to establish and operate safety management systems such as prevention, response, and recovery for various disasters. Therefore, in this paper, a real-time disaster safety management solution in a smart environment was designed to systematically respond to disaster accidents. To this end, 1: 1 or 1: N situation propagation was performed to the situation room, related organizations, and experts through smart devices. Through this, the solution was configured to respond quickly and appropriately through multi-party information sharing and communication. In other words, we designed a solution that applied functions such as real-time and multi-party HD video transmission, mobile-type report management, voice / text situation propagation, location information sharing, recording and history management, and security.

A Scheme of Compensation System for Farmers' Accidents through the Example of Germany (독일의 사례를 통해 본 농업인재해 보장체계 구축 방안)

  • Min, Byeong-Wook;Kim, Hyo-Chel;Lee, Kyung-Suk
    • Journal of Agricultural Extension & Community Development
    • /
    • v.18 no.3
    • /
    • pp.351-384
    • /
    • 2011
  • The purpose of this study is to look at the case of the German compensation system for farmers' accidents and to build a basic scheme in our country's compensation system for farmers' accidents. When you view examples of Germany, the social insurance scheme for farmers accidents in korea should be design as an independent institution from the existing industrial accident insurance, and it comes to relationships with other social insurance system, preferably with complementary personalities. A general rule of the compensation system applies to all farmers in principle but the coverage limits part-time farmers. Financial burden consists of the mix of insurance premium and state aid. The type and level of benefits is similar to the current industrial accident insurance, which give priority to places on economic security for keeping farmworks, such as cost for using temporary farmers, rather than income loss. In terms of financial system, pay-as-you-go system would be better because of immediate payment with the introduction of the compensation system. The compensation system might be managed and administrated by the existing nationwide organization. Of course, for operating of system review and further research on the technical details such as premium issues and funding problems of government support, the exact classification of the target coverage, premiums based on estimated income for the farmers' estimation, the exact statistical data on the accumulation of agricultural disaster is needed.

VERIFICATION OF ELECTROMAGNETIC EFFECTS FROM WIRELESS DEVICES IN OPERATING NUCLEAR POWER PLANTS

  • YE, SONG-HAE;KIM, YOUNG-SIK;LYOU, HO-SUN;KIM, MIN-SUK;LYOU, JOON
    • Nuclear Engineering and Technology
    • /
    • v.47 no.6
    • /
    • pp.729-737
    • /
    • 2015
  • Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

A System Architecture Design for Web-Based Application Systems using Role-Based Access Control (직무기반 접근제어를 사용하는 웹기반 응용 시스템의 시스템 아키텍처 설계)

  • Lee, Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.217-225
    • /
    • 2010
  • Among web-based systems being widely used now, there are so many systems which are still using an user-level access control method. By successfully applying role-based access control(RBAC) to web-based application systems, we can expect to have an effective means with reinforced security for Internet-based systems. In order to apply RBAC to web-based application systems, we should come up with a system architecture for it. I proposed a system architecture which is needed to apply RBAC to web-based application systems. The proposed system architecture is largely composed of system composition and system functioning. For details, firstly, a certificate used by RBAC is specified. Secondly, a system architecture using a user-pull method is proposed and overall system components are mentioned with a role server being centered. Then, I showed how the system architecture can work to carry out RBAC on web-based application systems. Lastly, the analyses on the proposed system architecture are described for the purpose of proving its feasibility.

Case Study of Assisted Living Facility (ALF) as a 'Home' (집'으로서의 노인보호주택 사례연구)

  • 김영주
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2002.11a
    • /
    • pp.137-142
    • /
    • 2002
  • The purpose of this study was to examine the features that make residents feel “at home” in ALFs in Southwest Virginia and to suggest further policy and design guidelines for better Quality of ALFs as a “home.” For this purpose, residents' needs, experiences, and opinions of the physical environment, the social environment, and the organizational environments such as policies and programs of ALFs were identified. As a multi-case study, five ALFs in Southwest Virginia were studied using constant comparative methos of data analysis. In addition to face-to-face interviews with 25 residents and five administrators of five ALFs, observations were conducted with personal journal. Overall, the five sites selected presented homelike features showing the philosophy of assisted living which combines housing and services. Each facility was designed to be a single-family house or multi-family dwelling in outside appearance. As a whole, residents felt isolation and loneliness and they did not have active interaction with other residents because of diverse background among the residents. However, all of them had close relationships with the staff. The staff's attitude and behavior seemed to influence greatly the residents' feeling “at home.” Despite the provision of diverse activities by the facilities, many residents did not participate in the programs. Most of the residents agreed that the rule and regulations were fair. In spite of high satisfaction with the facility, many people did not think of their current dwelling as a real ‘home.’ As the biggest difference between living in their own homes and living in the ALF, people pointed out a lack of independence, freedom, and autonomy. Residents of ALFs may have reordered their priorities in their current life situation so that safety, security, and care were more important to them than feeling “at home.” Among the three factors --physical, social, and organizational-- that affect the residents' perception of ALFs as a “home, ” many emphasized the importance of social factors such as relationships with the staff and residents, and social support from their family or friends.

  • PDF

Design and Implementation of Blockchain for Securing Data of National Education Information System School Life Records (교육행정정보시스템 학교생활기록부 데이터의 안정성 확보를 위한 블록체인 설계 및 구현)

  • Kim, Heekyung;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.27-35
    • /
    • 2020
  • The purpose of this study is to study the technical implementation methods to prevent problems such as the record of important educational activities of the student life record department or the continuous illegal leakage and manipulation. To this end, in this paper, by applying a private blockchain that can be participated only by a given organization or individual, it prevents outsiders from participating in the block network, and creates legitimate authority by creating two types of block data: student information block and access record block in the life record book. We proposed a block mechanism that can be registered, modified, and accessed only by authorized staff members. As a result, we have prepared an alternative to prevent forgery and alteration of the living records by third parties and to secure the integrity of the living records. If applied to the educational administrative information system, social consensus will be established that the operation and management of the life record book is reliable.

An enhanced signcryption protocol for providing for providing forward secrecy (전방 비밀성을 제공하는 개선된 Signcryption 프로토콜)

  • 이경현;조현호;이준석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.7C
    • /
    • pp.653-663
    • /
    • 2002
  • The signature-then-encryption based on RSA scheme provides forward secrecy, but requires 4 modulo exponentiation operations in total, and the signcryption scheme proposed by Zheng simultaneously fulfills both the functions of digital signature and symmetric key encryption in a logically single step, and with a computational cost significantly smaller than that required by the current standard signature-then-encryption, but it can not provide forward secrecy. In this paper, we propose an enhanced signcryption scheme which can provide forward secrecy with lower computational cost and lower communication overhead comparing with those of the signature-then-encryption based on RSA, and with a similar communication overhead of Zheng's scheme. The proposed scheme can be also easily modified to the direct signature verification scheme by the recipient without using the recipient's private key. Additionally, we suggest a new design protocol with server-supported signatures which solves the CRLs(Certificate Revocation Lists) burden and provides non-repudiation of origin. This protocol with server-supported signatures also can be applied to the original signcryption scheme proposed by Zheng in order to improve security.