• Title/Summary/Keyword: Security Evaluation System

Search Result 679, Processing Time 0.031 seconds

Developing the Test Module of LSAM for $Hipass^{PLUS}$ Card System (하이패스플러스카드 시스템을 위한 LSAM시험 및 모듈 개발)

  • Lee Ki-Han;Yoon Hyun-Tak;Kim Jae-Uoong;Lee Seung-Hwan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.3 no.1 s.4
    • /
    • pp.1-12
    • /
    • 2004
  • Recently, the Korea Highway Company is replacing their prepaid plastic cards with a smart card, called $Hipass^{PLUS}$ Card. In order to use $Hipass^{PLUS}$Card in the prepaid payment system, LSAM, which is to store the value into $Hipass^{PLUS}$ Card is needed. LSAM is also responsible to store or retrieve the value from PPSAM. For the safety of Korea Highway electronic payment system, the functionality and security of LSAM should be faultless. This paper developed a test module including the test method, the test checklist, and the test procedure. The test module examines the functionality and security of loading the value from PPSAM to LSAM, retrieving the value from LSAM to PPSAM, and loading the value from LSAM to $Hipass^{PLUS}$ Card. The test module contains the method and the procedure to test the standard items by the test checklists. The test items and test checklists of LSAM was selected under the provision of the specification of Korea Highway Company and ISO standard. The test module evaluates the functionality, the security and the compatibility of LSAM. After the evaluation test of LSAM using the test module, LSAM satisfied the characteristics of the functionality, security, and compatibility.

  • PDF

A Study on the Modeling Mechanism for Security Risk Analysis in Information Systems (정보시스템에 대한 보안위험분석을 위한 모델링 기법 연구)

  • Kim Injung;Lee Younggyo;Chung Yoonjung;Won Dongho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.989-998
    • /
    • 2005
  • Information systems are today becoming larger and mostly broadband-networked. This exposes them at a higher risk of intrusions and hacking than ever before. Of the technologies developed to meet information system security needs, risk analysis is currently one of the most actively researched areas. Meanwhile, due to the extreme diversity of assets and complexity of network structure, there is a limit to the level of accuracy which can be achieved by an analysis tool in the assessment of risk run by an information system. Also, the results of a risk assessment are most oftennot up-to-date due to the changing nature of security threats. By the time an evaluation and associated set of solutions are ready, the nature and level of vulnerabilities and threats have evolved and increased, making them obsolete. Accordingly, what is needed is a risk analysis tool capable of assessing threats and propagation of damage, at the same time as security solutions are being identified. To do that, the information system must be simplified, and intrusion data must be diagrammed using a modeling technique this paper, we propose a modeling technique information systems to enable security risk analysis, using SPICE and Petri-net, and conduct simulations of risk analysis on a number of case studies.

Multiple Moving Person Tracking Based on the IMPRESARIO Simulator

  • Kim, Hyun-Deok;Jin, Tae-Seok
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.3
    • /
    • pp.331-336
    • /
    • 2008
  • In this paper, we propose a real-time people tracking system with multiple CCD cameras for security inside the building. To achieve this goal, we present a method for 3D walking human tracking based on the IMPRESARIO framework incorporating cascaded classifiers into hypothesis evaluation. The efficiency of adaptive selection of cascaded classifiers has been also presented. The camera is mounted from the ceiling of the laboratory so that the image data of the passing people are fully overlapped. The implemented system recognizes people movement along various directions. To track people even when their images are partially overlapped, the proposed system estimates and tracks a bounding box enclosing each person in the tracking region. The approximated convex hull of each individual in the tracking area is obtained to provide more accurate tracking information. We have shown the improvement of reliability for likelihood calculation by using cascaded classifiers. Experimental results show that the proposed method can smoothly and effectively detect and track walking humans through environments such as dense forests.

3D Walking Human Detection and Tracking based on the IMPRESARIO Framework

  • Jin, Tae-Seok;Hashimoto, Hideki
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.3
    • /
    • pp.163-169
    • /
    • 2008
  • In this paper, we propose a real-time people tracking system with multiple CCD cameras for security inside the building. The camera is mounted from the ceiling of the laboratory so that the image data of the passing people are fully overlapped. The implemented system recognizes people movement along various directions. To track people even when their images are partially overlapped, the proposed system estimates and tracks a bounding box enclosing each person in the tracking region. The approximated convex hull of each individual in the tracking area is obtained to provide more accurate tracking information. To achieve this goal, we propose a method for 3D walking human tracking based on the IMPRESARIO framework incorporating cascaded classifiers into hypothesis evaluation. The efficiency of adaptive selection of cascaded classifiers have been also presented. We have shown the improvement of reliability for likelihood calculation by using cascaded classifiers. Experimental results show that the proposed method can smoothly and effectively detect and track walking humans through environments such as dense forests.

An Efficient and Transparent Blockchain-based Electronic Voting and Survey System (효율성과 투명성을 확보한 블록체인 기반 전자투표 및 설문조사 시스템)

  • Kim, HyeonA;Na, YeonJu;Lee, JaeYun;Jeong, YuRi;Kim, Hyung-Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.4
    • /
    • pp.9-19
    • /
    • 2021
  • Electronic voting has been recognized as an alternative to complement the limitations of existing paper voting. At the same time, security concerns are being raised. This paper presents a blockchain-based electronic voting and survey system that can guarantee reliability. Our smart contract was created using Solidity on Ethereum which is a blockchain-based distributed computing platform, and the system was implemented in connection with the Javascript based user interface. In addition, in order to protect the personal information of participants, the system is generating hash of the personal data and storing the hash of users for the contract data. Since we exploited different kinds of languages for the system, we derived items of functionality testing and presented the functionality testing result. Moreover, we made use of the Chrome's performance evaluation functionality to see the response time of the blockchain-based system. In addition, we compared the performance with the system which has the same functionality on database. The contribution of this research is design and implementation of blockchain-based electronic voting system and presentation of the functionality and performance simulation result.

Developing the Test Module of PSAM for $Hipass^{PLUS}$ Card System (하이패스플러스카드 시스템을 위한 PSAM 시험 모듈 개발)

  • Lee Ki-Han;Suh Hyun Kyo;Yoo Chang Hee;Lee Seung-Hwan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.2 s.3
    • /
    • pp.73-84
    • /
    • 2003
  • Due to the problems of existing prepaid plastic card issued by Korea Highway Company, the prepaid electronic payment system using a smart card, called HipassPLUS Card, was developed to overcome the Problems. PSAM is one of the main component of the systea which can retrieve the value from HipassPLUS card, transmit the transaction data to CSAM, and store the accumulated account lists. For the safety of the elecoonic payment system, the functions of PSAM should be faultless. This paper developed a test module including the test method, the test checklist, and the test procedure. The test module examines the functionality and security of the payment mechanism to insure that the value stored in HipassPLUS card can be raid to PSAM by the merchants and the standardized SAM. The test module also inspects the transmission mechanism to send and store the transaction data kom PShM to CSAM correctly and safely. Ihe module is designed to test the standard items using the test checklists for PSAM. The test items and the test checklists of PShM was selected under the provision of the specification of Korea Highway Company and ISO standard. Ihe evaluation on PSAM using the test module indicates that PSAM satisfies the evaluation criteria on the quality characteristics of the functionality, security, and compatibility.

  • PDF

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

Design and Evaluation of PMU Performance Measurement and GPS Monitoring System for Power Grid Stabilization

  • Yang, Sung-Hoon;Lee, Chang Bok;Lee, Young Kyu;Lee, Jong Koo
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.4 no.2
    • /
    • pp.67-72
    • /
    • 2015
  • Power grid techniques are distributed over general power systems ranging from power stations to power transmission, power distribution, and users. To monitor and control the elements and performance of a power system in real time in the extensive area of power generation, power transmission, wide-area monitoring (WAM) and control techniques are required (Sattinger et al. 2007). Also, to efficiently operate a power grid, integrated techniques of information and communication technology are required for the application of communication network and relevant equipment, computing, and system control software. WAM should make a precise power grid measurement of more than once per cycle by time synchronization using GPS. By collecting the measurement values of a power grid from substations located at faraway regions through remote communication, the current status of the entire power grid system can be examined. However, for GPS that is used in general national industries, unexpected dangerous situations have occurred due to its deterioration and jamming. Currently, the power grid is based on a synchronization system using GPS. Thus, interruption of the time synchronization system of the power system due to the failure or abnormal condition of GPS would have enormous effects on each field such as economy, security, and the lives of the public due to the destruction of the synchronization system of the national power grid. Developed countries have an emergency substitute system in preparation for this abnormal situation of GPS. Therefore, in Korea, a system that is used to prepare for the interruption of GPS reception should also be established on a long-term basis; but prior to this, it is required that an evaluation technique for the time synchronization performance of a GPS receiver using an atomic clock within the power grid. In this study, a monitoring system of time synchronization based on GPS at a power grid was implemented, and the results were presented.

Reliability Optimization of Urban Transit Brake System For Efficient Maintenance (효율적 유지보수를 위한 도시철도 전동차 브레이크의 시스템 신뢰도 최적화)

  • Bae, Chul-Ho;Kim, Hyun-Jun;Lee, Jung-Hwan;Kim, Se-Hoon;Lee, Ho-Yong;Suh, Myung-Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.31 no.1 s.256
    • /
    • pp.26-35
    • /
    • 2007
  • The vehicle of urban transit is a complex system that consists of various electric, electronic, and mechanical equipments, and the maintenance cost of this complex and large-scale system generally occupies sixty percent of the LCC (Life Cycle Cost). For reasonable establishing of maintenance strategies, safety security and cost limitation must be considered at the same time. The concept of system reliability has been introduced and optimized as the key of reasonable maintenance strategies. For optimization, three preceding studies were accomplished; standardizing a maintenance classification, constructing RBD (Reliability Block Diagram) of VVVF (Variable Voltage Variable Frequency) urban transit, and developing a web based reliability evaluation system. Historical maintenance data in terms of reliability index can be derived from the web based reliability evaluation system. In this paper, we propose applying inverse problem analysis method and hybrid neuro-genetic algorithm to system reliability optimization for using historical maintenance data in database of web based system. Feed-forward multi-layer neural networks trained by back propagation are used to find out the relationship between several component reliability (input) and system reliability (output) of structural system. The inverse problem can be formulated by using neural network. One of the neural network training algorithms, the back propagation algorithm, can attain stable and quick convergence during training process. Genetic algorithm is used to find the minimum square error.

A Study on the Software Fault Modes and Effect Analysis for Software Safety Evaluation (소프트웨어 안전성 평가를 위한 소프트웨어 고장 유형과 영향 분석에 관한 연구)

  • Kim, Myong-Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.1
    • /
    • pp.115-130
    • /
    • 2012
  • These days, most of safety-critical systems, which are systems those failures or malfunction may result in death or serious injury to people, or loss or severe damage to social systems, or environmental harm, are being built of embedded software or loaded controlling software systems on computers, electrical and electronic components or devices. There are a lot kind of fault analysis methods to evaluate safety of the safety-critical systems equipped computers, electrical and electronic components or devices with software. However, the only assessment method to evaluate software safety of a safety-critical system is not enough to analysis properly on account of the various types and characteristic of software systems by progress of information technology. Therefore, this paper proposes the integrated evaluation method and carries out a case study for the software safety of safety-critical system which embedded or loaded software sizes are small and control response times are not sensitive by use of two security analysis methods which are Fault Tree Analysis (FTA) and Fault Modes and Effect Analysis (FMEA) for ubiquitous healthcare system.