• Title/Summary/Keyword: Security Knowledge

Search Result 770, Processing Time 0.026 seconds

Privacy-Preserving Credit Scoring Using Zero-Knowledge Proofs (영지식 증명을 활용한 프라이버시 보장 신용평가방법)

  • Park, Chul;Kim, Jonghyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1285-1303
    • /
    • 2019
  • In the current credit scoring system, the credit bureau gathers credit information from financial institutions and calculates a credit score based on it. However, because all sensitive credit information is stored in one central authority, there are possibilities of privacy violations and successful external attacks can breach large amounts of personal information. To handle this problem, we propose privacy-preserving credit scoring in which a user gathers credit information from financial institutions, calculates a credit score and proves that the score is calculated correctly using a zero-knowledge proof and a blockchain. In addition, we propose a zero-knowledge proof scheme that can efficiently prove committed inputs to check whether the inputs of a zero-knowledge proof are actually provided by financial institutions with a blockchain. This scheme provides perfect zero-knowledge unlike Agrawal et al.'s scheme, short CRSs and proofs, and fast proof and verification. We confirmed that the proposed credit scoring can be used in the real world by implementing it and experimenting with a credit score algorithm which is similar to that of the real world.

Personalized Private Information Security Method on Smartphone. (스마트폰 환경에서 개인정보 보안 기법)

  • Jeong, MinKyoung;Choi, Okkyung;Yeh, HongJin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.751-754
    • /
    • 2011
  • 최근 개인이 작성한 글과 사진, 동영상 등의 자료를 시간과 장소에 따라 저장 할 수 있는 라이프 로그 서비스들이 증가하고 있다. 이러한 정보들은 개인의 일상생활을 기록하는 것으로 민감한 프라이버시임에도 불구하고 관리에 취약하다. 스마트폰 환경에서 데이터를 저장하기 위해 SQLite를 이용하고, 이를 암호화하기 위한 방안으로 SEE와 SQLCipher가 있지만 전체 데이터를 암호화하는 방식으로 중요하지 않은 데이터까지 암호화하여 저장한다. 본 논문은 개인 정보 보호를 위한 방안으로 SQLite에서 SEED 암호를 이용하여 주요한 개인 정보를 컬럼 단위로 암호화한다. 즉 라이프로그 데이터를 개인 프라이버시 중요도에 따라 분류하고, 분류된 데이터 중에서 중요한 데이터만 선택적으로 암복호화 함으로써 기존 데이터 암호화 방식에 비해 암복호화에 소모되는 연산 시간을 감소시키고 라이프로그 데이터의 개인 정보 보안을 강화시키고자 한다.

Data Access Control Method for The Efficient Information Security on OLAP (OLAP 상에서 효율적인 정보 보호를 위한 데이터 접근 제어 방법)

  • Min, Byoung-Kuk;Choi, Okkyung;Yeh, Hong-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.1211-1214
    • /
    • 2011
  • OLAP(On-Line Analytical Processing) 툴은 조직 운영에서 발생하는 데이터의 양이 많아짐에 따라 분석 수요도 함께 급증하며 전문 분석가의 역량만으로는 처리할 수 없는 분석 요구 사항을 충족시키기 위한 툴이다. OLAP 에서는 다양한 사용자가 직접 데이터베이스에 접근하여 대화식으로 질의를 던지고 응답을 받아 분석 업무를 진행할 수 있다. 이렇게 많은 사용자들이 데이터베이스에 직접 접근을 하게 됨에 따라 조직의 민감한 데이터를 지키기 위한 보안 정책이 필수가 되었다. 하지만 기존 연구에서는 OLAP 의 기능적인 분석에 치중하여 MDX(Multidimensional Expressions)와 XMLA(XML for Analysis) 등의 기법으로 기능을 구현하는 것에 그치고 있다. 이에 본 연구에서는 OLAP 보안 관련 연구를 분석하고 보안 모듈을 설계하여 효율적인 정보 보호를 위한 데이터 접근 제어 방법을 제시한다.

A Study on the Effect of Group Attachment Security on Individual Creativity: Mediation Effect of Self-Efficacy (안정그룹 애착이 개인 창의성에 미치는 영향: 자아 효능감의 매개효과)

  • Kwon, Jung Eon;Kwon, Sang Jib
    • Knowledge Management Research
    • /
    • v.15 no.2
    • /
    • pp.43-66
    • /
    • 2014
  • This study uses group attachment theory to examine how group attachment security affects individual creativity through self-efficacy. 151 students participated in an experimental study. Participants were randomly assigned to either a group attachment security prime or control condition group. The results reveal that (1) group attachment security was positively related to individual self-efficacy, which in turn positively influenced individual creativity. (2) Individual self-efficacy partially mediated the relationship between group attachment security and individual creativity. Synthesizing theories of group attachment theory, self-efficacy, and creativity, this study tested a theoretical mechanism linking group attachment security with creativity via self-efficacy. The results of this research suggest that many firms should improve the organizational culture of the perspectives of communication and cohesiveness to release creative ideas and strengthen individual self-efficacy more effectively. Implications of these results and future directions for further study are discussed.

  • PDF

Information Security of Organization and Employees in Social Exchange Perspective : Using Structure-Conduct-Outcome Framework (SCO Framework을 적용한 조직과 조직원의 정보보안 준수 관계 연구)

  • Hwang, In-Ho;Kim, Sanghyun
    • The Journal of Information Systems
    • /
    • v.28 no.4
    • /
    • pp.105-129
    • /
    • 2019
  • Purpose Issues related to information security have been a crucial topic of interest to researchers and practitioners in the IT/IS field. This study develops a research model based on a Structure-Conduct-Outcome (SCO) framework for the social exchange relationship between employees and organizations regarding information security. Design/methodology/approach In applying an SCO framework to information security, structure and conduct are activities imposed on employees within an organizational context; outcomes are activities that protect information security from an employee. Data were collected from 438 employees working in manufacturing and service firms currently implementing an information security policy in South Korea. Structural equation modeling (SEM) with AMOS 22.0 is used to test the validation of the measurement model and the proposed casual relationships in the research model. Findings The results demonstrate support for the relationships between predicting variables in organization structure (security policy and physical security system) and the outcome variables in organization conduct (top management support, security education program, and security visibility). Results confirm that the three variables in organization conduct had a positive effect on individual outcome (security knowledge and compliance intention).

A Study on Developing Professional Training of the Private Security Industry (민간경비 산업의 전문인력 양성 방안)

  • Park, Aok-Cheol
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.91-111
    • /
    • 2006
  • Technology development of modern society reduces times, costs and labor costs but demands work forces requiring expert knowledge on technology. Consequently knowledge worker becomes important. Not changing into a specialist acquired expert knowledge, people can't survive in competitive society. Therefore, the purpose of this study is to grasp the actual condition of private security industry and to examine problems. The final goal is to find the way to improve the professionalism of workers in private security industry. First. Now we must make up for the subject for examination actually and be in a triangular position and complement a professional materials for teaching. At the same time it must strengthen the education using advanced instruments seek to Total Security System. Moreover it is demanded 'institutional supplement of security guard instructors' which means job training for security guard instructor Second. On the job training which can deal with a state of emergency through 'security guard training' with a theory and an actual training must be strengthen. Also, most security guards have low understandings and interests because their ages are from 50's to 60's. Accordingly proper education must be offered to security guard. Third. Certification system of the private security guards are needed to fix the problems on an indiscreet issue and an abuse of license through deliberation on the security license. Fourth. Universities must find a new market to minimize the squandering of human resources because of oversupply and reduce the personnel. Also with enhancing the employment rate through specialized education, universities must offer an education which keeps pace with the times for not an entrance strategy but a long-term development. Effort for education of specialist will produce an improvement in business quality and improved services produce a customer satisfaction. A customer satisfaction will produce a fame of a successful company and positive images in market area. Finally the private industry will be developed by productivity improvement.

  • PDF

A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services) (SNS(Social Network Services) 내에서 정보보안 지식공유의도에 미치는 영향 요인)

  • Park, Taehwan;Kim, Suhwan;Jang, Jaeyoung
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.1-22
    • /
    • 2015
  • Due to recent growth in IT industry along with the expansion of smartphone, we came to connect to the Internet wherever and whenever we are. However, this causes negative side effects, though. One of them is a rapid increase of the financial crimes such as the Phishing and the SMishing. There have been many on-going researches about crimes such as Phishing and SMishing to protect users. However, the study about sharing knowledge on SNS to prevent such a crime can be hardly found. Based on social identity theory, we conduct the research about factors on SNS users' intention to share the information security knowledge on SNS. As a result, we found that knowledge provision self-efficacy has a significant impact on self-expression. In addition, it also found out self-expression, awareness about information security and the sense of belonging have a significant impact respectively on the intention to share the information security knowledge on SNS. On the other hand, the altruism didn't have a significant impact to the intention to share information security knowledge on SNS. With this research as a starting point, it seems necessary to expand its range to all types of online community in the future for the generalization of the hypotheses.

Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File (알려지지 않은 실행파일의 악의적인 특징들을 분석하기 위한 행위추적 프로그램)

  • Kim, Dae-Won;Kim, Ik-Kyun;Oh, Jin-Tae;Jang, Jong-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.941-944
    • /
    • 2011
  • 컴퓨팅 환경에서 각종 보안 위협들의 핵심에는 악성 실행파일들이 있다. 전통적인 시그니처 기반의 보안 시스템들은 악의적인 실행파일들 중에서 알려지지 않은 것들에 대해서는 런타임 탐지에 어려움이 있다. 그러한 이유로 런타임 탐지를 위해 시그니처가 필요 없는 정적, 동적 분석 방법들이 다각도로 연구되어 왔으며, 특히 악성 실행파일을 실제 실행한 후 그 동작상태를 모니터링 하는 행위기반 동적 분석방법들이 많은 발전을 이루어왔다. 그러나 대부분의 행위기반 분석방법들은 단순히 몇 가지 행위나 비순차적인 분석정보를 제공하기 때문에, 차후 악성여부를 최종 판단하는 방법론에 적용하기에는 그 분석정보가 충분하지 않다. 본 논문에서는 악성 실행파일이 실행되는 동안 발생할 수 있는 행위들을 분류하고, 이를 모니터링 하는 프로토타입 프로그램을 구현하였다. 또한, 악성 실행파일을 직접 실행하는 것은 제한된 컴퓨팅 환경에서 이루어지기 때문에, 실제 악성 실행파일을 모니터링 한 결과를 토대로 행위기반 모니터링 방법이 극복해야 될 이슈들에 대해서도 언급하고 있다.

Effective Rogue Access Point Detection Method in Wireless LAN (무선랜 환경에서 효과적인 Rogue AP 탐지 기법)

  • Kang, Daehyun;Kim, Kangseok;Choi, Okkyung;Kim, Kihyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.733-734
    • /
    • 2011
  • 지난 몇 년 동안 무선랜(Wireless LAN)은 다양한 영역에서 가장 널리 사용 되었으며, 가장 크게 발전을 하였다. 그러나 무선랜의 특성상 해킹과 침투에 취약한 약점을 안고 있다. 아직도 많은 보안적 취약점을 가지고 있으며, 특히 그 중에서도 Rogue AP(Access Point)는 가장 심각한 보안 취약점으로 대두되고 있다. 현재 Rogue AP 탐지를 위하여 넷스텀블러와 같은 스니핑 소프트웨어를 설치하여 주변 지역을 돌아다니는 워드라이빙 형태의 탐지방법은 아직도 사용되고 있다. 그러나, 이러한 방법은 대규모로 확장되어 가는 무선랜 환경에 적합하지 않다. 본 논문은 무선랜 환경에서 Rogue AP 탐지 문제의 해결책을 제시한다. AP의 전파 영역을 이용하는 방식으로, AP가 신호를 받을 수 있도록 수정하여, 주변에 새로운 AP가 탐지될 경우, AP가 서버와 새롭게 발견된 AP에 신호를 보내고, 이를 바탕으로 서버는 WhiteList를 통해서 Rogue AP 여부를 결정한다. 따라서 본 논문의 제안 방식은 기존의 탐지 방식에 비해 Rogue AP의 효과적 탐지가 가능하다.

A survey on the relation between the employees' viewpoint with knowledge management and cultural intelligence among the employees working in Social Security Organization of Ardabil

  • Borjian, Sheyda;Alavi, Soheila
    • The Journal of Economics, Marketing and Management
    • /
    • v.5 no.2
    • /
    • pp.1-9
    • /
    • 2017
  • This study has reviewed the "A survey on the relation between the employees' viewpoint with knowledge management and cultural intelligence among the employees working in Social Security Organization of Ardabil". The present study is functional in terms of objective and the method is descriptive and survey. This has asked the others' ideas and viewpoints concerning a specific subject and has analyzed them. About the nature and the method used, the present research is of correlation research. The population applied in this research includes all employees working in Social Security Organization of Ardabil consisting of 400. The method used for sampling is simple random sampling. To collect the information in the first step of the research the library method has been used. In this research the data has been collected through standard questionnaires. Then, via descriptive and inferential statistics the research data has been characterized and regarding the spatial scaling of the measurement to test the hypothesis the, correlation analysis of Pearson has been used and also to specify the reliability of the questionnaire the Chronbach's Alpha has been taken in use and the SPSS software to analyze the data also. The findings resulted from the study showed that there is a significant relation between the factors concerning employees' efficiency with knowledge management and the cultural intelligence and all hypotheses was confirmed.