• Title/Summary/Keyword: Security Manager

Search Result 242, Processing Time 0.025 seconds

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

A Study on KOREA SCMS Analysis and Improvement Method (한국 V2X 보안인증체계 분석 및 개선방향 연구)

  • Eom, Sungwook;Kim, Donghwan;Kim, Sungsub;Cho, Sungwoo
    • Journal of Auto-vehicle Safety Association
    • /
    • v.13 no.1
    • /
    • pp.31-37
    • /
    • 2021
  • SCMS is a security credential management system for V2X communication, which performs generation/ provision/validation of device's security certificates. In this paper, we will explain about the main functions of SCMS and the role of each institution, and propose the following improvement measures in the process of establishing the Korean V2X security certification system. First, connection scheme of ERA (Enrollment certificate RA) between SCMS and Vehicle Manager Information System (VIMS) will be proposed. Second part is the problem of certificate revocation and proposal of improvements.

A Study on Critical Success Factors for Enterprise Security Collaboration (전사적 보안협업을 위한 핵심성공요인에 관한 연구)

  • Do, Jung-Min;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.235-242
    • /
    • 2014
  • Although the requirement of enterprise security implementation has been raised, a few research on security collaboration, which is one of the methods for enterprise security has been performed. This paper approached information security from the collaboration-centric perspective and propose critical success factors for security collaboration. In this study, a model of security collaboration, which includes coordination and cooperation activities was devised. Based on the previous research on organizational collaboration literature, the eight success factors for collaboration were deduced and examined the significance of the eight factors using the PLS-SEM statistical method with data of 106 samples who are security and IT professionals who have worked for more than 7 years. The result of the hypothesis test supported that trust, expertise motivation, collaboration performance criteria, top manager support and collaboration tools are the prominent factors of security collaboration.

말기환자의 전인적 돌봄에 있어서 포괄적 평가개념의 중요성

  • Yun, Uk-Hui;Lee, Gwi-Han;Yu, Seon-Hui;Gwak, Won-Yeong;Jin, Seon-Gyeong
    • Korean Journal of Hospice Care
    • /
    • v.3 no.1
    • /
    • pp.12-30
    • /
    • 2003
  • We all human beings, should be reached the terminal of life in the world. There is the only difference between that comes suddenly or slowly. Persons who should be come the terminal stage suddenly due to disease, especially, malignancy, are Hospice patients. Hospice work is the work of all of us because anyone, anywhere, whenever can be suffered in terminal stage. The characters of Hospice-care are total care of wholistic human beings, comprehensive total assessment of the life and the team work composed of diverse team-members, for example, doctors, nurses, social workers, physical therapists, psychologists, ministers & volunteers. The care manager of the total care(the coordinator of Hospice care), should be worked systemically and, rationally. The comprehensive assessment concept should be entered to the infra-consultant of terminal care-program. The care manager should be have the ability of comprehensive assessment for terminal patients. It will also help standardization of Hospice, and application of medical insurance and social security.

  • PDF

Security of Password Vaults of Password Managers (패스워드 매니저의 패스워드 저장소 보안 취약점 분석)

  • Jeong, Hyera;So, Jaewoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1047-1057
    • /
    • 2018
  • As the number of services offered on the Internet exponentially increases, password managers are increasing popular applications that store several passwords in an encrypted database (or password vault). Browser-integrated password managers or locally-installed password managers store the password vault on the user's device. Although a web-based password manager stores the password vault on the cloud server, a user can store the master password used to sign in the cloud server on her device. An attacker that steals a user's encrypted vault stored in the victim's device can make an offline attack and, if successful, all the passwords in the vault will be exposed to the attacker. This paper investigates the vulnerability of the password vault stored in the device and develops attack programs to verify the vulnerability of the password vault.

An active intrusion-confronting method using fake session and Honeypot (거짓 세션과 허니팟을 이용한 능동적 침입 대응 기법)

  • 이명섭;신경철;박창현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.971-984
    • /
    • 2004
  • In the coming age of information warfare, information security patterns need to be changed such as to the active approach using offensive security mechanisms rather than traditional passive approach just protecting the intrusions. In an active security environment, it is essential that, when detecting an intrusion, the immediate confrontation such as analysing the intrusion situation in realtime, protecting information from the attacks, and even tracing the intruder. This paper presents an active intrusion-confronting system using a fake session and a honeypot. Through the fake session, the attacks like Dos(Denial of Service) and port scan can be intercepted. By monitoring honeypot system, in which the intruders are migrated from the protected system and an intrusion rule manager is being activated, new intrusion rules are created and activated for confronting the next intrusions.

Efficient and Secure Member Deletion in Group Signature Scheme (그룹 서명 기법에서의 효율적이고 안전한 구성원 탈퇴 방법)

  • 김현정;임종인;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.6
    • /
    • pp.41-51
    • /
    • 2001
  • Group signature schemes allow a group member to sign messages anonymously on behalf of the group. In case of dispute, only a designated group manager can reveal the identity of the member. During last decade, group signature schemes have been intensively investigated in the literature and applied to various applications. However, there has been no scheme properly handling the situation that a group member wants to leave a group or is excluded by a group manager. As noted in[3], the complexity of member deletion stands in the way of real world applications of group signatures and the member deletion problem has been a pressing open problem. In this paper we propose an efficient group signature scheme that allows member deletion. The length of the group public key and the size of signatures all independent of the size of the group and the security of the scheme relies on the RSA assumption. In addition, the method of tracing all signatures of a specific member is introduced.

Comparative Research on the Health Information Manager(HIM) Duties of One Malaysian Hospital and Similar Scale Korean hospitals (말레이시아 1개 병원과 병상규모가 유사한 한국의 병원 간 보건정보관리자 직무 비교연구)

  • Kim, Hey-Kyung;Lee, Hyun-Ju
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6158-6167
    • /
    • 2014
  • The aim of this study was to perform comparative analysis of the duties of 7 new roles of HIMs in Malaysian and Korean hospitals of a similar scale. A Malaysian general hospital with a scale of 272 hospital beds was chosen. The researcher visited a Malaysian hospital in person and interviewed the staff in charge over a 2 week period from July 22nd 2013 to August 2nd 2013. For domestic hospitals, 13 general hospitals with 270 hospital beds, similar to the Malaysian general hospital, were chosen. Phone interviews with the department recorded the duty recording work. Regarding 7 new roles of Health Information Manager (HIM), although the role as a Health information manager and Security Officer in Malaysian general hospital was not defined, 30.8% performed their role in Korean general hospitals. The classification of disease & procedure within the role of Clinical data specialist was performed by both countries, and while the tumor registry was done in a Malaysian general hospital, only 15.4% of Korean general hospitals were operating. The statistics of the discharged patients were not measured in the Malaysian general hospital but 76.9% of Korean general hospitals recorded these statistics. Although 22.1% of Korean general hospitals operated registration work of special disease, Malaysian general hospital not only had a total legal contagious disease registration, but also took charge of information registration of hospital births and deceased ones. Other than these, the Patient Information Coordinator, Data Quality Manager, Document and Repository Manager, Research and Decision Support Analyst roles were not done by either country. The new role of HIM is operated in a low percentage in Korean middle and small hospitals. Therefore, to clearly establish the role of HIM in Korea, and have middle and small hospitals to operate such a role, it is essential for the related association to give continuous education and provide support to clarify the role within the hospital working environment. It is desirable to benchmark Malaysian general hospital's registration work on special diseases and others, and expand the work to improve overall.

A Study on the Policy Development for Activation of Industrial Security Professional Qualifications (산업보안 전문자격 활성화를 위한 정책개발 연구)

  • Kim, Hwayoung;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.3-9
    • /
    • 2019
  • The importance of Industrial Security is continuously growing along with the rapid development of convergence technologies. Accordingly, it is expected for the gap between the supply and demand of industrial security professional personnel to grow every year. In order to reduce the supply and demand of industrial security, it is important to not only train professional qualifications but at the same time, secure a professional qualification acquisitor. In this regard, South Korea has introduced the Industrial Security Expert qualification as a non-governmental qualifications ince 2010. From 2017, promoted as nation-certified qualification and has supported activities as expert in industrials ecurity field. However, it is reality that Industrial Security Expert qualification has not yet to be recognized as professional qualification in the field of industry, have low rate of utilization as academic research is also shown the sign of stagnation. Based on these background, this research set goal in deducing a activation method for industrial security professional qualification concentrating on Industrial Security Expert qualification. The analysis on operation condition of Industrial Security Expert qualification and related precedent research was conducted and raised four types of activation method, which are organizational aspect, certification system improvement and operation aspect, certification acquisitors' utilization aspect and professionalism enhancement aspect.