• Title/Summary/Keyword: Security Technology Policy

Search Result 690, Processing Time 0.025 seconds

A Location Recognition and Notification Method of Attacker in Wireless Network Environment (모바일 환경에서의 공격자 위치 특정 및 알람 기법)

  • Bong, Jin-Sook;Park, Sang-Jin
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.201-211
    • /
    • 2017
  • Wireless network using dynamic IP and mobile IP technology provides the user with convenience of access and movement. However, this causes the attacker who disguises normal user(pretending to be a regular user) to have more opportunity in regard to access and acquisition of information. This paper help the network administrator and the service provider quickly to recognize the attacker's intention to access network and service. Therefore network administrator and service provider can specify and respond the location of the attacker appropriately. To achieve above, we define an entity (W_L_M) that manages user information of WiFi and LTE network, and propose messages and procedures for attacker's location identification and alarm. The performance evaluation of this paper is based on qualitative analysis. By using the proposed method, some cost (message creation, processing and transmission) occurred but it was analyzed to be less than the total network operation cost. The proposal of this paper is a management method that utilizes existing network information and structure. This method can be used as a reference material to enhance security.

Research on a New Approach to Enhance IoT Security Using Blockchain Technology (블록체인 기술을 이용하여 IoT 보안 강화를 위한 새로운 접근방법 연구)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.235-241
    • /
    • 2019
  • The structure of the IoT can be divided into devices, gateways, and servers. First, the gateway collects data from the device, and the gateway sends data to the server through HTTP protocol, Websocket protocol, and MQTT protocol. The processing server then processes, analyzes, and transforms the data, and the database makes it easy to store and use this data. These IoT services are basically centralized structures with servers, so attacks on the entire platform are concentrated only on the central server, which makes hacking more successful than distributed structures. One way to solve this problem is to develop IoT that combines blockchain. Therefore, the proposed research suggests that the blockchain is a distributed structure, in which blocks containing small data are connected in a chain form, so that each node agrees and verifies the data with each other, thereby increasing reliability and lowering the probability of data forgery.

Contrast Analysis for CBRN attacks on educational research and best practices (테러대비를 위한 CBRNE교육 선진사례 분석에 관한 연구)

  • Kim, Tae hwan;Park, Dae woo;Hong, Eun sun
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.78-100
    • /
    • 2009
  • This study is to protect peoples' life, minimize the property damage by coping with threats quickly and take more preventive measures in advance against nuclear bomb, CBR, and potential explosive. For this, CBRNE(Chemical, Biological, Radiological, Nuclear, Explosive) program research was used. Thanks to advance in technology, terrorist groups and even individuals make or keep nuclear and CBR weapons. And also it's likely that disaster and threats from a toxic gas, acute pathogens, accidents in the nuclear power plants and a high explosive could be happened a lot. Recently more organized terrorist groups maintain random attacks for unspecified individuals and also it's highly likely that a large-scale terrorist attack by WMD and CBRNEwill be done. To take strict measures against CBRNE attacks by terrorists is on the rise as an urgent national task. Moreover biological weapons are relatively easy and inexpensive to obtain or produce and cause mass casualties with a small amount. For this reason, more than 25 countries have already possessed them. In the 21 st century, the international safety environment marks the age of complicated threats : transnational threats such as comprehensive security and terror, organized crime, drug smuggling, illegal trade of weapons of mass destruction, and environmental disruption along with traditional security threats. These cause military threats, terror threats, and CBRNE threats in our daily life to grow. Therefore it needs to come up with measures in such areas as research development, policy, training program. Major industrial nations on CBRNE like USA, Canada, Switzerland, and Israel have implemented various educational programs. These researches could be utilized as basic materials for drawing up plans for civil defense, emergency services and worldwide countermeasures against CBRNE.

  • PDF

A Study on the Variable Password Generation Method in Internet Authentication System (변동형 비밀번호 생성방법 및 이를 이용한 인터넷 인증 시스템에 관한 연구)

  • Kang, Jung-Ha;Kim, Jae Young;Kim, Eun-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1409-1415
    • /
    • 2013
  • With the development of Internet communication and the use of a variety of online services has been greatly expanded. Therefore, the importance of authentication techniques for users of online services has increased. The most commonly used methods for user authentication is a technique that utilizes a prearranged password. However, the existing password scheme for authentication must use the same password every time. Therefore, the password being leaked by attackers, it can be used maliciously. In this paper, we proposed the Variable Password Generation Method in Internet Authentication System that generates a new password using information such as the access date, time, and IP address when user logs in. The method proposed in this paper prevents disclosure of personal information due to password exposure and improves the reliability and competitiveness in the field of security systems.

A Study on the Activation Way for Citizens to Participate in Police administration - Centering on PCRM Utilization - (경찰행정의 시민참여 활성화방안에 관한 연구 - PCRM활용을 중심으로 -)

  • Lee, Jong-Yup;Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.283-304
    • /
    • 2008
  • The development of IT technology help citizens demand information and public services through internet that they want, and the changes also help the government converge public opinions and become important measures for citizens to participate in deciding governmental policies. So, this thesis makes an overture of a possibility for utilizing PCRM, a way for citizens to participate in Police Administration, by utilizing IT technologies in which everybody can participate without difficulty. The utilization ways are, on a large scale, classified with a macroscopic aspect and microscopic aspect. One of the macroscopic aspects is, first, the consideration of access to services and convenience in utilization. Second, services should have a both-sidedproperty. Ultimately, citizens'participation should have a positive mutual participation level. One of the microscopic aspects is, first, that the police organizations have to establish a strategy to analyze and fractionate customers. Second, the police organizations have to make an effort to develop policy services and P.R strategies. Third, police organizations have to make an effort to manage customers. Fourth, police organizations have to execute customer management in general. So, all of the police organizations have to maintain unity, to some extent, about citizen participation plazas. In addition, at the same time, consciousness aspects have to be accompanied for the reasonable utilization of PCRM. Citizens have to cultivate citizen consciousness, ownership consciousness for society, and positive participation consciousness to solve social problems.

  • PDF

A Study on the Meaning Extension of User-Centeredness in UX Design (사용자 경험 디자인의 사용자 중심성에 대한 의미 확장 연구)

  • Lee, You-Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.301-310
    • /
    • 2021
  • The purpose of the study was to induce meaning of the UX design from users' interview. The study covers interviews from 20 untact finance application users in their twenties in written form. It aims to examine previous studies on UX design and to overcome their shortcomings by categorizing usability qualities focusing on verbs used in the interview. The followings are the result: Usability of UX design can be summarized into Unity, Trust, Persistency, Recognition and Approachability of the information to the 20 users in their twenties. As for the data earned from interviews focusing on verbs, usability included Security, Familiarity, Accessibility, Convenience of Operation and Visibility. Each of the qualities fell into related categories such as Security, Information, Brand and Design. In conclusion, analysis based on verb choices led to better understanding of the user-based experience compared to using objective means in previous studies and can be a suggestion to make up for errors in the former evaluation process.

Changes in the environment of electronic finance and its challenges -Focusing on the prospects and implications of changes in electronic finance- (국내 전자금융의 환경 변화와 그 과제 -전자금융의 변화 전망과 시사점을 중심으로-)

  • Kim, Daehyun
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.229-239
    • /
    • 2021
  • For this study, we have extensively analyzed the presentation data of the government's financial-related departments and the data of each financial institution and electronic financial institution.. As a result, In Korea's electronic financial environment, real changes such as first) expansion of non-face-to-face finance, second) teleworking in the financial sector, third) abolition of accredited certification, fourth) advanced voice phishing, fifth) openness of the financial industry and diversification of forms, sixth) the'walletless society'. In addition to the above, however, global changes triggered by the Fourth Industrial Revolution spread to the financial security sector, making it difficult to respond to problems such as artificial intelligence/ deep learning/ user analysis/ deepfake technology. As the proportion of electronic finance is increasing socially, it should be studied in the fields of electronic finance and its environment, and crime and criminal investigation.

A Study on Smart Contract for Personal Information Protection (개인정보보호를 위한 스마트컨트랙트 연구)

  • Kim, Young-Hun
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.215-220
    • /
    • 2019
  • The block chain technology is a technique that prevents manipulation of data and ensures integrity and reliability. Ethereum is building a smart contract environment as a type of encryptionenabled system based on block chains. Smart contracts can be implemented when conditions are met, thus increasing confidence in digital data. However, smart contracts that are being tried in various ways are not covered by information security and personal information protection. The structure in which the network participant can view the open transaction ledger is exposed to data or personal information listed in the block chain. In this study, it is possible to manage the data of personal information recorded in the block chain directly. This study is protected personal information by preventing the exposure of personal information and by executing time code, it is possible to erase recorded information after a certain period of time has elapsed. Based on the proposed system in the future, it is necessary to study the additional management techniques of unknown code defects or personal information protection.

Why People Adopt the Virtual Bank? -An Empirical Study on Motivational Factors- (인터넷 전문은행 채택 요인에 관한 실증 연구)

  • Lee, Seulki;Lee, Jungwoo
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.205-216
    • /
    • 2020
  • In this study, a research model is constructed based on the theory of technology adoption. Independent constructs are largely grouped into two: (1) virtual bank characteristics (responsiveness, ease of use, economic benefits, and security), and (2) individual characteristics (innovativeness, self-efficacy and Internet experience). On the dependent side, user satisfaction is posited to influence the loyalty via intention to continuous use. PLS analysis of 194 data points collected revealed that economic benefits, security, innovativeness, and Internet experiences are significantly and positively associated with user satisfaction, intention to continuous use and loyalty. Paths among satisfaction and intention towards the loyalty are also validated. Details of results are discussed with practical and academic implications.

Study on the Development for Traffic Safety Curriculum of Automated Vehicles on Public Roads (실 도로 기반 자율주행자동차 교통안전 교육과정 개발 연구)

  • Jin ho Choi;Jung rae Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.266-283
    • /
    • 2022
  • With the rapid development of autonomous vehicle technology, unexpected accidents are occurring. Therefore, it is necessary to minimize user accident damage through the development of autonomous traffic safety education. Since edge cases, accident type, and risk factor analysis are important for realistic education, overseas case studies and demonstrations were carried out, and based on this, two curriculum for service providers and general users were developed. The service provider curriculum consisted of OEDR, sudden stop, cut-in, take-over, defensive driving, system malfunction, policy and information security education, and the general user curriculum consisted of attention duty, take-over, operating design domain, accidents type, laws, functions, information security education.