• Title/Summary/Keyword: Security Test

Search Result 1,261, Processing Time 0.041 seconds

A study for improving database recovery ratio of Disaster Recovery System in financial industry (금융권 재해복구 시스템의 DB 데이터 복구율 향상을 위한 연구)

  • Kim, Jin-Ho;Seo, Dong-Kyun;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.655-667
    • /
    • 2014
  • A disaster is the time-excess case that computerized service can tolerate a failure and financial industry is being set up the disaster recovery system based on the disaster recovery plan and the business continuity plan for preparing these disasters. However, existing system can not guarantee the business continuity when it comes to cyber terror. This paper analyzes the building type and building technology of disaster recovery system for the financial fields. Also this paper explain the type of data backup using online redo log and type of archive log backup using WORM storage. And this paper proposes the model of improved data recovery combining above two types. Lastly this paper confirm the effectiveness and reliability for proposal rocovery model through the implementation of the test environment.

The Effect of Sandplay Therapy with Parent-Children on Mother-Child's Attachment Security and Communication (부모-자녀모래놀이치료가 모-자의 애착안정성과 의사소통에 미치는 효과)

  • Oh, Aenia;You, Seung-Eun;Park, Boo-Jin
    • Korean Journal of Child Studies
    • /
    • v.34 no.6
    • /
    • pp.31-55
    • /
    • 2013
  • This study aimed to look into the effect of sandplay therapy with parent-children on mother-child's attachment security and communication. This study first conducted a scale of attachment security targeting child and mother who is bringing children in the age of 5 to 6 years in two kindergartens located in Seodaemun-gu, Seoul, and composed experimental group and control group of four couples respectively by selecting randomly from eight mother-child couples that received low grades. Sandplay therapy with parent-children was conducted for 12weeks on a weekly basis for 50minutes each. To study the attachment security, we used the Klabsbrun-Bowlby(1976)' Separation Anxiety Test and Mother's attachment scale. In this study, it is Seperated in based on Lee Na Gueng(2001) by functional communication and dysfuctional communication in order to measure changes in communication for situation that may occur during Sand play theraphy and record of observation about changes in each session. Data logging makes watching videos that recorded parent-children sand play therapy every situations. When observes the functional communication or dysfunctional communication between mother and the child, checking the corresponding to each entries, the frequency is recorded and qualitatively analyzed by each sessions. To study mother and child have been enhanced stability of the attachment and the relationship had improved results. Also, in each session the observation of increased functional communication, and dysfunctional communication results appear to reduce in parent-children sand play therapy. As a result, a couple sand play therapy has positive impact to improved the relationship between the mother and the child.

Emulation-Based Fuzzing Techniques for Identifying Web Interface Vulnerabilities in Embedded Device Firmware (임베디드 디바이스 펌웨어의 웹 인터페이스 취약점 식별을 위한 에뮬레이션 기반 퍼징 기법)

  • Heo, Jung-Min;Kim, Ji-Min;Ji, Cheong-Min;Hong, Man-Pyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1225-1234
    • /
    • 2019
  • The security of the firmware is more important because embedded devices have become popular. Network devices such as routers can be attacked by attackers through web application vulnerabilities in embedded firmware. Therefore, they must be found and removed quickly. The Firmadyne framework proposes a dynamic analysis method to find vulnerabilities after emulating firmware. However, it only performs vulnerability checks according to the analysis methods defined in the tool, thus limiting the scope of vulnerabilities that can be found. In this paper, fuzzing is performed in emulation-based environment through fuzzing, one of the software security test techniques. We also propose a Fabfuzz tool for efficient emulation based fuzzing. Experiments have shown that in addition to the vulnerabilities identified in existing tools, other types of vulnerabilities have been found.

Wireless Security Transmission Using Algorithm of Multiple-Key Exchange (다중 키 교환 알고리즘을 이용한 무선 보안 전송 기법)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Noh, Bong-Nam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.807-810
    • /
    • 2005
  • Constructed network test environment of wireless base for confidentiality guarantee of data and safe transmission that is transmited at Mobile node of Wireless Network environment in this paper. And, progressed research about IKEv2's Multiple-Key Exchange mechanism for efficient security transmission that use IPSec that is built-in to basis to IPv6 of Mobile environment. Have several key to single terminal to solve that is seam at hand off packet transmission process of Mobile Node in Wireless Network and Re-setting for Key and Re-exchange problem that happen frequently and studied technology that move. Key exchange protocol that is used for an experiment loads basically in MIPv6 and used IKEv2 protocol that is used for management and distribution of reliable encryption key between both end. Using network simulator of SSFNet(Scalable Simulation Framework Network Models) in this paper Key exchange delay value of IKEv2's security transmission analyzing comparison Performance measure and studied about problem and improvement way accordingly.

  • PDF

BLE-OTP Authorization Mechanism for iBeacon Network Security (iBeacon 네트워크 보안을 위한 BLE-OTP 인증 메커니즘)

  • Jung, Hyunhee;Shin, Dongryeol;Cho, Kwangsu;Nam, Choonsung
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.979-989
    • /
    • 2015
  • Machine to Machine (M2M) technology has gained attention due to the fast diffusion of Internet of Things (IoT) technologies and smart devices. Most wireless network experts believe that Bluetooth Low Energy (BLE) Communications technology in an iBeacon network has amazing advantages in terms of providing communication services at a low cost in smartphone applications. Specifically, BLE does not require any pairing process during its communication phases, so it is possible to send a message to any node without incurring additional transmissions costs if they are within the BLE communication range. However, BLE does not require any security verification during communication, so it has weak security. Therefore, a security authorization process would be necessary to obtain customer confidence. To provide security functions for iBeacon, we think that the iBeacon Message Encryption process and a Decryption (Authorization) process should be designed and implemented. We therefore propose the BLE message Authorization Mechanism based on a One Time Password Algorithm (BLE-OTP). The effectiveness of our mechanism is evaluated by conducting a performance test on an attendance system based on BLE-OTP.

Analysis of Relation between Safety Needs and Life Satisfaction of Security Safety System Users (경비안전시스템 이용자들의 안전욕구와 생활만족에 대한 관계 분석)

  • Choi, Jeong-Il;Jang, Ye-Jin
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.141-148
    • /
    • 2018
  • The purpose of this study is to analyze the safety needs and life satisfaction of users of security system. The contents of the questionnaire consisted of "safety need, use satisfaction, life satisfaction". As a result of the analysis, Chronbach's alpha coefficient was calculated as 0.897 for safety needs, 0.888 for use satisfaction, and 0.887 for life satisfaction. The items were found to have internal consistency. In the validation of discriminant validity, both AVE and CR values were found to be 0.6 or more than the reference value of 0.8. The intuitiveness of the variables used in this study was found to be largely secured. As the hypothesis test result, the standardization factor was calculated as 0.993 for 'safety needs ⇨ use satisfaction' and 0.453 for 'use satisfaction ⇨ life satisfaction', and both hypotheses were positive. As a result of the verification, it was analyzed that the higher the user's safety needs, the higher the use satisfaction, and the higher the use satisfaction, the higher the life satisfaction.

  • PDF

A Multiclass Classification of the Security Severity Level of Multi-Source Event Log Based on Natural Language Processing (자연어 처리 기반 멀티 소스 이벤트 로그의 보안 심각도 다중 클래스 분류)

  • Seo, Yangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1009-1017
    • /
    • 2022
  • Log data has been used as a basis in understanding and deciding the main functions and state of information systems. It has also been used as an important input for the various applications in cybersecurity. It is an essential part to get necessary information from log data, to make a decision with the information, and to take a suitable countermeasure according to the information for protecting and operating systems in stability and reliability, but due to the explosive increase of various types and amounts of log, it is quite challenging to effectively and efficiently deal with the problem using existing tools. Therefore, this study has suggested a multiclass classification of the security severity level of multi-source event log using machine learning based on natural language processing. The experimental results with the training and test samples of 472,972 show that our approach has archived the accuracy of 99.59%.

A study on the Relationships among Coaching leadership, Directive leadership, Self-efficacy and Cohesion - Focused on the Marine Corps Soldiers - (코칭 및 지시적 리더십, 자기 효능감과 응집력간의 관계에 관한 연구 - 해병대 소대원을 중심으로 -)

  • Heo, Je-Eun;Lim, Gye-Hwan;Son, Heon-il
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.69-75
    • /
    • 2016
  • This study a Empirical research to examine the relationships among Coaching leadership, Directive leadership, Self-Efficacy and Cohesion, On the focus of Marine Corps Soldiers. The data was collected from 370 Soldiers located at Pohang, January 18 to 25, 2016. Descriptive statistics, frequency, t-test, ANOVA, scheffe test, and Pearson correlation analysis were performed using SPSS/WIN 22.0 program. In Cohesiveness, there were significants differences in Age, Branch of Service and Rank. As the result of Pearson' correlation, the relationships between leadership style, Self-efficacy and Cohesion were positive significants. The implications of these findings for effective leradership of Platoon Leader and future research on develop leradership program and curriculum were then discussed.

An Experimental and Numerical Study of Corona in a Cage with Sandy and Dusty Flow in High Altitude Area

  • Lv, Yukun;Ge, Zekun;Liu, Yunpeng;Zhu, Lei;Wei, Shaoke
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.4
    • /
    • pp.1726-1733
    • /
    • 2015
  • In order to study the effect of the high-altitude and dusty weather in northwest of China on the corona characteristics of transmission lines, a corona caged based experimental system with sandy and dusty flow condition is numerically investigated and designed. This system overcomes the difficulties caused by harsh environment and offers easy usage for off-site tests. The design parameters are mainly determined by the characteristics of strong sandstorm in northwest region and test requirements. By the comparison of numerical simulation of the particle diffusion in four programs with rectangular or circular air-duct, a practical technology, which introduces swirl to control the particle diffusion length, is obtained. Accordingly, the structure of round air-duct with swirl elbow in inlet and outlet of high level segment is selected as final program. Systems of control and measurement are designed at the same time. Field tuning results show that the test system could ensure the range of sandy and dusty coverage. The wind speed, sandy and dusty concentration could be controlled and meet the requirements of accuracy. The experimental system has many features, such as simple structure, easy to be assembled, disassembled, transported and operated, small space occupied.

Estimate of the Fluctuating Pressure Distribution of Tall Building under Hazard Fluctuating Wind Load (재난변동풍하중을 받는 고층건물의 변동풍압분포의 평가)

  • Hwang, Jin Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.2
    • /
    • pp.49-56
    • /
    • 2013
  • In this paper, used by the boundary layer wind tunnel test, have conducted a series of wind tunnel experiments, i.e. test the mean velocity profile regarding the surface roughness, turbulence intensity and power spectrum measured by augmentation device. After that, to provide data relevant for the preliminary design step of tall building hazard fluctuating wind loads may be obtained fluctuating pressure coefficients, fluctuating pressure spectrum, autocorrelation coefficients by the boundary layer wind tunnel test. From the results of experiments, this study can be obtained conclusions as follows. 1. We know the fact that the mean velocity profile and the turbulence intensity are well fitted natural wind flow in the boundary layer wind tunnel. 2. The satisfactory agreement of velocity spectrum can be obtained from the compare of fluctuating power spectrum and Von Karman spectrum. 3. We know the fact that the fluctuating pressure spectrums distributed peak at 0.01 Hz-0.1 Hz in the windward surfaces and at 0.1 Hz in the leeward surfaces. 4. We know the fact that the autocorrelation coefficients distributed stationary random processes with application time of hazard fluctuating wind loads.