• Title/Summary/Keyword: Security issues

Search Result 1,598, Processing Time 0.031 seconds

A study of keep the Secret information of Random Sized Images from using Indestructible Security

  • Woo, Seon-mi;Lee, Malrey;Lee, Hyang Ran
    • International journal of advanced smart convergence
    • /
    • v.5 no.1
    • /
    • pp.23-29
    • /
    • 2016
  • The information is to be considered as important part of any network, the communication nodes within network can able to communicate and transmit information by the means of configured LAN/WAN, or/and using internet technology. Thus, vast enhancement has been made in- exchanging of information over transmission media, this should be beneficial in various disciplines of modern client/server applications but at other side, several massive vulnerabilities have been directly/in-directly associated with them. To resolve the security issues, a security mechanism is proposed which hide the sensitive information of images before transmitting to networks. Random size image samples have used and encrypted to protect them from unauthorized entities. The encryption mechanism manipulates the sample images, and corresponding secret codes are generated which help to protect the images from adversaries. To provide an indestructible security mechanism, cryptography algorithms are deployed and considered as best solutions to keep the secret information of images.

Analyses of Security Issues in Mobile Agent Technology (이동 에이전트 기술에서의 보안성 문제 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.815-818
    • /
    • 2007
  • As wireless communications and mobile multimedia services are booming nowadays, systematic research of the overall aspects of mobile security is crucial. This paper presents a frame model for guising the systematic investigation of mobile security. Based on the introduction of some background viewpoints of security targets from n novel perspective, the kamework is described as a hierarchical model in which mobile security research is partitioned into three different layers.

  • PDF

Analyses of Security Issues in Wireless Mobile Ad Hoc Network (무선 이동 Ad hoc 네트워크에서의 보안성 문제 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.737-740
    • /
    • 2007
  • A s wireless communications and mobile multimedia services are booming nowadays, systematic research of the overall aspects of mobile security is crucial. This paper presents a frame model for guising the systematic investigation of mobile security. Based on the introduction of some background viewpoints of security targets from n novel perspective, the framework is described as a hierarchical model in which mobile security research is partitioned into three different layers.

  • PDF

Extensional End-to-End Encryption Technologies to Enhance User's Financial Information Security and Considerable Security Issues (이용자의 금융거래정보 보호를 위한 확장 종단간(End-to-End) 암호화 기술과 보안고려사항)

  • Seung, Jae-Mo;Lee, Su-Mi;Noh, Bong-Nam;Ahn, Seung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.145-154
    • /
    • 2010
  • End-to-End(E2E) encryption is to encrypt private and important financial information such as user's secret access numbers and account numbers from user's terminal to financial institutions. There has been found significant security vulnerabilities by various hacking in early E2E encryption system since early E2E encryption is not satisfied the basic security requirement which is that there does not exist user's financial information on plaintext in user's terminal. Extensional E2E encryption which is to improve early E2E encryption provides confidentiality and integrity to protect user's financial information from vulnerabilities such as alteration, forgery and leakage of confidential information. In this paper, we explain the extensional E2E encryption technology and present considerable security issues when the extensional E2E encryption technology is applied to financial systems.

A Study of U.S. Coast Guard(USCG) (미 해안경비대(U. S. Coast Guard)의 고찰을 통한 한국 해양경찰의 제도적 개선방안)

  • Lee, Jae-Seung;Lee, Wan-Hee;Moon, Jun-Seop
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.443-467
    • /
    • 2013
  • The purpose of this study is to introduce United States Coast Guard (USCG) in order to suggest a direction to advance the system of Korea Coast Guard. After the effect of United Nations on the Law of the Sea in 1994, the world is facing with new era of maritime age with emergence of new maritime border 'Exclusive Economic Zone(EEZ)'. Along with new maritime era, Korea also has been facing with the conflicts caused from EEZ. Also, there is a increasing concern about maritime safety and security since people looking for maritime tourism and leisure sports are dramatically increasing in Korea. Moreover, national security matters are a big issue in Korea due to the several incidents occurred in the sea such as the attack on Yeon-Pyung Island and the sinking of Cheonan naval vessel. Arising concern on these issues in maritime space requires Korea Coast Guard to handle these effectively. However, the systematical and structural limitation of Korea Coast Guard limits the effective management of recent issues. The United States Coast Guard which is considered as one of the military force in the United States has continuously reformed and developed its system and structure to better handle the maritime safety and security issues through developing project such as the Integrated Deep Water system. Also, maritime police system and structure in the United States is different with in Korea. This study expects to suggest a way to advance the system and structure of Korea Coast Guard through examination of United States Coast Guard and comparing maritime police system and structure between Korea and the United States in order to properly deal with the maritime safety and security issues arising recently.

  • PDF

Arbitration Dispute Resolution Study upon e-Commerce Issues (전자상거래의 문제점과 분쟁사례 연구)

  • 장병윤
    • Journal of Arbitration Studies
    • /
    • v.11 no.1
    • /
    • pp.247-286
    • /
    • 2001
  • This study is to analyze e-commerce issues and how to settle arbitration dispute resolution. Considering internet related business spread out worldwide, the dispute is incurred in variety areas. To resolve the dispute of e-commerce, government has been released several laws for protecting legal transaction, information exposure, and internet security, etc. However, internet related technology is changing rapidly and dispute issues are coming out at many different models. Upon that environments, law and rules could not be followed to meet the technology change. That issues are made for this study. In this study, outlook of e-commerce, status of domestic and overseas of internet business, e-commerce and security issues were analyzed, and empirically comparative analysis was driven out and variety dispute cases were studied. Upon that study the resolution methods were suggested and arbitration settlement was proposed prior to legal sue. This study results are how to minimize the disputes and the method of dispute settlement. Therefore, a role of arbitration proposed and emphasized. To protect the dispute in advance, it's suggested to revise rules timely following on technical changes, and emphasized that the dispute has to lead to arbitration settlement not for consuming unnecessary time and finance for enterprises and consumers.

  • PDF

Information and Communication Security legal system's problems and improvement plan (정보통신보안법제의 문제점과 개선방안)

  • Kwon, Hun-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1269-1279
    • /
    • 2015
  • Korea is recognized as the most advanced nation in regards to capabilities or environments of informatization throughout the world. Nevertheless, Korea brings on itself such stigmas as a nation vulnerable to information security. Now the globe ushered in an era requiring political balances. Yet, issues of legislative supports or system adjustments for information security policies are always pushed back on the priority list. There is a need to face problems at the center of changes departing from such frames. In order to establish a proper system for information security policies, the most urgent issues are reviews of concepts and reorganizations of systems, and then to legislate information security polities by being harmonious with public opinions. This paper is to remind what measures are needed to improve the system of priority policies depending on public backgrounds and why such measures are needed. Furthermore, the paper suggests a new legislation, 'Information Security Policy Act' as one of the specific measures.

Strengthening Safety for National Assembly: Focus on the Public Tour System (국회 안전확보를 위한 보안성 강화방안: 참관제도를 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.115-124
    • /
    • 2017
  • The purpose of this study is to provide measures for National Assembly safety and control safety issues arise from increased National Assembly public tour services. First, the study provided the definition of National Assembly public tour and types of tour services, tour procedures, and visitor guidelines. Next, risk factors for National Assembly were discussed and environmental security of national major facilities were compared. Furthermore, four measures for strengthening safety for National Assembly were discussed. First, it is important to utilize special security guards in National Assembly since they can use special weapons unlike general security guards. Second, special guards can be flexibly utilized compared to general security guards. Third, based on the Private Security Law, there is no legal issues for utilizing special security guards since National Assembly is categorized as national major facilities. Fourth, educational programs for security guards are focused on National Assembly safety, brief education, martial arts, customer satisfaction, more specialized educational program for public tour programs should be provided.

A Safe Qperati ng Strategy for Information System of Small and Medium Enterprises (중소기업 정보시스템의 안정적 운영 전략)

  • Yeo, Sang-Soo;Hwang, Su-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.105-112
    • /
    • 2009
  • Small and medium enterprises have more dependency on their information technology than large enterprises have. but they can't pay much for information technology and information security due to financial restrictions, limited resources, and lack of know-how. So there are many vulnerabilities in small and medium enterprises and these would make many security incidents. Security managers of small and medium enterprises think that information security in their company is simply equivalent to updating the antivirus solutions. managing firewall, and patching systems regularly. However, security policies, prevention of information theft. business continuity, access controls, and many other information security issues should be considered for mitigating security incidents. In this context, we redefined security countermeasures and strategies which are only appropriate to large enterprises. for making them appropriate on a secure operating for information system of small and medium enterprises, and we investigate information security issues in the four views of information system and company, and finally we present information security strategies for each view, in this paper.

Analyses of Requirement of Security based on Gateway Architecture for Secure Internet (사물인터넷망의 보안 및 프라이버시 문제 해결을 위한 게이트웨이 보안 구조 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.461-470
    • /
    • 2016
  • As IoT is broadly used in many fields, the security of IoT is becoming especially important and critical issues. Security and privacy are the key issues for IoT applications, and still faced with some enormous challenges. Sensor has limited resources such as computing power, memory, battery. By means of deeply analyzing the security architecture and features in security framework. While a number of researchers have explored such security challenges and open problems in IoT, there is an unfortunate lack of a systematic study of the security challenges in the IoT landscape. This special issue features recent and emerging advances IoT architecture, protocols, services and applications. The alternative method is IoT security gateway. In this paper, we surveyed the demands and requirements. By means of deeply analyzing the security architecture and features, we analyzed the demands and requirements for security based on gateway application.