• 제목/요약/키워드: Security major

검색결과 1,291건 처리시간 0.025초

수출입 공급망 안전 프로그램에 관한 연구 (A Study on the Supply Chain Security Program)

  • 한병완
    • 무역상무연구
    • /
    • 제58권
    • /
    • pp.287-311
    • /
    • 2013
  • In this study, the scope of previous logistics security were focused only on port and ship. Because of it now extends to the overall (export and import) supply chain areas and in regards with supply security programs in the international level, it reviewed supply chain security programs categorized them into 'ships and port security system', 'container screening system', 'logistics chain authorization system' which are expanded to be adopted in the international level. The major features of those programs are summarized as in building risk management system, providing information ahead, selectivity test and benefits to AEO authorized companies in the customs administration level. The government and companies which are to ensure supply chain security and trade facilitation in order to cope actively with international customs administrative atmosphere need to do the followings : First, they need to build an intra-government integrated supply chain security and make efforts to conclude AEO MRA in order to increase trade competitiveness among major trading countries. Second, they need to build supply chain risk management system in order to enhance management performance through overseas market and company level strategy to obtain and maintain AEO authorization in the company level.

  • PDF

군 통합보안시스템 구축 방안 연구 (A study on method of setting up the defense integrated security system)

  • 장월수;최중영;임종인
    • 정보보호학회논문지
    • /
    • 제22권3호
    • /
    • pp.575-584
    • /
    • 2012
  • 군의 정보화, 과학화 추진에 따른 환경 변화에 따라 기존 수작업, 오프라인 중심의 제반 군사보안 업무도 효율적이고 체계적인 업무 수행을 지원할 수 있도록 변화와 발전이 필요하다. 이에 본 연구에서는 주요 군사보안 업무 분야에 대한 실태 및 문제점 분석과 미국, 영국 등의 사례 분석을 기반으로, 주요 군사보안 업무를 자동화, 정보화하기 위한 국방통합보안시스템 구축 표준 Model을 제시하였다. 표준 Model은 통합보안체계, 비밀관리시스템, 인원출입 시스템, 차량출입시스템, 첨단경계시스템, 테러 예방시스템 및 보안사고분석시스템 등의 단위 시스템으로 구성되며, 현재 가용한 기술 및 시스템을 기반으로 제안하였는데, 이를 각급부대에 적용할 경우 군사보안 발전에 기여할 것으로 기대된다.

Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint

  • Kumari, Shipra;Om, Hari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.4987-5014
    • /
    • 2015
  • The bilinear pairing, also known as Weil pairing or Tate pairing, is widely used in cryptography and its properties help to construct cryptographic schemes for different applications in which the security of the transmitted data is a major concern. In remote login authentication schemes, there are two major requirements: i) proving the identity of a user and the server for legitimacy without exposing their private keys and ii) freedom for a user to choose and change his password (private key) efficiently. Most of the existing methods based on the bilinear property have some security breaches due to the lack of features and the design issues. In this paper, we develop a new scheme using the bilinear property of an elliptic point and the biometric characteristics. Our method provides many features along with three major goals. a) Checking the correctness of the password before sending the authentication message, which prevents the wastage of communication cost; b) Efficient password change phase in which the user is asked to give a new password after checking the correctness of the current password without involving the server; c) User anonymity - enforcing the suitability of our scheme for applications in which a user does not want to disclose his identity. We use BAN logic to ensure the mutual authentication and session key agreement properties. The paper provides informal security analysis to illustrate that our scheme resists all the security attacks. Furthermore, we use the AVISPA tool for formal security verification of our scheme.

Quantitative Risk Assessment in Major Smartphone Operating Systems in Asian Countries

  • Joh, HyunChul
    • 한국멀티미디어학회논문지
    • /
    • 제17권12호
    • /
    • pp.1494-1502
    • /
    • 2014
  • Since smartphones are utilized in the ranges from personal usages to governmental data exchanges, known but not patched vulnerabilities in smartphone operating systems are considered as major threats to the public. To minimize potential security breaches on smartphones, it is necessary to estimate possible security threats. So far, there have been numerous studies conducted to evaluate the security risks caused by mobile devices qualitatively, but there are few quantitative manners. For a large scale risk evaluation, a qualitative assessment is a never ending task. In this paper, we try to calculate relative risk levels triggered by software vulnerabilities from unsecured smartphone operating systems (Android and iOS) among 51 Asian countries. The proposed method combines widely accepted risk representation in both theory and industrial fields. When policy makers need to make a strategic decision on mobile security related agendas, they might find the presented approach useful.

Security Measures by Diagnosing Vulnerabilities in Web Applications

  • Kim, Hee Wan
    • International journal of advanced smart convergence
    • /
    • 제10권4호
    • /
    • pp.22-29
    • /
    • 2021
  • For web application vulnerability diagnosis, from the development stage to the operation stage, it is possible to stably operate the web only when there is a policy that is commonly applied to each task through diagnosis of vulnerabilities, removal of vulnerabilities, and rapid recovery from web page damage. KISA presents 28 evaluation items for technical vulnerability analysis of major information and communication infrastructure. In this paper, we diagnose the vulnerabilities in the automobile goods shopping mall website and suggest security measures according to the vulnerabilities. As a result of diagnosing 28 items, major vulnerabilities were found in three items: cross-site scripting, cross-site request tampering, and insufficient session expiration. Cookie values were exposed on the bulletin board, and personal information was exposed in the parameter values related to passwords when personal information was edited. Also, since the session end time is not set, it was confirmed that session reuse is always possible. By suggesting security measures according to these vulnerabilities, the discovered security threats were eliminated, and it was possible to prevent breaches in web applications and secure the stability of web services.

디지털 보안에 대한 해외 주요국의 통상 규범 동향 (Trends in Digital Security Policies and Trade Rules in Major Overseas Countries )

  • 김지은
    • 전자통신동향분석
    • /
    • 제38권4호
    • /
    • pp.1-11
    • /
    • 2023
  • Trade rules in service and digital sectors mainly focus on reducing regulatory uncertainties by improving transparency and minimizing unnecessary requirements. Recognizing the importance of digital trade rules and trade in information and communication technology (ICT) sectors, governments worldwide have rapidly adopted and expanded rules on free flow of data, personal data protection, electronic authentication, and cybersecurity. On the other hand, advances in technology have led governments to face multiple threats related to cybersecurity, intellectual property (including that related to source code and algorithms), and unauthorized access to proprietary information of their suppliers. This study presents digital trade rules related to digital security emphasizing cybersecurity, source code, and ICT products that use cryptography in different trade agreements. Additionally, it introduces various approaches that major countries are taking to both address digital security issues and seek balance between security enhancement and trade liberalization.

직무별 특성을 고려한 대학 정보보호 학과의 교육분야 선정 및 운영에 관한 연구 (A Study on Selecting and Operating Educational Department in Cyber Security Major by Analyzing Workforce Framework)

  • 임원규;신혁;안성진
    • 융합보안논문지
    • /
    • 제15권4호
    • /
    • pp.99-105
    • /
    • 2015
  • 사이버 공격의 지능화, 조직화로 몇몇 소수의 정보보호 전문가만으로 사이버 위협에 대응할 수 없는 시대가 되었다. 이에 따라 대학의 정보보호 관련학과가 2013년에 비해 17%나 증가했다. 하지만 대학의 교육은 실제 산업현장에 필요한 인력을 양성하는데 한계를 노출하고 있다. 본 연구에서는 이를 개선하기 위해 정보보호 직무체계 및 분야별 필요 교육 내용에 대한 연구를 조사하였다. 이후 이를 바탕으로 대학에서 학습되어야하는 정보보호 분야를 도출하였다. 그리고 도출된 분야의 교육과정을 운영하기 위한 방안으로 교육내용 선정 및 인증에 대한 방안을 제시하고 있다. 본 연구를 국가 정보보호백서에서 조사되는 정보보호 인력 현황과 연계해 대학 정보보호 관련학과의 분야를 조절할 수 있을 것으로 기대된다. 그리고 실 현장의 수요를 반영한 인력을 배출할 수 있는 정보보호 인력 중장기 계획의 기초 연구로 활용되고자 한다.

국가중요시설의 물리적 보안 요인 분석 - 항만보안을 중심으로 - (A Study on Physical Security factors of National Major Facilities - Focussed on Port Security -)

  • 이민형;이정훈
    • 융합보안논문지
    • /
    • 제15권6_2호
    • /
    • pp.45-53
    • /
    • 2015
  • 국가중요시설로서 항만보안에 특화된 물리적 보안요인이 선행적으로 제시되어야 그에 적합한 보안활동이 이루어질 수 있다고 볼 수 있다. 물리적 보안의 개념적 특성에 따라 항만시설 내에서의 그러한 요인이 어떠한가에 대한 이론적 기초자료가 제시되어야 함에도 불구하고 그러한 선행연구는 미비하며, 그에 따라 항만시설의 물리적 보안 요인에 대한 탐색적 연구가 이루어져야 한다. 이를 위한 연구방법으로서 본 연구에서는 델파이 기법을 통하여 전문가 패널의 의견을 수렴하여 이에 대한 필요성과 적합성을 평가하고자 하였다. 3차에 걸친 델파이 조사 분석결과를 살펴보면 제1차 개방형 설문 조사에서 전체 패널들의 의견을 수합한 결과 총 168개 중 응답 빈도수가 2이상인 중복응답 87개만 수렴하여 중복된 항목을 제거 및 수정하여 총 19개의 물리적 보안 요소가 도출되었다. 이를 토대로 제2차 필요성 및 제3차 적합성에 대한 델파이 조사를 통하여 기술통계분석과 내용타당도 분석 결과 3개 영역 12개 요인이 최종 선정되었다.

컴포넌트기반 보안개발방법의 프레임워크 (Framework of Security Development Method based on Component)

  • 홍진근
    • 한국산학기술학회논문지
    • /
    • 제11권3호
    • /
    • pp.926-930
    • /
    • 2010
  • 본 논문은 컴포넌트 기반의 보안 시스템 개발을 위해 요구되는 개발 프레임워크에 관한 것이다. 정보시스템의 개발방법론 적용과 함께, 정보보호 제품의 개발방법론 적용이 현시점에 요구되고 있다. 본 논문에서는 개발방법의 NIST 요구규격, SDLC 단계별 요구기준, 위험평가 주요 보안 가이드 라인을 살펴보았다. 또한 SDLC 주요 보안 요소를 살펴보았고, 컴포넌트 기반 보안 프레임워크 수립에 대한 이해를 돕기 위해, 위협트리 STRIDE 기반의 외부 엔티티에 대한 스푸핑 측면에서 보안설계와 DFD 관계를 분석 제시하였다.

Analysis of Web Browser Security Configuration Options

  • Jillepalli, Ananth A.;de Leon, Daniel Conte;Steiner, Stuart;Alves-Foss, Jim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6139-6160
    • /
    • 2018
  • For ease of use and access, web browsers are now being used to access and modify sensitive data and systems including critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully updated. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated by using site-, user-, and device-specific security configurations. However, we discovered that all major browsers expose disparate security configuration procedures, option names, values, and semantics. This results in an extremely hard to secure web browsing ecosystem. We analyzed more than a 1000 browser security configuration options in three major browsers and found that only 13 configuration options had syntactic and semantic similarity, while 4 configuration options had semantic similarity, but not syntactic similarity. We: a) describe the results of our in-depth analysis of browser security configuration options; b) demonstrate the complexity of policy-based configuration of web browsers; c) describe a knowledge-based solution that would enable organizations to implement highly-granular and policy-level secure configurations for their information and operational technology browsing infrastructures at the enterprise scale; and d) argue for necessity of developing a common language and semantics for web browser configurations.