• Title/Summary/Keyword: Security mechanisms

검색결과 392건 처리시간 0.027초

State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents

  • Kryshtanovych, Myroslav;Britchenko, Igor;Losonczi, Peter;Baranovska, Tetiana;Lukashevska, Ulyana
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.33-38
    • /
    • 2022
  • The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified.

Construction of Security MIB for EDI System

  • Park Tae-Kyou
    • 정보보호학회논문지
    • /
    • 제8권1호
    • /
    • pp.23-37
    • /
    • 1998
  • This paper considers the design and management of security MIB for EDI system. EDI system has to establish various securety wervices and mechanisms to protect against security threats. Hence, the EDIsystem requires appropriate security management to monitor and control the security obhects for its security services and mechanisms. In this paper, I identify security objects for management of secueity services defined in the EDIsystem, and propose the design of a security MIB and describe the use of SNMPnetwork management protocol in its management.

Android Operating System: Security Features, Vulnerabilities, and Protection Mechanisms

  • AlJeraisy, Lulwa Abdulmajeed;Alsultan, Arwa
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.367-372
    • /
    • 2022
  • In the age of smartphones, users accomplish their daily tasks using their smartphones due to the significant growth in smartphone technology. Due to these tremendous expansions, attackers are highly motivated to penetrate numerous mobile marketplaces with their developed malicious apps. Android has the biggest proportion of the overall market share when compared to other platforms including Windows, iOS, and Blackberry. This research will discuss the Android security features, vulnerabilities and threats, in addition to some existing protection mechanisms.

기업 내 최적 정보기술보안 제공을 위한 대체 메커니즘에 대한 경제적 분석 (An Economic Analysis of Alternative Mechanisms for Optimal IT Security Provision within a Firm)

  • 류승희
    • 벤처창업연구
    • /
    • 제8권2호
    • /
    • pp.107-117
    • /
    • 2013
  • 본 연구의 주요 목표는 정보기술보안(IT security) 관련 투자의 경제적 특성을 조사하고 기업 내 최적의 정보기술보안 자원의 제공을 위한 대체적인 메커니즘을 비교하는데 있다. 정보기술 보안의 최적 수준과 기업 내 다양한 사용자 간의 비용분담 방식에 대한 중요한 의사결정에 유용한 지침을 제공하는 경제적인 연구는 많지 않다. 이에 대한 기초연구로서, 본 연구는 첫째, 정보기술 보안 자원이 소비의 비경합성(nonrivalry)과 혜택의 비배재성(nonexcludability)이라는 순수공공재(pure public goods)의 특성을 공유하고 있다는 것을 설명한다. 또한, 정보기술보안 제공은 개인사용자의 정보보안자원의 가치평가에 있어서 정보 비대칭성의 문제를 갖고 있다. 분석적인 틀을 통하여, 본 연구는 개별적인 효용극대화 방식은 기업 전체에서의 효율적인 제공 조건을 반드시 충족하는 것은 아니라는 것을 보여준다. 즉, 개별적인 방식은 비최적(suboptimal)의 방안, 특히 정보기술보안 자원이 부족한 수준에서 제공되는 결과를 초래한다. 이러한 문제는 무임승차(free-riding) 문제로도 알려져 있는 순수공공재의 비배재성이라는 특성에 주로 기인한다. 집단적인 의사결정의 근본적인 문제는 진실한 정보의 표출을 유도하고 정보비칭적인 구조에서 최적수준의 정보자원보안 관련 재화를 선택하는 메커니즘의 설계에 있다. 본 연구는 정보기술보안 자원의 제공이라는 문제 안에서 세 가지 대체적인 수요현시메커니즘(demand-revealing mechanisms), 즉 클락-그로브즈 메커니즘(Clarke-Groves mechanism), 기대효용 극대와 메커니즘(expected utility maximizing mechanism), 그로브즈-레야드 메커니즘(Groves-Ledyard mechanism)을 비교 분석한다 이 메커니즘들의 주요 특성이 각 메커니즘의 장점, 단점, 실제 다양한 적용가능성과 함께 논의된다. 마지막으로, 본 연구의 한계와 미래 연구 방향이 논의된다.

  • PDF

안전한 접근 경로를 보장하기 위한 접근 제어 (Access Control for Secure Access Path)

  • 김현배
    • 정보교육학회논문지
    • /
    • 제1권2호
    • /
    • pp.57-66
    • /
    • 1997
  • The primary purpose of security mechanisms in a computer systems is to control the access to information. There are two types of access control mechanisms to be used typically. One is discretionary access control(DAC) and another is mandatory access control(MAC). In this study an access control mechanism is introduced for secure access path in security system. The security policy of this access control is that no disclosure of information and no unauthorized modification of information. To make this access control correspond to security policy, we introduce three properties; read, write and create.

  • PDF

무선센서네트워크에서의 취약성 및 보안 메카니즘의 분석 (Analyses of Vulnerability and Security Mechanisms in Wireless Sensor Networks)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2009년도 춘계학술대회
    • /
    • pp.805-808
    • /
    • 2009
  • Security has become a major concern for many real world applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all these approaches are based on wellknown cryptographic algorithms. At the same time, performance studies have shown that the applicability of sensor networks strongly depends on effective routing decisions or energy aware wireless communication. In this paper, we analyses vulnerability and security mechanisms in wireless sensor networks.

  • PDF

IP camera security: "Security Eyes"

  • Alshamrani, Sultan S
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.75-80
    • /
    • 2022
  • With the rapid growth of Internet of Things (IoT) applications and devices, there are still defects in safety and privacy. Current researches indicate that there are weak security mechanisms to protect these devices. Humans use the Internet of Things to control and connect their devices with the Internet. Using the Internet of things has been increased over time. Therefore, capture of sensitive user data has increased intentionally or not [1]. The IP Camera is a type of (IOT) devices. Therefore, in this paper we aim to create a "Security Eyes" application that protects IP Cameras from security attacks according to certain security mechanisms (increasing the strength of encryption and filling the usual security holes in IP cameras … etc) and alerts the user when the live broadcast is interrupted or an error occurs.

Modbus 기반 SCADA 제어 시스템의 보안 취약성 향상에 관한 연구 (A Study on Improving the Security Vulnerabilities of Modbus-Based SCADA Control Systems)

  • 조바니 카가라반;김석수;하경재
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2009년도 춘계학술발표논문집
    • /
    • pp.421-424
    • /
    • 2009
  • SCADA control systems and protocols are developed based on reliability, availability, and speed but with no or little attention paid to security. Specifically in Modbus protocol, there are inherent security vulnerabilities in their design. The lack of common security mechanisms in the protocol such as authentication, confidentiality and integrity must be addressed. In this paper, security vulnerabilities of Modbus-based SCADA controls systems will be studied. An in-depth analysis of the message frame formats being sent between master and slave will be discussed to expose the security vulnerabilities. This will enable SCADA users to find ways to fix the security flaws of the protocol and design mitigation strategies to reduce the impact of the possible attacks. Security mechanisms are recommended to further enhance the security of SCADA control systems.

  • PDF

웹서비스 대상 경량화 된 응용계층 DDoS 공격 대응 메커니즘 (Light-weight Defense Mechanisms for application layer DDoS Attacks in the Web Services)

  • 이태진;임채수;임채태;정현철
    • 정보보호학회논문지
    • /
    • 제20권5호
    • /
    • pp.99-110
    • /
    • 2010
  • 네트워크 대역폭 소모 위주로 발생했던 DDoS 공격이 최근에는 웹서비스 대상 응용계층에서의 DDoS 공격 위주로 발생하고 있다. 응용계층 DDoS 공격은 Source IP당 발생하는 트래픽이 감소하고 정상 사용자의 트래픽과 유사한 형태로 진화하고 있어 기존 Threshold 기반 탐지기법으로 대응하기 어렵다. 본 논문에서는 발생 가능한 Get Flooding의 모든 유형을 도시하고, 간단하면서도 강력한 3가지 대응 메커니즘을 제시한다. 특허, 제안된 메커니즘은 현재까지 발생한 모든 DDoS 공격도구를 탐지 및 차단할 수 있으며, 성능분석 결과 상용 환경에 적용할 수 있을 것으로 예상된다.

Healthcare Security based on Blockchain

  • Almalki, Taghreed;Alzahrani, Shahad;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.149-160
    • /
    • 2021
  • One of the most important inventions and developments in the digital world today is the healthcare system based on blockchain technology. Healthcare is an important field that requires the application of security mechanisms due to the sensitivity of patient data. The association of blockchain with healthcare contributed to achieving better security mechanisms than the traditional approach. The new approach operates in a decentralized system, which in turn, improves security in the healthcare environment. Consequently, blockchain technology has emerged as one of the most crucial solutions to security violations and challenges in the healthcare industry. This paper provides a comprehensive review of several experts' recent protection and detection approaches in this domain. It is also imperative to note that the paper focuses only on the recent techniques that have been published during 2017-2020. The sophisticated procedures have been investigated and discussed in terms of similarities and differences to highlight the significance of the protection needed to secure the healthcare environment.