• Title/Summary/Keyword: Security requirements

Search Result 1,093, Processing Time 0.026 seconds

The Analysis of the security requirements for a circulation of the classified documents (비밀문서유통을 위한 보안 요구사항 분석)

  • Lee, Ji-Yeong;Park, Jin-Seop;Kang, Seong-Ki
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.361-390
    • /
    • 2003
  • In this paper, we analyze the security requirement for a circulation of the classified documents. During the whole document process phases, including phases of drafting, sending/receiving messages, document approval, storing and saving, reading, examining, out-sending and canceling a document, we catch hold of accompanied threat factors and export every threat factors of security. We also propose an appropriate and correspondent approach for security in a well-prepared way. Last, we present the security guidelines for security architecture of the classified documents circulation.

  • PDF

Analysis and Classification of Security Threats based on the Internet Banking Service (인터넷 뱅킹 서비스에서의 보안위협 분류 및 분석)

  • Lee, Kyung-Roul;Lee, Sun-Young;Yim, Kang-Bin
    • Informatization Policy
    • /
    • v.24 no.2
    • /
    • pp.20-42
    • /
    • 2017
  • In this paper, we focus on classification of security threats and definitions of security requirements for Internet banking service. Threats are classified based on the past and potential incidents, based upon which we will be able to propose security requirements. In order to identify security threats, the structure of the Internet banking service is classified into three sections - the financial institutions, the network, and the user-terminal - and we defined arising threats for each section. We focused the analysis especially on the user-terminal section, which is relatively vulnerable, causing difficulties in securing stability of the service as a whole. The analyzed security threats are expected to serve the foundation for safe configuration of various Internet banking services.

Why Dynamic Security for the Internet of Things?

  • Hashemi, Seyyed Yasser;Aliee, Fereidoon Shams
    • Journal of Computing Science and Engineering
    • /
    • v.12 no.1
    • /
    • pp.12-23
    • /
    • 2018
  • The Internet of Things (IoT) ecosystem potentially includes heterogeneous devices with different processing mechanisms as well as very complicated network and communication models. Thus, analysis of data associated with adverse conditions is much more complicated. Moreover, mobile things in the IoT lead to dynamic alteration of environments and developments of a dynamic and ultra-large-scale (ULS) environment. Also, IoT and the services provided by that are mostly based on devices with limited resources or things that may not be capable of hosting conventional controls. Finally, the dynamic and heterogeneous and ULS environment of the IoT will lead to the emergence of new security requirements. The conventional preventive and diagnostic security controls cannot sufficiently protect it against increasing complication of threats. The counteractions provided by these methods are mostly dependent on insufficient static data that cannot sufficiently protect systems against sophisticated and dynamically evolved attacks. Accordingly, this paper investigates the current security approaches employed in the IoT architectures. Moreover, we define the dynamic security based on dynamic event analysis, dynamic engineering of new security requirements, context awareness and adaptability, clarify the need for employment of new security mechanism, and delineate further works that need to be conducted to achieve a secure IoT.

Threat Diagnosis and Security Verification of Services Using Server-Side Browsers (서버 측 브라우저를 활용한 서비스들의 보안 위협 진단 및 안전성 검증)

  • Min-sang Lee;Hyoung-kee Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.693-706
    • /
    • 2024
  • The browser is utilized to render web pages in programs that perform tasks such as data extraction, format conversion, and development testing on web pages. Online services that utilize browsers can cause security issues if browser information is exposed or used in an unsafe manner. This paper presents security requirements for the safe use of browsers and explains the security threats that arise if these requirements are not met. Through evaluation, the security verification of commercial web applications is conducted, and the vulnerabilities that allow browsers to be exploited as attack tools are analyzed.

Overview of SAE/LTE security

  • Prasad, Anand R.;Zhang, Xiaowei
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.1
    • /
    • pp.36-43
    • /
    • 2013
  • This paper provides an overview of the security in the System Architecture Evolution (SAE) / Long-Term Evolution (LTE) system. Security is an integral part of SAE/LTE with improvements over the Third Generation (3G) system. This paper reviews the SAE/LTE system architecture, and discusses the security requirements, algorithms, Authentication and Key Agreement (AKA), Security Mode Command (SMC), key hierarchy and security for mobility.

  • PDF

A Study on the Importer Security Filing and Additional Carrier Requirements(10+2 rule) in U.S. (미국 관세청의 선적전 추가 보안관련 정보 제출법안(10+2 Rule)에 관한 연구)

  • Song, Seon-Uk
    • International Commerce and Information Review
    • /
    • v.10 no.4
    • /
    • pp.395-416
    • /
    • 2008
  • The advance information for oceangoing cargoes destined to th United States enable CBP to evaluate the potential risk of smuggling WMD and to facilitate the prompt release of legitimate cargo following its arrival in the Unites States. On January 1, 2008, CBP promulgate regulations, also known as 10+2 rule, to require the electronic transmission of additional data elements for improved high-risk targeting, including appropriate security elements of entry data for cargo destined to the United States by vessel prior to loading of such cargo on vessels at foreign seaports. The potential impact to an importer's international supply chain will be as follows ; Firstly, importers will take incremental supply chain costs and filing costs. Secondly, anticipate delay in shipment of containerized cargo. Thirdly, importers could be charged fines if they fail to file and file inaccurate or missing data. Companies exporting to the United States should be interested in 10+2 rule, analyze their current processes and procedures to ensure that they are prepared to handle the additional filing requirements of 10+2 rule. And they should focus on how 10+2 impacts their supply chain in terms of costs and sourcing. They will be necessary to revise service legal agreements with their forwarders, customs brokers or carriers in order to meet filing requirements of 10+2 rule.

  • PDF

A Study on Application Method of Crypto-module for Industrial Control System (산업제어시스템(ICS) 암호모듈 적용방안 연구)

  • Seok, Byoungjin;Kim, Yeog;Lee, Changhoon
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.1001-1008
    • /
    • 2017
  • Because cyber attacks on industrial control systems can lead to massive financial loss or loss of lives, the standardization and the research on cyber security of industrial control systems are actively under way. As a related system, the industrial control system of social infrastructures must be equipped with the verified cryptographic module according to the e-government law and appropriate security control should be implemented in accordance with the security requirements of the industrial control system. However, the industrial control system consisting of the operation layer, the control layer, and the field device layer may cause a problem in performing the main function in each layer due to the security control implementation. In this paper, we propose things to check when performing security control in accordance with the security control requirements for each layer of the industrial control system and proper application.

Review of technology requirements of safety, security cargo for High speed freight train (고속화물열차 화물안전보안 기술요구사항 검토)

  • Han, Seong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2015.07a
    • /
    • pp.1595-1596
    • /
    • 2015
  • This study presents the review of technical requirements of safety and security for the developed high-speed freight train which will be serviced on the existing route of the high-speed line. There is no any experience to make a system design of high-speed freight train in Korea until now. We need to make a new regulations of commercial service.

  • PDF

Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management (대규모 네트워크 환경에서의 보안관리를 위한 보안평가 시스템 설계)

  • 이재승;김상춘
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.776-786
    • /
    • 2003
  • Security Evaluation System is a system that evaluates the security of the entire enterprise network domain which consists of various components and that supports a security manager or a Security Management System in making decisions about security management of the enterprise network based on the evaluation. It helps the security manager or the security management system to make a decision about how to change the configuration of the network to prevent the attack due to the security vulnerabilities of the network. Security Evaluation System checks the “current status” of the network, predicts the possible intrusion and supports decision-making about security management to prevent the intrusion in advance. In this paper we analyze the requirements of the Security Evaluation System that automates the security evaluation of the enterprise network which consists of various components and that supports decision-making about security management to prevent the intrusion, and we propose a design for it which satisfies the requirements.

Implementation of Security Kernel based on Linux OS (리눅스 운영체제 기반의 보안 커널 구현)

  • Shon, Hyung-Gil;Park, Tae-Kyou;Lee, Kuem-Suk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.145-154
    • /
    • 2003
  • Current security efforts provided in such as firewall or IDS (intrusion detection system) of the network level suffer from many vulnerabilities in internal computing servers. Thus the necessity of secure OS is especially crucial in today's computing environment. This paper identifies secure OS requirements, analyzes tile research trends for secure Linux in terms of security kernel, and provides the descriptions of the multi-level security(MLS) Linux kernel which we have implemented. This security kernel-based Linux meets the minimum requirements for TCSEC Bl class as well providing anti-hacking, real-time audit trailing, restricting of root privileges, and enterprise suity management functions.