• 제목/요약/키워드: Security science

검색결과 6,086건 처리시간 0.026초

보안 인지 및 실천 현황 분석을 통한 대학 연구정보보안 수준 제고 방안 (Improving Research Information Security in Academic Institutes through the Analysis of Security Awareness and Activities)

  • 박일형;김성우;서승우
    • 정보보호학회논문지
    • /
    • 제20권2호
    • /
    • pp.91-108
    • /
    • 2010
  • 대학은 국가적으로 연구개발비 및 연구인력 측면에서 큰 비중을 차지하고 있는 핵심연구기관임에도 불구하고 연구정보보안에 대한 투자가 소홀하여 연구정보 유출이 우려되고 있는 것이 현실이다. 이와 관련, 본 논문에서는 연구정보 유출을 예방하기 위한 노력의 일환으로 대학 구성원의 보안 인지수준과 실천수준을 분석하고 대학내 연구정보보안 수준 제고를 위한 구체적 방안을 제시한다. 이를 위해 먼저 대학 구성원을 대상으로 실시한 설문조사 결과를 분석하여 연구정보보안 및 보안의식에 관련된 현황을 파악한다. 이를 바탕으로 상관관계분석, 일원배치 분산분석, 다중회귀분석 등 통계분석을 실시하여 정보보안의식 및 보안실천수준, 전임교원 보안수준, 연구실 정보보안 관리절차와 같은 문제점들이 존재함을 보인다. 마지막으로 분석결과를 기반으로 교육 홍보를 통한 보안지식 및 의식 개선, 연구책임자 의무사항을 포함하는 연구실 보안관리 규정 제정, 정보유출방지 출입자 통제 솔루션 등의 보안수준 향상을 위한 대책들을 제시한다.

보안관제 효율성 제고를 위한 실증적 분석 기반 보안이벤트 자동검증 방법 (An Auto-Verification Method of Security Events Based on Empirical Analysis for Advanced Security Monitoring and Response)

  • 김규일;박학수;최지연;고상준;송중석
    • 정보보호학회논문지
    • /
    • 제24권3호
    • /
    • pp.507-522
    • /
    • 2014
  • 국내 사이버공격 대응 전담조직(CERT)들은 탐지패턴 기반의 보안장비(IDS, TMS 등)를 활용하여 사이버 침해공격에 대한 탐지 대응을 수행하고 있다. 특히, 공공 연구기관의 경우 국가정보원(NIS) 내 국가사이버안전센터(NCSC)를 중심으로 30여개의 부문 보안관제 센터가 구축 운영되고 있으며, 주로 침해위협수집시스템(TMS)을 활용하여 사이버 공격에 대한 탐지 분석 대응을 수행하고 있다. 그러나 현재의 보안관제 체계에서는 대량의 보안이벤트가 보안장비에 의해 발생되고 있을 뿐만 아니라, 보안관제 요원이 보안이벤트에 대한 실제 공격여부를 판단하기 위해서는 추가적인 분석 작업을 수행해야 하므로 보안이벤트 전체에 대한 대응이 현실적으로 불가능한 실정이다. 또한 현재의 보안관제 업무는 보안관제 요원이 보유한 전문지식 및 경험에만 전적으로 의존하고 있기 때문에 특정 보안이벤트에만 분석이 집중되는 업무편중 현상이 발생하며, 이로 인해 기존에 알려지지 않은 새로운 해킹 공격기술에 대한 대응능력이 부족하다. 따라서 본 논문은 실시간 보안관제 및 침해대응 활동의 효율성을 극대화하고 대규모 해킹공격에 대한 조기대응 역량을 강화하기 위해 실제 해킹공격에 대한 실증적 분석에 기반한 대용량 보안이벤트 자동검증 방법을 제안한다.

An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model

  • Tan, Syh-Yuan;Chin, Ji-Jian;Heng, Swee-Huay;Goi, Bok-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권4호
    • /
    • pp.910-922
    • /
    • 2013
  • In 2008, Chin et al. proposed an efficient and provable secure identity-based identification scheme in the standard model. However, we discovered a subtle flaw in the security proof which renders the proof of security useless. While no weakness has been found in the scheme itself, a scheme that is desired would be one with an accompanying proof of security. In this paper, we provide a fix to the scheme to overcome the problem without affecting the efficiency as well as a new proof of security. In particular, we show that only one extra pre-computable pairing operation should be added into the commitment phase of the identification protocol to fix the proof of security under the same hard problems.

A Proposed Framework for the Automated Authorization Testing of Mobile Applications

  • Alghamdi, Ahmed Mohammed;Almarhabi, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.217-221
    • /
    • 2021
  • Recent studies have indicated that mobile markets harbor applications (apps) that are either malicious or vulnerable, compromising millions of devices. Some studies indicate that 96% of companies' employees have used at least one malicious app. Some app stores do not employ security quality attributes regarding authorization, which is the function of specifying access rights to access control resources. However, well-defined access control policies can prevent mobile apps from being malicious. The problem is that those who oversee app market sites lack the mechanisms necessary to assess mobile app security. Because thousands of apps are constantly being added to or updated on mobile app market sites, these security testing mechanisms must be automated. This paper, therefore, introduces a new mechanism for testing mobile app security, using white-box testing in a way that is compatible with Bring Your Own Device (BYOD) working environments. This framework will benefit end-users, organizations that oversee app markets, and employers who implement the BYOD trend.

A double-blockchain architecture for secure storage and transaction on the Internet of Things networks

  • Aldriwish, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.119-126
    • /
    • 2021
  • The Internet of Things (IoT) applications are quickly spread in many fields. Blockchain methods (BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography (ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing (CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

An Overview of Data Security Algorithms in Cloud Computing

  • D. I. George Amalarethinam;S. Edel Josephine Rajakumari
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.65-72
    • /
    • 2023
  • Cloud Computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries; It introduced the notion of 'pay as you use' and revolutionized developments in IT. The rapid growth of modernized cloud computing leads to 24×7 accessing of e-resources from anywhere at any time. It offers storage as a service where users' data can be stored on a cloud which is managed by a third party who is called Cloud Service Provider (CSP). Since users' data are managed by a third party, it must be encrypted ensuring confidentiality and privacy of the data. There are different types of cryptographic algorithms used for cloud security; in this article, the algorithms and their security measures are discussed.

중소기업의 ICT 도입과 사이버 안전에 관한 연구 (ICT Adoption and Cyber Security of Korean SMEs)

  • 정제용
    • 대한안전경영과학회지
    • /
    • 제23권2호
    • /
    • pp.53-63
    • /
    • 2021
  • Small and medium-sized enterprises(SMEs) continue to adopt ICT to gain an edge in organizational innovation and competition. This has a management advantage, but it also brings vulnerabilities as to cyber security. Therefore, the purpose of this study is to conduct an exploratory study on the cyber security situation of SMEs. A survey was conducted on Korean SMEs to determine how well they are connected to ICT and how much they are exposed to cyber security threats. The results suggest two things. First, Korean SMEs are well connected to ICT, but there is a gap between the actual adoption and human recognition of its importance. Second, security threats and breaches affect the majority of SMEs, but several problems including costs have not been properly evaluated. The results of this study are expected to help improve the cyber security management system of Korean SMEs.

Combining Encryption and Preservation in Information Security to Secure Sending a Message

  • Nooh, Sameer
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.285-291
    • /
    • 2022
  • With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.

Review on Software-Defined Vehicular Networks (SDVN)

  • Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.376-388
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular networks and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software-defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and a number of architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

Use of Blockchain to Support the Security of Internet of Things: A Review

  • Saher Un Nisa;Maryam Khalid
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.149-154
    • /
    • 2023
  • Internet of Things (IoT) is now spreading everywhere. It's the technology of every person's need so we can't step back from IoT but we can secure it as it is spreading quickly so it has greater chances of danger and being misused. There is an urgent need to make IoT devices secure from getting cracked or hacked. A lot of methods had tried and still trying to mitigate IoT security issues. In this paper Blockchain is going to be the solution of most of the IoT issues or problems. We have discussed or highlighted security issues with centralized IoT and then provided solution of such security challenges through the use of blockchain because is based on a decentralized technology that is hard to modify or update.