• Title/Summary/Keyword: Security technologies

Search Result 1,846, Processing Time 0.026 seconds

Correlation Analysis in Information Security Checklist Based on Knowledge Network (지식 네트워크에 근거한 정보보호 점검기준 관계분석)

  • Jin, Chang Young;Kim, Ae Chan;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.2
    • /
    • pp.109-124
    • /
    • 2014
  • As the emerged importance and awareness for information security, It is being implemented by each industrial sector to protect information assets. In this paper, we analyze the information security checklists or security ratings criteria to derive similarity and difference in context which used to knowledge network analysis method. The analyzed results of all checklists (ISMS, PIMS, 'FSS', 'FISS', 'G') are as follows : First, It is common factors that the protection of information systems and information assets, incident response, operations management. Second, It deals with relatively important factors that IT management, the adequacy of audit activities in the financial IT sector including common factors. Third, the criteria of ISMS contains the majority of the contents among PIMS, 'FSS', 'FISS'and 'G'.

Design of Improved Authentication Protocol for Sensor Networks in IoT Environment (사물인터넷 환경에서 센서 네트워크에 대한 개선된 인증 프로토콜 설계)

  • Kim, Deuk-Hun;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.467-478
    • /
    • 2015
  • Recently interest in Internet of Things(IoT) is increasing, and a variety of the security technologies that are suitable for Internet of Things has being studied. Especially sensor network area of the device is an increased using and diversified for a low specification devices because of characteristic of the Internet of Things. However, there is difficulty in directly applying the security technologies such as the current authentication technologies to a low specification device, so also increased security threats. Therefore, authentication protocol between entities on the sensor network communication in Internet of Things has being studied. In 2014, Porambage et al. suggested elliptic curve cryptography algorithm based on a sensor network authentication protocol for advance security of Internet of Things environment, but it is vulnerability exists. Accordingly, in this paper, we analyze the vulnerability in elliptic curve cryptography algorithm based on authentication protocol proposed by Porambage et al. and propose an improved authentication protocol for sensor networks in Internet of Things environment.

Development of Information Security Practice Contents for Ransomware Attacks in Digital Twin-Based Smart Factories (디지털트윈 기반의 스마트공장에서 랜섬웨어 공격과 피해 분석을 위한 정보보안 실습콘텐츠 시나리오 개발)

  • Nam, Su Man;Lee, Seung Min;Park, Young Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1001-1010
    • /
    • 2021
  • Smart factories are complex systems which combine latest information technology (IT) with operation technology (OT). A smart factory aims to provide manufacturing capacity improvement, customized production, and resource reduction with these complex technologies. Although the smart factory is able to increase the efficiency through the technologies, the security level of the whole factory is low due to the vulnerability transfer from IT. In addition, the response and restoration of the business continuity plan are insufficient in case of damage due to the absence of factory security experts. The cope with the such problems, we propose an information security practice content for analyzing the damage by generating ransomware attacks in a digital twin-based smart factory similar to the real world. In our information security content, we introduce our conversion technique of physical devices into virtual machines or simulation models to build a practical environment for the digital twin. This content generates two types of the ransomware attacks according to a defined scenario in the digital twin. When the two generated attacks are successfully completed, at least 8 and 5 of the 23 virtual elements are take damage, respectively. Thus, our proposed content directly identifies the damage caused by the generation of two types of ransomware in the virtual world' smart factory.

Use of Innovation and Information Technologies In Music Lessons

  • Potapchuk, Tetiana;Fabryka-Protska, Olga;Gunder, Liubov;Dutchak, Violetta;Osypenko, Yaroslav;Fomin, Kateryna;Shvets, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.300-308
    • /
    • 2021
  • The processes of informatization of the modern educational space are inextricably linked with the active introduction of innovative information technologies, which diversify the forms of education and upbringing. The use of these technologies in education due to their specific properties significantly enhances the clarity of learning, emotional impact on students, helps to deepen interdisciplinary links, intensifies students' work, and improves the organization of educational activities. Innovative information technologies offer new opportunities for the use of text, audio, graphic, and video information in lessons, enriching the methodological possibilities of the lesson. Today, the use of these technologies is becoming an integral part of the study of any subject. Using multimedia presentations, publications, and websites created by students in the learning process, they can develop learning skills. According to researchers, there are many multimedia programs for working with a computer in a music lesson, namely: a music player, a program for singing karaoke, a music constructor, music encyclopedias, and training programs. The introduction of innovative information technologies in the system of music education allows expanding learning opportunities.

The Introduction of Modern Technologies in Public Administration in the Context of Globalization

  • Dragomyretska, Natalia;Palagnyuk, Yuliana;Andriyash, Viktoria;Matvieienko, Iryna;Samofalov, Dmytro
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.334-340
    • /
    • 2022
  • The main purpose of the study is to determine the main aspects of the introduction of modern technologies in the public administration system in the context of globalization. Public administration is inherent in all known models of representation of social systems, characteristic management and other sciences of social management. This allows using the methods and technologies of management, marketing, social partnership and others in public administration and administration at a modern level. One of the main directions of public management and administration is social engineering, aimed at the development and development of the country's social system, and the tool is appropriate technologies. Based on the results of the analysis, the key modern technologies of the public administration system were identified in the context of the impact of globalization.

Decision Support System Regarding the Possibility of Using the Reproductive Technologies Taking into Account Civil Law

  • Hnatchuk, Yelyzaveta;Hovorushchenko, Tetiana;Medzatyi, Dmytro
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.413-420
    • /
    • 2022
  • The review of known methods and decision support systems regarding the possibility of using the reproductive technologies showed that currently there are no methods and decision support systems regarding the possibility of using reproductive technologies taking into account civil law. Although the analyzed methods and systems have great potential for use in different contexts, these methods and systems do not take into account the civil law requirements of any country. The paper has developed a decision support system regarding the possibility of using the reproductive technologies taking into account civil law, which automatically and free of charge determines the possibility/impossibility of surrogate motherhood or in vitro fertilization. If it is determined that surrogate motherhood or in vitro fertilization is impossible, the sufficiency of the information in the analyzed contract is evaluated, and the reasons for the impossibility of surrogate motherhood or in vitro fertilization are presented to the user.

Decision making model for introducing Medical information system based on Block chain Technologies (블록체인 기반 의료정보시스템 도입을 위한 의사결정모델)

  • Zheng, Yajun;Kim, Keun Hyung
    • The Journal of Information Systems
    • /
    • v.29 no.1
    • /
    • pp.93-111
    • /
    • 2020
  • Purpose The purpose of this paper is to observe the relative priorities of importances among the modified versions of Block chain system, being based on AHP decision support model which should be also proposed in this paper. Design/methodology/approach Four versions modified from the beginning of Block chain were divided into Public& Permissionless, Private&Permissionless, Public&Permissioned and Private&Permissioned types. Five criteria for evaluating the four versions whether the version were suitable for Medical information system were introduced from five factors of Technologies Accept Model, which were Security, Availability, Variety, Reliability and Economical efficiency. We designed Decision support model based on AHP which would select the best alternative version suitable for introducing the Block chain technology into the medical information systems. We established the objective of the AHP model into finding the best choice among the four modified versions. First low layer of the model contains the five factors which consisted of Security, Availability, Variety, Reliability and Economical efficiency. Second low layer of the model contains the four modified versions which consisted Public&Permissionless, Private&Permissionless, Public&Permissioned and Private& Permissioned types. The structural questionnaire based on the AHP decision support model was designed and used to survey experts of medical areas. The collected data by the question investigation was analyzed by AHP analysis technique. Findings The importance priority of Security was highest among five factors of Technologies Accept Mode in the first layer. The importance priority of Private&Permissioned type was highest among four modified versions of Block chain technologies in second low layer. The second importance priority was Private&Permissionless type. The strong point of Private&Permissioned type is to be able to protect personal information and have faster processing speeds. The advantage of Private& Permissionless type is to be also able to protect personal information as well as from forging and altering transaction data. We recognized that it should be necessary to develop new Block chain technologies that would enable to have faster processing speeds as well as from forging and altering transaction data.

A Study on Security Threats and Countermeasures in Smart Farm Environments (스마트 팜 환경에서 보안 위협 및 대응 방안에 관한 연구)

  • Sun-Jib Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.53-58
    • /
    • 2024
  • IoT, Big-data, AI, and Cloud technologies, which are core technologies of the 4th Industrial Revolution, have recently been applied to various fields and are being used as core technologies for new growth engines. Accordingly, these core technologies are applied to the agricultural field without exception, contributing to solving the problem of labor shortage, reducing production costs, and reducing environmental burden through remote and automated production without time and space constraints. However, as these core technologies are utilized, security incidents are occurring in the agricultural field as well. Accordingly, this study divides smart farms into three stages(Basic, Middle, and High) and presents the characteristics and security threats of each stage. In particular, as the number of container-based services and research increases under cloud platforms, we would like to suggest countermeasures focusing on security threats.

A Study on Strengthening of Vehicle Cybersecurity based on Patent Data - Searching New Technologies to be Strengthened in the Vehicle Cybersecurity and Security Requirements based on Patent Analysis- (특허데이터를 활용한 자동차 사이버보안 강화방안 연구 - 특허분석을 통해 자동차 사이버보안 강화필요한 신규기술 탐색 및 보안요구사항 탐색 -)

  • Dong-Han Kwak;Hun-Yeong Kwon
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.91-100
    • /
    • 2023
  • Vehicles are changing in the direction of utilizing various ICT technologies. Accordingly a number of software has been installed in vehicles, resulting in cybersecurity threats such as hacking. So each country is preparing legal regulations to secure vehicles cybersecurity. However, the enactment of legal regulations is bound to be relatively slow compared to the speed of development of vehicles technology, so it is necessary to revise the legal regulations by continuously monitoring of vehicles technology development trends. In this study, we search and analyze the latest vehicles cybersecurity patent applications to explore new technologies that require supplementation of vehicles cybersecurity. Threat technologies/security requirements for new technologies are presented through patent analysis

A Study on android emulator detection for mobile game security (모바일 게임 보안을 위한 안드로이드 에뮬레이터 탐지방법에 관한 연구)

  • Yoon, Jongseong;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1067-1075
    • /
    • 2015
  • With the recent increase of the number of mobile game users, the side effects such as the manipulation of game points, levels and game speed and payment fraud are emerging. Especially, the emulators which make it possible for mobile applications to run on PC is a great threat to mobile game security since debugging specific game application or automating the game playing can be done easier with them. Therefore, we research the efficient ways to detect widely used Android Emulators such as BlueStacks, GenyMotion, Andy, YouWave and ARC Welder from the perspective of client(app), game server and network to reduce threat to mobile game security.