• Title/Summary/Keyword: Security test

Search Result 1,292, Processing Time 0.027 seconds

A Risk Analysis Methodology for Information Systems Security Management (정보시스템 보안관리를 위한 위험분석 방법론)

  • 이문구
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.6
    • /
    • pp.13-22
    • /
    • 2004
  • This study proposes a risk analysis methodology for information system security management in which the complexity on the procedure that the existing risk analysis methodology is reduced to the least. The proposed risk analysis methodology is composed of 3 phases as follows: beforehand processing phase, counter measure setting phase, post processing phase. The basic risk analysis phase is a basic security management phase in which fixed items are checked when the information security system is not yet established or a means for the minimum security control is necessary for a short period of time. In the detailed risk analysis phase, elements of asset a vulnerability, and threat are analysed, and using a risk degree production table produced from these elements, the risk degree is classified into 13 cases. In regard to the risk, the 13 types of risk degree will execute physical, administrative, and technical measures through ways such as accepting, rejecting, reducing, and transferring. Also, an evaluation on a remaining risk of information system is performed through a penetration test, and security policy set up and post management phase is to be carried out.

Implementation of a High Performance SEED Processor for Smart Card Applications (스마트카드용 고성능 SEED 프로세서의 구현)

  • 최홍묵;최명렬
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.37-47
    • /
    • 2004
  • The security of personal informations has been an important issue since the field of smart card applications has been expanded explosively. The security of smart card is based on cryptographic algorithms, which are highly required to be implemented into hardware for higher speed and stronger security. In this paper, a SEED cryptographic processor is designed by employing one round key generation block which generates 16 round keys without key registers and one round function block which is used iteratively. Both the round key generation block and the F function are using only one G function block with one 5${\times}$l MUX sequentially instead of 5 G function blocks. The proposed SEED processor has been implemented such that each round operation is divided into seven sub-rounds and each sub-round is executed per clock. Functional simulation of the proposed cryptographic processor has been executed using the test vectors which are offered by Korea Information Security Agency. In addition, we have evaluated the proposed SEED processor by executing VHDL synthesis and FPGA board test. The die area of the proposed SEED processor decreases up to approximately 40% compared with the conventional processor.

A Empirical Study on the Patch Impact Assessment Method for Industrial Control Network Security Compliance (산업제어망 보안 컴플라이언스를 위한 패치 영향성 평가 방안에 관한 실증 연구)

  • Choi, Inji
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1141-1149
    • /
    • 2020
  • Most of the industrial control network is an independent closed network, which is operated for a long time after installation, and thus the OS is not updated, so security threats increase and security vulnerabilities exist. The zero-day attack defense must be applied with the latest patch, but in a large-scale industrial network, it requires a higher level of real-time and non-disruptive operation due to the direct handling of physical devices, so a step-by-step approach is required to apply it to a live system. In order to solve this problem, utility-specific patch impact assessment is required for reliable patch application. In this paper, we propose a method to test and safely install the patch using the regression analysis technique and show the proven results. As a patch impact evaluation methodology, the maximum allowance for determining the safety of a patch was derived by classifying test types based on system-specific functions, performance, and behavior before and after applying the patch. Finally, we report the results of case studies applied directly to industrial control networks, the OS patch has been updated while ensuring 99.99% availability.

A Study on the Effects of Determinants of Casino Security Management Service Quality on Organizational Trust and Loyalty of Internal Customers (카지노 보안관리 서비스품질 결정요인이 내부고객의 조직신뢰 및 충성도에 미치는 영향)

  • Lee, Seung-Hoon;Kang, Min-Wan;Chun, Yong-Tae
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.115-153
    • /
    • 2015
  • This study identified the cause-and-effect relationship of security management service quality by empirically analyzing whether the performance factors affecting the casino industry are improved when the quality of the security management service is improved. For this, Partial Least Squares (PLS) that can deduce the structural relationship between variables was used. To verify the representativeness of the population, SPSS 19.0 was utilized in a demographic analysis, a independent T-test and Scheffe test. The analysis of the data revealed that the casino industry must preferentially manage assurance, empathy, and security to improve the casino security management service quality, and that, of these, security was the most important factor. To help improve service quality, a theoretical and empirical basis that can consider the importance and priority of individual factors was presented based on the result of this analysis. It also revealed that the security management service is an essential factor for stable business activities of casinos. Further, the importance of the role of the security management service in business strategy formulation for improving the industry performance was recognized through the study results. A service quality improvement method was provided by focusing on the factors that must be preferentially considered for service quality improvement; moreover, implications that can predict the results of such method were presented.

  • PDF

A Study of Unit Testing Frameworks on Open Source C++ (오픈 소스 C++에서의 유닛 테스팅 프레임워크에 관한 고찰)

  • Heo, Seok-Yeol;Sohn, Young-Ho
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.33-39
    • /
    • 2013
  • Unit testing is proved to be vital for a successful software development process. Modern languages, such as Python, Java and C#, have a great support and tools for unit testing. But when it comes to C++, there are a big number of C++ frameworks available [List], and it becomes hard to make a choice of unit testing framework to use. This paper presents a survey of open source C++ unit testing frameworks by dividing open source C++ unit testing frameworks into two groups: frameworks with an integrated test runner and frameworks with a separate test runner.

A Design of an AES-based Security Chip for IoT Applications using Verilog HDL (IoT 애플리케이션을 위한 AES 기반 보안 칩 설계)

  • Park, Hyeon-Keun;Lee, Kwangjae
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.67 no.1
    • /
    • pp.9-14
    • /
    • 2018
  • In this paper, we introduce an AES-based security chip for the embedded system of Internet of Things(IoT). We used Verilog HDL to implement the AES algorithm in FPGA. The designed AES module creates 128-bit cipher by encrypting 128-bit plain text and vice versa. RTL simulations are performed to verify the AES function and the theory is compared to the results. An FPGA emulation was also performed with 40 types of test sequences using two Altera DE0-Nano-SoC boards. To evaluate the performance of security algorithms, we compared them with AES implemented by software. The processing cycle per data unit of hardware implementation is 3.9 to 7.7 times faster than software implementation. However, there is a possibility that the processing speed grow slower due to the feature of the hardware design. This can be solved by using a pipelined scheme that divides the propagation delay time or by using an ASIC design method. In addition to the AES algorithm designed in this paper, various algorithms such as IPSec can be implemented in hardware. If hardware IP design is set in advance, future IoT applications will be able to improve security strength without time difficulties.

Demand Survey Method for Commercialization of Police Science Technology and Equipment

  • Myeonggi, Hong;Junho, Park;JeongHyeon, Chang;Seongju, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.609-625
    • /
    • 2023
  • This study is a demand research for the selection of public safety science and technology equipment and suggests an empirical research method. The technology demand survey is the beginning of the selection of innovative technology. And it is the basis of collecting information required for the technology required in the market and helping to apply it to the field. The demand survey for police science and technology can reduce the uncertainty of crime prevention and help the smooth implementation of security policies. However, in Korea, adoption of security science and technology equipment was centered on social issues or researchers' opinions rather than the demands of field users. Until, there was no research has been conducted on the demands of field police officers for selection of security science and technology equipment in Korea. Also, there was no preferential study for the demand for security science and technology equipment. Therefore, this study proposes a methodology that can systematically identify the needs for the technology and equipment of field experts suitable for the public security situation for the selection of security science and technology equipment. Specifically, we propose a sample design for a technology classification system and a survey tool for technology awareness and satisfaction. It is expected that this tool will provide a classification system for security science and technology equipment selected for the Korean police and will help determine the priority of equipment suitable for the field.

A Plan to Improve Core Job Skills through the Level Management System : Focusing on the X-ray Screening Rating System (수준관리체계를 통한 핵심 직무역량 향상 방안 - 보안검색요원 판독등급제 중심으로 -)

  • Kim, Dong Min;Baek, Jeong Seon
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.4
    • /
    • pp.677-689
    • /
    • 2023
  • Purpose: The purpose of this study is to design a x-ray screening rating system to improve X-ray screening ability, which is a core job competency of security screener at Incheon International Airport, and to verify its effectiveness through empirical analysis to suggest ways to improve the level management system. Methods: In this study, the effectiveness of the research model was analyzed using T-test tests for effect analysis based on the empirical analysis results derived through the competency evaluation model, the screening rating system. Results: The results of this study are as follows. The average score for regular education before the implementation of the x-ray screening rating system was 94.1 points, but after the implementation of the x-ray screening rating system, the average score for regular education was 95.5 points, an average of 1.4 points increased. In addition, the proportion of those with 95 or more points classified as high scorers also increased significantly from 51.1% to 69.3%. Conclusion: The X-ray screening rating system of security inspectors will systematically manage the level of screening ability, which is a key job competency, and play a strong role in improving competency, while preventing security accidents through early identification and intensive training of level-lowers.

An Implementation Strategy for the Physical Security Threat Meter Using Information Technology (정보통신 기술을 이용한 물리보안 위협 계수기 구현 전략)

  • Kang, Koo-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.47-57
    • /
    • 2014
  • In order to publicly notify the information security (Internet or Cyber) threat level, the security companies have developed the Threat Meters. As the physical security devices are getting more intelligent and can be monitored and managed through networks, we propose a physical security threat meter (PSTM) to determine the current threat level of physical security; that is a very similar compared with the one of information security. For this purpose, we investigate and prioritize the physical security events, and consider the impact of temporal correlation among multiple security events. We also present how to determine the threshold values of threat levels, and then propose a practical PSTM using the threshold based decision. In particular, we show that the proposed scheme is fully implementable through showing the block diagram in detail and the whole implementation processes with the access controller and CCTV+video analyzer system. Finally the simulation results show that the proposed PSTM works perfectly under some test scenarios.

A Study on the Marine Civil Guard Officer to Enhance the Quality of Maritime Security Services (해양경비 서비스 품질 개선을 위한 해양경비사 제도에 관한 연구)

  • Jin, Seong-Ryong;Lee, Eun-Bang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.19 no.1
    • /
    • pp.45-51
    • /
    • 2013
  • In order to facilitate the private maritime security system with high quality guard services, the status of private security companies and the security instructor system which has been operated in land side, are analyzed. Through screening the spectrums of private maritime security and analyzing the status of maritime security guard, the characteristics and expertise of maritime guard service, and it's system need are elicited. we propose the system of marine civil guard officer who will play a major role in private maritime security domain, and design the job requirements, the subjects of qualification test and the education program to enhance his professionalism and practicality. Moreover, the enactment of a provision on marine guard company in Marine guard law will be the platform to develop a private maritime security industry and to strengthen international competitiveness through supervising and piloting private guard service at sea by Korea coast guard.