• Title/Summary/Keyword: Smart Banking

Search Result 107, Processing Time 0.024 seconds

Security Attack Analysis for Wireless Router and Free Wi-Fi Hacking Solutions (무선공유기 보안공격 분석 및 무료와이파이 해킹 해결방안)

  • Bae, Hee-Ra;Kim, Min-Young;Song, Su-Kyung;Lee, Seul-Gi;Chang, Young-Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.65-70
    • /
    • 2016
  • As network communication increases by using public WiFi to check e-mail and handling Internet banking, the danger of hacking public routers continues to rise. While the national policy is to further propagate public routers, users are not eager to keep their information secure and there is a growing risk of personal information leakage. Because wireless routers implement high accessibility but are vulnerable to hacking, it is thus important to analyze hacking to tackle the attacks. In this study, an analysis is made of the encryption method used in WiFi and cases of hacking WiFi by security attacks on wireless routers, and a method for tackling the attacks is suggested.

A Technology-Strategy Integrated Digital Forensic Process Framework Considering Government ICT R&D Strategy and ICT Paradigm Shift (정부 ICT R&D 중장기전략과 ICT 패러다임 변화를 반영한 디지털 포렌식 표준정립을 위한 기술-정책적 통합프로세스 프레임워크)

  • Shin, Jun Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1495-1504
    • /
    • 2014
  • Currently information related service such as internet banking, chatting, social network services are quite well smeared into our daily life. Moreover, a rapid growth of service using smart devices brought an importance of security in internet services and a research activation of digital forensic in a crime investigation. This paper presented a previous digital forensic research trend and based on this, suggested a technology-strategy integrated digital forensic process platform, taking a mid-long term government leading ICT R&D strategy and ICT paradigm shift into account.

Machine-Learning Anti-Virus Program Based on TensorFlow (텐서플로우 기반의 기계학습 보안 프로그램)

  • Yoon, Seong-kwon;Park, Tae-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.441-444
    • /
    • 2016
  • Peace on the Korean Peninsula is threatened by physical aggressions and cyber terrors such as nuclear tests, missile launchings, senior government officials' smart phone hackings and DDos attacks to banking systems. Cyber attacks such as vulnerability for the hackings, malware distributions are generally defended by passive defense through the detecting signs of first invasion and attack, data analysis, adding library and updating vaccine programs. In this paper the concept of security program based on Google TensorFlow machine learning ability to perform adding libraries and solving security vulnerabilities by itself is researched and proposed.

  • PDF

One-Handled The Mobile One-Time Password Scheme (단일 제어 모바일 일회용 패스워드 기법)

  • Choi, Jong-Seok;Kim, Ho-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6C
    • /
    • pp.497-501
    • /
    • 2012
  • While increasing online services with developing e-businesses, finance, game companies and others have employed OTP(One-Time Password) to overcome vulnerabilities of static passwords. Existing OTP technology has inconvenience that customers always possess reserved token since requiring the token to generate OTP. In order to supplement the issue we propose mobile OTP generated by mobile devices such as smart phones. Our mobile OTP scheme generates OTP by using a non-linear function based on pairing to eject the collision problem of S/Key scheme universally used to design OTP schemes. Our scheme based on a non-linear function over pairing can complements the collision problem and widely applied to finance and various services to increase security level of the services.

A Study on Open API of Securities and Investment Companies in Korea for Activating Big Data

  • Ryu, Gui Yeol
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.102-108
    • /
    • 2019
  • Big data was associated with three key concepts, volume, variety, and velocity. Securities and investment services produce and store a large data of text/numbers. They have also the most data per company on the average in the US. Gartner found that the demand for big data in finance was 25%, which was the highest. Therefore securities and investment companies produce the largest data such as text/numbers, and have the highest demand. And insurance companies and credit card companies are using big data more actively than banking companies in Korea. Researches on the use of big data in securities and investment companies have been found to be insignificant. We surveyed 22 major securities and investment companies in Korea for activating big data. We can see they actively use AI for investment recommend. As for big data of securities and investment companies, we studied open API. Of the major 22 securities and investment companies, only six securities and investment companies are offering open APIs. The user OS is 100% Windows, and the language used is mainly VB, C#, MFC, and Excel provided by Windows. There is a difficulty in real-time analysis and decision making since developers cannot receive data directly using Hadoop, the big data platform. Development manuals are mainly provided on the Web, and only three companies provide as files. The development documentation for the file format is more convenient than web type. In order to activate big data in the securities and investment fields, we found that they should support Linux, and Java, Python, easy-to-view development manuals, videos such as YouTube.

The Role of Islamic Work Ethics in Spiritual Leadership and Inclusion Practices Relationship During COVID-19

  • AHMAD, Uqba Saeed;NAWAB, Samina;SHAFI, Khuram
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.3
    • /
    • pp.943-952
    • /
    • 2021
  • The Covid-19 pandemic situation has changed all medical priorities. This has put pressure on the World's health sector, which also affects the economy of the whole world. This study aims to study how Islamic work ethics affects the relationship between spiritual leadership and organizational inclusion practices in the health care sector of Pakistan in the COVID-19 situation. This is a mix-method study. Data collected of 158 practicing doctors through survey-based questionnaire and interview was conducted from 30 doctors dealing with direct coronavirus. The organizational inclusion practices variable is used for the first time in a quantitative approach in this study. The reliability and validity of organizational inclusion practices are checked by Adanco, SPSS, and SmartPLS software. For this purpose, data on inclusion practices was also collected from the banking and education sector. Results show that spiritual leadership significantly relates to Islamic work ethics also has a positive connection between spiritual leadership and organizational inclusion practices. Still, Islamic work ethics as a moderator has an insignificant impact on the relationship between spiritual and organizational inclusion practices. Also, from the result, it is verified that the organizational inclusion practices variable is valid and reliable for further studies.

The Moderating Role of Environmental Turbulence between Learning Orientation and SME Performance in the Manufacturing Sector of Pakistan

  • SAJJAD, Ali;IBRAHIM, Yusnidah;SHAMSUDDIN, Jauriyah
    • Journal of Distribution Science
    • /
    • v.20 no.5
    • /
    • pp.1-11
    • /
    • 2022
  • Purpose: This study attemptsto investigate the moderating effects of environmental turbulence (ET) between learning orientation (LO) and SMEs' performance. Research design, data, and Methodology: To gain insights and provide implications for manufacturing SMEs in Pakistan, this study adopted simple random sampling to collect 379 valid responses. Data were collected through a self-administrative questionnaire from manufacturing SMEs owners/managers. Partial least squares of structural equation modeling have been used to test research hypotheses by using SmartPLS® 3.0 software. Results: The study's primary finding is that LO has a significantly positive effect on SMEs' performance and this relationship is strengthened under the moderating influence of environmental turbulence (ET). Conclusion: Environmental turbulence (ET) enables SMEs to focus on learning capability to get a more competitive advantage. Moreover, SMEs owner/managers ought to emphasize continuous learning that accentuates the capability to compete with environmental changes. Findings support notifying Pakistan's Small and Medium Enterprise Development Authority (SMEDA) in dealings with Manufacturing SMEs in terms of improving their internal capabilities. This research contributes to the literature as it provides a more detailed and in-depth explanation of distribution management-related issues faced by SMEs. This research carries a significant influence on literature and relevant Resource-based view and contingency theories.

Gen Z's Intention to Repurchase Food Online in The Context of a Crisis: A Case Study in Vietnam Under COVID-19

  • Thuc Duc Tran
    • Journal of Distribution Science
    • /
    • v.21 no.12
    • /
    • pp.23-34
    • /
    • 2023
  • Purpose: The purpose of this study is to identify factors affecting satisfaction as well as the intention of Gen Z customers to reorder food online in the context of a crisis. Research design, data and methodology: Data for this cross-sectional study were collected via the Internet by conducting an online survey of 652 Gen Z respondents, aged 15-25, in the south of Vietnam and using a convenience sampling method. To analyse the reliability of the scales, SPSS was used to run Cronbach's alpha. Then, SmartPLS was used to assess the measurement model, including variable reliability and validity, convergent validity, and discriminant validity of the proposed model, as well as test the hypotheses with partial least squares structural equation modelling (PLS-SEM). Results: Social influence, price value, and convenience all have a positive effect on satisfaction and repurchase intention. Satisfaction not only plays a critical role in mediating the relationship between social influence, price value, convenience and repurchase intention but also has a positive impact on repurchase intention towards buying food online. Conclusions: This study was successful in identifying the factors of repurchase intention in a crisis setting among Gen Z customers by developing a theoretical research model via literature to complete a brief Theory of Planned Behaviour model. This study also took an innovative approach to earlier ones by demonstrating not just the significant effect of social influence on satisfaction and repurchase intention, but also by identifying critical variables that managers should focus on increasing and improving management.

Design and implementation of smart card-based multi-authentication mechanism for digital contents delivery (디지털콘텐츠 유통을 위한 스마트카드기반의 다중인증처리방법설계 및 구현)

  • Kim, Yong;Lee, Tae-Young
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.1
    • /
    • pp.23-46
    • /
    • 2002
  • With explosively increasing digital contents, library and Information center should have a new role between knowledge providers and knowledge users as information brokering organization. Electronic transaction system should be required for performing this brokering service since economic value is added to information and knowledge in information society. The developments and changes around library are keeping up with increasing building digital library and digitalizing printed sources. With the rapidly changing circumstances, the Internet is currently witnessing an explosive growth. By serving as a virtual information resource. the Internet can dramatically change the way business is conducted and Information is provided. However because of features o( the Internet like openness and information sharing, it has fundamental vulnerabilities in security issues. For Instance, disclosure of private information and line eavesdropping such as password, banking account, transaction data on network and so on are primary obstruction factors to activation of digital contents delivery on network. For high network security and authentication, this paper looks at smart card technologies and proposes multi-authentication protocol based on smart card on open network, implements and analyzes it.

A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad (스마트 보안패드를 이용한 안전한 인터넷 서비스 제공 모델에 관한 연구)

  • Lee, Jae-Sik;Kim, Hyung-Joo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1428-1438
    • /
    • 2013
  • Services take place in Internet environment, a formation of the trust relationship between user and service provider for services. Different authentication schemes such as using Certificate of Public Key Infrastructure authentication and using ID/PW for a simple user authentication have been proposed for trust relationship. In addition, in the case of electronic financial transactions, transaction integrity and non-repudiation features are provided. These services are provided in Internet environment, use various measures to ensure service safety. However, it was difficult to prevent attacks using existing security technology because of emergence of MITB attack that manipulate the memory area of the Web browser and social engineering attacks such as phishing/pharming, requires application of new security technologies became. In this paper, we propose a concept of smart secure-pad, and utilize it safely formed a trust relationship between user and service provider, a model has been proposed to ensure safety of data transmission. Proposed model's security evaluation results show security against to MITB attack and phishing/pharming that can't be prevent attack using existing security technology. In addition, service provider can easily apply the model in safe environment can provide Internet service using provided representative services applying the proposed model.