• 제목/요약/키워드: Space Security

검색결과 978건 처리시간 0.026초

A Study on the FinTech : The consideration of the Security (핀테크의 보안 고려사항에 대한 연구)

  • Lee, Yujin;Chang, Beomhwan;Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • 제12권3호
    • /
    • pp.111-123
    • /
    • 2016
  • Recently, mobile devices have been widely used. Therefore, the service users want that are not constrained by time and space. Among them, electronic payment services, mobile finance service is enjoying a tremendous popularity. The FinTech is the result of the fusion of finance and ICT(Information & Communication Technology). Security experts is pointed the FinTech security risk. New technology and Innovative FinTech services are even available, Insecure FinTech services is insignificant. In this paper we were surveyed market and product trends of FinTech and analyzed the threats about FinTech. Also, we analyzed the security considerations for FinTech using a questionnaire. As a result, users considers secure payment process and privacy. Therefore, we proposed security considerations for each vulnerability. So, we must be resolved of security technology and policy issues. If establishing a secure payment process and the unclear legal issue is resolved, FinTech service will provide a secure financial services to the user.

A Study on IoT Devices Vulnerability and Security (IoT 디바이스 보안위협 및 대응방안 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • 제21권1호
    • /
    • pp.9-17
    • /
    • 2021
  • Numerous IoT devices are connected to a wireless network environment to collect and transmit data without time and space limitations, but many security vulnerabilities are exposed in these process. But IoT security is not easy to create feasible security standards and device authentication due to differences in the approach or implementation of devices and networks. However, it is clear that the improvement and application of the standard framework for enhancing the security level of the device is the starting point to help the most successful security effect. In this study, we investigate the confidentiality, integrity, availability, and access control implementation plans for IoT devices (which are the basic goals of information security), and standardized security evaluation criteria for IoT devices, and study ways to improve them.

Japanese Space Policy - Where is she going?

  • Hashimoto, Yasuaki
    • The Korean Journal of Air & Space Law and Policy
    • /
    • 제9권
    • /
    • pp.435-443
    • /
    • 1997
  • Passing 26 years from 1970 when the first satellite was launched into the orbit, Japan developed and successfully launched H-II from Tanegashima Space Center in 1994. During those period, Japanese space policy has experienced a big shake from independent development to technology import from the US, and back again to independent development. In general, the H-II rocket which was manufactured by 100% domestic technology, brings Japan from the old era (experimental stage) to the new era (practical use stage). Fundamental Policy of Japan's Space Activities, which decides such policy as mentioned, was revised in January, 1996 this year after an interval of 7 years. This revised outline confirms the result of Japanese space technology until present and identifies the future direction and framework of her space activities for a period of coming ten years on the basis of a ong-term perspective towards the 21st century. However, when comparing with the last Fundamental Policy in 1989, there seems no big change in it, and a long-term perspective is also not seen there. The description varies on some important points in international space law, like international cooperation, protection of environment, commercial use, etc. In addition, the immaturity as well as the necessity of broader discussion are felt because neither this Fundamental Policy nor The National Defense Program Outline treated any national and international security matters concerning outer space. Considering the present time when Japan enters into the practical use of outer space, such as application, commercial use and launching service, etc, it is doubtful whether new Fundamental Policy was properly planned or not. It seems necessary to use several measures by which the public opinion, opinions from industry and debate on the security are reflected in the policy making.

  • PDF

A Study on BIM based Process Risk Management Model (BIM 기반의 프로젝트 단계별 리스크관리 모델에 관한 연구)

  • Jeon, Seung-Ho;Choi, Myung-Seok;Lee, Joo-Ho
    • Journal of Korean Society of societal Security
    • /
    • 제3권1호
    • /
    • pp.61-66
    • /
    • 2010
  • Recently a construction industry introduces information technology that brings about many advantages in the early planning phase, design phase and construction phase. Nevertheless a BIM has a many benefits, it has limits which are not only usually using 3D modeling but also limit of making full use of practical affairs because of a lack of connecting varietals of progress of work. To solve these uppermost limits, this research is presenting unified systems to use in risk management which are efficient management of space and non-space information, space analysis.

  • PDF

A Design of Electronic Evidence-seizure Mechanism for the Response of Information-warfare (정보전 대응을 위한 전자적 증거포착 메커니즘 설계1))

  • Park, Myeong-Chan;Lee, Jong-Seop;Choe, Yong-Rak
    • Journal of National Security and Military Science
    • /
    • 통권2호
    • /
    • pp.285-314
    • /
    • 2004
  • The forms of current war are diversified over the pan-national industry. Among these, one kind of threats which has permeated the cyber space based on the advanced information technology causes a new type of war. C4ISR, the military IT revolution, as a integrated technology innovation of Command, Control, Communications, Computer, Intelligence, Surveillance and Reconnaissance suggests that the aspect of the future war hereafter is changing much. In this paper, we design the virtual decoy system and intrusion trace marking mechanism which can capture various attempts and evidence of intrusion by hackers in cyber space, trace the penetration path and protect a system. By the suggested technique, we can identify and traceback the traces of intrusion in cyber space, or take a legal action with the seized evidence.

  • PDF

The Processing Method for a Reverse Nearest Neighbor Queries in a Search Space with the Presence of Obstacles (장애물이 존재하는 검색공간에서 역최대근접질의 처리방법에 관한 연구)

  • Seon, Hwi Joon;Kim, Hong Ki
    • Convergence Security Journal
    • /
    • 제17권2호
    • /
    • pp.81-88
    • /
    • 2017
  • It is occurred frequently the reverse nearest neighbor queries to find objects where a query point can be the nearest neighbor object in recently applications like the encrypted spatial database. In a search space of the real world, however, there are many physical obstacles(e.g., rivers, lakes, highways, etc.). It is necessary the accurate measurement of distances considered the obstacles to increase the retrieval performance such as this circumstance. In this study, we present the algorithm and the measurement of distance to optimize the processing performance of reverse nearest neighbor queries in a search space with the presence of obstacles.

Image Encryption with The Cross Diffusion of Two Chaotic Maps

  • Jiao, Ge;Peng, Xiaojiang;Duan, Kaiwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.1064-1079
    • /
    • 2019
  • Information security has become increasingly important with the rapid development of mobile devices and internet. An efficient encryption system is a key to this end. In this paper, we propose an image encryption method based on the cross diffusion of two chaotic maps. We use two chaotic sequences, namely the Logistic map and the Chebyshev map, for key generation which has larger security key space than single one. Moreover, we use these two sequences for further image encryption diffusion which decreases the correlation of neighboring pixels significantly. We conduct extensive experiments on several well-known images like Lena, Baboon, Koala, etc. Experimental results show that our algorithm has the characteristics of large key space, fast, robust to statistic attack, etc.

A Novel Active User Identification Method for Space based Constellation Network

  • Kenan, Zhang;Xingqian, Li;Kai, Ding;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.212-216
    • /
    • 2022
  • Space based constellation network is a kind of ad hoc network in which users are self-organized without center node. In space based constellation network, users are allowed to enter or leave the network at any given time. Thus, the number of active users is an unknown and time-varying parameter, and the performance of the network depends on how accurately this parameter is estimated. The so-called problem of active user identification, which consists of determining the number and identities of users transmitting in space based constellation network is discussed and a novel active user identification method is proposed in this paper. Active user identification code generated by transmitter address code and receiver address code is used to spread spectrum. Subspace-based method is used to process received signal and judgment model is established to identify active users according to the processing results. The proposed method is simulated under AWGN channel, Rician channel and Rayleigh channel respectively. Numerical results indicate that the proposed method obtains at least 1.16dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

Factors Affecting Information Protection Efforts for Preventing Deviant Behavior of Adolescent in Cyber Space (사이버 일탈행위 예방을 위한 개인 정보보호 노력의 영향요인 연구)

  • Um, Myoungyong;Park, Jin-Hee;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • 제8권5호
    • /
    • pp.31-41
    • /
    • 2005
  • The purpose of this study is to identify the determinants of planned behavior of adolescent, toward information security and cyber crime prevention. A survey methodology was used to investigate a proposed model of influence, and regression analysis was used to analyze the results. The hypothesized model was largely supported by this analysis, and the overall results indicate that the intention to actively participate in information security and cyber crime prevention is mostly influenced by the fear for cyber crime and the perceived usefulness of information security and cyber crime prevention activity. In addition, it was found that the perceived easy of use for information-security related ICT skill, fear for cyber crime, and social norm for information security influence the level of usefulness, but that the prior experience with information leaking was statistically insignificant factor to the level of usefulness and fear for crime. Useful suggestions for promoting information security and cyber crime prevention are also provided.

  • PDF

A Study on the Security Threat Response in Smart Integrated Platforms (스마트 통합플랫폼 보안위협과 대응방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • 제22권1호
    • /
    • pp.129-134
    • /
    • 2022
  • A smart platform is defined as an evolved platform that realizes physical and virtual space into a hyper-connected environment by combining the existing platform and advanced IT technology. The hyper-connection that is the connection between information and information, infrastructure and infrastructure, infrastructure and information, or space and service, enables the realization and provision of high-quality services that significantly change the quality of life and environment of users. In addition, it is providing everyone with the effect of significantly improving the social safety net and personal health management level by implementing smart government and smart healthcare. A lot of information produced and consumed in these processes can act as a factor threatening the basic rights of the public and individuals by the informations themselves or through big data analysis. In particular, as the smart platform as a core function that forms the ecosystem of a smart city is naturally and continuously expanded, it faces a huge security burden in data processing and network operation. In this paper, platform components as core functions of smart city and appropriate security threats and countermeasures are studied.