• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.025 seconds

Potential Security Threat Derivation based on Low-Performance Hardware of Smartwatch (스마트워치 저성능 하드웨어에서 발생 가능한 보안위협 도출)

  • Min-Seo Park;In-Su Jung;Deuk-Hun Kim;Jin Kwak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.206-207
    • /
    • 2023
  • 최근 스마트워치는 통화, 문자, 간편 결제, 기타 장치 제어 등 스마트폰의 소형화 및 경량화 형태로 연구되어 여러 서비스를 제공하고 있다. 스마트워치는 스마트폰 대비 작은 물리적 크기로 인해 적용 가능한 하드웨어의 성능이 상대적으로 낮으며, 이로 인해 낮은 수준의 보안 기능을 제공한다. 이는 스마트워치 대상 보안위협으로 이어질 수 있으며, 이에 대응하기 위한 보안위협 분석 및 도출 연구가 필요한 실정이다. 따라서, 본 논문에서는 스마트워치의 하드웨어 적용 한계점으로 인한 스마트워치와 스마트폰의 성능 차이를 분석하고, 이로 인해 발생 가능한 보안위협을 도출한다.

Enhancing E-commerce Security: A Comprehensive Approach to Real-Time Fraud Detection

  • Sara Alqethami;Badriah Almutanni;Walla Aleidarousr
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.1-10
    • /
    • 2024
  • In the era of big data, the growth of e-commerce transactions brings forth both opportunities and risks, including the threat of data theft and fraud. To address these challenges, an automated real-time fraud detection system leveraging machine learning was developed. Four algorithms (Decision Tree, Naïve Bayes, XGBoost, and Neural Network) underwent comparison using a dataset from a clothing website that encompassed both legitimate and fraudulent transactions. The dataset exhibited an imbalance, with 9.3% representing fraud and 90.07% legitimate transactions. Performance evaluation metrics, including Recall, Precision, F1 Score, and AUC ROC, were employed to assess the effectiveness of each algorithm. XGBoost emerged as the top-performing model, achieving an impressive accuracy score of 95.85%. The proposed system proves to be a robust defense mechanism against fraudulent activities in e-commerce, thereby enhancing security and instilling trust in online transactions.

North Korean military provocations and the corresponding direction - Focus on the threat that resulted in unequal power wood box mines provocation - (북한군의 군사적 도발 및 대응방향 - 목함 지뢰 도발에 이어진 비대칭전력 위협을 중심으로-)

  • Kim, Gyu Nam
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.59-67
    • /
    • 2015
  • Our vision is to see the North and there is a large visual target that the two exchanges and cooperation and unity that put the main enemy of enemies in mind in need. North Korea is the main enemy was illegal invasion June 25, 1950 July 27, 1953 has continued after the armistice join the illegal provocations and cease fire violations so far. August 4, 2015, North Korea was operating by the power differential that operate on an all-out war and declared the initial state after the exhibition gave another provocative DMZ wood box mines. US-ROK military was in the process of real-time detection of the North Korean power operation and the results were broadcast live through the media. Looking at these military provocations on the threat of asymmetrical power of North Korea's military threat, we would like to present how to respond.

North Korea's nuclear and missile development and our countermeasures (북한의 핵 및 미사일 개발과 우리의 대응방안)

  • Lee, Hyun Hee;Kim, Gyu Nam
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.127-135
    • /
    • 2017
  • Today, Kim Jong-un, the third-hereditary regime in North Korea, is committing Nuclear Provocation more aggressively than the past when Kim Il-sung and Kim Jong-il dominated. Past South Korea government had suggested plans to restrain the provocation from North Korea and bring stabilization in the Korean Peninsula. However, consequentially it was limited to the primary role of the President. When President Trump takes over the government in February 2017, it has attracted the expectation about the issues occurred on the Korean Peninsula due to the pledge that he promised during the presidential election and his govern style. However, various speeches about the Korean Peninsula that he spoke recently made situations depressed about what South Korean currently encounters. Furthermore, previous regime in North Korea has laid the foundation for Kim Jong-un to be obsessed more on the nuclear and missile which has led him to provoke more imprudently by highlighting the light weight, advanced, and various kinds of nuclear and missiles. Thus, we would like to propose counter measures in order for South Korean government to handle and solve the issues that they encounters by themselves based on North Korea's Nuclear Provocation instead of relying on other countries to get involved and help.

A Study on establishing the Role of Intelligence Agency on Cybersecurity - Focusing on Revision or Enactment of Cybersecurity related Bill - (정보기관의 사이버안보 역할 정립에 관한 연구 -사이버안보관련 법안 제·개정안을 중심으로-)

  • Yoon, Oh Jun;Kim, So Jeong;Jeong, Jun Hyeon
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.45-52
    • /
    • 2018
  • As the era of the 4th Industrial Revolution has progressed and the information and communication technologies have developed dramatically, the cyber threats will gradually become more intelligent and sophisticated. Therefore, in order to take systematic and prompt action in case of an accident while preparing measures against the threat, the role of intelligence agency is important. However, Korea is having difficulty in responding to the threats due to the lack of support for the national cybersecurity bill or the amendment bill of the National Intelligence Service. In this paper, I examine the cybersecurity function of the intelligence agency, the recent debate trends, and implications for the role of intelligence agency in our current situation. And then I intend to suggest some measures such as concentration on information gathering and analysis, enhancement of cyber threat prediction and response capacity, and strengthening of legal basis as a way to establish the role of intelligence agency for reinforcement of cybersecurity performance system.

  • PDF

Design of 3-Tier Security Mechanism for Improving Security of the Implantable Medical Devices (체내 이식형 의료기기의 보안성 향상을 위한 3-Tier 보안 메커니즘 설계)

  • Ahn, Seung-Hyun;Park, Chang-Seop;Park, Joo-Ho
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.11-19
    • /
    • 2014
  • As both medical and IT technologies advance, convergent medical technologies such as implantable medical devices are receiving a lot of attentions from the research and medical appliance market. On the other hand, such a new medical service is facing several new security threats including patient privacy breach since the service is based on the wireless communication. Especially, the new security threat could induce the patient's life threatening accident, so that more secure measures should be provided. In this paper, a variety of security threats associated with the implantable medical devices are pinpointed and a new security mechanism against such threats is proposed.

A School Network Construction using the ESM System (ESM 시스템을 이용한 안정된 학내망 구축)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.1-7
    • /
    • 2005
  • Today, network is a fragile state in many threat attacks. Especially, the company serviced like internet or e-commerce is exposed to danger and targeted of attacker Therefore, it is realistic that the company use the security solution. It exist various security solution in our school network. For example, Firewall, IDS, VirusWall, VPN, etc. The administrator must manage various security solution. But it is inefficient. Therefore, we need the Management System to controll every security solution. In this paper, we deal with basic contents of security solution to manage the ESM and merits and demerits when use it. Also we suggest method that the Administrator can manage his network more efficiently and systematically by using the ESM in our school network.

  • PDF

Revitalization Strategy of Information Security Industry Using Cognitive Map Analysis (인지지도분석을 통한 정보보호 산업 활성화전략)

  • Lee, Jung Mann;Cho, Ilgu;Rim, Myung Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.2
    • /
    • pp.177-194
    • /
    • 2016
  • This study analyzed President Park's speeches and the government's industry policy in the field of information security using cognitive map. The relationship analysis between policy tool variables and policy goal variables was employed to derive revitalization strategy of information security. This paper found that entrepreneurship revitalization has very strong causality with expansion of domestic market and global market. But, on the other hand, HR development has very weak causality with job creation and future growth driver because the labor market in the information security industry is poor and its transfer rate to other industry is very high. This study showed that this cognitive map could be characterized by a scarcity of feedback loops and a strong emphasis on the positive loops in the structure of virtuous circle. In this paper, we also constructed a comprehensive cognitive map on the policy vision of information security, showing that there are a risk of cyber threat, an opportunity of new fusion security market, information security reinforcing circle, global economic circle, and domestic market circle.

Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph

  • Dai, Fangfang;Zheng, Kangfeng;Wu, Bin;Luo, Shoushan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1920-1937
    • /
    • 2015
  • Network environment has been under constant threat from both malicious attackers and inherent vulnerabilities of network infrastructure. Existence of such threats calls for exhaustive vulnerability analyzing to guarantee a secure system. However, due to the diversity of security hazards, analysts have to select from massive alternative hardening strategies, which is laborious and time-consuming. In this paper, we develop an approach to seek for possible hardening strategies and prioritize them to help security analysts to handle the optimal ones. In particular, we apply a Risk Flow Attack Graph (RFAG) to represent network situation and attack scenarios, and analyze them to measure network risk. We also employ a multi-objective genetic algorithm to infer the priority of hardening strategies automatically. Finally, we present some numerical results to show the performance of prioritizing strategies by network risk and hardening cost and illustrate the application of optimal hardening strategy set in typical cases. Our novel approach provides a promising new direction for network and vulnerability analysis to take proper precautions to reduce network risk.

Android Application Analysis Method for Malicious Activity Detection (안드로이드 앱 악성행위 탐지를 위한 분석 기법 연구)

  • Sim, Won-Tae;Kim, Jong-Myoung;Ryou, Jae-Cheol;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.213-219
    • /
    • 2011
  • Due to the rapid growth of smartphone market, the security threats are also increased. One of the smartphone security threats is that w1Verified applications are distributed on the smartphone market. In the case of Andoroid market, Google have no Application Approval Process that can detect malicious android application so many malicious android applications are distributed in the Android market. To reduce this security threat, it is essential the skill to detect the malicious activities of application. In this paper, we propose the android application analysis method for malicious activity detection and we introduce the implementation of our method which can automatically analyze the android application.