• 제목/요약/키워드: User security

검색결과 2,691건 처리시간 0.026초

안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구 (A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications)

  • 김지연;전웅렬;이영숙;김미주;정현철;원동호
    • 디지털산업정보학회논문지
    • /
    • 제7권1호
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

문서 읽기 행위를 이용한 연속적 사용자 인증 기반의 내부자 문서유출 탐지기술 연구 (A system for detecting document leakage by insiders through continuous user authentication by using document reading behavior)

  • 조성영;김민수;원종일;권상은;임채호;강병훈;김세헌
    • 정보보호학회논문지
    • /
    • 제23권2호
    • /
    • pp.181-192
    • /
    • 2013
  • 기업 내의 문서 유출을 탐지 제어하기 위한 다양한 기술들이 연구되고 있다. 하지만 이러한 기술들은 대부분 외부에 의한 문서 유출을 대상으로 하고 있으며, 문서에 대한 정당한 권한을 가지고 있는 내부자에 의한 문서 유출을 탐지하고 제어하는 연구는 미비한 수준이다. 본 연구에서는 내부자에 의한 문서 유출을 탐지하고 제어하기 위하여 사용자의 문서 읽기 행위를 관찰한다. Microsoft Word 로거에서 추출할 수 있는 속성으로부터 각 사용자의 관찰된 문서 읽기 행위에 대한 패턴을 만들고 시스템에 적용함으로써 문서를 읽고 있는 사용자가 실제 사용자인지 여부를 판단한다. 이를 통하여 사용자가 문서를 읽는 행위를 바탕으로 효과적으로 문서 유출을 방지할 수 있을 것으로 기대한다.

Heterogeneous Wireless Sensor Networks 환경에서의 안전한 사용자 인증 프로토콜 (Security Improvement of User Authentication Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment)

  • 이영숙
    • 융합보안논문지
    • /
    • 제21권1호
    • /
    • pp.55-62
    • /
    • 2021
  • 최근 센서를 이용한 장치들의 사용은 증가추세이다. 이런 센서 장치들은 이종무선 센서네트워크 환경에서 최신 기술들과 연관 지어 폭발적으로 증가하고 있다. 이런 환경에서 센서디바이스의 사용은 우리에게 편리함을 제공하기는 하나 여러 형태의 보안위협이 도사리고 있는 실정이다. 무선선서네트워크를 이용하여 원격으로 접속하여 제공받는 서비스에 존재하는 보안위협 중 대부분은 전송되는 정보의 유출과 사용자, 센서, 게이트웨이 사이의 인증에 대한 손실이 대부분이다. 2019년 Chen 등이 이종무선 센서 네트워크에 안전한 사용자 인증 프로토콜을 제안하였다. 그러나 Ryu 등이 제안한 논문에서 그들이 제안 프로토콜은 password guessing attack과 session key attack에 취약하다는 것을 주장하였다. 본 논문은 이전에 제안된 논문의 취약점을 개선하여 더욱 안전하고 효율적인 사용자 인증 프로토콜을 제안하였다.

추적이 가능한 스마트카드 사용자 인증 기법 (Anonymity User Authentication Scheme with Smart Cards preserving Traceability)

  • 김세일;천지영;이동훈
    • 정보보호학회논문지
    • /
    • 제18권5호
    • /
    • pp.31-39
    • /
    • 2008
  • 최근 스마트카드를 이용한 원격 사용자 인증 기법은 개인 프라이버시 보호에 대한 관심 및 요구가 증가됨에 따라 사용자 익명성을 제공하려는 방향으로 활발히 진행되고 있다. 초기에 제안된 인증 기법에서는 사용자와 사용자가 서비스를 제공받고자 하는 서버를 제외한 제3자에 대한 사용자 익명성만을 고려하였으나 최근 서비스 제공자에 의한 개인정보유출 사고 등이 증가하면서 제3자뿐만 아니라 원격 서버에 대해서도 사용자의 익명성이 보장되는 기법이 요구되고 있다. 하지만 이러한 사용자 익명 인증 기법은 원격 서버가 사용자의 악의적인 행동을 감지했을 때 신뢰기관의 협조를 얻어 악의적인 사용자를 추적할 수 있는 기능 또한 필요하다. 따라서 본 논문에서는 제3자뿐만 아니라 원격 서버에 대해서도 사용자의 신원에 대한 익명성을 보장하며, 악의적인 사용자의 행동에 따른 문제 발생 시에 이를 추적 가능한 익명 인증 기법을 제안한다.

IT자산 안전성과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구 (An Empirical Approach to the Influence of IT Assets Security and Information Security Service on Information Security Qualify and Satisfaction)

  • 권순재;이건창;김창현
    • 한국경영과학회지
    • /
    • 제32권2호
    • /
    • pp.149-162
    • /
    • 2007
  • In the era of the internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) Security and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security quality positively, leading to users' satisfaction eventually. To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets Security and Information Security Service influence informations security qualify positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets Security and Information Security Service helped great improve the information security quality and user satisfaction.

Research on Application of Service Design Methodology in IOT Environment

  • Kim, Byung-Taek;Cho, Yun-Sung
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권3호
    • /
    • pp.53-60
    • /
    • 2017
  • The purpose of this study is to provide empirical and quantitative analysis on user's perceived privacy, security, and user satisfaction when providing visualization information about objects and service provider behaviors that users can not perceive in internet service process. Through previous research, we have examined the importance of privacy and security factors as a key factor to be considered for the characteristics of the Internet of things and the Internet of things. In addition, service blueprint, which is one of the service design methodologies to examine the flow of service usage in providing Internet service of things, was examined. In the flow of things internet service utilization, it is found that the things that are out of the user's cognitive area and the behavior of the service provider take up a large part. Therefore, the hypothesis that the trust of the Internet service security and the satisfaction of the user experience can be improved by providing the security visualization information about the behavior of the object and the invisible service provider in the non-contact aspect of the user and the object. In order to verify the hypothesis, we conducted experiments and questionnaires on the use of virtual objects' internet environment and conducted statistical analysis based on them. As a result, it was analyzed that visual information feedback on non - contact and invisible objects and service provider's behaviors had a positive effect on user's perceived privacy, security, and satisfaction. In addition, we conclude that it can be used as a service design evaluation tool to eliminate psychological anxiety about security and to improve satisfaction in internet service design. We hope that this research will be a great help for the research on application method of service design method in Internet environment of objects.

QR 코드를 이용한 모바일 이중 전송 OTP 시스템 (QR Code Based Mobile Dual Transmission OTP System)

  • 서세현;최창열;이구연;최황규
    • 한국통신학회논문지
    • /
    • 제38B권5호
    • /
    • pp.377-384
    • /
    • 2013
  • 비밀번호 기반의 사용자 인증은 동일한 비밀번호를 반복 사용하므로 보안이 취약하여 OTP(One-Time Password)가 도입되었다. 하지만 보안이 강화된 OTP를 서버와 동기된 모바일 기기에서 생성하여 PC에 입력하는 경우 PC가 악성코드에 감염되어 있으면 해커가 사용자 계정과 비밀번호 그리고 OTP값을 해킹할 수 있다. 본 논문에서는 OTP값 유출에 따른 보안 취약성을 해소하기 위해 사용자는 계정과 비밀번호를 PC에 입력하여 서버인증을 수행하고, PC 화면에 출력된 QR코드를 모바일 기기에서 스캔하여 OTP값을 직접 서버로 전송함으로써 정보 유출에 따른 해킹을 방지하고 PC에 OTP값을 입력하는 불편함을 줄이는 새로운 이중 인증 방식인 DTOTP를 제안한다. 시스템은 이중 전송을 통해 PC인증 방식의 OTP 보다 향상된 보안성을 제공하면서 기존 OTP 알고리즘을 그대로 사용할 수 있어 구현이 용이하며 은행, 포털 및 게임 서비스 등에 안전하게 활용할 수 있다.

New Revocable E-cash System Based on the Limited Power of TTP

  • Yan Xie;Fangguo Zhang;Kim, Kwangjo
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2002년도 종합학술발표회논문집
    • /
    • pp.266-269
    • /
    • 2002
  • As a simulation or replacement of analog money in cyber space, the e-cash was introduced by using cryptographic primitives. Since a perfect anonymity system causes some illegal activities, such as money laundering, blackmailing, and illegal purchase, a revocable electronic system was paid a great attention to control the anonymity. In general, Trust Third Party(TTP) is introduced to detect any dubious user and coin, namely user tracing and coin tracing. In this paper we propose a new revocable anonymity e-cash system, and verify the security requirement as well. In our scheme a user first withdraws the e-coin from bank by using blind signature, and then TTP verifies the bank's signature and records the tracing information.

  • PDF

Integration of PKI and Fingerprint for User Authentication

  • Shin, Sam-Bum;Kim, Chang-Su;Chung, Yong-Wha
    • 한국멀티미디어학회논문지
    • /
    • 제10권12호
    • /
    • pp.1655-1662
    • /
    • 2007
  • Although the PKl-based user authentication solution has been widely used, the security of it can be deteriorated by a simple password. This is because a long and random private key may be protected by a short and easy-to-remember password. To handle this problem, many biometric-based user authentication solutions have been proposed. However, protecting biometric data is another research issue because the compromise of the biometric data will be permanent. In this paper, we present an implementation to improve the security of the typical PKI-based authentication by protecting the private key with a fingerprint. Compared to the unilateral authentication provided by the typical biometric-based authentication, the proposed solution can provide the mutual authentication. In addition to the increased security, this solution can alleviate the privacy issue of the fingerprint data by conglomerating the fingerprint data with the private key and storing the conglomerated data in a user-carry device such as a smart card. With a 32-bit ARM7-based smart card and a Pentium 4 PC, the proposed fingerprint-based PKI authentication can be executed within 1.3second.

  • PDF

Understanding User's Continuous Use of Financial Technology Products

  • Wanchao Liu;Huosong Xia;Jian Mou
    • Asia pacific journal of information systems
    • /
    • 제31권2호
    • /
    • pp.236-256
    • /
    • 2021
  • Online financial technology products are an important consumer finance innovation. While a large body of previous research has focused on initial adoption and consumer willingness to use these products, little research explores the continued use of these products beyond the initial adoption phase. In particular, special attention should be paid to how users' trust and perceptions of privacy and security affect continued use behavior. This paper integrates the expectation confirmation model of information system continuance (ECM-ISC), the information system success model (ISSM) and the security and trust literatures to investigate continued use of online financial technology. To test the research model, we collected 398 valid questionnaires from Ant Credit Pay users. The research results show that system and service quality positively impact users' expectation confirmation, while information quality has no significant impact. Expectation confirmation and perceived usefulness positively affect user satisfaction. Moreover, the user's perception of privacy and security plays a vital role in user satisfaction. Satisfaction and perceived trust jointly promote users' continuance behaviors. Findings of this study indicates the importance of the information system success factors and security factors due to their influence on the continued use of Fintech products. This conclusion has implications for enterprises in improving the product qualities and enhancing the degree of security to meet user needs.