• Title/Summary/Keyword: Vulnerability market

Search Result 69, Processing Time 0.025 seconds

A Study on the FinTech : The consideration of the Security (핀테크의 보안 고려사항에 대한 연구)

  • Lee, Yujin;Chang, Beomhwan;Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.111-123
    • /
    • 2016
  • Recently, mobile devices have been widely used. Therefore, the service users want that are not constrained by time and space. Among them, electronic payment services, mobile finance service is enjoying a tremendous popularity. The FinTech is the result of the fusion of finance and ICT(Information & Communication Technology). Security experts is pointed the FinTech security risk. New technology and Innovative FinTech services are even available, Insecure FinTech services is insignificant. In this paper we were surveyed market and product trends of FinTech and analyzed the threats about FinTech. Also, we analyzed the security considerations for FinTech using a questionnaire. As a result, users considers secure payment process and privacy. Therefore, we proposed security considerations for each vulnerability. So, we must be resolved of security technology and policy issues. If establishing a secure payment process and the unclear legal issue is resolved, FinTech service will provide a secure financial services to the user.

Analyses of Vulnerability in RFID application with Lightweight Security Scheme (경량화 보안 기능을 가진 RFID 응용 분야에 대한 취약성 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.789-792
    • /
    • 2009
  • As RFID technology is becoming ubiquitous, the secunty of these systems gets much attention. Its fields of usage include personal identification, supply-chain management systems, and many more. Many kinds of RFID tags are available on the market which differ both in storage, and computational capacity. Since by standard IT means all the tags have small capacities, the security mechanisms which are in use in computer networks are not suitable. For expensive tags with relatively large computational capacities many secure communication protocols were developed, for cheap low-end tags, only a few lightweight protocols exist. In this paper we introduce our solution, which is based on the least computation demanding operator, the exclusive or function. By introducing two tags instead of one in the RFID system, our scheme provides security solutions which are comparable with those provided by the lightweight protocols. In the meantime, our scheme does not demand any computational steps to be made by the ta.

  • PDF

Development of a Down-alternative Outdoor Jacket design (다운대체 아웃도어 재킷의 디자인 개발)

  • Lee, Dal A;Moon, SunJeong;Chung, Sham Ho
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.8
    • /
    • pp.143-155
    • /
    • 2013
  • The outdoor apparel market has been growing very fast recently, and consumers are spending more time doing outdoor activities for their leisure. As the outdoor apparel market is growing, it has started to combine functionality with style to provide more diverse designs and colors for all ages. The increase of interest in heathy life-styles, outdoor activities, and leisure has lead to a rise in demand for outdoor apparel. Now outdoor apparel have become a part of people's daily casual wear in addition to being worn for outdoor activities. This study is focused on a outdoor jacket design which is used as down-alternative material and the purpose of this study is to design outdoor jackets using a down-alternative fabrics that improve the thermal and lightweight effects for clothing comfort, and increase the satisfaction of wearing down-alterative outdoor jacket. The research of this paper was done by using a questionnaire survey. The survey was used to examine the male customers' outdoor activities, purchase behaviors, place, expense and design preferences. Then, down-like fabric was used to make the prototype down jacket and its design, function, and satisfaction with wearing compared with other brands down jacket products were analyzed. Although duck down fabrics are representative of outdoor jackets, they have many problems that need to be solved such as feathers falling out or its vulnerability to moisture. They have competitive prices compared to down jackets so down-alternative jackets are able to gain more proportion of its market share.

Efficient Design of Plate Spring for Improving Performance of Sound Wave Vibration Massage Chair (음파진동 안마의자제품의 성능향상을 위한 판스프링의 효율적 설계)

  • Kim, Chang-Gyum;Park, Soo-Yong;Jo, Eun-Hyeon;Lee, Dong-Hyung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.4
    • /
    • pp.1-7
    • /
    • 2019
  • The customer of massage chair is expanding day by day from middle age to all ages. In 2018, the market size was 700 billion KRW, an increase of 30 times over 10 years. However, most related SMEs suffer from excessive competition by the market monopoly of some major companies. In this situation, in order for a related company to survive, it is necessary to steadily research and develop new products. Founded in 2009, company L produces massage chairs for health and relaxation of customers. L's products use a sound wave vibration module that is favorable for human body, unlike other products that use vibration motor type. However, frequent breakdowns of massage chair due to the vulnerability of plate (leaf) springs, which play an important role in sound wave vibration modules, made sap its competitiveness. In this paper, we propose a method to design desirable plate spring structure by sequentially experimenting with five different plate springs. The results of this study are expected to contribute to improve the quality of plate spring and the reliability of sound wave vibration module. In the future, it is necessary to find a way to use it in the development of foot massage or scalp management device as well as continuous research to find optimal plate spring structure through various analysis.

A Study on Myanmar Power Marker for Korean Firms - Focused on CHP, CDM, MDB - (한국기업의 미얀마 전력시장 진출 방안에 관한 연구 - CHP, CDM, MDB를 중심으로 -)

  • Yu, Cheon;Hwang, Yun-Seop
    • International Area Studies Review
    • /
    • v.20 no.4
    • /
    • pp.37-56
    • /
    • 2016
  • The purpose of this research is to present the implication for Korean firms' entry into the power market in Myanmar. This study investigated the characteristics of the Myanmar power market and analyzed SWOT, focusing on energy policy, power supply and demand, energy relations with neighboring countries and climate change issue. Opportunity factors are changes in energy strategies, the launch of an energy integration organization, changes in the power energy portfolio, rapid economic and power demand growth, and a clean development mechanism. The threats are high nonfulfillment of a contract, high power loss rates and low electricity distribution rates, increased energy exports to neighboring countries, and vulnerability to climate change. We suggest the use of CHP (Combined Heat and Power), Clean Development Mechanism (CDM), and Multilateral Development Bank (MDB).

A Study on the Security Vulnerability for Android Operating System (안드로이드 운영체제의 보안 취약점에 관한 연구)

  • Cho, Hee-Hoon;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.224-226
    • /
    • 2015
  • Recently, Android-based mobile devices has increased. Thus increasing market share of the Android operating system. However, in the case of the Android operating system, it has the relatively large number of security vulnerabilities Unlike other closed operating systems. Most Android application requires the identity of the mobile device or over-authorization approval. This information can be a security threat. In addition, in the event of a security problem because obtaining the user's consent during the installation of the application is the user responsible. If these problems persist, loss of reliability of the user operating system, as well as to feel a resistance when using an Android application. In this paper, we investigate a security vulnerability in the Android operating system, and proposed countermeasures.

  • PDF

Study on the Physical vulnerability factors of network and the Countermeasure technology (네트워크의 물리적 취약요인과 대응기술에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.139-145
    • /
    • 2016
  • Recently, The attack on the USB and network are increasing in many domestic infrastructure. These attacks are the most independent of insider intention, caused by the Anthropogenic Manipulation. These attacks are Anthropogenic Response Measures for Physical Security. and Representative Technology has CCTV, Access Control System, Sensor Technology. However, Physical Security, it is represented by several Product family according to the Market, has become an obstacle but rather a variety of Physical Security Technology Development and Application. As the Anthropogenic Attacks have occur continually in the network, it need to the proper Physical Response Techniques in this situation. Therefore, In this paper, we will find out about the awareness and demand trends of Physical Security. And The Physical Vulnerable Factors of Network. Thereby this is expected to be utilized as a basis for the domestic Physical Security Technology development and deployment Road-map in a future.

A Study on Application Methods of Drone Technology (드론기술 적용 방안 연구)

  • Kim, Hee-Wan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.601-608
    • /
    • 2017
  • In the fourth industrial revolution, drones are an important element to lead the industry by converging with information technology. Drones are developing various technologies by combining with communication / navigation / traffic management technology, control and detection / avoidance technology, sensor technology, SW and application technology. However, there are various problems in order to settle the drone technology. In this paper, it will be examined the problems of application of drones through application fields of drones, domestic and foreign cases, and core technologies of drones. The growth of the drone market requires improvement of laws and institutions. This paper proposed security vulnerability, privacy and safety problem in wireless communication, and present technical and management problems for drone service in the Korean environment in particular.

A Study on the Security Vulnerability Factors of Smart Phones ('스마트 폰'의 보안 취약요인에 관한 연구)

  • Jeon Jeong Hoon
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.43-50
    • /
    • 2022
  • It is no exaggeration to say that mobile devices have already become an essential tool in our daily life. Among these mobile devices, a representative smart phone is overheating the market by introducing new functions and services whenever a new product is released. However, most users do not know that there are various vulnerabilities depending on the manufacturer, service, or function, and damage is occurring due to attacks that exploit the vulnerabilities.Research on this has already been conducted, but it is very difficult to predict because there are various differences depending on new devices, operating systems, services, and functions. For this reason, it is necessary to continuously monitor and study new vulnerable factors. Therefore, through this study, research so far, vulnerabilities, attack technology, and response technology were considered. In addition, it is expected that it can be used as basic data for the development of systems and response technologies in the future by proposing countermeasures.

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.