• Title/Summary/Keyword: Zero-Trust

Search Result 50, Processing Time 0.031 seconds

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

Zero Trust-Based VPN Authentication Technology Using Multi-Factor Authentication (다중 인증을 이용한 제로 트러스트 기반 VPN 인증 기술)

  • Kwak, Seunghee;Lee, Seungju;Moon, Jeongah;Jeon, Jaeho;Lee, Jaehyuk;Lee, Kyungroul
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.257-258
    • /
    • 2022
  • COVID-19 팬데믹으로 인하여, 재택근무와 같은 비대면 업무환경이 확대됨에 따라, 기업에서는 내부 보안을 위한 VPN 구축 및 사용률이 급격하게 증가하였다. 하지만, 기존의 대면 환경과는 다르게, 비대면 업무환경에서는 자신을 식별할 수 있는 수단을 제한적으로 활용하기 때문에, 사용자의 비밀번호가 노출되면, VPN에 접근하기 위한 사용자 인증이 무력화되는 심각한 문제점이 존재하며, 이러한 보안 취약점을 해결하기 위한 기술이 요구되는 실정이다. 따라서 본 논문에서는 기존 VPN 인증 기술에 내재된 보안 취약점을 해결하기 위하여, 사물 환경 인증, HIP 기술, 위치 인증, 상호 인증 기술을 활용한 다중 인증 기반의 제로 트러스트를 제공하는 VPN 인증 기술을 제안한다. 최종적으로는 본 논문에서 제안하는 기술을 통하여, 보다 안전성이 향상된 VPN을 제공할 것으로 사료된다.

  • PDF

Design and Operation of AWS S3 based on Zero Trust (제로 트러스트 기반 AWS S3 설계 및 운영)

  • Kyeong-Hyun Cho;Jae-Han Cho;Jiyeon Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.107-108
    • /
    • 2023
  • 기업 및 공공기관의 클라우드 서비스 도입이 확산되면서 업무 시스템에 대한 보안 요구사항이 변화하고 있다. 기존에는 보호해야 할 정보자산이 물리적으로 외부와 분리된 내부 공간에 집중되었다면 클라우드 환경에서는 자산의 분포 범위가 넓어지면서 내부와 외부의 경계가 모호해진다. 따라서 경계 기반의 전통적인 보안 방식은 클라우드 기반 업무환경에 적합하지 않으며 정보 서비스를 이용하는 전 주기에서 암묵적인 신뢰를 배제하고 지속적으로 검증을 수행하는 제로 트러스트 기반의 업무 시스템 운영이 필요하다. 본 논문에서는 스토리지 클라우드 서비스인 아마존 웹 서비스 S3(Simple Storage Service)에 대하여 제로 트러스트 모델을 설계하고, 직접 서비스를 운영하며 제안된 제로 트러스트 모델의 안전성을 검증한다. 제로 트러스트 모델은 스토리지에 접근하는 사용자에 대한 인증 및 식별 기술, 스토리지 암호화 기술, 암호화 키 관리 기술을 활용하여 설계하였으며 제로 트러스트 기술 적용 시, 스토리지 보안성이 향상되는 것을 실제 서비스 운영을 통한 실험을 통해 확인하였다.

  • PDF

Back Fed Earth Fault Detection in Three Wire-Unigrounded Distribution-System By Zero Sequence Admittance (영상어드미턴스에 의한 직접접지 배전방식에서의 역가압 지락사고 검출)

  • Yoo, Myeong-Ho;Kim, Il-Dong;Han, Hong-Seok;Pak, Chul-Won
    • Proceedings of the KIEE Conference
    • /
    • 1993.07a
    • /
    • pp.120-123
    • /
    • 1993
  • This paper presents the developing a new algorithm for detecting the Back fed Earth Fault in three wire-unigrounded distribution system by zero sequence admittance. So called "Backfed Earth Fault" of the electric power distribution line refers to a class of earth faults that the load-side line only is grounded, following after the distribution line broken into two parts, the source-side and the load-side. Because its mechanism differs from that of other earth faults, it is therefore, required to examine. This paper deals with the detailed software of the digital protective relay for Backfed earth fault. In order to prove that the proposed schemes is good, we performed off-line simulation using data from EMTP and ETSA(Electrcity Trust Of South Austrilia). It is shown that the suggested algorithm is never mal operated.

  • PDF

A Study on the Use of Zero Pay Based on the UTAUT Model (통합기술수용이론(UTAUT)에 의한 제로페이 사용의도에 관한 연구)

  • Jung, Ji-Hee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.187-188
    • /
    • 2019
  • 2018년 12월 20일부터 '제로페이' 시범 서비스를 시작했으며, 2019년 3월 이후 본격적으로 정식 서비스를 시작해 전국으로 확대한다는 방침이다. 이론적 배경으로부터 도출된 가설을 검정하기 위해서 제로페이 사용자를 대상으로 편의표본추출법을 채택하여 설문 조사를 진행할 예정이다. 실증분석에서는 제시된 가설들의 영향 관계를 분석하고 이전 측정항목의 신뢰성과 타당성을 확보하기 위해 신뢰성 분석 및 타당성 분석을 실시한다. 또한 각 변수들 사이의 판별타당성과 변수간의 방향의 정도를 확인하기 위하여 상관관계분석을 실시하고, 경로모형과 가설을 검정한다. 본 연구를 통해 사용자들의 제로페이의 수용에 대한 결정요인을 보다 명확하게 이해할 수 있을 것이며, 관련 연구자나 실무자들은 물론 제로페이 서비스 기업들이 활용할 수 있는 마케팅 전략방안을 제시하고자 한다.

  • PDF

A Study of Security Threats and Zero Trust based Countermeasures in Smart Cities (스마트시티 보안 위협 분석 및 제로트러스트 기반 대응 전략 연구)

  • ChanYoung Kang;Sokjoon Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.174-175
    • /
    • 2023
  • 21세기가 도래함에 따라 새로운 도시의 형태인 스마트시티는 다양한 기기들이 네트워크 상에 서로 연결되어 이용자에게 편리함을 제공한다. 하지만 사이버 공격 기법 또한 고도화되고 있다. 많은 IoT 기기들이 상호작용함에 따라 사이버 공격을 당하면 도시 전체가 피해를 입을 수 있다. 이에 따라 본 논문에서는 스마트시티에서 일어날 수 있는 보안 사고에 대해 분석하고 이를 대응하기 위한 제로트러스트 도입 전략에 대해 연구하고자 한다.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment (SDP 환경에서 SVDD 기반 이상행위 탐지 기술을 이용한 디바이스 유효성 검증 방안)

  • Lee, Heewoong;Hong, Dowon;Nam, Kihyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1181-1191
    • /
    • 2021
  • The pandemic has rapidly developed a non-face-to-face environment. However, the sudden transition to a non-face-to-face environment has led to new security issues in various areas. One of the new security issues is the security threat of insiders, and the zero trust security model is drawing attention again as a technology to defend against it.. Software Defined Perimeter (SDP) technology consists of various security factors, of which device validation is a technology that can realize zerotrust by monitoring insider usage behavior. But the current SDP specification does not provide a technology that can perform device validation.. Therefore, this paper proposes a device validation technology using SVDD-based abnormal behavior detection technology through user behavior monitoring in an SDP environment and presents a way to perform the device validation technology in the SDP environment by conducting performance evaluation.

Analysis of Rubber-dam hydrologic Character for the River Environment Monitoring (하천환경 모니터링을 위한 취수보의 수문특성 분석)

  • Seo, Kyu-woo;Kim, Dai-gon;Kim, Su-hyun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2004.05b
    • /
    • pp.1326-1330
    • /
    • 2004
  • This study analyzes the rubber-dam of hydrologic character to be located in a Nagdong-river main stream in Dasamyeon Juggogli of the Dae-gu global city lot the river environment monitoring. The purpose of this research investigates the influence according to the rubber-dam install scientificly. A result natural disposition, prepare the gauge to matte the width of the area of the understanding and the computation of the rating which Apply is possible. Into the result of this research, $Q=898.8h^2-26126h+189886$ edge was computed to the rating. Also this study use the now rate to get for an upside expression and analysis a water balance. Through the officer to be efficient a hereafter seminar zero and processing of the data to be acquired, the supplementation so that this study can share the data to the online. High practical use of the The self-governinig body of the data and data confirmed report which loses in the trust will be achieved.

  • PDF

A Study for Management System of Integrity PACS Data Using DICOM Object (DICOM 객체를 활용한 무결성 PACS Data 관리시스템 구현)

  • Park, Bum-Jin;Jeong, Jae-Ho;Son, Gi-Gyeong;Jung, Young-Tae;Kang, Hee-Doo
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.15 no.1
    • /
    • pp.9-20
    • /
    • 2013
  • PACS is one of the most used medical information system and share information from other hospitals through the PACS. Data integrity means zero defects data and this is a prerequisite of information system performance. but I wonder if I can trust these informations that Incorrect information from radiotechnologist's mistakes, anonymous in emergency department, Newborn baby department, modified informations at later. And Modified informations causes defect in integrity of the data. When we import, we use DICOM header not DB data. so error occurs that DB data is deferent with DICOM Header information. This paper discusses to resolve as above problem using DICOM object such as DICOM PR, SR. And propose quality management system that can guarantee the patient information and can manage exam history.

  • PDF