• Title/Summary/Keyword: contents security system

Search Result 571, Processing Time 0.025 seconds

A Design of Multi-tier Structure Digital Content Distribution System based on Public Key (공개 키 기반의 계층 구조를 갖는 디지털콘텐트 분배 시스템의 설계)

  • Ko, Il-Seok;Na, Yun-Ji;Cho, Dong-Wook
    • The KIPS Transactions:PartA
    • /
    • v.11A no.2
    • /
    • pp.175-180
    • /
    • 2004
  • Generally, as for the multimedia high quality contents, an illegality facsimile is possible without a damage of a quality. Also a distribution of contents duplicated illegality in an Internet is giving a great economic loss to digital contents provider. Therefore, a study for security and efficient distribution of digital contents is required. The most important issues in a design of digital contents distribution system are a user convenience, an execution speed and a security. In this study, we designed digital contents distribution system that used a web caching technology and an encryption/decryption technique on hierarchical structure. The proposed system was the digital contents distribution system that improved a security and execution speed, a convenience of a user. Also it verified performance superiority of a proposed system by an examination.

A Study of the Effectiveness and Status of the Information Security Disclosure System (정보보호 공시제도의 운영실태와 효과성 분석)

  • Baek, Seung Jun;Lee, Hong Joo
    • Knowledge Management Research
    • /
    • v.22 no.1
    • /
    • pp.309-330
    • /
    • 2021
  • The information security disclosure system (ISDS) has been implemented since 2016 to ensure the protection of stakeholders and the right to know, and to promote voluntary investment in information protection by companies. Regarding the information security disclosure system, there have been studies that urge the implementation of the system, but studies that analyze the contents disclosed after the implementation of the system or suggest improvement directions are few. In this study, the contents of the information security disclosure system that had been announced on the information security industry promotion portal until 2019 were analyzed, the current status was summarized, and the direction of system improvement was suggested. In some cases, companies that disclosed information through the disclosure system increased the number of personnel in charge and obtained certifications related to information security, but did not find any effect on the increase/decrease in investment. The current disclosure system has not been activated because it has difficulty in giving individual companies incentives to disclose. Thus, this study suggests the inclusion of ISDS to information security management system (ISMS), which is currently mandatory for certain companies. In the current disclosure system, it is difficult for the company's stakeholders or customers to check the contents of the disclosure. As a way to do this, a method of including in the contents of the personal information processing policy or the notification of the use of personal information was suggested.

Measures to Enhance Emergency Management Capacity of Private Security Industry

  • Park, Dong-Kyun;Kim, Do-Kyuo
    • International Journal of Contents
    • /
    • v.5 no.1
    • /
    • pp.27-32
    • /
    • 2009
  • The private security will overcome the limit of public police system and implement a small and efficient government concept. Especially in recent years, this security system has naturally been expanded in its functions from crime prevention to prevention of disasters. To manage the emergency by the private security industry, the private security services to involve some peculiarity and specialty. The policy agenda of private security industry for crisis management are suggested. First of all, to provide quality services for emergency management, the guards from private organizations should receive professional education and training to secure the specialty. Second, we need to improve the quality of security instructors with intensive education system for them. Security instructors should be able to effectively handle lots of different matters in the fields of security, but examination of the current curriculum of education for security instructor indicates that there is not much chance of it. Third, must be natural in light that the private organizations have some limitations in their operational capabilities and scopes. Private security duties are well established in cooperation with related institutions such as the police. Lastly, development of high quality crisis management commodities in the private security becomes even more significant. The government should be determined to make an effort to grow the private industry and foster a political environment for the same purpose.

Design and Implementation of Mobile Security System for Digital contents Rights Protection in Wireless Internet Environment (무선 인터넷 환경에서 디지털 컨텐츠 저작권 보호를 위한 모바일 보안 시스템의 설계 및 구현)

  • Kim, Hoo-Jong;Na, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.695-704
    • /
    • 2003
  • As wireless Internet speads widely, circulation of various types of digital contents become active. Therefore, it is necesary to make a mobile-based DRM (Digatal Rights Management) system to protect digital contents from illegal reproduction and to give proper rights to contents users, In this paper, we present a mibile security system, which protects the copyright for digital contents offered throughout the mobile environment. Our security system is focused on presenting mobile-based DRM architecture. Especially, considering mobile device's decrying power, we adopted partial encryption scheme. For this, wecompared and evaluated the performant of each contents encryption scheme (the entire encryption scheme and the partial encription scheme) and proved that a proper DRM system for current wireless devices is the partial encryption system. Our mobile DRM system can be very efficient to protect contents on the wireless Internet environment.

Development of Managing Security Services System Protection Profile (보안관제시스템 보호프로파일 개발)

  • Son, Seung-Wan;Kim, Kwang-Seok;Choi, Jung-Won;Lee, Gang-Soo
    • Journal of Digital Contents Society
    • /
    • v.16 no.2
    • /
    • pp.345-353
    • /
    • 2015
  • Security Management System is a system which operates in the security control center for security control. All living things across the Internet in recent years, with the rapid increase in the subscriber base has increased the need for network security dramatically depending on yirueojim through web services, thus cyber security sheriff, I have a big issue to build a security management system, each agency and perform control tasks. But the security functional requirements for security management system would not specified exactly, in developing a security management system to build and design a situation that PP's needs require a lot of trouble. In this paper, we develop a Managed Security System Protection Profile for the security functional requirements specification of the security management system.

Design and Implimentation of Intrusion Detection System on Contents Security (컨텐츠 보안 침입 탐지 시스템 설계 및 구현)

  • Kim, Young Sun;Seo, Choon Weon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.164-168
    • /
    • 2015
  • As Internet use is widespread advertising through the Web, shopping, banking, etc. As the various services offered by the network, the need for Web security is increasing. A security system for the protection of information assets and systems against various types of external hacking threats and unlawful intrusion will require. Intrusion Detection Tool of the paper web will have is to increase the security level, to prevent the loss of resources and labor spent by the individual monitoring of the web. Security intrusion detection system analyzes the cause of the problem of the security vulnerability and exposure of the information on the Web. Using a monitor to determine a fast support of security is to design a security system for the purpose of protecting the information security vulnerability and exposure information.

Design and Implementation of Secure Distribution System for Broadcasting Contents (방송 콘텐츠를 위한 안전한 유통 시스템 설계 및 구현)

  • Lee, Jin-Heung;Lee, Hea-Ju;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.19-27
    • /
    • 2007
  • Broadcasting contents protection system for HDTV has many difficult to apply file encryption technology that using the existing DRM systems. Therefore, this system has to be processed as accommodative about broadcasting contents format such as TS and PS and so on. Also, this system must support efficient encryption technology and random access mode. In addition, this system must have suitable key distribution mechanism in broadcasting environment. In this paper, we propose and implement encryption/key distribution scheme applicable to encoder/decoder without changing the existing MPEG system.

The Effects of Favorable Responses to the Municipal Police System on the Private Security Confidence of the Police (자치경찰제에 대한 호의적 반응이 경찰의 민간경비 신뢰에 미치는 영향)

  • Shin, Jae-Hun;Kim, Sang-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.281-290
    • /
    • 2019
  • With the goal of enforcing a municipal police system in a national scale starting from 2021, the proposal for introducing municipal police system is promoted and the private security is spotlighted as the measure for supplementing the issues for municipal police system. To solve this issue, the method of promoting and actively utilizing the private security which served as an assistant for security service into the cooperator for security service is suggested as a practical method. To analyze how police's favorable attitude toward introduction of municipal police system influence on the favorable trust toward private security system, this study conducted a survey on front line police officers and analyzed the collected data through statistical technique. As a result, the police officers favorable to introduction of municipal police system also showed positive attitude toward private security and machine security. However, the survey didn't provide significant result on labor expense. In order for the private security service to be accepted as the cooperator for security service, it is necessary to solve the labor expense issue and strengthen trust on machine security.

An Information Security Model for Digital Contents (디지털 콘텐츠의 정보보호 분석 모델)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.9-14
    • /
    • 2010
  • The network architecture and analysis model for evaluating the information security are presented to distribute the reliable and secure multimedia digital contents. Using the firewall and IDS, the function of the proposed model includes the security range, related data collection/analysis, level evaluation and strategy proposal. To develop efficient automatic analysis tool, the inter-distribution algorithm and network design based on the traffic analysis between web-server and user are needed. Furthermore, the efficient algorithm and design of DRM/PKI also should be presented before the development of the automatic information security model.

Design and Implementation of Efficient DRM System for Contents Streaming based on H.264 (H.264 콘텐츠 스트리밍을 위한 효율적인 DRM 시스템의 설계 및 구현)

  • Jung, Yoon-Hyun;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.155-163
    • /
    • 2009
  • DRM system with streaming scheme has obtained it's priority due to generalized production and distribution of digital contents by development of multimedia device and internet. Previous DRM system with streaming scheme over-burdened the system by encrypting every data of the contents. This paper presents DRM system with new streaming scheme that is able to independently transmit encrypted contents to network protocol and maximize system function by encrypting only certain parts of data. Also, performance is analyzed through designing and implementing the proposed system.