• Title/Summary/Keyword: hacking

Search Result 782, Processing Time 0.029 seconds

Hacking Attacks and Security Measures on All-IP Method and Gateway Method (All-IP방식과 Gateway방식에 대한 해킹공격과 보안대책)

  • Kwon, Se-Hwan;Park, Dea-Woo;Yoon, Kyung-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.265-268
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is support a VoIP service as All-IP method and Gateway method etc. All-IP method to the unit in an Internet environment by applying both the IP service is an VoIP system. Gateway method, using a normal phone call in a way that the Internet is using VoIP. In this paper, scanning and analyze the vulnerability for VoIP systems and networks from All-IP method and the Gateway method In the test bed. All-IP method and Gateway method found in the VoIP vulnerabilities, hacking attack, a denial of service attacks and VoIP spam attacks are carried out. Through analysis of post-attack security measures is proposed.

  • PDF

Knowing the Level of Information Security Awareness in the Usage of Social Media Among Female Secondary School Students in Eastern Makkah Al-Mukarramah- Saudi Arabia

  • Gharieb, Magdah Ezat
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.360-368
    • /
    • 2021
  • This study aims at knowing both the level of information security awareness in the use of social media among female secondary school students in Makkah Al-Mukarramah, and the procedures that students follow when exposed to hacking or other security problems. The study relied on the descriptive survey approach. The results showed a high percentage of social media use among the study sample, and the most used applications by the students are snapchat and Instagram applications successively. In fact, 48% of the study sample have awareness of information security, the majority of the students memorize the password in the devices, most of them do not change them, and they have knowledge of fake gates and social engineering. However, their knowledge of electronic hacking is weak, and students do not share passwords with anyone at a rate of 67%. At the same time, they do not update passwords. Moreover, most of the procedures followed by students when exposed to theft and hacking is to change the e-mail data and the password, and the results varied apart from that, which reflects the weak awareness of the students and the weakness of procedures related to information security. The study recommends the necessity to raise awareness and education of the importance of information security and safety, especially in light of what the world faces from data electronic attacks and hackings of electronic applications.

Implications of the 'Sontanda' Phenomenon of Scientists for Science Education: Focusing on Ian Hacking's Creation of Phenomena (과학자의 '손탄다' 현상이 과학교육에 주는 함의 -이언 해킹의 현상의 창조를 중심으로-)

  • Choi, Jinhyeon;Jeon, Sang-Hak
    • Journal of The Korean Association For Science Education
    • /
    • v.42 no.2
    • /
    • pp.253-264
    • /
    • 2022
  • The purpose of this study is to examine the practice of scientists from the perspective of Ian Hacking's 'creation of phenomena'. Scientific phenomena, according to Hacking, are regular and do not exist in nature without the intervention of scientists or experimental tools. This study tries to derive scientific educational meaning by analyzing the thoughts and episodes of the 'Sontanda (inter-individual variability)' phenomenon experienced by four life scientists. The Sontanda phenomenon is a common term used by scientists to describe phenomena in which findings do not appear consistently even when studies are carried out using the same experimental procedure and materials. The following four educational implications were discovered as a result of the research. First, we confirmed the importance of embodied knowledge, or non-verbal knowledge, which solves issues by making appropriate judgments and reactions at all times, rather than simply becoming accustomed to the experimental method. This argues that propositional knowledge and non-verbal knowledge should be handled equally in order to provide students with a practical scientific inquiry. Second, we tried to reconsider the picture of the experiment. The phenomenon revealed in the interviews of scientists is rare, and it takes a long time to stabilize the phenomenon. On the other hand, the image of school experiments is always positive and consistent, necessitating a shift in perspective. Third, the precise meaning of scientific practice could be confirmed. This study confirms that scientists use their knowledge effectively in line with the circumstances, and we examined strategies to apply scientific practice to school instruction based on this. Finally, by provoking uncertainty, the Sontanda phenomena may give students with an opportunity to engage in meaningful scientific involvement. By breaking away from the cookbook experiment, this study expects school experimental education to help in efforts to experience scientific practice.

Stepping Stones Attack Simulator for TCP Connection Traceback Test

  • Choi, Byeong-cheol;Seo, Dong-Il;Sohn, Sung-Won;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2112-2115
    • /
    • 2003
  • In this paper, we describe a SSAS (stepping stones attack simulator) that is automatic tool for testing and evaluation in TCP connection traceback system. The SSAS can pass multiple hosts that are included with hacker, middle-path hosts and victim’s system. And SSAS can also attack through commands to exploit the victim’s system. Usually, hackers do not expose their real attack positions through compromising the middle-path hosts like stepping-stones. Namely, hackers perform the stepping stones attacks in Internet. The SSAS can be utilized by developments and tests of the various countermeasure techniques of hacking. Specially, in this paper, it is used to test the performance of TCP connection traceback system.

  • PDF

Easy Keypad - Soft Keyboard for Login Information Input in Smart Devices (쉬운 키패드 - 스마트 기기에서 사용하는 로그인 정보 입력만을 위한 소프트키보드)

  • Koh, Hyung Dae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.107-120
    • /
    • 2014
  • In this paper, we suggest a soft keyboard, called easy keypad, that we use only for login information input in smart devices. Especially, as easy keypad is applied to MTS(Mobile Trading System) we suggest easy keypad in MTS. Easy keypad UI in MTS represents 20 letters and users input login information by using 20 letters. We suggest protocol which decides letters represented in easy keypad UI, which is code for users to input login information by using 20 letters. We analyze easy keypad's safe degree for soft keyboard security threat, especially when it comes to point hacking, we suggest comparison among original soft keyboard's safe degree. Also we suggest mathematical fomula for measuring soft keyboard's convenience and then we analyze the result of soft keyboard's convenience by the presented mathematical formula.

Self-Recognition Algorithm of Artificial Immune System (인공면역계의 자기-인식 알고리즘)

  • 선상준;이동욱;심귀보;성원기
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.12a
    • /
    • pp.185-188
    • /
    • 2001
  • According as many people use a computer newly, damage of computer virus and hacking is rapidly increasing by the crucial users. To block hacking that is intrusion of a person's computer and the computer virus that destroys data, a study for intrusion-detection of system and virus detection using a biological immune system is in progress. In this paper, we make a model of positive selection and negative selection of self-recognition process that is ability of T-cytotoxic cell that plays an important part in biological immune system. So we embody a self-nonself distinction algorithm in computer. To prove the efficacy of self-recognition algorithm, we use simulations by a cell change and a string change of self file.

  • PDF

Development of Media Crypto Algorithm for anti-hacking into CCTV (CCTV 해킹방지를 위한 미디어 암호화 알고리즘)

  • Hwang, Seon-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.62 no.2
    • /
    • pp.98-102
    • /
    • 2013
  • There are so many CCTV in our streets, buildings and public places. Nevertheless, security methods for CCTV are rarely. This paper describes a study on developing a media crypto algorithm for anti-hacking into CCTV. H.264 codec is used to compress the video stream in CCTV systems. HIGHT algorithm provided by KISA is adopted as a crypto algorithm in our development. Other crypto methods except HIGHT could be selected by company's security police. Only some bytes in VCL(Video Coding Layer) of H.264 are encrypted to improve the performance of limited platforms, such as CCTV, WebCam, smartphone. Very fast and light crypto algorithm was developed by our researches.

A Study on the Development of a Virtual Card Number Generation System to Safety EC (안전한 전자상거래를 위한 가상카드번호 생성시스템의 개발에 관한 연구)

  • Choi, Joon-Kee;Lee, Jong-Kwang;Kang, Young-Chang
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.1
    • /
    • pp.27-32
    • /
    • 2010
  • In this paper, we research a virtual card generation system to secure e-commerce. Network security has increased the need to meet rapidly growing trend. And the amount and quality of e-commerce expansion due to the need for secure commerce transactions has increased even more. Instead of exposing the actual credit card number, we expose a virtual card number on the network. It can prevent the risk of hacking. We proved that through various experiments.

Network Security System for Next Generation Network Environment (차세대 네트워크 보안 시스템)

  • 정연서;김환국;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.795-799
    • /
    • 2003
  • Computing and Networking technologies are rapidly developed. Currently, Internet environment can offer voice, multimedia data as well as real-time movie services. But, the number of hacking has increased very much and the damages become serious. In this paper, the change of hacking method and security paradigm is investigated. And, we study in existing network security systems including newly developed security systems. Finally, we describe development directions of network sorority system for next generation network environment.

  • PDF