• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.035 seconds

Detecting Malicious Scripts in Web Contents through Remote Code Verification (원격코드검증을 통한 웹컨텐츠의 악성스크립트 탐지)

  • Choi, Jae-Yeong;Kim, Sung-Ki;Lee, Hyuk-Jun;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Sharing cross-site resources has been adopted by many recent websites in the forms of service-mashup and social network services. In this change, exploitation of the new vulnerabilities increases, which includes inserting malicious codes into the interaction points between clients and services instead of attacking the websites directly. In this paper, we present a system model to identify malicious script codes in the web contents by means of a remote verification while the web contents downloaded from multiple trusted origins are executed in a client's browser space. Our system classifies verification items according to the origin of request based on the information on the service code implementation and stores the verification results into three databases composed of white, gray, and black lists. Through the experimental evaluations, we have confirmed that our system provides clients with increased security by effectively detecting malicious scripts in the mashup web environment.

A Design of the Smart Control System for Industrial Automation Equipment (산업용 자동화 장비를 위한 스마트 제어 시스템 설계)

  • Kim, Bo-Hun;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.677-684
    • /
    • 2017
  • Smart devices are used in a variety of industries, because applications for them are easy to develop and portable. However, industrial equipment can cause security problems for information and accidents when controlling the actuator of the equipment at a remote location. In this paper, we studied methods of solving these problems and the advantages of applying smart control systems to industrial equipment. We propose a manual manipulation method using queries and a smart control access procedure for controlling equipment using a smart device. In addition, we propose a data transmission method employing multiple encryption protocols and a user authentication method using unique information from the smart device and Q & A as the communication data protection and user authentication methods, respectively. In order to evaluate its performance, an operation test of the smart control system and user authentication comparison experiment were performed. In order to understand the advantages of applying the smart control system to the equipment, we conducted a comparative experiment with a teach pendant and evaluated its reaction time in case of error.

Design and Implementation of High-Resolution Image Transmission Interface for Mobile Device (모바일용 고화질 영상 전송 인터페이스의 설계 및 구현)

  • Ahn, Yong-Beom;Lee, Sang-Wook;Kim, Eung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1511-1518
    • /
    • 2007
  • As studies on ubiquitous computing are actively conducted, desire for various services, including image transmission storage, search and remote monitoring. has been expanding into mobile environment as well as to PCs. while CCTV (closed circuit TV) and un DVR (Digital video Recording) are used in places where security service such as intrusion detection system is required, these are high-end equipment. So it is not easy for ordinary users or household and small-sized companies to use them. Besides, they are difficult to be carried and camera solution for mobile device does not support high-quality function and provides low-definition of QVGA for picture quality. Therefore, in this study, design and implementation of embedded system of high-definition image transmission for ubiquitous mobile device which is not inferior to PC or DVR are described. To this end, usage of dedicated CPU for mobile device and design and implementation of MPEG-4 H/W CODEC also are examined. The implemented system showed excellent performance in mobile environment, in terms of speed, picture quality.

A Study on the Implementation of Management System Based on UHD Transmission Contents (UHD 송출 콘텐츠 기반 관리시스템 구현)

  • Kim, Moo Yeon;Jang, Byung Min;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.813-826
    • /
    • 2019
  • This paper is a study on the implementation of MAM(Media Asset Management) to utilize UHD contents as high quality broadcast material. The implementation method of this paper is to separate MAM roles with content management functions and transmission workflow functions from workflow, metadata and system interface related work, which are divided into core MAM and MAM-Ex structure. Through the method proposed in this paper, we improved the content management method by applying the page menu method to the material metadata modification and applying the template method to the material structure API. In addition, the storage of UHD material and the configuration of the component server are pooled without any distinction of channels, thereby enhancing the security of UHD transmission assets by minimizing the movement of contents together with broadcasting material protection.

Analysis of Domestic and Foreign Military UAV Development Trends and Suggestions for Countermeasures Against North Korea UAVs (국내외 군사용 무인기 개발 동향 분석 및 북한 무인기 대응 방안 제언)

  • Kim, Gyou-Beom;Cho, In-Je;Seo, Il-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.97-105
    • /
    • 2021
  • Countries such as the United States, Russia, and Europe are developing and operating UAVs for various purposes, including stealth UAVs. North Korea is also operating unmanned aerial vehicles, and it is presumed that it is continuously flying south of the demarcation line to obtain information on the national security zone, but it is difficult to detect and neutralize it effectively. Therefore, this paper analyzed the military UAV development trends and military radar specifications in Western countries such as the United States and communist countries such as Russia, China, and North Korea through literature research. In addition, based on the investigation of the AESA radar-based UAV response system in the country, not only general responses but also countermeasures such as direct strike and electromagnetic pulses to North Korean UAVs that cannot be jammed were suggested.

Comparison of Hazard Analysis for Medical Device System (의료기기 시스템의 해저드 분석 기법 비교)

  • Choi, Bo-yoon;Lee, Byong-gul;Han, Hyuk-soo
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.133-145
    • /
    • 2018
  • Medical systems incurred accidents may result in significant damage for human being. Therefore, performing hazard analysis is important for medical system which is to identify hazard for preventing the accidents and minimizing the potential harm. Hazard analysis that is applied medical systems are difficult to apposite selected, because difference of analysis methods and applied development lifecycle is caused by objective of hazard analysis. It is required to select appropriate hazard analysis at concept phase during development lifecycle, owing to basic requirement elicitation to mitigate or prevent hazard based on identified hazard at concept phase. In this paper, hazard analysis methods, PHA and STPA, are compared at concept phase in which both methods have been applied on the medical system. As a result of compared methods, hazard analyst can be selected optimized hazard analysis methods for concept phase of the medical systems.

A Study on Maritime Communication LINKS for Emergency Disaster (비상 재난에 대비한 해양 연계통신 연구)

  • Yoo, Jae-won;Park, Dae-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.375-378
    • /
    • 2014
  • Marine disaster, such as 'the sinking of the Sewol ferry', on the ocean needs emergency communication with land post and Rescue services. Especially, It needs of emergency comomunication system has increased in Korea peninsula with the sea on three side. The system will be more fully equipped to deal with disasters linked to communication so alone sailing ship is at sea. Research is needed on communication links to submarines operated by submarine to sink a ship, as well as immersion in the sea with. And it is necessary in the study of the land in preparation for the emergency disaster ship and submarine communication links for offshore and subsea oil and associated communication systems. Will be studied in preparation for the communication protocols and emergency and disaster location and land the plane or for a career in the satellite systems are linked through this. It is necessary for this purpose is research on the integrated emergency disaster communication ecosystem.

  • PDF

Method for Detecting Modification of Transmitted Message in C/C++ Based Discrete Event System Specification Simulation

  • Lee, Hae Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.171-178
    • /
    • 2021
  • In this paper, the author proposes a method for detecting modification of transmitted messages in C/C++ based Discrete Event System Specification (DEVS) simulation. When a message generated by a model instance is delivered to other model instances, it may be modified by some of the recipients. Such modifications may corrupt simulation results, which may lead to wrong decision making. In the proposed method, every model instance stores a copy of every transmitted message. Before the deletion of the transmitted message, the instance compares them. Once a modification has been detected, the method interrupt the current simulation run. The procedure is automatically performed by a simulator instance. Thus, the method does not require programmers to follow secure coding or to add specific codes in their models. The performance of the method is compared with a DEVS simulator.

A Study on the Current Status and Responses System of Child Abuse

  • Lee, Young-Woo;Jang, Su-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.109-114
    • /
    • 2022
  • Recently, child abuse cases such as the "16-month death of adopted children" have occurred one after another in our society and have emerged as a serious social problem. Child abuse not only significantly violates children's human rights, but also leaves scars on the child's body and sometimes threatens their lives. As a result, laws related to child abuse have been revised several times and related systems have been reorganized to protect the affected children safely and grow healthy, but child abuse cases continue to occur. Therefore, it is urgent to come up with effective measures to prevent child abuse crimes and protect affected children. Therefore, this study examines the concept and related laws of child abuse, the current status of child abuse, and suggests countermeasures to effectively respond to child abuse compared to the US child abuse legislation and child protection system.

User Response to Mobile Payment System: Emotional, Cognitive, and Behavioral Approaches (모바일 간편결제시스템 사용의 감성적, 인지적, 행동적 반응 과정 연구)

  • Choi, Yoo-Jung;Hwangbo, Hyunwoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1158-1164
    • /
    • 2022
  • In this study, the emotional reaction process and the cognitive reaction process were divided into the process of building trust in order to form a continuous use intention in the process of using the mobile simple payment system. We examined the process by which various external factors generate continuous use intentions, that is, behavioral responses through the process of each reaction. External factors were divided into social factors, systemic factors, and social factors. Among them, system factors were social norms and images, and systemic factors were simplicity and accessibility. And the social factors consisted of security and compatibility. And the emotional response was set as pleasure and emotional trust, the cognitive response was cognitive trust, and the final dependent variable was set as continuous use intention. A survey was conducted for model analysis, and the analysis results were derived using PLS.