• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.029 seconds

Security Assessment Technique of a Container Runtime Using System Call Weights

  • Yang, Jihyeok;Tak, Byungchul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.21-29
    • /
    • 2020
  • In this paper, we propose quantitative evaluation method that enable security comparison between Security Container Runtimes. security container runtime technologies have been developed to address security issues such as Container escape caused by containers sharing the host kernel. However, most literature provides only a analysis of the security of container technologies using rough metrics such as the number of available system calls, making it difficult to compare the secureness of container runtimes quantitatively. While the proposed model uses a new method of combining the degree of exposure of host system calls with various external vulnerability metrics. With the proposed technique, we measure and compare the security of runC (Docker default Runtime) and two representative Security Container Runtimes, gVisor, and Kata container.

A Study on Method to Establish Cyber Security Technical System in NPP Digital I&C (원전 디지털 계측제어시스템 사이버보안 기술 체계 수립 방법 연구)

  • Chung, Manhyun;Ahn, Woo-Geun;Min, Byung-Gil;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.561-570
    • /
    • 2014
  • Nuclear Power Plant Instrumentation and Control System(NPP I&C) which is used to operate safely is changing from analog technology to digital technology. Ever since NPP Centrifuge of Iran Bushehr was shut down by Stuxnet attack in 2010, the possibility of cyber attacks against the NPP has been increasing. However, the domestic and international regulatory guidelines that was published to strengthen the cyber security of the NPP I&C describes security requirements and method s to establish policies and procedures. These guidelines are not appropriate for the development of real applicable cyber security technology. Therefore, specialized cyber security technologies for the NPP I&C need to be developed to enhance the security of nuclear power plants. This paper proposes a cyber security technology development system which is exclusively for the development of nuclear technology. Furthermore, this method has been applied to the ESF-CCS developed by The KINCS R&D project.

Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System

  • Mnyawi, Richard;Kombe, Cleverence;Sam, Anael;Nyambo, Devotha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.364-374
    • /
    • 2022
  • Health information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology has emerged as a trending technology with the potential to improve data security. Despite the effectiveness of this technology, still HIS are suffering from a lack of data privacy and confidentiality. This paper presents a blockchain-based data storage security architecture integrated with an e-Health care system to improve its security. The study employed a qualitative research method where data were collected using interviews and document analysis. Execute-order-validate Fabric's storage security architecture was implemented through private data collection, which is the combination of the actual private data stored in a private state, and a hash of that private data to guarantee data privacy. The key findings of this research show that data privacy and confidentiality are attained through a private data policy. Network peers are decentralized with blockchain only for hash storage to avoid storage challenges. Cost-effectiveness is achieved through data storage within a database of a Hyperledger Fabric. The overall performance of Fabric is higher than Ethereum. Ethereum's low performance is due to its execute-validate architecture which has high computation power with transaction inconsistencies. E-Health care system administrators should be trained and engaged with blockchain architectural designs for health data storage security. Health policymakers should be aware of blockchain technology and make use of the findings. The scientific contribution of this study is based on; cost-effectiveness of secured data storage, the use of hashes of network data stored in each node, and low energy consumption of Fabric leading to high performance.

The Improvement Plan of the Curriculum for Development in Study of Security (경호학의 발전을 위한 교육과정 개선방안)

  • Jeong, Youn-min;Bak, Jun-seok;Yang, Deok-youl
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.2
    • /
    • pp.88-106
    • /
    • 2009
  • The potential risks of Korean public security has been increasing by economic stagnation. As a result of this, a feeling of unrest about our society causes expansion of private security industry as well as necessity of professional education. It has been 15years to produce security expert in colleges which is professional education institute, and academic efforts and contributions to society are shown remarkable results for the period. A private security industry had got public interest as a potential favorable job, because of increasing dependence of public to take care of unrest facts. Many colleges have introduced courses about public security because of facing necessity of professional education system. Then total 59 institutes including 22 universities and 37 colleges introduce courses of public security. Although name of courses are diverse depends on institution, purpose of course or members of course, the ultimate purpose of these courses is preventing public from crimes and managing public security. A fixed and out of date education system of universities in Korea can not produce talent person who people, companies and government want. The institutions have been recruiting many student so far, and it shows growth of the industry in quantity aspects. However quality aspect of the industry has been failed because it is hard to get a job for graduated students. Consequently, to improve quality of the industry people need cooperation of institution, professors and students.

  • PDF

A development of weakness calculation method for information system (정보시스템 취약도 계산 방법 개발)

  • Park, Joong-Gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.131-139
    • /
    • 2007
  • Vulnerability analysis helps to remove discriminating vulnerabilities that exist in various equipment that composes operating information system. It is possible to explain representation and exclusion method about vulnerabilities of each equipment by vulnerability analysis. But it is difficult to display the weakness of whole information system. To do this, analyst synthesizes several information that achieved by vulnerability analysis. But the existing method does not provide fair evaluation because operators' personal opinion. In this paper, we explain about method that unites discriminatively vulnerable point and expresses whole weakness degree in numerical value by equipment, by system class, or by overall system.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Offline-to-Online Service and Big Data Analysis for End-to-end Freight Management System

  • Selvaraj, Suganya;Kim, Hanjun;Choi, Eunmi
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.377-393
    • /
    • 2020
  • Freight management systems require a new business model for rapid decision making to improve their business processes by dynamically analyzing the previous experience data. Moreover, the amount of data generated by daily business activities to be analyzed for making better decisions is enormous. Online-to-offline or offline-to-online (O2O) is an electronic commerce (e-commerce) model used to combine the online and physical services. Data analysis is usually performed offline. In the present paper, to extend its benefits to online and to efficiently apply the big data analysis to the freight management system, we suggested a system architecture based on O2O services. We analyzed and extracted the useful knowledge from the real-time freight data for the period 2014-2017 aiming at further business development. The proposed system was deemed useful for truck management companies as it allowed dynamically obtaining the big data analysis results based on O2O services, which were used to optimize logistic freight, improve customer services, predict customer expectation, reduce costs and overhead by improving profit margins, and perform load balancing.

Automatic Intrusion Response System based on a Self-Extension Monitoring (자기확장 모니터링 기반의 침입자동대응 시스템)

  • Jang, Hee-Jin;Kim, Sang-Wook
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.489-497
    • /
    • 2001
  • In the coming age of information warfare, information security patterns take on a more offensive than defensive stance. It is necessary to develop an active form of offensive approach to security protection in order to guard vital information infrastructures and thwart hackers. Information security products need to support an automatic response facility without human intervention in order to minimize damage to the attacked system and cope with the intrusion immediately. This paper presents an automatic intrusion response model which is developed on a Self-Extension Monitoring. It also proposes an ARTEMIS(Advanced Realtime Emergency Management and Intruder Identification System), which is designed and implemented based on the suggested model. The Self-Extension Monitoring using self-protection and replication minimizes spatial limitations on collection of monitoring information and intruder tracing. It enhances the accuracy of intrusion detection and tracing.

  • PDF

Research Trends in Economic Effects of Information Security Certification: Focused on the ISMS (Information Security Management System) (보안인증의 경제적 효과에 대한 연구동향 분석: ISMS(정보보호관리체계)를 중심으로)

  • Kong, Hee-Kyung;Jun, Hyo-Jung;Lee, Song-Ha;Kang, Min-Seong;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.821-835
    • /
    • 2016
  • This study investigates the domestic and international research trends to analyze the economic effects of various information security certification systems. Results of the study can suggest future research topics for researchers, and help make rational decision-making on introducing information security management systems for practitioners.