• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.032 seconds

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

Research on Mac OS X Physical Memory Analysis (Mac OS X 물리 메모리 분석에 관한 연구)

  • Lee, Kyeong-Sik;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.89-100
    • /
    • 2011
  • Physical memory analysis has been an issue on a field of live forensic analysis in digital forensics until now. It is very useful to make the result of analysis more reliable, because record of user behavior and data can be founded on physical memory although process is hided. But most memory analysis focuses on windows based system. Because the diversity of target system to be analyzed rises up, it is very important to analyze physical memory based on other OS, not Windows. Mac OS X, has second market share in Operating System, is operated by loading kernel image to physical memory area. In this paper, We propose a methodology for physical memory analysis on Mac OS X using symbol information in kernel image, and acquire a process information, mounted device information, kernel information, kernel extensions(eg. KEXT) and system call entry for detecting system call hooking. In additional to the methodology, we prove that physical memory analysis is very useful though experimental study.

Password System Enhancing the Security agains (타인의 관찰에서 안전한 패스워드 시스템)

  • Park Jong-Min;Kim Yong-Hun;Cho Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1790-1795
    • /
    • 2004
  • In this paper, the new password system called SPS(Secure Password System) in order to enhance the security of the system as well as to improve the weakness of the password which is very easy to be disclosed by other people, improving the methods which is identifying the users' legality using the computer system in the multi-users computer. SPS is adopting several strong points such as Easy Embodiment, Low Cost, and most of the good points of the traditional password system. In addition, it makes an easy introduction from the traditional password system. Above SPS has the high stable security in the practical experiments about both the literal attack of the online intruders and the exposure of Clients' password.

A survey and categorization of anomaly detection in online games (온라인 게임에서의 이상 징후 탐지 기법 조사 및 분류)

  • Kwak, Byung Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1097-1114
    • /
    • 2015
  • As the online game market grows, illegal activities such as cheating play using game bots or game hack programs, running private servers, hacking game companies' system and network, and account theft are also increasing. There are various security measures for online games to prevent illegal activities. However, the current security measures are not enough to prevent all highly evolving game attacks and frauds. Some security measure can do harm game players usability, game companies need to develop usable security measure that is well fit to game genre and contents design. In this study, we surveyed the recent trend of various security measure applied in online games. This research also classified illegal activities and their related countermeasure for detection and prevention.

The Study of Information Security Technologies for Security Incidents in Online Game Service (게임 서비스 침해유형에 따른 기술적 대응방안 연구)

  • Chang, Hang-Bae;Kim, Kyung-Kyu;Lee, Si-Jin
    • Information Systems Review
    • /
    • v.9 no.3
    • /
    • pp.83-98
    • /
    • 2007
  • This study focused on online game security, which has been considered relatively insignificant when compared to the online game industry's rapid growth. In this study, the state of security incidents in the Korean game industry and security solutions for such cases were examined. At first the security incidents were classified according to the type of game security infringement. Based upon this classification, this study analyzed the causes that give rise to infringement of online game security, and developed technical solutions for such cases. Finally, this study verified whether or not these technical solutions could be applied to online game sites.

The Causal Relationship between Information Security Countermeasures and Information System Misuse (정보보안대책과 정보시스템 오남용과의 인과적 관계)

  • Lee, Joontaik;Kim, Sanghoon
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.81-104
    • /
    • 2015
  • Intentional information systems (IS) misuse is a serious problem in many organizations. This study aims at developing the theoretical framework of deterring IS misuse on the basis of Nagin's General Deterrence Theory (GDT) which is very famous in the area of socio-criminology. Applying GDT to the IS misuse situation could be reasoned that the perceived certainty and the perceived severity of sanctions associated with committing IS misuse have positive impact on deterring the deviant behaviors. Also, these two constructs (certainty of sanctions and severity of sanctions) could be inferred to be influenced by the four types of IS security countermeasures (security policies, security awareness program, monitoring practices and preventive security software) derived through critically reviewing IS security-relevant literature. The proposed research model and ten hypotheses were empirically analysed using structural equation modelling with the data collected by conducting a questionnaire survey of staff members in business organizations in Korea. As a result, it was found that five ones of ten hypotheses were supported. It is thought that this study makes theoretical contribution to expanding research area of IS security and also has strong implications for IS security management practices within organizations.

A Secure Clustering Methodology and an Arrangement of Functional Firewall for the Enhancement of Performance in the Inbound Network (인바운드 네트워크의 성능향상을 위한 보안 클러스터링 기법과 기능성방화벽의 배치)

  • Jeon, Sang-Hoon;Jeon, Jeong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7B
    • /
    • pp.1050-1057
    • /
    • 2010
  • Nowadays, the network attack occurs frequently. At the same time, the inbound network is also attacked. Even though the security system has been continuously developed in order to prevent from attacks, the network performance is sacrificed for the network security. Therefore, a security system which obtains performance and security together is urgently needed. In this paper, an arrangement of functional firewall and a secure clustering methodology, obtained from distributing functions of a conventional firewall, are proposed based on the idea that performance and security should be obtained together.

Realization of the Biba Security Model in an OSI-distributed (OSI-분산 시스템에서의 Biba Security 모델의 구현)

  • Park, Chong-Hwa
    • The Journal of Information Technology
    • /
    • v.5 no.2
    • /
    • pp.35-45
    • /
    • 2002
  • This paper discusses a distributed implementation of the Biba security policy model. Implementation of an service in the OSI-RM is not sufficient for enforcing the Biba model. Also confidentiality services are necessary. Public Key Systems(PKSs) are considered for the realization of these security services. In this paper symmetric & asymmetric cryptographic systems are considered for the realization of these security service. It is investigated how key-distributions can be found resulting in a minimum number of key.

  • PDF

A Study on the application of Information Security Management System(ISMS) according to size and characteristics of company (기업규모와 특성에 따른 정보보호 관리체계(ISMS) 적용 방안 연구)

  • Seo, Dong-Ho;Shin, Hyun-Min
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.227-229
    • /
    • 2017
  • ICT산업의 발전과 전자상거래의 대중화에 따라 정보시스템에 대한 지능 고도화 된 사이버위협이 증가되고 있고, 개인 및 기업정보 유출의 피해규모가 커짐에 따라 정보보호의 중요성이 한층 더 부각되고 있다. 이미 세계 각국에서는 ISO27001, BS10012 등 정보보호 관리 제도를 구축하여 운영하고 있다. 이에 국내에서도 미래창조과학부 주관 정보보호 관리체계(ISMS:Information Security Management System) 인증제도를 비롯한 정보보호 제도를 구축하여 기업 정보자산의 안전과 신뢰성 향상 등의 목적으로 자율과 의무 대상을 구분하여 운영하고 있다. 하지만 기업의 규모와 환경, 매출 등에 따라 형평성 있게 구분하지 않은 현재의 정보보호 관리체계 인증제도에는 여러 모순이 존재한다. 통제항목을 비롯한 세부점검항목을 인증 기업을 대상으로 모두 공통으로 적용하기 때문이다. 본 논문에서는 정보 보호 관리체계 인증제도와 유사 인증체계를 비교하여 인증기준 항목을 기업의 규모와 특성에 따라 유형별로 구분하여 적용하는 방안을 연구하였다.

Development of Information Security Support System for USN Application (USN 응용을 위한 보안 시스템 개발)

  • Lee, Seok-Cheol;Jeong, Myung-Kyun;Kim, Chang-Soo
    • Annual Conference of KIPS
    • /
    • 2009.04a
    • /
    • pp.1523-1526
    • /
    • 2009
  • 유비쿼터스 환경 구축을 위한 무선 센서 네트워크 기술은 센서에 의한 원격 모니터링과 같은 어플리케이션에 많은 분야에 적용되고 있다. 무선 센서 네트워크는 제한된 컴퓨팅능력으로 인해 기존의 보안 프로토콜을 적용하기 어렵고 무선 매체의 특성상 보안의 취약성을 내재하고 있다. USN 응용은 주로 센서 노드 간의 통신을 위한 센서 필드, 데이터를 수집하고 가공하는 미들웨어, 서비스를 위한 웹 서비스로 구분할 수 있는데, 각 단계에서 정보보호를 위한 보안 정책이 수반되어야 한다. 본 논문에서는 USN 응용을 위한 모니터링 시스템을 대상으로 각 단계별 정보보호 플랫폼과 보안 정책에 관한 내용을 기술한다.