• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.027 seconds

The Need of S/W Development Security by Legal Basis (법적 근거에 따른 S/W 개발 보안의 필요성)

  • Shin, Seong-Yoon;Lee, Hyun-Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.81-82
    • /
    • 2014
  • 국내외로 자주 발생하는 해킹 사례로 인하여 웹 사이트들이 중단되거나 상당한 금전적 피해를 보고 있다. 이러한 웹사이트 공격의 대부분이 응용프로그램(SW)의 취약점을 악용한 것이다. 본 논문에서는 이러한 S/W의 취약점을 이용한 S/W 개발 보안의 주요 이슈를 다루어 본다. 또한 보안 관련법 제도 및 규정 현행 정보 보호 관련 법령은 법률인 정보통신망 이용 촉진 및 정보보호 등에 관한 법률을 기본법으로 하여 분야 및 적용 대상에 따라 산발적인 개별 법규를 두어 각 분야별, 적용 대상별로 정보보호를 위한 규율을 실시하고 있다.

  • PDF

A Scheme for Protecting Security Rules in Intrusion Detection System (침입 탐지 시스템을 위한 효율적인 룰 보호 기법)

  • 손재민;김현성;부기동
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.4
    • /
    • pp.8-16
    • /
    • 2003
  • This paper moses a method to solve the weakness in Snort, the network based intrusion detection system. Snort which is the rule-based intrusion detection system dose not supports a protection method for their own rules which are signatures to detect intrusions. Therefore the purpose of this paper is to provide a scheme for protecting rules. The system with the proposed scheme could support integrity and confidentiality to the rules.

  • PDF

A Development and utilization of Geotechnical Information System(GTIS) of the Rock Mass in Seoul Metropolitan Area(2) (서울일대 암반을 대상으로 한 Geotechnical Information System (GTIS)의 개발 및 활용 (2))

  • 김정엽;박형동
    • Tunnel and Underground Space
    • /
    • v.6 no.3
    • /
    • pp.223-233
    • /
    • 1996
  • Geotechnical Information System (GTIS) for efficient management of three dimensional borehole data has been developed. Geotechnical maps in the vicinity of Bulkwangdong, Seoul station, Itaewon, Han river near Yuido, and Jungrangchon were constructed by Kriging method. In Bulkwangdong and Jungrangchon area where boundary between granite and gneiss is present, gneiss has been more weathered than granite, but in Seoul station and Itaewon area where the boundary is also present, granite has been more weathered than gneiss. It has been inferred that when Seoul granite intruded, the strength of gneiss in Bulkwangdong and Jungrangchon area was lowered by the attitude of foliation plane than in Seoul station and Itaewon area, so the gneiss has been easily fractured and weathered in Bulkwangdong and Jungrangchon area. Geotechnical map in the vicinity of Yuido showed that there is an NW-SE trend weakness zone that might be affected by major faults under Han river and it is expected that the fault zone may be present in construction area of Kyoungbu Highspeed Railway that lies below the Han river like the Subway Line No.5.

  • PDF

Performance Isolation of Shared Space for Virtualized SSD based Storage Systems

  • Kim, Sungho;Kwak, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.1-8
    • /
    • 2019
  • In this paper, we propose a performance isolation of shared space for virtualized SSD based storage systems, to solve the weakness in a VSSD framework. The proposed scheme adopts a CFQ scheduler and a shared space-based FTL for the fairness and the performance isolation for multiple users on virtualized SSD based storage systems. Using the CFQ scheduler, we ensure SLOs for the storage systems such as a service time, a allocated space, and a IO latency for users on the virtualized storage systems. In addition, to improve a throughput and reduce a computational latency for garbage collection, a shared space-based FTL is adopted to maintain the information of SLOs for users and it manages shared spaces among the users. In our experiments, the proposal improved the throughput of garbage collection by 7.11%, on average, and reduced the computational latency for garbage collection by 9.63% on average, compared to the previous work.

Remark on the Security of Password Schemes (패스워드 인증 키교환 프로토콜의 안전성에 관한 고찰)

  • 이희정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.161-168
    • /
    • 2003
  • We discuss the security of two famous password authenticated key exchange protocols, EKE2 and PAK. We introduce ′insider assisted attack′ Based on this assumption we point out weakness of the security of EKE2 and PAK protocols. More precisely, when the legitimate user wants to find other user′s password, called "insider-assisted attacker", the attacker can find out many ephemeral secrets of the server and then after monitoring on line other legitimate user and snatching some messages, he can guess a valid password of the user using the previous information. Of course for this kind of attack there are some constraints. Here we present a full description of the attack and point out that on the formal model, one should be very careful in describing the adversary′s behavior.

Information Sharing and Creativity in a Virtual Team: Roles of Authentic Leadership, Sharing Team Climate and Psychological Empowerment

  • Hahm, SangWoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4105-4119
    • /
    • 2017
  • Creativity is crucial in an ever-changing e-business environment. The creation of new value is essential for companies to gain the competitive edge and to pioneer new markets in e-business. Hence, many companies in e-business operate virtual teams as they are suitable to generate creativity. Even so, virtual teams possess the inherent weakness of a lack of cohesiveness. Hence, for a virtual team to be creative, team members should help each other and share information. This study emphasizes the importance of information sharing that is supposed to improve creativity and explains how to increase them for virtual teams. To explain these relationships, three dimensions are routinely examined in organizational behavior studies: leaders, teams, and members. As a consequence, and through empirical analysis, authentic leadership, sharing team climate, and psychological empowerment enhances information sharing and creativity through their respective roles, in addition to information sharing directly increasing creativity. To improve creativity and information sharing of virtual team members in e-business, this article has highlighted the importance of the three roles stated prior. Such factors can increase information sharing and creativity, and will help virtual teams and organizations to be more successful in e-business.

What is Wrong with Korean Library and Information Science? (한국 문헌정보학은 건강한가?)

  • Lee, Jae-Whoan
    • Journal of Korean Library and Information Science Society
    • /
    • v.49 no.3
    • /
    • pp.1-32
    • /
    • 2018
  • The purpose of this article is to figure out the structural problems which have threaten both scholarship and profession of Library and Information Science in South Korea. In details, this study discusses such major weakness in Korean LIS as vague academic identity, poor research activities, and unreasonable educational systems. The emphasis for discussion is on identifying the unique and indigenous variables which have had deep influences on both development process and current crisis of Korean LIS. Finally suggested are the strategies and methods for promoting the good health of Korean Library and Information Science as an independent academic discipline as well as a prospective profession.

Security Management Model for Protecting Personal Information for the Customer Contact Center (컨택센터의 고객 개인정보 보호 모델)

  • Kwon, Young-Kwan;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.117-125
    • /
    • 2009
  • In this paper, we analyze the Contact Center's specific-security characteristics, including the threat model and weakness and study effective security measures focussing on protecting customer's personal information. Also, we establish the information security management system to reduce the possibility of information leakage from the internal employee in advance. As a result, we propose the "Security management model for protecting personal information for customer Contact Center" that complies with current ISO/IEC JTC 1 ISMS 27000 series standards.

The Effectiveness of Apps Recommending Best Restaurant through Location-based Knowledge Information: Privacy Calculus Perspective (위치기반 지식정보를 활용한 맛집 추천 앱의 효과: 프라이버시 계산을 중심으로)

  • Jiang, Taypun;Lim, Hyun A;Choi, Jaewon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.1
    • /
    • pp.89-106
    • /
    • 2017
  • In advanced mobile devices environment, the market share of mobile application has been increased. Among various mobile services, Location-based Service (LBS) is an important feature to increase user motivation related to purchase intention on mobile. However, individual privacy has also increased as an important problem for invasion of privacy and information leakage while too many LBS based applications (App) rapidly launched in the App market. In this study, we focused on perceived values of LBS App users who use Apps related to recommending best restaurants in China and South Korea. The purpose of this study is to identify important factors for perceived value when users provide personal information for LBS service provider. The result of this study is follows: perceived value can increase while LBS customers can more control self-information and information useability. Also information ability of users affected perceived values for LBS Apps. Also users' app user ability and perceived value were effects on privacy revenue. In addtion, perceived weakness of users and perceived value increased privacy threat.

A Study on the Development of Framework Using Component Based Methodology (컴포넌트기반 방법론을 사용한 프레임워크 개발에 관한 연구)

  • Kim, Haeng-Gon;Han, Eun-Ju
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.842-851
    • /
    • 2000
  • Developers can reuse not only class code but also wide range of knowledge on domain by reusing framework. Existing Object-Oriented Methodology and Catalysis Methodology were presented when redefining component in the course of redesigning framework. However, existing methodologies have weakness that entire process is waterfall mode or design of interface lays too much stress on implementation stage. So, this thesis will present Component-Oriented Methodology for the reuse of framework, and construct the environment for framework and domain development. That is, domain is analyzed by input of domain knowledge on real world to create software based on component, and hotspot is identified through analyzed information, and refactoring by putting additional information on users and developers. After that, I will create domain framework and application framework depending on domain. In this Component-Oriented Methodology, information is searched, understood and extracted or composite through component library storage internally. Then this information is classified into the information on component, and used as additional information in redesigning. With this, developer can obtain reusability, easiness and portability by constructing infrastructure environment that allows to register, update and delete component through Component Management System(CMS) under he development environment which can be easily applied to his own application using framework component, in this thesis, CoRBA(Common Object Request Broker Architecture) environment.

  • PDF