• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.027 seconds

Security Analysis and Enhancement on Smart card-based Remote User Authentication Scheme Using Hash Function (효율적인 스마트카드 기반 원격 사용자 인증 스킴의 취약점 분석 및 개선 방안)

  • Kim, Youngil;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1027-1036
    • /
    • 2014
  • In 2012, Sonwanshi et al. suggested an efficient smar card based remote user authentication scheme using hash function. In this paper, we point out that their scheme is vulnerable to offline password guessing attack, sever impersonation attack, insider attack, and replay attack and it has weakness for session key vulnerability and privacy problem. Furthermore, we propose an improved scheme which resolves security flaws and show that the scheme is more secure and efficient than others.

A Study on Designing Mobile Phone Display in Consideration of Elder People's Optical Characteristics and Preferences: Using Conjoint Analysis and Response Surface Method (장년층의 시각적 특성과 선호도를 고려한 휴대폰의 디스플레이 설계에 관한 연구: 컨조인트 분석과 반응표면분석을 활용하여)

  • Lee Sung-Hoon;Shin Yong-Sik;Park Yong-Gil
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.4 no.1
    • /
    • pp.23-29
    • /
    • 2005
  • This study is about designing mobile phone display in consideration of elder people's preferences by reason of their optical weakness. The research is closely connected with designing user-friendly interface by considering user characteristics. The criteria for first experiment are font sizes, font types, line spacing and background colors. With the experiment result, relative importance of each attribute and subjective preference are investigated by conjoint analysis. Secondly, an optimal display design for elder people is presented by response surface method on the basis of the result of conjoint analysis, other statistical analyses, and user interviews.

  • PDF

A Study on Smart-Card Based User Authentication (스마트카드 기반의 사용자 인증 기법에 관한 연구)

  • Lee, Jaeyoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.27-33
    • /
    • 2018
  • User authentication scheme is a method for controlling unauthorized users' access to securely share the services and resources provided by the server and for verifying users with access rights. Initial user authentication scheme was based on passwords. Nowadays, various authentication schemes such as ID based, smart-card based, and attribute based are being researched. The study of Lee et al. suggested a user authentication scheme that provides forward secrecy and protects anonymity of users. However, it is vulnerable to attacks by outsiders and attackers who have acquired smart-cards. In this paper, we propose a modified smart-card authentication scheme to complement the weakness of the previous studies. The proposed user authentication scheme provides the security for the ID guessing attack and the password guessing attacks of the attacker who obtained the login request message and the user's smart-card.

A Study against Attack using Virtualization Weakness (가상화 기술의 취약점을 이용한 공격 대응에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.57-64
    • /
    • 2012
  • Computing environment combined with development of internet and IT technology is changing to cloud computing environment. In addition, cloud computing is revitalized more because of propagation of LTE and suggestion of N-screen Service. Virtualization is the point technology for suggest IT resource to service form to users in this cloud computing. This technology combines other system physically or divides one system logically and uses resource efficiently. Many users can be provided application and hardware as needed using this. But, lately various attack using weak point of virtualization technology are increasing rapidly. In this study, we analyze type and weak point of virtualization technology, the point of cloud computing. And we study about function and the position which intrusion detection system has to prepare in order to detect and block attack using this.

Evaluation Model of Technology Protection Competency customized for Small and Medium-sized Enterprises (중소기업 맞춤형 기술보호 수준평가 모델 연구)

  • Park, Sanghoon;Cho, Namwook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.113-125
    • /
    • 2017
  • In today's highly competitive environment, the importance of technology protection cannot be overemphasized. To evaluate technology protection competency of Small and Medium-sized Enterprises(SMEs), Government has conducted surveys every year but its effectiveness is still in question. To enhance the effectiveness of technology protection for SMEs, a customized evaluation model of technology protection competency has been suggested in this study. Surveys are conducted to measure the relative importance of evaluation areas that can be influenced by the size and type of business. The analysis shows that there exists significant differences between evaluation areas. This study suggests that the effectiveness of technology protection can be enhanced by utilizing a customized evaluation model depending on the size and type of business. Also, the proposed model can be used for SMEs to identify and enhance their weakness in technology protection. Overall, it is expected that the proposed model can be effectively used to protect valuable technologies in various SMEs.

Finding the Ball with WaterShed Algorism (Water Shed 알고리듬을 이용한 공 찾기)

  • Yu Ji-Chul;Kim Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.833-836
    • /
    • 2006
  • This is the paper for the finding the hidden ball with the Water Shed Algorism, and for analyzing the weakness. So, With this paper, Other institutions or organizations can improve their researching. For this researching, Visual Studio C++ is used, and some kinds of Algorism is added to the software such as Distance Transform, Labelling which we make.

  • PDF

An Investigation on chest physical therapy of hospital in seoul and Kyungido (서울, 경기지역 종합병원의 흉부물리치료 실태조사)

  • Lee, Yun-Seob;Lim, Sung-Geun
    • The Journal of Korean Physical Therapy
    • /
    • v.14 no.2
    • /
    • pp.153-161
    • /
    • 2002
  • The purpose of this study was to investigate the chest physical therapy in the hospital of seoul, kyungido and to activate the chest physical therapy. Dept. of physical therapy in 15 hospitals, 65 physical therapists disabled and analysis of interview. The results are as follows: 1) $86.7\%$ of respondents were not chest physical therapist in the hospital. $79.4\%$ of respondents were a lack of 5 patients per month. 2) The chief diagnosis of chest physical therapy was respiretory muscles weakness by reason of spinal cord injury and muscle diseases. Many physical therapists was obtain the chest physical therapy information from university or collage. 3) Management of chest Physical therapy Patient was to be alike physical therapist and doctor A problem of chest physical therapy was a lack of chest physical therapy information, cognition of a physician. The results of this study suggested that chest physical therapy need to organization of the treatment and magnification of the treatment area.

  • PDF

Is the Librarianship in Korea a Profession\ulcorner (전문직 이론을 통해 본 사서직의 전문성)

  • Lee, Jae-Whoan
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.37 no.2
    • /
    • pp.57-87
    • /
    • 2003
  • The purpose of this article is to discuss on the professionalism of librarianship in Korea. The discussion begins with exploring the conditions which are required for an occupation to be recognized as a profession. The theoretical foundations for discussion is borrowed from 'Theory of Profession' in Sociology. In turn, systematically verified are both public image and librarians' self-confession on librarianship. The weakness and shortcomings of librarianship as a profession are also investigated. Finally suggested we both strategies and methods for the librarianship in Korea to be professionalized.

Design and Implementation of a Real Time Access Log for TCP/IP Protocol Weakness Attack Detection (TCP/IP 프로토콜 취약성 공격 탐지를 위한 실시간 접근 로그 설계 및 구현)

  • 국경완;이상훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.733-735
    • /
    • 2001
  • 네트워크가 보편화되면서 사이버 공간을 이용한 테러가 전 세계적으로 발생하고 있다. TCP/IP 프로토콜은 현재 가장 많이 사용되고 있는 네트워크 기술중의 하나로 인터넷뿐만 아니라, 많은 소규모의 사설 컴퓨터네트워크에서도 많이 사용되고 있다. 그러나 TCP 자체가 가지고 있는 보안 취약점 때문에 SYN 공격, TCP Sequence Number 공격, IP Spoofing, TCP Connection hijacking, Sniffing 과 같은 다양한 해킹 기법이 등장하고 있다. 본 논문에서는 TCP/IP 프로토콜 취약점을 이용하여 공격할 경우 이를 탐지하거나 차단하지 못하는 경우에 대비하여 실시간 접근 로그 파일을 생성하여 시스템 관리자가 의사결정을 할 수 있는 것과 동시에 시스템 스스로 대처할 수 있는 시스템을 구현하여 타당성을 검증하고 그에 따른 기대효과를 제시 한다.

  • PDF

Finding the Ball with WaterShed Algorism (Water Shed 알고리듬을 이용한 공 찾기)

  • Yu, Ji-Chul;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.882-888
    • /
    • 2007
  • This is the paper for finding the hidden ball with the Water Shed Algorism, and for analyzing the weakness. So, With this paper, Other institutions or organizations can improve their research skill. For this research, Visual Studio C++ is used, and some kinds of Algorism is added to the software such as Distance Transform, Labelling which we make.