• 제목/요약/키워드: information weakness

검색결과 788건 처리시간 0.02초

온라인게임 서비스 분야에 정보보호 사전진단 적용시 효과성에 관한 연구 (A Study for Effectiveness of Preliminary Security Assessment on Online Game Service Domain)

  • 유동영;서동남;김휘강;최진영
    • 한국IT서비스학회지
    • /
    • 제10권2호
    • /
    • pp.293-308
    • /
    • 2011
  • The preliminary security assessment is an information security process to analyze security weaknesses before beginning of services. Discovering security weakness through preliminary security assessment is highly required because it costs much when security incident occur in the middle of service operation. However, this assessment is not widely spread in the online game service domain yet. In this paper, we summarize the security risk existed in the online game service, and we classify the security requirements related to the each risk. Also, through the case study, we evaluated the effectiveness of preliminary security assessment in this domain. In addition, we suggest checklists that should be reviewed once in game-client side, network-side and game-server side for the purpose of security enhancement.

ZigBee 네트워크에서의 안전한 멤버쉽 프로토콜 (Secure Membership Protocol for ZigBee Network)

  • 김봉환;박창섭
    • 정보보호학회논문지
    • /
    • 제23권3호
    • /
    • pp.405-416
    • /
    • 2013
  • ZigBee는 WBAN이나 스마트 그리드를 위한 차세대 표준 인프라로 인정받는 무선네트워크 통신프로토콜이다. 보안은 몇몇의 ZigBee 어플리케이션에서 중요한 역할을 한다. 특히, ZigBee안에서 멤버가 가입이나 탈퇴를 하는 상황에서는 엄격한 멤버관리가 필요하다. 본 논문에서, 우리는 현재 ZigBee에서 사용 중인 탈퇴 과정의 보안 취약점에 대하여 조사하고, 문제 해결을 위한 새로운 보안 스키마를 제시하고 그것의 보안능력 및 성능을 분석한다.

WPKI 기반 Kerberos 인증 메커니즘 설계 (Design of Kerberos Authentication Mechanism based on WPKI)

  • 이철승;박찬모;이호영;이준
    • 한국정보통신학회논문지
    • /
    • 제7권5호
    • /
    • pp.986-992
    • /
    • 2003
  • In this paper we challenge the user Authentication using Kerberos V5 authentication protocol in WPKI environment. this paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a p개blem on the design that uses wireless public key-based structur and transmission hierarchical security back of a WAP forum, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 V3 with using WIM for complement an authentication protocol Kerberos V5 and its disadvantages.

Semiparametric mixture of experts with unspecified gate network

  • Jung, Dahai;Seo, Byungtae
    • Journal of the Korean Data and Information Science Society
    • /
    • 제28권3호
    • /
    • pp.685-695
    • /
    • 2017
  • The traditional mixture of experts (ME) modeled the gate network using a certain parametric function. However, if the assumed parametric function does not properly reflect the true nature, the prediction strength of ME would become weak. For example, the parametric ME often uses logistic or multinomial logistic models for the network model. However, this could be very misleading if the true nature of the data is quite different from those models. Although, in this case, we may develop more flexible parametric models by extending the model at hand, we will never be free from such misspecification problems. In order to alleviate such weakness of the parametric ME, we propose to use the semi-parametric mixture of experts (SME) in which the gate network is estimated in a non-parametrical way. Based on this, we compared the performance of the SME with those of ME and neural networks via several simulation experiments and real data examples.

중국 전자서명법의 주요내용 및 평가와 전망 (The Main Character and Evaluation of China's New Electronic Signature Legislation)

  • 한상현
    • 정보학연구
    • /
    • 제9권3호
    • /
    • pp.1-14
    • /
    • 2006
  • China has recently (28 August 2004) adopted a new act legalizing the electronic signature. This new act provides electronic signatures with the same legal status as handwritten signatures, and states that on-line certification providers will have to be created in order to ensure the security of on-line operations made using said signatures. This new act is intended to increase Chinese electronic business, and thus to raise the revenue China can expect from said business. And the law grants electronic signatures the same legal effect as handwritten signatures and seals in business transactions, and sets up the market access system for online certification providers to ensure the security of e-commerce. As Internet trade requires a reliable third party to identify the signers, the credibility of online certifying organizations is significant for the transaction security. So, considering the weakness of China's social credibility system, the law regulates that the online signatures certification providers should be approved and administered by governments.

  • PDF

인터넷 쇼핑몰의 소비자만족에 대한 실증적 분석 (An Empirical Analysis of Consumer Satisfaction for Internet Shopping Mall)

  • 염창선;지효원
    • 산업경영시스템학회지
    • /
    • 제23권59호
    • /
    • pp.69-77
    • /
    • 2000
  • To make internet shopping mall competitive, effective consumer service should be provided. The objective of this study is to analyse the consumer satisfaction for internet shopping mall. For this purpose, questionnaire survey has been used. For the statistical analysis, multivariate linear regression were utilized using the SAS program. According to the results in this study, the variables that positively affect toward consumer satisfaction are the quality of goods, the information of goods, the display method of goods, the convenience of ordering point of time and cancellation. On the contrary, the variables that negatively affect toward consumer satisfaction are the price of goods and the weakness of information security.

  • PDF

프로토콜 기반 분산 침입탐지시스템 설계 및 구현 (Implementation of Distributed Intrusion Detection System based on Protocols)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제8권1호
    • /
    • pp.81-87
    • /
    • 2012
  • Intrusion Detection System that protects system safely is necessary as network technology is developed rapidly and application division is wide. Intrusion Detection System among others can construct system without participation of other severs. But it has weakness that big load in system happens and it has low efficient because every traffics are inspected in case that mass traffic happen. In this study, Distributed Intrusion Detection System based on protocol is proposed to reduce traffic of intrusion detection system and provide stabilized intrusion detection technique even though mass traffic happen. It also copes to attack actively by providing automatic update of using rules to detect intrusion in sub Intrusion Detection System.

양방향 Filtered-x 최소 평균 제곱 알고리듬에 대한 실험적인 연구 (Experimental Study on Bi-directional Filtered-x Least Mean Square Algorithm)

  • 권오상
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.197-205
    • /
    • 2014
  • In applications of adaptive noise control or active noise control, the presence of a transfer function in the secondary path following the adaptive controller and the error path, been shown to generally degrade the performance of the Least Mean Square (LMS) algorithm. Thus, the convergence rate is lowered, the residual power is increased, and the algorithm can become unstable. In general, in order to solve these problems, the filtered-x LMS (FX-LMS) type algorithms can be used. But these algorithms have slow convergence speed and weakness in the environment that the secondary path and error path are varied. Therefore, I present the new algorithm called the "Bi-directional Filtered-x (BFX) LMS" algorithm with nearly equal computation complexity. Through experimental study, the proposed BFX-LMS algorithm has better convergence speed and better performance than the conventional FX-LMS algorithm, especially when the secondary path or error path is varied and the impulsive disturbance is flow in.

Contour Plots of Objective Functions for Feed-Forward Neural Networks

  • Oh, Sang-Hoon
    • International Journal of Contents
    • /
    • 제8권4호
    • /
    • pp.30-35
    • /
    • 2012
  • Error surfaces provide us with very important information for training of feed-forward neural networks (FNNs). In this paper, we draw the contour plots of various error or objective functions for training of FNNs. Firstly, when applying FNNs to classifications, the weakness of mean-squared error is explained with the viewpoint of error contour plot. And the classification figure of merit, mean log-square error, cross-entropy error, and n-th order extension of cross-entropy error objective functions are considered for the contour plots. Also, the recently proposed target node method is explained with the viewpoint of contour plot. Based on the contour plots, we can explain characteristics of various error or objective functions when training of FNNs proceeds.

엔터테인먼트 콘텐츠의 대일본 진출 마케팅전략 (Marketing Strategy of Entertainment Contents in Japan's Market)

  • 이찬도
    • 통상정보연구
    • /
    • 제10권4호
    • /
    • pp.251-275
    • /
    • 2008
  • South Korea has spend billions planing for entertainment contents development, exporting contents, developing strategies for overseas marketing. But one piece of the plan may be missing: The ability of corporations to continue to provide vital services. Over the years, a number of studies have examined korean waves and have reached the same conclusion: starting a activity without reasonable strategies tends to have effects on merchandising, income, image, etc. For the purpose of analysis, this study has adopted SWOT matrix, Japan's market, for instance, is mixed by variation factors-opportunities, threats, strengths, weakness. Fortunately, Because Japan's market, the most world's cultural contents, has an environmental condition of advanced level, If Our en-contents have a high level, through localization and strategic alliance, the marketing strategies for japan' market will do a good chance of success.

  • PDF