• 제목/요약/키워드: personal computer security

검색결과 401건 처리시간 0.025초

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • 제6권2호
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.

시간 동기 방식의 OTP를 이용한 디지털 도어락 시스템 (A Digital Door Lock System Using Time- Synchronous One Time Password)

  • 황형진;김권양;하일규
    • 한국정보통신학회논문지
    • /
    • 제21권5호
    • /
    • pp.1027-1034
    • /
    • 2017
  • 최근 들어 개인 정보 유출을 방지하고, 보안을 강화하기 위하여 OTP (One-time- Password)를 이용한 로그인 방법을 많이 사용하고 있다. OTP 방식은 은행의 개인 계정 보안을 위하여 주로 사용되어온 방법으로 일회용 비밀번호를 받아 사용하는 보안성이 강화된 방법 중 하나이다. 한편, 일상생활에서 자주 사용하는 디지털 도어락은 편의성과 보안성을 동시에 요구한다. 디지털 도어락에 관한 관련 기술이 발전하고 있지만 아직 보안성에는 취약한 것이 사실이다. 특히, 가장 흔하게 사용되고 있는 비밀번호 입력 방식의 디지털 도어락은 편의성을 제공하지만 비밀 번호 노출, 망각 등과 같은 부작용이 따르게 된다. 따라서 본 연구에서는 비밀 번호 노출과 망각의 위험이 없는 보안성과 편의성이 강화된 OTP 기반의 디지털 도어락 시스템을 제안하고 구현한다.

Information and Communication Technologies for the Innovative Development of Tourism Training in the Context of COVID-19

  • Krupa, Oksana;Panchenko, Vladimir;Dydiv, Iryna;Borutska, Yuliia;Shcherbatiuk, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.262-268
    • /
    • 2022
  • The main purpose of the study is to determine information and communication technologies for the innovative development of tourism training in higher education institutions in the context of COVID-19. Innovative development is associated with the rejection of well-known cliches, stereotypes in teaching, upbringing and personal development, creates new standards for personal-creative, individually directed tourism activities, develops pedagogical technologies implemented in this activity. As a result, the main aspects of information and communication technologies for the innovative development of tourist training in higher education institutions in the context of COVID-19 were characterized.

Features Of The Implementation Of Inclusive Education: The Role Of The Teacher

  • Klochko, Oksana;Pohoda, Olena;Rybalko, Petro;Kravchenko, Anatoly;Tytovych, Andrii;Kondratenko, Viktoriia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.109-114
    • /
    • 2022
  • The article theoretically analyzed and specified definitions such as: "professional development of personality, competence, professional competence of a teacher". Structural components of professional competence are defined, namely: theoretical involves deep knowledge in the field of special pedagogy, special psychology; technological involves the use of acquired knowledge in practical activities and personal in which important personal characteristics of a special teacher are noted. Criteria and levels of development of professional competence of future special teachers are determined. The article analyzes the peculiarities of the professional activity of a teacher in the conditions of an inclusive educational space, in particular, the special training of a teacher as an integral component of this process. Emphasis is placed on the cooperation of teachers in an inclusive educational institution for the socialization of a child with special needs and her preparation for independent life.

Creation of High-Quality Abstractions in Software Engineering

  • Alexey Razumowsky
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.193-201
    • /
    • 2023
  • Abstraction is the cornerstone of ideal software engineering (SWE). This paper discusses a problem of forming reasonable generalizations, representations and descriptions in various software development processes through the prism of poor-quality (rash, unconsidered, uncertain and harmful) abstractions. To do this, emphasis is made on an induced strategic connection between the required abstraction and its compact specific formulation based on existing research and the author's introspective experience. A software aim point and characteristic preservation of the solution integrity is the subject of the best formulation and a program module or code associated with it. Moreover, a personal attitude expressed by personal interest, motivation and creativity, is proclaimed to be a fundamental factor in successful software development.

Performance Analysis of Perturbation-based Privacy Preserving Techniques: An Experimental Perspective

  • Ritu Ratra;Preeti Gulia;Nasib Singh Gill
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.81-88
    • /
    • 2023
  • In the present scenario, enormous amounts of data are produced every second. These data also contain private information from sources including media platforms, the banking sector, finance, healthcare, and criminal histories. Data mining is a method for looking through and analyzing massive volumes of data to find usable information. Preserving personal data during data mining has become difficult, thus privacy-preserving data mining (PPDM) is used to do so. Data perturbation is one of the several tactics used by the PPDM data privacy protection mechanism. In Perturbation, datasets are perturbed in order to preserve personal information. Both data accuracy and data privacy are addressed by it. This paper will explore and compare several perturbation strategies that may be used to protect data privacy. For this experiment, two perturbation techniques based on random projection and principal component analysis were used. These techniques include Improved Random Projection Perturbation (IRPP) and Enhanced Principal Component Analysis based Technique (EPCAT). The Naive Bayes classification algorithm is used for data mining approaches. These methods are employed to assess the precision, run time, and accuracy of the experimental results. The best perturbation method in the Nave-Bayes classification is determined to be a random projection-based technique (IRPP) for both the cardiovascular and hypothyroid datasets.

Issues of Harmonization of ISO 9001 Standard and the Law 09-08. Protection of Personal Data in Morocco: Potentials and Risks

  • Adil CHEBIR ;Ibtissam EL MOURY;Adil ECHCHELH;Omar TAOUAB
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.57-66
    • /
    • 2023
  • Since 2009, Morocco has had a law governing the processing of personal data, the law 09-08, and a supervisory authority, the CNDP (National Commission for the Protection of Personal Data). Since May 2018, the European General Regulation on the Protection of Personal Data (GDPR) entered into force, which applies outside the EU in certain cases and therefore to certain Moroccan companies. The question of the protection of personal data is primarily addressed to the customer. The latter may not only be a victim of crime linked to ICT, but also have to face risks linked to the collection and abusive processing of his personal data by the private and public sectors. Often the customer does not really know how their data is stored, nor for how long and for what purpose. This fact raises the question of satisfying customer requirements, in particular for organizations that have adopted a quality approach based on ISO 9001 standard.In order to master these constraints, Moroccan companies have to adopt strategies based on modern quality management techniques, especially the adoption of principles issued from the international standard ISO 9001 while being confirmed by the law 09-08. It is through ISO 9001 and the law 09-08 that these companies can refer to recognized approaches in terms of quality and compliance. The major challenge for these companies is to have a Quality approach that allows the coexistence between the law 09-08 and ISO 9001 standard and this article deals within this specific context.

인터넷 쇼핑몰의 보안 시스템에 관한 연구 (A Study of Security System for Internet Shopping Mall)

  • 이내준
    • 한국컴퓨터산업학회논문지
    • /
    • 제2권11호
    • /
    • pp.1383-1394
    • /
    • 2001
  • 최근의 폭증하는 해킹사고와 컴퓨터 바이러스의 피해 증가로 보안관리의 중요성이 강조되고는 있지만 뛰어난 해커의 역량을 저지하기에는 역부족인 것이 사실이다 그러나 기본적인 서버시스템의 보안설정만으로도 해킹의 대부분을 차지하고 있는 초보나 중급수준의 피해로부터 더욱 안전해 질 수 있지만 많은 부분의 중형시스템과 개인의 보안상태는 아직도 무방비 상태로 놓여 있음을 알 수 있었다. 소프웨어적으로 혹은 하드웨어적으로 완벽한 정보시스템은 없다. 언제든지 생각지 못한 방법으로 자신의 시스템들은 해커와 바이러스로부터 피해를 볼 수 있다는 사실을 인식할 필요가 있다. 모든 컴퓨터 사용자는 이에 대비하여 끊임없는 대처 방안 연구가 필요하다. 본 논문에서는 배스천호스트의 구성을 제안한다. 배스천호스트의 구성을 통해서 현재까지 알려진 해당 호스트에 대한 내/외부에서의 침입위험으로부터 안전할 수 있도록 하는 것이다.

  • PDF

Real-time Network Middleware Supporting Fault-Tolerant Operations for Personal Robot System

  • Choo, Seong-Ho;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.756-760
    • /
    • 2005
  • By development of a robot technology, personal robot is being developed very actively. Various infra-technologies are accumulated in hardware and software how by internal a lot of research and development efforts, and it is circumstance that actual commodity is announced. But, personal robot is applied to be acting near human, and takes charge of safety and connected directly a lot of works of home security, gas-leakage, fire-warning facilities, or/and etc. So personal robot must do safe and stable action even if any unexpected accidents are happened, important functions are always operated. In this paper, we are wished to show design structures for supporting fault-tolerant operation from our real-time robot middleware viewpoint. Personal robot, in being developed, was designed by module structure to do to interconnect and to interoperate among each module that is mutually implemented by each research facilities or company. Also, each modules can use appreciate network system that is fit for handling and communicating its data. To guarantee this, we have being developed a real-time network middleware, for especially personal robot. Recent our working is to add and to adjust some functions like connection management, distributed routing mechanism, remote object management, and making platform independent robot application execution environment with self-moving of robot application, for fault-tolerant personal robot.

  • PDF

Kerberos를 이용한 P2P 보안 프로토콜 설계 (Design of P2P Secure Protocol Using Kerberos)

  • 이규형;송영상;우찬일;신인철
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 하계종합학술대회 논문집(3)
    • /
    • pp.51-54
    • /
    • 2002
  • P2P implies direct exchange between peers. If you have something I want, 1 go directly to you and obtain il. There is one of the most advantages of formation of community in P2P. For a specified purpose through P2P, the Peers who make temporary a group delivery a request efficient and safe. And the resources can be jointed common, cooperation and communication. When P2P is developed more, we can expect more formation of online community and development. But to be a safe of personal ID and password in internet, it should be possible to make a key-exchange. In the paper, it suggest P2P security system suitable to personal security that Kerberos be transformed. The user who make community in P2P, have Kerberos Server, and using Physical Address of Ethernet card in personal computer, authenticate users.

  • PDF