• Title/Summary/Keyword: security design

Search Result 3,366, Processing Time 0.029 seconds

A Design and Implementation of IPv4/IPv6 Security Packet Analyzer (IPv4 및 IPv6 보안 패킷 분석기의 설계 및 구현)

  • Cho Jin-Ki;Kim Sang-Choon;Lee Sang-Ho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.2
    • /
    • pp.67-75
    • /
    • 2005
  • In this paper, we design and implement real time IP security packet analyzer on IPv4 and IPv6 network. This packet analyzer sniffs and analyzes the packets generated by the protocols that are used by IPsec, IKE, IPv4 and IPv6 such as AH, ESP, ISAKMP, IP, ICMP and so on. The purpose of this analyzer is to check current security status of the network automatically. In this paper we provide implementation details and the examples of security evaluation by using our security packet analyzer system.

  • PDF

Design and Implement of Authentication System for Secure User Management for Secure on Medical ICT Convergence Environment (의료 ICT융합 환경에서 안전한 사용자 관리를 위한 인증시스템 설계 및 구현: 중소형 의료기관을 중심으로)

  • Kim, Yanghoon;Choi, Yean Jung
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.29-36
    • /
    • 2019
  • The convergence of traditional industry and ICT is a combination of security threats and vulnerabilities in ICT and specific industry-specific problems of existing industries, and new security threats and vulnerabilities are emerging. In particular, in the medical ICT convergence industry, various problems regarding user authentication are derived from the medical information system, which is being used for abuse and security weaknesses. According, this study designed and implemented a user authentication system for secure user management in medical ICT convergence environment. Specifically, we design and implement measures to solve the abuse and security weaknesses of ID sharing and to solve the inconvenience of individual ID / PW authentication by performing user authentication using personalized devices based on medical information systems.

A study on Twofish Cryptoalgorithm Design for Security in the PC Peripheral devices (PC 주변기기에 대한 보안성을 위한 Twofish 암호알고리즘 설계에 관한 연구)

  • Jeong, Woo-Yeol;Lee, Seon-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.2
    • /
    • pp.118-122
    • /
    • 2007
  • The previous security system was PCI way which has many difficulties for PC novices to use. Moreover the security programs in use are mostly unverified ones as they are using cracks, and are exposed to attacks such as hackers and viruses. Therefore this thesis describes to design the security system of Twofish cryptographic algorithm using USB, which it can be used in general-purpose computers and users can handle it with ease. Users can easily use the security system by using this USB and it is applicable to various security systems that Twofish cryptographic algorithm used in the security system by having variable key length. Also the efficiency of the system can be enhanced as it can perform both encryption and decryption and it has a benefit of downsizing hardware.

  • PDF

A Design and Analysis of PKCS #11 supporting the KCDSA mechanism (KCDSA 메커니즘을 제공하는 PKCS #11 설계 및 분석)

  • 김명희;김은환;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.141-151
    • /
    • 2004
  • According to the improvemnent of electronic commerce, the requirements of security devices are becoming increasingly pervasive. The security API must design easily and securely to support a compatibility feature between security devices. It is chosen the PKCS #11 interface by RSA Labs that shows the compatibility and extensibility standards of many application product and implementation, and supported KCDSA mechanism which is a korean digital signature standard. And the PKCS #11 security API defines new key management function which provides more secure key management ability. We suggest the object attributes and templates of KCDSA private and public key object, generate and verify digital signature using KCDSA mechanism. The PKCS #11 supporting KCDSA mechanism is designed, implemented using C-Language, tested a performance, and analyzed the security and compatibiltiy feature.

Design and Implementation of USIM Security Module for the Wireless Network Interworking (무선 네트워크 연동을 위한 USIM 보안 모듈 설계 및 구현)

  • Kim, Choon-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.41-49
    • /
    • 2007
  • USIM(UMTS Subscriber Identity Module) technology that accept 3GPP(3rd Generation Partnership Project) standards for information security supports security function in 3GPP. Supported security functions of USIM are confidentiality of user identity, mutual authentication and key agreement between end user and network, confidentiality of user data and data integrity. It is very important technology in wireless network. It makes secure environment that user and service provider can use securely mobile service in network. In this paper, design and implementation USIM security module that supports common network access method and authentication protocol in 3GPP and WLAN(Wireless LAN) and AAA (3A-Authentication Authorization Accounting) server system based RADIUS.

A Study on the Curriculum of Department of Information Security in Domestic Universities and Graduate Schools and Comparison with the Needs of Industry Knowledge (국내 대학 및 대학원 정보보호 교육과정 분석 및 산업체 필요 지식과의 관련성 비교)

  • Kim, Min-Jeong;Lee, Haeni;Song, Shin-Jeong;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.195-205
    • /
    • 2014
  • These days cyber attacks are increasing all over the world, and the national critical infrastructure and information network protection has become important. For this reason, the concentrated investment in information security and development of professional human resource are essential, but there is a shortage of information security workforce in Korea. Currently, departments of information security in domestic universities make efforts to develop human resource of information security and have a increasing interest in the curriculum design. So this paper investigates the curriculums of information security in domestic universities and graduate schools. And then, it compares with the needs of industry knowledge and skills by using SPSS. Through this analysis, we will get implications about curriculum design of Information security.

Design and Simulation of Policy Based Integrated Server System Capable to Provide Real-time Internet Security Service (실시간 인터넷 보안 서비스 제공을 위한 정책기반 통합 서버 설계 및 시뮬레이션)

  • Kim, Gi-Yeong;An, Gae-Il;Jang, Jong-Su;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.565-572
    • /
    • 2001
  • Recently, due to the open architecture of the internet and wide spread of internet users, the cyber terror threatens to the network\`s weak point are tending grow. Until now, information security solutions are passive on security host and particular security system. This passive information security solution is weak from the attacks through the networks connected worldwide internet systems, and has limitation on the defense against cyber terror attacks. Therefore, network level integrated security function must be provided. In this paper, we consider technology limitations on the information security problems and its environment. Then we present the architecture and functions of policy-based information security services for network level active information security function. This paper also includes design of target system, which provide information security services. Finally, we discuss network level system deployment direction and discuss with Network Security Simulation.

  • PDF

The Impact of Organizational Information Security Climate on Employees' Information Security Participation Behavior (조직의 정보보안 분위기가 조직 구성원의 정보보안 참여 행동에 미치는 영향)

  • Park, Jaeyoung;Kim, Beomsoo
    • The Journal of Information Systems
    • /
    • v.29 no.4
    • /
    • pp.57-76
    • /
    • 2020
  • Purpose Although examining the antecedents of employees' extra-role behavior (i.e. information security participation behavior) in the information security context is significant for researchers and practitioners, most behavioral security studies have focused on employees' in-role behavior (i.e. information security policy compliance). Thus, this research addresses this gap by investigating how organizational information security climate influences information security participation behavior based on social information processing theory and Griffin and Neal's safety model. Design/methodology/approach We developed a research model by applying Griffin and Neal's safety model to the information security context and then tested our research model by conducting an online survey for employees of organizations with information security policies. Structural equation modeling (SEM) with SmartPLS 3.3.2 is used to test the corresponding hypothesis. Findings Our results show that organizational information security climate, information security knowledge, information security motivation are effective in motivating information security participation behavior. Also, we find that organizational information security climate positively influences both information security knowledge and information security motivation. Our findings emphasize the importance of organizational information security climate because it is capable of affecting employees on information security participation behavior. Our study contributes to the literature on information security by exploring the role of organizational information security climate in enhancing employees' information security participation behavior.

A Study on the CPR Security System (CPR 시큐리티 시스템에 관한 연구)

  • Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.75-82
    • /
    • 2006
  • This paper proposes CPR(Computer-based patient record) system that is utilized in Ubiquitous environment, establish security policy by analyzing security limitation of system and design suitable security system in CPR system. The present study designed a CPR system and, for the development of a security system, established security policies for the CPR system through analyzing the operating environment and vulnerability in security and designed a security system implementing the policies. The security system supporting CPR system is composed of authentication system, XML documentation and encryption of medical information and network security system.

  • PDF

A Study on Security Factors on Online Shopping - focus on internet bookshops -

  • Hua, Deng;Kim, Chang-Eun
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2005.11a
    • /
    • pp.418-422
    • /
    • 2005
  • Electronic commerce has provided another access for consumers to purchase products, but some researches have pointed out that there are difficulties for companies to do business on web. For lack of trust, many people not prefer purchasing through virtual channels. Based on the literature review, this study aims at empirically testing the impact of website design on individual trust in internet firms. From statistic analysis, we will conclude that security, interaction, and navigation functionality will affect on-line trust.

  • PDF