• Title/Summary/Keyword: security guide

Search Result 160, Processing Time 0.031 seconds

Advanced Mandatory Authentication Architecture Designed for Internet Bank (인터넷은행을 위한 개선된 본인확인 구조)

  • Hong, Ki-seok;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1503-1514
    • /
    • 2015
  • Non-face-to-face real name verification policy that financial authorities announced, in order to secure a face-to-face or more of accuracy, are in principle of multi check. The business model and legal entities of Internet banks is different from existing Internet banking. Relpacing real name verification from face-to-facd to non-face-to-face while maintaining the structure of identification can not only cause inconvenience to a first time member, but also can be more vulnerable to verious security risks. In this study, to evaluate a service level of a bank of the Internet, and provide an improved identification of the structure such that the registration and use of differentiated services is performed in accordance with the evaluation. In addition, the security that may occur with respect to Bank of the Internet to establish a vulnerability and attack model, the results of the analysis of the safety of the step-by-step security attributes and services of the authentication medium of each attack model, existing the safer than Internet banking, confirmed the usefulness in user registration guide.

A Study for u-Healthcare Networking Technology Framework Approach Based on Secure Oriented Architecture(SOA) (Secure Oriented Architecture(SOA)에 기반한 u-Healthcare 네트워크 보안기술 프레임워크 모델)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.101-108
    • /
    • 2013
  • Sensor network configurations are for a specific situation or environment sensors capable of sensing, processing the collected information processors, and as a device is transmitting or receiving data. It is presently serious that sensor networks provide many benefits, but can not solve the wireless network security vulnerabilities, the risk of exposure to a variety of state information. u-Healthcare sensor networks, the smaller the sensor node power consumption, and computing power, memory, etc. restrictions imposing, wireless sensing through the kind of features that deliver value, so it ispossible that eavesdropping, denial of service, attack, routing path. In this paper, with a focus on sensing of the environment u-Healthcare system wireless security vulnerabilities factors u-Healthcare security framework to diagnose and design methods are presented. Sensor network technologies take measures for security vulnerabilities, but without the development of technology, if technology is not being utilized properly it will be an element of threat. Studies suggest that the u-Healthcare System in a variety of security risks measures user protection in the field of health information will be used as an important guide.

Establishment and Effectiveness Analysis of Emergency Vehicle Priority Signal Control System in Smart City and Directions for ISMS-P Technical Control Item Improvement (스마트시티 내 긴급차량 우선신호 제어시스템 구축과 효과성 분석 및 ISMS-P 기술적 통제항목 개선 방향성 연구)

  • Yoon, TaeSeok;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.9
    • /
    • pp.1166-1175
    • /
    • 2021
  • We investigate the current situation and development trend of domestic smart city and emergency vehicle priority signal control system analyzing the existing effectiveness of 1) emergency vehicle priority signal control system and 2) control emergency vehicle priority signal, based on domestic and foreign prior research for signal control system security. The effectiveness of time reduction was analyzed through actual application and test operation to emergency vehicles after establishing the system. In addition, for security management and stable service of real-time signal system control we propose improvement for the technical control items of the ISMS-P certification system to secure golden time to protect citizens' precious lives and property in case of emergency by classifying and mapping the existing ISMS-P certification system and the Korea Internet & Security Agency's cyber security guide according to the items of security threats.

Kubernetes of cloud computing based on STRIDE threat modeling (STRIDE 위협 모델링에 기반한 클라우드 컴퓨팅의 쿠버네티스(Kubernetes)의 보안 요구사항에 관한 연구)

  • Lee, Seungwook;Lee, Jaewoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1047-1059
    • /
    • 2022
  • With the development of cloud computing technology, container technology that provides services based on a virtual environment is also developing. Container orchestration technology is a key element for cloud services, and it has become an important core technology for building, deploying, and testing large-scale containers with automation. Originally designed by Google and now managed by the Linux Foundation, Kubernetes is one of the container orchestrations and has become the de facto standard. However, despite the increasing use of Kubernetes in container orchestration, the number of incidents due to security vulnerabilities is also increasing. Therefore, in this paper, we study the vulnerabilities of Kubernetes and propose a security policy that can consider security from the initial development or design stage through threat analysis. In particular, we intend to present a specific security guide by classifying security threats by applying STRIDE threat modeling.

The effects on privacy protection behavior through mobile messenger security awareness and security intention - Focus on Theory of Self-Determination - (모바일 메신저 보안인식과 보안의도를 통한 개인정보 보호행동에 미치는 영향 - 자기결정성 이론을 중심으로 -)

  • Min, Kyeong-Eun;Kim, Sung-Jun;Kwon, Du-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.207-233
    • /
    • 2016
  • Currently mobile messenger industry, based on mobile application, is growing. And it has aroused innovative change, offering services in various forms beyond the form simply sharing messengers. Also because messenger securities are becoming personalized and intelligent, the importance of more diverse mobile applications' securities is increasing. This study carries out the empirical study of the causal relationship that the factors of using application services influence on security recognition and security Intention of mobile securities, and consequentially impact upon protection of personal information of users. In order that, we present the research model which prime variables of SDT, which emphasized on natural immanent motivation of human, applied to. To verify the research model of this study empirically, we conducted a survey targeting the public and university students which have ever used mobile messenger applications. With this, we desire to contribute to emphasizing the significance of individual messenger security and playing a positive role to develop security guide for consumers. The path analysis results are as follows. First, perceived autonomy has a positive effect on both security awareness and security intention. Second, perceived competence has a positive effect on security intention. Third, perceived relatedness has a positive effect on both security awareness and security intention. Last, security awareness and security intention. have a positive effect on privacy protection behavior. Through emphasizing the importance of the security of the messenger of individuals and contribute to a positive role for development of the necessary security guidelines to consumers.

  • PDF

A Study on Food Truck business model utilizing NFC (NFC를 활용한 Food Truck 비즈니스 모델에 관한 연구)

  • Yoon, Youngdoo;Choi, Eunyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.135-137
    • /
    • 2014
  • The expansion of the transportation card, and the popularity of smart phones has been increasing social concern about the NFC technology. Has been focused on the use of e-commerce, most of the NFC, fulfilling the security problems or technical topic for this, but the reality is that the current debate on the new value added contents industry and a nonexistent connection. Leverage NFC for efficient order management system in order to build lunch or dinner by being pushed to ease restrictions on remodeling and renovation projects Food Truck vehicle through a small business support programs in the current government, but increasing interest in the Food Truck I study a model of ordering system for food truch 재소 s-guide system. A lot of the effectiveness of management as appropriate to the use of NFC for small business that operates as a server system is highly Food Truck tendencies tied to one router and server on the intranet without the need of internet connection system. I believe in this study S-Guide system contributes for business success for food truck of small business.

  • PDF

The Global Trends in the Private Security Industry and the Strategies for the South Korean Private Security Industry : Focusing on the U. S. Security Industry (해외 시큐리티 산업의 동향과 한국의 대응전략 : 미국 사례를 중심으로)

  • Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.271-289
    • /
    • 2006
  • Private security industry in South Korea has rapidly been growing in recent years. However, such a rapid growth is being criticized for its focus on external results, which has produced a number of problems. The continued growth of private security industry can be only based upon substantive and qualitative development. In this aspect, it is necessary to consider the global trends of the private security industry, particularly the recent trends of the U. S. security industry which has led the global security industry. This is because the recent trends of the U. S. private security industry would guide the future direction of the private security industry in South Korea. The U. S. private security industry has been replacing the role of law enforcement agencies including the police, from crime prevention to investigation and disaster management, not to mention asset protection and loss prevention. The recent trends of the U. S. security industry appears to be summarized by such characteristics as variety, specialty, and integration, which might account for the structural problem of the private security industry in South Korea. In short, the substantive and qualitative development of the private security industry in South Korea should be accomplished by strengthening its specialty and integration, and also widening its variety.

  • PDF

Development of Parts Management System Using Intranet (인트라넷을 이용한 부품관리 시스템 개발)

  • 김정률;박정선;김선호
    • The Journal of Society for e-Business Studies
    • /
    • v.3 no.1
    • /
    • pp.81-94
    • /
    • 1998
  • In Client/Server environments, an employee should be able to access only applications which were assigned to him/her. That makes it difficult to share information among employees. The development of intranet system made it possible to share more information and to access broader information. In this paper, we present a parts management system developed by using Intrabuilder which is an intranet development tool. We intend to suggest a prototype which can guide the development of more delicate and complete parts management systems in the future.

  • PDF

AI 방역기간 돌입 - 가금농가 차단방역 위험도 평가 가이드

  • 대한양계협회
    • KOREAN POULTRY JOURNAL
    • /
    • v.54 no.10
    • /
    • pp.140-145
    • /
    • 2022
  • 본고는 최근 미국 캘리포니아주 식품 농업부에서 가금농가의 차단방역을 위해 위험도 평가가이드(Poultry Facility BioSecurity Risk Assessment Guide)를 작성, 발표한 내용 중 산란계 분야 및 공통부문을 발췌 번역한 것이다. 본 가이드는 김상호 케이애니웰 대표가 번역하였으며, 국내 상황과 공통된 부분이 많아 AI 등 양계질병 예방을 위해 항상 노력하고 있는 양계농가에서 자체진단용으로 활용하는데 도움이 될 수 있을 것으로 본다. 음영처리된 부분은 농장에서 필수(의무)적으로 지켜야 하는 사항을 표시한 것이다.

  • PDF

A Conceptual Study on Disaster Detection and Response System (재난전조 감지 및 재난대응 시스템에 관한 개념연구)

  • Park, Mi-yun;Koo, Won-yong;Park, Wan-soon;Kwon, Se-gon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.7 no.2
    • /
    • pp.35-41
    • /
    • 2014
  • If a disaster occurs in the underground like subway, disaster response system should minimize the casualties. It must quickly guide passengers to a safe evacuation route. But sometimes the system does not work properly. And then they need distributed disaster response system which make decision autonomously. We perform conceptual research about distributed autonomous decision-making disaster detection and response system and disaster detection method.