• Title/Summary/Keyword: security issue

Search Result 1,002, Processing Time 0.027 seconds

Security-Based Intranet Structure

  • Lee, S. M.;Lee, P. J.
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.265-273
    • /
    • 1997
  • Intranet is an enterprise network using Internet protocols as communication standard and HTML as content standard. The Internet is like a house built on information water. It has a lot of strong points as a future enterprise network. However, companies wish to have confidence in its functional and economic effectiveness and security before adopting it. The security issue especially is a problem to solve inevitably. Enterprises will hold back to adopt Intranet unless there are enough security counter plans and countermeasures against vulnerabilities of Intranet(it is the wise decision !). Nevertheless the researches related to Intranet has been concentrated on techniques for building it. In this paper, we focus the security aspect of Intranet. Intranet security must be considered on the whole from structure design to users' services. We propose a security-based Intranet structure and security management system.

  • PDF

A Securing Method of Relational Mechanism Between Networking Technology and Security Technology (네트워킹기능과 정보보호기능 연동기술 메커니즘 구현)

  • Noh, Si-Choon;Na, Sang-Yeob
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.11-17
    • /
    • 2007
  • This paper related to implementing issue and performance measuring about blended mechanism between networking technology and security technology. We got more effectiveness in overall network security, when applying and composing amalgamated security mechanism between network technology and security technology. The blended method offers $8{\sim}10%$ effective result in network security than the isolated ways of applying relational two technologies. As a result, we suggest amalgamated security mechanism between network technology and security technology, and also, we propose the blended method as a model of more effective way.

  • PDF

The North Korean Nuclear problem and disarmament of Outer Space (북한 핵문제와 우주군축)

  • Noh, Dong-Young
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.219-246
    • /
    • 2017
  • Nuclear issue is a good example showing globalization of the international regime. The history showed nuclear weapons may cause the extinction of human races when the first nuclear bombs fell down to Japan in August, 1945 and people became increasingly eager to achieve peace. Military buildup for national security is a matter of existence in the international society. However, disarmament or arms control to secure international peace and safety which is also the purpose of the Charter of the United Nations may be the most important task for us to realize peace of the mankind. Today, disarmament, together with amicable settlement of international conflicts and collective security system, is an important means to maintain and promote international peace and safety. It might be our permanent task to realize complete disarmament but, as the Preamble of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) expressed general and complete disarmament, the international society has clarified its effort for complete disarmament. Thus, taking a look into the international regime on the nuclear issue and progress related to the nuclear issue in North Korea, the study was intended to introduce the globalization of the nuclear issue, review the international effort for nuclear disarmament based on the concept of the 'common heritage of the mankind' and with respect to the United Nations Committee on the Peaceful Uses of Outer Space (COPUOS) and controls over nuclear weapons, and then evaluate the North Korean nuclear issue, which is in direct relation with South Korea and international laws, in terms of the space law and disarmament acts. The collective security system along with policies to prevent dissemination of nuclear weapons should also be emphasized and implemented to cope with the North Korean nuclear issue.

  • PDF

A Study on the Privacy Security Management under the Cloud Computing Service Provider (클라우드 컴퓨팅 서비스 제공자의 개인정보보호 조치방안에 대한 연구)

  • Yu, Woo-Young;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.337-346
    • /
    • 2012
  • According to cloud computing service is increasing of using the Internet technology, it's increasing privacy security risks and out of control of security threats. However, the current cloud computing service providers does not provide to solutions of the privacy security management. This paper discusses the privacy security management issue of cloud computing service, and propose solutions to privacy information threats in cloud computing environment.

ISO/IEC JTC1/SC27 WG2 (Cryptography & Security Mechanisms) 국제표준화 동향

  • Lee, Pil-Joong
    • Review of KIISC
    • /
    • v.21 no.2
    • /
    • pp.23-29
    • /
    • 2011
  • ISO/IEC JTC1/SC27 WG2의 역사 및 개요를 간단히 소개하고, 각 표준 별로 어떠한 내용인지, 어떤 기법들이 표준화되었는지를 살펴 본 후, 앞으로 WG2에서 표준화가 될 가능성이 있는 topic들을 살펴보고, 마지막으로 현재 가장 중요한 issue가 되고 있는 국제표준 암호알고리즘 선정기준에 대해 소개한다.

An Analysis of Trends on the Safety Area Utilizing Big Data : Focused on Fake News (빅데이터를 활용한 안전분야 트렌드 분석 : 가짜뉴스(fake news)를 중심으로)

  • Joo, Seong Bhin
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.111-119
    • /
    • 2017
  • As of March 2017, fake news is largely focused on political issues. Outside the country, main issues of the fake news have been a hot topic in the US presidential election in 2016 and emerged as a new political and social problem in countries like Germany and France. In Korea, issues of the fake news are also linked with political issues such as presidential impeachment and prosecution, impeachment quota, early election, etc. This phenomenon has recently led to the production and spread of fake news related to safety and security issues as well as political issues in connection with various methods of generating articles and sharing information. As a result, there is a high possibility that the information will be transformed into information that can cause considerable confusion to the public. Therefore, the recognition of such problems means that it is important at this point to consider the related situation analysis and effective countermeasures. To do this, we tried to make accurate and meaningful analysis for the diagnosis, analysis, forecasting and management of issues utilizing Big Data. As a result, it is found that the fake news is continuously generated in relation to the safety and security issue as well as the political issue in the South Korea, and differs from the general form occurring outside the country.

Analysis of Steganography and Countermeasures for Criminal Laws in National Security Offenses (안보사건에서 스테가노그라피 분석 및 형사법적 대응방안)

  • Oh, SoJung;Joo, JiYeon;Park, HyeonMin;Park, JungHwan;Shin, SangHyun;Jang, EungHyuk;Kim, GiBum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.723-736
    • /
    • 2022
  • Steganography is being used as a means of secret communication for crimes that threaten national security such as terrorism and espionage. With the development of computers, steganography technologies develop and criminals produce and use their own programs. However, the research for steganography is not active because detailed information on national security cases is not disclosed. The development of investigation technologies and the responses of criminal law are insufficient. Therefore, in this paper, the detection and decoding process was examined for steganography investigation, and the method was analyzed for 'the spy case of Pastor Kim', who was convicted by the Supreme Court. Multiple security devices were prepared using symmetric steganography using the pre-promised stego key. Furthermore, the three criminal legal issues: (1) the relevance issue, (2) the right to participate, and (3) the public trial issue a countermeasure were considered in national security cases. Through this paper, we hope that the investigative agency will develop analysis techniques for steganography.

Robust and Auditable Secure Data Access Control in Clouds

  • KARPAGADEEPA.S;VIJAYAKUMAR.P
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.95-102
    • /
    • 2024
  • In distributed computing, accessible encryption strategy over Auditable data is a hot research field. Be that as it may, most existing system on encoded look and auditable over outsourced cloud information and disregard customized seek goal. Distributed storage space get to manage is imperative for the security of given information, where information security is executed just for the encoded content. It is a smaller amount secure in light of the fact that the Intruder has been endeavored to separate the scrambled records or Information. To determine this issue we have actualize (CBC) figure piece fastening. It is tied in with adding XOR each plaintext piece to the figure content square that was already delivered. We propose a novel heterogeneous structure to evaluate the issue of single-point execution bottleneck and give a more proficient access control plot with a reviewing component. In the interim, in our plan, a CA (Central Authority) is acquainted with create mystery keys for authenticity confirmed clients. Not at all like other multi specialist get to control plots, each of the experts in our plan deals with the entire trait set independently. Keywords: Cloud storage, Access control, Auditing, CBC.

Research Trends in Information Security Economics : Focused on Information Systems Journals (보안경제성 연구동향 분석 : IS 저널 중심으로)

  • Kang, Mi-Hwa;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.1
    • /
    • pp.79-96
    • /
    • 2016
  • As numerous security breaches on a variety of information assets such as personal information, corporate secrets, computer servers, and networks have occurred, information security has emerged as a critical social issue. However, researches on economically rational information security decision-making have been few. Such researches are especially rare in South Korea where information security is considered to be a discipline of engineers. This study aims to identify the preferred themes and methodologies of information security economics research in the field of information systems by reviewing papers published in Management Information Systems Quarterly (MISQ), Information Systems Research (ISR), European Journal of Information Systems (EJIS), Management Science (MS), and Information and Management (I&M). We hope that the results of the study will be helpful in rational managerial or policy decision-making for practitioners and suggest future research topics for researchers.

A study of Carbon Dioxide Emissions due to the Cloud computing security (클라우드 컴퓨팅 보안에 따른 이산화탄소 배출에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.101-108
    • /
    • 2014
  • Recently, The cloud computing technology is emerging as an important issue in the world and the cloud computing has attracted much attention to the technology about carbon dioxide reduction. However, Unlike to the positive aspects of a cloud computing are included several security vulnerabilities. For this reason, the carbon dioxide reduction of a cloud computing technology has a differences. Therefore, this paper will be analyzed to the carbon dioxide emission factors of a cloud computing through the cloud case studies related $CO_2$ emissions and experiments measured of $CO_2$ emissions a security system. and In the future, this is expected to be utilized as a basis for the security design and performance improvement.