• 제목/요약/키워드: security issues

검색결과 1,584건 처리시간 0.026초

CALS의 단계별 구현을 위한 보안기술 (Security for CALS Implementation)

  • 김중인;김석우
    • 한국전자거래학회지
    • /
    • 제1권1호
    • /
    • pp.51-67
    • /
    • 1996
  • Recently the interests in NII, CALS/EC, and security are rapidly increasing. However, only one of the security issues for CALS implementation, i.e., the security for EDI implementation, has been presented in the literature. No comprehensive discussion about CALS security including other CALS applications exists. This paper intends to present such a comprehensive analysis for the security requirements and standards for the well-recognized two-phase CALS implementation. We present a framework for CALS security encompassing security protocols and systems that are arranged into the framework in terms of the CALS implementation phases, application systems, and communication modes. This framework is followed by brief descriptions of the security services and mechanisms for each CALS application.

  • PDF

Study on Structural and Systematic Security Threats of Vehicle Black Box as Embedded System

  • Park, Jaehyun;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제9권3호
    • /
    • pp.9-16
    • /
    • 2017
  • Recently, more users have been using IoT embedded systems. Since the wireless network function is a basic and core function in most embedded systems, new security threats and weaknesses are expected to occur. In order to resolve these threats, it is necessary to investigate the security issues in the development stages according to the Security Development Lifecycle (SDL). This study analyzes the vulnerabilities of the embedded systems equipped with the wireless network function, and derives possible security threats and how dangerous such threats are. We present security risks including bypassing the authentication stage required for accessing to the embedded system.

A Study on the Isolated Cloud Security Using Next Generation Network

  • Park, Jae-Kyung;Lee, Won Joo;Lee, Kang-Ho
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권11호
    • /
    • pp.9-16
    • /
    • 2017
  • In this paper, we propose to present a model of cloud security that has emerged as the biggest topic of cloud computing, replacing the traditional IT environment. While cloud computing is an extension of existing IT technology, security issues and threats can be applied to traditional security technologies. However, the biggest difference between a typical computing environment and a cloud computing environment is a virtualized environment with a hypervisor. Currently, there are many weaknesses in the virtualized environment, and there are few related security products. In order for a cloud computing environment to function as a reliable IT environment, we expect more research on hypervisor-based security technologies, and we expect to secure safer cloud services through a secure model over the next generation of new-based networks.

Survey on Security in Wireless Sensor

  • Li, Zhijun;Gong, Guang
    • 정보보호학회논문지
    • /
    • 제18권6B호
    • /
    • pp.233-248
    • /
    • 2008
  • Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). There are numerous applications for wireless sensor networks, and security is vital for many of them. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the lack of infrastructure, all of which impose unique security challenges and make innovative approaches desirable. In this paper, we present a survey on security issues in wireless sensor networks. We address several network models for security protocols in WSNs, and explore the state of the art in research on the key distribution and management schemes, typical attacks and corresponding countermeasures, entity and message authentication protocols, security data aggregation, and privacy. In addition, we discuss some directions of future work.

Impact of Modern Information and Communication Technologies on Economic Security in the Context of COVID-19

  • Kotlyarevskyy, Yaroslav;Petrukha, Sergii;Mandzinovska, Khrystyna;Brynzei, Bohdan;Rozumovych, Natalia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.199-205
    • /
    • 2022
  • The main purpose of the study is to analyze the main aspects of the impact of information and communication technologies on the economic security system in the context of a pandemic situation. The new realities of the modern turbulent world require a new approach to the issues of ensuring economic security, in which information and communication technologies and information security are beginning to play an increasingly important role. As a result of a detailed analysis of the further functioning of all components of economic security in the context of the existence of the consequences of the COVID-19 pandemic.

Novel VNFI Security Management Function Block For Improved Security Framework For SDN/NFV Networks

  • Alruwaili, Rahaf Hamoud;Alanazi, Haifa Khaled;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.303-309
    • /
    • 2022
  • Software Defined Networking (SDN) is a novel approach that have accelerated the development of numerous technologies such as policy-based access control, network virtualization, and others. It allows to boost network architectural flexibility and expedite the return on investment. However, this increases the system's complexity, necessitating the expenditure of dollars to assure the system's security. Network Function Virtualization (NFV) opens up new possibilities for network engineers, but it also raises security concerns. A number of Internet service providers and network equipment manufacturers are grappling with the difficulty of developing and characterizing NFVs and related technologies. Through Moodle's efforts to maintain security, this paper presents a detailed review of security-related challenges in software-defined networks and network virtualization services.

Analysis on Cyber Security and Its Challenges to Society

  • Shashank Mishra;Raghav Sandhane
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.141-152
    • /
    • 2024
  • Cyber security plays an important role in the field of IT industry and other industry too. Whenever we talk about cyber security, the word cybercrime pops out. Cybercrime is the biggest issues we are facing right now. Every 39 seconds an attacker is hacking something. Since 2008 to 2019 there are more than 8800 data breach cases is being found or filed. Even as we are aware of cybercrime and its stats, only 5% organization are fully secured and other 95% are not fully secured. According to survey 56% organization have weak controls. Basically they are not secured. Apart from taking measures cyber security are facing huge challenges or disturbs to many. This paper mainly focuses on dare to cyber security and also center of attraction is cyber security expertise, morals with changing in technology with time. [1]

인공지능 윤리 강화를 위한 제도적 개선방안 연구 (Research on institutional improvement measures to strengthen artificial intelligence ethics)

  • 차건상
    • 융합보안논문지
    • /
    • 제24권2호
    • /
    • pp.63-70
    • /
    • 2024
  • 인공지능 기술의 발전으로 우리의 삶은 혁신적으로 변화하고 있지만, 동시에 윤리적 문제들도 새롭게 대두되고 있다. 특히 알고리즘 및 데이터 편향성에 의한 차별문제, 딥페이크 및 개인정보 유출 문제 등은 인공지능 서비스확대에 따라 사회적으로 해결해야 할 선결과제라 판단된다. 이를 위해 본 논문에서는 인공지능 윤리 측면에서 인공지능의 개념과 윤리적 이슈를 살펴보고 이를 예방하기 위한 각국의 윤리 가이드라인, 법률, 인공지능 영향평가제도, 인공지능 인증제도와 인공지능 알고리즘 투명성 관련 기술 현황 등을 살펴보고 인공지능 윤리 강화를 위한 제도적 개선방안을 제시하고자 한다.

Quality Evaluation on Emotion Management Support App: A Case on Early Assessment of Emotional Health Issues

  • Anitawati Mohd Lokman;Muhammad Nur Aiman Rosmin;Saidatul Rahah Hamidi;Surya Sumarni Hussein;Shuhaida Mohamed Shuhidan
    • International Journal of Computer Science & Network Security
    • /
    • 제24권9호
    • /
    • pp.77-84
    • /
    • 2024
  • Emotional health is important for overall health, and those who are experiencing difficulties should seek professional help. However, the social stigma associated with emotional health, as well as the influence of cultural beliefs, prevent many people from seeking help. This makes early detection difficult, which is critical for such health issues. It would be extremely beneficial if they could assess their emotional state and express their thoughts without prejudices. On the market, there are emotional health apps. However, there was little to no evidence-based information on their quality. Hence, this study was conducted in order to provide evidence-based quality in emotional health mobile apps. Eleven functionality task scenarios were used to assess functional quality, while a System Usability Scale test (n=20) was used to assess usability, customer acceptability, learnability, and satisfaction. The findings show that the app for emotional health management is highly efficient and effective, with a high level of user satisfaction. This contributes to the creation of an app that will be useful and practical for people experiencing early-stage emotional health issues, as well as related stakeholders, in order to manage early-stage emotional health issues.

M2M 환경에서 장치간 상호 인증 및 정형검증 (Inter-device Mutual authentication and Formal Verification in M2M Environment)

  • 배우식
    • 디지털융복합연구
    • /
    • 제12권9호
    • /
    • pp.219-223
    • /
    • 2014
  • 최근 무선통신 시스템의 기술이 발전함으로 M2M(Machine-to-Machine)이 산업분야에서 관심이 되고 있다. 기기간 통신인 M2M은 재난, 안전, 건설, 보건복지, 기상, 환경, 물류, 문화, 국방, 의료, 농.축산 등 사람의 접근이 어려운 공간 등에 설치되어 운용된다. 이는 사람을 대신해 장비들이 자동으로 상황에 맞추어 통신을 하고 어느 정도의 조치는 자동으로 취해지도록 함으로써 사람을 대신한 정보 관리 및 장비 운영을 할 수 있다. M2M이 디바이스간 통신이 무선으로 이루어지는 경우 공격자의 공격에 노출되어 운영되는 보안적 문제로 정당한 장치인지 상호인증 등 적절한 보안이 필요하다. 관련하여 최근 보안적으로 안전한 많은 프로토콜이 연구 되고 있으며 본 논문에서는 M2M 보안문제를 해결하기 위하여 SessionKey, HashFunction, 및 Nonce 를 적용하였으며 보안취약성을 보완한 안전한 프로토콜을 제안한다. 제안프로토콜을 기존의 대부분의 연구처럼 수학적 정리증명으로 안전함을 주장하지 않고 Casper/FDR을 이용하여 정형검증 하였으며 실험결과 제안프로토콜이 안전함이 확인되었다.