• Title/Summary/Keyword: security issues

Search Result 1,574, Processing Time 0.024 seconds

An Analysis of the Security Threats and Security Requirements for Electric Vehicle Charging Infrastructure (전기자동차 충전 인프라에서의 보안위협 및 보안요구사항 분석)

  • Kang, Seong-Ku;Seo, Jung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1027-1037
    • /
    • 2012
  • With response to the critical issue of global warming, Smart Grid system has been extensively investigated as next efficient power grid system. Domestically, Korean is trying to expand the usage of Electric Vehicles (EVs) and the charging infrastructure in order to replace the current transportation using fossil fuels holding 20% of overall CO2 emission. The EVs charging infrastructures are combined with IT technologies to build intelligent environments but have considerable number of cyber security issues because of its inherent nature of the technologies. This work not only provides logical architecture of EV charging infrastructures with security threats based on them but also analyses security requirements against security threats in order to overcome the adversarial activities to Smart Grid.

The Considerable Security Issues on the Security Enforcement of Cryptographic Technology in Finance Fields (금융부문 암호기술의 안전성 강화를 위한 보안고려사항)

  • Kim, Young-Tae;Lee, Su-Mi;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.137-142
    • /
    • 2009
  • By known attacks against cryptographic technology and decline of security, internal and external major institutions have defined their recommendations in kinds, expiration, safe parameters of cryptographic technology and so on. Internal financial fields will change some cryptographic technology to follow these recommendations. To keep strong security of financial systems against sudden security changes of cryptographic technology, this article finds pre-steps : status of applied cryptographic technology, selection of vulnerable cryptographic technology. And plans for management of cryptographic technology in financial fields will be proposed.

The Diagnosis and Prescription for Cybersecurity in Korea: Focusing on Policy and System

  • Park, Sangdon;Kim, Il Hwan;Kim, Jaehyoun;Lee, Kyung Lyul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.843-859
    • /
    • 2018
  • Cybersecurity has emerged as a serious problem in Korea and there have been relevant movements to improve domestic cybersecurity policy and system. However, discussions have yet to result in actual progress and the legislation for improvement of cybersecurity policy and system have been stagnant until now. As evidenced by the introduction of primary government legislation bill for national cybersecurity in 2017, the preparations for improvements to the policy and system are still in progress. However, we cannot be positive about the possibility of implementing these improvements during the process. Recognition of the importance of cybersecutiry has gradually risen and is more prevalent than in years past, however, in-depth discussions are not being made. In principle, misunderstandings about cybersecurity itself and insufficient understandings of the relevant legislation seem to cause such problems. Therefore, it is necessary to review key issues related to the improvement of cybersecurity policy and system and reconsider tasks for the future. Such issues include the relationship between cybersecurity and fundamental rights, establishing responsibility and capability of each of entities for cybersecurity, and the role of the military in cybersecurity. This type of in-depth discussion will be helpful for finding ways to improve upon cybersecurity policy and system. Moreover, this study aims to key issues with questionnaire survey and political and normative inquiry.

Influences and Barriers in the Kingdom of Saudi Arabia Affecting Technology Adoption in Healthcare: A Review Paper

  • Abdulaziz Alomari;Ben Soh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.59-67
    • /
    • 2023
  • The healthcare industry continues to adopt and integrate smart technology in its operations, from medical devices to managing operations. However, the adoption curve has not been smooth, and the historical record of technology adoption in the Kingdom of Saudi Arabia reveals the existence of both known and unknown issues. This review paper is aimed to explain the influences and barriers present in the Saudi healthcare sector affecting IoT technology adoption. A comprehensive discussion of the literature illustrated that Vision 2030, the privatisation trend, transformation in disease patterns and ageing, issues in management and increasing public awareness are the key drivers that may influence the need for the medical Internet of Things (mIoT) in Saudi healthcare. However, based on the past trend, the introduction and adoption of mIoT will likely experience issues such as noncompliance from doctors and nurses due to negative beliefs, lack of knowledge and inadequate perception of effort requirements. Thus, in-depth research of the factors associated with mIoT technology adoption is suggested for a smooth transition.

THE IMPACT OF EARNINGS AND DIVIDEND INFORMATION ON THE VALUATION CONSEQUENCES OF EXTERNAL FINANCING ANNOUNCEMENTS (손익 및 배당정보가 외부자금조달의 공시효과에 미치는 영향)

  • Choi, Do-Soung;Lee, Seong-Hyo
    • The Korean Journal of Financial Management
    • /
    • v.11 no.2
    • /
    • pp.175-193
    • /
    • 1994
  • This paper relates the valuation consequences of common-stock, convertible-debt and straight-debt offering announcements to the issuing firms' stock price performance in periods before the announcements. Similar to previous studies on equity offerings, we find that the announcement effects of security offerings, regardless of offering types, are negatively correlated with the short-term pre-offering stock returns. We show that the informational impact of the preceding earnings and dividend(E/D) announcements account for the previous findings of the negative correlation. We further report that security issues following 'good-news' E/D announcements result in larger stock price declines than issues following 'bad-news' E/D announcements. The finding is consistent with the hypothesis that the E/D information affects the investors' assessments of the firm's cash flow expectations and of the probability of external financing.

  • PDF

A Revocable Fingerprint Template for Security and Privacy Preserving

  • Jin, Zhe;Teoh, Andrew Beng Jin;Ong, Thian Song;Tee, Connie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1327-1342
    • /
    • 2010
  • With the wide deployment of biometric authentication systems, several issues pertaining security and privacy of the biometric template have gained great attention from the research community. To resolve these issues, a number of biometric template protection methods have been proposed. However, the design of a template protection method to satisfy four criteria, namely diversity, revocability and non-invertibility is still a challenging task, especially performance degradation when template protection method is employed. In this paper, we propose a novel method to generate a revocable minutiae-based fingerprint template. The proposed method consists of feature extraction from fingerprint minutiae pairs, quantization, histogram binning, binarization and eventually binary bit-string generation. The contributions of our method are two fold: alignment-free and good performance. Various experiments on FVC2004 DB1 demonstrated the effectiveness of the proposed methods.

A Discussion of Current Issues Integrating Mobile Agent in Web

  • Park, Jung-Hee;Lee, Ki-Dong
    • Journal of Digital Convergence
    • /
    • v.7 no.1
    • /
    • pp.175-183
    • /
    • 2009
  • With the development of enabling technologies such as wireless networking and various types of hand held-mobile devices, Mobile intelligent agent has been widely applied to various fields. Different views on capabilities, advantages, and disadvantages of mobile intelligent agent providing an ubiquitous access are brought by field researchers and practitioners recently. The purpose of this paper is thus to provide the discussion of the comtemporary development of mobile intelligent agent in the contexts of the Infosphere, focusing especially on developing and nurturing the future research grounds such as information scalability, and information security. The results of this study would improve the applications of mobile intelligent agents in web transaction, especially mobile business surroundings where many interest groups have to adjust their point of issues rapidly due to the changing business environment, i.e., customer's change the order item in web.

  • PDF

Location Privacy and Authentication for Low-cost Sensor Node Devices Using Varying Identifiers

  • Hamid Abdul;HONG Choong Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.412-414
    • /
    • 2005
  • Because a sensor node must operate on a tiny battery, the goal to eliminate energy inefficiencies leads the current researchers excavating for new techniques to advocate. As sensor networks edge closer towards wide spread deployment, security issues become a central concern. So far much research has focused on making sensor networks feasible and useful, and has not concentrated much on security issues especially computationally inexpensive techniques. In this paper we introduce a simple scheme relying on one-way hash-functions that greatly enhances location privacy by changing traceable identifiers on every read getting by with only a single, unreliable message exchange. Thereby the scheme is safe from many threats like eavesdropping, message interception, spoofing, and replay attacks.

  • PDF

Distance Learning for Students with Intellectual Disability during the Emerging Coronavirus Pandemic: Opportunities and Challenges from Parents' Perspectives

  • Alnefaie, Adhwaa M.;Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.85-92
    • /
    • 2021
  • Distance learning for students with intellectual disabilities can prove beneficial, particularly if adjusted to their educational characteristics and needs. This study seeks to identify the views of parents living in Saudi Arabia, regarding the opportunities offered by distance learning for students with intellectual disabilities, alongside their challenges during the Covid-19 pandemic. The research employed qualitative methods using semi-structured interviews with six parents of students with intellectual disabilities. The results revealed a number of both opportunities and challenges, including issues related to the family, in addition, the data highlighted difficulties related to the educational process (i.e. a lack of variety of educational methods) and technical issues related to access to the Internet and the insufficient computer skills of both teachers and students. The findings have several important implications for future practice, including the need for training workshops for parents concerning the online platform, as well as further research to determine students' perspectives of their experiences with distance learning.

Key Challenges of Mobility Management and Handover Process In 5G HetNets

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.139-146
    • /
    • 2022
  • Wireless access technologies are emerging to enable high data rates for mobile users and novel applications that encompass both human and machine-type interactions. An essential approach to meet the rising demands on network capacity and offer high coverage for wireless users on upcoming fifth generation (5G) networks is heterogeneous networks (HetNets), which are generated by combining the installation of macro cells with a large number of densely distributed small cells Deployment in 5G architecture has several issues because to the rising complexity of network topology in 5G HetNets with many distinct base station types. Aside from the numerous benefits that dense small cell deployment delivers, it also introduces key mobility management issues such as frequent handover (HO), failures, delays and pingpong HO. This article investigates 5G HetNet mobility management in terms of radio resource control. This article also discusses the key challenges for 5G mobility management.