• Title/Summary/Keyword: surfing

Search Result 153, Processing Time 0.022 seconds

Surfing Resources Management for Sustainable Surfing in Surfable Region - Focusing on Jukdo, Yangyang, Gangwon Province (서핑가능 지역의 지속가능한 서핑을 위한 서핑자원 관리 - 강원도 양양군 죽도해변을 중심으로)

  • Baek, Seungjun;Park, Yong Sung
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.32 no.6
    • /
    • pp.506-515
    • /
    • 2020
  • Surfing is a sport sensitive to changes in the natural environment, using naturally occurring waves. In other words, factors such as the construction of coastal structures, coastal erosion, and sediment transportation could cause the wave to change into a direction inappropriate for surfing at the shore where surfable waves were reaching. In this study, we call the characteristics of the coastal environment that affect the formation of surfable waves as surfing resources, which is subsequently analyzed by coastal engineering methodologies. Also, using Delft3D-WAVE module (SWAN model), a way to evaluate sustainability of surfable wave is suggested through analysis of surfing resources at Jukdo, Yangyang, Gangwon Province, Republic of Korea.

Security Analysis of Partially Hidden Password Systems Resistant to Shoulder Surfing Attacks

  • Seong, Jin-Taek
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.17-26
    • /
    • 2020
  • As more users use mobile devices, shoulder surfing attacks have emerged as an important issue in security. According to research report, in fact, the result showed that about 30% of smartphone users are hit by shoulder surfing attacks. To this end, in this paper, we consider a shoulder surfing attack and propose a partially hidden password system to resistant to its attack. In order to help readers understand, we describe the proposed password system in more detail using one simple example. The core idea behind the proposed system is to place the user's password randomly in the specified grid instead of entering a password directly. As a result, even if an attacker makes a shoulder surfing attack to observe the password, the user can hide the preset password and defend against the attack. We also show how the security of the password system proposed in this paper is improved. In addition, even if there are consecutive shoulder surfing attacks, the security of the proposed password system is robust.

Cross-sectional analysis on recreation specialization of surfing participants (서핑 참여자의 레크리에이션 전문화에 관한 횡단적 분석)

  • Yeom, Sang-geun;Kang, Hyun-Wook
    • Journal of the Korean Applied Science and Technology
    • /
    • v.37 no.2
    • /
    • pp.340-353
    • /
    • 2020
  • The purpose of this study is to introduce surfing which is not a familiar leisure activity in Korea and provide understanding of surfing participants through the cross-sectional analysis on the process of forming recreational specialization from introductory levels with enthusiastic surfing participants. This study employs a qualitative approach to analyze each participant's experience on recreation specialization in detail, and in particular uses ethnographic research methods to derive participants' meaning of life and daily routines and cultural behavioral patterns changed through surfing. First, through the analysis of in-depth interview data, total 531 conceptual words were identified and the first categorization was established. Second, surfing participants mentioned that they had high expectations of surfing even before they first encountered it. Third, surfing participants noted that they experienced leisure constraints and made efforts to resolve this issue before reaching the recreation specialization process. Fourth, surfing participants were found to go through a recreation specialization process. Fifth, surfing participants were found to undergo life changes. They worked hard in their everyday life through physical training, improvement of surfing skills, and analysis of their own videos to be better at surfing.

Design and Implementation of Pinpad using Secure Technology from Shoulder Surfing Attack (비밀번호 훔쳐보기로부터 안전한 기술을 내장시킨 비밀번호 입력기의 설계 및 구현)

  • Kang, Moon-Seol;Kim, Young-Il
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.167-174
    • /
    • 2010
  • When entering the PIN(personal identification number), the greatest security threat is shoulder surfing attack. Shoulder surfing attack is watching the PIN being entered from over the shoulder to obtain the number, and it is the most common and at the same time the most powerful security threat of stealing the PIN. In this paper, a psychology based PINpad technology referred to as DAS(Dynamic Authentication System) that safeguards from shoulder surfing attack was proposed. Also, safety of the proposed DAS from shoulder surfing attack was tested and verified through intuitive viewpoint, shoulder surfing test, and theoretical analysis. Then, a PINpad with an internal DAS that was certified for its safety from shoulder surfing attack was designed and produced. Because the designed PINpad significantly decreases the chances for shoulder surfing attackers being able to steal the PIN when compared to the ordinary PINpad, it was determined to be suitable for use at ATM(automated teller machine)s operated by banks and therefore has been introduced and is being used by many financial institutions.

Virtual Keyboard against Social Engineering Attacks in Smartphones (사회 공학적 공격에 대응하는 색 기반 스마트폰 가상 키보드)

  • Choi, Dongmin;Baek, Cheolheon;Chung, Ilyong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.3
    • /
    • pp.368-375
    • /
    • 2015
  • Nowaday, financial institutions provide secure mobile keyboard solutions to keep their mobile banking services safe. However, these are still vulnerable to attacks, such as shoulder surfing attack. Especially, in the case of handicapped person such as visual impairment and blindness, they are more vulnerable than ordinary person because of inconvenience of secure information input. Among them, we focused on the color blind. For the color blind, 4-color based secure keyboard method causes more inconvenience to notify exact color. Thus, we propose a secure mobile keyboard solution to provide advanced functionality for the color blind users. Our method is based on 4-color theorem to support color blind users. In addition, our scheme is robust against shoulder surfing attack. According to the evaluation result, our method offers increased security against shoulder surfing attack compare with existing methods.

The Effects of Surfing Participants' Participation Motivation on Flow Experience and Continuous Participation Intention (서핑참여자의 참여동기가 몰입경험 및 지속적 참여의도에 미치는 영향)

  • KWON, Jae-Yoon;Nam, Sang-Back;PARK, Sang-Kyu;KANG, Hee-Yeob
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.29 no.2
    • /
    • pp.492-502
    • /
    • 2017
  • The purpose of this study was to verify the influences of surfing participants' participation motivation on flow experience and continuous participation intention. The study conducted a research survey through purposive sampling method after selecting 2 surfing center in Ganwon-do. 280 questionnaires distributed and 269 were selected as final valid sample by removing 11 questionnaires that have insufficient answers. Then data were analyzed through exploratory factor analysis, reliability analysis, correlation analysis, and multiple regression analysis using SPSS Window ver. 20.0. The results were as followings. First, participation motivation factors have positive effect on flow experience. Second, participation motivation factors have an influence on continuous participation intention. Third, flow experience have an influence on continuous participation intention. Fourth, leisure flow have an influence on continuous participation intention.

Secure Human Authentication with Graphical Passwords

  • Zayabaatar Dagvatur;Aziz Mohaisen;Kyunghee Lee;DaeHun Nyang
    • Journal of Internet Technology
    • /
    • v.20 no.4
    • /
    • pp.1247-1260
    • /
    • 2019
  • Both alphanumeric and graphical password schemes are vulnerable to the shoulder-surfing attack. Even when authentication schemes are secure against a single shoulder-surfing attack round, they can be easily broken by intersection attacks, using multiple shoulder-surfing attacker records. To this end, in this paper we propose a graphical password-based authentication scheme to provide security against the intersection attack launched by an attacker who may record the user's screen, mouse clicks and keyboard input with the help of video recording devices and key logging software. We analyze our scheme's security under various threat models and show its high security guarantees. Various analysis, usability studies and comparison with the previous work highlight our scheme's practicality and merits.

Hangul Password System for Preventing Shoulder-Surfing (훔쳐보기 방지를 위한 한글 패스워드 시스템)

  • Kim, Jong-Woo;Kim, Sung-Hwan;Park, Sun-Young;Cho, Hwan-Gue
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.33-41
    • /
    • 2011
  • Although conventional text-based passwords are used as the most common authentication method, they have significant drawbacks such as guess attacks, dictionary attacks, key loggers, and shoulder-surfing. To address the vulnerabilities of traditional text-based passwords, graphical password schemes have been developed as possible alternative solutions, but they have a potential drawback that they are more vulnerable to shoulder-surfing than conventional text-based passwords. In this paper, we present a new Hangul password input method to prevent shoulder-surfing attacks. Our approach uses Hangul as a password, and it requires the users to locate their password in the given wheeling password grid instead of entering the password. Our approach makes it difficult for attackers to observe a user's password since the system shows the users' passwords with decoy characters as the noise on the screen. Also, we provide security analysis for random attacks, dictionary attacks, and shoulder-surfing attacks, and it shows that our password system is robust against these attacks.

An Adaptive Web Surfing System for Supporting Autonomous Navigation (자동항해를 지원하는 적응형 웹 서핑 시스템)

  • 국형준
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.4
    • /
    • pp.439-446
    • /
    • 2004
  • To design a user-adaptive web surfing system, we nay take the approach to divide the whole process into three phases; collecting user data, processing the data to construct and improve the user profile, and adapting to the user by applying the user profile. We have designed three software agents. Each privately works in each phase and they collaboratively support adaptive web surfing. They are IIA(Interactive Interface Agent), UPA(User Profile Agent), and ANA(Autonomous Navigation Agent). IIA provides the user interface, which collects data and performs mechanical navigation support. UPA processes the collected user data to build and update the user profile while user is web-surfing. ANA provides an autonomous navigation mode in which it automatically recommends web pages that are selected based on the user profile. The proposed approach and design method, through extensions and refinements, may be used to build a practical adaptive web surfing system.

Shoulder Surfing Attack Modeling and Security Analysis on Commercial Keypad Schemes (어깨너머공격 모델링 및 보안 키패드 취약점 분석)

  • Kim, Sung-Hwan;Park, Min-Su;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1159-1174
    • /
    • 2014
  • As the use of smartphones and tablet PCs has exploded in recent years, there are many occasions where such devices are used for treating sensitive data such as financial transactions. Naturally, many types of attacks have evolved that target these devices. An attacker can capture a password by direct observation without using any skills in cracking. This is referred to as shoulder surfing and is one of the most effective methods. There has been only a crude definition of shoulder surfing. For example, the Common Evaluation Methodology(CEM) attack potential of Common Criteria (CC), an international standard, does not quantitatively express the strength of an authentication method against shoulder surfing. In this paper, we introduce a shoulder surfing risk calculation method supplements CC. Risk is calculated first by checking vulnerability conditions one by one and the method of the CC attack potential is applied for quantitative expression. We present a case study for security-enhanced QWERTY keyboard and numeric keypad input methods, and the commercially used mobile banking applications are analyzed for shoulder surfing risks.