• Title/Summary/Keyword: 보안장치

Search Result 800, Processing Time 0.027 seconds

Digital Forensic Analysis Case study on Smartphone (스마트폰 환경에서 디지털 포렌식 분석 사례 연구)

  • Lee, Ki-Wook;Choi, Ok-kyung;Hong, Manphyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.765-767
    • /
    • 2011
  • IT 와 비즈니스가 융합화 되고 정보가 디지털화 됨에 따라 그에 대한 저장매체도 점점 더 다양해지고 있다. 그 중 이동성이 편리하고 휴대하기 간편한 스마트폰을 활용하여 개인 정보를 주고 받고 이를 이용한 비즈니스가 현재 활발히 진행되고 있다. 이러한 소셜 네트워크 서비스 이용이 급격히 증가함에 따라 개인 정보 보안에 대한 중요성은 점점 더 강조 되고 있는 실정이다. 본 연구에서 제안하는 디지털 포렌식 분석 방법을 이용하면 스마트폰에서 지원하는 서비스 형태에 따라 텍스트, 이미지, 동영상 등의 개인 정보를 수집 및 분석이 가능하다. 또한 디지털 포렌식의 관점에 따라 스마트폰 에서 사용되고 있는 애플리케이션의 로그 정보를 수집 및 분석함으로써 스마트폰의 저장 장치에 남겨진 기록들을 훼손 없이 그대로 보존시키고 디지털 증거 자료로 활용이 가능해 사이버 범죄에 대한 신속한 해결이 가능하다.

Frame security method in physical layer using OFB over Gigabit Ethernet Network (기가비트 이더넷 망에서 OFB 방식을 이용한 물리 계층 프레임 보안 기법)

  • Im, Sung-yeal
    • Journal of Internet Computing and Services
    • /
    • v.22 no.5
    • /
    • pp.17-26
    • /
    • 2021
  • This paper is about a physical layer frame security technique using OFB-style encryption/decryption with AES algorithms on Gigabit Ethernet network. We propose a data security technique at the physical layer that performs OFB-style encryption/decryption with AES algorithm with strong security strength when sending and receiving data over Gigabit Ethernet network. Generally, when operating Gigabit Ethernet network, there is no security features, but data security is required, additional devices that apply this technique can be installed to perform security functions. In the case of data transmission over Gigabit Ethernet network, the Ethernet frames conform to IEEE 802.3 specification, which includes several fields to ensure proper reception of data at the receiving node in addition to the data field. When encrypting, only the data field should be encrypted and transmitted in real time. In this paper, we show that only the data field of the IEEE802.3 frame is encrypted and transmitted on the sending node, and only the data field is decrypted to show the plain text on the receiving node, which shows that the encryption/decryption is carried out correctly. Therefore, additional installation of devices that apply this technique can increase the reliability of the system when security for data is required in Ethernet network operating without security features.

전력기술인이 만들 수 있는 전자보안 시스템⑵

  • 윤갑구
    • Electric Engineers Magazine
    • /
    • v.222 no.2
    • /
    • pp.21-29
    • /
    • 2001
  • 경보시스템에서 대다수의 출력 변환기는 전기 에너지를 음향 에너지로 전환시키지만 때때로 출력 변환기는 전기 신호를 광에너지로 전환시킬 것이다. 경보 시스템의 출력 음향 장치는 다음의 두기능중 하나 또는 모두를 행하기 위한 것이다.

  • PDF

전력기술인이 만들 수 있는 전자보안 시스템

  • 윤갑구
    • Electric Engineers Magazine
    • /
    • v.229 no.9
    • /
    • pp.10-15
    • /
    • 2001
  • 사이렌, 벨이나 소리를 발생하는 다른 장치들은 침입자에게 겁을 주는 방해물의 역할을 한다. 하지만 만약에 우리가 집에 있지 않을 때 침입자가 집을 떠난 후에는 누가 경보 회로를 리셋시킬 것인가?

  • PDF

A study of analysis and improvement of security vulnerability in Bluetooth for data transfer (블루투스 환경에서 데이터 전송 시 보안 취약점 분석 및 개선 방안 관련 연구)

  • Baek, Jong-Kyung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2801-2806
    • /
    • 2011
  • During data transmissions via Bluetooth networks, data to be encrypted, or plain text between the application layer and the device layer, can be hacked similar to a key-logger by the major function hooking technique of Windows Kernel Driver. In this paper, we introduce an improved protection module which provides data encryption transmission by modifying the data transmission driver of the Bluetooth device layer, and also suggest a self-protecting scheme which prevents data exposure by various hacking tools. We implement the protection module to verify the confidentiality guarantee. Our protection module which provides data encryption with minimal latency can be expected the widespread utilization in Bluetooth data transmission.

A Study on the Seeker Technology in Guided Weapon System (유도무기체계 탐색기 기술에 관한 연구)

  • Lee, Young-Uk
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.103-109
    • /
    • 2008
  • In this paper, a study on the seeker technology in guided weapon system development. Seeker is guided weapons mounted on the device that is targeted for implementation homing guided looking for confirmation of the target after picking up, tracking, command, induce calculations necessary to induce the target's direction or control device to provide location information to perform a series of features. Therefore, the Seeker is guided weapons systems and important device that determines the performance of one guided control. Explorer is a tactical and strategy guided weapons from different goals and specifications of weapons systems development and encourage economic efficiency, Interoperability, designed to improve the reliability and hit requirements and the more numerous. Therefore, this research through the Explorer's attributes and weapons systems encourage the development direction of the technical details of the offer.

  • PDF

Patient Authentication Protocol for Synchronization between Implantable Medical Device (체내 삽입장치간 동기화를 위한 환자 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.49-56
    • /
    • 2013
  • Among U-healthcare services adapting the latest IT technique and medical technique, a body-injecting device technique providing medical service to a patient who has incurable disease. But the body-injecting device technique can be easily exposed during wireless section to the third person and it can be used illegally. This paper proposes certification protocol which certifies a patient and hospital staff using random number created by certification server and a patient with hospital staff by synchronization. Specially, the proposed protocol uses security information created by information registered in certification server previously by a patient and hospital staff so that in keeps from accessing of third person who didn't get approval. And it gives more stability.

A Study on E-trade Securities and Strategic Solutions (전자무역보안과 전략적 대응방안에 대한 소고)

  • Jung, Jo-Nam;Lee, Chun-Su;Kang, Jang-Mook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.577-584
    • /
    • 2004
  • Recently many company has been cracked by crackers information security and everyday new computer virus come out. so e-trade partners should prevent the disasters. A few studies researched e-trade securities broadly but the new trend in information security division especially focused on electronic payment, EDI, Transportation, Contracts, Insurances and that of subjects have been researched through interdisciplinary evolution. Our research e-trade security on three part, First system attack, second is data attack and third is business attack. the attacks have theirs own solution, so e-trade company use this solution timely and powerfully. It is the most important thing to prepare the cracking with securities system. also manager should catch recent hacking technologies. The research results propose that e-trade firms should use information security policies and securities systems that including H/W and S/W. therefore manager's security mind is very important and also using electronic commerce securities device and should be considered exploiting solutions by each special usage according to e-trade company' environments.

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.