• Title/Summary/Keyword: 보안 중요도

Search Result 2,285, Processing Time 0.024 seconds

Public Key based LR-WPAN Security Algorithm (공개키 방식의 LR-WPAN 보안 알고리즘)

  • Kim, Jin-Cheol;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.54-67
    • /
    • 2006
  • Low Rate WPAN (Wireless Personal Area Network) designed for low power and low cost wireless communication is an important technology to realize ubiquitous environment. IEEE 802.15.4 and ZigBee Alliance recommend the SKKE (Symmetric-Key Key Establishment) protocol for key establishment and management. The SKKE algorithm has security weakness such as the absence of authentication process or electric signature in key generation and exchange when devices join the role of coordinators. In this paper, we propose new key establishment and security algorithm based on public key encryption to solve low rate WPAN security problems. Also, to improve PLC AMR system's weaknesses in communication reliability and security, we propose a new AMR system model based on IEEE 802.15.4 and we apply our security algorithm to AMR profile for security enhancement.

A Study on Security Authentication Vector Generation of Virtualized Internal Environment using Machine Learning Algorithm (머신러닝 알고리즘이 적용된 가상화 내부 환경의 보안 인증벡터 생성에 대한 연구)

  • Choi, Do-Hyeon;Park, Jung Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.33-42
    • /
    • 2016
  • Recently, the investment and study competition regarding machine running is accelerating mainly with Google, Amazon, Microsoft and other leading companies in the field of artificial intelligence. The security weakness of virtualization technology security structure have been a serious issue continuously. Also, in most cases, the internal data security depend on the virtualization security technology of platform provider. This is because the existing software, hardware security technology is hard to access to the field of virtualization and the efficiency of data analysis and processing in security function is relatively low. This thesis have applied user significant information to machine learning algorithm, created security authentication vector able to learn to provide with a method which the security authentication can be conducted in the field of virtualization. As the result of performance analysis, the interior transmission efficiency of authentication vector in virtualization environment, high efficiency of operation method, and safety regarding the major formation parameter were demonstrated.

A study on the Development for the National Cybersecurity Capability Assessment Criteria (국가 사이버보안 역량 평가를 위한 평가항목 연구)

  • Bae, Sunha;Park, Sangdon;Kim, So Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1293-1314
    • /
    • 2015
  • As ICT is becoming a major social infrastructure, the need to strengthen cyber capabilities are emerging. In the major advanced countries including the United States, has a continuing interest in strengthening cyber capabilities and has studied in enhancements of cyber capabilities. The cyber capability assessment is necessary in order to determine the current level of the country, establish policy directions and legislations. The selection of criteria has very important meaning to suggest future policy direction as well as an objective assessment of cybersecurity capabilities. But there are variable criteria for national cyber capabilities assessment such as strategy, legislation, technology, society and culture, and human resources. In this paper we perform the analysis of criteria for the other country's cybersecurity assessments including the U.S. and Europe. And we proposed the criteria for the national cybersecurity assessment reflecting the our country's characteristics.

An Empirical Study on Influential Factors of the Development and Implementation in Firm Security Management (기업 보안관리 강화의지 및 실행에 영향을 미치는 요인에 관한 연구)

  • Hwang, Jong-Ho
    • Management & Information Systems Review
    • /
    • v.32 no.2
    • /
    • pp.213-235
    • /
    • 2013
  • This study investigates proper solution available for flexibly management pointing out reality a lack of understanding and interest for executing security management while importance of firm security management gets bigger. Accordingly, this study suggests 4 exogenous variables such as organizational commitment, experience of security risks, perceived benefits, partner interdependence as factors of having influence upon development and implementation in security management. It suggests IT volatility as moderating variable, which will intensify between development and implementation. The research model was tested by using Structural Equation Modeling, via Amos 19.0 analysis on a sample collected from 209 firms. As a result, the remaining variables except partner interdependence showed statistically positive influence. The implications of the findings suggest a new theoretical framework of the security management and offers important solutions for the practical application guidelines.

  • PDF

A Study on Development of the Evaluation Model about Level of Security in National R&D Program (국가연구개발사업 연구보안수준 평가모델 개발에 관한 연구)

  • Bae, Sang Tae;Kim, Ju Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.1
    • /
    • pp.73-80
    • /
    • 2013
  • Government promotes that the strategy of national R&D converts from catch-up R&D type to leading R&D type for the future growth and national competitiveness according to the recent paradigm shift in the research and development. So the many national researches about foundation, source and core technology are actively being made. As a result of these researches, the security has become an important part of success factor in R&D. And so various security diagnosis and evaluation is being conducted about national R&D program. Existing the research security evaluation models are classified domains in terms of security management and created evaluation indicators according to the domains. However the models are inappropriate in case of researchers doing self-diagnosis of research security. This paper set up the domains in aspect of research management and then proposed the evaluation indicator of research security according to the domains. The evaluation indicator model that is suggested can be utilized in self-diagnosis of research security effectively.

  • PDF

Proposal and Analysis of Solution for Improving Problem of Our Country Logistics Security (우리나라 물류보안의 문제점 개선 방안 제안 및 분석)

  • Ahn, Jae-Deok;Lee, Ki-Wook
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.352-360
    • /
    • 2010
  • 9.11 This research since 2001, including shipping and port security and cargo flow international logistics the overall efficiency of the important issues of the international community that reflects the emerging research on the logistics to improve the security problems of I may occur in the logistics sector in the country, such as terrorism and to prevent security incidents from the security system of the logistics in order to operate in real time, and the introduction of advanced logistics and my analysis and logistics for the security system to collect data and develop lesson Logistics problems facing the security sector will want to analyze and improve the present. The analysis of the problems of logistics and security and find ways to improve research and literature selected by experts to improve, and to improve the first part of measures to improve the survey was analyzed through the AHP.

Analysis of Strategic Priorities for Strengthening Cybersecurity Capability of Cambodia (캄보디아의 사이버보안 역량강화를 위한 전략적 우선순위 분석)

  • Heng, Mara;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.93-102
    • /
    • 2019
  • This paper aims to set the priorities for the cybersecurity strategy of Cambodian government. To this end, we built a AHP research model by adopting 4 factors from the ITU national interests model and selecting 7 strategies from best practices of 8 countries leading the cyber security. Using a questionnaire, 19 experts evaluated Cambodia's cybersecurity strategy priorities. The key policy factors were evaluated in the order of homeland defense, economic welfare, value promotion and favorable world order. Their strategic alternatives were identified in the order of legislation, capacity building, and cyber attack prevention for critical infrastructure. This study will contribute to setting the strategic priorities and feasible action plans to strengthen Cambodia's cybersecurity capabilities.

Analysis of Network Security Policy Enforcement in Container Environments (컨테이너 환경에서의 네트워크 보안 정책 집행 분석)

  • Bom Kim;Seungsoo Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.961-973
    • /
    • 2023
  • With the changes in the modern computing landscape, securing containerized workloads and addressing the complexities of container networking have become critical issues. In particular, the complexity of network policy settings and the lack of cloud security architecture cause various security issues. This paper focuses on the importance of network security and efficiency in containerized environments, and analyzes the security features and performance of various container network interface plugins. In particular, the features and functions of Cilium, Calico, Weave Net, and Kube-router were compared and evaluated, and the Layer 3/4 and Layer 7 network policies and performance features provided by each plugin were analyzed. We found that Cilium and Calico provide a wide range of security features, including Layer 7 protocols, while Weave Net and Kube-router focus on Layer 3/4. We also found a decrease in throughput when applying Layer 3/4 policies and an increase in latency due to complex processing when applying Layer 7 policies. Through this analysis, we expect to improve our understanding of network policy and security configuration and contribute to building a safer and more efficient container networking environment in the future.

A study on security requirements for Telecommuting in defense industry (방산업체 비대면(재택) 근무를 위한 보안 요구사항 연구)

  • Hwang Gue Sub;Yeon Seung Ryu
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.209-221
    • /
    • 2023
  • Due to the rapid spread of the COVID-19 virus in December 2019, the working environment was rapidly converted to telecommuting. However, since the defense industry is an organization that handles technology related to the military, the network separation policy is applied, so there are many restrictions on the application of telecommuting. Telecommuting is a global change and an urgent task considering the rapidly changing environment in the future. Currently, in order for defense companies to implement telecommuting, VPN, VDI, and network interlocking systems must be applied as essential elements. Eventually, some contact points will inevitably occur, which will increase security vulnerabilities, and strong security management is important. Therefore, in this paper, attack types are selected and threats are analyzed based on the attack tactics of the MITER ATT&CK Framework, which is periodically announced by MITER in the US to systematically detect and respond to cyber attacks. Then, by applying STRIDE threat modeling, security threats are classified and specific security requirements are presented.

Research on Cybersecurity Risk Management System in Smart Factory Environment (스마트팩토리 환경의 사이버보안 리스크 관리 체계 연구)

  • YoungSun Shin
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.4
    • /
    • pp.43-54
    • /
    • 2024
  • This study presented a cybersecurity risk management system in a smart factory environment. A smart factory refers to a factory that optimizes the production system and increases efficiency. However, this digitized environment is vulnerable to cyber attacks, and manufacturing companies can suffer serious damage from disruptions in production systems or information leaks. Therefore, a systematic approach to effectively managing cyber security risks is essential in smart factories. In this study, a continuous security risk management system for each stage of the smart factory was proposed along with business process-based security risk assessment. These studies will help to further improve cybersecurity risk management in smart factories. It will also play an important role in ensuring that smart factories operate safely and efficiently.