• Title/Summary/Keyword: 보안 중요도

Search Result 2,285, Processing Time 0.036 seconds

Implementation of a File Security Module in the Windows Operating System (윈도우 운영체제의 파일 보안 모듈 개발)

  • Lee, Seong-Heon;Jang, Seung-Ju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.660-663
    • /
    • 2011
  • The file security function, which this paper suggests, restricts the access of an unauthorized users by using password algorithm and saving file. Saved files that are encrypted are read by decrypting them with decryption algorithm. These features are user interface to design the program for user friendly. The security function implements both file encryption and decryption programs and tests whether the experiment works or not. In addition, when a decryption is progressed and the settings of between decryption and encryption are different each other, the security function also checks the possibility of decryption. We can enhance the security on important files stored in Windows servers or personal computers by developing this program.

  • PDF

GEOP : A Security Aware Multipath Routing Protocol (GEOP : 보안 인식 다중경로 라우팅 프로토콜)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.151-157
    • /
    • 2010
  • Rapid technological advances in the area of micro electro-mechanical systems (MEMS) have spurred the development of small inexpensive sensors capable of intelligent sensing. A significant amount of research has been done in the area of connecting large numbers of these sensors to create robust and scalable Wireless Sensor Networks (WSNs). The resource scarcity, ad-hoc deployment, and immense scale of WSNs make secure communication a particularly challenging problem. Since the primary consideration for sensor networks is energy efficiency, security schemes must balance their security features against the communication and computational overhead required to implement them. In this paper, we combine location information and probability to create a new security aware multipath geographic routing protocol. The implemented result in network simulator (ns-2) showed that our protocol has a better performance under attacks.

Security Attack Analysis for Wireless Router and Free Wi-Fi Hacking Solutions (무선공유기 보안공격 분석 및 무료와이파이 해킹 해결방안)

  • Bae, Hee-Ra;Kim, Min-Young;Song, Su-Kyung;Lee, Seul-Gi;Chang, Young-Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.65-70
    • /
    • 2016
  • As network communication increases by using public WiFi to check e-mail and handling Internet banking, the danger of hacking public routers continues to rise. While the national policy is to further propagate public routers, users are not eager to keep their information secure and there is a growing risk of personal information leakage. Because wireless routers implement high accessibility but are vulnerable to hacking, it is thus important to analyze hacking to tackle the attacks. In this study, an analysis is made of the encryption method used in WiFi and cases of hacking WiFi by security attacks on wireless routers, and a method for tackling the attacks is suggested.

A Verifier-free Scheme for User Authentication and Access Control Using Smart Cards: Improvement of Chen-Yeh's Method (스마트 카드를 사용한 검증자 없는 사용자 인증 및 접근 제어 방법: Chen-Yeh 방법의 개선)

  • Kim, Yong;Chung, Min Gyo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.4
    • /
    • pp.43-51
    • /
    • 2013
  • User authentication and access control are two important components in high security applications. Recently, Chen and Yeh proposed a method to integrate both of them seamlessly. However, Chen-Yeh's scheme is vulnerable to a stolen verifier attack, since it maintains a smart card identifier table in a remote server. Therefore, this paper modifies Chen-Yeh's scheme and propose a new integrated authentication and access control scheme that is resilient to the stolen verifier attack while inheriting all the merits of Chen-Yeh's scheme. Security analysis shows that the proposed scheme withstands well-known security attacks and exhibits many good features.

A Study on Implementation of IPv6 Neighbor Discovery Protocol supporting Security Function (보안기능을 지원하는 IPv6 ND Protocol 구현에 관한 연구)

  • Yu Jae-Wook;Park In-Kap;Kim Joong-Min
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.12
    • /
    • pp.33-40
    • /
    • 2004
  • IPv6 defines relation between surrounding node using Neighbor Discovery protocol. Used Neighbor Discovery messages, grasp surrounding node, include important informations about network. These network information outcrops can give rise in network attack and also service that use network will paralysis. Various kinds of security limitation was found in Present Neighbor Discovery protocol therefore security function to supplement this problem was required. In this thesis, Secure Neighbor Discovery protocol that add with suity function was design and embody by CGA module and SEND module.

Analysis of Mobility and Security Requirements for Mobile IPTV (모바일 IPTV의 이동성에 대한 침해 분석 및 대응방안)

  • Lee, Sun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.37-44
    • /
    • 2010
  • The mobility is one of the most important factor for mobile IPTV. However, mobility is highly vulnerable to eavesdropping and unauthorized access. Generally mobility of mobile services is based on handover techniques. But we showed that mobile IPTV must use other techniques to confirm mobility. In this paper, we analyzed security of wibro mobile IPTV from the viewpoint of mobility. We considered DCAS host must include new addresses of mobile devices. We analyzed total number of authentication for the proposed method. So we showed that proposed method was more efficient than wibro-mobile IPTV. We compared the security of our proposal to the security requirements of TTA.

Performance Comparison of Security System with Various Collaboration Architecture (다양한 연동 구조를 통한 보안 시스템의 성능 비교)

  • 김희완;서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.235-242
    • /
    • 2004
  • As e-business being rapidly developed the importance of security is on the rise in network. Intrusion detection systems which are a core security system detect the network intrusion trial. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network and the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. Each agent cooperates through the BBA (Black Board Architecture) and CNP (Contract Net Protocol) for detecting intrusions. In this paper, we propose the effective method comparing the blackboard architecture to contract net protocol.

  • PDF

Security measures of Information and Communication infrastructure of Water Resources Field (댐·보 등 수자원분야 정보통신기반시설 보안대책)

  • Yu, Se-Hwan;Jang, Dong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.1034-1037
    • /
    • 2013
  • ICT infrastructure is electronic control systems or communication network related to national security, public administration, defense, policing, finance. Water resources sector has been building a system of control that can be performed electronically, communications, management, energy, and other work-related. Water resources sector has been a paradigm shift in water management and the control system is integrated into a single network. The control system security vulnerabilities are exposed - other control networks, business networks, linking with outside agencies, etc. Cyber terrorist society can cause a huge mess economically, The importance of security for control systems is becoming. In this paper, ICT infrastructure - the water resources in the field of control systems will analysis security measures.

  • PDF

Height Prediction Mechanism for Smart Surveillance Systems (지능형 보안 감시 시스템을 위한 높이 예측 메커니즘)

  • Shim, Jaeseok;Lim, Yujin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.7
    • /
    • pp.241-244
    • /
    • 2014
  • Wireless Sensor Network(WSN) has been attracting lots of interest in recent years for smart surveillance systems. WSN-based surveillance systems need to figure out the occurrence or existence of events or objects and to find out where the events have occurred or the objects are present. In our surveillance system, it is needed to give an alarm only when the detected object is human (not pets or rodents) for reducing false alarms and improving the system reliability. In this paper, we propose a height prediction mechanism to determine if the detected object is human using Heron's formula. Finally, we verify the performance of our proposed mechanism through various experiments.

Analysis and Implementation of RFID Security Protocol using Formal Verification (정형검증을 통한 RFID 보안프로토콜 분석 및 구현)

  • Kim, Hyun-Seok;Kim, Ju-Bae;Han, Keun-Hee;Choi, Jin-Young
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.7
    • /
    • pp.332-339
    • /
    • 2008
  • Radio Frequency Identification (RFID) technology is an important part of infrastructures in ubiquitous computing. Although all products using tags is a target of these services, these products also are a target of attacking on user privacy and services using authentication problem between user and merchant, unfortunately. Presently, it is very important about security mechanism of RFID system and in this paper, we analyze the security protocol among many kinds of mechanisms to solve privacy and authentication problem using formal verification and propose a modified novel protocol. In addition, the possibility of practical implementation for proposed protocol will be discussed.