• Title/Summary/Keyword: 보호 솔루션

Search Result 275, Processing Time 0.027 seconds

보안도구에 대한 우회공격 기법 분류 및 분석

  • 손태식;서정우;구원본;민동옥;문종섭;박현미;이병권
    • Review of KIISC
    • /
    • v.13 no.2
    • /
    • pp.92-105
    • /
    • 2003
  • IDS, Firewall 등의 보안도구들은 보편화되어 있는 보안 솔루션이다. 시스템의 보안을 책임지는 이러한 도구들이 보안상 문제점(즉, 우회공격 가능성)을 가지고 있다는 것은 보안에 있어 근본적인 부분이 취약성을 내포하고 있는 것과 같다. 그러므로 시스템 및 네트워크에 대한 새로운 보안기법을 연구하기에 앞서 현재의 보안 솔루션들이 가지고 있는 우회공격과 같은 위험성을 해결하는 것 필수적이다. 따라서 본 논문에서는 일반적으로 사용되는 보안 솔루션들에 대한 우회공격 기술 분석 및 대응 방안에 관한 연구를 수행한다.

A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT Infrastructure (IoT 인프라 공격 확산 방지 기술 성능 검증을 위한 악성코드 고속 확산 기법 연구)

  • Hwang, Song-yi;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.617-635
    • /
    • 2021
  • Internet of Things (IoT) devices connected to the network without appropriate security solutions have become a serious security threat to ICT infrastructure. Moreover, due to the nature of IoT devices, it is difficult to apply currently existing security solutions. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are actually increasing every year. Even though several security solutions are being developed to protect IoT infrastructure, there is a great risk to apply unverified security solutions to real-world environments. Therefore, verification tools to verify the functionality and performance of the developed security solutions are also needed. Furthermore, just as security threats vary, there are several security solution s that defend against them, requiring suitable verification tools based on the characteristics of each security solution. In this paper, we propose an high-speed malware propagation tool that spreads malware at high speed in the IoT infrastructure. Also, we can verify the functionality of the security solution that detect and quickly block attacks spreading in IoT infrastructure by using the high-speed malware propagation tool.

Study on Anti-Phishing Solutions, Related Researches and Future Directions (피싱 대응 솔루션 연구 및 개발 현황 그리고 앞으로의 방향)

  • Shin, Ji Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1037-1047
    • /
    • 2013
  • As damages from phishing have been increased, many anti-phishing solutions and related researches have been studied. Anti-phishing solutions are often built in web-browsers or provided as security toolbars. Other types of solutions are also developed such as email-filtering and solutions strengthening server authentication via secret image sharing. At the same time, researchers have tried to see the reasons why phishing works and how effective anti-phishing solutions are. In this paper, we review relevant anti-phishing solutions, their techniques and other phishing-related researches. Based on these, we summarize recommended ways to improve anti-phishing solutions and suggest the future directions to study to protect users from phishing attacks.

안전한 전자상거래를 위한 보안기술 개발 방향

  • 이주영;김경범;손승원
    • Information and Communications Magazine
    • /
    • v.17 no.10
    • /
    • pp.24-35
    • /
    • 2000
  • 최근 빠른 속도로 확산된 인터넷 사용은 전자상거래와 인터넷 사업의 필수 인프라인 정보보호에 관한 관심을 고조시키고 있다. 전자상거래를 이용함에 있어 불안전성은 구조적인 문제, 발달된 해킹기술, 보안에 관한 사용자 인식 부종 등 여러 가지가 문제에 기인한다. 본 논문에서는 전자상거래에서 발생할 수 있는 위협 및 취약 요소들과 그에 따른 보안 요구사항을 살펴보고 이에 대한 솔루션으로서 연구, 개발되고 있는 정보보호 기술을 소개하고자 한다. 그리고 각 솔루션들에 남아있는 과제들을 정리해 봄으로써 전자상거래를 위한 정보보호 기술이 앞으로 나아갈 방향을 제시해 보고자 한다.

  • PDF

효과적인 정보보호인식제고 방안

  • Im Chae-Ho
    • Review of KIISC
    • /
    • v.16 no.2
    • /
    • pp.30-36
    • /
    • 2006
  • 최근 정보보호분야는 공격기술이 방어기술보다 더 뛰어난 상태이며, 이는 사회공학, 악성코드, 제로데이 공격 등으로 인하여 정보보호 솔루션을 아무리 이용하여도 막을 수 없는 것이다. 그러므로 정보보호를 모든 참여자들이 생활화하기 위한 정보보호인식제고 프로그램 효율적으로 진행하기 위한 방안을 기술한다.

Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information) (PC보안솔루션 로그분석을 통한 보안정책 제안 (개인정보유출 방지))

  • Chae, Hyun Tak;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.961-968
    • /
    • 2014
  • In order to prevent leakage of personal information by insiders a large number of companies install pc security solutions like DRM(Digital Right Management), DLP(Data Loss Prevention), Personal information filtering software steadily. However, despite these investments anomalies personal information occurred. To establish proper security policy before implementing pc security solutions, companies can prevent personal information leakage. Furthermore by analyzing the log from the solutions, companies verify the policies implemented effectively and modify security policies. In this paper, we define the required security solutions installed on PC to prevent disclosure of personal information in a variety of PC security solution, plan to integrate operations of the solutions in the blocking personal information leakage point of view and propose security policies through PC security solution log analysis.

A Study on the Decision Process for Adoption of Enterprise Endpoint Security solutions (기업용 Endpoint 보안솔루션 도입을 위한 의사결정 프로세스에 대한 연구)

  • Moon, Heoungkeun;Roh, Yonghun;Park, Sungsik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.143-155
    • /
    • 2014
  • In recent years, domestic electronics, banking, electricity, services, manufacturing, pharmaceutical, corporate type and malicious hackers is corporate security through the accident occurred and the resulting loss of corporate information and the damage each year is steadily increasing. Many companies have responded to domestic business activities and to protect critical information related to laptops, smart phones, tablets, and introduced a variety of Endpoint security solutions within. However, being introduced to senselessly Endpoint security solution across the over-budget, with the same features and performance, such as conflicts and problems arise, resulting in additional maintenance costs, in an effort to resolve the conflict in the operational security of the IT department's new difficulty in becoming. Here is the introduction and operation of these Endpoint security solutions in order to solve the problem on employees's PC into the center of the information security governance based on Endpoint security solution to provide the process for determining the solutions presented.

Designing an Integrated Privacy System for Effective Privacy Protection (효과적인 개인정보 유출 방지를 위한 개인정보보호통합시스템 설계)

  • Jeong, Soo Ho;Ryu, Keun Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.121-122
    • /
    • 2018
  • 오늘날 빅데이터, AI, IoT 동 IT기술이 발달함에 따라 기업들은 다양하고 수많은 정보를 수집 축적하고 있다. 특히, 개인정보에 대해 습득 및 취급이 쉬워져 기업들은 대량의 개인정보를 보유하고 있다. 이로 인해, 해킹, 내 외부 직원의 고의 및 실수 등으로 발생하는 개인정보 유출 사고는 우리 사회에 큰 문제이다. 정부 및 유관기관은 개인정보보호법, 개인정보 안전성 확보조치기준 등 법령을 마련해 개인정보를 안전하게 처리하기 위한 최소한의 가이드라인을 제시하여 공공기관 및 민간기업이 개인정보를 안전하게 처리하도록 유도하고 있다. 하지만 이러한 노력에도 불구하고 개인정보 유출 사고는 해마다 빈번하게 일어난다. 본 논문은 이기종 개인정보보호 솔루션의 유기적인 통합 방안과 운영방안 등을 고안하여 개인정보보호통합시스템 설계를 통해 효과적인 개인정보 유출 사고 방지에 이바지하고자 한다.

Analysis of the Effects of Common Criteria Certification on the Information Security Solutions (CC인증이 정보보호 솔루션의 보안성에 미치는 영향 분석)

  • Hong, Young Ran;Kim, Dongsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.57-68
    • /
    • 2012
  • As the functions and technology of IT security solution has been diversified and complicated, it is necessary to make the functions standardized. The common criteria (CC) evaluation and certification scheme was introduced with this background in 2000. For over 10 years after the introduction of CC evaluation and certification scheme, many security solution vendors have developed functions following the security functional requirement in CC. Most of CC evaluators and developers think that CC has helped to enhance the security of the solution. So, it is a right time to prove the affirmative effects of CC in quantity. In this research, we compare two cases, the security status of the solution before and after the experience of CC evaluation, and analyze the results. We made the questionnaire for the domestic solutions vendors. We show that CC has made positive effects on the security of the solution quantitatively using statistical analysis. This research is meaningful security enhancement of domestic security solutions.