• Title/Summary/Keyword: 스마트폰 위협

Search Result 187, Processing Time 0.029 seconds

바이오인식 기술과 원격의료 서비스의 융합 동향

  • Moon, Ho-Kun;Ryu, Heui-Su;Kim, Jason
    • Review of KIISC
    • /
    • v.22 no.4
    • /
    • pp.29-37
    • /
    • 2012
  • 스마트폰과 태블릿 PC같은 스마트 기기의 보급 증가는 원격의료 서비스 분야의 활성화에 커다란 영향력을 미치고 있다. 그러나 환자와 의사가 직접 대면하지 않고 네트워크에 연결된 스마트 기기를 통해 진료 행위를 할 경우, 환자와 의사간에 상호 인식과 인증 등과 같은 보안 문제가 해결해야 할 가장 큰 걸림돌로 여전히 남아있다. 스마트 기기는 이동성과 편이성이 뛰어난 반면 각종 보안 침해 위협에 상대적으로 쉽게 노출될 수 있다는 단점이 있다. 스마트 기기를 원격의료 서비스에서 안전하게 활용하기 위해 바이오인식 (Biometrics) 기술과의 용합 시도와 관련 표준화 작업이 적극 추진되고 있다 본 논문에서는 안전한 원격의료 서비스 제공을 위해 바이오인식 기술의 융합 필요성과 기술 및 서비스 개발 사례를 분석하고, 원격의료 서비스 활성화를 위해 선결되어야 할 주요 과제를 모색하고자 한다.

A Study on the Domestic Model for Cyber Threat Information Sharing by Analyzing the Relevant Systems of Major Advacnced Countries (주요국의 사이버위협정보 공유체계 분석을 통한 국내 적용모델 연구)

  • Yoon, Oh Jun;Cho, Chang Seob;Park, Jeong Keun;Bae, Sun Ha;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.101-111
    • /
    • 2016
  • The recent cyber threats are becoming real threats to our lives. This gloomy situation from cyber threats necessarily demands the establishment of the cyber threat information sharing system between the public and private area. Key countries, like the US, Japan and the UK, are stabilizing the cyber threat information sharing systems by founding exclusive organizations for sharing information and setting up and implementing relevant measures. In this thesis, I would like to propose the model for cyber threat information sharing in order to cope efficiently with the ever-intensifying cyber threats. My model would include key elements for the efficient information sharing, such as the clear designation of main operator of information sharing system, the management of collaboration system between the public and private sector, the build-up of the integrated and automated system and the supplementation of legal system including the grant of privilege, and so on.

A Study on the smartphone management standards(OMA DM) (스마트폰 관리 표준(OMA DM)에 관한 연구)

  • Bae, Jung-Min;Jung, Sung-Jae;Bae, Yu-Mi;Jang, Rea-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.253-255
    • /
    • 2013
  • It is being exposed to hazard about the person or company's information, according to mobile-telecommunication's development. Those situations are being threatened to private information exposure and in a bid to stop the outflow of new technologies from coporations or goverment. to resolve this issue, the administration of SMART phone's applications and the skill of handling for device applying the standard of DM defining protocol and Mechanism Study into the software management and Device supervision under controlling, OMA which is affiliated to Mobile Service Standard Organization.

  • PDF

A Study of Behavior Based Authentication Using Touch Dynamics and Application Usage on Android (안드로이드에서 앱 사용과 터치 정보를 이용한 행위 기반 사용자 인증 기술 연구)

  • Kim, Minwoo;Kim, Seungyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.361-371
    • /
    • 2017
  • The increase in user data stored in the device implies the increase in threats of users' sensitive data. Currently, smartphone authentication mechanisms such as Pattern Lock, fingerprint recognition are widely used. Although, there exist disadvantages of inconvenience use and dependence that users need to depend on their own memory. User behavior based authentication mechanism have advantages of high convenience by offering continuous authentication when using the mobile device. However, these mechanisms show limitations on low accuracy of authentication and there are researches to improve the accuracy. This paper proposes improved authentication mechanism that uses user's smartphone application usage pattern which has not considered on earlier studies. Also, we analyze performance of proposed mechanism with collected datasets from actual use of smartphone applications.

A Study of Security Weaknesses of QR Codes and Its Countermeasures (QR 코드의 보안 취약점과 대응 방안 연구)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.83-89
    • /
    • 2012
  • Recently, due to widespread use of smartphones, the number of applications of the QR code is increased rapidly. QR codes, a kind of 2-dimensional barcode, is used to encode information such as simple URLs or namecards, especially for corporates' advertisement. Users can get some information easily by taking picture of the target QR code, however, fake or altered QR codes can cause serious problems, e.g., URL hijacking or infringement of private information because no one can identify the buried information in the QR code by his naked eye. In this paper, I summarize threats to the QR code and present how to tackle these threats.

Efficient Detection of Android Mutant Malwares Using the DEX file (DEX 파일을 이용한 효율적인 안드로이드 변종 악성코드 탐지 기술)

  • Park, Dong-Hyeok;Myeong, Eui-Jung;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.895-902
    • /
    • 2016
  • Smart phone distribution rate has been rising and it's security threat also has been rising. Especially Android smart phone reaches nearly 85% of domestic share. Since repackaging on android smart phone is relatively easy, the number of re-packaged malwares has shown steady increase. While many detection techniques have been proposed in order to prevent malwares, it is not easy to detect re-packaged malwares by static analysis and it is also difficult to operate dynamic analysis in android smart phone. Static analysis proposed in this paper features code reuse of repackaged malwares. We extracted DEX files from android applications and performed static analysis using class names and method names. This process doesn't not include reverse engineering, so it is possible to detect malwares efficiently.

A Study of Response and Plan of Banks for Mobile Payments of Non-financial Corporations (비금융권의 모바일 결제 서비스에 대한 은행권의 대응방안 연구)

  • Song, Yun-Young;Han, Kyung min
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.2
    • /
    • pp.7-13
    • /
    • 2015
  • Recently, payment methods using smartphone are diverse with the increased usage of smartphone. Especially, new features of mobile payment service are required in the situation to provide more services than mobile service of non-financial corporations. This paper proposed response and plan of current banks for mobile payments of non-financial corporations. Proposed method analyzes response and plan of the existing countermeasures of banks due to the spread of mobile devices, the development of FinTech, and the diversification of mobile payment in recent years. And, proposed paper additionally suggests the countermeasures of the financial sector for the reduction of fee income caused by the non-financial payment services. Also, this paper analyzes the mobile payment field and the method of non-financial corporations, which is the threat to the existing banks, and describes the countermeasure.

  • PDF

Hacking and Countermeasure on Smart TV (스마트 TV 해킹 위협 및 대응방안 분석)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.313-317
    • /
    • 2014
  • Smart-phone, PC or tablet platforms, such as smart terminals spread to the masses trying to capitalize. Smart TV also is increasing. In Korea, market size of TV is growing fast with growth of risk of hacking. In this paper, several kinds of Smart TV hacking cases are presented with the possibility of attacks against the vulnerability analysis and countermeasures. Most of the Linux operating system is open. Thus, it is vulnerable for latest hacking techniques. Most are based on the Linux OS to enhance security mount Sand-Box. However, bypass procedure using the technique, or APT attacks can avoid San-Box technique. New hacking techniques and a variety of ways will occur in the future. Therefore, this paper will develop Smart TV, and it analysis of a security threat and establishes better prepared in the future because new hacking attacks are expected to prepare more.

A Study on the Improvement Model for Invigorating Cyber Threat Information Sharing (사이버위협정보 공유 활성화를 위한 관리적·기술적 개선모델 연구)

  • Yoon, Oh Jun;Cho, Chang Seob;Park, Jeong Keun;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.25-34
    • /
    • 2016
  • This paper shall suggest the improvement model for invigorating cyber threat information sharing from the national level, which includes, inter alia, a comprehensive solutions such as the legislation of a guideline for information sharing, the establishment of so-called National Center for Information Sharing, the construction and management of a integrated information system, the development of techniques for automatizing all the processes for gathering, analyzing and delivering cyber threat information, and the constitution of a private and public joint committee for sharing information, so much so that it intends to prevent cyber security threat to occur in advance or to refrain damage from being proliferated even after the occurrence of incidents.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.