• Title/Summary/Keyword: 안전 삭제

Search Result 103, Processing Time 0.025 seconds

Secure Tethering Method through Enhanced Authentication for Mobile Communication (향상된 인증기법을 통한 안전한 모바일 테더링 기법)

  • Park, Tae-Sung;Kim, Sung-Yoon;Jun, Moon-Seog
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.81-84
    • /
    • 2010
  • 테더링 서비스(Tethering Service)는 인터넷에 연결된 모바일 장비가 스스로 중계기 역할을 하여 주변의 테더링을 사용하는 장비에 인터넷 접속을 가능케 하는 서비스이다. 즉, 별도의 모무선 모뎀 없이 이동전화를 PC나 휴대기기에 연결해 언제 어디서든 무선 인터넷을 이용할 수 있도록 하는 것이다. 이러한 테더링은 방식에 따라 블루투스, USB 케이블 연결, 무선랜 등이 사용되고 있으며, 이용자들은 스마트 단말기에 노트북 PC를 연결하여 인터넷 서비스를 이용한다. 테더링은 최근 OS3.0이 탑재되어 출시된 스마트 단말기에 테더링 기능이 지원되면서 관심이 급증하고 있다. 그러나 이러한 테더링의 확산은 유저들 사이에선 스마트 단말기 해킹 사이트를 통해 무료로 테더링 서비스를 이용할 수 있는 방법들이 유포되고 있으며, 부적절한 접속 방식으로 인해 사용자가 아닌 다른 유저한테 과금이 청구되는 사례도 있다. 테더링 통신 과정 중 거치는 장비들의 정보를 조작, 변조, 삭제 등이 가능하다. 따라서 본 논문에서는 무선 테더링에서의 상호인증을 통한 안전한 테더링 기법을 제안한다.

  • PDF

Implementation of Secure Role Based Access Control System on the WWW (WWW에서 안전한 역할 기반 접근 제어 시스템 구현)

  • 이희규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.1
    • /
    • pp.65-75
    • /
    • 2000
  • 역할 기반 접근 제어(RBAC: Role Based Access Control)는 각 시스템 자원의 안전성을 보장하기 위한 접근 제어 기술이다. 거대한 네트워크에서 보안 관리의 복잡성과 비용을 줄여주는 기능 때문에, 특히 상업적인 분야에서 더욱 큰 관심을 끌고 있다. 본 논문에서는 RBAC 역할 계층 구조 개념만을 사용할 경우의 취약점을 해결하기 위해 두 가지 연산을 제시하였다. 그리고 이를 통하여 사용자와 권한(pemission)을 간접적으로 연관시킴으로써, RBAC 관리자가 사용자마다 연산을 추가하거나 삭제할 수 있도록 하였고 직관적인 관리자 인터페이스를 제공하여 관리자가 쉽게 사용자 역할, 그리고 연산 사이의 관계를 파악할 수 있도록 하였다. 그리고 이를 기반으로 RBAC 시스템을 설계하고 대학의 종합정보 시스템을 모델로 구현하였다.

A Method on Protecting User Information in Lost Mobile (모바일 단말기 분실 시 사용자 정보 보호방안)

  • Jeong, Woo-Cheol;Hwang, Jae-Yeon;Lee, Dong-Min;Lee, Kyung-Seok;Jeon, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1432-1435
    • /
    • 2009
  • 최근 모바일 단말기의 급격한 발전으로 인해 단말기에 유입되는 정보의 중요성이 더욱 부각되고 있다. 분실 혹은 도난 시 발생하는 사고는 서비스 과다 사용으로 인한 금전적인 피해뿐만 아니라 사용자 정보 유출 등으로 인한 정신적인 피해, 개인정보를 악용한 협박 등의 범죄로 점차 발전하여 그 심각성은 나날이 더해가고 있는 실정이다. 본 논문에서는 모바일 단말기와 이동통신사간의 상호인증을 통하여 원격제어 권한을 얻어 사용자 정보를 판독 불가능 상태 혹은 삭제할 수 있게 하여 외부 노출 시 안전하게 보호할 수 있게 하고, 이동통신사를 통해 사용자 정보를 안전하게 수집하여 향후 원래 상태로 완벽하게 복구할 수 있는 시스템을 제안한다.

Structure Health Monitoring System based on Wireless Sensor Network (무선 센서 네트워크 기반의 구조물 안전 감시 시스템)

  • Lim, Hwa-Jung;Lee, Joa-Hyoung;Park, Chong-Myung;Jung, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.391-400
    • /
    • 2008
  • There has been increasing interest in developing Structure Health Monitoring(SHM) system based on wireless sensor network(WSN) due to recent advancement in sensor network technologies. SHM is the continuous monitoring of the condition such a acceleration or load of a structure. The SHM system works, which measure key structure parameters systematically, provide information in evaluation of structure integrity, durability and reliability. Currently SHM system collects data via analog sensor and then sends to analysis application through the wired network. The wire system support high accuracy, but suffers the disadvantages in installation costs, complexity of connection and loss of line. It's also difficult to add new sensor nodes. We design and implement the SHM system based on WSN technology to solve those problems.

A Critical Review of the Act on Vessel Traffic Services (선박교통관제에 관한 법률에 대한 비판적 고찰)

  • Shin, Dong-Ho;Ji, Seung-Hyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.4
    • /
    • pp.336-345
    • /
    • 2020
  • Vessel Traf ic Services (VTS) is a system for ship safety and accident prevention. The International Maritime Organization (IMO), the International Association of Marine Aids to Navigation and the Lighthouse Authorities (IALA) established regulations related to VTS from an early stage. On December 3, 2019, South Korea enacted a special act called the "Act on Vessel Traffic Services (VTS Act)," which will take ef ect on June 4, 2020. In this paper, the background of this act's enactment is examined and its provisions are critically reviewed. In particular, the study intensively examines the reasons the immunity provisions for the VTS operator were removed and the current direction of improvements to the VTS Act is presented in terms of its feasibility. Most countries that do not have an Act related to VTS and its operator, refer to that of Korea. Therefore, it is necessary to reinforce the structures and definition of the VTS Act, as well as the immunity provisions for the VTS operator. The latter were removed during the National Assembly's legislation process, but were included in the initial bill, and should be reflected in subsequent revisions of the VTS Act.

A Secure Authentication and Key Agreement Scheme for Smart Grid Environments without Tamper-Resistant Devices (스마트 그리드 환경에서 변조 방지 디바이스를 사용하지 않는 안전한 사용자 인증 및 키 합의 방식)

  • Park, Ki-Sung;Yoon, Dae-Geun;Noh, SungKee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.313-323
    • /
    • 2020
  • With the development of smart grid technologies, a user can use the secure and reliable power services in smart gird environments. However, the users are not secure against various potential attacks because the smart gird services are provided through the public channel. Therefore, a secure and lightweight authentication and key agreement scheme has become a very important security issue in smart grid in order to guarantee user's privacy. In 2019, Zhang et al. proposed a lightweight authentication scheme for smart gird communications. In this paper, we demonstrate that Zhang et al.'s scheme is vulnerable to impersonation and session key disclosure attacks, and then we propose a secure authentication and key agreement scheme for smart grid environments without tamper-resistant devices. Moreover, we perform the informal security and the BAN logic analysis to prove that our scheme is secure various attacks and provides secure mutual authentication, respectively. We also perform the performance analysis compared with related schemes. Therefore, the proposed scheme is efficiently applicable to practical smart gird environments.

Design and Implementation of Efficient Dynamic Update and Zone Transfer in the Secure DNS (안전한 DNS에서의 효율적인 동적 갱신과 존 전송 기능의 설계와 구현)

  • Shim, Hee-Won;Shim, Young-Chul;Im, Chan-Soon;Lee, Man-Hee;Byeon, Ok-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.99-114
    • /
    • 2000
  • In the secure DNS the amount of information that should be managed greatly increased and the interdependency in the information became very complex. Therefore, it became necessary to develop a mechanism which can manage zone information efficiently. Moreover, a consistent interface became also necessary so that a secure DNS may be efficiently interconnected with other Internet application services. In this paper we explain the design and implementation of a secure DNS extended with two functions : (1) a dynamic update function which enables to add and remove zone information dynamically and (2) a zone transfer function that efficiently transfers update zone information among DNS servers. We developed a method which integrates two zone transfer mechanisms, full zone transfer and incremental zone transfer, and also proposed a method to compress data in the zone transfer message. We also introduced a data structure called a delta file to integrate the zone transfer function and the dynamic update function.

  • PDF

The basic study on extracting experiential type safety education programs for establishing safety-experience-education-facilities - focused on 「school safety education 7 standards」 - (학생 안전체험교육시설 구축을 위한 체험형 안전교육프로그램 도출 기초연구 - 「학교 안전교육 7대 표준안」을 중심으로 -)

  • Cho, Jin Il;Song, Byung Joon;Park, Sung Chul;Jang, Jea won;Bang, Young Hyun;Yoon, Hyoung Uk
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.15 no.2
    • /
    • pp.1-12
    • /
    • 2016
  • This study was conducted to extract the student-centered experiential safety education activities in order to establish safety-experience-education-facilities based on "School safety education 7 standards" announced by the Ministry of Education in 2015. For this purpose, we established the concept of safety-experience-education-facilities, and conducted surveys twice targeting experts of each 7 fields based on the learned results of 758 sessions through "School safety education 7 standards". First, through the surveys, it was organized by 150 sessions out of 758 education class that extracted from safety-education-program sessions on experts, conducted a second expert survey for the validation of selected educational programs in Delphi format, the result of 5 sessions of the program is deleted, and 145 sessions was surveyed to be maintained. It was ascertained that 145 sessions of education program, 21 sessions of life safety area, 22 sessions of traffic safety area, 18 sessions of violence and personal safety area, 5 sessions of drugs and cyber addiction area, 36 sessions of disaster safety area, 10 sessions of occupation safety area, 33 sessions of first-aid area, is the experiential safety education activities that have to be applied to the safety-experience-education-facilities.

Smartphone Content Security Scheme for Protect Malware Attacks (멀웨이 공격을 예방하기 위한 스마트폰 콘텐츠 보호 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.327-333
    • /
    • 2014
  • Recently, smartphone are increasing in Internet-enabled applications to install and delete benefits as well as internet through various interfaces such as 3G network, Wi-Fi, Wibro without the constraints of time and place. However, the prevalence of smartphones and the activity was generated from an existing PC smartphone security threats are causing a ripple in a society. In this paper, we serve live content services on the first and last content by creating an electronic signature is the signature of either the loss of any Content provided by both authentication and non-repudiation content protection scheme is proposed. The proposed method of secure smartphone users to download and install the content or an application for downloading content over the content for secure authentication.

A Study on the Self-destructing Data for Information Privacy (개인정보 보호를 위한 데이터의 자가 초기화에 대한 고찰)

  • Kim, Jonguk;Kang, Sukin;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.629-638
    • /
    • 2013
  • Recently the interest in the information privacy has been growing. Digital data can be easily transferred via Internet. Service providers ask users for private data to give customized services. Users believe that their shared data are protected as they deliver their private data securely. However, their private data may be leaked if service providers do not delete or initialize them when they expire. The possibility of information leak may lower if the service providers deal with users' private data properly. In this paper, we study the self-destruction of private data for information privacy and propose the glass-box model.