• Title/Summary/Keyword: 정보보안 3요소

Search Result 220, Processing Time 0.031 seconds

Information Security Model in the Smart Military Environment (스마트 밀리터리 환경의 정보보안 모델에 관한 연구)

  • Jung, Seunghoon;An, Jae-Choon;Kim, Jae-Hong;Hwang, Seong-Weon;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.199-208
    • /
    • 2017
  • IoT, Cloud, Bigdata, Mobile, AI, and 3D print, which are called as the main axis of the 4th Industrial Revolution, can be predicted to be changed when the technology is applied to the military. Especially, when I think about the purpose of battle, I think that IoT, Cloud, Bigdata, Mobile, and AI will play many role. Therefore, in this paper, Smart Military is defined as the future military that incorporates these five technologies, and the architecture is established and the appropriate information security model is studied. For this purpose, we studied the existing literature related to IoT, Cloud, Bigdata, Mobile, and AI and found common elements and presented the architecture accordingly. The proposed architecture is divided into strategic information security and tactical information security in the Smart Military environment. In the case of vulnerability, the information security is divided into strategic information security and tactical information security. If a protection system is established, it is expected that the optimum information protection can be constructed within an effective budget range.

Vulnerability Evaluation Methodology for firewall Certification (침입차단시스템 제품 인증을 위한 취약성 평가 방법)

  • 김점구
    • The Journal of Information Technology
    • /
    • v.3 no.3
    • /
    • pp.27-37
    • /
    • 2000
  • Although an insurance criterion for reliance is unified, the difference in evaluation mechanism in every country is already ambiguity. In other words, the aspect of objectivity would be a little because it is true that the vulnerability evaluation include evaluator, scenario and tools (TSVES) applying in test, depth and scope of evaluation. But evaluation results can be difference in accordance with each evaluation elements. By using TSVES to evaluating network security vulnerability, first, we expected the evaluation results is impartiality, objectivity, repeatability, reproducibility, appropriateness and soundness of results. Second, it could be transferred manual ways into automation ways, and then expected easiness and safety of extension and modification in a quality of products as well as a dramatical reduction of waste of time and energy.

  • PDF

A Study on the Development Site Security for Embedded Software (임베디드 소프트웨어 개발현장보안에 관한 연구)

  • Yeo, Sang-Soo;Kim, Tai-Hoon;Cho, Sung-Eon;Kouich, Sakurai
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.259-265
    • /
    • 2007
  • Systematic components for implementing ubiquitous computing, for example, electronic devices, electric home appliances, and controllers, etc, are consist of not only circuits but also softwares expected to do some special system-controlling functions, and these softwares used to be called like as embedded software. Because embedded software is a core component controlling systems, the codes or control flows should be protected from being opened to the public or modified. Embedded software security can be divided into 2 parts: first is the unauthorized access to development site and embedded software, second is the unauthorized disclosure or modification. And this research is related to the first aspect of them.This paper proposes some security check requirements related to embedded software development site by analyzing the ALC_DVS.1 of the ISO/IEC 15408 and Base Practices (BPs) of the ISO/IEC 21827. By applying this research, we expect to protect unauthorized modification of embedded software indirectly.

  • PDF

A Guidelines for Establishing Mobile App Management System in Military Environment - focus on military App store and verification system - (국방환경에서 모바일 앱 관리체계 구축방안 제시 - 국방 앱스토어 및 검증시스템 중심으로 -)

  • Lee, Gab-Jin;Goh, Sung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.525-532
    • /
    • 2013
  • Recently. smartphones have been popularized rapidly and now located deep in our daily life, providing a variety of services from banking, SNS (Social Network Service), and entertainment to smart-work mobile office through apps. Such smartphone apps can be easily downloaded from what is known as app store which, however, bears many security issues as software developers can just as easily upload to it. Military apps will be exposed to a myriad of security threats if distributed through internet-basis commercial app store. In order to mitigate such security concerns, this paper suggests a security guidelines for establishing a military-excusive app store and security verification system which prevent the security hazards that can occur during the process of development and distribution of military-use mobile apps.

A Study on security characteristics and vulnerabilities of BAS(Building Automation System) (BAS의 보안 특성 및 취약점에 관한 연구)

  • Choi, Yeon-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.669-676
    • /
    • 2017
  • Recently, due to the importance of information security, security vulnerability analysis and various information protection technologies and security systems are being introduced as a countermeasure against cyber-attacks in new as well as existing buildings, and information security studies on high-rise buildings are also being conducted. However, security system introduction and research are generally performed from the viewpoint of general IT systems and security policies, so there is little consideration of the infrastructure of the building. In particular, the BAS or building infrastructure, is a closed system, unlike typical IT systems, but has unique structural features that accommodate open functions. Insufficient understanding of these system structures and functions when establishing a building security policy makes the information security policies for the BAS vulnerable and increases the likelihood that all of the components of the building will be exposed to malicious cyber-attacks via the BAS. In this paper, we propose an architecture reference model that integrates three different levels of BAS structure (from?) different vendors. The architectures derived from this study and the security characteristics and vulnerabilities at each level will contribute to the establishment of security policies that reflect the characteristics of the BAS and the improvement of the safety management of buildings.

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

Implementation of user authentication and access control system using x.509 v3 certificate in Home network system (홈 네트워크 시스템에서 x.509 v3 인증서를 이용한 사용자 인증 및 접근제어 시스템의 구현)

  • Lee, Kwang-Hyoung;Lee, Young-Gu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.920-925
    • /
    • 2010
  • A home network system is made up of home devices and wire and wireless network can not only be the subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. As a result, a variety of problems such as abuse of private life, and exposure and stealing of personal information arose. Therefore, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this dissertation designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

A Study on New Secure Routing and Authentication Strategy for 2-tier Ad Hoc Networks (2-Tier Ad Hoc 망에서 신뢰할 수 있는 Routing과 인증 메커니즘 연구)

  • 최문석;이현주;이충세;신병철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.919-921
    • /
    • 2002
  • 본 논문에서는 기존의 Table-driven 방식과 On-demand 라우팅 의 장점을 접목시킨 2-tier 계층구조를 사용한 dynamic한 routing기법을 제안하며 , 구조적으로 취약한 보안 위협 요소들에 대한 안정성을 제공하는 인증 알고리즘을 제안하고 네트워크와 클러스터 헤드의 관리를 위한 신뢰할 수 있는 키 분배 메커니즘을 고찰한다. 또한 기존의 3GPP서비스와의 상호 연동 가능성을 고려하여 클러스터 헤더의 재생성과 강력한 신뢰성을 제공할 수 있는 알고리즘을 제안한다.

  • PDF

Impact of Cryptographic operations on the QoS of VoIP system (암호화 연산에 따른 VoIP QoS 측정 및 분석)

  • 홍기훈;임범진;정수환
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.223-227
    • /
    • 2001
  • 보안을 위한 암호화는 실시간 통신인 VoIP에 패킷의 추가적인 작업이 요구되므로 음질에 악영향을 미치게 된다. 이러한 영향을 파악하고 분석하기 위해 DES, 3DES, SEED 그리고 AES 등의 암호 알고리즘을 VoIP 시스템에 적용하여 지터나 RTT 혹은 패킷 손실율과 같은 QoS 요소를 측정함으로써 각 암호 알고리즘의 연산이 실시간 통신에 미치는 영향을 알아보았다.

  • PDF

Rights to Control Information and Related Security Technologies on the CyberSpace (사이버공간에서 자기 결정권과 보안 기술)

  • Min, Kyung-Bae;Kang, Jang-Mook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.135-141
    • /
    • 2010
  • This research examines technologies and systems regarding right to control information in the network era. For this purpose, It attempts an integrated analysis of technologies and systems on the basis of the tree components of cyberspace. And it examines the prior researches and cases on privacy, personal information, and right to control information with emphasis on technologies and systems of the cyberspace. To protect privacy information, it analyses vulnerability of element technology, platform service technology, and individual technology. In particular, it describes, from the perspective of right to control information, the risk and security measures for personal information to be used as relation-context in the Web 2.0 environment. The research result will assist the methodology of future researches for grand theory on privacy information and help understanding the interaction between technology and society.