• Title/Summary/Keyword: 정보보안 3요소

Search Result 220, Processing Time 0.028 seconds

A Study on the Advancement Structure Model of Maritime Safety Information System(GICOMS) using FSM (FSM을 이용한 해양안전정보시스템의 고도화 구조모델 연구)

  • Ryu, Young-Ha;Park, Kark-Gyei;Kim, Hwa-Young
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.3
    • /
    • pp.337-342
    • /
    • 2014
  • This paper is aims to build the advancement structural model of GICOMS through identification of required system and improvement for implementation of e-Navigation. We derived nine improvement subject for model of advanced GICOMS through the analysis of problems for GICOMS and brainstorming with expert in the maritime safety. And we analyzed the structure of nine improvement subject using by FSM(Fuzzy Structural Modeling) method, and proposed a structural model that to grasp the correlation between elements. As a result, we found out that "advancement of GICOMS" is the final goal, and "improvement a system of information production", "improvement a scheme of information providing", "linkage between GICOMS and VTS" and "building global networks for safety cooperation" are located lowest level. Especially, "advancement of GICOMS" is influenced by "advancement function of VMS" and "Activation of usage" on middle level. We suggested that utilizing state-of-the-art IT facilities, equipment and expertise to improve and enhance the user-centered transition such as maritime workers for advancement of GICOMS based on proposed structure model.

The Study on well-aging using digital fitness technology (디지털피트니스 기술을 활용한 웰에이징에 관한 연구)

  • Seungae Kang
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.231-237
    • /
    • 2024
  • The rapid aging of the global population poses significant challenges to public health systems, as it often correlates with various physical, cognitive, and social declines among the elderly. Traditional approaches to promoting healthy aging emphasize the importance of physical activity, mental engagement, and social connectivity. However, factors such as mobility issues and resource constraints can limit the accessibility and effectiveness of these approaches. Digital fitness technologies, including wearable devices, mobile applications, virtual reality platforms, and AI-based feedback systems, present innovative solutions with the potential to enhance the physical, cognitive, and social well-being of older adults. This study analyzes the latest trends in digital fitness technologies and proposes strategies for effective utilization in promoting well-aging. Specifically, it addresses the need for improved technology accessibility through affordable devices and user-friendly interfaces, the development of personalized fitness programs, strategies to enhance ongoing participation such as social interaction and gamification, and solutions for data protection and ethical issues. Effective implementation of these strategies is expected to significantly improve the health and well-being of older adults. Future research and policy development should incorporate these elements to maximize the impact of digital fitness technologies and enhance the overall quality of life for the elderly.

A Study of Prevention Model the Spread of Phishing Attack for Protection the Medical Information (의료정보 보호를 위한 피싱공격 확산방지모델 연구)

  • Choi, Kyong-Ho;Chung, Kyung-Yong;Shin, Dong-Kun
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.273-277
    • /
    • 2013
  • Phishing attacks have been implemented in smarter, more advanced ways with the passage of time. Hackers use intelligent phishing attacks to take over computers and to penetrate internal networks in major organizations. So, in this paper, a model for a prevention of phishing attack spread is conceptual designed in order to protect internal users and sensitive or important information from sophisticated phishing attacks. Internal users simultaneously utilize both external web and organizational mail services. And hackers can take the both side equally as a vector. Thus, packets in each service must be monitored and stored to recognize threatening elements from both sides. The model designed in this paper extends the mail server based security structure used in conventional studies for the protection of Internet mail services accessed by intranet users. This model can build a list of phishing sites as the system checks e-mails compared to that of the method that directly intercepts accesses to phishing sites using a proxy server, so it represents no standby time for request and response processes.

Study on the Improvement about User Authentication of Android Third Party Application Through the Vulnerability in Google Voice (구글 보이스 취약점을 통한 안드로이드 서드 파티 어플리케이션의 사용자 인증 개선방안 연구)

  • Lee, Seyeong;Park, Jaekyun;Hong, Sungdae;Choi, Hyoungki
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.23-32
    • /
    • 2015
  • In the Android market, a large portion of the market share consists of third party applications, but not much research has been performed in this respect. Of these applications, mobile Voice Over IP (VoIP) applications are one of the types of applications that are used the most. In this paper, we focus on user authentication methods for three representative applications of the Google Voice service, which is a famous mobile VoIP application. Then, with respect to the Android file system, we developed a method to store and to send user information for authentication. Finally, we demonstrate a vulnerability in the mechanism and propose an improved mechanism for user authentication by using hash chaining and an elliptic curve Diffie-Hellman key exchange.

Error Recovery Schemes with IPv6 Header Compression (IPv6 헤더 압축에서의 에러 복구방안)

  • Ha Joon-Soo;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1237-1245
    • /
    • 2006
  • This paper presented a hardware implementation of ARIA, which is a Korean standard l28-bit block cryptography algorithm. In this work, ARIA was designed technology-independently for application such as ASIC or core-based designs. ARIA algorithm was fitted in FPGA without additional components of hardware or software. It was confirmed that the rate of resource usage is about 19% in Altera EPXAl0F1020CI and the resulting design operates stably in a clock frequency of 36.35MHz, whose encryption/decryption rate was 310.3Mbps. Consequently, the proposed hardware implementation of ARIA is expected to have a lot of application fields which need high speed process such as electronic commerce, mobile communication, network security and the fields requiring lots of data storing where many users need processing large amount of data simultaneously.

Detection of Forgery of Mobile App and Study on Countermeasure (모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구)

  • Jung, Hyun Soo;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2015
  • As the number of smartphone users is increasing with the development of mobile devices, the range of monetary transaction from the individual use is increasing. Therefore, hacking methods are diversified and the information forgery of mobile devices has been a current issue. The forgery via apps in mobile devices is a hacking method that creates an app similar to well-known apps to deceive the users. The forgery attack corresponds to the violation of integrity, one of three elements of security. Due to the forgery, the value and credibility of an app decreases with the risk increased. With the forgery in app, private information and data can be stolen and the financial losses can occur. This paper examined the forgery, and suggested a way to detect it, and sought the countermeasure to the forgery.

  • PDF

A Secure Authentication and Key Agreement Scheme for Smart Grid Environments without Tamper-Resistant Devices (스마트 그리드 환경에서 변조 방지 디바이스를 사용하지 않는 안전한 사용자 인증 및 키 합의 방식)

  • Park, Ki-Sung;Yoon, Dae-Geun;Noh, SungKee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.313-323
    • /
    • 2020
  • With the development of smart grid technologies, a user can use the secure and reliable power services in smart gird environments. However, the users are not secure against various potential attacks because the smart gird services are provided through the public channel. Therefore, a secure and lightweight authentication and key agreement scheme has become a very important security issue in smart grid in order to guarantee user's privacy. In 2019, Zhang et al. proposed a lightweight authentication scheme for smart gird communications. In this paper, we demonstrate that Zhang et al.'s scheme is vulnerable to impersonation and session key disclosure attacks, and then we propose a secure authentication and key agreement scheme for smart grid environments without tamper-resistant devices. Moreover, we perform the informal security and the BAN logic analysis to prove that our scheme is secure various attacks and provides secure mutual authentication, respectively. We also perform the performance analysis compared with related schemes. Therefore, the proposed scheme is efficiently applicable to practical smart gird environments.

Architecture Evaluation Utilizing CBAM and AHP (생체인식 소프트웨어의 품질 평가모듈에 관한 연구)

  • Yang, Hae-Sool;Lee, Man-Ho;Yoon, Young-Mi
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.699-708
    • /
    • 2006
  • The latest biometric field have marched fast with security technology of IT. As importance of present biometrics is realized, internal and external biometrics software market is trend that is soaring. Accordingly, high reliability of biometric software and request of high quality software are enlarged. Evaluation items and criteria must be established for biometric software quality assurance. In this paper, we development the evaluation module for biometric software test based on ISO/IEC 12119 that is the standard about software quality requirement and test, and ISO/IEC 9126 that is standard about evaluation of software product, and ISO/IEC 14598-6 that is the standard about construction of the evaluation module. Constituents of biometric software products(product descriptor, user document program and data) is subject to the quality evaluation module that we developed in this paper, we can expect improvement in the quality of software by using with a standard such as ISO/IEC 9126-3 that can be used in software development process.

An Analysis of Structural Changes on the Linux Pseudo Random Number Generator (리눅스 의사난수발생기의 구조 변화 분석)

  • Taeill Yoo;Dongyoung Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.365-378
    • /
    • 2024
  • The operating system (OS) of mobiles or embedded devices is based on the Linux kernel. These OSs request random numbers from the Linux kernel for system operation, such as encryption keys and security features. To provide random numbers reliably, the Linux kernel has a dedicated random number generator (Linux Pseudo Random Number Generator, LPRNG). Recently, LPRNG has undergone a major structural changes. However, despite the major changes, no security analysis has been published on the structure of the new LPRNG. Therefore, we analyze these structural changes as a preliminary study to utilize the security analysis of the new LPRNG. Furthermore, the differences between before and after the changes are divided into cryptographic and performance perspectives to identify elements that require security analysis. This result will help us understand the new LPRNG and serve as a base for security analysis.

A Study on the Priorities of Enabling Digital Healthcare Platform for Small and Medium Enterprises : A Comparative Analysis of Consumers and Suppliers

  • Yeon-Kyeong Lee;Min-Jung Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.131-141
    • /
    • 2024
  • The aging population and worsening lifestyle habits have increased the risk of chronic diseases. This has heightened the importance of preventive healthcare, particularly through personalized health management services based on individual health data. Despite this, the domestic digital healthcare industry remains underdeveloped. Given the need for acceptance from both consumers and providers, this study uses the Analytic Hierarchy Process (AHP) to identify success factors for health management service platforms. AHP evaluates the relative importance of various factors to aid decision-making. Results show that providers prioritize data analysis and platform design, laws and regulations, and data standardization, while consumers prioritize system stability, laws and regulations, and system security. These findings highlight the need for strategies to bridge the expectation gap to effectively promote health management service platforms.