• Title/Summary/Keyword: 정보보안 3요소

Search Result 220, Processing Time 0.022 seconds

Study on Security Threat and Requirement for Personal Health Management in u-Health Environment (u-헬스 환경에서 개인건강관리를 위한 보안 위협 및 요구사항에 관한 연구)

  • Kim, Soon-Seok;Park, Hong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.504-511
    • /
    • 2010
  • The personal bio-information supplied from the PHD(Personal Health Device) for personal health management is very sensitive in relation to a personal living body in an aspect of privacy protection. On the assumption thai the information is about a patient, it is more serious problem if it is revealed to a third party. However. the established ISO (International Organizations for Standardization) standard protocol[1] in October 2009 has just considered a transmission part for mutual exchange of bio-information between individuals, but has never actually considered security elements. Accordingly, this paper is to show all sorts of security threats according to personal health management in the u-health environment and security requirements newly.

Authentication Scheme using Biometrics in Intelligent Vehicle Network (지능형 자동차 내부 네트워크에서 생체인증을 이용한 인증기법)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.4 no.3
    • /
    • pp.15-20
    • /
    • 2013
  • Studies on the intelligent vehicles that are fused with IT and intelligent vehicle technologies are currently under active discussion. And many new service models for them are being developed. As intelligent vehicles are being actively developed, a variety of wireless services are support. As such intelligent vehicles use wireless network, they are exposed to the diverse sources of security risk. This paper aims to examine the factors to threaten intelligent vehicle, which are usually intruded through network system and propose the security solution using biometric authentication technique. The proposed security system employs biometric authentication technique model that can distinguish the physical characteristics of user.

Study on the scheme to reinforce military security system based on location information (위치정보를 이용한 군 보안체계 강화 방안)

  • Kim, Yun Young;Namkung, Seung Pil
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.83-90
    • /
    • 2015
  • Current PKI system will confront more dangerous elements in the wireless network. Accordingly, this study suggests a plan to strengthen authentication system plan with using access control and encryption to the location. Locational information collecting devices such as GPS and sensor are utilized to create a new key for authentication and collect locational information. Such a key encodes data and creates an authentication code for are access control. By using the method suggested by this study, it is possible to control access of a military secret from unauthorized place and to protect unauthorized user with unproposed technique. In addition, this technique enables access control by stage with utilizing the existing PKI system more wisely.

Development of a Formal Access Control Model in CORBA Security using the Z Language (Z 언어를 기반으로 CORBA 보안의 정형화된 접근 제어 모델 개발)

  • 김영균;김경범;인소란
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.79-94
    • /
    • 1997
  • OMG (Object Management Group) published a security service specification, called CORBA (Common Object Request Broker Architecture) security reference model because the integration of security and object-oriented techniques was critical for successful deployment of distributed object systems. The CORBA security reference model treats access control as an implementation independent semantic concept but has incomplete semantics of the access control function. Because of such imcompleteness it is difficult for the system administrator and the CORBA security implementor to have the same understanding for the meaning of access control in the CORBA security. We propose a formal model for access control the CORBA security using the formal description language, which is called Z language based on typed set theory. The proposed model provides concrete semantics of the access control function to both the system administrator and the implementor.

Corresponds problems to Business scam and measures in the trade industry (무역 산업에서의 비즈니스 스캠(Business Scam) 대응 문제점과 대책 방안)

  • Lee, Eun-Kyoung;Jo, Young-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.307-310
    • /
    • 2016
  • 우리나라의 무역 교역량이 '11년부터 3년 연속 1조 달러를 돌파하면서 인터넷 무역도 활성화 되고 있으나 인터넷 무역의 특징인 비대면 거래과정을 악용한 사기 행위가 급증하여 기업의 피해가 증가하고 있는 실정이다. 이메일을 해킹하여 거래처로 위장해 무역 거래대금을 가로채는 사이버범죄 수법인 비즈니즈 스캠(Business Scam)은 건전한 무역 활동에 위협적인 요소로 작용하고 있다. 이와 같이 무역 산업의 위협이 증가하고 있는 현재 상황에서 본 연구는 정보보호 관점에서 기술, 정책, 제도, 법률, 관련 사례를 조사 분석하여 비즈니스 스캠의 효율적인 피해방지 방안을 제시하고자 한다.

  • PDF

A Study on the Efficient Countermeasures of Military in Accordance with Changing Security Environments (4차 산업혁명에 따른 군사보안 발전방안 연구)

  • Kim, Doo Hwan;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.47-59
    • /
    • 2020
  • The Army, which is dreaming of a military leap forward through the fourth industrial revolution, needs to also consider the side effects and adverse functions of the fourth industrial revolution. In particular, this study conducted an analysis of whether it was consistent with the global technological trend of normal 'military security'. This paper focuses on the countermeasures that could result from 4th industrial revolution by utilizing the text-mining technique and social network technique of big data. 1. Active promotion of a convergence program with private, public, militaryand industrial, academic, and solidarity, 2. Information Sharing for International Cooperation and Cooperation in Cyber security, 3. Military Innovation and Military Unsymmetric Cyber security innovation, 4.The Establishment of Military Security Convergence Interface Management System in accordance with the Fourth Industrial Revolution, 5. Cooperation in the transition from technology engineering to social technology, 6. Establishing a military security governance system in the military, 7. Specifying confidential military digital data We look forward to providing useful information so that the results of this study can help develop the military and enhance military confidentiality.

Dynamic Simulation on a Network Security Simulator using SSFNet (SSFNet을 이용한 네트워크 보안 시뮬레이터에서 동적 시뮬레이션 방법)

  • 박응기;윤주범;임을규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.101-106
    • /
    • 2004
  • Recently, a network defense simulator becomes essential in studying cyber incidents because the cyber terror become more and more interesting. The network defense simulator is a tool to estimate damages and an effectiveness of a defense mechanism by modeling network intrusions and defense mechanisms. Using this tool, users can find efficient ways of preventing a cyber terror and recovering from the damage. Previous simulators start the simulation after entire scenario has made and been loaded to simulation engine. However, in this way it can't model human judgement and behavior, and it can't simulate the real cyber terror very well. In this paper, we have added a dynamic simulation component to our previous network security simulator. This component improved accurate modeling of network intrusions and defense behaviors. We have also proposed new modified architecture of the simulation system. Finally we have verified correct simulation results from stammer worn simulation.

A Study of a Secure Smart Car System using Attribute-based Delegation Method (속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.71-79
    • /
    • 2019
  • The demand of smart cars is increasing rapidly. International stand organize such as 3GPP and 5GAA are proposing standard communication protocvols for connected-car, and automotive network infrastructure. But Smart car network have many security threats and more dangerous against the existed wire communication network. Typically, peripheral devices of a smart car may disguise their identity and steal location information and personal information about the vehicle. In addition, the infrastructure elements around smart cars can conspire and put driving cars in danger, threatening lives. This is a very serious security threat. Therefore, in order to solve these problems, we proposed a system that is secure from collusion and tampering attacks using attribute-based authorize delegation method and threshold encryption algorithms. We have demonstrated using a semantic safety model that the proposed system can be safe from collusion attack.

The Specification and Verification of EAP-AKA Protocols on 3GPP Network Using AVISPA (AVISPA를 이용한 3GPP 네트워크의 EAP-AKA 프로토콜 명세 및 검증)

  • Kim, Hyun-Su;Choi, Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.47-51
    • /
    • 2010
  • 휴대인터넷(WiBro: Wireless Broadband)은 언제 어디서나 고속으로 무선 인터넷 접속이 가능한 서비스를 위한 기술이다. 노트북을 비롯한 휴대가 간편한 PDA, 스마트폰으로 사람이 보행 또는 차량 주행 중에서도 끊김 없이(seamless) 무선 인터넷 서비스가 가능하다. 이동성과 고속 무선 통신이 가능한 서비스에서 중요한 기술 요소 중 하나가 보안이다. 본 논문은 안전한 서비스를 제공하기 위하여 WiBro 무선 네트워크에서의 USIM 기반 EAP-AKA 인증 프로토콜 보안 요구사항 안전성을 정형기법 툴인 AVISPA를 이용하여 명세 및 검증해 본다.

  • PDF

공개키 기반구조에서 상호인증 구현을 위한 요구사항 분석

  • 홍기융;권현조
    • Review of KIISC
    • /
    • v.8 no.3
    • /
    • pp.19-31
    • /
    • 1998
  • 인터넷 사용자의 증가와 더불어 보안의 중요성이 확산됨에 따라 공개키 기반구조(PKI: Public Key Infrassstrunture)하에서의 상호인증( Cross Certirication)기술이 요즘들어 정보보호 기반기술의 중요요소로 논의되고 있다. 이러한 상호인증과 관련한 문제는 현재 국내외적으로 활발히 연구중에 있으며 몇몇 회사에서는 이를 상용화 추진하고 있다. 하지만 상호인증을 실현하는데 있어, 인증기관들간에 호환성이라든가 정책 확장등의 문제를 감안할 때 실질적인 서비스의 완전한 구현은 당장은 어려울 것으로 생각된다. 만일 이러한 상호인증이 완벽한 호환성을 가지고 사용자들간에 상호연동될 수 있다면 늘어나는 인터넷 사용자들의 요구를 한층 더 충족시켜 줄 수 있게 될 것이다. 따라서 본 논문에서는 이와 관련된 요구사항이 무엇인지를 현재 개발되고 있는 기술동향을 서술한다.

  • PDF