• 제목/요약/키워드: 정보취약

Search Result 4,367, Processing Time 0.028 seconds

A Study on the Implementation of User Medical Information Sharing System in u-Healthcare Enviornment (u-Healthcare 환경에서 안전한 의료정보공유에 대한 연구)

  • Jang, Seon-Ju;Kim, Kyu-Seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.395-396
    • /
    • 2012
  • 본 연구에서는 의료정보공유가 활발하게 이루어지게 될 u-Healthcare환경에서 발생할 수 있는 보안 취약점에 대하여 알아보고 안전하게 의료정보를 공유하기 위한 보안요구사항을 제안한다.

  • PDF

정보보호시스템의 보안기능 통합평가 도구

  • 이경현;박영호;조현호;김창수;노병규
    • Review of KIISC
    • /
    • v.11 no.2
    • /
    • pp.60-67
    • /
    • 2001
  • 본 연구에서는 정보보호시스템의 신분확인 기능과 데이터 무결성 기능 그리고 네트워크 취약성 평가를 수행할 수 있는 정보보호시스템의 보안기능 통합 평가 도구를 개발하였다. 개발된 도구는 독립적으로 수행되어온 평가기능들을 통합, 개선함으로써 네트워크를 통해 연결되어 있는 시스템의 안전성을 총체적으로 평가할 수 있으며, 또한 네트워크 의 보호를 목표로 개발된 침입차단시스템의 구성상의 취약성이나 IPSec이나 SSL을 적용하여 가상사설망(VPN)을 구현 한 제품들에서 제공하는 무결성을 검증하기 위한 자동화된 도구로서 활용될 수 있다.

  • PDF

Analysis of Disaster Vulnerable Districts using Heavy Rainfall Vulnerability Index (폭우 취약성 지표를 활용한 재해취약지구 분석)

  • PARK, Jong-Young;LEE, Jung-Sik;LEE, Jin-Deok;LEE, Won-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.1
    • /
    • pp.12-22
    • /
    • 2018
  • In order to improve the vulnerability of current cities due to climate change, the disaster vulnerability analysis manual for various disasters is provided. Depending on the spatial units, the disaster vulnerability levels, and the conditions of the climatic factors, the results of the disaster vulnerability analysis will have a significant impact. In this study, relative assessments are conducted by adding the eup, myeon and dong unit in addition to census output area unit to analyze the impact on the spatial unit, and relative changes are analyzed according to the classification stages by expanding the natural classification, which is standardized at level four stage, to level two, four and six stage. The maximum rainfalls(10min, 60min, 24hr) are added for the two limited rainfall characteristics to determine the relativity of disaster vulnerable districts by index. The relative assessment results of heavy rainfall vulnerability index showed that the area ratio of disaster areas by spatial unit was different and the correlation analysis showed that the space analysis between the eup, myeon and dong unit in addition to census output area unit was not consistent. And it can be seen that the proportion of disaster vulnerable districts is relatively different a lot due to indexes of rainfall characteristics, spatial unit analysis and disaster vulnerability level stage. Based on the above results, it can be seen that the ratios of disaster vulnerable districts differ relatively significantly due to the level of the disaster vulnerability class, and the indexes of rainfall characteristics. This suggests that the impact of the disaster vulnerable districts depending on indexes is relatively large, and more detailed indexes should be selected when setting up the disaster vulnerabilities analysis index.

Vulnerability Assessment for Public Health to Climate change Using Spatio-temporal Information Based on GIS (GIS기반 시공간정보를 이용한 건강부문의 기후변화 취약성 평가)

  • Yoo, Seong-Jin;Lee, Woo-Kyun;Oh, Su-Hyun;Byun, Jung-Yeon
    • Spatial Information Research
    • /
    • v.20 no.2
    • /
    • pp.13-24
    • /
    • 2012
  • To prevent the damage to human health by climate change, vulnerability assessment should be conducted for establishment of adaptation strategies. In this study, vulnerability assessment was conducted to provide information about vulnerable area for making adaptation policy. vulnerability assessment for human health was divided into three categories; extreme heat, ozone, and epidemic disease. To assess vulnerability, suitable indicators were selected by three criteria; sensitivity, adaptive capacity, and exposure, spatial data of indicators were prepared and processed using GIS technique. As a result, high vulnerability to extreme heat was shown in the low land regions of southern part. And vulnerability to harmful ozone was high in the surrounding area of Dae-gu basin and metropolitan area with a number of automobiles. Vulnerability of malaria and tsutsugamushi disease have a region-specific property. They were high in the vicinity of the Dimilitarized zone and south-western plain, respectively. In general, vulnerability of human health was increased in the future time. Vulnerable area was extended from south to central regions and from plain to low mountainous regions. For assessing vulnerability with high accuracy, it is necessary to prepare more related indicators and consider weight of indicators and use climate prediction data based on the newly released scenario when assessing vulnerability.

Assessment of Flood Vulnerability to Climate Change Using Fuzzy Model and GIS in Seoul (퍼지모형과 GIS를 활용한 기후변화 홍수취약성 평가 - 서울시 사례를 중심으로 -)

  • Kang, Jung-Eun;Lee, Moung-Jin
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.3
    • /
    • pp.119-136
    • /
    • 2012
  • The goal of this study is to apply the IPCC(Intergovernmental Panel on Climate Change) concept of vulnerability to climate change and verify the use of a combination of vulnerability index and fuzzy logic to flood vulnerability analysis and mapping in Seoul using GIS. In order to achieve this goal, this study identified indicators influencing floods based on literature review. We include indicators of exposure to climate(daily max rainfall, days of 80mm over), sensitivity(slope, geological, average DEM, impermeability layer, topography and drainage), and adaptive capacity(retarding basin and green-infra). Also, this research used fuzzy model for aggregating indicators, and utilized frequency ratio to decide fuzzy membership values. Results show that the number of days of precipitation above 80mm, the distance from river and impervious surface have comparatively strong influence on flood damage. Furthermore, when precipitation is over 269mm, areas with scare flood mitigation capacities, industrial land use, elevation of 16~20m, within 50m distance from rivers are quite vulnerable to floods. Yeongdeungpo-gu, Yongsan-gu, Mapo-gu include comparatively large vulnerable areas. This study improved previous flood vulnerability assessment methodology by adopting fuzzy model. Also, vulnerability map provides meaningful information for decision makers regarding priority areas for implementing flood mitigation policies.

Vulnerability Analysis of Secure USB: Based on the Password Authentication of Product B (보안 USB 취약점 분석: B 제품 비밀번호 인증을 기반으로)

  • Lee, Kyungroul;Jang, Wonyoung;Lee, Sun-Young;Yim, Kangbin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.155-157
    • /
    • 2018
  • 사용자의 개인정보 및 기업의 기밀정보와 같인 데이터의 안전한 이동 및 저장을 위하여 저장장치 보안 기술이 등장하였으며, 보안 USB와 보안 디스크 제품이 대표적으로 등장하였다. 이러한 제품은 저장되는 데이터를 안전하게 보호하기 위하여 사용자 인증 기술 및 데이터 암호 기술, 접근 제어 기술 등의 보안 기술을 적용한다. 특히, 사용자 인증 기술은 비밀번호 인증 기술이 대표적으로 활용되며, 인증을 강화하기 위하여 지문 인증 및 홍체 인증이 활용되고 있다. 따라서 본 논문에서는 보안 USB 제품, 특히 B 제품을 기반으로 적용된 사용자 인증 기술을 분석하고 이를 통하여 발생 가능한 보안 취약점을 분석한다. 분석 결과, 제품 B에 적용된 비밀번호 인증에서 발생 가능한 취약점을 도출하였으며, 이를 통하여 사용자 인증을 우회하여 저장장치 내부에 저장된 데이터의 탈취 가능함을 검증하였다.

Analysis on a New Intrinsic Vulnerability to Keyboard Security (PS/2 키보드에서의 RESEND 명령을 이용한 패스워드 유출 취약점 분석)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.177-182
    • /
    • 2011
  • This paper introduces a possibility for attackers to acquire the keyboard scan codes through using the RESEND command provided by the keyboard hardware itself, based on the PS/2 interface that is a dominant interface for input devices. Accordingly, a keyboard sniffing program using the introduced vulnerability is implemented to prove the severeness of the vulnerability, which shows that user passwords can be easily exposed. As one of the intrinsic vulnerabilities found on the existing platforms, for which there were little considerations on the security problems when they were designed, it is required to consider a hardware approach to countermeasure the introduced vulnerability.

A Study on Self Assessment of Mobile Secure Coding (모바일 시큐어코딩 자가평가(M-SCSA) 방법에 대한 연구)

  • Kim, Dong-Won;Han, Keun-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.901-911
    • /
    • 2012
  • The removal of security vulnerabilities during the developmental stage is found to be much more effective and much more efficient than performing the application during the operational phase. The underlying security vulnerabilities in software have become the major cause of cyber security incidents. Thus, secure coding is drawing much attention for one of its abilities includes minimizing security vulnerabilities at the source code level. Removal of security vulnerabilities at the software's developmental stage is not only effective but can also be regarded as a fundamental solution. This thesis is a research about the methods of Mobile-Secure Coding Self Assessment in order to evaluate the security levels in accordance to the application of mobile secure coding of every individual, groups, and organizations.

Vulnerability and Attacks of Bluetooth System (블루투스의 보안 취약성과 공격)

  • Rhee, In-Baum;Ryu, Dae-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.650-653
    • /
    • 2011
  • In this paper, we describe Bluetooth system and Bluetooth security. And we analyze the structure of information security and vulnerability, introduced one of Bluetooth hacking techniques. We show a demo of the attack process to inject arbitrary hands-free voice messages and save the file information, recording a conversation through hands-free device.

  • PDF

Analysis of Security Vulnerabilities with Application Permissions in Android Platform (안드로이드 플랫폼의 권한 관련 보안 취약성 분석)

  • Kim, Ikhwan;Kim, Taehyoun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1108-1111
    • /
    • 2010
  • 구글 안드로이드 플랫폼은 오픈소스 형태로 응용프로그램을 손쉽게 개발할 수 있는 환경을 제공하며 이러한 특징으로 인해 빠른 속도로 시장 점유율을 높이고 있다. 하지만 오픈 소스의 특징으로 인해 보안 취약점에 대한 우려가 증가하고 있다. 안드로이드 고유의 보안모델은 응용프로그램의 시스템자원에 대한 부적절한 접근을 제어하기 위한 권한을 중심으로 이루어진다. 본 연구에서는 안드로이드의 권한 기반 보안모델에 대한 취약성을 테스트 코드수행과 플랫폼 소스분석을 통해 알아보고 이에 대해 간단한 해결방안을 제시한다.