• Title/Summary/Keyword: 취약성 지도

Search Result 1,860, Processing Time 0.033 seconds

Designing on Security zone to improve Cookie File Security level (쿠키파일의 보안성을 향상하기 위한 보안영역 설계)

  • Seo, Hee-Suk;Choi, Yo-Han
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.6
    • /
    • pp.75-81
    • /
    • 2011
  • Cookie is simple text file, which contains records of web service which provided to user. some of data included in Cookie has user's private information. When attacker has Cookie which included user's private information, will causing financial losses. In this paper we designed security section which can improve vulnerable Cookie's security level. Through research and vulnerability analysis of Cookie file, we find out how to implement security area to offer efficient security area and design security area for cookie file. Also we checked security level to performance evaluation. Through this security level, we can keep user's private information secure using Cookie's improve security level which stored in user's personal computer.

  • PDF

The Application of the AHP Analysis Method to Prepare the Selection Standards for the Target Site of Check Dams (사방댐 대상지 선정 기준마련을 위한 AHP 분석기법의 적용)

  • Bea, Hyun-Seok;Lee, Kwang-Youn;Choi, Young-Jin;Lee, Jin-Ho;Woo, Choong-Shik;Chun, Kun-Woo
    • Journal of Korean Society of Forest Science
    • /
    • v.109 no.4
    • /
    • pp.446-453
    • /
    • 2020
  • By applying the Analytic Hierarchy Process(AHP) method, we calculated the weight of factors related to the selection of check dam sites and generated basic data related to the selection of the target site. As a result of the AHP classification, three evaluation items(Susceptibility, Vulnerability, and Constructability), 12 evaluation factors (Susceptibility 10, Vulnerability, and Constructability 1), and two-six evaluation criteria in each evaluation factor were selected. After calculating the relative importance by using the selected evaluation items, evaluation factors, and criteria, the vulnerability items such as medical facilities, facilities for the aged, educational facilities, and private homes were found to be higher than the other items. When the relative weight for deciding qualified sites was applied to the forest watersheds in the Gangwon region, 8,601 forest watersheds(35.2 % of the total forest watersheds) were found to be suitable for the installation of check dams.

Vulnerabilities Analysis and Security Measures of Storage Area Network (SAN의 취약성 분석 및 대응방안)

  • 김광혁;이상도;정태명
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.841-843
    • /
    • 2002
  • 인터넷의 보급으로 데이터의 생산, 수요, 유통이 급격히 증가하였으며, 조직내의 정보의 공유 및 활용의요구가 점자 증대되었다. 이에 대한 해결책으로 스토리지 네트워크의 사용이 확산되어 중요정보의 백업,긴급복구등의 기능을 쉽게 사용할 수 있게 되었다. 그러나 조직내의 중요만 데이터에 대한 백업 및 공유를 수행하면서도 데이터에 대안 보안은 상대적으로 매우 취약만 신정이어서 향후 보안문제가 대두 될 것으로 보인다. 본 논문에서는 SAN의 구성과 동향을 살펴보고 현재 보편화된 SAN 보안 기법인 LUN Masking과Zoning의 구조와 기능, 이들의 한계점등을 알아보도록 한. 또 향후 SAN 동향과 그중 IP네트워크의 결합으로 발생되어지는 보안 문제점과 해결책을 제시하도록 한다.

  • PDF

Study on Improving Vulhearability in IPv4/IPv6 Header Translation Mechanism (IPv4/IPv6 헤더변환 방식에서의 취약성 개선에 관한 연구)

  • 황호준;유승재;김귀남
    • Convergence Security Journal
    • /
    • v.3 no.1
    • /
    • pp.73-84
    • /
    • 2003
  • The IPv4 that used to be generally used as a medium of computer communications in 1980s has reached its limits now. IPv6 (IP Version 6) is being prepared to solve the limitations of the IPv4. However, the biggest problem of IPv6 is that it is not compatible with the IPv4. To resolve the compatibility issue, Dual Stack, Tunneling and Header Converting methods have been proposed. The Header Converting method allows communications between the IPv4 and IPv6 networks with the converter. This method's strength is that it is easy to embody and the procedures for embodiment is simple. However, this method still contains the weaknesses that the existing IPv4 has. On the current document, the Header Converting method among the three methods is discussed to resolve the problems this method has. To solve the Header Converting method's weakness, the security problem between sections, the IP Header field values are converted to the relative field values and IPSec (IP Security) and ESP (Encapsulation Security Payload) are applied. The proposed "Encrypted Header Converting Method" that is encrypted in packet units has solved the weakness that the pre-existing Header Converting method used to have.d to have.

  • PDF

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

A Study on Vulnerability Severity Evaluation Considering Attacker Skill Level Based on Time Series Characteristics (시계열 특성 기반의 공격자 기술 수준을 고려한 취약점 심각도 평가 방안 연구)

  • Seong-Su Yoon;Ieck-chae Euom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.281-293
    • /
    • 2023
  • Industrial control systems (ICS) are increasingly targeted by security incidents as attackers' knowledge of ICS characteristics grows and their connectivity to information technology expands. Vulnerabilities related to ICS are growing rapidly, but patching all vulnerabilities in a timely manner is challenging. The common vulnerability assessment system used to patch vulnerabilities has limitations as it does not consider weaponization after discovery. To address this, this study defines criteria for classifying attacker skill levels based on open information including operating technology and vulnerability information in ICS. The study also proposes a method to evaluate vulnerability severity that reflects actual risk and urgency by incorporating the corresponding attribute in the existing severity score calculation. Case studies based on actual accidents involving vulnerabilities were conducted to confirm the effectiveness of the evaluation method in the ICS environment.

A Study on Data Storage Method for Cloud Storage Structure (클라우드 스토리지 구조를 고려한 데이터 저장 방법에 대한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.699-701
    • /
    • 2012
  • USB flash drive와 같은 이동형 저장매체는 한 손에 쏙 들어오는 작은 크기와 가벼운 무게로 뛰어난 휴대성을 제공하고 있다. 많은 사용자들은 자신의 데이터를 저장하기 위해 고용량을 제공하는 이동형 저장매체에 관심을 보이고 있다. 하지만 이동형 저장매체는 휴대성으로 인한 도난 및 분실당할수 있다. 개인 정보가 유출되는 등의 많은 문제들이 발생하고 있다. 인터넷의 발달과 클라우드 컴퓨팅 붐을 통하여 이동형 저장매체의 문제점을 해결할 수 있는 클라우드 스토리지 서비스가 급증하고 있다. 하지만 이러한 클라우드 스토리지 서비스는 인터넷이 가지고 있는 취약성 및 서버와 서버의 관리자의 비신뢰성 등의 문제를 가지고 있으며, 이로 인한 몇몇 사고가 발생하였다. 이러한 문제를 해결하기 위해서 클라우드 스토리지 환경에서는 데이터를 암호화 저장하고 이를 복호화 과정 없이 검색할 수 있는 검색 가능한 암호 기술의 필요성이 대두되고 있다. 하지만 기존의 검색가능 암호 기술은 사용자가 저장하고자 하는 데이터를 직접 업로드하고, 해당 자료를 필요에 따라 공유 하고, 공유대상이 변화되는 클라우드 스토리지 환경에서 비효율성을 가지고 있어 실제 서비스에 적용하기 힘든 단점을 가지고 있다. 따라서 본 논문에서는 클라우드 컴퓨팅 환경을 고려하여 검색가능한 암호화 색인 생성 및 이를 재암호화를 통해 다른 사용자와 안전하게 공유할 수 있는 검색가능한 재 암호화 시스템을 제안한다.

Development of water cycle model for estimation of drought response capacity (물순환 모델을 활용한 가뭄 대응능력 평가 기법 개발)

  • Kim, Jin-Young;Kim, Jang Gyeong;Lee, Jeong Ju;Lee, Sang Yeol;Kwon, Hyun-Han
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.361-361
    • /
    • 2020
  • 우리나라의 경우 강수량이 지역별로 편중되면서 국지적 가뭄이 발생하고, 지형적 특성으로 상습가뭄지역 피해가 확대되고 있다. 더불어 강수의 시기별 편차가 커지면서 봄 가뭄 증가 및 장기 기후변화 시나리오도 가뭄 발생 가능성 증가를 전망하고 있다. 그러나 우리나라의 경우 가뭄대응 대책 마련시 선제적인 가뭄대응 대책 마련보다, 사후복구·단기대책을 중심으로 가뭄대응능력을 추진하고 있어 예방중심의 가뭄대응능력의 한계점을 지니고 있다. 본 연구에서는 선제적 예방 중심의 가뭄대응 전략을 위해 물순환 모델을 기반으로 수원별 가뭄대응능력을 평가하고, 지역별로 산정된 용수공급가능일수를 기반으로 수문학적 가뭄취약지도를 작성하는 것을 목적으로 한다. 이때 용수공급가능일수는 가뭄시나리오(20년, 30년, 50년 등)를 설정하여 시나리오별 공급가능일수를 평가하여 시공간적 가뭄취약성 분석이 가능한 모형으로 확장하였다. 수문학적 가뭄취약지도의 경우 정책결정자, 업무사용자 등 효율적 정보 제공이 가능할 것으로 판단되며, 지역별로 현안사항 도출 및 개선방안을 위한 기초자료로 활용 될 수 있을 것으로 기대된다.

  • PDF

Assessment of Drought Risk in Korea: Focused on Data-based Drought Risk Map (우리나라 가뭄 위험도 평가: 자료기반 가뭄 위험도 지도 작성을 중심으로)

  • Park, Jong Yong;Yoo, Ji Young;Lee, Minwoo;Kim, Tae-Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.4B
    • /
    • pp.203-211
    • /
    • 2012
  • Once drought occurs, it results in the extensive affected area and considerable socio-economic damages. Thus, it is necessary to assess drought risk and to prepare its counterplans. In this study, using various observation data on meteorological and socio-economical factors, drought risk was evaluated in South Korea. To quantify drought risk, Drought Hazard Index (DHI) was calculated based on the occurrence probability of drought, and Drought Vulnerability Index (DVI) was computed to reflect socio-economic consequences of drought. Drought Risk Index (DRI) was finally suggested by combining DHI and DVI. These indices were used to assess drought risk for different administrative districts of South Korea. The overall results show that the highest drought risk area was Jeolla Province where agricultural practice is concentrated. The drought risk map proposed in this study reflects regional characteristics, thus it could be utilized as a basic data for the establishment of drought preventive measures.

Analysis of key technologies related to VoIP security (VoIP 보안관련 주요기술에 대한 분석)

  • Rha, Sung-Hun;Shin, Hyun-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.385-390
    • /
    • 2010
  • VoIP Service is provided voice & image call using internetwork unlike traditional call. VoIP usage is becoming generalization & development. As a result, threats of security are steadily increasing. Regarding this situation, we will investigate the security problem of VoIP in various aspects. Also We will investigate main technology of security solution method for solve this problem.