• Title/Summary/Keyword: 취약성 지도

Search Result 1,849, Processing Time 0.034 seconds

Mediated Effect of Mobile Financial Crime Fear on the Relationship between Mobile Financial Crime Vulnerability Perception and Mobile Financial Using (모바일금융범죄 취약성인식과 모바일금융 사용 간의 관계에서 모바일금융 범죄두려움의 매개효과)

  • Kwon, Joon-Sung;Gong, Jung-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.305-314
    • /
    • 2020
  • Mobile environment is relatively free from time and space constraints, and has unique characteristics such as not applying physical and social vulnerability because of it's non-face-to-face channel. Since such spatial and temporal speciality is likely to appear in a different form from psychological action and action in a general face-to-face environment, it is necessary to conduct an empirical study based on the results of the existing research that has been studied as major psychological variables of action in mobile environment. However, advance research have not been conducted in earnest on the vulnerability and anxiety of the consumers in a new environment called mobile finance. so this study intends to establish the basis through empirical research. As a result, women among traditional vulnerable groups perceived themselves to be vulnerable in mobile financial environments than men and felt fear of crime strongly. In addition, the vulnerability of mobile financial crime did not have a significant direct effect on mobile financial use, but it was confirmed that mobile crime fear was mediated completely and had an indirect effect on mobile financial use.

Analyses of Light-weight Protocol for Tag Security in RFID System (RFID 시스템에서의 태그 보안을 위한 경량화 프로토콜의 분석)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2399-2403
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper analyses the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage process, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and the mitigate the risks.

Implementation of Location Tracking System of Wireless Access Point based PDA (PDA기반 무선 AP의 위치 탐색 시스템 구현)

  • Park, Ju-Pyung;Hong, Jin-Keun;Han, Kun-Hee;Kim, Ki-Hong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.952-957
    • /
    • 2008
  • In this paper, explain about collect that Access Point signal and Implementation of Location Tracking System of Wireless Access Point based PDA. Collect Access point signal in PDA then Signal transmits by computer so Computer is analyze collected signal and is seen on picture. we show the Present problem of wireless LAN and position feeler algorithm through this writing paper.

Characterizing visitors' awareness of trekking safety programs and regulations in the Jirisan National Park (지리산국립공원 탐방객의 산행 안전 대응 프로그램 및 제도에 대한 인식 특성)

  • Cho, Woo;Sung, Chan Yong
    • Korean Journal of Environment and Ecology
    • /
    • v.28 no.5
    • /
    • pp.588-596
    • /
    • 2014
  • This study investigated the efficacy and drawbacks of a trekking accident prevention programs of the Jirisan National Park using visitor survey data. In total, 394 visitors were surveyed at the entrances to Seongsamjae, Jungsanri, Baekmudong, and Ssanggyesa trails on both weekdays and weekends. The trekking accident prevention training course has not been widely publicized. Only 23.4 % of the survey respondents have participated the training course. The training course itself appears to be useful in that 51.1 % of the course participants positively responded the contents of the course, suggesting that, if well publicized, the program can help prevent trekking accident. The trekking time regulation was relatively well publicized. Of the survey respondents, 72.4 % were aware of this regulation, and 72.2 % of them agreed on applying this regulation to other national parks. Accident vulnerability analysis shows that respondents who were aware of the regulation tend to be more experienced and skilled in trekking and more prepared for accident than those who were not. Also, respondents who were satisfied more on park safety facilities tend to be more experienced and skilled in trekking and more prepared for accident.

Analysis of the Vulnerability of the IoT by the Scenario (시나리오 분석을 통한 사물인터넷(IoT)의 취약성 분석)

  • Hong, Sunghyuck;Sin, Hyeon-Jun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.1-7
    • /
    • 2017
  • As the network environment develops and speeds up, a lot of smart devices is developed, and a high-speed smart society can be realized while allowing people to interact with objects. As the number of things Internet has surged, a wide range of new security risks and problems have emerged for devices, platforms and operating systems, communications, and connected systems. Due to the physical characteristics of IoT devices, they are smaller in size than conventional systems, and operate with low power, low cost, and relatively low specifications. Therefore, it is difficult to apply the existing security solution used in the existing system. In addition, IoT devices are connected to the network at all times, it is important to ensure that personal privacy exposure, such as eavesdropping, data tampering, privacy breach, information leakage, unauthorized access, Significant security issues can arise, including confidentiality and threats to facilities. In this paper, we investigate cases of security threats and cases of network of IoT, analyze vulnerabilities, and suggest ways to minimize property damage by Internet of things.

Alternating Development Strategies in Jeiu Island, Korea (제주도 발전 전략의 교호적 변화)

  • Kwon, Sang-Cheol
    • Journal of the Korean Geographical Society
    • /
    • v.43 no.2
    • /
    • pp.171-187
    • /
    • 2008
  • Islands are vulnerable to outer influences due to their small size and isolation. Tourism often becomes an important development focus because of their unique culture and nature. Jeju-do, as well as other islands, has experienced such development mostly led by central government, and the regional change was understood as the outcome of global influences without much concern with the local response or strategy. Thus, vulnerability has been the key theme in island development studies. This paper examines the current state of island development as an outcome of locals' alternating strategy in which the islanders accept the central government's plan, but express their demands to modify them. It is reflected in the electoral preference for ruling or oppositional parties, local movements against central government's development plans, and the spatial organization of tourism sites from a few growth centers to more dispersed, balanced development. These suggest that the current state of island development is not derived from unidirectional global forces, even if islands are peripheral. Rather, it is the outcome of an alternating strategy of Jeju locals accepting the central government development plans while managing them for local benefits.

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.

Stateful SIP Protocol with Enhanced Security for Proactive Response on SIP Attack (SIP 공격 대응을 위한 보안성이 강화된 Stateful SIP 프로토콜)

  • Yun, Ha-Na;Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.46-58
    • /
    • 2010
  • The user valence of VoIP services with SIP protocol is increasing rapidly because of cheap communication cost and its conveniency. But attacker can easily modify the packet contents of SIP protocol as SIP header is transmitted by using UDP methods in text form. The reason is that SIP protocols does not provide an authentication function on the transmission session. Therefore, existing SIP protocol is very weak on SIP Packet Flooding attack etc. In order to solve like this kinds of SIP vulnerabilities, we used SIP status codes under the monitoring module for detecting SIP Flooding attacks and additionally proposed an advanced protocol where the authentication and security function is strengthened about SIP packet. We managed SIP session spontaneously in order to strengthen security with SIP authentication function and to solve the vulnerability of SIP protocol. The proposed mechanism can securely send SIP packet to solves the security vulnerability with minimum traffic transmission. Also service delay in SIP proxy servers will be minimized to solve the overload problem on SIP proxy server.

A Building Method of Security Vulnerability Measurement Framework under u-Healthcare System Traffic Domain Environment Based on USN (USN기반 u-Healthcare 시스템 트래픽도메인 환경에서의 보안위험도 평가체계 설계방안)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2011
  • Smart environment of health information technology, u-Healthcare architecture, ad-hoc networking and wireless communications environment are major factors that increase vulnerability of u-healthcare information systems. Traffic domain is the concept of network route that identifies the u-Healthcare information systems area as the traffic passing and security technologies application. The criterion of division is an area requiring the application of security technology. u-Healthcare information system domains are derived from the intranet section. the public switched network infrastructure, and networking sectors. Domains of health information systems are separated by domain vulnerability reason. In this study, domain-specific security vulnerability assessment system based on the USN in u-Healthcare system is derived. The model used in this study suggests how to establish more effective measurement USN-based health information network security vulnerability which has been vague until now.

Improved RFID Mutual Authentication Protocol using One-Time Pad and One-Time Random Number Based on AES Algorithm (OTP와 일회성 난수를 사용한 AES 알고리즘 기반의 개선된 RFID 상호 인증 프로토콜)

  • Yun, Tae-Jin;Oh, Se-Jin;Ahn, Kwang-Seon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.163-171
    • /
    • 2011
  • Because RFID systems use radio frequency, they have many security problems such as eavesdropping, location tracking, spoofing attack and replay attack. So, many mutual authentication protocols and cryptography methods for RFID systems have been proposed in order to solve security problems, but previous proposed protocols using AES(Advanced Encryption Standard) have fixed key problem and security problems. In this paper, we analyze security of proposed protocols and propose our protocol using OTP(One-Time Pad) and AES to solve security problems and to reduce hardware overhead and operation. Our protocol encrypts data transferred between RFID reader and tag, and accomplishes mutual authentication by one time random number to generate in RFID reader. In addition, this paper presents that our protocol has higher security and efficiency in computation volume and process than researched protocols and S.Oh's Protocol. Therefore, our protocol is secure against various attacks and suitable for lightweight RFID tag system.