• Title/Summary/Keyword: Convergence security

Search Result 3,472, Processing Time 0.024 seconds

Design of an Secure Internet Auction System (안전한 인터넷 경매시스템 설계)

  • 박진호;안성진
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.69-76
    • /
    • 2002
  • Becoming Internet is public, various services using Web are created. Internet auction is not exceptional but make rapid progress. Internet auction system damages user because its security is not perfect and faultless. In this paper, we propose a design of internet auction system providing more secure and convenient environment.

  • PDF

Design and Implementation of SIP Testing Simulator for Security Management (보안관리를 위한 SIP 시험 시뮬레이터 설계 및 구현)

  • Jang, Sung-Man;Kill, Min Wook;Lee, Geuk;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.99-107
    • /
    • 2003
  • One of the most important part in next generation VoIP is security management. When we develop a protocol stack based on SIP (Session Initiation Protocol), it is necessary to develop test scenario, test environment, adaptation test technology for security test of the system. In this paper, we design and implement security test environment and test program for SIP. This system also can be used as a fundamental system when someone develop a communication system based on SIP.

  • PDF

A Study on the Model of MIB-based Security Management System (MIB 기반의 보안 관리 시스템 모델에 관한 연구)

  • Koo, Ja-Hwan;Park, Byung-Yeon;Yoo, Ki-Seong;Lee, Haeng-Gon;Eom, Young-Ik
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.35-42
    • /
    • 2003
  • With the rapid adaption of the network technologies, there has been in continual troubles with network attacking and computer virus which are getting more automatic and intelligent. To solve them, we survey the existing and currently used security solutions, describe the architecture of traditional network management, and propose the model of a MIB-based security management system which has dedicated management information base on each security solution.

  • PDF

Design of MIR Security System in Mobile Environment (모바일 환경에서의 MIR 시큐리티 시스템에 관한 연구)

  • Kim, Seok-Soo;Ha, Kyung-Jae;Han, Kun-Hee
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.25-32
    • /
    • 2006
  • MIR system is a nationwide medical record information system that makes medical information available to any hospital and health institution at any time, and information in the system mostly requires high security. In particular, personal information related to patients and doctors, medical technology information and each hospital's digital information are used very frequently and are likely to be modified for illegal use. Thus we need to develop a system equipped with security measures to prevent information leakage while providing medical information service effectively.

  • PDF

Design and Implementation of SCPR for Multimedia Information Security (멀티미디어 정보 보안을 위한 SCPR의 설계 및 구현)

  • 홍종준;이재용
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.1-8
    • /
    • 2002
  • Real-Time Protocol (RTP) is used for multimedia information transmission and RTP payload must be encrypted for providing multimedia information security. Encryption/decryption delay is minimized, because there are constraints in transporting a multimedia data through the Internet. Therefore, encryption algorithm is changed with considering network traffic and load. Doting many users participate in the same multimedia service, an user who already left the service can receive and decrypt the RTP payload because of knowing the encryption key. In this paper, Security Control Protocol for RTP is designed and implemented for changing the encryption algorithm and the key.

  • PDF

Cloud Computing in the Vulnerability Analysis for Personal Information Security (Cloud Computing의 개인 정보 보안을 위한 취약점 분석)

  • Sun, Jae-Hoon;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.77-82
    • /
    • 2010
  • Cloud computing is defined as numerous concepts by research institutions and scholars. However, due to the present business trend in the IT sector, emphasizing on cost and efficiency, cloud computing has been defined as a form of computing which can provide extendable mass storage components in the virtual environment. As a result, security issues have been arising due to the variety of cloud computing services provided by the industries. This paper aims to analyze the weaknesses such as security techniques and inquiries, and personal information protection required for various cloud computing services.

A Study on Common Criteria for Developer's Perspective Guide (개발자를 위한 합성제품 평가 지침에 관한 연구)

  • Jung, Sung-Mo;Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.7-13
    • /
    • 2008
  • In domestic and international, evaluation of product with Common Criteria(CC) for security product estimation is expanding standard of product estimation. This expansion is due to multi aspects of product versions. However, it is very difficult to approach the most suitable form of security estimation guide in the developer's perspective, because estimation basis presented to developers is indefinite. With this pending dilemma, we are presenting a composition product introduce definite security standard for information security products.

  • PDF

Design and Implementation of SCPR for Multimedia Information Security (멀티미디어 정보 보안을 위한 SCPR의 설계 및 구현)

  • 홍종준;이재용
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.49-57
    • /
    • 2002
  • Real-Time Protocol (RTP) is used for multimedia information transmission and RTP payload must be encrypted for providing multimedia information security. Encryption/decryption delay is minimized, because there are constraints in transporting a multimedia data through the Internet. Therefore, encryption algorithm is changed with considering network traffic and load. During many users participate in the same multimedia service, an user who already left the service can receive and decrypt the RTP payload because of knowing the encryption key. In this paper, Security Control Protocol for RTP is designed and implemented for changing the encryption algorithm and the key.

  • PDF

Addressing Emerging Threats: An Analysis of AI Adversarial Attacks and Security Implications

  • HoonJae Lee;ByungGook Lee
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.69-79
    • /
    • 2024
  • AI technology is a central focus of the 4th Industrial Revolution. However, compared to some existing non-artificial intelligence technologies, new AI adversarial attacks have become possible in learning data management, input data management, and other areas. These attacks, which exploit weaknesses in AI encryption technology, are not only emerging as social issues but are also expected to have a significant negative impact on existing IT and convergence industries. This paper examines various cases of AI adversarial attacks developed recently, categorizes them into five groups, and provides a foundational document for developing security guidelines to verify their safety. The findings of this study confirm AI adversarial attacks that can be applied to various types of cryptographic modules (such as hardware cryptographic modules, software cryptographic modules, firmware cryptographic modules, hybrid software cryptographic modules, hybrid firmware cryptographic modules, etc.) incorporating AI technology. The aim is to offer a foundational document for the development of standardized protocols, believed to play a crucial role in rejuvenating the information security industry in the future.

A Study on the Relation Between Martial Arts Training and Job Performance of Security Personnel (보안요원의 무도수련과 직무수행 관계에 관한 연구)

  • Choi, Jeong-Il;Jang, Ye-Jin
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.179-186
    • /
    • 2017
  • The purpose of this study is to analyze the relation of security officers' martial arts training and job performance. To this end, we conducted surveys on security practitioners. The questionnaire consisted of three variables, "necessity of martial arts training, application to practical security work, improvement of job satisfaction". In this study for reliability analysis, Chronbach's Alpha coefficient was calculated. In order to verify the validity of the measured variables, exploratory factors were analyzed using the Berimax method. Both AVE and CR values of the measured variables were above the reference value of 0.5, indicating that the convergence validity was good. As a result of the hypothesis test, the standardization coefficient is 0.636 for "need for training in martial arts training${\Rightarrow}$practical security work", 0.986 for "practical security work${\Rightarrow}$job satisfaction improving", and the relationship between the two hypotheses is positive(+). In order to improve the job satisfaction of security-related practitioners, it seems necessary to raise the need for martial arts training.