• Title/Summary/Keyword: Emerging Security

Search Result 363, Processing Time 0.03 seconds

A Study on Key Data Decryption and Security Evaluation for Password Management Apps (비밀번호 관리 어플리케이션의 주요 데이터 복호화 연구 및 보안성 평가)

  • Han-gyeol Kim;Sinyoung Lee;Myungseo Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.61-70
    • /
    • 2024
  • As users use various services along with the rapid increase in Internet services, it may be difficult to manage accounts. To solve these difficulties, various password management applications are emerging. From a forensic point of view, password management applications can provide clues to obtain criminal evidence. The purpose of this paper is to acquire the data stored by the user in the password management application. To this end, we propose a better way to decrypt the encrypted data through reverse engineering, evaluate the security of the application to be analyzed, and safely store the data.

Convergence-based Smart Factory Security Threats and Response Trends (융합 기반 스마트공장 보안의 위협과 대응 동향)

  • Hoh, Jin;Jung, Chul Yong
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.29-35
    • /
    • 2017
  • The fourth industrial revolution and so on, the manufacturing environment is based on the latest IT technology, and ICT-based convergence that links with various industrial fields is actively proceeding. For this reason, convergence security based on changing environment in the field of security is emerging as a new issue, and various demands for convergence security are increasing. Such changes in the industrial environment not only provide advantages of convergence environment, but also cause various fusion and complex security problems. In particular, the government is actively promoting policies to build 10,000 smart plants by 2020, and has implemented projects to build 2,800 smart plants from 2014 to 2016. Therefore, we will examine the security threats and countermeasures against smart factories that are being built on the basis of ICT rather than the existing closed type.

International Environmental Security and limitations of North-East Asian Countries (국제 환경안보와 동북아 국가들의 한계)

  • Choi Byung-Doo
    • Journal of the Korean Geographical Society
    • /
    • v.39 no.6 s.105
    • /
    • pp.933-954
    • /
    • 2004
  • This paper considers critically the conceptual development of international environmental security, and to explore some limitations which seem to have made difficult the construction of regional environmental governance among North-East Asian countries. The recently emerging concept of environmental security has turned the traditional or realistic meaning of security to the neo-liberal and the political-economic one. On the basis of a reconsideration of these newly developed meanings of security, this paper has reviewed critically some work which have focused on the concepts of environmental regime and of environmental governance. To formulate a true environmental governance, it is suggested that we need a theoretical analysis on the economic and political contexts and a practical development of civil society. From this point of view, the economic structure of labour division, the political tension and military opposition in the region, and the immaturity and exclusiveness of civil consciousness can be pointed out as some limitations of environmental security to be constructed in the North-East Asian region. A true environmental security in this region requires formation of reciprocal economic relationship, development of regional institutions for political trust among countries, and improvement of interaction between non-governmental organizations (NGOs).

A Study on Developing Framework for Measuring of Security Risk Appetite (보안 위험성향 측정을 위한 프레임워크 개발에 관한 연구)

  • Gim, Gisam;Park, Jinsang;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.141-148
    • /
    • 2019
  • The advancement of digital technology accelerates intelligence, convergence, and demands better change beyond traditional methods in all aspects of business models and technologies, infrastructure, processes, and platforms. Risk management is becoming more important because of various security risks, depending on the changing business environment and aligned to business goals is emerging from the existing information asset based risk management. For business aligned risk management, it is essential to understand the risk appetite for achieving business goals, which provides a basis for decision-making in subsequent risk management processes. In this paper, we propose a framework for analyzing the risk management framework, pre - existing risk analysis, and protection motivation theory that influences decisions on security risk management. To examine the practical feasibility of the developed risk appetite framework, we reviewed the applicability and significance of the proposed risk appetite framework through an advisory committee composed of security risk management specialists.

Oil supplementation improved growth and diet digestibility in goats and sheep fed fattening diet

  • Candyrine, Su Chui Len;Jahromi, Mohammad Faseleh;Ebrahimi, Mahdi;Chen, Wei Li;Rezaei, Siamak;Goh, Yong Meng;Abdullah, Norhani;Liang, Juan Boo
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.32 no.4
    • /
    • pp.533-540
    • /
    • 2019
  • Objective: This study evaluated the growth, digestibility and rumen fermentation between goats and sheep fed a fattening diet fortified with linseed oil. Methods: Twelve 3 to 4 months old male goats and sheep were randomly allocated into two dietary treatment groups in a $2(species){\times}2$ (oil levels) factorial experiment. The treatments were: i) goats fed basal diet, ii) goats fed oil-supplemented diet, iii) sheep fed basal diet, and iv) sheep fed oil-supplemented diet. Each treatment group consisted of six animals. Animals in the basal diet group were fed with 30% alfalfa hay and 70% concentrates at a rate equivalent to 4% of their body weight. For the oil treatment group, linseed oil was added at 4% level (w:w) to the concentrate portion of the basal diet. Growth performance of the animals was determined fortnightly. Digestibility study was conducted during the final week of the feeding trial before the animals were slaughtered to obtain rumen fluid for rumen fermentation characteristics study. Results: Sheep had higher (p<0.01) average daily weight gain (ADG) and better feed conversion ratio (FCR) than goats. Oil supplementation did not affect rumen fermentation in both species and improved ADG by about 29% and FCR by about 18% in both goats and sheep. The above enhancement is consistent with the higher dry matter and energy digestibility (p<0.05), as well as organic matter and neutral detergent fiber digestibility (p<0.01) in animals fed oil- supplemented diet. Sheep had higher total volatile fatty acid production and acetic acid proportion compared to goat. Conclusion: The findings of this study suggested that sheep performed better than goats when fed a fattening diet and oil supplementation at the inclusion rate of 4% provides a viable option to significantly enhance growth performance and FCR in fattening sheep and goats.

Fast Scrambler/Descrambler for H.264/AVC (H.264/AVC를 위한 고속 스크램블러/디스크램블러)

  • Lee, Ho-Jae;Nam, Je-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.289-290
    • /
    • 2006
  • With increasing the volume of digital multimedia market, the security and multimedia content protection issues are arising. Interest in H.264/AVC is emerging and special features in H.264/AVC element stream must be considered. We developed a new algorithm which scrambles and descrambles H.264/AVC element stream in compressed domain using manipulating CABAC initialization table and DCT coefficients. Extensive experimental results indicate that the proposed algorithm is effective and promising.

  • PDF

A Study on the Transaction Security of Electronic Payment (전자결제의 보안성에 관한 연구)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.1 no.1
    • /
    • pp.173-188
    • /
    • 1998
  • In this paper we discussed various types of electronic payment schemes that are emerging. Threats vary from malicious hackers attempting to crash a system, to threats to data or transaction integrity. An understanding of the various types of threats can assist a security manager in selecting appropriate cost-effective controls to protect valuable information resources. An overview of many of today's common threats presented in this paper will be useful to mangers studying their own threat environments with a view toward developing solutions specific to their organization. To ensure security on the Internet, several methods have been developed and deployed. They include authentication of users and servers, encryption, and data integrity. Transaction security is critical : without it, information transmitted over the Internet is susceptible to fraud and other misuse. So computer systems represents an Intermediary with the potential to access the flow of information between a user. Security is needed to ensure that intermediaries cannot eavesdrop on transactions, or copy/modify data. Online firms must take additional precautions to prevent security breaches. To protect consumer information, they must maintain physical security of their servers and control access to software passwords and private keys. Techniques such as secret and public-key encryption and digital signatures play a crucial role in developing consumer confidence in electronic commerce.

  • PDF

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

Performance Management and Analysis for Guaranteed End-to-End QoS Provisioning on MPLS-based Virtual Private LAN Service(VPLS)

  • Kim, Seong-Woo;Kim, Chul;Kim, Young-Tak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.2B
    • /
    • pp.144-156
    • /
    • 2003
  • Internet/Intranet has been continuously enhanced by new emerging IP technologies such as differentiate service(DiffServ), IPSec(IP Security) and MPLS(Multi-protocol Label Switching) traffic engineering. According to the increased demands of various real-time multimedia services, ISP(Internet Service Provider) should provide enhanced end-to-end QoS(quality of service) and security features. Therefore, Internet and Intranet need the management functionality of sophisticated traffic engineering functions. In this paper, we design and implement the performance management functionality for the guaranteed end-to-end QoS provisioning on MPLS-based VPLS(Virtual Private LAN Service). We propose VPLS OAM(Operation, Administration and Maintenance) for efficient performance management. We focus on a scheme of QoS management and measurement of QoS parameters(such as delay, jitter, loss, etc.) using VPLS OAM functions. The proposed performance management system also supports performance tuning to enhance the provided QoS by re-adjusting the bandwidth of LSPs for VPLS. We present the experimental results of performance monitoring and analysis using a network simulator.

A Transformation Military Databases based on the Relational Data model into XML Databases (관계형 데이터 모델 기반 군사용 데이터베이스의 XML 데이터베이스로의 변환)

  • Kim, Chang-Seok;Kim, Eong-Su
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.269-310
    • /
    • 2003
  • AS Extensible Markup Language(XML) is emerging as the data format of the Internet era, there are increasing needs to efficiently transform between database and XML documents. In this paper, we propose a schema transformation method from relational database to XML database. To transform the schema, we represent input schema as Entity-Relationship diagram. Entity-Relationship model translator scans the input Entity-Relationship diagram using BFS (breadth First Search) and translates the diagram into hierarchical structure model. The XML Schema generator produces XML Scema code using the transformed hierarchical structure model. The proposed method has a merit that having reusability facility of XML Schema property in comparison with existing researches.

  • PDF