• Title/Summary/Keyword: Information security industry

Search Result 963, Processing Time 0.024 seconds

The Role and Issue analysis of the ADR's Committee in the Revision of Personal Information Protection Act (데이터 3법 개정에 따른 분쟁조정위원회 역할과 이슈분석)

  • Yoon, Duck Joong;Jee, Yoon Seok;Kim, Youngae;Shin, Yongtae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.279-286
    • /
    • 2020
  • On February 4, 2020, the Personal Information Protection Act ("Privacy Act") was amended to facilitate the convergence and utilization of data, a key resource of the Fourth Industrial Revolution, and to support the development of the data industry. As the scope of the law applies to telecommunications operators, financial operators, and personal information processing providers, the scope of related dispute settlement is expected to increase. Therefore, this paper first introduces the role and function of the Personal Information Dispute Committee and the institutional standards for personal information dispute mediation, and researches the roles and issues that the Personal Information Dispute Mediation Committee should play in accordance with the revision of the Data 3 Law. In this study, For efficient operation of personal information dispute mediation, expert deliberation by field, new adjustment criteria for new industrial technologies, way to secure business continuity between the Personal Information Dispute Committee and the Personal Information Committee, Secure the link between the mediation decision and courts, and Suggested the strengthening of the operational standards for collective dispute mediation.

Low-weight Secure Encryption Protocol on RFID for Manufactory Automation (공장 자동화를 위한 RFID 경량 암호 프로토콜에 관한 연구)

  • Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.173-180
    • /
    • 2016
  • There has been a growing interest in automation of factories in the country. And, the development in this regard has been actively attempted. In particular, on the basis of the "innovation 3.0 strategy of manufacturing industry", interest in the smart of the manufacturing plant of small and medium-sized enterprises has increased rapidly. As well as policy for building smart plant, technical, seeking a strategic approach. But, in order to introduce such a smart plant or factory automation systems, manufacturing plant security with vulnerability and personal information protection problems, it should always be top priority there. Accordingly, we provide the applicable lightweight secure protocols in RFID communication. It is a wireless communication technology that is most often introduced for factory automation. Our proposed lightweight secure protocol in this study, less the number of calculations in comparison with the existing public key-based and the symmetric key encryption algorithm. And it is fast in compare with the existing protocol. Furthermore, we design that it system can support to low power consumption and small consume the memory size.

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

Relationship between Pursuit Benefit and Behavior by Spectators Participating Security Exhibition (보안엑스포 참관객의 추구편익과 참관 후 행동의 관계)

  • Kim, In-Jae
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.35-56
    • /
    • 2014
  • The purpose of this study was aimed to identify the relationship between pursuit benefit and behavior by spectators participating security exhibition. The result of study is significant because it may provide more effective and aggressive marketing strategies to the future companies participating security exhibition, and suggest developmental direction by actively responding spectators' needs. The subject for this study was spectators who participating World Security Expo 2014 held three days from March 12 to 14 in 2014. 300 samples were selected by convenience sampling for subject of this study. 283 out of 300 surveys, excluded 17 unfaithful and defected surveys, were used for data analysis. Research tool was questionnaire which was based on and recomposed by previous researches home and abroad. The collected data were treated for analysis of frequency, reliability, factor analysis, correlation, and regression by using SPSS statistic package version of 18.0. Through the above research method and procedure, the results were as followings. First, the relationship between pursuit benefit and behavior after participating exhibition appeared positively. It was found that there was high relationship between pursuit benefit and behavior. Second, analyzing relationship of factors between pursuit benefit and behaviors resulted to effect information exploration, good use of spare time, and product purchase on word of mouth. Third, analyzing relationship of factors between pursuit benefit and behaviors resulted to effect good use of spare time, information exploration, and product purchase on re-participation.

  • PDF

A Research on the Analyzing Biometric Aviation Security System and Proposing Global Standardization to Improve Aviation Safety (항공안전 향상을 위한 생체인식 기반 항공보안시스템 도입 및 국제표준화 활성화 연구)

  • Cho, Sung-Hwan;Yoon, Han-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.637-647
    • /
    • 2020
  • Airports and civil aviation authorities have recently utilized and expanded the use of biometric technologies to respond proactively against the rapid changes in aviation terrorism due to scientific development. The Global Security Plan (GASeP) developed by the International Civil Aviation Organization (ICAO) is regarded as precondition for sustainable development of the global air transport industry. Thus GASeP has sought to improve aviation security system using biometic technologies. The purpose of this paper is to realize the equivalent access of aviation security system throughout the world with biometric technologies. First, this paper reviewed the current biometric-security system operated by the EU, USA and international society. Second, legal and institutional processes regarding personal biometric information were analyzed to suggest political implications. This paper concluded that ICAO should propose a global standardization and prepare guideline materials among its 193 member states to prevent aviation security breaches and to share related information on a real-time basis because time is required to utilize biometric technology to improve aviation safety and to develop global air transport.

A study on security independent behavior in social game using expanded health belief model (건강신념모델을 확장한 소셜게임(Social Game) 보안의지행동에 관한 연구)

  • Ahn, Ho-Jeong;Kim, Sung-Jun;Kwon, Do-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.99-118
    • /
    • 2016
  • With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.

  • PDF

Security Analysis on Commercial Online Music Streaming Service and Countermeasures (국내 포털사이트 음원서비스 취약점분석 및 대응방안 제안)

  • Lee, Sang-Sik;Choi, Dong-Hyun;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.681-690
    • /
    • 2009
  • Nowadays, the music industry is moving from analog to digital. Most of the big portal sites provide commercial online music streaming services according to the tendency. In this paper, we analyze the security of the Korean commercial online music streaming services which are provide by the Korea's major portal sites(Dosirak, Cyworld, and Naver). Moreover, we show attacks on commercial online music streaming services that lead to an infringement of copyright and propose technical countermeasures for online commercial music streaming services, the contributions of the present work are that the measures protect the copyright of the music.

Performance Comparison of Security System with Various Collaboration Architecture (다양한 연동 구조를 통한 보안 시스템의 성능 비교)

  • 김희완;서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.235-242
    • /
    • 2004
  • As e-business being rapidly developed the importance of security is on the rise in network. Intrusion detection systems which are a core security system detect the network intrusion trial. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network and the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. Each agent cooperates through the BBA (Black Board Architecture) and CNP (Contract Net Protocol) for detecting intrusions. In this paper, we propose the effective method comparing the blackboard architecture to contract net protocol.

  • PDF

Difference of Risk Management between Foreign and Domestic ERP : Empirical Approach with Korean Small & Medium-Sized Logistics Firms (외산 ERP와 국산 ERP를 도입한 국내 중소 물류기업간의 위험 관리 비교 연구)

  • Kim, Taeha;Nam, Seunghyeon
    • Journal of Information Technology Services
    • /
    • v.19 no.6
    • /
    • pp.119-130
    • /
    • 2020
  • This work investigates how domestic or foreign ERP affects the relationship between risks associated ERP implementation and intention to adopt risk-mitigating options. We propose three risks such as ERP vendor risk, economic risk, and security risk should affect positively the intention to adopt the risk-mitigating options. To validate the impact of risks and to examine the difference between domestic and foreign ERP, we collected data from IT managers in small and medium sized logistics companies in South Korea using survey questionnaires. We validate the difference between domestic ERP and foreign ERP using multiple regression analyses. We find that IT managers using domestic ERP are willing to adopt risk-mitigating options for economic and security risk. In contrast, we find that IT managers using foreign ERP are willing to adopt risk-mitigating options for ERP-vendor risk. This work may provide IT managers in logistics industry a practical guideline of choosing either domestic or foreign ERP based on their risk preferences.

A study on DVB-SI based additional information transmission method of data service linked with movie information TV program (영화정보 프로그램 연동형 데이터서비스의 DVB-SI 기반 부가정보 전송 방법에 관한 연구)

  • Kwangilm KO
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.91-98
    • /
    • 2022
  • Because the movie has the characteristics of a cultural product where experience is important, a promotional strategy is used to convert viewers into movie audiences by providing indirect experiences of movies through professional movie information programs. Considering that the movie information program is a strategic publicity medium that raises the audience's intention to watch a movie, a study on the data service that provides useful additional information to the viewer in conjunction with the movie information program is meaningful. Against this background, this study contains the core research contents in the development of data service linked with movie information program. Specifically, additional information of the movie information program was defined. And to provide the additional information to the data service, the digital broadcasting international standard DVB-SI-based additional information transmission method was devised.