• Title/Summary/Keyword: Information security industry

Search Result 963, Processing Time 0.025 seconds

An Architecture for Key Management in Hierarchical Mobile Ad-hoc Networks

  • Rhee, Kyung-Hyune;Park, Young-Ho;Gene Tsudik
    • Journal of Communications and Networks
    • /
    • v.6 no.2
    • /
    • pp.156-162
    • /
    • 2004
  • In recent years, mobile ad-hoc networks have received a great deal of attention in both academia and industry to provide anytime-anywhere networking services. As wireless networks are rapidly deployed, the security of wireless environment will be mandatory. In this paper, we describe a group key management architecture and key agreement protocols for secure communication in mobile ad-hoc wireless networks (MANETs) overseen by unmanned aerial vehicles (UAVs). We use implicitly certified public keys method, which alleviates the certificate overhead and improves computational efficiency. The architecture uses a two-layered key management approach where the group of nodes is divided into: 1) Cell groups consisting of ground nodes and 2) control groups consisting of cell group managers. The chief benefit of this approach is that the effects of a membership change are restricted to the single cell group.

Implementation Mode Image Segmentation Method for Object Recognition (물체 인식을 위한 개선된 모드 영상 분할 기법)

  • Moon, Hak-Yong;Han, Wun-Dong;Cho, Heung-Gi;Han, Sung-Ryoung;Jeon, Hee-Jong
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.51 no.1
    • /
    • pp.39-44
    • /
    • 2002
  • In this paper, implementation mode image segmentation method for separate image is presented. The method of segmentation image in conventional method, the error are generated by the threshold values. To improve these problem for segmentation image, the calculation of weighting factor using brightness distribution by histogram of stored images are proposed. For safe image of object and laser image, the computed weighting factor is set to the threshold value. Therefore the image erosion and spread are improved, the correct and reliable informations can be measured. In this paper, the system of 3-D extracting information using the proposed algorithm can be applied to manufactory automation, building automation, security guard system, and detecting information system for all of the industry areas.

A Study on Method to update PEK(PIN Encryption Key) (PCI PTS 요구사항을 충족하는 안전한 PEK(PIN Encryption Key) 업데이트 방법)

  • Heo, Je-Ho;Chung, Ki-Hyun;Choi, Kyung-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.639-641
    • /
    • 2012
  • 금융 사기로 인한 피해로부터 카드 사용자의 금융 정보를 보호하기 위한 노력이 지속되고 있다. 금융 카드에 대한 보안은 IC 금융 카드의 사용 등의 방법으로 지속적으로 보완되고 향상되어 가고 있다. 이런 시점에 상대적으로 취약한 결재 시스템인 카드 단말기에 대한 보안에 또한 관심을 기울여야 하는 시점이다. 이런 의미로 카드 단말기에 대한 보안성 평가 스킴인 PCI PTS(Payment Card Industry Payment Transaction Security) 요구사항을 소개하고 카드 단말기의 필수적 키인 PEK(PIN Encryption Key)를 주입하는데 있어 PCIPTS 의 논리적 요구사항을 충족하는 방법을 제시한다.

Network Traffic Analysis between Two Military Bases Using Modeling and Simulation (M&S를 활용한 두 개의 군 부대간 네트워크 트래픽 용량 분석)

  • Park, Myunghwan;Yoo, Seunghoon;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.425-432
    • /
    • 2019
  • Modeling and Simulation(M&S) has widely been used in various areas such as industry, academy and military. Especially, military have used the technology for acquisition, training, and combat assessment. In this paper, we introduce our experience using M&S technique to analyze the network traffic amount and packet delay time between two military bases. For this, we modeled the current network configuration of the military bases and simulated the model with NS-3 tool. The result provided us for an insight regarding the required network performance between two bases.

An Effective Prevention to Credential Stuffing Attacks (효과적인 Credential Stuffing 공격 방지 방안)

  • Kim, Choungbae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.113-114
    • /
    • 2022
  • 본 논문에서는 사용자 계정 탈취인 1차 공격을 통해 수행되는 2차 공격인 크리덴셜 스터핑 공격을 효과적으로 대응할 수 있는 방안을 제안한다. 사전파일을 통해 공격을 시도하는 사전 공격보다 공격 성공 확률이 더욱 높은 이 공격은 최근 다크웹에서 거래되는 사용자 계정 정보를 구매하여 공격자가 적은 노력으로 손쉽게 계정을 탈취할 수 있어 정보화 시대에서 다양한 온라인 계정을 사용하는 사용자를 위협하고 있다. 본 논문에서는 기존에 알려진 대응 방안인 2-Factor 인증, 서비스별로 다른 패스워드 사용 방식을 응용하여 사용자가 암기하기 쉬운 특정 패턴을 활용하여 시스템별 상이한 패스워드를 더욱 쉽게 설정할 수 있도록 제안하여 크리덴셜 스터핑 공격으로부터 사용자 계정을 보호할 수 있음에 더 우수함을 보인다.

  • PDF

A Legal Study on the Game Industry Promontion Act Bill for Establishing The Game User Committee (게임산업법(안)상 게임물이용자위원회에 관한 법적 검토 연구)

  • Park, Se-Hun;Kyen, Seung-yup
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.173-174
    • /
    • 2022
  • 최근 확률형 아이템이 이용자들에게 투입 비용보다 높은 가치의 아이템을 획득할 수 있을 것이라는 막연한 기대감을 갖게 만들어, 게임 이용자의 사행성을 조장하고 과소비를 부추긴다는 우려가 제기되고 있다. 특히 복잡한 확률구조와 관련하여 허위로 표시하는 등 거짓 또는 과장 광고가 만연하여 게임 업계의 자율규제가 실효성을 잃고 게임제작업자가 허위로 확률을 고지하여 이용자들을 기만하는 사례 등이 사회적으로 문제가 되고 있다. 이에 국민의힘 하태경 의원이 일정 규모 이상 게임제작업자는 게임물이용자위원회를 두도록 하는 게임산업진흥에 관한 법률 일부개정(안)을 2021년 3월 24일 대표발의하였는데, 이 법안이 게임산업을 과도하게 규제한다는 비판이 제기되고 있는바, 해당 법안을 분석하여 입법취지에 부합하는 개선방안을 제시하고자 한다.

  • PDF

A Study on the Legal Issues of Metaverse (메타버스의 법적 쟁점에 관한 연구)

  • Jang, Su-Yeon;Kim, Young-Hee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.175-176
    • /
    • 2022
  • 코로나19로 인해 비대면 사회가 일상화되고, 가상세계를 구현하는 기반 기술 등이 발전하면서 3차원 가상세계인 '메타버스'에 대한 관심이 급증하였다. 메타버스는 다양한 분야의 활동을 할 수 있다는 점에서 기존의 사이버 공간에서 발생하는 법적 문제들과는 전혀 다른 문제들이 발생할 가능성이 있는데, 현재 메타버스 내에서 이루어지는 다양한 범죄 유형들에 대한 법적 제재나 안전장치가 제대로 마련되어 있지 않다. 이에 본 연구에서는 메타버스의 의의 및 현황을 살펴보고, 주로 문제될 것으로 예상되는 법적 쟁점 등을 검토하고자 한다.

  • PDF

Secure and Efficient Protocol for Vehicular Communication with Privacy Preservation (프라이버시를 보호하며 안전하고 효율적인 차량간 통신 프로토콜)

  • Kim, In-Hwan;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.420-430
    • /
    • 2010
  • Due to increasing demand for improving road safety and optimizing road traffic, Vehicular Ad-Hoc Networks (VANET) have been subject to extensive attentions from all aspects of commercial industry and academic community. Security and user privacy are fundamental issues for all possible promising applications in VANET. Most of the existing security proposals for secure VANET concentrate authentication with privacy preservation in vehicle-to-vehicle (V2V) and vehicle-to-roadside infrastructure (V2I) communications and require huge storage and network capacity for management of revocation list. Motivated by the fact, we propose a new scheme with security and privacy preservation which combines V2V and V2I communication. With our proposed scheme, the communication and computational delay for authentication and overhead for management of revocation list can be significantly reduced due to mutual authentication between a vehicle and a Roadside Unit (RSU) requires only two messages, and the RSU issues the anonymous certificate for the vehicle on behalf of the Trust Authority (TA). We demonstrate that the proposed protocol cannot only guarantee the requirements of security and privacy but can also provide efficiency of authentication and management of revocation list.

A Study on the System of Private Investigation

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.1
    • /
    • pp.167-174
    • /
    • 2022
  • Since the Promotion Committee was established on March 25, 2021, urging the enactment of the Detective Business Act, many opinions and attention from all walks of life have been gathered. The Detective Business system, which is also one of the presidential pledges of the current 19th President Moon Jae In, is expected to be significant in that it can promote the development of a welfare state as well as efficient parts such as meeting the demand for security reinforcement services, improving the judicial system, and enhancing internationalization. In accordance with the consensus of the nine judges of the Constitutional Court that the lower part of Article 40 of the "Act on the Use and Protection of Credit Information" which prohibits the use of similar names such as investigating the general life of certain people does not violate the Constitution, detective work became possible regardless of the general life investigation. In particular, the detective job officially appeared on August 5, 2020, and it will be able to provide effective work services to the public by competing with prosecutors, police, and lawyers who have occupied exclusive positions in the field of a criminal investigations. However, although the role of detectives is gradually expanding and society is rapidly changing, illegal activities are prevalent throughout society, and more than 1,600 companies are currently operating suspiciously using the only name of "detectives", but the police are virtually letting go of the situation saying that they are "unauthorized.", and the damage is only going to the people, so at this point, the most worrisome thing is the absence of the law. Meanwhile, amid concerns over institutions overseeing illegal activities caused by the emergence of the detective industry, private security and detectives are similar to each other as in the United States, and it is expected to be able to gain public trust by entrusting the police in charge of managing and supervising private security companies. Therefore, at this time when most OECD countries except Korea legislate the Detective Business Act, prematurely allowing only the detective industry without enacting industry-related laws and systems can further fuel social confusion and hinder the detective industry along with the new fourth industry.

A Study on the Factors Affecting Personal User's Acceptance of On-demand Software (개인 사용자의 On-demand Software 수용에 영향을 미치는 요인에 관한 연구)

  • Jun, Byoung-Ho;Lee, Ju-Hyung;Kang, Byung-Goo
    • Journal of Information Technology Services
    • /
    • v.7 no.2
    • /
    • pp.41-57
    • /
    • 2008
  • The development of service-based software and web-based application aims for providing user-demand service. On-demand software is emerging for same reason. Software delivery models like on-demand software is expected to change the software industry as an important technical revolution with the firm's strategy. Few research, however, has been done on the on-demand software. While much research on ASP and SaaS focused on firm' use, this study intends to examine the intention of using on-demand software targeting personal user. The intention to use of on-demand software was empirically examined in terms of quality, user characteristics, usefulness, easy of use, and security. Results shows that usefulness and easy of use are most significantly related to the intention of using on-demand software. Other factors are also found to affect the intention to use of on-demand software. This study contributes to improve the understanding and interest in on-demand software and it is expected to spread widely for individual user.