• Title/Summary/Keyword: Information security program

Search Result 681, Processing Time 0.024 seconds

Secure Electronic Financial Services using End-to-End Encryption (종단간 암호화(End-to-End Encryption)를 이용한 전자금융거래 정보보호 강화)

  • Kim, In-Seok;Lee, Su-Mi;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.65-71
    • /
    • 2007
  • Recently, security softwares are the program that is to protect the users from hackers in using electronic financial services. However heackers commit financial crimes to extort asserts using known hacking skills. In our paper, we analyse vulnerability that can be used to hook financial information in user application area and explain end-to-end encryption which is able to be provided by interacting keyboard security program and PKI application program.

  • PDF

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

A Study on Fingerprinting Code for Illegal Distribution Prevention (불법 유통 방지를 위한 핑거프린팅 코드에 관한 연구)

  • Lee, Jin-Heung;Park, Ji-Hwan
    • Annual Conference of KIPS
    • /
    • 2003.11c
    • /
    • pp.1839-1842
    • /
    • 2003
  • 핑거프린팅은 컨텐츠 유통 시, 구매자의 정보를 컨텐츠에 삽입함으로써 불법 유통 행위된 컨텐츠에 대하여 불법 배포자를 추적할 수 있는 기법이다. 이 방법에는 서로 다른 구매자에 의한 핑거프린팅코드를 제거하려는 공모 공격(collusion attacks)이 발생할 수 있다. 본 논문에서는 고차의 원시다항식을 이용하여 효율적이면서 공모 공격에 강인한 핑거프린팅 코드 구성 방법을 제안한다. 그리고, 제안된 방법을 오디오 데이터에 적용하여 공모 공격에 대하여 안전한 코드임을 보이고 있다.

  • PDF

A Study on Secure Authentication via Online (안전한 온라인 인증에 관한 연구)

  • Ma, Ki-Pyoung;Noh, Bong-Nam
    • Annual Conference of KIPS
    • /
    • 2014.11a
    • /
    • pp.395-398
    • /
    • 2014
  • 데스크톱 애플리케이션은 제품 활성화를 위해 제품번호나 라이선스 키, 아이디-패스워드를 이용한 인증을 활용한다. 그러나 크랙, 패치, 인증서버 우회로 인한 불법 복제 프로그램 사용 및 사용자 권한 도용이 끊이질 않고 있다. 본 논문에서는 국내외 소프트웨어 품질 향상과 정품 소프트웨어 사용 및 안전한 인증을 위해 도입해야할 기본적인 보안 요구사항을 연구하고 검증하였다.

Improved Access Control of SDP Single Packet Authorization (SDP 단일 패킷 인증의 접근통제 개선 방안)

  • Lee, sang-ku;Jung, jin-kyo;Kim, young-min
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2019.05a
    • /
    • pp.311-312
    • /
    • 2019
  • 최근 기업의 클라우드 도입 확산으로 인해 정보자산이 분산됨에 따라 보호해야 하는 접점이 점차 증가 되고 있다. 또한, 모바일의 업무 활용 증가, 망 분리 및 내부 사설 클라우드의 도입 등 기업 내 변화된 IT 환경으로 인해 네트워크 구성이 더욱 더 복잡해지고 있으며, 이로 인해 보안 수준 유지가 어려워지고 있다. 특히, 클라우드 컴퓨팅에서는 보호해야 하는 자원이 기업 외부에 분산되어 있어 기존처럼 경계를 구축하는 것은 어려운 일이다. 본 논문에서는 CSA가 주도하는 SDP 표준화 동향 및 SDP의 구성요소와 동작 원리에 대한 연구를 진행하고, 핵심 기술인 SPA 및 Dynamic Firewall 기술을 활용하여 기존 접근통제 방식의 문제점을 개선하기 위한 방안을 제시하고자 한다.

  • PDF

The Relationship between Malicious Program and security (악성 프로그램과 보안과의 관계)

  • 신학주;김지홍;지준웅
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.223-226
    • /
    • 2003
  • 정보화 사회에서 네트워크는 현실과 밀접한 관련이 있고 사람들이 많이 이용하는 네트워크에 있어서 알고는 있지만 잘 인지하지 못하고 있는 악성 코드 및 프로그램인 바이러스, 웜, 트로이목마에 대하여 설명하고 이들이 보안과 어떤 관계가 있는가에 대하여 알아본다. 본 논문에서는 이들의 공격 및 전파 방법을 알아보고 이를 통하여 해킹의 위험성이 존재함을 밝힌다.

  • PDF

A Study on the Influence of the Components Related to Information Security Governance on the Perception and Behavior of Employees (정보보안 거버넌스의 구성요소가 종업원의 보안 인식과 행위에 미치는 영향에 관한 연구)

  • Kim, Young-Gon
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.935-950
    • /
    • 2010
  • The purpose of this study is to try to find out the relationship between the perception and behavior of employees and the Information Security Governance (ISG) which consists of leadership and governance, security management and organization, security policies, security program management, user security management, and technology protection and operations. Some effective suggestions from the verification of research hypotheses and the analysis of the most appropriate model were drawn out.

Vision-based Authentication and Registration of Facial Identity in Hospital Information System

  • Bae, Seok-Chan;Lee, Yon-Sik;Choi, Sun-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.59-65
    • /
    • 2019
  • Hospital Information System includes a wide range of information in the medical profession, from the overall administrative work of the hospital to the medical work of doctors. In this paper, we proposed a Vision-based Authentication and Registration of Facial Identity in Hospital Information System using OpenCV. By using the proposed security module program a Vision-based Authentication and Registration of Facial Identity, the hospital information system was designed to enhance the security through registration of the face in the hospital personnel and to process the receipt, treatment, and prescription process without any secondary leakage of personal information. The implemented security module program eliminates the need for printing, exposing and recognizing the existing sticker paper tags and wristband type personal information that can be checked by the nurse in the hospital information system. In contrast to the original, the security module program is inputted with ID and password instead to improve privacy and recognition rate.

Information Security of Organization and Employees in Social Exchange Perspective : Using Structure-Conduct-Outcome Framework (SCO Framework을 적용한 조직과 조직원의 정보보안 준수 관계 연구)

  • Hwang, In-Ho;Kim, Sanghyun
    • The Journal of Information Systems
    • /
    • v.28 no.4
    • /
    • pp.105-129
    • /
    • 2019
  • Purpose Issues related to information security have been a crucial topic of interest to researchers and practitioners in the IT/IS field. This study develops a research model based on a Structure-Conduct-Outcome (SCO) framework for the social exchange relationship between employees and organizations regarding information security. Design/methodology/approach In applying an SCO framework to information security, structure and conduct are activities imposed on employees within an organizational context; outcomes are activities that protect information security from an employee. Data were collected from 438 employees working in manufacturing and service firms currently implementing an information security policy in South Korea. Structural equation modeling (SEM) with AMOS 22.0 is used to test the validation of the measurement model and the proposed casual relationships in the research model. Findings The results demonstrate support for the relationships between predicting variables in organization structure (security policy and physical security system) and the outcome variables in organization conduct (top management support, security education program, and security visibility). Results confirm that the three variables in organization conduct had a positive effect on individual outcome (security knowledge and compliance intention).

Automated Method for Detecting Use-After-Free Vulnerability of Windows System Calls Using Dynamic Symbolic Execution (동적 기호 실행을 이용한 윈도우 시스템 콜 Use-After-Free 취약점 자동 탐지 방법)

  • Kang, Sangyong;Lee, Gwonwang;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.803-810
    • /
    • 2017
  • Recently, social security problems have been caused by the development of the software industry, and a variety of automation techniques have been used to verify software stability. In this paper, we propose a method of automatically detecting a use-after-free vulnerability on Windows system calls using dynamic symbolic execution, one of the software testing methods. First, a static analysis based pattern search is performed to select a target point. Based on the detected pattern points, we apply an induced path search technique that blocks branching to areas outside of interest. Through this, we overcome limitations of existing dynamic symbolic performance technology and verify whether vulnerability exists at actual target point. As a result of applying the proposed method to the Windows system call, it is confirmed that the use-after-free vulnerability, which had previously to be manually analyzed, can be detected by the proposed automation technique.