• 제목/요약/키워드: International Hacking

검색결과 48건 처리시간 0.024초

S/W 개발 보안의 필요성에 따른 법 제도 및 규정 사례 분석 (Case Analysis of Legal System and Regulations according to the Needs of S/W Development Security)

  • 신성윤;정길현
    • 한국컴퓨터정보학회논문지
    • /
    • 제19권10호
    • /
    • pp.117-124
    • /
    • 2014
  • S/W 개발 보안이란 안전한 SW 개발을 위해 잠재적인 보안취약점을 제거하고, 보안을 고려하여 기능을 설계 구현하는 등 SW 개발 과정에서 일련의 보안활동을 말한다. 본 논문에서는 우리에게 정신적, 금전적으로 상당한 피해를 주는 국내외 해킹 사례를 살펴보도록 한다. 웹 사이트 공격의 약 75%가 응용프로그램 즉, S/W의 취약점을 악용한 것임을 상기시킨다. 그리고 이러한 취약점들을 많이 가지고 있는 S/W 개발 보안의 주요 이슈들을 알아보도록 한다. 그리고 보안관련 법 제도 및 규정을 공공부분과 민간부분으로 나누어 제시하도록 한다. 그리고 보안관련 법 제도 및 규정의 세부 내역들을 예를 들어 나타내 보도록 한다.

The Design and Implementation of Anomaly Traffic Analysis System using Data Mining

  • Lee, Se-Yul;Cho, Sang-Yeop;Kim, Yong-Soo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제8권4호
    • /
    • pp.316-321
    • /
    • 2008
  • Advanced computer network technology enables computers to be connected in an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, which makes it vulnerable to previously unidentified attack patterns and variations in attack and increases false negatives. Intrusion detection and analysis technologies are thus required. This paper investigates the asymmetric costs of false errors to enhance the performances the detection systems. The proposed method utilizes the network model to consider the cost ratio of false errors. By comparing false positive errors with false negative errors, this scheme achieved better performance on the view point of both security and system performance objectives. The results of our empirical experiment show that the network model provides high accuracy in detection. In addition, the simulation results show that effectiveness of anomaly traffic detection is enhanced by considering the costs of false errors.

S/W 개발 보안에 따른 법 제도 및 규정 분석 (Legal System and Regulation Analysis by S/W Development Security)

  • 신성윤;진동수;신광성;이현창;이양원
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.201-202
    • /
    • 2014
  • 본 논문에서는 우리에게 정신적, 금전적으로 상당한 피해를 주는 국내외 해킹 사례를 살펴보도록 한다. 웹 사이트 공격의 약 75%가 응용프로그램 즉, S/W의 취약점을 악용한 것임을 상기시킨다. 그리고 이러한 취약점들을 많이 가지고 있는 S/W 개발 보안의 주요 이슈들을 알아보도록 한다.

  • PDF

Real Estate Industry in the Era of Technology 5.0

  • Sun Ju KIM
    • 융합경영연구
    • /
    • 제11권6호
    • /
    • pp.9-22
    • /
    • 2023
  • Purpose: This paper aims to suggest ways to apply the leading technologies of Industry 5.0 to the housing welfare field, tasks for this, and policy implications. Research design, data, and methodology: The analysis method of this study is a literature study. The analysis steps are as follows. Technology trends and characteristics of Industry 5.0 were investigated and analyzed. The following is a method of applying technology 5.0 in the industrial field. Finally, the application areas of each technology and the challenges to be solved in the process were presented. Results: The results of the analysis are 1) the accessibility and diffusion of technology. This means that all citizens have equal access to and use of the latest technology. To this end, the appropriate use of technology and the development of a user-centered interface are needed. 2) Data protection and privacy. Residential welfare-related technologies may face risks such as personal information leakage and hacking in the process of collecting and analyzing residents' data. 3) Stability, economic feasibility, and sustainability of the technology. Conclusions: The policy implications include: 1) Enhancing technology education and promotion to improve tech accessibility for groups like the low-income, rural areas, and the elderly, 2) Strengthening security policies and regulations to safeguard resident data and mitigate hacking risks, 3) Standardization of technology, 4) Investment and support in R&D.

Internet 관련 범죄(犯罪)의 동향(動向)과 그 대책(對策) (The Trend of Internet Related Crimes and their Solution)

  • 송광섭
    • 시큐리티연구
    • /
    • 제2호
    • /
    • pp.99-123
    • /
    • 1999
  • Internet related crimes are a crime which is inter-related with high specialization ${\cdot}$ technicality ${\cdot}$ leakage of information ${\cdot}$ intellectual-offence and deviant behavior. Without the accurate countermeasure, we can't achieve the desired end. So we should find out multilateral and general measure. Always crimes go in advance of the measure, so the counter measures against, computer crime can not be final. Nevertheless, we can't be careless in making the measure, but we should always consider a counter measure. 1995. 12. 29. our country revised criminal law and consolidated direct provisions, especially on the computer-hacking. But, inspite of the revision, especially on the computer-hacking. But, inspite of the revision, we have many problems'. So, first of all, through the positive and empirical study, we should revise criminal law and computer crime related provisions systematically. As the aspects and techniques of internet related crimes are always changing with the development of computer technology, there will be many problems with principle of legality, when we apply the existing abstract provisions to the new crime. We can not be lazy in studying the emerging internet related crimes and taking concrete shape of the provision. And it will be a big help to that desirable to import the foreign provision without consideration of our reality. Without the positive and empirical study on internet related crimes, sometimes important crime will be out of reach of the punishment. Due to these day's development of computer and technology of communication, the personal computers are widely supplied and especially PC communication and exchange of the informations became the most important function. With the advent of internet, new aspects of crimes are appearing. Up to now, the fraud by using the computer or the interference in the execution of duty by the illegal operation of computer was the leading aspects of computer crime, but nowadays with the advent of internet, database crime or network crime like the computer hacking became the important aspects of internet related crimes. These new aspects of internet related crimes are defusing into domains of traditional crimes. Nevertheless to follow and punish the acts on the internet is not technically easy, and as it is emerging international shape, to settle it by international law is not that easy. Harmful acts in the information-oriented society are very diverse in kinds and aspects, and it is difficult to enumerate. The point is that among the new acts in the information-oriented society we should decide which acts are to be punished and which acts are not to be punished. It is needless to say that the criminal law should be the last resort. But owing to the characters of the characteristics of the information-oriented society, when the traditional standards can be applied, the question of what is the basis and how it can be applied in a concrete way is not settled. And if it cannot be applied, how can we make new standard is also an unsettled question.

  • PDF

News Article Identification Methods in Natural Language Processing on Artificial Intelligence & Bigdata

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Advanced Culture Technology
    • /
    • 제9권3호
    • /
    • pp.345-351
    • /
    • 2021
  • This study is designed to determine how to identify misleading news articles based on natural language processing on Artificial Intelligence & Bigdata. A misleading news discrimination system and method on natural language processing is initiated according to an embodiment of this study. The natural language processing-based misleading news identification system, which monitors the misleading vocabulary database, Internet news articles, collects misleading news articles, extracts them from the titles of the collected misleading news articles, and stores them in the misleading vocabulary database. Therefore, the use of the misleading news article identification system and methods in this study does not take much time to judge because only relatively short news titles are morphed analyzed, and the use of a misleading vocabulary database provides an effect on identifying misleading articles that attract readers with exaggerated or suggestive phrases. For the aim of our study, we propose news article identification methods in natural language processing on Artificial Intelligence & Bigdata.

Improved Multi-layer Authentication Scheme by Merging One-time Password with Voice Biometric Factor

  • ALRUWAILI, Amal;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.346-353
    • /
    • 2021
  • In this proposal, we aim to enhance the security of systems accounts by improving the authentication techniques. We mainly intend to enhance the accuracy of the one-time passwords via including voice biometric and recognition techniques. The recognition will be performed on the server to avoid redirecting voice signatures by hackers. Further, to enhance the privacy of data and to ensure that the active user is legitimate, we propose to periodically update the activated sessions using a user-selected biometric factor. Finally, we recommend adding a pre-transaction re-authentication which will guarantee enhanced security for sensitive operations. The main novelty of this proposal is the use of the voice factor in the verification of the one-time password and the various levels of authentications for a full-security guarantee. The improvement provided by this proposal is mainly designed for sensitive applications. From conducted simulations, findings prove the efficiency of the proposed scheme in reducing the probability of hacking users' sessions.

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

Analysis on Cyber Security and Its Challenges to Society

  • Shashank Mishra;Raghav Sandhane
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.141-152
    • /
    • 2024
  • Cyber security plays an important role in the field of IT industry and other industry too. Whenever we talk about cyber security, the word cybercrime pops out. Cybercrime is the biggest issues we are facing right now. Every 39 seconds an attacker is hacking something. Since 2008 to 2019 there are more than 8800 data breach cases is being found or filed. Even as we are aware of cybercrime and its stats, only 5% organization are fully secured and other 95% are not fully secured. According to survey 56% organization have weak controls. Basically they are not secured. Apart from taking measures cyber security are facing huge challenges or disturbs to many. This paper mainly focuses on dare to cyber security and also center of attraction is cyber security expertise, morals with changing in technology with time. [1]

바이오 인증 기술의 활성화에 따른 보안 위험성에 관한 연구 (A Study on Security Risk according to the activation of Bio-Authentication Technology)

  • 전정훈
    • 융합보안논문지
    • /
    • 제16권5호
    • /
    • pp.57-63
    • /
    • 2016
  • 최근 국내 외 핀테크 관련 산업분야에 대한 많은 관심과 함께 다양한 서비스들이 새로이 등장하고 있으며, 해킹 공격으로부터의 안전을 보장하기 위해, 새롭고 다양한 기술들이 개발되고 있다. 대표적인 기술로는 금융관련 분야에 적용을 고려하고 있는 바이오 인증이 있다. 바이오 인증은 생체의 일부 정보를 인증수단으로 하고 있어, 위 변조공격으로부터 안전하고 공유 및 저장에 대한 위협들에 대응할 수 있다고 알려져 있다. 그러나 최근 미국 인사관리처(Office of Personnel Management, OPM)의 생체정보(560만 건) 유출사례와 지문위조기술의 등장을 살펴볼 때, 바이오 인증의 안전성을 재고해보아야 하는 상황임을 알 수 있다. 특히, 이미 유출된 생체정보의 도용문제에 대해서 대응방안이 함께 마련되어야 할 것이다. 따라서 본 논문은 여러 산업분야에서의 생체인증기술들과 적용 사례, 취약요인들을 조사해 봄으로써, 향후, 생체인증기술 적용에 따른 침해대응 방안 마련에 활용될 것으로 기대한다.