• Title/Summary/Keyword: Media Security

Search Result 734, Processing Time 0.023 seconds

Evidence acquisition of P2P network for digital forensics (디지털 포렌식 관점의 P2P 네트워크 정보 수집 망안 연구)

  • Lee, Jin-Won;Baek, Eun-Ju;Byun, Keun-Duck;Lee, Sang-Jin;Lee, Jong-In
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.173-176
    • /
    • 2007
  • 컴퓨터 포렌식 수사에서 인터넷 사용에 대한 분석은 증거 획득에서 중요한 부분을 차지한다. 인터넷 사용 분석에는 웹브라우저 분석, 메신저 분석 그리고 Peer to Peer (P2P) 분석 등이 그 대상이 된다 그 중 본 논문에서는 최근 중요성이 대두되고 있는 P2P를 분석함으로써 P2P에서 컴퓨터 포렌식 수사에 도움이 되는 정보에 대해 알아보고 분석 방법을 제시한다.

  • PDF

Research on Intrusion Detection Visualization using Web Log Data set (웹 로그 데이터셋을 이용한 침입 상태 시각화 방안에 관한 연구)

  • Lee, Su-Young;Koo, Bon-Hyun;Cho, Jae-Ik;Cho, Kyu-Hyung;Moon, Jong-Sub
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.134-137
    • /
    • 2007
  • 최근 인터넷 사용이 폭발적으로 증가함과 더불어 웹 어플리케이션에 대한 다양한 공격이 발생하고 있다 이런 다양한 웹 공격에 대해 방어를 위해서는 효율적인 침입탐지가 가능하여야 하며, 이상행위에 대해 신속하고 적절한 정보전달이 필요하다. 다양한 보안 이벤트들에 대한 시각화 시스템은 이를 만족시켜주는 수단이다. 본 논문에서는 선행 연구였던 웹 공격 기법에 대해 분석해보고 시각화 기법을 살펴본 후, 이를 개선하여 기존 시각화 기법으로는 표현하지 못했던 웹 로그 데이터셋에 기초한 웹 이상행위의 시각화기법을 제안한다. 웹 침입탐지 시각화 시스템을 바탕으로 다양한 웹 공격에 대한 시각화 실험결과를 제시한다.

  • PDF

포렌식 관점에서의 보안 USB 현황분석

  • Lee, Hye-Won;Park, Chang-Wook;Lee, Guen-Gi;Kim, Kwon-Youp;Lee, Sang-Jin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.63-65
    • /
    • 2008
  • 저장장치는 기술의 발달로 인해 대용량화가 가속화 되었고 휴대하기 편리하게 되었다. 그 중 휴대용 저장장치로 USB 대용량 저장장치가 널리 쓰이고 있다. 더 나아가 프라이버시와 기업의 기밀, 기술정보 유출사고가 발생함에 따라 이러한 데이터를 보호하기 위해 보안기능을 제공하는 USB저장장치의 사용량이 증가하고 있다. 디지털 수사 측면에서 볼 때 이러한 USB의 보안기능은 용의자에 의해 데이터를 은폐할 목적으로 사용될 수 있다. 이러한 현재 상황에 비추어 볼 때 보안기능이 있는 USB(이하 보안 USB)에 포렌식 관점에서 중요한 증거물이 저장될 가능성이 높아졌으며, 증거로서 보안 USB를 획득하였을 때, 해당 USB에서 데이터를 획득하기 위한 대비책이 필요하다. 본 논문에서는 현재 보안 USB에 관한 동향 및 대처방안에 대해 논한다.

  • PDF

Cryptanalysis on a Block Cipher Involving Interlacing and Decomposition (Interlacing과 Decomposition을 적용한 블록 암호에 대한 분석)

  • Kang, Jin-Keon;Choi, Joon-Geun;Jung, Ki-Tae;Lee, Chang-Hoon;Hong, Seok-Hie
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.85-87
    • /
    • 2008
  • Kumar 등은 interlacing과 decomposition을 적용한 112-비트 블록 암호를 제안하였다. 본 논문에서는 이 블록 암호에 대한 첫 번째 분석 결과를 소개한다. 이 블록 암호를 구성하는 연산들은 모두 선형성만을 가지고 있다. 따라서 112개의 독립인 평문/암호문 쌍이 주어졌을 경우, 비밀키를 복구하지 않더라도 임의의 암호문을 복호화할 수 있다. 본 논문의 분석 결과를 통하여 이 블록 암호는 매우 취약함을 알 수 있다.

  • PDF

A Study on Routing Security in Wireless Sensor Networks (무선 센서 네트워크에서의 라우팅 보안 기법 비교 분석)

  • Kim, Young-Ki;Lee, Hwa-Seong;Kim, Yong-Ho;Lee, Dong-Hoon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.117-120
    • /
    • 2008
  • 무선 센서 네트워크란 물리적, 환경적 현상을 감지하기 위해 센서를 사용하는 수백 개에서 수천 개의 센서 노드로 구성된 네트워크를 말한다. 이러한 무선 센서 네트워크에서 라우팅 보안은 중요하다. 센싱된 데이터가 사용자에게 전달되지 않는다면 네트워크는 그 기능을 제대로 수행한다고 할 수 없기 때문이다. 따라서 무선 센서 네트워크에서 데이터가 목적지에 안전하게 도달하도록 하는 라우팅 보안 기법은 필수적이다. 최근의 라우팅 보안은 암호학적 기법, 네트워크 컴퓨터 알고리즘을 이용한 기법 등 다양한 접근 방법으로 연구가 이루어지고 있다. 본 논문에서는 최근의 무선 센서 네트워크 라우팅 보안 기법의 동향을 살펴보고 이들을 비교 분석한다.

  • PDF

An Improved Biometrics-based Password Authentication Scheme with Session Key Agreement

  • Yang, Hyungkyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.50-57
    • /
    • 2016
  • In 2013, Li et al. proposed an improved smart card-based remote user password authentication scheme, and claimed that their scheme not only overcomes security weaknesses of the Chen et al.'s scheme but also is a more user friendly scheme compared with other schemes. In this paper, we analyze the security of Li et al.'s authentication scheme and we show that Li et al.'s authentication scheme is still insecure against the various attacks, such as the off-line password guessing attack, the forgery attack, and the session key generation attack etc. Also, we propose an improved scheme that can resist these security drawbacks of Li et al.'s authentication, even if the secret information stored in the smart card is revealed. As a result of security analysis, the improved scheme is relatively more secure against several attacks than other related schemes in terms of the security.

A Study on Cloud-Based Secure File Management Security Solutions According yo Information Protection Needs (정보보호 필요에 따른 클라우드 기반의 안전한 파일관리 보안솔루션 연구)

  • Kim, Hee-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.243-250
    • /
    • 2019
  • In this paper, we develop a Secure File Management Security(: SFMS) based on media in a cloud environment to encrypt and decrypt cloud data on a computer using a Bluetooth - based cryptographic module. The Bluetooth cipher module makes it easy to browse files stored in the cloud, but it is never possible to browse without a module. It is a solution that fundamentally blocks the problems such as hacking and leakage of personal data that have recently become an issue.

FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention

  • Alwi M Bamhdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.179-192
    • /
    • 2023
  • The widespread use of Cloud Computing, Internet of Things (IoT), and social media in the Information Communication Technology (ICT) field has resulted in continuous and unavoidable cyber-attacks on users and critical infrastructures worldwide. Traditional security measures such as firewalls and encryption systems are not effective in countering these sophisticated cyber-attacks. Therefore, Intrusion Detection and Prevention Systems (IDPS) are necessary to reduce the risk to an absolute minimum. Although IDPSs can detect various types of cyber-attacks with high accuracy, their performance is limited by a high false alarm rate. This study proposes a new technique called Fuzzy Logic - Objective Risk Analysis (FLORA) that can significantly reduce false positive alarm rates and maintain a high level of security against serious cyber-attacks. The FLORA model has a high fuzzy accuracy rate of 90.11% and can predict vulnerabilities with a high level of certainty. It also has a mechanism for monitoring and recording digital forensic evidence which can be used in legal prosecution proceedings in different jurisdictions.

Acceptance of Social Media as a Marketing Tool : A Quantitative Study

  • Hooda, Apeksha;Ankur, Ankur
    • Asian Journal of Business Environment
    • /
    • v.8 no.3
    • /
    • pp.5-12
    • /
    • 2018
  • Purpose - The purpose of current paper is to identify features of advertisements at social media that generate the ad-click and to further identify if these advertisements lead to purchase. If no purchase is made, then reasons for not making purchase are identified. Users' purchase experience after users clicked at advertisements are also studied. Research design, data, and methodology - Research design followed is exploratory research, where various factors leading to ad-clicks and generating purchase at social media platform were explored. Raw data was gathered by means of survey among a sample of 185 respondents in India using online structured questionnaire. GLM model and multinomial regression were used to analyze the data. Results - Several factors including endorsement by friends, advertisement aesthetics, product reviews, and aggressive pricing played major role in generating ad-clicks. Major impediment to purchase on were product misrepresentation in advertisement, false discounts, and site security. Female users clicked more on social media advertisements and made more purchases compared to their male counterpart. Conclusions - Social media advertisements have significant positive effect on buying behavior of online customers. Transactions culminating from social media ad-click generated significant positive experience for social media users. Thus, social media can be effective marketing tool.

A Study on the Psychological State of the Security Subjects of National Guard (공경호원의 경호대상자 심리상태 인지)

  • Kim, Haw-Su;Kang, Min-Wan;Jo, Sung-Gu
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.73-100
    • /
    • 2012
  • Republic of Korea for the last 2012 nuclear security summit in Seoul in three days from March 26, has held great success. This industry watchers at home and abroad through professional meetings and private organizations to promote global nuclear security was intended to draw, for the preparation of this event the most important one of the things that should be addressed at the meeting was over the top guard. The national guard of heads of state and nationally significant as the important issues should be dealt with. So who is responsible for national security summit national guard for a successful guard against participants should have a higher understanding, these stories ever to be dealt with important security subjects is the psychological state of cognition. This study is currently a source of honor to escort the psychological state of subjects, and whether the search as I looked at cognition. Qualitative research methods to conduct research in-depth interview technique was used for one of the transcribed data analysis program, a non-quantitative data were analyzed using NVivo 8. As a result of this study, analysis of the problem compared with the usual methods 39 (72.2%), fine-grained observation and 15 (27.7%), through the media how cognition 41 (73.2%), marginal help of 15 (26.7%) were. The usual comparison with how honored Issue sources to detect security of those words and actions and facial expressions, etc. Security of subjects over the state of mind cognition that he, detailed observation of the national guard to security subjects the psychological state of cognition which are pre-Thorough Information subjects that can have all the information about security and the state can be obtained by saying that. Media coverage through a cognitive approach national guard of the media coverage to understand the security subjects of the political situation to understand the prerequisite that were marginal for help through the cognitive approach of security subjects surrounding the execution of security workers, Secretary in charge of protocol and security, and be propagated through the selection techniques to be utilized was that.

  • PDF