• Title/Summary/Keyword: Security Elements

Search Result 549, Processing Time 0.027 seconds

Importance-Based Security Level Verification in Web Services (웹 서비스에서 중요도 기반 보안수준 검증)

  • Hung, Pham Phuoc;Nasridinov, Aziz;Byun, Jeongyong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1279-1280
    • /
    • 2010
  • There are some cases when SOAP message, where WS-Security and WS-Policy elements are included, may consist of a sensitive and important data. In these cases, the message is highly recommended to be secured. The question exists of how to quickly identify that SOAP message satisfies security requirement and security level of a SOAP message. In this paper, we propose a technique called Bit-Stream which depends on the importance of SOAP elements to automatically identify the vulnerabilities and risks while offering advice for higher security.

A Study on Web Service Security Testing Methodology for Performance Evaluation (웹 서비스 보안 성능 평가 테스트 방법론 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.31-37
    • /
    • 2010
  • The risks and threats in IT security systems to protect, prevent damage and Risk should be minimized. Context of information security products such as information processing, storage, delivery, and in the process of information system security standards, That is the basic confidentiality, availability, integrity and secondary clarity, potential evidence, detection, warning and defense capabilities, to ensure sufficient and should be. Web services are the most important elements in the security, the web nature of port 80 for the service to keep the door open as a structure, Web applications, web sources and servers, networks, and to hold all the elements are fundamental weaknesses. Accordingly, these elements through a set of Web application development errors and set-up errors and vulnerabilities in Web applications using their own home pages and web servers to prevent hacking and to improve the efficiency of Web services is proposed methodology performs security BMT.

Resaerch Trend and Cocentualization of Defense Industry Security From Convergence Security Perspective (융합보안 관점에서 방위산업보안 개념 정립과 연구동향 분석)

  • Woo, Kwang Jea
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.69-78
    • /
    • 2015
  • Methods that industrial spies use to smuggle core technology out are becoming more intelligent, technological, and complex, thus resulting in more serious damages. In particular, defense industries in which involve national core technology as well as institutions including labor force are industries that are in a greater need of the convergence security. Defense Industry develops, experiments, and produces defense security supplies for national security protection. Defense industry involves a number of security elements such as military secret, industrial secret, core technology labor force, defense industry supply, critical national facility, and information communication system. Defense industry security is a complex of military security and industrial security which is convergence security that integrates all security elements of defense industry. Therefore, defense industry security is a typical ideal model for convergence security. Research on defense industry security is relatively insufficient compared to research of security in other industrial fields. In order to prevent core technology of denfese industry from leaking and to protect technical professionals and institutions, research and action on defense industry security from convergence security perspective are therefore essential at this point of time.

Component Analysis of DevOps and DevSecOps (DevOps와 DevSecOps의 컴포넌트 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.9
    • /
    • pp.47-53
    • /
    • 2019
  • This paper is analyzed of the characteristics of development operations and development security operations of the software and product, and the use analysis tools from a software code perspective. Also, it is emphasized the importance of human factors and the need to strengthen them, when considering security design rules. In this paper, we consider a secure process for managing change, focusing on fast and accurate decision-making in terms of procedural factors, when considering development security operations. In addition, the paper discussed the need for maturity model analysis in relation to the development security operating characteristics, and analyzed the meaning of the analysis elements through detailed procedures for the strength and integration elements of the dynamic and static elements accordingly. The paper also analyzed factors such as scanning activity and code analysis for threat modeling and compliance and control.

Smart Contract Security Audit Trends and Services (스마트 계약 보안 감사 동향 및 서비스)

  • Chansol Park;Janghwan Kim;R. Young Chul Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.1017-1029
    • /
    • 2023
  • A large amount of transactions are taking place through Blockchain. Among them, the proportion of transactions through smart contracts is increasing. Accordingly, problems such as vulnerability attacks on smart contracts and fraud using smart contracts are increasing. Through security audits of smart contracts, developers can discover and resolve vulnerabilities, and users can distinguish whether smart contracts are fraudulent. However, there are currently no regulations and standards for security auditing of smart contracts, so services that perform security auditing are uneven. In this paper, we analyze security audit trends for smart contracts and identify what services are being provided. We investigate what elements are analyzed from smart contracts, focusing on security audit reports. Also, investigate what vulnerabilities can be detected. Finally, we investigate quality indicators for smart contracts and visualization elements of design extraction. Through this, we hope to be able to find visualization elements specialized for smart contracts.

Comparison of Users' Perception of Information Security Elements on Computer Virus Between Large and Small-and-Medium Companies (대기업과 중소기업 간의 정보보안 요소에 대한 사용자의 인지 비교: 컴퓨터 바이러스를 중심으로)

  • Kim, Jong-Ki;Jeon, Jin-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.79-92
    • /
    • 2006
  • Computer virus is one of the most common information security problems in the information age. This study investigates the difference of users' perception of security elements between large companies and small-and-medium companies on the subject of computer virus. Based on t-test, no significant difference is found in users' perception on security threat and security risk While users satisfy with the level of security policy, there is a significant difference on the level of security policy recognition between the two sizes of companies. Moreover, there are significant differences on information assets, security vulnerability and security effectiveness, which implies difference in the users' perception on importance of assets, exposure to threats and computer virus prevention efforts between large and small-and-medium companies.

Implementing of Security System using Shell Script in UNIX (UNIX상에서 Shell 스크립트를 이용한 보안 시스템 구현)

  • Lee, Min-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.868-870
    • /
    • 2003
  • In this paper, I have implemented the security system using shell script that periodically checking the security elements of unix system for security it transmit to a monitoring server and monitoring many clients. Agent of client executing by crontab scheduler, Environment of server to receive data use restricted TFTP in SunOS. And then, Because of using shell script, apply shell to system with flexible, control performance, and can meet on a sudden situation.

  • PDF

A Study on Information Security Consulting Method according to Type of Company (기업 업종에 따른 정보보안컨설팅 방법 연구)

  • Lee, Su-youn
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.121-126
    • /
    • 2015
  • Exposure of personal information that is held by hacking accident near the company has led to severe water level. And, it has changed security threat elements generated according to businessenterprise. Therefore, in this paper, I looked at security threat elements and proposed the way of appropriate information security consulting according type of company. First, In the financial and insurance industries, and should not have been compromised by a worm virus infection due to lack of awareness inside of members, by collectively apply in the same way the internal security standards of the organization to members, the risk of customer information. It shall be provided in advance that the security accident occurs due to a higher job group. Therefore, information security consulting method based on people and information is applied. Secondly, in industry of company, to perform consulting information security based on the attributes of the case industry groups.

A Study on Residents' Satisfaction Degree of Differentiated Elements in Outdoor Space of Apartment Housing (아파트 옥외공간 차별화 요소에 대한 주민 만족도 분석에 관한 연구)

  • 서주환;김도경;최성숙;김대환
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.27 no.3
    • /
    • pp.98-108
    • /
    • 1999
  • The purpose of this research is to help outdoor space planning reflected real needs of apartment residents in the differentiation elements of outdoor space, by using USC trade-off game in three apartment complexes in Seoul. This game method was used to evaluate their preference, reliability of preference degree, satisfaction degree, requirement elements such as improvement, sacrifice, maintenance of present condition, and payment possibility for improving and maintaining present condition, in addition to their preference and payment possibility of differentiation of outdoor space in the apartment complex in the future. From the statical analysis, we found the following results: 1. Reliability of preference degree was valid, inasmuch as the first elements they preferred were the almost same as the last things. 2. Elements of preference were pedestrian ways, pedestrian security facilities, various athletic facilities, and variety and high-class facilities in a play ground. 3. Satisfaction degree of differentiation elements of outdoor space was low not only in total complexes but also in each complex. As a result of analysis, these elements were not satisfied with residents. 4. Most of the differentiation elements of outdoor space in three apartment complexes, except planting traditional trees, were required to improve and maintain present condition. The cost to improve and maintain these elements able to pay by them was about 2.18 million won. Through this result, these elements were not options but prerequisites for planning outdoor space in apartment complexes. 5. In the future preference elements of differentiation of outdoor space in apartment complexes were pedestrian and jogging ways, places with water, various athletic places and facilities, multi-function resting places, green spaces in experiences, pedestrian security facilities, various athletic facilities, variety and high-class facilities in a play ground, and payment possibility for these elements was about 3.20 million won.

  • PDF

Effects of Servant Leadership of Security Martial Arts Instructors on the Exercise Commitment and Training Satisfaction (경호무도 지도자의 서번트 리더십이 운동몰입 및 수련만족에 미치는 영향)

  • Choi, Woo-Chang;Jeon, Yong-Tae;Kang, Hyeon
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.197-226
    • /
    • 2019
  • The objective of this study is to examine the effects of servant leadership of security martial arts instructors on the exercise commitment and training satisfaction of trainees. To achieve the objective of this study, the data was collected from 300 trainees of security martial arts gyms located in Seoul, Incheon, and Gyeonggi-do regions by using the convenience sampling method. Total 281 questionnaires were used for the analysis after excluding 19 questionnaires. Using the SPSS 23.0 for data-process, this study conducted the frequency analysis, exploratory factor analysis, reliability analysis, correlation analysis, and multiple regression analysis. First, all the variables showed positive(+) correlations. Second, the presentation of vision of instructors' servant leadership had positive(+) effects on the behavioral commitment while the devoted attitude of instructors' servant leadership had positive(+) effects on the cognitive commitment. Third, the presentation of vision, formation of community, and support for growth of instructors' servant leadership had positive(+) effects on the psychological elements while the presentation of vision and support for growth had positive(+) effects on the environmental elements. The presentation of vision and formation of community had positive(+) effects on the physical elements while the presentation of vision and formation of community had positive(+) effects on the educational elements. The presentation of vision, formation of community, and support for growth had positive(+) effects on the social elements. Fourth, both cognitive commitment and behavioral commitment out of trainees' exercise commitment had positive(+) effects on the psychological elements, environmental elements, physical elements, and educational elements of training satisfaction while only the cognitive commitment had positive(+) effects on the social elements. In summary, the security martial arts instructors should show the leadership like presentation of vision and devotion, and also try hard to satisfy the expectation in many areas to raise the exercise commitment.