• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.025 seconds

Security Model of Smart Contract Based Private BlockChain Using Commitment Scheme (커미트먼트 스킴을 응용한 사설 블록체인 기반 스마트 컨트랙트의 보안 모델)

  • Kim, Young Soo;Park, Young-Soo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.620-627
    • /
    • 2018
  • With the widespread adoption of blockchain in the field of business, the importance of confidentiality of critical information has been emerging. Although blockchain models solve the security problem regarding integrity threat by sharing transactions and making them public, it is vulnerable in terms of confidentiality. Therefore, a security mechanism to provide confidentiality of critical information and private information of a firm is necessary to utilize block chain in the process of work. In order to solve the problem, we suggest Private blockchain based cryptographic protocol application model using Smart contract commitment scheme of the Ethereum. It can contribute to activation of blockchain services by enabling non-trusted participants to perform businesses through application of smart contract enhanced in terms of confidentiality and integrity to private blockchain.

A Study of Scenario and Trends in Intelligent Surveillance Camera (지능형 감시 카메라 동향 및 시나리오 연구)

  • Chang, Il-Sik;Cha, Hyun-Hee;Park, Goo-Man;Lee, Kwang-Jik;Kim, Seong-Kweon;Cha, Jae-Sang
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.93-101
    • /
    • 2009
  • As the industrial society is developing wars, terrors, and vicious crimes is getting increased. These dangerous factors are caused of casualty and subversiveness of social order. Such vicious crimes lead people to feeling of insecurity. That is why naturally people want to build and inspect strengthened security system. CCTV camera system which can be said as the most popular security system is being installed in public places has large number of floating population. This trend is required to develop the intelligent video security technology and propagate it since the importance of security technology is getting high. This thesis will be described regarding the trend of the intelligent surveillance camera and the scenario.

  • PDF

Improvement of regulations to strengthen the safety and protect users of domestic Open Banking (국내 오픈뱅킹 안정성 강화 및 이용자 보호를 위한 규제 개선 방안)

  • Kwon, Nam Hoon;Kim, In Seok
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.37-52
    • /
    • 2020
  • The EU, the United Kingdom and South Korea are actively pursuing open banking to open financial information to fintech companies for financial structure reform and convenience of financial consumers. As open banking is gradually activated, the importance of stability and protecting users of open banking will increase. In particular, Korea has an electronic financial transaction law that has been in effect since 2007 to secure the stability and reliability of electronic financial transactions, but it is difficult to apply to participating organizations in open banking, so there is a risk of preventing security accidents and weakening user protection in open banking. Therefore, this paper examines the foreign legal system of open banking and analyzes the structure and characteristics of domestic open banking and suggests the ways to improve regulations necessary to strengthen open banking stability and user protection.

A Research on the Industry Technology Protection Way against Foreign Secret Service's HUMINT Activity (외국정보기관의 인간정보(HUMINT) 활동에 대응한 산업기술 보호방안)

  • Joo, Il-Yeob
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.317-336
    • /
    • 2008
  • The purpose of this study is to progress foreign secret service's human intelligence(HUMINT) activity through case study. This study presents confrontation way of our country analyzing characteristic of foreign secret service's human intelligence(HUMINT) activity and examples concretely. The examples that is used this study is foreign secret service's human intelligence(HUMINT) in USA and Japan. The following was the result of the study. First, we need importance awareness of persons security that correspond in foreign secret service's human intelligence activity. Second, we must secure administrative means for persons security means to correspond in foreign secret service's human intelligence (HUMINT) activity. Third, we must raise anti-espionage ability that correspond in foreign secret service's human intelligence(HUMINT) activity.

  • PDF

An Evaluation of the Necessity of Security Management of Personal Information Consignees : using Privacy Policy and ISMS data (개인정보 수탁사의 보안관리 대상 식별 방안 연구 : 개인정보처리방침 및 정보보호인증 데이터 이용)

  • Choi, Won-Nyeong;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2020
  • Business consignment using personal information is increasing for the operating profit and work efficiency of Internet companies. If the personal information leakage accident occurs at the consignee, the consigner who provided personal information will be damaged greatly. The purpose of this study is to analyze the business attributes of consignee using consigned personal information and present a model that can be used to select companies with high risk of personal information leakage by considering the importance of the involved personal information. For this, personal information consignment relations, consignment services, and personal information items used were analyzed. Social network analysis and cluster analysis were applied to select companies with high network centrality that are advisable to obtain information security certification. The results of this study could be used to establish information protection strategies for private or public enterprises that manage companies using personal information.

Current Status Regarding Online Contents Service of Army Records and Development Plan: Based on the US Army's Archives Case (군 기록의 온라인 콘텐츠 서비스 현황과 발전방안 - 미 육군의 아카이브즈 사례를 중심으로 -)

  • Kim, Yong-Chan
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.18 no.3
    • /
    • pp.1-24
    • /
    • 2018
  • International conditions surrounding the Korean Peninsula have been recently undergoing a sudden change. The South-North relations have been defined by severe tensions for many years; however, since the PyeongChang Winter Olympics, relations between the two nations began to thaw, and expectations of unification have been rising. Nevertheless, some still warn that the Democratic People's Republic of Korea is utilizing a "carrot and stick" tactic. With this, recent research revealed that there is a low sense of national security among college students and teenagers in Korea, which magnified the importance of establishing a strong sense of national security and having a national viewpoint. A way to achieve this is for the army, a core institution of national security, to release army records as online contents. This paper takes an in-depth look into the US Army's online contents service, a leading national records management system, and seeks to provide development plans for the Republic of Korea Army's online contents service.

Study on Designation of Non-Critical Information Processing System for Financial Company Cloud Computing Activation (금융회사 클라우드 활성화를 위한 비중요정보처리시스템 지정방안 연구)

  • Chang, Myong-do;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.889-903
    • /
    • 2018
  • Cloud computing has been activated globally due to the demands of the 4th industrial revolution and the efficient use of IT resources, and domestic usage is also increasing due to legislation and related laws. However, domestic financial companies are subject to various regulations due to the importance of their information and the ripple effects of accidents such as outflows. Only non-critical information processing systems that handle non-critical information are allowed to use cloud computing. Financial companies are required to set specific criteria and judgment to distinguish them. In this paper, we propose a method to enable the financial company cloud computing to be more active by specifying the ambiguous non - essential information processing system designation standard and making it easier to designate.

An Improved ID-based Anonymous Authentication Scheme for Wireless Body Area Networks (WBAN 환경에서의 개선된 ID 기반 익명 인증 기법)

  • Jeong, Min-Soo;Suk, Jae Hyuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.322-332
    • /
    • 2017
  • Wireless Body Area Networks is an environment that provides an appropriate service remotely by collecting user's biometric information. With the growing importance of sensor, WBAN also attracts extensive attention. Since WBAN is representatively used in the medical field, it can be directly related to the patient's life. Hence security is very important in WBAN. Mutual authentication between the client and the application provider is essential. And efficiency is also important because a used device is limited to computation cost. In this reason, ID-based anonymous authentication scheme in WBAN has been intensively studied. We show that the recent research result of Wu et al. which is about the ID-based anonymous authentication scheme is vulnerable to impersonation attack. And we propose a new ID-based anonymous authentication scheme that is secure against the attacks discovered in the existing schemes. Compared to the existing schemes, the computation cost of our scheme is improved by 30.6% and 7.3%.

A study of the need for education and first aid recognition level of Security major students (경호전공 대학생의 응급처치 인식 수준 및 교육 필요성에 관한연구)

  • Kang, Kyoung Soo;Choi, Pan Am
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.2
    • /
    • pp.220-230
    • /
    • 2013
  • In this study, we investigated the recognition of the first aid of guard major college students are trained to deal well and flexibly to the situation of unforeseen circumstances, you are trying to present the teaching methods and effective importance of first aid. Analysis of data collected in this study is as follows: The results obtained using the statistical program SPSS18.0. First, education has not been done properly, there is no difference between the average score of people who did not receive the people who received the fact of first aid veritable we are specialized in, the second education systematic is needed, training of first aid has not been properly implemented, problems of education there were many. Third, because there is no difference in the level of knowledge by training institutions of first aid, the places where there is training of first aid, there is no effect on the knowledge level. Therefore, it can be the need training first aid practical to enhance the ability to proactively address the situation of contingencies.

Secure and Efficient Database Searching in RFID Systems using Tag-Grouping Based on Hash-Chain (RFID 시스템에서 Hash-Chain기반 Tag-Grouping을 이용한 안전하고 효율적인 데이터베이스 검색)

  • Lee, Byeung-Ju;Song, Chang-Woo;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.9-17
    • /
    • 2009
  • RFID (Radio Frequency Identification) is a next generation technology that will replace barcode. RFID can identify an object by reading ID inside a RFID tag using radio frequency. However, because a RFID tag replies its unique ID to the request of any reader through wireless communication, it is vulnerable to attacks on security or privacy through wiretapping or an illegal reader's request. The RFID authentication protocol has been studied actively in order to solve security and privacy problems, and is used also in tag search. Recently, as the number of tags is increasing in RFTD systems and the cost of data collection is also rising, the importance of effective tag search is increasing. This study proposed an efficient search method that solved through ta9 group the problem of large volume of database computation in Miyako Ohkubo's hash chain mechanism, which meets requirements for security and privacy protection. When we searched first the group of tags with access rate of 5 or higher in a database with 100,000 records, search time decreased by around 30%.