• Title/Summary/Keyword: Security Practice

Search Result 375, Processing Time 0.025 seconds

SVM-Based Speaker Verification System for Match-on-Card and Its Hardware Implementation

  • Choi, Woo-Yong;Ahn, Do-Sung;Pan, Sung-Bum;Chung, Kyo-Il;Chung, Yong-Wha;Chung, Sang-Hwa
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.320-328
    • /
    • 2006
  • Using biometrics to verify a person's identity has several advantages over the present practice of personal identification numbers (PINs) and passwords. To gain maximum security in a verification system using biometrics, the computation of the verification as well as the storing of the biometric pattern has to take place in a smart card. However, there is an open issue of integrating biometrics into a smart card because of its limited resources (processing power and memory space). In this paper, we propose a speaker verification algorithm using a support vector machine (SVM) with a very few features, and implemented it on a 32-bit smart card. The proposed algorithm can reduce the required memory space by a factor of more than 100 and can be executed in real-time. Also, we propose a hardware design for the algorithm on a field-programmable gate array (FPGA)-based platform. Based on the experimental results, our SVM solution can provide superior performance over typical speaker verification solutions. Furthermore, our FPGA-based solution can achieve a speed-up of 50 times over a software-based solution.

  • PDF

Research on National Cybersecurity Policy Preparing for the Reunification of North Korea and South Korea (남북통일을 대비한 국가사이버안보 정책 연구)

  • Ham, Seung-hyeon;Park, Dae-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.358-361
    • /
    • 2016
  • The North and South Korea for the peaceful reunification of the Republic of Korea, to lead the transformation and reform, and to complement the policy making and negotiations, there is a need for cyber security policy to practice. This paper explores the definition and overseas cyber terrorism and cyber warfare correspondence, correspondence between the versions of the technology between versions. Analysis of cyber security activities in the North and South confrontation, and research the cyber security policy against the unification. In this study, we compared the unification to build and operate a secure cyberspace from cyber threats and cyber security policy suggestions for ways of rational and legal.

  • PDF

A Discovery System of Malicious Javascript URLs hidden in Web Source Code Files

  • Park, Hweerang;Cho, Sang-Il;Park, Jungkyu;Cho, Youngho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.27-33
    • /
    • 2019
  • One of serious security threats is a botnet-based attack. A botnet in general consists of numerous bots, which are computing devices with networking function, such as personal computers, smartphones, or tiny IoT sensor devices compromised by malicious codes or attackers. Such botnets can launch various serious cyber-attacks like DDoS attacks, propagating mal-wares, and spreading spam e-mails over the network. To establish a botnet, attackers usually inject malicious URLs into web source codes stealthily by using data hiding methods like Javascript obfuscation techniques to avoid being discovered by traditional security systems such as Firewall, IPS(Intrusion Prevention System) or IDS(Intrusion Detection System). Meanwhile, it is non-trivial work in practice for software developers to manually find such malicious URLs which are hidden in numerous web source codes stored in web servers. In this paper, we propose a security defense system to discover such suspicious, malicious URLs hidden in web source codes, and present experiment results that show its discovery performance. In particular, based on our experiment results, our proposed system discovered 100% of URLs hidden by Javascript encoding obfuscation within sample web source files.

Practice and Improvement Scheme of Management of Human Resources in Korean Private Security Service Industry (한국 민간경비 인적자원 확보관리의 실태 및 개선방안)

  • Suh, Sang-Yul;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.81-99
    • /
    • 2008
  • Despite its legal, systematic and quantitative growth, Korean private security has not been showing satisfactory level of qualitative growth comparing to quantitative growth as it socially shocked with recent occurrence of the events and accidents. People on demand of security are making use of private security service to offset insufficient supply of security power as, especially, the incendiarism at Sungryemun last February brought out security issues for nationally important facilities and cultural assets, and other cases showed that the police would not cope with the appropriate security services under the current security system for protecting the life and property of people. For the supplementation of security power, the private security service is prevalent, but lots of service providers would not overcome its small business scale, except some large-sized security providers. There are some problem occurred as some providers employed staff who would not have the stuff for performing security service and they even committed illegal actions. Some opinions pointed out that it should come up with measures as they socially lose their credit. Therefore, this research suggests the recognition of the importance and the improvement measures of human resources management as follows. Security Service needs: 1. control of criteria for the employment/recruitment of human resources; 2. inducement of qualitative improvement of security service by ensuring excellent quality of human resources; 3. elevation of morale of organizational members with the operation of efficient promotion system; 4. introduction of professional certification system for the inflow of excellent quality of human resources.

  • PDF

Comparisons of food security, dietary behaviors and nutrient intakes between adult North Korean Refugees in South Korea and South Koreans

  • Kim, Ji Yoon;Lee, Soo-Kyung;Kim, Sin Gon
    • Nutrition Research and Practice
    • /
    • v.14 no.2
    • /
    • pp.134-142
    • /
    • 2020
  • BACKGROUND/OBJECTIVES: North Korean refugees (NKRs) in South Korea are a unique population as they must adapt in a new country with similar cultural traits but different social, political, and economic systems, but little research has been conducted on diet and nutrition in this population. This study examined food security, dietary behaviors, and nutrient intakes among adult NKRs living in South Korea and compared them to those of South Koreans. SUBJECTS/METHODS: The subjects were 139 adult NKRs (25 men, 114 women) living in the Seoul metropolitan area, and 417 age- and sex- matched South Korean controls (SKCs; 75 men, 342 women) selected from the Korea National Health and Nutrition Examination Survey (KNHANES). Food security and dietary behaviors (meal skipping, eating-out, meals with family, nutrition education and counseling, and nutrition label knowledge and utilization) were obtained using self-administered questionnaires. Nutrient intakes were assessed by 24-hr recall. The statistical analysis was performed using IBM SPSS ver. 23.0. RESULTS: In South Korea, food security had improved over the previous 12 months, but remained significantly poorer for NKR women than SKC women. Meal skipping was three times more frequent than for SKCs and eating-out was rare. Average energy intake was 1,509 kcal for NKR men and 1,344 kcal for NKR women, which was lower than those of SKCs (2,412 kcal and 1,789 kcal, respectively). Significantly more NKRs (men 24.0%, women 21.9%) showed simultaneously deficient intake in energy, calcium, iron, vitamin A, and riboflavin than SKCs (men 2.7% (P = 0.003), women 7.0% (P < 0.001)). NKR women had a significantly higher index of nutrient quality (INQ) for some nutrients than SK women. CONCLUSIONS: This study reports significant differences in food security, dietary behaviors, and nutrient intakes between NKRs and SKCs. Generally, NKRs reported lower intakes despite improved food security, but relatively good INQs across nutrients. Further research is needed to understand processes of food choice and consumption among NKRs to provide appropriate support aimed at improving diets.

Food security experiences of displaced North Korean households

  • Lee, Soo-Kyung;Nam, So-Young
    • Nutrition Research and Practice
    • /
    • v.8 no.2
    • /
    • pp.198-204
    • /
    • 2014
  • BACKGROUND/OBJECTIVES: Food shortage situation in North Korea has gained much interest, however food insecurity caused by the food shortage in North Korean households has not been much investigated. This study examined food security experiences and food consumption pattern of displaced North Korean households currently living in South Korea. SUBJECTS/METHODS: Food security experience among 51 North Korean households living in South Korea was examined using the Household Food Insecurity Access Scale (HFIAS) in three time points: immediately before childbirth, immediately before leaving North Korea, and immediately before entering South Korea. Meal/snack consumption frequencies and food diversity were also examined. RESULTS: Food security situation was the worst at the time of immediately before leaving North Korea with the average HFIAS score of 10.05. The households that were food insecure, they tended to be "severely" insecure. Although majority of the subjects reported having three or more meals a day, food diversity in their diet was very low with the average food diversity score of 2.17 immediately before childbirth and 1.74 immediately before leaving North Korea. Their diet appeared to heavily rely on grain and vegetable. CONCLUSIONS: This study is one of few that specifically examined food security of North Korean households with a pre-developed scale, and that demonstrated food security situation at different time points in quantified terms. Replicating this study with different groups of North Korean households for different time points would allow more complete understanding of impacts of food shortage. Food diversity score could provide a good way to examine changes of food consumption occurring to North Koreans in the process of adaptation. More attention to the changes occurring during adaption to South Korea should be given to understand the process and impact and to prepare public nutrition policy for the re-unified Korea.

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.

The ISO the research also the ISMS security maturity of 27001 regarding a measurement modeling (ISO 27004 information security management measurement and metric system) (ISO 27001의 ISMS 보안성숙도 측정 모델링에 관한 연구 (ISO 27004 정보보호관리 측정 및 척도 체계))

  • Kim, Tai-Dal
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.153-160
    • /
    • 2007
  • Recently, the demand against the system risk analysis and security management from the enterprises or the agencies which operate a information system is increasing even from domestic. The international against the standardization trend of information protection management system it investigates from the dissertation which it sees. It analyzed and against information property information protection management system integrated it will be able to manage a danger modeling it did it proposed. Having analyzed as well as compared the matureness of security-measurement models in regard to the global standard of proposal system, the administrative presentation for various IT technology resources. which have been managed singly so far, is now well applied under the united control of the company itself, and enabled the automated management of authentication support and renewal for ISO 27001, ISO 9000, ISO 14000, resulting in much advanced operation for both material and human resources.

  • PDF

A Study On Malicious Mail Training Model (악성메일 훈련 모델에 관한 연구)

  • Kang, Young-Mook;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.197-212
    • /
    • 2020
  • With the advent of virtual currency and electronic wallets creating a way to make financial gains based on anonymity, malicious code dissemination using malicious mail has continued to increase. In order to minimize the damage, the human factors, security awareness and the ability to respond, which are technical factors, should be improved evenly, which can be improved through malicious mail training. This study presented a model considering the performance of malicious mail training, such as practice. It was classified as a training for enhancing awareness of security for employees and detection and response to improve their ability to respond to malicious mail. A training system suitable for the purpose, the core functions of malware training, implementation and camouflage skills, and bypass techniques were described. Based on the above model, the training data conducted over three years were collected and the effectiveness of the training was studied through analysis of the results according to the number of training sessions, training themes and camouflage techniques.

Information Security and Its Awareness in Local Governments (지방자치단체의 정보보호 현황 및 인식의 변화 분석)

  • Noh, Jae In;Seo, Jin-Wan
    • Informatization Policy
    • /
    • v.23 no.1
    • /
    • pp.20-37
    • /
    • 2016
  • As the numbers of various cyber-crimes have sharply increased, the importance of securing information has also been emphasized. Despite the government's constant efforts to solve the issue, they hardly work in practice, and cases related to information security are still on the rise. This study investigates the reasons for the discrepancy that occurs when a solution is put to action. The research analyzes the recent shift in the administrative system with regard to information security and officials' awareness of the shift, focusing on members of local government. The results of the study confirm a steady attempt including changes in institutions at the level of the central government. However, there is still a lack of personnel and budget support at the local government level as well as not much change in the awareness of information security.