• Title/Summary/Keyword: Security Service Model

Search Result 758, Processing Time 0.029 seconds

A Study on the Models of Internal system users Authentication considering Multi Factors (다중요소 기반의 내부 사용자 인증모델에 관한 연구)

  • Lee, Jae-yun;Shim, Ho-sung;Han, Kyeong-Seok;Choi, Yong-Lak;Kim, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2044-2055
    • /
    • 2015
  • Financial information systems play such a pivotal role in the financial institution services that are provided for a large customers on the basis of various information including the personal information. As for the personal information collected during the transactions in the financial information systems, huge efforts and investment have been made to protect previously them from being inappropriately misused or illegally used if they could be released. Unfortunately, the frequent accidents on the leakage of sensitive personal information have occurred recently not only by external service users but even by internal system users. Therefore, the aim of this study is to suggest a model of advanced two-channel authentication for internal users in order to increase the stability of financial information systems with enhanced security.

An Anomalous Event Detection System based on Information Theory (엔트로피 기반의 이상징후 탐지 시스템)

  • Han, Chan-Kyu;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.173-183
    • /
    • 2009
  • We present a real-time monitoring system for detecting anomalous network events using the entropy. The entropy accounts for the effects of disorder in the system. When an abnormal factor arises to agitate the current system the entropy must show an abrupt change. In this paper we deliberately model the Internet to measure the entropy. Packets flowing between these two networks may incur to sustain the current value. In the proposed system we keep track of the value of entropy in time to pinpoint the sudden changes in the value. The time-series data of entropy are transformed into the two-dimensional domains to help visually inspect the activities on the network. We examine the system using network traffic traces containing notorious worms and DoS attacks on the testbed. Furthermore, we compare our proposed system of time series forecasting method, such as EWMA, holt-winters, and PCA in terms of sensitive. The result suggests that our approach be able to detect anomalies with the fairly high accuracy. Our contributions are two folds: (1) highly sensitive detection of anomalies and (2) visualization of network activities to alert anomalies.

A Study on the Efficiency Measurement Method for the Development Process of Online Content (온라인콘텐츠 개발프로세스의 효율성 측정방법 연구)

  • Yun, BongShik;Yoo, Sowol
    • Smart Media Journal
    • /
    • v.11 no.1
    • /
    • pp.9-16
    • /
    • 2022
  • With the development of online commercializing technology and the growth of online market, it has become extremely important for companies that aim to commercialize their products and services to control time and resources. Even when a single company has control over the entire process, it is necessary to maintain the efficiency among the process of development. In particular, when there is a lot of cooperation throughout the course of development, requiring many parties to communicate with each other, the issue of declining efficiency becomes much clearer. The timing of when to launch a product or service has become just as important as completing and testing them for companies. Companies have developed new tools to prevent situations that may lead to inefficiency in the development process, including an increase in the amount of resource used or issues with security maintenance. However, there is a lack of proper measurement tool that assesses what kind of additional benefits the entire process of the company is bringing, or whether or not the processes need to be improved in certain areas. Thus, this study aims to suggest a method to measure efficiency, to provide an empirical efficiency measurement method for the development process of online content.

Development of an intelligent edge computing device equipped with on-device AI vision model (온디바이스 AI 비전 모델이 탑재된 지능형 엣지 컴퓨팅 기기 개발)

  • Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.17-22
    • /
    • 2022
  • In this paper, we design a lightweight embedded device that can support intelligent edge computing, and show that the device quickly detects an object in an image input from a camera device in real time. The proposed system can be applied to environments without pre-installed infrastructure, such as an intelligent video control system for industrial sites or military areas, or video security systems mounted on autonomous vehicles such as drones. The On-Device AI(Artificial intelligence) technology is increasingly required for the widespread application of intelligent vision recognition systems. Computing offloading from an image data acquisition device to a nearby edge device enables fast service with less network and system resources than AI services performed in the cloud. In addition, it is expected to be safely applied to various industries as it can reduce the attack surface vulnerable to various hacking attacks and minimize the disclosure of sensitive data.

A Quantum Resistant Lattice-based Blind Signature Scheme for Blockchain (블록체인을 위한 양자 내성의 격자 기반 블라인드 서명 기법)

  • Hakjun Lee
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.76-82
    • /
    • 2023
  • In the 4th industrial revolution, the blockchain that distributes and manages data through a P2P network is used as a new decentralized networking paradigm in various fields such as manufacturing, culture, and public service. However, with the advent of quantum computers, quantum algorithms that are able to break existing cryptosystems such as hash function, symmetric key, and public key cryptography have been introduced. Currently, because most major blockchain systems use an elliptic curve cryptography to generate signatures for transactions, they are insecure against the quantum adversary. For this reason, the research on the quantum-resistant blockchain that utilizes lattice-based cryptography for transaction signatures is needed. Therefore, in this paper, we propose a blind signature scheme for the blockchain in which the contents of the signature can be verified later, as well as signing by hiding the contents to be signed using lattice-based cryptography with the property of quantum resistance. In addition, we prove the security of the proposed scheme using a random oracle model.

Study on the Positioning Method using BLE for Location based AIoT Service (위치 기반 지능형 사물인터넷 서비스를 위한 BLE 측위 방법에 관한 연구)

  • Ho-Deok Jang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.25-30
    • /
    • 2024
  • Smart City, a key application area of the AIoT (Artificial Intelligence of Things), provides various services in safety, security, and healthcare sectors through location tracking and location-based services. an IPS (Indoor Positioning System) is required to implement location-based services, and wireless communication technologies such as WiFi, UWB (Ultra-wideband), and BLE (Bluetooth Low Energy) are being applied. BLE, which enables data transmission and reception with low power consumption, can be applied to various IoT devices such as sensors and beacons at a low cost, making it one of the most suitable wireless communication technologies for indoor positioning. BLE utilizes the RSSI (Received Signal Strength Indicator) to estimate the distance, but due to the influence of multipath fading, which causes variations in signal strength, it results in an error of several meters. In this paper, we conducted research on a path loss model that can be applied to BLE IPS for proximity services, and confirmed that optimizing the free space propagation loss coefficient can reduce the distance error between the Tx and Rx devices.

The Genealogical Study on SWIFTNet Trade Service Utility and Bank Payment Obligation (SWIFTNet TSU BPO의 계보학적 연구)

  • Lee, Bong-Soo
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.3-21
    • /
    • 2016
  • The thesis examines genealogical study of various aspects to overcome lots of problems which come by when we execute SWIFTNet TSU BPO. Practical implications regarding the innovation of electronic trade infrastructure are as follows. First, the shipping documents in the SWIFTNet TSU BPO are directly sent to an importer by an exporter after the baseline is confirmed. With this process itself, therefore, the bank cannot secure the account receivable. When initiating the SWIFTNet TSU BPO deal, it is needed to set regulations on the bank's account receivable security in the contract. Second, the SWIFTNet TSU BPO should also have an institutionally unified sharing platform with security, stability and convenience. It other words, it is needed to develop services which meet e-payment paradigm and international environments through continued analysis on market changes and flow. Third, the SWIFTNet TSU is useful in terms of promptness, reduction of risk in foreign exchange payment, cost reduction. Therefore, the SWIFT should be perfectly united and linked among the banks, importer and exporter to make the SWIFTNet TSU more convenient in countries around the world. Fourth, the SWIFT should be approached from the aspect of expansion of network and creation of a new business model through analysis on these problems with a worldwide perspective. At the same time, it is necessary to build a cooperative system to share information and promote comprehensive management for efficient operation.

  • PDF

The Effect of Private Guards' Job Embeddedness on Dual Commitment (민간경비원의 직무착근도가 이중몰입에 미치는 영향)

  • Lim, Woon-Sik
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.123-151
    • /
    • 2014
  • The purpose of this study was focused on the relationship between private guards' job embeddedness and dual commitment. In this study, job embeddedness is selected as an independent variable and dual commitment is selected as a dependent variable one. job embeddedness was divided into three sub-factors such as "fit", "links", and "sacrifice", and dual commitment is again composed with organizational commitment, and career commitment. Moreover sex, age, academic background, service period, and income were selected as a control variable. To test the hypotheses, survey data from private guards in Kyungpook are collected and analyzed. Principal component method is used to see which items cluster together in each factor and to calculate factor scores. Multiple regression analysis identifies several factors which have significant effects on dual commitment. Key finding can be summarized as follow. Fist, the factor of "fit" have significant effects on organizational commitment, and career commitment. Second, the factor of "links" have significant effects on organizational commitment, and career commitment. Third the factor of "sacrifice" have significant effects on organizational commitment, and career commitment. Finally, when all the variables with significant effects are included in the final model, "links" disappear, while "fit" and "sacrifice" remain statistically significant. Based on these finding, this study suggests some policy issues to promote private guards' dual commitment.

  • PDF

Introducing Best Model of Global Terrorism Database: The Case of START Center in the U.S. (국제테러리즘데이터베이스 구축: 미국의 START 센터의 모범사례의 소개)

  • Kim, Eun-Young;Park, Sun-Young
    • Korean Security Journal
    • /
    • no.35
    • /
    • pp.7-36
    • /
    • 2013
  • Collecting international terrorism database is a challenging task not only for criminal justice personnel but also for criminologists in comparison to the case of common types of crime database. Yet, there has been growing interests and efforts in establishing a comprehensive terrorist events data base in the world. This current study has a goal to introduce an example world terrorism database case developed by START center in the United States. The START center developed the Global Terrorism Database (GTD) on the basis of by the Pinkerton Global Intelligence Service data (PGIS) originally collected by the Pinkerton. Furthermore, The START expended the GTD by collecting data from open source terrorist event data via internet and other resources. In this study, specifically, it describes the development and the nature of the GTD in general and the data collection efforts made by the STATA until today. Finally, this study provides a sketchy of the nature of the GTD data by showing the descriptive statistical analyses and time-series analyses result illustrating distribution of the world terrorism events. The limitation, policy implications and contribution of this study discussed in this paper.

  • PDF

Consumer Purchase Decision in a Mobile Shopping Mall: An Integrative View of Trust and Theory of Planned Behavior (모바일 쇼핑몰 고객들의 구매 의사 결정에 관한 연구: TPB와 신뢰의 통합적 관점에서)

  • Hong, Seil;Li, Bin;Kim, Byoungsoo
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.151-171
    • /
    • 2016
  • With the widespread adoption of mobile devices, such as smart phones and smart pads, as well as the rapid growth of mobile technologies, consumer shopping patterns are changing. This study investigates key factors of consumer purchasing intention in a mobile shopping mall context by incorporating trust belief into the theory of planned behavior. We posit perceived usefulness, perceived enjoyment, perceived ease of use, and trust belief as antecedents of behavioral attitude toward mobile shopping malls. Moreover, social influence and security are identified as key enablers of trust belief on mobile shopping malls. Data collected from 154 consumers with purchasing experience in mobile shopping malls are empirically tested against a research model using partial least squares. Analysis results show that behavioral attitude and perceived behavioral control significantly influence purchasing intention. Moreover, this study reveals the significant effects of perceived usefulness and perceived enjoyment on behavioral attitude. Trust belief indirectly influences purchasing intention through behavioral attitude and is significantly affected by social influence. Understanding consumer purchasing decision-making processes in mobile shopping malls can help service providers to develop effective marketing and operation strategies and campaigns.