• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.032 seconds

Design of Personal Information Encryption for PCI DSS Compliance (PCI DSS Compliance를 위한 개인정보 암호화 설계)

  • Woo, Man Gyun;Park, JiSu;Shon, Jin Gon
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.702-705
    • /
    • 2017
  • 최근 들어 개인정보 보호의 중요성에 대한 인식이 높아지고 있다. 개인정보 위협 요소 증가 및 유출 사고 증가 등으로 개인정보 보호 필요성이 높아지고 있으며, 개인정보보호법 발효 및 시행에 따른 기술적 보호 마련을 위하여 외국계 카드 발행사에서 지속적으로 PCI DSS(Payment Card Industry Data Security Standard)의 준수를 요청하고 있다. 카드 소유자의 데이터를 전송, 처리, 저장하는 환경에 대한 인증으로 적격업체 선정의 자격을 주기도 한다. 이러한 보안성 심의 기준이 강화되고 있으나 DB 암호화 제품인 TDE(Transparent Data Encryption) 방식의 암호화 방법은 암호화 기능 이외에 접근제어, 키 기밀성 보장을 위한 옵션의 추가 도입 검토가 필요하며, 서비스를 위해서 DB 전용 메모리 영역(SGA)의 Buffer Cache에 평문(Plain Text)으로 복호화한 후 로드하여 사용하므로 예상치 못한 또 다른 심각한 데이터 유출의 위험이 있다. 본 논문에서는 개인정보 암호화 방법을 연구하고 구현과정에서 발생한 문제에 대한 해결 과정을 설명하였다.

The railway line planning pass through the center of Seoul in the railway line of Incheon International Airport Railway (인천국제공항철도 노선에서 서울도심통과 구간의 노선 선형계획)

  • Shin Tae-Gyun;Kim In-Yong;Jung Chan-Mun;Kim Yong-Man
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1138-1143
    • /
    • 2004
  • We as a civil investment enterprise have been constructing In-cheon International Airport Railway which is a transportation means to approach In-cheon International Airport. In this alignment. a section between the Seoul station and Ka-joa follows the existing Yong-san line at the center of Seoul city and traverses Seoul subway 2,5,6 lines. So we planned that the alignment would have the shallowest depth to lie under Kyung-eui line and above the airport railroad. The alignment is planned to construct an open-box structure only 3.6m apart from the subway line 5 tunnel structure and construct the open-box structure 0.7m apart from the subway line 2 box structure. In the line planning, we investigated both the security of the existing subway structures during and after construction and the stability and workability between newly structured tunnel structures with three dimensions numerical analysis methods. Also we raised the reliability of design verification which was achieved by specialty society's review on the planned construction method.

  • PDF

Design of an RFID Authentication Protocol Using Token Key and Hash Function (토큰키와 해쉬함수를 이용한 RFID 인증 프로토콜 설계)

  • Na, Young-Nam;Han, Jae-Kyun
    • 전자공학회논문지 IE
    • /
    • v.48 no.2
    • /
    • pp.52-60
    • /
    • 2011
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag&Reader and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

Multiple Object Detection and Tracking System robust to various Environment (환경변화에 강인한 다중 객체 탐지 및 추적 시스템)

  • Lee, Wu-Ju;Lee, Bae-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.6
    • /
    • pp.88-94
    • /
    • 2009
  • This paper proposes real time object detection and tracking algorithm that can be applied to security and supervisory system field. A proposed system is devide into object detection phase and object tracking phase. In object detection, we suggest Adaptive background subtraction method and Adaptive block based model which are advanced motion detecting methods to detect exact object motions. In object tracking, we design a multiple vehicle tracking system based on Kalman filtering. As a result of experiment, motion of moving object can be estimated. the result of tracking multipul object was not lost and object was tracked correctly. Also, we obtained improved result from long range detection and tracking.

Design and Implementation of The Spam E-Mail filtering System (스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.413-417
    • /
    • 2002
  • E-mail was very particular way of communication in the past, but it becomes one of daily communication methods now. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or badthings, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF

The Cost Analysis of Network by The Function of Automatic Link Recovery (자동링크복구 기능에 따른 네트워크 비용분석)

  • Song, Myeong-Kyu
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.439-444
    • /
    • 2015
  • The Social infrastructure systems such as communication, transportation, power and water supply systems are now facing various types of threats including component failures, security attacks and natural disasters, etc. Whenever such undesirable events occur, it is crucial to recover the system as quickly as possible because the downtime of social infrastructure causes catastrophic consequences in the society. Especially when there is a network link-failure, we need an automatic link-recovery method. This means that customers are aware of network failures that can be recovered before you say that service. In this paper, we analysis the relation between Auto-recovery performance and cost.

Smart Gateway VPN Tunneling Control System based on IoT (IoT 기반 스마트 게이트웨이 VPN 터널링 제어 시스템)

  • Yang, Seungeui;Kim, Changsu;Lee, Jongwon;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.575-576
    • /
    • 2017
  • Recently, research have smart gateways can provide additional services through the IoT and Big Data. However, the existing System is number of devices connected increases to the Server, the stability of the network is degraded and data security is poor. In this paper, we design a smart gateway VPN tunneling control system based on IoT to solve these problems. we propose an effective VPN tunneling technology for low-end targets such as routers, and a method for efficiently controlling traffic in real-time in an environment where the quality of the Internet line changes dramatically. It is possible to control the sensor in the home safely through the VPN at the remote place.

  • PDF

Design of Notification Service System to Provide Disaster, Crime and Dangerous Areas Information in Country Using Wearable Devices (웨어러블 디바이스를 활용한 국가별 재난·범죄 및 위험지역 정보제공을 위한 알림 서비스 시스템 설계)

  • Jang, Jong-Wook;Oh, Joo-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.76-77
    • /
    • 2018
  • Recently, as the quality of life of the morden people has increasingly grown, the demand for traveling to foreign countries has been rapidly increasing. However, there are not enough safety systems avaliable for international travelers. Therefore, it is necessary to provide helpful information on disaster, crimes and dangerous areas by country for travelers. In this paper, we propse a smart device-based smart security notification service system for emergent situations of overseas travelers. the proposed notification system provides information about disaster, crime and dangerous areas is designed to be provided to users.

  • PDF

Design and Implementation of Alert Analyzer of Security Policy Server (보안정책 서버의 경보 데이터 분석 모듈 설계 및 구현)

  • Moon, Ho-Sung;Kim, Eun-Hee;Shin, Moon-Sun;Ryu, Ken-Ho;Jang, Jong-Su
    • Annual Conference of KIPS
    • /
    • 2002.04a
    • /
    • pp.59-62
    • /
    • 2002
  • 최근 네트워크 구성이 복잡해짐에 따라 정책기반의 네트워크 관리기술에 대한 필요성이 증가하고 있으며, 특히 네트워크 보안관리를 위한 새로운 패러다임으로 정책기반의 네트워크 관리 기술이 도입되고 있다. 보안정책 서버는 새로운 정책을 입력하거나 기존의 정책을 수정, 삭제하는 기능과 보안정책 결정 요구 발생시 정책결정을 수행하여야 하는데 이를 위해서는 보안정책 실행시스템에서 보내온 경보 메시지에 대한 분석 및 관리가 필요하다. 따라서 이 논문에서는 정책기반 네트워크 보안관리 프레임워크의 구조 중에서 보안정책 서버의 효율적인 보안정책 수림 및 수행을 지원하기 위한 경보데이터 관리기를 설계하고 구현한다. 그리고 경보 데이터 저장과 분석을 위해서 데이터베이스 스키마를 설계하고 저장된 경보데이터를 분석하는 모듈을 구현한다. 또한 불량사용자나 호스트의 관리를 위하여 블랙 리스트 매니져를 구현하며 블랙리스트 매니져는 위험한 불량사용자와 호스트를 탐지하여 관리하는 기능을 제공한다 구현된 경보 관리기나 고수준 분석기는 효율적인 보안정책관리를 지원하게 된다.

  • PDF

Analysis on Field Professionals' Assessment of Alternative Fire Escape Methods in Apartment Building (공동주택 대안적 화재 피난방식에 대한 건설전문가 평가조사)

  • Lee, Myung Sik;Lee, So Young
    • KIEAE Journal
    • /
    • v.9 no.5
    • /
    • pp.21-28
    • /
    • 2009
  • In apartment buildings, casualties, especially fatalities have occurred in balcony areas in fires if residents fail to escape to the main entrance. Potential consequences of a particular infrequent event should be considered. In attempting to design apartment buildings for fire safety, alternative escape methods such as vertical penetration could be considered. The purpose of this study is to investigate present building regulations regarding apartment buildings and examine pros and cons of the current escape method and alternative escape methods. Focus group interview was conducted to discuss problems of fire escape methods. In addition, questionnaires were distributed to field professionals working in architecture, construction and related industries. Among 500 questionnaires distributed, 192 questionnaires were collected. Usable 162 questionnaires were analyzed using SPSS 15. Regarding alternative fire escape methods, several concerns were mentioned. Safety, privacy, security, effectiveness of escape, water proof problems were raised. Based on the opinions, vertical penetration between apartment unit appeared more safe, secure, effective than horizontal penetration. However, both methods have its own pros and cons under specific contexts. Alternative escape methods need be considered for a selective options for residents in case of fire.