• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.027 seconds

A Study on the Rise and prospect of the Middle East Terrorism (중동 Terrorism의 대두와 전망)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.409-441
    • /
    • 2005
  • During reformation of the world order in the 21st century, the terrorism has been showing up as a new value and rising up as core element of determining human being's quality of lives. The middle east's terrorism is leading the international terrorism and it is originated from the religious ideology which has formed for centuries and struggles for regional influence. This is the conflict aspect coming from the opposition of religious ideologies and cultural dislocations. It concludes as confrontation between the terrorism of Islam fundamentalism and western christianity that America is leading after the terrorist attack on the World Trade Center on September 11, 2001. There is little prospect for an improvement of their relationship. The Terrorism supported by government might be eradicated by America's drastic anti-terrorism policy. However, it will be serious and spread all over the world that the terrorist attacks against America and western countries is acted by militant warriors of Islamic fundamentalism, uniting Arab and Islamic peoples' emotions against America. Terrorism is urgent menace to Korea and it is needed to take measures to cope with it considering their religion and people throughly.

  • PDF

A Study for a Method of Designing of Security Domain Infrastructure and Its Efficiency Measuring (네트워크 보안 서비스 향상을 위한 도메인 구조설계와 성능분석 방법)

  • Moon, Song-Chul;Noh, Si-Choon;Jung, Ji-Moon
    • Journal of Digital Contents Society
    • /
    • v.11 no.3
    • /
    • pp.331-339
    • /
    • 2010
  • On intranet system, it is essential element for providing information to decrease response time. To realize this efficiencies of response time of the network, a lot of research have been conducted. The purpose of the research and implementation is to shorten the response time of information system. We can realize final goal of information system through fast response time. This final goal of information system is to secure the performance efficiency within the required time. In order to acquire the method of warranty of fast response time, the efficient measurement method is essential. This research suggests a latency test techniques being used on infrastructure system and also offers a response time measurement methodology. Methodology proposed in this research has proven that it is possible to measure response time through the scheduled method. Also it is possible to develop a enhanced networking capabilities, and information system capabilities for the development of information system.

A study on the detection of DDoS attack using the IP Spoofing (IP 스푸핑을 통한 DDoS 공격 탐지 방안에 대한 연구)

  • Seo, Jung-Woo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.147-153
    • /
    • 2015
  • Since the DoS(Denial of Service) attack is still an important vulnerable element in many web service sites, sites including public institution should try their best in constructing defensive systems. Recently, DDoS(Distributed Denial of Service) has been raised by prompting mass network traffic that uses NTP's monlist function or DoS attack has been made related to the DNS infrastructure which is impossible for direct defense. For instance, in June 2013, there has been an outbreak of an infringement accident where Computing and Information Agency was the target. There was a DNS application DoS attack which made the public institution's Information System impossible to run its normal services. Like this, since there is a high possibility in having an extensive damage due to the characteristics of DDoS in attacking unspecific information service and not being limited to a particular information system, efforts have to be made in order to minimize cyber threats. This thesis proposes a method for using TTL (Time To Live) value in IP header to detect DDoS attack with IP spoofing, which occurs when data is transmitted under the agreed regulation between the international and domestic information system.

A Study on the Authentication Model using Integrated Management Center (통합관리센터를 이용한 인증 모델에 관한 연구)

  • Jin, Kwang-Youn;Choi, Shin-Hyeong;Seo, Jang-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.576-583
    • /
    • 2010
  • U-City includes various information devices and network techniques, which connect among several information devices. Integrated Management Center, which is the core element of u-City, is designed to manage all services of u-City and carry out the control function for a city. Accordingly, u-City needs the methods of user authentication and security, so these methods must be implemented to integrated management center. This paper is devoted to describe some conventional authentication techniques, and authentication methods and procedures that may be available to u-City network context. Proposed u-City integrated authentication model assigns IP to only right user after authenticating information terminals and users in u-City and authorizes users according to the policy, so this model plays an important role for the security of integrated management center.

Forensic Analysis of chatting messenger service in KakaoTalk and Comparison Study of KakaoTalk and WhatsApp Artifacts (KakaoTalk의 채팅 메시지 포렌식 분석 연구 및 WhatsApp의 Artifacts 와의 비교 분석)

  • Yoon, JongCheol;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.777-785
    • /
    • 2016
  • IM(Instant Messenger) chatting service can carry user's various information including life style, geographical position, and psychology & crime history and thus forensic analysis on the IM service is desirable. But, forensic analysis for KakaoTalk's chatting service is not well studied yet. For this reason, we study KakaoTalk's forensic analysis focusing on chatting service. This paper first details a general method of IM forensics investigating the previous articles about IM forensics although there are not many articles. Second, we discuss methodologies for IM forensics wherein we present analysis of table structure and method for reconstruction of chatting message. These result in the basic element of forensic tools of KakaoTalk chatting message. Last, we compare artifacts of KakaoTalk with that of WhatsApp. We conclude that these applications are, at least, different in that table structures and the ways to reconstruct chatting messages are not same and therefore digital evidences or artifacts are not same and somewhat distinct.

The Impact of Safety Accident on Teacher's Educational Activities in School (학교 안전사고가 교사의 교육활동에 미치는 영향)

  • Choi, Mi-Ri;Park, Jeong-Hun
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.535-548
    • /
    • 2007
  • Followed by government authorized data that Ministry of Education submitted, safety accident at school has been increased year by year. Safety accident occurred 33,834 in 2005, 29,955 in 2004, and 22,722 in 2003. It shows that it has been increased about 12.9% from 2004 and 48.9% in 2003. Level of student's development, students are at the point of not having enough judgement and ability to adapt at emergency situation. They are learned about safety by education and management by teachers but teachers will get heavy burden and anxiety if government doesn't provide more improved support and restraint. On this situation, educational authority can be attacked and it legally charged by nation, owned property can be loss or prosecution can be occurred. Also school safety accident which occurs in these days is working as an negative insecurity element that teachers cannot concentrate on the education.

  • PDF

Stress History Evaluation for Truss Bridge with Local Damages by Using Global-Local Model Combination (전체해석과 국부해석 조합법을 이용한 국부결함이 있는 트러스교 응력이력해석)

  • Kim, Hyo-Jin;Park, Sang-il;Bae, Gi-Hoon;Lee, Sang-Ho
    • Journal of Korean Society of societal Security
    • /
    • v.3 no.1
    • /
    • pp.33-42
    • /
    • 2010
  • This study predicts the stress history for truss bridge with local damages by using global-local model combination method. For this end, the global structure is modeled by 3D frame elements and the selected local details are modeled by shell elements. Then superposition principle enable the global-local model to be combined interactively. Because the frame model cannot consider the rigidity of gusset plate and the interation of structural members due to the complexity of stress distribution in truss connection. The section modification factors are proposed to calibrate the stiffness of global frame element. The global-local model combination is verified by comparing the numerical results with experimental data obtained from the proof loading test to the operating truss bridge. Furthermore, stress histrories of the truss bridge are generated in the consideration of the rigidity of truss connection with local damage by using the combination method.

  • PDF

A Cluster-Header Selecting Method for more Secure and Energy-Efficient in Wireless Sensor Network (무선 센서 네트워크에서 안전하고 에너지 효율적인 클러스터 헤더 선출 기법)

  • Kim, Jin-Mook;Lee, Pung-Ho;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.107-118
    • /
    • 2007
  • Distributed wireless sensor network in various environment have characteristic that is surveillance of environment-element and offering usefully military information but there is shortcoming that have some secure risks. Therefore secure service must be required for this sensor network safety. More safe and effective techniques of node administration are required for safe communication between each node. This paper proposes effective cluster-header and clustering techniques in suitable administration techniques of group-key on sensor network. In this paper, first each node transmit residual electric power and authentication message to BS (Base-Station). BS reflects "Validity Authentication Rate" and residual electric power. And it selects node that is more than these regularity values by cluster header. After BS broadcasts information about cluster header in safety and it transmits making a list of information about cluster member node to cluster header. Also, Every rounds it reflects and accumulates "Validity Authentication Rate" of former round. Finally, BS can select more secure cluster header.

  • PDF

A Transaction Analysis Model for OpenADR 2.0b Payload (OpenADR 2.0b 페이로드 트랜잭션 분석 모델 연구)

  • Choi, Min-Young;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.23-30
    • /
    • 2017
  • OpenADR is a national standard communication protocol of demand response service. OpenADR uses XML message, called a payload, to support logical transaction of demand response service. For this purpose, OpenADR defines a XML element as transaction identifier which is called requestID. Unfortunately, OpenADR 2.0b profile specification describes some information about requestID but, it is not enough for understanding properly. Ambiguous definition of payload transaction makes vulnerabilities of implementing VEN & VTN and confuses mapping OpenADR 2.0b protocol into other smart grid protocols. Therefore, this paper redefines payload transaction to solve an ambiguous information of OpenADR 2.0b profile specification, proposes a model of analyzing payload transaction, and shows how to detect a payload transaction vulnerability in real-world.

Physical activity convergence contents for health care of the elderly (융합형 노인건강관리 신체활동 콘텐츠)

  • Kang, Sunyoung;Kang, Seungae
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.63-68
    • /
    • 2015
  • In rapid aging society, the disease prevention and management for healthy life of the elderly is very important. Regular physical activity is known to be a useful intervention for the physical and mental health of the elderly. In this study, we explore the convergence contents using IT technology as the intervention for encouraging the regular physical activity in the elderly. There are u-Healthcare and serious game as the convergence of health care and IT technology, and the serious game which is added special purpose such as education, training, and treatment to the fun-one of the game element- can be suitable to provide a variety of contents that leads to physical activity in the elderly. The contents inducing physical activities are "Puffer(ATARI, USA)", "WiiFit(Nintendo, JAPAN)", "Age Invaders(MXR Lab, SINGAPORE)", "Xbox $360^{\circ}$+kinect(Microsoft, USA)", "Tangible bicycle game(Donsin Univ., KOREA)", and "3D Gateball game(Soongsil Univ., KOREA)", and these contents can help health care of the elderly. By increasing physical activity through the use of these contents, it will be able to promote physical fitness and body function required in daily life, disease prevention, and maintain health in the elderly.