• 제목/요약/키워드: Security technologies

검색결과 1,893건 처리시간 0.035초

VMware Workstation 가상 머신 이미지에 대한 디지털 포렌식 조사 절차 및 손상된 이미지 복구 방안 (A study on an investigation procedure of digital forensics for VMware Workstation's virtual machine and a method for a corrupted image recovery)

  • 임성수;유병영;박정흠;변근덕;이상진
    • 정보보호학회논문지
    • /
    • 제21권2호
    • /
    • pp.61-70
    • /
    • 2011
  • 가상화는 논리적인 가상환경으로 하드웨어의 물리적인 한계를 극복하기 위한 기술이다. 최근 비용 절감 및 그린 IT정책의 일환으로 가상화 환경을 도입하는 기업들이 증가하는 추세이다. 특히 데스크톱 가상화는 한 대의 물리적 컴퓨터에서 다양한 운영체제를 효율적으로 사용할 수 있기 때문에 가장 활발하게 사용되는 기술유형 중 하나이다. 가상화 기술의 핵심 요소인 가상 머신 이미지는 하드디스크 이미지와 구조적으로 다르기 때문에 조사에 어려움이 있다. 따라서 가상 머신에 대한 기술적 이해를 바탕으로 가상 머신 이미지에 적합한 조사 절차 및 방안에 대한 연구가 필요하다. 본 연구는 가장 많은 사용자를 가지고 있는 VMware Workstation 가상 머신 이미지에 대한 디지털 증거 조사 절차와 손상된 이미지에 대한 조사 방안을 제안한다.

Scalable Hierarchical Identity-based Signature Scheme from Lattices

  • Noh, Geontae;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권12호
    • /
    • pp.3261-3273
    • /
    • 2013
  • In the paper, we propose a novel adaptively secure hierarchical identity-based signature scheme from lattices. The size of signatures in our scheme is shortest among the existing hierarchical identity-based signature schemes from lattices. Our scheme is motivated by Gentry et al.'s signature scheme and Agrawal et al.'s hierarchical identity-based encryption scheme.

Review Of Some Cryptographic Algorithms In Cloud Computing

  • Alharbi, Mawaddah Fouad;Aldosari, Fahd;Alharbi, Nawaf Fouad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.41-50
    • /
    • 2021
  • Cloud computing is one of the most expanding technologies nowadays; it offers many benefits that make it more cost-effective and more reliable in the business. This paper highlights the various benefits of cloud computing and discusses different cryptography algorithms being used to secure communications in cloud computing environments. Moreover, this thesis aims to propose some improvements to enhance the security and safety of cloud computing technologies.

A Study on the Isolated Cloud Security Using Next Generation Network

  • Park, Jae-Kyung;Lee, Won Joo;Lee, Kang-Ho
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권11호
    • /
    • pp.9-16
    • /
    • 2017
  • In this paper, we propose to present a model of cloud security that has emerged as the biggest topic of cloud computing, replacing the traditional IT environment. While cloud computing is an extension of existing IT technology, security issues and threats can be applied to traditional security technologies. However, the biggest difference between a typical computing environment and a cloud computing environment is a virtualized environment with a hypervisor. Currently, there are many weaknesses in the virtualized environment, and there are few related security products. In order for a cloud computing environment to function as a reliable IT environment, we expect more research on hypervisor-based security technologies, and we expect to secure safer cloud services through a secure model over the next generation of new-based networks.

Novel VNFI Security Management Function Block For Improved Security Framework For SDN/NFV Networks

  • Alruwaili, Rahaf Hamoud;Alanazi, Haifa Khaled;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.303-309
    • /
    • 2022
  • Software Defined Networking (SDN) is a novel approach that have accelerated the development of numerous technologies such as policy-based access control, network virtualization, and others. It allows to boost network architectural flexibility and expedite the return on investment. However, this increases the system's complexity, necessitating the expenditure of dollars to assure the system's security. Network Function Virtualization (NFV) opens up new possibilities for network engineers, but it also raises security concerns. A number of Internet service providers and network equipment manufacturers are grappling with the difficulty of developing and characterizing NFVs and related technologies. Through Moodle's efforts to maintain security, this paper presents a detailed review of security-related challenges in software-defined networks and network virtualization services.

위성 통신망 보안 기술 당면 과제 및 향후 발전 방향 분석 (Present and Future Technologies of Satellite Communication Network Security)

  • 최지환;주창희
    • 한국위성정보통신학회논문지
    • /
    • 제12권3호
    • /
    • pp.50-53
    • /
    • 2017
  • 위성 통신은 무선 채널을 통한 광역 브로드캐스팅 특성으로 인하여 보안에 취약한 약점을 가지고 있음에도 불구하고, 위성 통신을 위한 보안 기법으로는 지상 통신에서 사용해 오던 상위 계층에서의 암호화를 제외하고 많은 방법이 알려져 있지 않다. 특히 물리계층에서의 재밍, 스푸핑 신호 공격 빈도가 증가함에 따라 이에 대한 대응 기술 개발이 중요하다고 할 수 있다. 본 논문에서는 위성통신망 보안 문제에 대해서 상위 계층과 물리 계층에서의 대응책에 대해 각각 정리하고, 사물인터넷 등의 지상망 적용을 위해 정보이론 관점에서 개발되고 있는 물리 계층 보안 기법의 최근 연구 결과에 대해 알아본다. 교차 계층 접근 방식을 포함하여, 위성 통신보안을 향상시킬 수 있는 향후 연구 방향을 제시한다.

오토모티브 이더넷 보안 기술 (Trends in Automotive Ethernet Security Technology)

  • 정보흥;김대원;전부선;주홍일;나중찬
    • 전자통신동향분석
    • /
    • 제33권5호
    • /
    • pp.76-85
    • /
    • 2018
  • In recent years, automobiles have evolved from simple transportation to convergence devices, and have combined the Internet of things, high-speed communications, and artificial intelligence technologies to provide people with social and cultural benefits. To provide services such as a smart traffic analysis, autonomous driving, and unmanned driving, automobiles applying these technologies are required to perform various types of sensing and image analyses for vehicle recognition and distance measurements. addition, there has been a rapid increase in the need to introduce an automotive Ethernet, that can provide a wide bandwidth to support. such technologies. In this article, we survey the latest trends in automotive Ethernet based automobiles and their security threats, and analyze the status and prospects of security technologies applied to cope with them.

Information Technologies in Higher Education Institutions: Experience of Leading Countries of the World

  • Bachynska, Nadiia;Novalska, Tetiana;Kuchnarov, Valerii;Kasian, Vladyslav;Salata, Halyna;Larysa, Grinberg
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.47-51
    • /
    • 2021
  • The article analyzes and studies that pedagogical design of the educational process using information and communication technologies in educational institutions of higher education based on the development of a model and methodology personalization of training will improve the quality of the educational process at the university and solve the identified contradiction. A qualitative analysis of foreign countries in the possibility of using information and communication technologies in educational institutions of higher education is carried out.

The Use Of Elements Of Innovative Pedagogical Technologies In Educational Activities

  • Barba, Ihor;Riazantsev, Lev;Koturha, Oleh;Poliakov, Serhii;Bondarets, Nadiia
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.117-122
    • /
    • 2021
  • The article considers the position of scientists on the concept of "pedagogical technology", identifies the signs of pedagogical technology and existing classifications, considers non-traditional (innovative) learning technologies, as well as their practical forms of application in the educational process, summarizes the results, makes recommendations for the practical application of the studied material. The article considered the basic concepts of pedagogical technology, as well as some types of non-traditional (innovative) teaching technologies. Also, examples of the use of some elements of innovative technologies in practical educational activities are given. The choice of specific non-traditional pedagogical technologies is determined by the target orientation, content specificity, individualization of training, technical equipment of the educational institution, etc.

클라우드 저장장치 가상화 시스템을 위한 보안 요구사항 제안 (Proposal of Security Requirements for the Cloud Storage Virtualization System)

  • 여영민;이찬우;문종섭
    • 정보보호학회논문지
    • /
    • 제23권6호
    • /
    • pp.1247-1257
    • /
    • 2013
  • 클라우드 저장장치 가상화 환경에서는 기존의 컴퓨터 시스템 환경과는 다른 형태의 새로운 보안 취약점들이 발생하고 있으며, 기존의 보안 시스템으로는 이러한 보안위협요소들에 대해 적절한 대응이 어려우므로 기술적 해결 방안의 수립이 시급하다. 이를 위해서는 먼저 클라우드 저장장치 가상화 기술들을 상세하게 분석하고, 클라우드 저장장치 서비스를 이용하는 다양한 이해관계자들의 보안 요구사항을 조사하여, 보안 요구사항의 기술적 가이드라인에 대한 연구가 선행되어야 한다. 이에 본 논문은 클라우드 저장장치 가상화의 보안 요구사항 정의하고, 사용자 역할별 보안 요구사항과 시스템 계층별 보안 요구사항을 각각 도출하여 계층 및 역할별 보안 요구사항을 제안한다. 제안된 보안 요구사항은 가상화 보안 솔루션을 개발할 수 있는 기초를 제공할 것으로 예상된다.