• Title/Summary/Keyword: Space Security

Search Result 971, Processing Time 0.03 seconds

A Study on IoT Devices Vulnerability and Security (IoT 디바이스 보안위협 및 대응방안 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.9-17
    • /
    • 2021
  • Numerous IoT devices are connected to a wireless network environment to collect and transmit data without time and space limitations, but many security vulnerabilities are exposed in these process. But IoT security is not easy to create feasible security standards and device authentication due to differences in the approach or implementation of devices and networks. However, it is clear that the improvement and application of the standard framework for enhancing the security level of the device is the starting point to help the most successful security effect. In this study, we investigate the confidentiality, integrity, availability, and access control implementation plans for IoT devices (which are the basic goals of information security), and standardized security evaluation criteria for IoT devices, and study ways to improve them.

Japanese Space Policy - Where is she going?

  • Hashimoto, Yasuaki
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.9
    • /
    • pp.435-443
    • /
    • 1997
  • Passing 26 years from 1970 when the first satellite was launched into the orbit, Japan developed and successfully launched H-II from Tanegashima Space Center in 1994. During those period, Japanese space policy has experienced a big shake from independent development to technology import from the US, and back again to independent development. In general, the H-II rocket which was manufactured by 100% domestic technology, brings Japan from the old era (experimental stage) to the new era (practical use stage). Fundamental Policy of Japan's Space Activities, which decides such policy as mentioned, was revised in January, 1996 this year after an interval of 7 years. This revised outline confirms the result of Japanese space technology until present and identifies the future direction and framework of her space activities for a period of coming ten years on the basis of a ong-term perspective towards the 21st century. However, when comparing with the last Fundamental Policy in 1989, there seems no big change in it, and a long-term perspective is also not seen there. The description varies on some important points in international space law, like international cooperation, protection of environment, commercial use, etc. In addition, the immaturity as well as the necessity of broader discussion are felt because neither this Fundamental Policy nor The National Defense Program Outline treated any national and international security matters concerning outer space. Considering the present time when Japan enters into the practical use of outer space, such as application, commercial use and launching service, etc, it is doubtful whether new Fundamental Policy was properly planned or not. It seems necessary to use several measures by which the public opinion, opinions from industry and debate on the security are reflected in the policy making.

  • PDF

A Study on BIM based Process Risk Management Model (BIM 기반의 프로젝트 단계별 리스크관리 모델에 관한 연구)

  • Jeon, Seung-Ho;Choi, Myung-Seok;Lee, Joo-Ho
    • Journal of Korean Society of societal Security
    • /
    • v.3 no.1
    • /
    • pp.61-66
    • /
    • 2010
  • Recently a construction industry introduces information technology that brings about many advantages in the early planning phase, design phase and construction phase. Nevertheless a BIM has a many benefits, it has limits which are not only usually using 3D modeling but also limit of making full use of practical affairs because of a lack of connecting varietals of progress of work. To solve these uppermost limits, this research is presenting unified systems to use in risk management which are efficient management of space and non-space information, space analysis.

  • PDF

A Design of Electronic Evidence-seizure Mechanism for the Response of Information-warfare (정보전 대응을 위한 전자적 증거포착 메커니즘 설계1))

  • Park, Myeong-Chan;Lee, Jong-Seop;Choe, Yong-Rak
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.285-314
    • /
    • 2004
  • The forms of current war are diversified over the pan-national industry. Among these, one kind of threats which has permeated the cyber space based on the advanced information technology causes a new type of war. C4ISR, the military IT revolution, as a integrated technology innovation of Command, Control, Communications, Computer, Intelligence, Surveillance and Reconnaissance suggests that the aspect of the future war hereafter is changing much. In this paper, we design the virtual decoy system and intrusion trace marking mechanism which can capture various attempts and evidence of intrusion by hackers in cyber space, trace the penetration path and protect a system. By the suggested technique, we can identify and traceback the traces of intrusion in cyber space, or take a legal action with the seized evidence.

  • PDF

The Processing Method for a Reverse Nearest Neighbor Queries in a Search Space with the Presence of Obstacles (장애물이 존재하는 검색공간에서 역최대근접질의 처리방법에 관한 연구)

  • Seon, Hwi Joon;Kim, Hong Ki
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.81-88
    • /
    • 2017
  • It is occurred frequently the reverse nearest neighbor queries to find objects where a query point can be the nearest neighbor object in recently applications like the encrypted spatial database. In a search space of the real world, however, there are many physical obstacles(e.g., rivers, lakes, highways, etc.). It is necessary the accurate measurement of distances considered the obstacles to increase the retrieval performance such as this circumstance. In this study, we present the algorithm and the measurement of distance to optimize the processing performance of reverse nearest neighbor queries in a search space with the presence of obstacles.

Image Encryption with The Cross Diffusion of Two Chaotic Maps

  • Jiao, Ge;Peng, Xiaojiang;Duan, Kaiwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1064-1079
    • /
    • 2019
  • Information security has become increasingly important with the rapid development of mobile devices and internet. An efficient encryption system is a key to this end. In this paper, we propose an image encryption method based on the cross diffusion of two chaotic maps. We use two chaotic sequences, namely the Logistic map and the Chebyshev map, for key generation which has larger security key space than single one. Moreover, we use these two sequences for further image encryption diffusion which decreases the correlation of neighboring pixels significantly. We conduct extensive experiments on several well-known images like Lena, Baboon, Koala, etc. Experimental results show that our algorithm has the characteristics of large key space, fast, robust to statistic attack, etc.

A Novel Active User Identification Method for Space based Constellation Network

  • Kenan, Zhang;Xingqian, Li;Kai, Ding;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.212-216
    • /
    • 2022
  • Space based constellation network is a kind of ad hoc network in which users are self-organized without center node. In space based constellation network, users are allowed to enter or leave the network at any given time. Thus, the number of active users is an unknown and time-varying parameter, and the performance of the network depends on how accurately this parameter is estimated. The so-called problem of active user identification, which consists of determining the number and identities of users transmitting in space based constellation network is discussed and a novel active user identification method is proposed in this paper. Active user identification code generated by transmitter address code and receiver address code is used to spread spectrum. Subspace-based method is used to process received signal and judgment model is established to identify active users according to the processing results. The proposed method is simulated under AWGN channel, Rician channel and Rayleigh channel respectively. Numerical results indicate that the proposed method obtains at least 1.16dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

Factors Affecting Information Protection Efforts for Preventing Deviant Behavior of Adolescent in Cyber Space (사이버 일탈행위 예방을 위한 개인 정보보호 노력의 영향요인 연구)

  • Um, Myoungyong;Park, Jin-Hee;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.5
    • /
    • pp.31-41
    • /
    • 2005
  • The purpose of this study is to identify the determinants of planned behavior of adolescent, toward information security and cyber crime prevention. A survey methodology was used to investigate a proposed model of influence, and regression analysis was used to analyze the results. The hypothesized model was largely supported by this analysis, and the overall results indicate that the intention to actively participate in information security and cyber crime prevention is mostly influenced by the fear for cyber crime and the perceived usefulness of information security and cyber crime prevention activity. In addition, it was found that the perceived easy of use for information-security related ICT skill, fear for cyber crime, and social norm for information security influence the level of usefulness, but that the prior experience with information leaking was statistically insignificant factor to the level of usefulness and fear for crime. Useful suggestions for promoting information security and cyber crime prevention are also provided.

  • PDF

A Study on the Security Threat Response in Smart Integrated Platforms (스마트 통합플랫폼 보안위협과 대응방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.129-134
    • /
    • 2022
  • A smart platform is defined as an evolved platform that realizes physical and virtual space into a hyper-connected environment by combining the existing platform and advanced IT technology. The hyper-connection that is the connection between information and information, infrastructure and infrastructure, infrastructure and information, or space and service, enables the realization and provision of high-quality services that significantly change the quality of life and environment of users. In addition, it is providing everyone with the effect of significantly improving the social safety net and personal health management level by implementing smart government and smart healthcare. A lot of information produced and consumed in these processes can act as a factor threatening the basic rights of the public and individuals by the informations themselves or through big data analysis. In particular, as the smart platform as a core function that forms the ecosystem of a smart city is naturally and continuously expanded, it faces a huge security burden in data processing and network operation. In this paper, platform components as core functions of smart city and appropriate security threats and countermeasures are studied.

CYBERCRIME AS A THREAT TO UKRAINE'S NATIONAL SECURITY

  • Varenia, Nataliia;Avdoshyn, Ihor;Strelbytska, Lilia;Strelbytskyy, Mykola;Palchyk, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.73-83
    • /
    • 2021
  • The information space, the main components of which are information resources, means of information interaction, and information infrastructure, is a sphere of modern social life in which information communications play a leading role. The objective process is the gradual but stable entry of the national information space into the European and world information sphere, in the context of which there is a legitimate question of its protection as one of the components of the national security of Ukraine. However, the implementation of this issue in practice immediately faces the need to respect the rights and fundamental freedoms guaranteed by international regulations and the Constitution of Ukraine, especially in the field of cybersecurity. The peculiarity of the modern economy is related to its informational nature, which affects the sharp increase in cyber incidents in the field of information security, which is widespread and threatening and affects a wide range of private, corporate, and public interests. The problem of forming an effective information security system is exacerbated by the spread of cybercrime as a leading threat to information security both in Ukraine and around the world. The purpose of this study is to analyze the state of cybersecurity and on this basis to identify new areas of the fight against cybercrime in Ukraine. Methods: the study is based on an extensive regulatory framework, which primarily consists of regulatory acts of Ukraine. The main methods were inductions and deductions, generalizations, statistical, comparative, and system-structural analysis, grouping, descriptive statistics, interstate comparisons, and graphical methods. Results. It is noted that a very important component of Ukraine's national security is the concept of "information terrorism", which includes cyberterrorism and media terrorism that will require its introduction into the law. An assessment of the state of cybersecurity in Ukraine is given. Based on the trend analysis, further growth of cybercrimes was predicted, and ABC analysis showed the existence of problems in the field of security of payment systems. Insufficient accounting of cybercrime and the absence in the current legislation of all relevant components of cybersecurity does not allow the definition of a holistic system of counteraction. Therefore, the proposed new legal norms in the field of information security take into account modern research in the field of promising areas of information technology development and the latest algorithms for creating media content.