• Title/Summary/Keyword: System Vulnerability

Search Result 1,000, Processing Time 0.026 seconds

Low-weight Secure Encryption Protocol on RFID for Manufactory Automation (공장 자동화를 위한 RFID 경량 암호 프로토콜에 관한 연구)

  • Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.173-180
    • /
    • 2016
  • There has been a growing interest in automation of factories in the country. And, the development in this regard has been actively attempted. In particular, on the basis of the "innovation 3.0 strategy of manufacturing industry", interest in the smart of the manufacturing plant of small and medium-sized enterprises has increased rapidly. As well as policy for building smart plant, technical, seeking a strategic approach. But, in order to introduce such a smart plant or factory automation systems, manufacturing plant security with vulnerability and personal information protection problems, it should always be top priority there. Accordingly, we provide the applicable lightweight secure protocols in RFID communication. It is a wireless communication technology that is most often introduced for factory automation. Our proposed lightweight secure protocol in this study, less the number of calculations in comparison with the existing public key-based and the symmetric key encryption algorithm. And it is fast in compare with the existing protocol. Furthermore, we design that it system can support to low power consumption and small consume the memory size.

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.

Development of Operating Rule Curve for Multipurpose Water Supply in Heightened Agricultural Reservoir (농업용 둑높임저수지의 다중 용수공급을 위한 이수운영기준곡선 개발)

  • Park, Jong-Yoon;Jung, In-Kyun;Lee, Kwang-Ya;Kim, Seong-Joon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.4
    • /
    • pp.1389-1400
    • /
    • 2013
  • This study developed an operating rule curve (ORC) for multipurpose water supply (irrigation and environmental water) in heightened agricultural reservoir. Among the 20 reservoirs in improvement project of agricultural reservoir dam heightening, the 4 representative reservoirs (Ungyang, Gungchon, Yongam and Unam) were selected for the study according to the analysis of statistical characteristics. Available environmental water supply amounts during irrigation and non-irrigation periods, which is the range from release restricted water level to high water level were estimated by water balance analysis using reservoir operation model. Reliability, resiliency and vulnerability criteria for water system performance were used to assess the multiple water supply capacity. The ORC was presented as the percentile rank for the daily reservoir water level from the results of reservoir operation using the past couple of decades weather data. The water levels for each percentile were divided into 3 buffer sections representing drought (5~25%), normal (25~75%), and flood (75~95%) year to operate the heightened agricultural reservoir with ORC.

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

Modeling the Present Probability of Urban Woody Plants in the face of Climate Change (기후변화에 따른 도시 수종의 기후 적합성 평가모델 - 서울시를 대상으로 -)

  • Kim, Yoon-Jung;Lee, Dong-Kun;Park, Chan
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.16 no.1
    • /
    • pp.159-170
    • /
    • 2013
  • The effect of climate change on urban woody plants remains difficult to predict in urban areas. Depending on its tolerances, a plant species may stay and survive or stay with slowly declining remnant populations under a changing climate. To predict those vulnerabilities on urban woody plants, this study suggests a basic bioclimatic envelop model of heat requirements, cold tolerance, chilling requirements and moisture requirements that are well documented as the 'climatic niche'. Each component of the 'climatic niche' is measured by the warmth index, the absolute minimum temperature, the number of chilling weeks and the water balance. Regarding the utility of the developed model, the selected urban plant's present probabilities are suggested in the future climate of Seoul. Both Korea and Japan's thermal thresholds are considered for a plant's optimal climatic niche. By considering the thermal thresholds of these two regions for the same species, the different responses observed will reflect the plant's 'hardening' process in a rising climate. The model illustrated that the subpolar plants Taxus cuspidata and Ulmus davidiana var. japonica are predicted to have low suitability in Seoul. The temperate plants Zelkova serrata and Pinus densiflora, which have a broad climatic niche, exhibited the highest present probability in the future. The subtropical plants Camellia japonica and Castanopsis cuspidata var. sieboldii may exhibit a modest growth pattern in the late 21C's future climatic period when an appropriate frost management scheme is offered. The model can be used to hypothesize how urban ecosystems could change over time. Moreover, the developed model can be used to establish selection guidelines for urban plants with high levels of climatic adaptability.

Analysis of Soil Erosion Vulnerability at Alpine Agricultural Fields of HongCheon County (홍천군 산지농업지대의 토양침식취약성 분석)

  • Kim, Ki-Sung;Heo, Sung-Gu;Jung, Yeoug-Sang;Kim, Ji-Man;Lim, Kyoung-Jae
    • Journal of Korean Society of Rural Planning
    • /
    • v.11 no.2 s.27
    • /
    • pp.51-57
    • /
    • 2005
  • It has been well known that soil erosion and sediments from alpine agricultural fields are causing severe water quality and turbidity problems in receiving waters. Also these result in the loss of money because farmers have to buy top soils to provide enough root zone in the following year. Thus, there have been needs to reduce soil erosion and sediment discharge into the stream networks. To accomplish this end, an effective erosion control plans should be developed based on scientific research, not by rule of thumb. The Universal Soil Loss Equation (USLE) has been widely used to estimate the soil erosion in many countries over the years. In this study, the USLE was used to estimate soil erosion potential under different cropping scenarios in HongCheon County, Kangwon. The soil erosion potential for continuous corn cropping was the highest compared with those from continuous potato find average cropping scenarios. This indicates the soil erosion plans need to be established considering cropping system in the field. The Unit Stream Power Erosion-Deposition (USPED) was applied for HongCheon County to estimate soil erosion and deposition areas. The USPED estimated results can be used to complement USLE results in developing effective erosion control plans.

Enhanced Security Measurement of Web Application Testing by Outsourcing (외주 개발 웹 어플리케이션 테스팅의 보안성 강화 방안)

  • Choi, Kyong-Ho;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.3-9
    • /
    • 2015
  • A web application that allows a web service created by a internal developer who has security awareness show certain level of security. However, in the case of development by outsourcing, it is inevitable to implement the development centered on requested function rather than the issue of security. Thus in this paper, we improve the software testing process focusing on security for exclusion the leakage of important information and using an unauthorized service that results from the use of the vulnerable web application. The proposed model is able to consider security in the initial stage of development even when outsourced web application, especially, It can prevent the development schedule delay caused by the occurrence of modification for program created by programer who has low security awareness. This result shows that this model can be applied to the national defense area for increasing demand web application centered resource management system to be able to prevent service of web application with security vulnerability based on high test.

One Dimensional Seismic Response Analysis on Sub-ground of Architectural Heritage in Seoul, Korea (서울지역 주요 문화재 하부 지반에 대한 일차원 지진응답해석)

  • Jeon, Seongkon;Kim, Dukmoon;Kwon, Youngcheul
    • Journal of the Korean GEO-environmental Society
    • /
    • v.15 no.9
    • /
    • pp.29-36
    • /
    • 2014
  • Under the situation that the seismic vulnerability are a worsening problem in many world's megacities, the disaster preparedness including earthquake hazards is a matter of primary concern in the capital city of Korea, Seoul. Especially, because it is hard to move or dismantle the architectural heritages, the mitigation of earthquake damages is potentially more difficult than other structures. Moreover, in order to decide the proper preparedness plan against future earthquakes, it is very important to understand how soils pass the seismic waves to architectural heritages. In this paper, therefore, the ground condition and depth of bedrock was investigated by the MASW-method at heritages located in Seoul. Then one-dimensional seismic response analysis was conducted based on the distribution of shear wave velocity. As the major result of analyses, peak acceleration, site amplification factor and natural period are proposed in each site for recurrence period.

The Effects of Work Environment of Staff in Group Home for the People with Disabilities on their Job Satisfaction (장애인 공동생활가정 종사자의 업무환경이 직무만족에 미치는 영향)

  • Seok, Yeo-Hee;Choi, Hee-Chul
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.655-665
    • /
    • 2016
  • This study analyzed how work environment of staff in group homes on their job satisfaction targeting 148 persons. As a result, this study found that the staff recognize challenge and role ambiguity at the level which is above level ranging from 3.08 to 3.61 points with respect to 6 subdomains of work environment, but showed a relative vulnerability regarding comfortability, monetary reward, role conflict and workload as below average ranging from 1.80 to 2.73 points. Results of multiple regression analysis show that challenge and role ambiguity exert a significant influence on their job satisfaction. The above results suggest that it is necessary to provide staff with an opportunity for self-development and challenge by specifying service standards for social rehabilitation teachers in work environment and strengthening group home support system in various ways, enhancing support or advocacy necessary for solving problems.