• Title/Summary/Keyword: Virtual Asset Service

Search Result 8, Processing Time 0.025 seconds

Improvement of ISMS Certification Components for Virtual Asset Services: Focusing on CCSS Certification Comparison (안전한 가상자산 서비스를 위한 ISMS 인증항목 개선에 관한 연구: CCSS 인증제도 비교를 중심으로)

  • Kim, Eun Ji;Koo, Ja Hwan;Kim, Ung Mo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.249-258
    • /
    • 2022
  • Since the advent of Bitcoin, various virtual assets have been actively traded through virtual asset services of virtual asset exchanges. Recently, security accidents have frequently occurred in virtual asset exchanges, so the government is obligated to obtain information security management system (ISMS) certification to strengthen information protection of virtual asset exchanges, and 56 additional specialized items have been established. In this paper, we compared the domain importance of ISMS and CryptoCurrency Security Standard (CCSS) which is a set of requirements for all information systems that make use of cryptocurrencies, and analyzed the results after mapping them to gain insight into the characteristics of each certification system. Improvements for 4 items of High Level were derived by classifying the priorities for improvement items into 3 stages: High, Medium, and Low. These results can provide priority for virtual asset and information system security, support method and systematic decision-making on improvement of certified items, and contribute to vitalization of virtual asset transactions by enhancing the reliability and safety of virtual asset services.

A Study on the Metaverse Framework Security Service (메타버스 서비스를 위한 보안 모델 연구 )

  • Do-Eun Cho
    • Journal of Platform Technology
    • /
    • v.10 no.4
    • /
    • pp.82-90
    • /
    • 2022
  • emerging. And it shows numerous possibilities and tremendous potentials in the virtual world. This metaverse is not limited to one type, but it is evolving and developing into a service in the form of a virtual convergence economy by breaking down boundaries. As a result, various security issues in metaverse are emerging. Metaverse performs all activities in the virtual space, so various problems such as privacy infringement, virtual asset theft, or fraud can occur. In this paper, a service security model is proposed to provide safe services on metaverse. To this end, we analyze security threats in the metaverse framework and propose a security service model to prevent threats. By evaluating the security of the proposed model, it was shown that safe services are effectively possible on the metaverse.

A Study on Transaction Service of Virtual Real Estate based on Metaverse (메타버스 기반 가상부동산 거래 서비스 연구)

  • Yoo, Jongyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.2
    • /
    • pp.83-88
    • /
    • 2022
  • The purpose of this study is to present an analysis and implications for the metaverse-based virtual real estate transaction service. Through blockchain-based technology and metaverse, the world we live in is expanding naturally. Therefore, changes in the environment and perceptions of market participants are also very important factors. The concept and thinking about the existing asset value change and investment are also changing. This means that you can generate profits through value and investment in intangible assets. The service user aspect is a case of investing in the future value of virtual real estate that if more users participate rather than the present value, the principle of supply and demand will be applied to increase the number of consumers and the price will naturally rise according to the principle of scarcity. The service provider provides a technical platform for the service to directly transact the portion of the virtual area considered of interest directly through the virtual real estate purchase business. As the number of participants increases as well as funds and transaction fees, various revenue models such as advertisements can be discovered and provided. It plays the role of providing jobs and information through new services. As a stakeholder, governments can exploit the emergence of new technologies and products to create people and services and secure economic benefits. Of course, various institutional supports should be provided so that new services can settle in the market while mitigating risk factors. This study is meaningful in that it contributes to the establishment of a domestic metaverse-based environment and related research and is utilized in the study of virtual space real estate services.

Tracking of cryptocurrency moved through blockchain Bridge (블록체인 브릿지를 통해 이동한 가상자산의 추적 및 검증)

  • Donghyun Ha;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.32-44
    • /
    • 2023
  • A blockchain bridge (hereinafter referred to as "bridge") is a service that enables the transfer of assets between blockchains. A bridge accepts virtual assets from users and delivers the same virtual assets to users on other blockchains. Users use bridges because they cannot transfer assets to other blockchains in the usual way because each blockchain environment is independent. Therefore, the movement of assets through bridges is not traceable in the usual way. If a malicious actor moves funds through a bridge, existing asset tracking tools are limited in their ability to trace it. Therefore, this paper proposes a method to obtain information on bridge usage by identifying the structure of the bridge and analyzing the event logs of bridge requests. First, to understand the structure of bridges, we analyzed bridges operating on Ethereum Virtual Machine(EVM) based blockchains. Based on the analysis, we applied the method to arbitrary bridge events. Furthermore, we created an automated tool that continuously collects and stores bridge usage information so that it can be used for actual tracking. We also validated the automated tool and tracking method based on an asset transfer scenario. By extracting the usage information through the tool after using the bridge, we were able to check important information for tracking, such as the sending blockchain, the receiving blockchain, the receiving wallet address, and the type and quantity of tokens transferred. This showed that it is possible to overcome the limitations of tracking asset movements using blockchain bridges.

  • PDF

Analysis of technical environment of domestic fintech companies (국내 핀테크 기업의 기술 환경 분석)

  • Choi, Yoo-jung;Choi, Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1384-1389
    • /
    • 2020
  • Although the fintech industry is developing rapidly around the world, the domestic development situation is rather slow compared to the speed. Therefore, the future development direction can be set by analyzing the current status of the fintech industry in order to suggest the direction of development in the domestic fintech industry. The main services provided by companies belonging to the domestic fintech industry are in the areas of remittance settlement, financial investment, asset management, crowdfunding, P2P finance, overseas remittance, fintech SI, insurtech, virtual currency, security, and authentication. It is divided into. This study identifies the main technologies used in the service and grasps the current domestic status. In addition, it analyzes the distribution of workers by each service. This study is expected to play an important role in the development of the financial industry through technical analysis of fintech companies.

A Study on Improvement Measures for Internal Controls in Cryptocurrency (가상자산 운영의 위험관리를 위한 내부통제 개선방안에 관한 연구)

  • Byoung Hoon Choi;JinYong Lee;Sam Hyun Chun
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.51-57
    • /
    • 2024
  • Cryptocurrency service providers and virtual asset operators, built on blockchain technology, face transaction risks such as cyber threats, wallet theft by internal personnel, theft of customers' private keys, and fraudulent cryptocurrency transfer signatures. To ensure secure operations against these threats, their security is validated through the ISMS-P certification. This study to analyze the risks presented in ISO TR 23576, which is specialized for cryptocurrency service providers and operators, in addition to the ISMS-P certification they obtain. The study will focus on the detailed inspection items of ISMS-P and ISO TR 23576 for cryptocurrency service providers and assess their importance. Based on this analysis, the study proposes an internal security control process for cryptocurrency service providers to address the top-priority risks, enabling practitioners to perform security control tasks more efficiently.

A Method to Reduce Interference in Sensor Network Location Awareness System (센서 네트워크 기반 위치 인식 시스템 간섭의 최소화 방안에 관한 연구)

  • Lee Hyung-Su;Song Byung-Hun;Ham Kyung-Sun;Youn Hee-Yong
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.31-39
    • /
    • 2006
  • Ubiquitous and pervasive environment presents opportunities for a rich set of location aware applications such as car navigation and intelligent robots, interactive virtual games, logistics service, asset tracking etc. Typical indoor location systems require better accuracy than what current outdoor location systems provide, Outdoor location technologies such as GPS have poor indoor performance because of the harsh nature of indoor environments, In this paper we present a novel reducing interference location system that is particularly well suited to support context aware computing. The system, called EEM (Enhance Envelop Method) alms to combine the advantages of real time tracking systems that implement distributed environment with the suitability of infrastructure sensor network.

  • PDF

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.