• Title/Summary/Keyword: building vulnerability

Search Result 183, Processing Time 0.027 seconds

Case Studies on Deceptive Data Visualization (기만적 데이터 시각화 사례 연구)

  • Kim, Si-Hyun;Park, Jin-Wan
    • Journal of Digital Contents Society
    • /
    • v.19 no.3
    • /
    • pp.521-528
    • /
    • 2018
  • Data visualization has become a useful tool to effectively communicate information and is widely used not only by experts but also at a general level. However, it is dangerous that it is as efficient as it is to transmit false information. All data visualizations have hidden intent with powerful messages by editor. Building a system that grasps these intentions helps to understand the thoughts of groups and individuals. Most of the existing research focuses on effective data visualization methods and methods of expression. The more various visualization methods, the more likely the data will be distorted. In this paper, we present an analysis of deceptive data visualization in a goal-oriented environment. Based on the vulnerability of human cognitive processing, we classify the attack types and identify what tricks occur in the context of data visualization. This study suggests the first step in studying the case of aggressive visualization and opens the way for further research.

Design of Military Information System User Authentication System Using FIDO 2.0-based Web Browser Secure Storage (FIDO 2.0 기반의 웹 브라우저 안전 저장소를 이용하는 군 정보체계 사용자 인증 시스템 설계 및 구현)

  • Park, Jaeyeon;Lee, Jaeyoung;Lee, Hyoungseok;Kang, Jiwon;Kwon, Hyukjin;Shin, Dongil;Shin, Dongkyoo
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.43-53
    • /
    • 2019
  • Recently, a number of military intranet infiltrations suspected of North Korea have been discovered. There was a problem that a vulnerability could occur due to the modification of user authentication data that can access existing military information systems. In this paper, we applied mutual verification technique and API (Application Programming Interface) forgery / forgery blocking and obfuscation to solve the authentication weakness in web browsers that comply with FIDO (Fast IDentity Online) standard. In addition, user convenience is improved by implementing No-Plugin that does not require separate program installation. Performance tests show that most browsers perform about 0.1ms based on the RSA key generation rate. In addition, it proved that it can be used for commercialization by showing performance of less than 0.1 second even in the digital signature verification speed of the server. The service is expected to be useful for improving military information system security as an alternative to browser authentication by building a web secure storage.

Low-weight Secure Encryption Protocol on RFID for Manufactory Automation (공장 자동화를 위한 RFID 경량 암호 프로토콜에 관한 연구)

  • Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.173-180
    • /
    • 2016
  • There has been a growing interest in automation of factories in the country. And, the development in this regard has been actively attempted. In particular, on the basis of the "innovation 3.0 strategy of manufacturing industry", interest in the smart of the manufacturing plant of small and medium-sized enterprises has increased rapidly. As well as policy for building smart plant, technical, seeking a strategic approach. But, in order to introduce such a smart plant or factory automation systems, manufacturing plant security with vulnerability and personal information protection problems, it should always be top priority there. Accordingly, we provide the applicable lightweight secure protocols in RFID communication. It is a wireless communication technology that is most often introduced for factory automation. Our proposed lightweight secure protocol in this study, less the number of calculations in comparison with the existing public key-based and the symmetric key encryption algorithm. And it is fast in compare with the existing protocol. Furthermore, we design that it system can support to low power consumption and small consume the memory size.

The Role of Decision-Makers' Platform for Securing Water by Moving Forward to Global Challenges (범지구적 물 문제 해결을 위한 정책입안자 네트워크의 역할)

  • Park, Ji-Seon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2011.05a
    • /
    • pp.21-21
    • /
    • 2011
  • Many Asian countries are suffered from various problems on water, which include the need for increased access to improves water supplies and sanitation through investments in infrastructure and capacity building, the balances water management system between development and ecosystem, and the need to reduce the human populations'vulnerability to water-related disasters, in particular, from climate variability and evolution. Decison makers are the most influential people in policy making and solving global water problems is central issue in eradicating poverty and achieving sustainable development (MDG). They across the world form an integral part of the architecture of national or regional governance. Their role covers a range of decision-making processes including passing legislation, scrutinizing government policy, and representing citizen through the election. We must ensure that these quiet but important issues get the political space, financial priority and public attention they deserve. Regional bodies such as the EU have also enacted legislation which introduces rules on water quality and other enforceable mattera across state boundaries. With this growing body of laws and policies on water issues, the role of decision makers is growing. Recognizing this role, decison makers' platform is essential to provide an opportunity to discuss crucial water issues in each country or region and for the purpose "2010 Parliaments for Water in Asia" has planned and organized to investigate our common issues and goals. During the meeting, we have an opportunity to observe water policy of Bangladesh, Bhutan, China, Mongolia, New Zealand and the Philippines and share the views on what needs to be done to move forward by decision makers for the future of water. In conclusion, the process of developing the decision makers' platform in each region would be ultimately essential point to increase the awareness of the developed and developing countries' roles, knowledge to clarify roles and responsibilities of each stake holders and finally be a major actor for resolving not only water challenges also issues of human settlements.

  • PDF

AP and RADIUS server security and vulnerability analysis. (AP와 RADIUS서버 보안 및 취약점 분석)

  • Kim, Hyun Ho;Jang, WonTae;Jo, Jung Bok;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.241-244
    • /
    • 2013
  • These days wireless network devices (smartphones, tablet PC, laptop) are being utilized more frequently. In line with the increasing number of users of a wireless network, the usage of wireless access points is also increasing. Nowadays as nationwide wireless network services being made available, wireless networks are increasingly being used due to the lower costs of building faster and affordable private or carrier networks. However wireless security is not keeping up with this development. Many use open networks where anyone can join, meanwhile for those using wireless security protocols there is the problem of managing the password. In this paper, we analyze the problems of trying to build a user authentication system using an access point and the RADIUS server.

  • PDF

Tier-based Proactive Path Selection Mode for Wireless Mesh Networks

  • Fu-Quan, Zhang;Joe, In-Whee;Park, Yong-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1303-1315
    • /
    • 2012
  • In the draft of the IEEE 802.11s standard, a tree topology is established by the proactive tree-building mode of the Hybrid Wireless Mesh Protocol (HWMP). It is used for cases in which the root station (e.g., gateway) is an end point of the majority of the data connections. In the tree topology, the root or central stations (e.g., parent stations) are connected to the other stations (e.g., leaves) that are one level lower than the central station. Such mesh stations are likely to suffer heavily from contention in bottleneck links when the network has a high traffic load. Moreover, the dependence of the network on such stations is a point of vulnerability. A failure of the central station (e.g., a crash or simply going into sleep mode to save energy) can cripple the whole network in the tree topology. This causes performance degradation for end-to-end transmissions. In a connected mesh topology where the stations having two or more radio links between them are connected in such a way that if a failure subsists in any of the links, the other link could provide the redundancy to the network. We propose a scheme to utilize this characteristic by organizing the network into concentric tiers around the root mesh station. The tier structure facilitates path recovery and congestion control. The resulting mode is referred to as Tier-based Proactive Path Selection Mode (TPPSM). The performance of TPPSM is compared with the proactive tree mode of HWMP. Simulation results show that TPPSM has better performance.

Verification of the Torsional Amplification Factor for the Seismic Design of Torsionally Imbalanced Buildings (비틀림 비정형 건물의 내진설계를 위한 우발편심 비틀림 증폭계수 검증)

  • Lee, Kwang-Ho;Jeong, Seoung-Hoon
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.14 no.6
    • /
    • pp.67-74
    • /
    • 2010
  • Because of the difference between the actual and computed eccentricity of buildings, symmetrical buildings will be affected by torsion. In provisions, accidental eccentricity is intended to cover the effect of several factors, such as unfavorable distributions of dead- and live-load masses and the rotational component of ground motion about a vertical axis. The torsional amplification factor is introduced to reduce the vulnerability of torsionally imbalanced buildings. The effect of the torsional amplification factor is observed for a symmetric rectangular building with various aspect ratios, where the seismic-force-resisting elements are positioned at a variable distance from the geometrical center in each direction. For verifying the torsional amplification factor in provisions, nonlinear reinforced concrete models with various eccentricities and aspect ratios are used in rock. The difference between the maximum displacements of the flexible edge obtained between using nonlinear static and time-history analysis is very small but the difference between the maximum torsional angles is large.

Development of Disaster Management Capacity Analysis Program for Local Government (지방자치단체 재난안전관리 자체 역량분석 프로그램 개발)

  • Yoo, Byungtae;Oh, Keumho
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.3
    • /
    • pp.266-275
    • /
    • 2013
  • New paradigm to the advancement of disaster management is required for building resilient and safe society. In these circumstances, the importance of local government disaster management capacity has been emphasized through experiencing a series of accidents including 2012 september Gumi fluorosilicic acid diffusion accident. The increase of people's disaster awareness has emerged the public demands on disaster management information of local area. In this study, the disaster management capacity analysis program is developed for self-assessment of local government. The program is designed for disaster managers to database the categorized index of disaster management capacity and recognize the capacity level. For the public announcement of disaster management capacity, the analysis results are shown for citizens in the understandable format. It is expected that the enhancement of emergency management capacity of local society can be achieved by the efforts of local government analyzing and improving the vulnerability as well as the participation of local society.

Cyber Attacks and Appropriateness of Self-Defense (사이버 공격과 정당방위의 당위성)

  • Shin, Kyeong-Su
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.21-28
    • /
    • 2019
  • The emergence of a hyper-connected-super-intelligence society, called the era of the Fourth Industrial Revolution, brought about a new change in the security environment. With ICT (Information Communication Technology) convergence and high-tech technologies introduced across the board, the person-centered driving force that moved the real space is replaced by the code-oriented cyberspace, and its dependency is constantly increasing. Paradoxically, however, these technological changes serve as another security vulnerability that threatens our society, and have brought about the justification for building a cyber defense system while simultaneously facing the opportunities and challenges brought by technology. In this study, the theory of self-defense was put forward on the basis of the theoretical basis for actively responding to the increasingly intelligent and mass-evolving cyberattacks, and firstly, the need to enact a cybersecurity law, secondly, and thirdly, the need to develop a response cooperation system with the U.S. and other cyber powers.

Integrated Ship Cybersecurity Management as a Part of Maritime Safety and Security System

  • Melnyk, Oleksiy;Onyshchenko, Svitlana;Pavlova, Nataliia;Kravchenko, Oleksandra;Borovyk, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.135-140
    • /
    • 2022
  • Scientific and technological progress is also fundamental to the evolving merchant shipping industry, both in terms of the size and speed of modern ships and in the level of their technical capabilities. While the freight performance of ships is growing, the number of crew on board is steadily decreasing, as more work processes are being automated through the implementation of information technologies, including ship management systems. Although there have been repeated appeals from international maritime organizations to focus on building effective maritime security defenses against cyber attacks, the problems have remained unresolved. Owners of shipping companies do not disclose information about cyberattack attempts or incidents against them due to fear of commercial losses or consequences, such as loss of image, customer and insurance claims, and investigations by independent international organizations and government agencies. Issues of cybersecurity of control systems in the world today have gained importance, due to the fact that existing threats concern not only the security of technical means and devices, but also issues of environmental safety and safety of life at sea. The article examines the implementation of cyber risk management in the shipping industry, providing recommendations for the safe ship operation and its systems in order to improve vulnerability to external threats related to cyberattacks, and to ensure the safety and security of such a technical object as a seagoing ship.