• 제목/요약/키워드: data and information security

검색결과 4,499건 처리시간 0.026초

금융회사 정보보안정책의 위반에 영향을 주는 요인 연구 : 지각된 고객정보 민감도에 따른 조절효과 (A Study on the Factors for Violation of Information Security Policy in Financial Companies : Moderating Effects of Perceived Customer Information Sensitivity)

  • 이정하;이상용
    • Journal of Information Technology Applications and Management
    • /
    • 제22권4호
    • /
    • pp.225-251
    • /
    • 2015
  • This paper analyzed factors for employees to violate information security policy in financial companies based on the theory of reasoned action (TRA), general deterrence theory (GDT), and information security awareness and moderating effects of perceived sensitivity of customer information. Using the 376 samples that were collected through both online and offline surveys, statistical tests were performed. We found that the perceived severity of sanction and information security policy support to information policy violation attitude and subjective norm but the perceived certainty of sanction and general information security awareness support to only subjective norm. Also, the moderating effects of perceived sensitivity of customer information against information policy violation attitude and subjective norm were supported. Academic implications of this study are expected to be the basis for future research on information security policy violations of financial companies; Employees' perceived sanctions and information security policy awareness have an impact on the subjective norm significantly. Practical implications are that it can provide a guide to establish information security management strategies for information security compliance; when implementing information security awareness training for employees to deter violations by emphasizing the sensitivity of customer information, a company should make their employees recognize that the customer information is very sensitive data.

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

SECURITY THREATS AND ATTACKS IN CLOUD

  • Mohammed, Asma;Al khathami, Jamilah;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.184-191
    • /
    • 2021
  • The amount of information and data in the digital era is increasing tremendously. Continuous online connectivity is generating a massive amount of data that needs to store in computers and be made available as and when required. Cloud computing technology plays a pivotal role in this league. Cloud computing is a term that refers to computer systems, resources and online services that aim to protect and manage data in an effective, more efficient and easy way. Cloud computing is an important standard for maintaining the integrity and security of sensitive data and information for organizations and individuals. Cloud security is one of the most important challenges that the security of the entire cloud system depends on. Thus, the present study reviews the security challenges that exist in cloud computing, including attacks that negatively affect cloud resources. The study also addresses the most serious threats that affect cloud security. We also reviewed several studies, specifically those from 2017-20, that cited effective mechanisms to protect authentication, availability and connection security in the cloud. The present analysis aims to provide solutions to the problems and causes of cloud computing security system violations, which can be used now and developed in the future.

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

H/W 정보의 인증을 통한 내부정보유출 방지 기법 (A Authentication technique of Internal Information Hacking Protection based on H/W Information)

  • 양선옥;최낙귀;박재표;최형일
    • 디지털산업정보학회논문지
    • /
    • 제5권1호
    • /
    • pp.71-81
    • /
    • 2009
  • To the cause of the development of IT technology and the Internet, information leakage of industry is also facing a serious situation. However, most of the existing techniques to prevent leakage of information disclosure after finding the cause of defense. Therefore, in this paper by adding information about the Hardware to offer a way to protect the information. User authentication information to access the data according to different security policies to reflect a little more to strengthen security. And the security agent for the data by using a log of all actions by the record was so easy to analyze. It also analyzes and apply the different scenarios possible. And the analysis of how to implement and how to block. The future without the use of security agents to be able to control access to data and H/W information will be updated for the study will be done.

Incorporating RSA with a New Symmetric-Key Encryption Algorithm to Produce a Hybrid Encryption System

  • Prakash Kuppuswamy;Saeed QY Al Khalidi;Nithya Rekha Sivakumar
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.196-204
    • /
    • 2024
  • The security of data and information using encryption algorithms is becoming increasingly important in today's world of digital data transmission over unsecured wired and wireless communication channels. Hybrid encryption techniques combine both symmetric and asymmetric encryption methods and provide more security than public or private key encryption models. Currently, there are many techniques on the market that use a combination of cryptographic algorithms and claim to provide higher data security. Many hybrid algorithms have failed to satisfy customers in securing data and cannot prevent all types of security threats. To improve the security of digital data, it is essential to develop novel and resilient security systems as it is inevitable in the digital era. The proposed hybrid algorithm is a combination of the well-known RSA algorithm and a simple symmetric key (SSK) algorithm. The aim of this study is to develop a better encryption method using RSA and a newly proposed symmetric SSK algorithm. We believe that the proposed hybrid cryptographic algorithm provides more security and privacy.

특성 벡터를 이용한 얼굴 인증 시스템에서 변환된 생체 정보 데이터의 가역성에 대한 보안 문제 분석 (The Security Problem Analysis for Reversibility of Transformed Biometric Information Data on Eigenvector-based face Authentication)

  • 김군순;강전일;양대헌;이경희
    • 정보보호학회논문지
    • /
    • 제18권3호
    • /
    • pp.51-59
    • /
    • 2008
  • 생체 정보 인식은 사용자의 인증을 위한 수단으로써 많은 연구가 진행 되어 오고 있다. 그 중 얼굴 인식 분야에서 특성벡터를 이용한 사용자의 얼굴 인식 기법이 존재한다. 이 기법은 전체 얼굴 데이터 집합에서 벡터 공간을 만들어 내고 생체정보 템플릿을 사상시켜 추상화된 데이터를 생성하는 기법이다. 그러나 생체 정보의 보안성을 일컫는 개념인 취소 가능한 특성(Cancelable Feature)을 기대 할 수 는 없다. 이 논문에서는 특성 벡터를 이용한 얼굴 인증 시스템에서 변환된 생체정보 데이터의 복원에 대한 보안 문제를 지적하고, 예상 가능한 공격 시나리오를 실험을 통해 보인다.

LLC/MAC 계층 구조에서의 정보 보호 포로토콜에 관한 연구 (A Study on the Information Security Protocol in LLC/MAC Layer Architecture)

  • 류황빈;이재광
    • 한국통신학회논문지
    • /
    • 제17권10호
    • /
    • pp.1164-1174
    • /
    • 1992
  • 본 논문에서는 LLC/MAC 계층 구조에서의 정보 보호 프로토콜에 대하여 기술하였다. 근거리 통신망에서의 정보 보호 위협과 취약성, 이의 해결을 위한 요구 서비스, 그리고 IEEE 802 근거리 통신망 구조에서의 정보 보호 프로토콜의 적용 대한을 기술하였다. 정보 보호 서비스를 제공하기 위해 LLC/MAC 서비스 프리미티브를 이용한 정보 보호 프로토콜 (SP2 : Security Protocol 2) PDU 구성을 제안하였으며, SP2 프로토콜을 구성하기 위하여 DES 알고리즘의 ECB, CBC 모드와 FIPS의 DAA를 이용하였다. 제안된 SP2프로토콜은 데이타 발신처 인증, 데이타 비밀유지, 데이타 무결성 서비스를 제공한다.

  • PDF

보안로그 빅데이터 분석 효율성 향상을 위한 방화벽 로그 데이터 표준 포맷 제안 (For Improving Security Log Big Data Analysis Efficiency, A Firewall Log Data Standard Format Proposed)

  • 배춘석;고승철
    • 정보보호학회논문지
    • /
    • 제30권1호
    • /
    • pp.157-167
    • /
    • 2020
  • 최근 4차 산업혁명 도래의 기반을 제공한 빅데이터와 인공지능 기술은 산업 전반의 혁신을 견인하는 주요 동력이 되고 있다. 정보보안 영역에서도 그동안 효과적인 활용방안을 찾기 어려웠던 대규모 로그 데이터에 이러한 기술들을 적용하여 지능형 보안 체계를 개발 및 발전시키고자 노력하고 있다. 보안 인공지능 학습의 기반이 되는 보안로그 빅데이터의 품질은 곧 지능형 보안 체계의 성능을 결정짓는 중요한 입력 요소라고 할 수 있다. 하지만 다양한 제품 공급자에 따른 로그 데이터의 상이성과 복잡성은 빅데이터 전처리 과정에서 과도한 시간과 노력을 요하고 품질저하를 초래하는 문제가 있다. 본 연구에서는 다양한 방화벽 로그 데이터 포맷 관련 사례와 국내외 표준 조사를 바탕으로 데이터 수집 포맷 표준안을 제시하여 보안 로그 빅데이터를 기반으로 하는 지능형 보안 체계 발전에 기여하고자 한다.

빅데이터를 이용한 보안정책 개선에 관한 연구 (A study on the security policy improvement using the big data)

  • 김송영;김요셉;임종인;이경호
    • 정보보호학회논문지
    • /
    • 제23권5호
    • /
    • pp.969-976
    • /
    • 2013
  • 조직이 보유한 정보보호시스템들은 모든 취약점, 침입, 자료유출 등을 탐지하는 것을 목적으로 하고 있다. 그에 따라, 기업은 조직구성원들의 모든 행동이 어떤 경로에서든지 기록되고 확인할 수 있도록 하는 시스템들을 지속적으로 도입하고 있다. 반면에 이것을 관리하고 이 시스템들에서 생성되는 보안로그들을 분석하는 것은 더욱 어려워지고 있다. 보안시스템들을 관리하고 로그를 분석하는 대부분의 인원은 현업의 정보유통 프로세스와 중요정보의 관리절차에 대해 사용자, 또는 유출자보다 알기 어렵다. 이러한 현실은 내부정보유출의 심각성을 더 키우고 있다고 할 수 있다. 최근 빅데이터에 관한 연구가 활발히 진행 되면서 다양한 분야에서 성공사례들을 발표하고 있다. 본 연구는 빅데이터 처리기술과 활용사례를 보안 분야에 적용하여, 기존에 분석할 수 없었던 대용량 정보를 좀 더 효과적으로 분석가능하도록 할 수 있었던 사례와 효율적으로 보안관리 업무를 개선할 수 있는 방안을 제시하고자 한다.