• 제목/요약/키워드: data and information security

검색결과 4,499건 처리시간 0.035초

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6057-6078
    • /
    • 2018
  • Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

정보보호 교육이 청소년의 정보보호 실천에 미치는 영향 (Effects of Information Security Education on the Practice of Information Security for the Youth)

  • 강민성;김태성;김택영
    • Journal of Information Technology Applications and Management
    • /
    • 제26권2호
    • /
    • pp.27-40
    • /
    • 2019
  • As reliance on information and communication becomes widespread, a variety of information dysfunctions such as hacking, viruses, and the infringement of personal information are also occurring. Korean adolescents are especially exposed to an environment in which they are experiencing information dysfunction. In addition, youth cybercrimes are steadily occurring. To prevent cybercrime and the damage caused by information dysfunction, information security practices are essential. Accordingly, the purpose of this study is to discuss the factors affecting the information security practices of Korean youths, considering information security education, perceived severity, and perceived vulnerability as leading factors of the theory of planned behavior. A questionnaire survey was administered to 118 middle and high school students. Results of the hypothesis test show that information security education affects perceived behavior control, and perceived severity affects attitude. Subjective norms, information security attitudes, and perceived behavioral control were found to influence adolescents' practices of information security. However, perceived vulnerabilities did not affect youths' information security attitudes. This study confirms that information security education can help youths to practice information security. In other words, information security education is important, and it is a necessary element in the information curriculum of contemporary youth. However, perceived vulnerability to youth information security threats did not affect information security attitudes. Consequently, we suggest that it is necessary to strengthen the contents of the information security education for Korean youths.

A Study on the Security Technology of Real-time Biometric Data in IoT Environment

  • Shin, Yoon-Hwan
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권1호
    • /
    • pp.85-90
    • /
    • 2016
  • In this paper, the biometric data is transmitted in real time from the IoT environment is runoff, forgery, alteration, prevention of the factors that can be generated from a denial-of-service in advance, and the security strategy for the biometric data to protect the biometric data secure from security threats offer. The convenience of living in our surroundings to life with the development of ubiquitous computing and smart devices are available in real-time. And is also increasing interest in the IOT. IOT environment is giving the convenience of life. However, security threats to privacy also are exposed for 24 hours. This paper examines the security threats to biological data to be transmitted in real time from IOT environment. The technology for such security requirements and security technology according to the analysis of the threat. And with respect to the biometric data transmitted in real time on the IoT environment proposes a security strategy to ensure the stability against security threats and described with respect to its efficiency.

메타버스 보안 모델 연구 (Research on Metaverse Security Model)

  • 김태경;정성민
    • 디지털산업정보학회논문지
    • /
    • 제17권4호
    • /
    • pp.95-102
    • /
    • 2021
  • As social interest in the metaverse increases, various metaverse platforms and services are appearing, and various security issues are emerging accordingly. In particular, since all activities are performed in a variety of virtual spaces, and the metaverse utilizes sensing data using various hardware devices, more information is accumulated than other Internet services, and more damage can occur if information security is not guaranteed. Therefore, in this paper, we propose a metaverse security model that considers the major issues mentioned in previous papers and the necessary evaluation factors for the security functions required in the metaverse platform. As a result of performing the performance evaluation of the proposed model and the existing attribute information collection model, the proposed model can provide security functions such as anonymity and source authentication, which were not provided by the existing models.

Design and Implementation of a Crypto Processor and Its Application to Security System

  • Kim, Ho-Won;Park, Yong-Je;Kim, Moo-Seop
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -1
    • /
    • pp.313-316
    • /
    • 2002
  • This paper presents the design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms. This crypto processor can be used fur various security applications such as storage devices, embedded systems, network routers, etc. The crypto processor consists of a 32-bit RISC processor block and a coprocessor block dedicated to the SEED and triple-DES (data encryption standard) symmetric key crypto (cryptography) algorithms. The crypto processor has been designed and fabricated as a single VLSI chip using 0.5 $\mu\textrm{m}$ CMOS technology. To test and demonstrate the capabilities of this chip, a custom board providing real-time data security for a data storage device has been developed. Testing results show that the crypto processor operates correctly at a working frequency of 30MHz and a bandwidth o1240Mbps.

  • PDF

로그 데이터를 이용한 통합모니터링 시스템 (Integrated Monitoring System using Log Data)

  • 전병진;윤덕병;신승수
    • 융합정보논문지
    • /
    • 제7권1호
    • /
    • pp.35-42
    • /
    • 2017
  • 본 논문에서는 정보보안 담당자의 분석 업무 부하를 줄이고, 신속한 정보유출 감지를 위해 로그 데이터를 이용한 통합모니터링 관리시스템을 구현을 제안한다. 이를 위해 개별 보안시스템(MSSQL)에서 발생하는 대용량의 로그 데이터를 통합모니터링 관리시스템(ORACLE)으로 전송하는 이(異)기종 DBMS간의 전송 모듈을 개발하고, 전송된 로그 데이터를 일자별, 개인별로 수치화하는 방법에 대해 연구하고, 수치화된 데이터를 이용해 정보유출 징후감지 시 악의적인 사용자에 대한 검사와 조치 방법에 대해 연구했다.

스마트워치 데이터 분석 및 위험도 평가 (Data Analysis and Risk Assessment of Smartwatch)

  • 이영주;양원석;권태경
    • 정보보호학회논문지
    • /
    • 제27권6호
    • /
    • pp.1483-1490
    • /
    • 2017
  • 스마트워치는 사용자가 착용하는 소형 스마트 기기로 연결성, 기능성 및 유용성을 위해 호스트 기기인 스마트폰과 페어링 과정을 필요로 한다. 페어링 과정 이후에는 사용자의 의식 없이도 스마트워치와 스마트폰 기기 간의 데이터 업데이트 및 백업 과정이 가능하며 스마트폰의 다양한 데이터가 복제되어 스마트워치로 넘어온다. 본 연구는 플랫폼별 스마트워치에 대해 스마트폰으로부터 복제되어 넘어오는 데이터를 사용 시점별로 추출 및 관찰하여 분석한다. 또한 스마트워치 사용자를 대상으로 실시한 보안관련 인식에 대한 설문조사를 바탕으로 데이터 추출 실험 결과에 따른 보안 및 개인 정보보호관점에서의 데이터별 위험도 평가를 수행하고 대응방안을 고찰한다.

스마트그리드 전력망의 NSM 기반 보안관리시스템 설계 및 구현 (Design and Implementation of NSM based Security Management System in Smart Grid)

  • 장범환
    • 디지털산업정보학회논문지
    • /
    • 제9권3호
    • /
    • pp.107-117
    • /
    • 2013
  • In this paper, we designed the security management system based on IEC 62351-7 in the Smart Grid environment. The scope of IEC 62351-7 focuses on network and system management (NSM) of the information infrastructure as well as end-to-end security through abstract NSM data objects for the power system operational environment. However, it does not exist that security management system based on IEC 62351-7 manages the security of the power system in the Smart Grid environment, because power equipment or SNMP agents providing NSM data do not exist yet. Therefore, we implemented the security management system to manage the information infrastructure as reliably as the power system infrastructure is managed. We expect that this system can perform the security management of IEC 61850 based digital substation and can be a prototype of the security system for the Smart Grid in the future.

조직 정보보호성과에 영향을 미치는 정보보호담당임원의 내·외적 특성 (Internal and External Characteristics of Information Security Officers Affecting Organization's Information Security Performance)

  • 오하경;김태성
    • Journal of Information Technology Applications and Management
    • /
    • 제27권4호
    • /
    • pp.1-19
    • /
    • 2020
  • Infringement of information security has caused the corporate image to be damaged and share price to fall, and it is emerging as an organizational risk. The value of information assets in enterprises has led to a higher level of security than in the past. As a result, companies are aware of the need for officers to protect information and to oversee a security management system. However, despite the growing importance of information security officers, there is a lack of research on their roles and characteristics. This study validates the relationship between determinants that affect the performance of information security. And a structural equation model was presented and empirically analyzed to see the impact of the internal and external characteristics of the staff in charge of information security on the organization's information security performance.

무선 인터넷 환경에서의 PKI 기반 데이터 보호 시스템에 대한 연구 (A Study of Data Security System Based PKI on Wireless Internet Environment)

  • 김영호;채철주;최상욱;이재광
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 춘계종합학술대회 A
    • /
    • pp.233-236
    • /
    • 2008
  • 광대역 통합망의 유무선 통합 서비스가 진행되는 시점에서 유 무선 네트워크 기반에서 불법적으로 정보를 취득하려는 공격에 대응하고자 정보보호에 대한 이슈가 대두되고 있다. 이러한 정보보호 기술 중에서 PKI(Public Key Infrastructure) 암호 시스템의 사용자는 인증, 비밀성, 무결성, 부인방지, 접근통제 등의 다양한 보안서비스를 제공받게 된다. 무선 네트워크 환경에서 모바일 클라이언트와 서버는 신뢰성 있는 데이터 송수신을 위해 인증서 및 무선 인터넷 암호 모듈을 탑재하고, 인증서의 유효성 검사를 통한 인증 과정을 거친 후 데이터를 송 수신하게 된다. 본 논문에서는 무선 네트워크 환경에서의 PKI를 통한 인증 및 데이터 보호 시스템을 연구하였다.

  • PDF