• Title/Summary/Keyword: hacker

Search Result 121, Processing Time 0.037 seconds

Land Registration: Use-case of e-Governance using Blockchain Technology

  • Veeramani, Karthika;Jaganathan, Suresh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3693-3711
    • /
    • 2020
  • e-Governance is a medium to offer various services to citizens through a web portal, that exists in many countries nowadays. The existing e-Governance technology is a vast, centrally managed database and a set of applications that connect to it via web interfaces. Despite the modernisation of services, it remains with the lack of transparency. Thus, the existing infrastructure of e-Governance paves the way for corrupt practises by the bureaucrats. e-Governance needs a powerful underlying technology which doesn't provide any way to allow tampering of the record and which in turn eliminates corruption. In this paper, we took land registration as a use-case for building e-Governance by keeping Blockchain as an underlying technology, to put off the corrupt practices and to bring transparency. Once transactions in land registration added to the Blockchain, it is immutable as it is cryptographically secured. Besides, the blockchain technology is secured as the ledger is distributed over the network. If a hacker wants to modify the ledger, he needs to hack every node in the blockchain network. Hyperledger Fabric, a permissioned Blockchain adopted for implementation and Hyperledger Caliper for performance analysis with these evaluation metrics such as throughput, latency and execution time.

Decision Making Model for Selecting Financial Company Server Privilege Account Operations (금융회사 서버 Privilege 계정 운영방식 결정 모델)

  • Lee, Suk-Won;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1607-1620
    • /
    • 2015
  • The server privilege account must be operated through law and regulation. However, due to regulation non-compliance and inadequate operation on financial company server privilege, an incident that every server data being deleted by hacker occur which is later being named as 'NH Bank Cyber Attack'. In this paper, the current operation status on financial company privilege accounts is being analysed to elicit problems and improvement. From the analysis, important evaluation factors will be also selected and applied generating the decision making model for financial company server privilege account operation. The evaluation factor deducted from privilege account status analysis will be used to present and verify the decision making model and formula through AHP(Analytic Hierarchy process).

Implementation of commercial digital Forensic Marking systems (디지털 추적표시(For ensic Marking) 시스템 개발)

  • Kim, Jong-An;Kim, Jin-Han;Kim, Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.142-146
    • /
    • 2007
  • Digital Rights Management (DRM) technology has been widely used for protecting the digital contents over the recent years. But the digital contents protected by DRM are vulnerable to various video memory capture programs when DRM packaged contents are decrypted on the consumers' multimedia devices. To make up for this kind of DRM security holes the Forensic Marking (FM) technology is being deployed into the content protection area. Most leading DRM companies as well as big electronics companies like Thomson and Philips already have commercial FM solutions. Forensic Marking technology uses the digital watermarking to insert the user information such as user id, content playing time and etc. into the decrypted and decoded content at the playback time on the consumer devices. When the content containing watermarked user information (Forensic Mark) is illegally captured and distributed over the Internet, the FM detection system takes out the inserted FM from the illegal contents and informs contents service providers of the illegal hacker's information. In this paper the requirements and test conditions are discussed for the commercial Forensic Marking systems.

  • PDF

A Study of Security Measures and Vulnerability Analysis on the Application using WiBro Service (WiBro 서비스를 이용한 응용프로그램의 취약점 분석 및 보안 대책 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1217-1222
    • /
    • 2012
  • WiBro(Wireless Broadband) service is the world standardized fourth-generation communications in Korea. The services through internet-based applications using WiBro communication-based is increasing. WiBro service in the Internet-based applications when using the service, the application may need to analyze the vulnerability. In this paper, we use the Internet when in WiBro service, to analyze the vulnerability. And, Internet-based applications for vulnerabilities that could lead to hacker attacks is analyzed. It will be studied that security measures through analysis of vulnerability of WiBro services and applications.

A Study on Information Security Management of Hospital Web Sites (의료기관 종별 웹 사이트 정보보안 관리 실태 연구)

  • Kim, Jong-Min;Ryu, Hwang-Gun
    • The Korean Journal of Health Service Management
    • /
    • v.9 no.2
    • /
    • pp.23-32
    • /
    • 2015
  • In this paper, we evaluated web security vulnerability and privacy information management of hospital web sites which are registered at the Korea Hospital Association. Vulnerability Scanner (WVS) based on the OWASP Top 10 was used to evaluate the web security vulnerability of the web sites. And to evaluate the privacy information management, we used ten rules which were based on guidelines for protecting privacy information on web sites. From the results of the evaluation, we discovered tertiary hospitals had relatively excellent web security compared to other type of hospitals. But all the hospital types had not only high level vulnerabilities but also the other level of vulnerabilities. Additionally, 97% of the hospital web sites had a certain level of vulnerability, so a security inspection is needed to secure the web sites. We discovered a few SQL Injection and XSS vulnerabilities in the web sites of tertiary hospitals. However, these are very critical vulnerabilities, so all hospital types have to be inspected to protect their web sites against attacks from hacker. On the other hand, the inspection results of the tertiary hospitals for privacy information management had a better compliance rate than that of the other hospital types.

A Study of Security System for Internet Shopping Mall (인터넷 쇼핑몰의 보안 시스템에 관한 연구)

  • 이내준
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.11
    • /
    • pp.1383-1394
    • /
    • 2001
  • Through the extension of damages caused by hacking and computer virus, although security control has been emphasized, hackers' capability exceeded the security controllability. The basic security setup of server system will be free from the damages by primary and intermediate level which are the major group. It should be noted that security condition of most middle-sized and personal systems is widely open for hacker's intrusion. There is no perfect information system either software-wise or hardware-wise. It has to be recognized that our systems will be attacked easily by the hackers and computer virus. Computer users are demanded to be prepared for these types of surprise attacks. In this paper, I will propose a formation of Bastion server. This will protect risks from inside & outside intrusion which have been known till today.

  • PDF

Management Plan for Mobile Contents Bypassing In App Billing Application (모바일 컨텐츠 인앱 결제 우회 애플리케이션에 대한 대처 방안)

  • Lee, Sang-Ho;Shin, Miyea
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.21-26
    • /
    • 2015
  • As mobile contents grow up, In App Billing is brisk at applications including mobile contents. But some of users don't pay and use charged content for free to use cheating payment module or hacking through applications. Call this bypass payment. Applications, helping bypass, are Freedom, IAP Cracker, and DNS server suggested by the hacker named Borodin. In case of mobile game, Despite sell a lot of charged content but income is different revenue in sales log with real profits. Because of users using bypass payment application. Management plan to bypass payment are checking OrderID, encrypting public key and verifying receipt.

  • PDF

On the security of the cookie using the DHTML editor in the blog site (DHTML 편집기를 이용하는 블로그 사이트에서 쿠키보안에 관한 연구)

  • Hong, Bong-Hwa;Chung, Yoon-Don;Kim, Eun-Won
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.42 no.2
    • /
    • pp.29-36
    • /
    • 2005
  • The methode of user authorization used to the cookie, session and database in the blug site using the DHTML editor, frequently, of course, it is the detail and technical authorization methode but the above mentioned the methode to used, usually. But those methode have the problem in the security. In this paper proposed to the new methode of user authorization which it used to cookie, session and database in the using the DHTML editor. The proposed methode confirm to the impossible to the analysis and changing of the cookie information by hacker.

Study on the Performance Analysis of an Axial-Type Turbine with Steam Injection (증기가 분사된 축류형 터빈의 성능해석에 관한 연구)

  • Cho, Soo-Yong;Kim, Soo-Yong
    • The KSFM Journal of Fluid Machinery
    • /
    • v.4 no.4 s.13
    • /
    • pp.28-36
    • /
    • 2001
  • Performance analysis is conducted on an axial-type turbine which is used for fire extinction by injecting water or steam into the turbine. Loss models developed by Hacker and Okapuu are applied for predicting the performance of turbine. Pressure loss generated through a turbine is converted to the thermal efficiency, and thermal and gas properties are calculated within a turbine passage. Total-to-total efficiency, total-to-static efficiency, static temperature at the exit of turbine, output power, flow coefficient, blade loading coefficient, and expansion ratio are predicted with changing the amount of injected steam and the rotational speed. The 74 kW class gas turbine developed at KIMM is chosen for performance analysis. The 74 kW class turbine consists of 1 stage like a current developing gas turbine for fire extinction. Water or steam is injected at the end of combustor, and results show that efficiency and output power are dependent on the temperature of injected water or steam and the static temperature at the exit is decreased.

  • PDF

AN INVESTIGATION OF IMMUNIZATION AGAINST SOMATOSTATIN BY MEASURING ANTIBODY TITRES, SOMATOSTATIN AND SOMATOTROPIN PROFILES IN GILTS

  • Du, Z.L.;Hacker, R.R.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.6 no.2
    • /
    • pp.211-218
    • /
    • 1993
  • The effect of active immunization against porcine somatostatin (SRIF-14) on somatostation and somatotropin secretion profile in 18 gilts was investigated. Gilts were assigned to the following treatments: control (sham injection, n = 6); bovine serum albumin (BSA) (injection of BSA with bacterial protein adjuvant, n = 6); SRIF (injection of BSA-SRIF-14 conjugate with bacterial protein adjuvant n = 6). Serum SRIF and pST were assayed from the blood samples taken on day 7 after the last immunization injection. Anti-SRIF antibody titres were assayed in weekly samples two weeks after the initial immunization to one week after the last immunization. Results revealed that the immunization protocol used in the present investigation failed to produce antibodies capable of neutralizing endogenous somatostatin. In addition, the porcine somatotropin assay revealed no significant differences in baseline pST concentration, mean peak amplitude and number of peaks during a 24 h secretory period among SRIF, BSA and control treatment. There were also no differences in SRIF baseline concentration, peak amplitude, and number of peaks during a 24 h secretory period among any of the three treatments. Circulating concentrations of pST and pSRIF were highly correlated (r = -0.09). Furthermore, anti-SRIF antibody titre was not detected in the serum of the gilts actively immunized against SRIF. These data, collectively, suggest that the protocol employed in the present investigation for active immunization against SRIF is not an effective method for changing SRIF and pST secretion profiles of the gilt and thus to enhance performance.