• Title/Summary/Keyword: information protection countermeasures

Search Result 86, Processing Time 0.029 seconds

A Study on the Improvement of Security Vulnerabilities in Intelligent Transport Systems (지능형교통시스템의 보안취약점 개선방안에 관한 연구)

  • Jo, Pyoung Hyun;Lim, Jong In;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.531-543
    • /
    • 2013
  • The destruction and prejudice of major infrastructure such as energy, broadcast, communication and transportation could result in a threat to individual rights and liberties, as well as social and economic losses. If a traffic signal control facilities have been violated, the lives of the citizens discomfort as well as causing social disruption such as traffic accident. Because the control system is operating as a closed network and you think it is safe, the information protection system has not been built or security patches and anti-virus updates do not work properly. So, cyber attacks by security vulnerabilities are exposed. Therefore, there is a need to identify the characteristics of the system, and develop appropriate countermeasures in order to prevent cyber attacks and prejudices incidents. This paper examines the vulnerabilities of Intelligent Transport Systems and proposes the improvement of security vulnerabilities.

Study on Feasibility of New Frequency Allocations to the Fixed-Satellite Service in Ku-band (Ku-대역 고정위성업무용 주파수 신규 분배 가능성 검토 연구)

  • Park, Jong-Min;Chang, Dae-Ig
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.137-142
    • /
    • 2015
  • This paper analyzed the background and status of studies for WRC-15 agenda item which considers additional frequency allocations to the fixed-satellite service in Ku-band and considered national future countermeasures. Satellite frequency can be acquired through compliance with the Radio Regulations for international registration and it has been recognized as the limited natural resource, and which leads to intensifying the competition among countries for the preoccupancy of it. Under the circumstances, WRC-15 is going to consider additional allocations to the fixed-satellite service in Ku-band and it is necessary to cope with the situation taking into account adequate protection of the existing services and future plan of frequency usage by the fixed-satellite service.

Sea Lines of Communication Security and Piracy (해상교통로(SLOC) 안보와 해적: 소말리아 해적퇴치작전 경험을 중심으로)

  • Kim, Meoung-Sung
    • Strategy21
    • /
    • s.36
    • /
    • pp.150-179
    • /
    • 2015
  • This thesis analyzes Somali piracy as a non-traditional threat to the Sea Lines of Communication (SLOC) and international countermeasures to the piracy. In an era of globally interdependent economies, the protection of sea lines and freedom of navigation are prerequisites for the development of states. Since the post-Cold War began in the early 1990s, ocean piracy has emerged as a significant threat to international trade. For instance, in the Malacca Strait which carries 30 percent of the world's trade volume, losses from failed shipping, insurance, plus other subsequent damages were enormous. Until the mid-2000s, navies and coast guards from Malaysia, Indonesia, Singapore, together with the International Maritime Organization (IMO), conducted anti-piracy operations in the Strait of Malacca. The combined efforts of these three maritime states, through information sharing and with reinforced assets including warships and patrol aircrafts, have successfully made a dent to lower incidents of piracy. Likewise, the United Nations' authorization of multinational forces to operate in Somali waters has pushed interdiction efforts including patrol and escort flotilla support. This along with self-reinforced security measures has successfully helped lower piracy from 75 incidents in 2012 to 15 in 2013. As illustrated, Somali piracy is a direct security threat to the international community and the SLOC which calls for global peacekeeping as a countermeasure. Reconstructing the economy and society to support public safety and stability should be the priority solution. Emphasis should be placed on restoring public peace and jurisdiction for control of piracy as a primary countermeasure.

Offsite Risk Assessment on Toxic Release (독성물질 저장설비의 사고시 사업장외에 미치는 영향평가)

  • Park, Kyoshik
    • Journal of the Korean Institute of Gas
    • /
    • v.21 no.3
    • /
    • pp.9-16
    • /
    • 2017
  • Toxic release is one of the most interested area in evaluating consequence to the vicinity of industry facilities handling hazardous materials. Chloric acid production facility is selected and toxic release is evaluated to assess the risk impacted to its off-site. Accident scenarios were listed using process safety information. The scenarios having effect to the off-site were selected and assessed further according to guideline provided by Korea government. Worst case and alternative scenarios including other interested scenarios were evaluated using ALOHA. Each evaluated scenario was assessed further considering countermeasures. The results showed that the facility handling chloric acid is safe enough and needed no further protections at the moment.

Mining Loot Box News : Analysis of Keyword Similarities Using Word2Vec (확률형 아이템 뉴스 마이닝 : Word2Vec 활용한 키워드 유사도 분석)

  • Kim, Taekyung;Son, Wonseok;Jeon, Seongmin
    • Journal of Information Technology Services
    • /
    • v.20 no.2
    • /
    • pp.77-90
    • /
    • 2021
  • Online and mobile games represent digital entertainment. Not only the game grows fast, but also it has been noted for unique business models such as a subscription revenue model and free-to-play with partial payment. But, a recent revenue mechanism, called a loot-box system, has been criticized due to overspending, weak protection to teenagers, and more over gambling-like features. Policy makers and research communities have counted on expert opinions, review boards, and temporal survey studies to build countermeasures to minimize negative effects of online and mobile games. In this process, speed was not seriously considered. In this study, we attempt to use a big data source to find a way of observing a trend for policy makers and researchers. Specifically, we tried to apply the Word2Vec data mining algorithm to news repositories. From the findings, we acknowledged that the suggested design would be effective in lightening issues timely and precisely. This study contributes to digital entertainment service communities by providing a practical method to follow up trends; thus, helping practitioners have concrete grounds for balancing public concerns and business purposes.

A Study on portable voice recording prevention device (휴대용 음성 녹음 방지 장치 연구)

  • Kim, Hee-Chul
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.209-215
    • /
    • 2021
  • This study is a system development for voice information protection equipment in major meetings and places requiring security. Security performance and stability were secured with information leakage prevention technology through generation of false noise and ultrasonic waves. The cutoff frequency band for blocking the leakage of voice information, which has strong straightness due to the nature of the radio wave to the recording prevention module, blocks the wideband frequency of 20~20,000Hz, and the deception jamming technology is applied to block the leakage of voice information, greatly improving the security. To solve this problem, we developed a system that blocks the recording of a portable smartphone using a battery, and made the installation of a separate device smaller and lighter so that customers do not recognize it. In addition, it is necessary to continuously study measures and countermeasures for efficiently using the output of the anti-recording speaker for long-distance recording prevention.

Overview of technologies: ensure anonymity of privacy coins

  • Kwon, Hoon;Kim, Eun-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.77-86
    • /
    • 2022
  • Recently, various cryptocurrencies (coins) based on block chains have appeared, and interest in privacy coins, which is an anonymity-based cryptocurrency that values personal information protection, is growing. In this paper, we look at coin abuse cases using privacy coins, and analyze the technology that guarantees the anonymity of 8 mainly traded privacy coins (Monero, Dash, Zcash, BEAM, Grin, Horizen, Verge, and Pirate Chain). We would like to analyze the applied technologies for We present the problems that can occur in these privacy coins, check the technology and each element applied to the privacy coin, and analyze the technical difficulty of the anonymity guarantee technology for the mainly traded coins through this, and Appropriate countermeasures and classification of privacy coins for technical difficulty were presented through the problem. Through this, the standard for re-evaluating the value of the coin according to the application of appropriate technology for the privacy coin can be presented.

Case analysis of trade dispute between Korea and India (한.인도간의 통상분쟁 현황과 사례 분석 -인도의 반덤핑 관세정책을 중심으로-)

  • Lee, Jong-Won
    • International Commerce and Information Review
    • /
    • v.12 no.3
    • /
    • pp.391-412
    • /
    • 2010
  • As traditional import regulations have decreased all over the world in recent decades, the usage of "unconventional" trade protection measures has grown in the developing countries. In particular, antidumping investigations have risen rapidly and have growing in India and China. Therefore, this thesis aims to provide countermeasures to our government and Korean exporting companies by studying characteristics of antidumping. India is one of the most frequent initiators of antidumping cases by protecting their industries and impeding imports from FTA. This year, economic exchanges of Korea and India will be increasing by the conclusion of CEPA. This will lead to the increase of dispute by import regulations. Under such circumstances, to decrease Indian antidumping cases Korea will respond as follows. i)If antidumping laws, system and practice of India have injustice or are different from WTO rules, our government will have to indicate injustice and actively urge Indian government to make corrections. For example, they are continuous bilateral contact about the problems, fallacy of calculation of dumping margin, and intense investigations into cause and effect relationship and losses in dumping market, ect. ii)Our government should give more support to the small and medium exporting company which have difficulties in dealing with trade conflicts, counseling, arbitrating a lawyer. iii)Our government which is in control of domestic trade relief system should strengthen its investigation ability about new regulations and moniter import regulations of India. Over the long time, Korean companies need to export competitive advantage items of a higher value-added business and build solidarity by technology transfer. Accordingly, that will result in the decrease of trade dispute in India.

  • PDF

Analysis of privacy issues and countermeasures in neural network learning (신경망 학습에서 프라이버시 이슈 및 대응방법 분석)

  • Hong, Eun-Ju;Lee, Su-Jin;Hong, Do-won;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.285-292
    • /
    • 2019
  • With the popularization of PC, SNS and IoT, a lot of data is generated and the amount is increasing exponentially. Artificial neural network learning is a topic that attracts attention in many fields in recent years by using huge amounts of data. Artificial neural network learning has shown tremendous potential in speech recognition and image recognition, and is widely applied to a variety of complex areas such as medical diagnosis, artificial intelligence games, and face recognition. The results of artificial neural networks are accurate enough to surpass real human beings. Despite these many advantages, privacy problems still exist in artificial neural network learning. Learning data for artificial neural network learning includes various information including personal sensitive information, so that privacy can be exposed due to malicious attackers. There is a privacy risk that occurs when an attacker interferes with learning and degrades learning or attacks a model that has completed learning. In this paper, we analyze the attack method of the recently proposed neural network model and its privacy protection method.

Power Analysis Attacks on the Stream Cipher Rabbit (스트림 암호 Rabbit에 대한 전력분석 공격)

  • Bae, Ki-Seok;Ahn, Man-Ki;Park, Jea-Hoon;Lee, Hoon-Jae;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.27-35
    • /
    • 2011
  • Design of Sensor nodes in Wireless Sensor Network(WSN) should be considered some properties as electricity consumption, transmission speed, range, etc., and also be needed the protection against various attacks (e.g., eavesdropping, hacking, leakage of customer's secret data, and denial of services). The stream cipher Rabbit, selected for the final eSTREAM portfolio organized by EU ECRYPT and selected as algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization recently, is a high speed stream cipher suitable for WSN. Since the stream cipher Rabbit was evaluated the complexity of side-channel analysis attack as 'Medium' in a theoretical approach, thus the method of power analysis attack to the stream cipher Rabbit and the verification of our method by practical experiments were described in this paper. We implemented the stream cipher Rabbit without countermeasures of power analysis attack on IEEE 802.15.4/ZigBee board with 8-bit RISC AVR microprocessor ATmega128L chip, and performed the experiments of power analysis based on difference of means and template using a Hamming weight model.