• Title/Summary/Keyword: information security product

Search Result 310, Processing Time 0.036 seconds

A Study on Application Methodology of SPDL Based on IEC 62443 Applicable to SME Environment (중소기업환경에서 적용 가능한 IEC 62443 기반의 개발 보안 생애주기 프로세스 적용 방안 연구)

  • Jin, Jung Ha;Park, SangSeon;Kim, Jun Tae;Han, Keunhee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.6
    • /
    • pp.193-204
    • /
    • 2022
  • In a smart factory environment in a small and medium-sized enterprise (SME) environment, sensors and actuators operating on actual manufacturing lines, programmable logic controllers (PLCs) to manage them, human-machine interface (HMI) to control and manage such PLCs, and consists of operational technology server to manage PLCs and HMI again. PLC and HMI, which are in charge of control automation, perform direct connection with OT servers, application systems for factory operation, robots for on-site automation, and production facilities, so the development of security technology in a smart factory environment is demanded. However, smart factories in the SME environment are often composed of systems that used to operate in closed environments in the past, so there exist a vulnerable part to security in the current environment where they operate in conjunction with the outside through the Internet. In order to achieve the internalization of smart factory security in this SME environment, it is necessary to establish a process according to the IEC 62443-4-1 Secure Product Development Life cycle at the stage of smart factory SW and HW development. In addition, it is necessary to introduce a suitable development methodology that considers IEC 62443-4-2 Component security requirements and IEC 62443-3 System security requirements. Therefore, this paper proposes an application plan for the IEC 62443 based development security process to provide security internalization to smart factories in an SME environment.

Study of Compare Research Analysis of Security Present Condition in University Academic Affairs Database (대학 학사 데이터베이스 보안현황 조사 분석 비교에 관한 연구)

  • Jeong, Yoon-Su;Park, Nam-Kyu;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.113-119
    • /
    • 2012
  • Even though the rapid development of IT technique accelerates informationization for quality improvement of university, security measures are needed for security problems because the major information related to academic affairs is centered on academic database. In this paper, we research and analyze the actual condition of database security of domestic university to develop process model that can consistently keep and improve the security of academic database which is the most important data in university. Also, considering the situation that a lot of universities can't use database security product, we propose details that implement the most important key part like confidentiality with the function that DBMS provides only.

A Study on ICT Security Change and CPS Security System in the 4th Industry Age (4차 산업 시대의 ICT 보안 변화와 CPS 보안 시스템에 관한 연구)

  • Joo, Heon-Sik
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.293-300
    • /
    • 2018
  • This study explored the security of Industry 4.0 such as security trends and security threats in Industry 4.0, and security system in Industry 4.0. The threat elements in Industry 4.0 are changing from ICT to IoT and to CPS security, so security paradigm and security System should change accordingly. In particular, environmental and administrative security are more important to solve CPS security. The fourth industry-age security should change to customized security for individual systems, suggesting that the security technology that combines hardware and software in product production design should change from the beginning of development. The security system of the fourth industry proposes design and implementation as a CPS security system as a security system that can accommodate various devices and platforms from a security system in a single system such as a network to an individual system.

THE LINEAR DISCREPANCY OF A PRODUCT OF TWO POSETS

  • Cheong, Minseok
    • Bulletin of the Korean Mathematical Society
    • /
    • v.54 no.3
    • /
    • pp.1081-1094
    • /
    • 2017
  • For a poset $P=(X,{\leq}_P)$, the linear discrepancy of P is the minimum value of maximal differences of all incomparable elements for all possible labelings. In this paper, we find a lower bound and an upper bound of the linear discrepancy of a product of two posets. In order to give a lower bound, we use the known result, $ld({\mathbf{m}}{\times}{\mathbf{n}})={\lceil}{\frac{mn}{2}}{\rceil}-2$. Next, we use Dilworth's chain decomposition to obtain an upper bound of the linear discrepancy of a product of a poset and a chain. Finally, we give an example touching this upper bound.

Developing a Platform of Platform for Disaster Technology and Information Sharing (재난기술·정보 공유를 위한 글로벌체계 플랫폼 개발)

  • Lee, Young Jai
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.13-19
    • /
    • 2012
  • This paper introduces platform of platform (POP) for global network on climate adaptation change and disaster risk reduction (CCA/DRR). The POP consists of disaster prevention technology e-market platform, e-learning platform, information sharing platform, and monitoring platform for AMCDRR action plan. The POP is developing based on Korean e-Government standard framework and supports Web and mobile service. Additionally the POP uses special product and technology to search and classify data about CCA/DRR.

Frequency Matrix Based Summaries of Negative and Positive Reviews

  • Almuhannad Sulaiman Alorfi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.101-109
    • /
    • 2023
  • This paper discusses the use of sentiment analysis and text summarization techniques to extract valuable information from the large volume of user-generated content such as reviews, comments, and feedback on online platforms and social media. The paper highlights the effectiveness of sentiment analysis in identifying positive and negative reviews and the importance of summarizing such text to facilitate comprehension and convey essential findings to readers. The proposed work focuses on summarizing all positive and negative reviews to enhance product quality, and the performance of the generated summaries is measured using ROUGE scores. The results show promising outcomes for the developed methods in summarizing user-generated content.

Relationship between Pursuit Benefit and Behavior by Spectators Participating Security Exhibition (보안엑스포 참관객의 추구편익과 참관 후 행동의 관계)

  • Kim, In-Jae
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.35-56
    • /
    • 2014
  • The purpose of this study was aimed to identify the relationship between pursuit benefit and behavior by spectators participating security exhibition. The result of study is significant because it may provide more effective and aggressive marketing strategies to the future companies participating security exhibition, and suggest developmental direction by actively responding spectators' needs. The subject for this study was spectators who participating World Security Expo 2014 held three days from March 12 to 14 in 2014. 300 samples were selected by convenience sampling for subject of this study. 283 out of 300 surveys, excluded 17 unfaithful and defected surveys, were used for data analysis. Research tool was questionnaire which was based on and recomposed by previous researches home and abroad. The collected data were treated for analysis of frequency, reliability, factor analysis, correlation, and regression by using SPSS statistic package version of 18.0. Through the above research method and procedure, the results were as followings. First, the relationship between pursuit benefit and behavior after participating exhibition appeared positively. It was found that there was high relationship between pursuit benefit and behavior. Second, analyzing relationship of factors between pursuit benefit and behaviors resulted to effect information exploration, good use of spare time, and product purchase on word of mouth. Third, analyzing relationship of factors between pursuit benefit and behaviors resulted to effect good use of spare time, information exploration, and product purchase on re-participation.

  • PDF

Defense ICT Supply Chain Security Threat Response Plan (국방 ICT 공급에 대한 보안 위협 대응 방안)

  • Lee, Yong-Joon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.125-134
    • /
    • 2020
  • The potential security threat is increasing as the supply of ICT products to the defense sector increases with the development of information and communication technology. Attempts to neutralize, such as intelligence gathering and destruction, through attacks on the defense power support system and the intelligence system of the weapons system could pose a fatal threat.Therefore, security measures of supply chain shear system that take into account ICT product production and operation stage to maintenance stage are needed in defense field. In the paper, technical and administrative measures for responding to 12 ICT supply chain security threats at each stage of the defense ICT supply chain life cycle were presented.

A Security SoC supporting ECC based Public-Key Security Protocols (ECC 기반의 공개키 보안 프로토콜을 지원하는 보안 SoC)

  • Kim, Dong-Seong;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1470-1476
    • /
    • 2020
  • This paper describes a design of a lightweight security system-on-chip (SoC) suitable for the implementation of security protocols for IoT and mobile devices. The security SoC using Cortex-M0 as a CPU integrates hardware crypto engines including an elliptic curve cryptography (ECC) core, a SHA3 hash core, an ARIA-AES block cipher core and a true random number generator (TRNG) core. The ECC core was designed to support twenty elliptic curves over both prime field and binary field defined in the SEC2, and was based on a word-based Montgomery multiplier in which the partial product generations/additions and modular reductions are processed in a sub-pipelining manner. The H/W-S/W co-operation for elliptic curve digital signature algorithm (EC-DSA) protocol was demonstrated by implementing the security SoC on a Cyclone-5 FPGA device. The security SoC, synthesized with a 65-nm CMOS cell library, occupies 193,312 gate equivalents (GEs) and 84 kbytes of RAM.

A Study on Establishment of Evaluation Criteria for Mobile Anti-Birus Performance Test (모바일 Anti-Virus 성능 시험을 위한 평가 기준 수립 연구)

  • Jeongho Lee;Kangsik Shin;Youngrak Ryu;Dong-Jae Jung;Ho-Mook Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.1101-1113
    • /
    • 2024
  • With the recent increase in hacks targeting smartphones, users are becoming increasingly anxious about the security of their smartphones. Using a mobile anti-virus is one of the best ways to reduce this anxiety. However, there aren't many ways for users to learn about mobile anti-virus performance and features. While there are certification organizations that conduct annual performance evaluations of mobile anti-virus products and make them publicly available, they don't disclose the specifics of their testing methods and detailed results. In addition, previous quality evaluation studies are not suitable for evaluating modern mobile anti-viruses due to the existence of evaluation criteria that are not suitable for mobile anti-virus product evaluation or lack of validation. Therefore, this paper establishes detailed mobile anti-virus evaluation metrics suitable for the evaluation of modern mobile anti-viruses and applies them to 10 domestic and international mobile anti-virus products to verify the validity of the established evaluation metrics.