• Title/Summary/Keyword: information security product

Search Result 310, Processing Time 0.033 seconds

Vulnerability Analysis of Secure USB: Based on the Password Authentication of Product B (보안 USB 취약점 분석: B 제품 비밀번호 인증을 기반으로)

  • Lee, Kyungroul;Jang, Wonyoung;Lee, Sun-Young;Yim, Kangbin
    • Annual Conference of KIPS
    • /
    • 2018.10a
    • /
    • pp.155-157
    • /
    • 2018
  • 사용자의 개인정보 및 기업의 기밀정보와 같인 데이터의 안전한 이동 및 저장을 위하여 저장장치 보안 기술이 등장하였으며, 보안 USB와 보안 디스크 제품이 대표적으로 등장하였다. 이러한 제품은 저장되는 데이터를 안전하게 보호하기 위하여 사용자 인증 기술 및 데이터 암호 기술, 접근 제어 기술 등의 보안 기술을 적용한다. 특히, 사용자 인증 기술은 비밀번호 인증 기술이 대표적으로 활용되며, 인증을 강화하기 위하여 지문 인증 및 홍체 인증이 활용되고 있다. 따라서 본 논문에서는 보안 USB 제품, 특히 B 제품을 기반으로 적용된 사용자 인증 기술을 분석하고 이를 통하여 발생 가능한 보안 취약점을 분석한다. 분석 결과, 제품 B에 적용된 비밀번호 인증에서 발생 가능한 취약점을 도출하였으며, 이를 통하여 사용자 인증을 우회하여 저장장치 내부에 저장된 데이터의 탈취 가능함을 검증하였다.

Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network (스마트 팩토리 망에서 DPI와 자기 유사도 기술 기반의 OPC-UA 프로토콜 게이트웨이 융합 보안 기술)

  • Shim, Jae-Yoon;Lee, June-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1305-1311
    • /
    • 2016
  • The smart factory, a combination of ICT technology to the entire production process of a product, means can you intelligent factory is to achieve such reduction and process improvement of the production cost. To implement the smart factory, inevitably must have an internal equipment connections to the external network, this is by equipment which is operated by the existing closure network is exposed to the outside network, the security vulnerability so that gender is increased. In order to solve this problem, it is possible to apply security solutions that are used in normal environments. However, it is impossible to have just completely blocking security threats that can occur in a smart factory network. Further, considering the economic damage that can occur during security breach accident, which cannot be not a serious problem. Therefore, in this paper, a look to know the security measures that can be applied to smart factory, to introduce the main fusion security technology necessary to smart factory dedicated security gateway.

Remote Integrated Management System for Applying Efficient Security Policy based on Linux (리눅스 기반의 효율적인 보안 정책 적용을 위한 원격통합관리시스템)

  • 김동환;김현성
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.72-81
    • /
    • 2002
  • Management for security product and application is becoming more difficult because they became more specialized. Most of research is focused on combining policies for information security management policy, security standard, and security tools. However, there are no researches for total solution for both application and security policy. Thereby, the purpose of this research is to propose a remote integrated management system based on linux. The system could efficiently manage data update for application and policy update for a server supporting the distinct configuration of each server. By using the remote integrated management system, system manager with poor secure knowledge also could easily manage their system securely.

  • PDF

CONFORMAL TRANSFORMATIONS IN A TWISTED PRODUCT SPACE

  • KIM, BYUNG-HAK;JUNG, SEOUNG-DAL;KANG, TAE-HO;PAK, HONG-KYUNG
    • Bulletin of the Korean Mathematical Society
    • /
    • v.42 no.1
    • /
    • pp.5-15
    • /
    • 2005
  • The conharmonic transformation is a conformal trans-formation which satisfies a specified differential equation. Such a transformation was defined by Y. Ishii and we have generalized his results. Twisted product space is a generalized warped product space with a warping function defined on a whole space. In this paper, we partially classified the twisted product space and obtain a sufficient condition for a twisted product space to be locally Riemannian products.

Analysis of the Trends of Domestic/International IT Product Introduction Policy and Deduce Improvement Plan of Domestic Policy (국내외 IT제품 도입제도 동향 분석 및 국내 제도 개선방안 도출)

  • Son, Hyo-hyun;Kim, Kwang-jun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.897-906
    • /
    • 2019
  • As the Information and Communication Technology developed, the administration computerization of the government was promoted, and cyber attacks targeting IT products are spreading all over the world due to the reverse functions. Accordingly, governments in each country have begun to verify the security in the introduction of IT products by national and public institutions in order to protect information, and established the policy required in the introduction process. This research analyzes the introduction policy of domestic IT products to identify the supplement point. In addition, we analyze trends of introduction of IT products in the major developed countries such as USA, UK, Japan, Canada, and Australia. Finally, we propose the improvement method of domestic introduction policy through comparison analysis with domestic introduction policy.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Design and Implementation of the Intrusion Detection Data Web-based Management System on Heterogeneous Environments (이기종간 침입탐지 정보에 대한 웹기반 관리 시스템 설계)

  • Kim, Eun-Soo;Kim, Seok-Hun;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.65-74
    • /
    • 2005
  • The hacking accident is increasing repidly according to development of latest computer network and the method becomes various. But, to correspond to hacking, it is lot of difficulties to cope gear and security element between product because most radiant mercuries apply technology between individual digenomic species and It is real condition that great setup, equipment, manpower disturbance are enlarged to apply this. Designed and embody Site-Based executive system that can integrate security element about IDS information between digenomic species to solve these problem and correspond efficiently from hacking.

  • PDF

A Study on Proving RMF A&A in Real World for Weapon System Development (무기체계 개발을 위한 RMF A&A의 실증에 관한 연구)

  • Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.817-839
    • /
    • 2021
  • To manage software safely, the military acquires and manages products in accordance with the RMF A&A. RMF A&A is standard for acquiring IT products used in the military. And it covers the requirements, acquisition through evaluation and maintenance of products. According to the RMF A&A, product development activities should reflect the risks of the military. In other words, developers have mitigated the risks through security by design and supply chain security. And they submit evidence proving that they have properly comply with RMF A&A's security requirements, and the military will evaluate the evidence to determine whether to acquire IT product. Previously, case study of RMF A&A have been already conducted. But it is difficult to apply in real-world, because it only address part of RMF A&A and detailed information is confidential. In this paper, we propose the evidence fulfilling method that can satisfy the requirements of the RMF A&A. Furthermore, we apply the proposed method to real-world drone system for verifying our method meets the RMF A&A.

Analysis on CC Evaluation Demand and Selection of IT Security Products to be evaluated under CC Scheme in Korea (CC 평가수요 분석 및 차기 평가대상 제품군 선정)

  • 오흥룡;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.79-95
    • /
    • 2004
  • The Common Criteria can be used as a guideline for one CCRA member to avoid re-evaluating IT security products which were already evaluated by other CCRA members. In this paper, we have analyzed the evaluated IT security products under CC scheme in several nations, such as Unite States, Great Britain and Australia. and defined new category of the IT security products for the domestic CC evaluation. And we have analyzed the domestic and international market on the information security products, have conducted a poll to receive opinions and demands of the Korean industries for Korea policy decision maker to select the possible IT security products which will be evaluated in Korea under CC scheme. As a conclusion, we have selected 15 IT products based on the response to a poll by the industries, the market size, the evaluation amount demanded by the user, manufacturer, and evaluator, to select the possible IT security product under CC schemes in Korea during next 5 years. Moreover, the characteristics, the benefit, and the demerit of the selected IT products were analyzed. This paper can be used as a guideline document for Korea policy decision maker to select the IT products to be evaluated under CC scheme in Korea for next 5 years.

Security Protocol Design and Analysis for passive RFID Tag (수동형 RFID 태그를 위한 보안 프로토콜 설계 및 분석)

  • Kim, In-Seop;Lee, Byung-Gil;Kim, Ho-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.52-54
    • /
    • 2005
  • 모든 사물에 고유 식별 정보(Unique Product Identifier)가 부착되어 사물의 개별 관리 및 컴퓨팅 환경을 구성하는 RFID(전자식별) 기술이 다양한 응용 및 구현 기술을 위해 활발하게 연구되고 있다. 하지만 수동형 태그 기반 RFID 시스템은 태그 자체의 자원 제약성 때문에 인가되지 않은 사용자에 의한 악의적인 태그 점보 노출이 용이하고, 그 결과 개인의 프라이버시 및 정보의 기밀성이 위협받게 된다. 비록 이를 예방하기 위해 다양한 보호 기법이 제안 되고 있지만 수동형 태그에 적용하기 힘들거나(예: Hash 기반 메카니즘) 보안에 취약하다. 따라서 본 논문에서는 태그 코드 암호화와 리더 인증 관리를 통해서 수동형 태그에 적합하고 프라이버시 보호 및 기밀성을 제공할 수 있는 메카니즘을 제안하고자 한다.

  • PDF