• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.035 seconds

Information Security Activities of The Design Phase (설계단계의 정보보호 활동)

  • Shin, SY;Kim, DK;Lee, CW;Lee, HC;Lee, TW;Park, KH
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.745-746
    • /
    • 2016
  • The design phase is a process that is embodied to be interpreted and implemented in a requirement of the system information in the analysis phase. In the design phase, the design privacy, information security test plan is established, activities are carried out.

  • PDF

The Order of Formation of Information Signals in IIoT

  • Alla Jammine;Serkov Alexandr;Bogdan Lazurenko;Nait-Abdesselam Farid
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.139-143
    • /
    • 2023
  • In this article we propose using mathematical models of signals in wireless communication systems with autocorrelation reception of modulated ultra-wideband signals. For the transmission of information content, the method of positional-time coding is used, in which each information bit is encoded by hundreds of ultrashort pulses that arrive within a certain sequence. Comparative analysis has shown that the best noise immunity of the systems considered in this paper is the communication system, which uses the time separation of the reference and information signals.

A Research on Mobile Malware Model propagated Update Attacks (변조 업데이트를 통해 전파되는 모바일 악성어플리케이션 모델 연구)

  • Ju, Seunghwan;Seo, Heesuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.47-54
    • /
    • 2015
  • The popularity and adoption of smart-phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. The fluidity of application markets complicate smart-phone security. There is a pressing need to develop effective solutions. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smart-phone application. Now, the analytical methods used mainly are the reverse engineering-based analysis and the sandbox-based analysis. Such methods are can be analyzed in detail. but, they take a lot of time and have a one-time payout. In this study, we develop a system to monitor that mobile application permissions at application update. We had to overcome a one-time analysis. This study is a service-based malware analysis, It will be based will be based on the mobile security study.

A study on the security system for wireless LAN (무선 LAN을 위한 보호시스템에 관한 연구)

  • 박영호;김철수
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.3
    • /
    • pp.107-115
    • /
    • 2002
  • The rapid progress of wireless LAN technology has prompted new security problems and countermeasures against them. Since the mobility of users and wireless access to the network exasperate potential security threat such as eavesdropping and illegal access, security services for wireless LAN should be provided. In this paper, we define the security model, WEP and AES encrypt/decrypt technologies which are proposed in the IEEE802.11 standard and the IEEE802.11eS draft and propose the Key distribution protocol for the wireless LAN.

  • PDF

Analyses of Trend of Threat of Security in Internet of Things (사물 인터넷망에서의 보안 위협 기술 동향 분석)

  • Shin, Yoon-gu;Jung, Sungha;Do, Tahoon;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.895-896
    • /
    • 2015
  • With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart devices security, intelligent building and o on. Bridging between wireless sensor networks with traditional communication networks or Internet, IoT gateway plays n important role in IoT applications, which facilitates the integration of wireless sensor networks and mobile communication networks or Internet, and the management and control with wireless sensor networks. The IoT Gateway is a key component in IoT application systems but It has lot of security issues. We analyzed the trends of security and privacy matters.

  • PDF

A Review of IPTV Threats Based on the Value Chain

  • Lee, Hong-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.2
    • /
    • pp.163-177
    • /
    • 2009
  • The demand for services using digital technology is constantly increasing as new developments in digital consumer electronics and the Internet are made. This is especially true in terms of the demand for IPTV utilizing high speed Internet networks. Research on IPTV threats is important for facilitating financial transactions via IPTV and preventing illegal use or copying of digital content. Thus, this paper analyzes IPTV threats via the IPTV value chain. That is, the distribution system for IPTV service is analyzed along with the components of the value chain and corresponding IPTV security requirements or security technologies, in order to perform a threat analysis and research suitable for the IPTV service environment. This paper has a greater focus on the value chain of the IPTV business than the approach in previous research, in order to analyze security requirements and technologies that are more applicable to the business environment.

Design of Network Topology Map Generator for Management of Security System (보안 시스템의 관리를 위한 망 토폴러지 맵 생성기의 설계)

  • Ahn, Gae-Il;Baik, Kwang-Ho;Kim, Ki-Young;Jang, Jong-Soo
    • Annual Conference of KIPS
    • /
    • 2002.11b
    • /
    • pp.1293-1296
    • /
    • 2002
  • 악의 있는 사용자로부터 네트워크와 시스템을 보호하기 위하여 침입 탐지 시스템이나 방화벽같은 보안 시스템들이 제안되었다. 현재 보안 영역은 사용자 망에서 ISP 망으로 확대되고 있으며, 그에 비례하여 보안 시스템의 관리가 상대적으로 중요해졌다. 또한 보안 시스템에 적용하는 정책도 단순 정적 설정에서 현재의 보안 상황을 반영하여 정책을 재 수립하는 동적 설정으로 바뀌고 있기 때문에, 이를 위하여 관리자에게 망 상태를 주기적으로 보고하는 일도 또한 매우 의미 있는 일이 되었다. 본 논문에서는 SNMP(Simple Network Management Protocol) 프로토콜을 이용하여 보안 시스템의 설치 및 운용을 용이하게 할 수 있는 망 토폴러지 맵 생성기를 설계한다. 제안하는 망 토폴러지 맵 생성기는 탐색할 네트워크 도메인이 주어지면 자동적으로 네트워크 시스템과 보안 시스템을 발견하여 망 토폴러지를 생성하며 또한 망 상태를 주기적으로 수집하는 기능도 제공한다.

  • PDF

The Design of LSM-Based Extended RBAC Security System (리눅스 보안 모듈 기반의 확장된 역할 기반 접근 제어 보안 시스템 설계)

  • 박신혜;예흥진;김동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.628-630
    • /
    • 2003
  • 오늘날의 규모가 매우 크고 복잡한 시스템 및 네트워크 환경 하에서 컴퓨터 시스템의 보안 관리는 매우 중요하다. 역할기반 접근제어 (RBAC : Role-Based Access Control)는 시스템 상의 역할을 기반으로 하는 접근제어 메커니즘으로 복잡한 접근정책을 기술하고, 시스템 관리상의 에러와 비용을 줄일 수 있다. 본 논문은 리눅스 커널에 보안 강화를 지원하는 리눅스 보안 모듈(LSM: Liunx Security Module) 프레임워크 상에서 확장된 역할기반 접근제어 보안 시스템 (LSM-Based Extended RBAC Security Module)을 제안한다. 본 고에서 제안된 시스템은 보안의 강화를 위하여 원 타임 패스워드 (One-Time Password)의 강화된 인증 방식과 부분적 다중 계층 보안 (Partial Multi-Level Security), 임의적 접근 제어(Discretionary Access Control) 및 감사 정보를 통한 보안 정책 오류 검사 및 대응 (Security Policy Validation and Response) 기능을 지원한다.

  • PDF

Side Channel Analysis System - SCARF (부채널 분석 시스템 - SCARF)

  • Kim, Ju-Han;Oh, Kyung-Hee;Choi, Yong-Je;Kim, Tae-Sung;Choi, Doo-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.266-268
    • /
    • 2012
  • 부채널 분석 공격은 하드웨어 또는 소프트웨어로 구성된 암호모듈이 동작 시에 발생되는 전력 또는 전자파 등의 부가 정보들을 수집하고 통계적으로 처리하여 해당 암호모듈의 키를 찾아내는 공격방법이다. 부채널 분석 공격을 막기 위해 암호모듈 개발자들은 부채널 분석 공격에 안전한지 미리 점검하고 시험할 수 있는 시스템이 필요하며, 부채널 안전성 평가 기관에서는 해당 암호모듈이 안전한지 평가하기 위한 시스템이 필요하다. 본 논문에서는 부채널 안전성 평가 및 시험을 하기 위해 개발한 부채널 안전성 검증 시스템인 SCARF를 소개한다.

Analyses and Considerations for Data base Security Requirements for Desktop Virtualization (데스크톱 가상화를 위한 데이터 보안 요구 사항 분석 및 고찰)

  • Wu, Daming;Park, Jong Hyuk
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.634-636
    • /
    • 2015
  • As the expansion of enterprise scale and the increase of staff, the amount of terminal is increasing as well. It is very difficult to the system manager of traditional data protection scheme to manage and maintenance for the large number of terminals. This problem can be solved by desktop virtualization, which use traditional security problems still exist and new security problems occur at the same time. Using desktop virtualization, it needs a method of automatic security protection. In this paper, the desktop virtualization security requirements are discussed.