• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.033 seconds

Design and Construction of Convention e-Portal Information System (컨벤션 e-Portal 정보시스템의 설계 및 구축)

  • Jeon, In-Oh;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.131-138
    • /
    • 2008
  • This paper designed an Internet Convention e-Portal Information System through an experience and knowledges accumulated in case of information utilization regarding international meeting and conventions in knowledge information societies. Established the Non-stop Cluster system that was the H/W side, L4 and the applied system which was the 3-tier structure and Firewall, VPN, IDS/IPS security control system, S/W side, that utilized the WAS MVC architecture used WAS and a SOA architecture. an ASP EAI function. A user and a manager, designs and constructor, the user efficiency who were an evaluation basis of a Verification commissioner, Ubiquitous evaluated system stability. Information security anger, and evaluated former system and comparison. Therefore is evaluated to the excellent Convention e-Portal Systems that a performance 25.9% improvement consisted of compare with the existing Convention e-Portal Systems, and will contribute so as to be able to carry out-driven enemy role in development of the industrial our country Convention Ubiquitous Internet IT information Industry and International Society Conventions.

  • PDF

Assessing the Success rate of e-Learning Systems Aadoption in Saudi Higher Education Institutions during COVID-19 Pandemic: Student Perspective

  • Aljuhani, Nouf;Matar, Zinah;Alzahrani, Asma;Saeedi, Kawther;Badri, Sahar;Fakieh, Bahjat
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.77-88
    • /
    • 2022
  • In response to the significant COVID-19 outbreak, countries have enforced the use of E-learning systems as an alternative to traditional learning; to contain the virus and minimize the infection rate while maintaining the continuity of the learning experience. However, the effective adoption of E-learning systems requires a well-understanding of critical factors, especially in times of crisis. In this regard, this study intends to assess the success of the E-learning system adoption by Higher Education Institutions (HEIs) during the crisis of COVID-19 by utilizing the Information Systems Success (ISS) model. This study's adopted model consists of nine interdependent dimensions, namely: Technical System Quality, Information Quality, Service Quality, Learner Quality, Perceived Satisfaction, Perceived Usefulness, System Use, Intention to Use, and System Success. An electronic survey was distributed among higher education students from different universities in Saudi Arabia to explore each model's dimension. Structural Equation Modeling (SEM) has been applied via SmartPLS software to test the causal relationships between dimensions. This study's main results revealed that students' Service Quality, Learner Quality, and the Intention to Use by students are essential drives for E-learning System Use during the Covid-19 pandemic. Meanwhile, the Intention to Use the system is significantly influenced by Perceived Satisfaction and Perceived Usefulness dimensions. Further, Perceived Satisfaction, Perceived Usefulness, and System Use are interdependent, and all three have a significant positive impact on E-learning System Success.

Knowledge-based Modeling for System Security (시스템 보안을 위한 지식기반 모델링)

  • 서희석;김희원
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.491-500
    • /
    • 2003
  • The need for network security is being increasing due to the development of information communication and internet technology, In this paper, firewall models, operating system models and other network component models are constructed. Each model Is defined by basic or compound model using MODSIM III. In this simulation environment with representative attacks, the following attacks are generated, SYN flooding and Smurf attack as an attack type of denial of service. The simulation is performed with the models that exploited various security policies against these attacks. In addition, the results of the simulation show that the analysis of security performance according to various security policies, and the analysis of correlation between availability and confidentiality according to security empowerment.

  • PDF

Fuzzy Controller Design for Selecting the Agent of Contract Net Protocol (계약망 프로토콜의 에이전트 선택을 위한 퍼지 컨트롤러 설계)

  • 서희석;김희완
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.251-260
    • /
    • 2004
  • As the importance and the need for network security is increased, many organization uses the various security systems. They enable to construct the consistent integrated security environment by sharing the vulnerable information among firewall, intrusion detection system, and vulnerable scanner. We construct the integrated security simulation environment that can be used by some security system model. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. We compare the selection algorithm in the CPN with the Fuzzy Controller for the effective method to select the agents.

  • PDF

An Authentication Protocol for the Security of RFID Tags and Readers using Random Number (난수를 이용한 RFID 태그와 리더의 보안 인증 프로토콜)

  • Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.229-233
    • /
    • 2012
  • A RFID system is a technology for detecting information on an object through wireless communication between a tag on the object and a reader, and its applications are being expanded to various areas. Because of its wireless communication, however, there are many vulnerabilities in security. Until now, many studies have been executed in order to solve problems related to the security and stability of RFID. In order to resolve vulnerabilities in existing security methods for privacy protection, this study proposed an authentication protocol that uses hash values received from tags and random numbers. When the proposed protocol was implemented, it was safe from various types of attacks between tag and reader and between reader and DB. Furthermore, compared to recently proposed protocols, it could implement a RFID system with enhanced security and less computation in tags.

Development of a Cybersecurity Workforce Management System (사이버 보안 분야 전문가 프로파일 관리 시스템 연구)

  • Ahn, Jun-young;Lee, Seung-hun;Park, Hee-min;Kim, Hyun-chul
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.3
    • /
    • pp.65-70
    • /
    • 2021
  • According to the trend of increasingly sophisticated cyber threats, the need for technology research that can be applied to cyber security personnel management and training systems is constantly being raised not only overseas but also in Korea. Previously, the US and UK have already recognized the need and have been steadily conducting related research from the past. In the United States, by encouraging applications based on related research (NICE Cybersecurity Workforce Framework) and disclosing successful use cases to the outside, it is laying the groundwork for profiling cyber security experts. However in Korea, research on cyber security expert training and profiling is insufficient compared to other countries. Therefore, in this study, in order to create a system suitable for the domestic situation, research and analysis of cases in the United States and the United Kingdom were conducted over the past few years, and based on this, a prototype was produced for the study of profiling technology for domestic cyber security experts.

Decentralized Identity Based Digital Certificate System for Prevention of Infectious Diseases (감염병 예방을 위한 분산ID 기반 디지털 증명서 시스템)

  • Park, Sung-chae;Lee, Ju hyun;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.49-66
    • /
    • 2022
  • The COVID-19 pandemic has led many countries around the world to introduce and employ a digital certificate system to prevent infectious diseases, however, there are difficulties in using the compatible digital certificate between countries in that the international standards of the system have not been developed. Accordingly, we propose an improved system, comparing two methods of presenting a certificate, existing QR code-based and a short-range wireless communication-based certificates. The proposed system is a digital certificate system against the spread of infectious disease by storing verification information of the certificate using decentralized identity-based technology on the blockchain. Blockchain-based trust anchor improves security by solving the problem of forgery and alteration of certificates and guaranteeing the identity of certificate issuers and presenters. This system is also expected to enhance usability providing concurrent verification of a number of certificates(vaccination certificates, recovery certificates, test results, identity certificates, etc.) in a single certificate presentation.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Study on the Technical Security Factor for the Implementation of Secure DB System (안정적인 DB보안 시스템 구축을 위한 보안기술요소 분석에 관한 연구)

  • Yoon, Sun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.143-152
    • /
    • 2014
  • This paper introduces Database security to prevent the rapidly increasing issue of private information leakage. The Database security examined in the paper separates into DB access control area and DB encryption area which further leads the paper to analyze the factors of the two areas and suggest necessary elements for creating stable Database security. In addition, the paper examines previous DB security programs by areas and analyzes pros and cons from the tested result. The experiment indicated that while DB access control presents less degradation and reduced the need to modify the existing DBMS since the access control operates at the end point of the network, DB encryption presented strength in protecting the data from unauthorized access. On the other hand, DB access control is less useful in preventing the attack in advance which leaves the log to enable tracking afterward while DB encryption can only be operated by limited types of Database and causes degradation due to system load and shows higher percentage of failure when creating the system. This paper examines characteristics of Database security areas in order to be used as a reference for institutions or companies seeking stable Database security.

Remote Integrated Server Management System Based on PKI (PKI를 이용한 원격 통합 서버 관리 시스템)

  • 김지호;박세현;송오영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.280-283
    • /
    • 2002
  • 본 논문에서는 기존 서버 원격관리 시스템이 안고있던 보안상의 문제점을 최근에 보안 인프라로써 각광을 받고 있는 PKI(Public Key Infrastructure)를 사용한 원격 통합 서버관리 시스템을 제안하고자 한다. 통합 인증서버는 관리자의 인증을 SCVP를 사용해서 검증하며, SSL(Secure Socket Layer)을 통해서 데이터의 기밀성을 보장한다. 또한 제안된 시스템은 관리자가 다양한 종류의 플랫폼과 운영체제를 한번의 인증과정으로 원격에서 통합 관리가 가능한 SSO(Single-Sign On) 시스템이다.

  • PDF