• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.038 seconds

Development of Smartphone Application for Monitoring Container Cargo (컨테이너화물 모니터링을 위한 스마트폰 애플리케이션 개발)

  • Choi, Hyung-Rim;Son, Hee-Mok
    • Journal of Information Technology Services
    • /
    • v.13 no.1
    • /
    • pp.209-220
    • /
    • 2014
  • Most of monitoring systems in logistics industry have limitations on monitoring container information in real-time. And customers only could check information gathered from certain points through web browser. That is why it is very hard to take actions in advance when emergency situation has happened. But if customers could check information such as position and status of freight in real-time through their mobile devices, they could take prompt actions. So, in this study, mobile application based on mobile devices is developed to monitor position and status information of the container in real-time. Entire devices monitoring container in aspect of logistics security are handled by workers in the field. So it is strongly required to develop monitoring system operated in mobile devices. For that reason this study aims to develop mobile application in order to monitor information related to container security and safety in real-time.

An Information Flow Security Based on Protected Area in eCommerce (전자 거래에서 보호 영역을 기반으로 하는 정보 흐름 보안 방법)

  • Seo, Yang-Jin;Han, Sang-Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.1
    • /
    • pp.1-16
    • /
    • 2010
  • Confidentiality is one of the most important requirements of information protection systems. The access control technique has been used to provide confidentiality, but it has fundamental problems in that it cannot prevent violations of confidentiality committed by authorized users. Information flow control is a technique introduced to resolve such problems, and many approaches based on programming languages have been proposed. However, it is not easy for a programmer to implement the technique at the source code level. Furthermore, the practicality of information flow control is difficult to demonstrate because it does not provide control over programs that have already been developed. This paper proposes a method that enables a practical information flow control through using a protected area, a separate part of computer system storage. Case studies are given to show its usefulness.

Leveraged BMIS Model for Cloud Risk Control

  • Song, YouJin;Pang, Yasheng
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.240-255
    • /
    • 2014
  • Cloud computing has increasingly been drawing attention these days. Each big company in IT hurries to get a chunk of meat that promises to be a whopping market in the future. At the same time, information is always associated with security and risk problems. Nowadays, the handling of these risks is no longer just a technology problem, with a good deal of literature focusing on risk or security management and framework in the information system. In this paper, we find the specific business meaning of the BMIS model and try to apply and leverage this model to cloud risk. Through a previous study, we select and determine the causal risk factors in cloud service, which are also known as CSFs (Critical Success Factors) in information management. Subsequently, we distribute all selected CSFs into the BMIS model by mapping with ten principles in cloud risk. Finally, by using the leverage points, we try to leverage the model factors and aim to make a resource-optimized, dynamic, general risk control business model for cloud service providers.

Design of Secure Information Center Using a Conventional Cryptography

  • Choi, Jun-Hyuk;Kim Tae-Gap;Go, Byung-Do;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.53-66
    • /
    • 1996
  • World Wide Web is a total solution for multi-media data transmission on Internet. Because of its characteristics like ease of use, support for multi-media data and smart graphic user interface, WWW has extended to cover all kinds of applications. The Secure Information Center(SIC) is a data transmission system using conventional cryptography between client and server on WWW. It's main function is to support the encryption of sending data. For encryption of data IDEA(International Data Encryption Algorithm) is used and for authentication mechanism MD5 hash function is used. Since Secure Information Center is used by many users, conventional cryptosystem is efficient in managing their secure interactions. However, there are some restrictions on sharing of same key and data transmission between client and server, for example the risk of key exposure and the difficulty of key sharing mechanisms. To solve these problems, the Secure Information Center provides encryption mechanisms and key management policies.

Methods of Organization of Information And Communication Technologies In Institutions of Higher Education

  • Popova, Alla;Sinenko, Oksana;Prokopenko, liudmyla;Dorofieieva Veronika;Broiako, Nadiia;Danylenko, Olha;Vitkalov, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.140-144
    • /
    • 2021
  • The article considers aspects of improving the quality of training of specialists based on the use of modern information and communication technologies in the educational process; the use of teaching methods and, as a result, an increase in the creative and intellectual components of educational activities; integration of various types of educational activities (educational, research, etc.); adaptation of information technology training to individual the characteristics of the student; ensuring continuity and consistency in learning; development of information technologies for distance learning; improving the software and methodological support of educational process.

Proxy based Access Privilige Management for Tracking of Moving Objects

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.225-232
    • /
    • 2022
  • When we drive a vehicle in an IoT environment, there is a problem in that information of car users is collected without permission. The security measures used in the existing wired network environment cannot solve the security problem of cars running in the Internet of Things environment. Information should only be shared with entities that have been given permission to use it. In this paper, we intend to propose a method to prevent the illegal use of vehicle information. The method we propose is to use attribute-based encryption and dynamic threshold encryption. Real-time processing technology and cooperative technology are required to implement our proposed method. That's why we use fog computing's proxy servers to build smart gateways in cars. Proxy servers can collect information in real time and then process large amounts of computation. The performance of our proposed algorithm and system was verified by simulating it using NS2.

Design of Gas-station Searching System Using GIS based Context-Information of Driver (GIS 기반의 운전자 상황정보를 이용한 주유소 최적 검색 시스템 설계)

  • Seo, Tae-Woong;Lee, Seok-Cheol;Kim, Chang-Soo
    • Annual Conference of KIPS
    • /
    • 2010.04a
    • /
    • pp.154-157
    • /
    • 2010
  • 현재 자동차 네비게이션의 위치검색 기능은 사용자가 해당 지역과 주유소 선택을 하면 사용자에게 리스트로 결과를 출력하는 일반적인 검색 방법을 사용한다. 그러나 대부분의 운전자들은 주로 이용하는 주유 업체가 정해져 있고 현재 자동차의 연료 잔량, 리터당 연료의 가격 등의 조건이 정해져 있다. 따라서 본 논문에서는 운전자가 주유소를 결정하는 상황정보 등, 몇 가지 주요 조건을 제시하고, 운전자에게 불필요한 주유소 정보를 제공하지 않도록 운전자의 개인정보에 의한 지능형 검색을 하게 한다. 최종적으로 GIS 분석을 통해 최적의 주유소 검색을 제공하는 시스템을 설계한다.

A Study On Information Security Data Collecting System For Security Monitoring Of Education Facilities (교육기관 보안관제를 위한 효율적인 정보보호 수집체계에 관한 연구)

  • KWEON, SEONG-HO;AHN, JAE-HO;YOON, SUNG-JUN
    • Annual Conference of KIPS
    • /
    • 2009.11a
    • /
    • pp.597-598
    • /
    • 2009
  • 최근의 국가 민간의 정보시스템을 위협하는 공격들은 점점 더 복잡해지고 정교해지고 있다. 이러한 공격들에 대응하기 위하여 범국가적으로 사이버안전센터들이 설립 운영되고 있다. 그러나 이러한 대량의 정보보호 데이터를 수집 분석 대응하는 것은 여러 가지 어려움들이 존재한다. 그 문제의 본질적인 부분은 바로 방대한 데이터의 양(量)이다. 다수의 보안관제 대상 인프라들의 모든 보안데이터를 수집 하는 것은 사실상 불가능하며, 대부분의 센터들은 네트워크 접점에 중앙관리형 보안인프라를 설치함으로써 그 해결점을 찾고 있지만, 이는 최근의 나타나고 있는 다차원적인 공격에 대응하기에는 한계가 있다. 본 논문에서는 이러한 다차원 분석시스템의 기본데이터가 되는 여러 보안정보를 효과적으로 수집할 수 있는 보안정보 수집체계를 제시하고자 한다.

A Study on Improvement of Information Security Management System (ISMS) Information Security Model through Analysis of the Type of Mobile Office (모바일 오피스 유형분석을 통한 정보보호관리체계 (ISMS) 정보보호모형의 개선에 대한 연구)

  • Choi, Yeon-Ho;Lee, Song-Hee;Choi, Jin-Young
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.819-822
    • /
    • 2011
  • 최근 스마트폰의 발전으로 인하여 기업 및 기관에 모바일 오피스의 도입이 빠르게 확산되고 있다. 모바일 오피스는 업무의 편의성을 제공하지만 반면 무선네트워크의 사용량 증가와 상대적으로 보안이 취약한 스마트폰의 이용의 증가로 인하여 정보유출의 위협이 높아지고 있다. 본 논문에서는 "스마트 모바일 오피스 환경에서의 정보보호관리체계(ISMS)를 확장한 정보보호모형"[1]에 유형별로 분류한 모바일 오피스를 분석하고 정보보호모형을 발전시켜 모바일 오피스를 도입하려는 기업 및 기관의 보안환경에 적합한 유형을 선택하는 방향을 제시하고자 한다.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.