• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.04 seconds

Implementation of Web-based Data Storage Service System Using External Storage Devices (외장형 저장장치를 이용한 웹 기반 데이터 스토리지 서비스 시스템 구현)

  • Kim, Buemjun;Lee, Kyounghee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.111-114
    • /
    • 2017
  • As digital contents are widely used and require increasingly high quality, the data storage services over Internet also become more and more important. One of popular services, web-hard, provides lots of users with web-based functions for data storage, management and sharing but such storage utilization requires quite high cost compared to using portable storage devices. Moreover, some users may avoid putting their important data into open Internet area. On the other hand, portable storage devices are cheaper but can be used only when they are physically connected to host devices such as PC. Also additional management and security functions should be equipped to support data sharing among users. In this paper, we propose a web-based data storage system combining those advantages of aforementioned two approaches. The proposed system immediately provides web-based services for data management and sharing when a portable device such as SDD is connected to the server.

  • PDF

A Design of Smart Banking System using Digital Signature based on Biometric Authentication (바이오인증 기반의 전자서명을 이용한 스마트 뱅킹 시스템 설계)

  • Kim, Jae-Woo;Park, Jeong-Hyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6282-6289
    • /
    • 2015
  • Today, there is an increasing number of cases in which certificate information is leak, and accordingly, electronic finance frauds are prevailing. As certificate and private key a file-based medium, are easily accessible and duplicated, they are vulnerable to information leaking crimes by cyber-attack using malignant codes such as pharming, phishing and smishing. Therefore, the use of security token and storage toke' has been encouraged as they are much safer medium, but the actual users are only minimal due to the reasons such as the risk of loss, high costs and so on. This thesis, in an effort to solve above-mentioned problems and to complement the shortcomings, proposes a system in which digital signature for Internet banking can be made with a simply bio-authentication process. In conclusion, it was found that the newly proposed system showed a better capability in handling financial transitions in terms of safety and convenience.

Detecting Malicious Scripts in Web Contents through Remote Code Verification (원격코드검증을 통한 웹컨텐츠의 악성스크립트 탐지)

  • Choi, Jae-Yeong;Kim, Sung-Ki;Lee, Hyuk-Jun;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Sharing cross-site resources has been adopted by many recent websites in the forms of service-mashup and social network services. In this change, exploitation of the new vulnerabilities increases, which includes inserting malicious codes into the interaction points between clients and services instead of attacking the websites directly. In this paper, we present a system model to identify malicious script codes in the web contents by means of a remote verification while the web contents downloaded from multiple trusted origins are executed in a client's browser space. Our system classifies verification items according to the origin of request based on the information on the service code implementation and stores the verification results into three databases composed of white, gray, and black lists. Through the experimental evaluations, we have confirmed that our system provides clients with increased security by effectively detecting malicious scripts in the mashup web environment.

A Design of the Smart Control System for Industrial Automation Equipment (산업용 자동화 장비를 위한 스마트 제어 시스템 설계)

  • Kim, Bo-Hun;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.677-684
    • /
    • 2017
  • Smart devices are used in a variety of industries, because applications for them are easy to develop and portable. However, industrial equipment can cause security problems for information and accidents when controlling the actuator of the equipment at a remote location. In this paper, we studied methods of solving these problems and the advantages of applying smart control systems to industrial equipment. We propose a manual manipulation method using queries and a smart control access procedure for controlling equipment using a smart device. In addition, we propose a data transmission method employing multiple encryption protocols and a user authentication method using unique information from the smart device and Q & A as the communication data protection and user authentication methods, respectively. In order to evaluate its performance, an operation test of the smart control system and user authentication comparison experiment were performed. In order to understand the advantages of applying the smart control system to the equipment, we conducted a comparative experiment with a teach pendant and evaluated its reaction time in case of error.

Design and Implementation of High-Resolution Image Transmission Interface for Mobile Device (모바일용 고화질 영상 전송 인터페이스의 설계 및 구현)

  • Ahn, Yong-Beom;Lee, Sang-Wook;Kim, Eung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1511-1518
    • /
    • 2007
  • As studies on ubiquitous computing are actively conducted, desire for various services, including image transmission storage, search and remote monitoring. has been expanding into mobile environment as well as to PCs. while CCTV (closed circuit TV) and un DVR (Digital video Recording) are used in places where security service such as intrusion detection system is required, these are high-end equipment. So it is not easy for ordinary users or household and small-sized companies to use them. Besides, they are difficult to be carried and camera solution for mobile device does not support high-quality function and provides low-definition of QVGA for picture quality. Therefore, in this study, design and implementation of embedded system of high-definition image transmission for ubiquitous mobile device which is not inferior to PC or DVR are described. To this end, usage of dedicated CPU for mobile device and design and implementation of MPEG-4 H/W CODEC also are examined. The implemented system showed excellent performance in mobile environment, in terms of speed, picture quality.

A Study on the Implementation of Management System Based on UHD Transmission Contents (UHD 송출 콘텐츠 기반 관리시스템 구현)

  • Kim, Moo Yeon;Jang, Byung Min;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.813-826
    • /
    • 2019
  • This paper is a study on the implementation of MAM(Media Asset Management) to utilize UHD contents as high quality broadcast material. The implementation method of this paper is to separate MAM roles with content management functions and transmission workflow functions from workflow, metadata and system interface related work, which are divided into core MAM and MAM-Ex structure. Through the method proposed in this paper, we improved the content management method by applying the page menu method to the material metadata modification and applying the template method to the material structure API. In addition, the storage of UHD material and the configuration of the component server are pooled without any distinction of channels, thereby enhancing the security of UHD transmission assets by minimizing the movement of contents together with broadcasting material protection.

Analysis of Domestic and Foreign Military UAV Development Trends and Suggestions for Countermeasures Against North Korea UAVs (국내외 군사용 무인기 개발 동향 분석 및 북한 무인기 대응 방안 제언)

  • Kim, Gyou-Beom;Cho, In-Je;Seo, Il-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.97-105
    • /
    • 2021
  • Countries such as the United States, Russia, and Europe are developing and operating UAVs for various purposes, including stealth UAVs. North Korea is also operating unmanned aerial vehicles, and it is presumed that it is continuously flying south of the demarcation line to obtain information on the national security zone, but it is difficult to detect and neutralize it effectively. Therefore, this paper analyzed the military UAV development trends and military radar specifications in Western countries such as the United States and communist countries such as Russia, China, and North Korea through literature research. In addition, based on the investigation of the AESA radar-based UAV response system in the country, not only general responses but also countermeasures such as direct strike and electromagnetic pulses to North Korean UAVs that cannot be jammed were suggested.

Comparison of Hazard Analysis for Medical Device System (의료기기 시스템의 해저드 분석 기법 비교)

  • Choi, Bo-yoon;Lee, Byong-gul;Han, Hyuk-soo
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.133-145
    • /
    • 2018
  • Medical systems incurred accidents may result in significant damage for human being. Therefore, performing hazard analysis is important for medical system which is to identify hazard for preventing the accidents and minimizing the potential harm. Hazard analysis that is applied medical systems are difficult to apposite selected, because difference of analysis methods and applied development lifecycle is caused by objective of hazard analysis. It is required to select appropriate hazard analysis at concept phase during development lifecycle, owing to basic requirement elicitation to mitigate or prevent hazard based on identified hazard at concept phase. In this paper, hazard analysis methods, PHA and STPA, are compared at concept phase in which both methods have been applied on the medical system. As a result of compared methods, hazard analyst can be selected optimized hazard analysis methods for concept phase of the medical systems.

A Study on Maritime Communication LINKS for Emergency Disaster (비상 재난에 대비한 해양 연계통신 연구)

  • Yoo, Jae-won;Park, Dae-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.375-378
    • /
    • 2014
  • Marine disaster, such as 'the sinking of the Sewol ferry', on the ocean needs emergency communication with land post and Rescue services. Especially, It needs of emergency comomunication system has increased in Korea peninsula with the sea on three side. The system will be more fully equipped to deal with disasters linked to communication so alone sailing ship is at sea. Research is needed on communication links to submarines operated by submarine to sink a ship, as well as immersion in the sea with. And it is necessary in the study of the land in preparation for the emergency disaster ship and submarine communication links for offshore and subsea oil and associated communication systems. Will be studied in preparation for the communication protocols and emergency and disaster location and land the plane or for a career in the satellite systems are linked through this. It is necessary for this purpose is research on the integrated emergency disaster communication ecosystem.

  • PDF

Method for Detecting Modification of Transmitted Message in C/C++ Based Discrete Event System Specification Simulation

  • Lee, Hae Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.171-178
    • /
    • 2021
  • In this paper, the author proposes a method for detecting modification of transmitted messages in C/C++ based Discrete Event System Specification (DEVS) simulation. When a message generated by a model instance is delivered to other model instances, it may be modified by some of the recipients. Such modifications may corrupt simulation results, which may lead to wrong decision making. In the proposed method, every model instance stores a copy of every transmitted message. Before the deletion of the transmitted message, the instance compares them. Once a modification has been detected, the method interrupt the current simulation run. The procedure is automatically performed by a simulator instance. Thus, the method does not require programmers to follow secure coding or to add specific codes in their models. The performance of the method is compared with a DEVS simulator.