• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.042 seconds

A Study on the Effect of Format String on Secure Programming in C Language (C언어에서 포맷 스트링이 프로그램 보안에 미치는 영향)

  • Lee, Hyung-Bong;Cha, Hong-Jun;Choi, Hyung-Jin
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.693-702
    • /
    • 2001
  • One of the major characteristics of C language is that it allows us to use pointer type variables to access any area of virtual address space. So, we can read/write/execute from/to virtual memory area not controlled delicately by operating system. We can access such memory area by using format string and it can be a vulnerability of C language from the point of secure programming. In this paper, we analyze in detail the process of security attack based on format string and then exploit a new virus style attack which is stepwise and durable with some actual scenarios to warn the severity of it, and grope for some preliminary responding actions.

  • PDF

Implementation of Digital Laser Welding Cell for Car Side Panel Assembly (차체 사이드 패널 조립을 위한 디지털 레이저용접 셀 구현)

  • Park Hong Seok;Choi Hung Won;Kang Mu Jin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.22 no.5 s.170
    • /
    • pp.113-120
    • /
    • 2005
  • Because of the turbulent markets and the increasing demand on product quality, the application of new technology to practice is increasingly important. In case of automotive industries, they take interest in laser welding to solve these problems because laser welding has many advantages such as good accessibility, welding quality, fast welding speed and so on. To apply this technology to welding of car body, the data of laser welding are collected through lots of the experiment according to the material, geometry and layer number of welding points. Based on the experiment results and the information of product, i.e. the car side panel, the clustering of stitches for laser welding was carried out and the optimal equipments are selected through the comparison between the requirements of welding and the potential of equipments. Using these results, laser welding cell for the car side panel are configured with the concept of the digital manufacturing, which ensures maximum planning security with visualization and simulation. Finally, the optimal laser welding cell is chosen by the evaluation of alternative cells with assessment criteria.

The Relationship Between Financial Literacy and Public Awareness on Combating the Threat of Cybercrime in Malaysia

  • ISA, Mohd Yaziz Bin Mohd;IBRAHIM, Wan Nora Binti Wan;MOHAMED, Zulkifflee
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.12
    • /
    • pp.1-10
    • /
    • 2021
  • Purpose: Cyber criminals have affected various markets and the banking system has encountered various kinds of cyberattacks. The purpose of this study is to analyze cybercrime that is an emerging threat and investigate the significant contribution of financial literacy and public awareness on cybercrimes. To understand the security issues and the need for corrective steps, the techniques and strategies used by cyber fraudsters in obtaining unauthorized access and use the financial information for purpose of fraud need to be understood. Research design, data and methodology: A sample of 123 banks employees from 12 commercial banks in Malaysia was surveyed. This study differs from previous studies as it surveyed the employees' awareness, and this approach fills in the gap in existing literature. Results: The financial literacy and public awareness have positive impact on organizational performance effectiveness to combat threat of cybercrime. Some recommendations are also proposed from research findings, for banking industry and government regulations. Conclusion: The present study focuses on banking sector so its findings cannot be generalized to other sectors. Linking these topics has created a new study in combating threat of cybercrimes generally, and specifically in Malaysia. The present study enhances the understanding of customers' role to combat the impact of cybercrimes on performances of banking industry.

Computer vision monitoring and detection for landslides

  • Chen, Tim;Kuo, C.F.;Chen, J.C.Y.
    • Structural Monitoring and Maintenance
    • /
    • v.6 no.2
    • /
    • pp.161-171
    • /
    • 2019
  • There have been a few checking frameworks intended to ensure and improve the nature of their regular habitat. The greater part of these frameworks are constrained in their capacities. In this paper, the insightful checking framework intended for debacle help and administrations has been exhibited. The ideal administrations, necessities and coming about plan proposition have been indicated. This has prompted a framework that depends fundamentally on ecological examination so as to offer consideration and security administrations to give the self-governance of indigenous habitats. In this sense, ecological acknowledgment is considered, where, in light of past work, novel commitments have been made to help include based and PC vision situations. This epic PC vision procedure utilized as notice framework for avalanche identification depends on changes in the normal landscape. The multi-criteria basic leadership strategy is used to incorporate slope data and the level of variety of the highlights. The reproduction consequences of highlight point discovery are shown in highlight guide coordinating toward discover steady and coordinating component focuses and effectively identified utilizing these two systems, by examining the variety in the distinguished highlights and the element coordinating.

Ship Monitoring around the Ieodo Ocean Research Station Using FMCW Radar and AIS: November 23-30, 2013

  • Kim, Tae-Ho;Yang, Chan-Su
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.1
    • /
    • pp.45-56
    • /
    • 2022
  • The Ieodo Ocean Research Station (IORS) lies between the exclusive economic zone (EEZ) boundaries of Korea, Japan, and China. The geographical positioning of the IORS makes it ideal for monitoring ships in the area. In this study, we introduce ship monitoring results by Automatic Identification System (AIS) and the Broadband 3GTM radar, which has been developed for use in small ships using the Frequency Modulated Continuous Wave (FMCW) technique. AIS and FMCW radar data were collected at IORS from November 23th to 30th, 2013. The acquired FMCW radar data was converted to 2-D binary image format over pre-processing, including the internal and external noise filtering. The ship positions detected by FMCW radar images were passed into a tracking algorithm. We then compared the detection and tracking results from FMCW radar with AIS information and found that they were relatively well matched. Tracking performance is especially good when ships are across from each other. The results also show good monitoring capability for small fishing ships, even those not equipped with AIS or with a dysfunctional AIS.

Secure and Efficient Package Management Techniques in Closed Networks (폐쇄망에서의 안전하고 효율적인 소프트웨어 패키지 관리 방안)

  • Ahn, Gun-Hee;An, Sang-Hyuk;Lim, Dong-Kyun;Jeong, Su-Hwan;Kim, Jaewoo;Shin, Youngjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.119-126
    • /
    • 2022
  • In this paper, we present important factors and methodologies that we have to follow for secure and efficient package management systems in a closed network. By analyzing previous works, we present several security considerations for the existing package management systems. Based on the consideration, we propose guidelines regarding the use of package management systems in the closed network. More specifically, we propose the development of new package management tools, utilization of physical storage media, utilization of local backup repositories, package updates, and downgrade batches for secure and efficient package management.

A Study on the Users' Response to Privacy Issues in Customized Services

  • Park, Sunwoo;Baek, Jeongyun;Yoo, Yeajoo;Kim, Dongwhan
    • Journal of Multimedia Information System
    • /
    • v.9 no.3
    • /
    • pp.201-208
    • /
    • 2022
  • Customized service is a vital and mandatory element for apps in improving their technical performance and app customer analysis. While apps require users' consent for their data extraction and usage, many of the terms and agreement forms are written intricately, making it harder for users to fully understand the whole concept of users' data collection for customized services. Ever since the Facebook-Cambridge Analytica scandal, personal data privacy has been re-examined, forcing many app companies to reinforce a reliable solution to data privacy issues. However, there has not been a secured solution, which worries many people about the future advanced issues when metaverse platforms are actively used in daily apps. The research aims to collect the reactions and behaviors of everyday app users who utilize apps with customized services to understand the nature of privacy data issues and the users' opinions about the future implementation of metaverse platforms. The method of the research was an online questionnaire that targeted university students. The study revealed many fearful and anxious reactions about personal data and further metaverse issues where most app users were uneducated about how current apps collect and utilize users' private data.

AI를 이용한 차량용 침입 탐지 시스템에 대한 평가 프레임워크

  • Kim, Hyunghoon;Jeong, Yeonseon;Choi, Wonsuk;jo, Hyo Jin
    • Review of KIISC
    • /
    • v.32 no.4
    • /
    • pp.7-17
    • /
    • 2022
  • 운전자 보조 시스템을 통한 차량의 전자적인 제어를 위하여, 최근 차량에 탑재된 전자 제어 장치 (ECU; Electronic Control Unit)의 개수가 급증하고 있다. ECU는 효율적인 통신을 위해서 차량용 내부 네트워크인 CAN(Controller Area Network)을 이용한다. 하지만 CAN은 기밀성, 무결성, 접근 제어, 인증과 같은 보안 메커니즘이 고려되지 않은 상태로 설계되었기 때문에, 공격자가 네트워크에 쉽게 접근하여 메시지를 도청하거나 주입할 수 있다. 악의적인 메시지 주입은 차량 운전자 및 동승자의 안전에 심각한 피해를 안길 수 있기에, 최근에는 주입된 메시지를 식별하기 위한 침입 탐지 시스템(IDS; Intrusion Detection System)에 대한 연구가 발전해왔다. 특히 최근에는 AI(Artificial Intelligence) 기술을 이용한 IDS가 다수 제안되었다. 그러나 제안되는 기법들은 특정 공격 데이터셋에 한하여 평가되며, 각 기법에 대한 탐지 성능이 공정하게 평가되었는지를 확인하기 위한 평가 프레임워크가 부족한 상황이다. 따라서 본 논문에서는 machine learning/deep learning에 기반하여 제안된 차랑용 IDS 5가지를 선정하고, 기존에 공개된 데이터셋을 이용하여 제안된 기법들에 대한 비교 및 평가를 진행한다. 공격 데이터셋에는 CAN의 대표적인 4가지 공격 유형이 포함되어 있으며, 추가적으로 본 논문에서는 메시지 주기 유형을 활용한 공격 유형을 제안하고 해당 공격에 대한 탐지 성능을 평가한다.

A Study on Fault Diagnosis for Planar Active Phased Array Antenna (평면 능동위상배열안테나 결함소자 진단방법에 관한 연구)

  • Jin-Woo Jung;Seung-Ho Kang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.1
    • /
    • pp.11-22
    • /
    • 2023
  • A radiating elements fault diagnosis method with simplified radiation pattern measurement procedure was presented for planar active phased array antenna system. For presenting the mentioned method, the technique for linear approximation based on the radiation characteristics of a planar array configuration and a technique for solving a unique solution problem that occur in process of diagnosing a fault in a radiating elements were presented. Based on the presented method and a genetic algorithm, experimental simulations were performed for radiating element defect diagnosis according to various planar active phased array antenna configurations. As a result, it was confirmed that the presented radiating element fault diagnosis method can be smoothly applied to planar active phased antennas having various configurations.

Artificial Intelligence Applications as a Modern Trend to Achieve Organizational Innovation in Jordanian Commercial Banks

  • Al-HAWAMDEH, Majd Mohammed;AlSHAER, Sawsan A.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.3
    • /
    • pp.257-263
    • /
    • 2022
  • The objective of this study was to see how artificial intelligence applications affected organizational innovation in Jordanian commercial banks. Both independent and dependent variables were measured in three dimensions: expert systems, neural network systems, and fuzzy logic systems for artificial intelligence applications variable. Product innovation, process innovation, and management innovation for the organizational innovation variable. To achieve study objectives, a questionnaire was developed and distributed to a sample of one hundred fifty-three managers in Jordanian commercial banks, who were selected according to the simple random sampling method. Except for the neural network systems dimension, which comes in at an average level, the study indicated that there is a high level of organizational innovation and artificial intelligence applications. Furthermore, the findings revealed that artificial intelligence applications have a significant impact on organizational innovation in Jordanian commercial banks, with the most important artificial intelligence application being a fuzzy logic system. The study suggested keeping track of technological advancements in the field of artificial intelligence applications and incorporating them into banking operations by benchmarking with the best commercial bank practices and allocating a portion of the budget to technological applications and infrastructure development, as well as balancing between technology use and information security risks to ensure client privacy is protected.