• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.029 seconds

The Design of Sensor System for Scalable Mobile Meteorological Information Services (확장 가능한 모바일 기상 정보 서비스를 위한 센서 시스템의 설계)

  • Choi, Jin-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1327-1332
    • /
    • 2011
  • In the mobile meteorological information services, an existing sensor system should be expanded to serve precise information. This is because of large cost problem to add the existing sensors. This thesis proposes a system architecture to construct scalable mobile meteorological information services and suggests mobile phone, sensor network, and public traffic vehicle as expended sensors. The proposed scalable sensors are compared each other and analysed the results to evaluated their strength and weakness. In this system, based on the characteristics of the sense data collected at server, a data processing methods are proposed to support efficient query processing. The proposing data processing methods have several benefits. They compress some data volume sensed by various sources on some area at some time to a logical unit. Still it could preserve same services quality.

Countermeasure for Physical Attack in RSA-CRT using Double Exponentiation Algorithm and Fault Infective Method (이중 멱승과 오류 확산 기법을 이용한 RSA-CRT에서의 물리적 공격 대응 방법)

  • Gil, Kwang-Eun;Oh, Do-Hwan;Baek, Yi-Roo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.33-41
    • /
    • 2010
  • Many experimental results shows that RSA-CRT algorithm can be broken by fault analysis attacks. We analyzed the previous fault attacks and their countermeasures on RSA-CRT algorithm and found an weakness of the countermeasure proposed by Abid and Wang. Based on these analyses, we propose a new countermeasure which uses both double exponentiation and fault infective computation method. The proposed method efficiently computes a fault verification information using double exponentiation. And, it is designed to resist simple power analysis attack and (N-1) attack.

Garage Parking Indicator System Using Becoan-served Push Notifications (비콘의 푸쉬알림기능을 활용한 주차위치 확인 시스템)

  • Song, Inhye;Lee, Hongrae;Kim, Jiyoun;Moon, Mikyoeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.766-767
    • /
    • 2015
  • In recent days, mart or department which have large parking lots provide service for finding parked cars using NFC and GPS technology. In case using NFC, users should directly tap NFC tag, and GPS does not work inside the parking garage. In this paper, garage parking indicator system using becoan served push notification is described. By using this system, users can automatically be aware where they parked car when they enter into the huge parking lot. This system overcomes the weakness of the existing parking indicator systems, such as using NFC tag system and using GPS system.

  • PDF

Effective Countermeasure to APT Attacks using Big Data (빅데이터를 이용한 APT 공격 시도에 대한 효과적인 대응 방안)

  • Mun, Hyung-Jin;Choi, Seung-Hyeon;Hwang, Yooncheol
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.1
    • /
    • pp.17-23
    • /
    • 2016
  • Recently, Internet services via various devices including smartphone have become available. Because of the development of ICT, numerous hacking incidents have occurred and most of those attacks turned out to be APT attacks. APT attack means an attack method by which a hacker continues to collect information to achieve his goal, and analyzes the weakness of the target and infects it with malicious code, and being hidden, leaks the data in time. In this paper, we examine the information collection method the APT attackers use to invade the target system in a short time using big data, and we suggest and evaluate the countermeasure to protect against the attack method using big data.

Design and Implementation of Web-based SWOT Analysis Supporting Tool (사례DB 기반의 SWOT 분석 지원도구 설계 및 구현)

  • Hwang, JeeNa;Kim, Ji-Hui;Lim, Jung Sun;Seo, Ju Hwan;Kim, You-Eil;Lee, Yun-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2016.05a
    • /
    • pp.279-280
    • /
    • 2016
  • 기업 내부 및 외부 환경 요인 분석을 통한 올바른 비즈니스 전략 수립은 기업의 최상의 결과 창출로 이어질 수 있다. 때문에 SWOT(Strength, Weakness, Opportunity, Threat) 분석을 통해 기업 내부의 강점요인과 약점요인을 인지하고, 기업 외부의 기회요인과 위협요인을 정확하게 분석하는 과정은 매우 중요하다. 그러나 많은 기업들이 그들의 상대적인 강점요인과 약점요인, 기회요인과 위협요인에 대해 정확하게 판단하지 못하는 경우가 많다. 본 연구는 기업이 환경분석 과정에서 보편적으로 활용하는 분석모델 중 하나인 SWOT 분석을 지원하는 도구를 설계 및 구현한 것으로, 각 분야의 전문가들이 작성한 SWOT 분석 결과를 바탕으로 SWOT 분석 사례 DB를 만들어 사용자가 데이터베이스에 저장되어있는 각각의 환경요소를 조회하여 기업에 적합한 환경요소들을 선택, 수정, 추가하게 함으로써 SWOT 분석 시에 기업들이 고려해야하는 내부 및 외부 환경 요인에 대한 정보를 제공하고자 한다. 이를 통해 기업들이 자신의 내부 역량에 대해 보다 정확하게 인지하고, 외부 환경 변화에 대한 고찰을 도울 수 있을 것으로 사료된다.

  • PDF

The Effects of IT Centralization and Organizational Structure on the Performance of Information System (정보기술의 집중화와 조직 구조가 정보시스템 성과에 미치는 영향)

  • Kim, Joon-S.
    • Asia pacific journal of information systems
    • /
    • v.9 no.4
    • /
    • pp.69-88
    • /
    • 1999
  • The purpose of this study is to determine whether the centralization of information technology activities and the organizational structures, especially the centralization of decision making and the complexity have any effects on the information systems performance. The strategic types, the formalization dimension of organizational structures, and the industrial characteristics, which might have impacts on the dependent variables were controlled. Information systems performance was measured by both user satisfaction and organizational performance. To achieve the research objective, a field study using the structured questionnaires was employed. Thirty large companies participated in this study. Multivariate regression analysis was used to analyze the data collected. Findings of this study are summarized as follows: The centralization of IT activities, the centralization of decision making, the complexity of organizational structure and the interaction effects among these independent variables all turned out to have statistically significant effects on the user satisfaction, while not on the organizational performance. The implication of these findings is that the IT structure must be determined in congruence with the organizational structures and vice versa. One weakness of this study is that the strategic type was not an independent variable but a controlled variable. Further study of using the strategic type as an independent variable with more sample corporations is to be encouraged.

  • PDF

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction

  • Huang, Peng-Cheng;Li, Yung-Hui;Chang, Chin-Chen;Liu, Yanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2348-2365
    • /
    • 2018
  • QR codes as public patent are widely used to acquire the information in various fields. However, it faces security problem when delivering the privacy message by QR code. To overcome this weakness, we propose a secret hiding scheme by improving exploiting modification direction to protect the private message in QR code. The secret messages will be converted into octal digit stream and concealed to the cover QR code by overwriting the cover QR code public message bits. And the private messages can be faithfully decoded using the extraction function. In our secret hiding scheme, the QR code public message still can be fully decoded publicly from the marked QR codes via any standard QR Code reader, which helps to reduce attackers' curiosity. Experiments show that the proposed scheme is feasible, with high secret payload, high security protection level, and resistant to common image post-processing attacks.

Knowing the Level of Information Security Awareness in the Usage of Social Media Among Female Secondary School Students in Eastern Makkah Al-Mukarramah- Saudi Arabia

  • Gharieb, Magdah Ezat
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.360-368
    • /
    • 2021
  • This study aims at knowing both the level of information security awareness in the use of social media among female secondary school students in Makkah Al-Mukarramah, and the procedures that students follow when exposed to hacking or other security problems. The study relied on the descriptive survey approach. The results showed a high percentage of social media use among the study sample, and the most used applications by the students are snapchat and Instagram applications successively. In fact, 48% of the study sample have awareness of information security, the majority of the students memorize the password in the devices, most of them do not change them, and they have knowledge of fake gates and social engineering. However, their knowledge of electronic hacking is weak, and students do not share passwords with anyone at a rate of 67%. At the same time, they do not update passwords. Moreover, most of the procedures followed by students when exposed to theft and hacking is to change the e-mail data and the password, and the results varied apart from that, which reflects the weak awareness of the students and the weakness of procedures related to information security. The study recommends the necessity to raise awareness and education of the importance of information security and safety, especially in light of what the world faces from data electronic attacks and hackings of electronic applications.

Channel Adaptive RPSS(Reference Picture Segment Selection) Technique for Error-Resilient Video Communication over Wireless Channels (무선 채널에서의 오류에 강인한 비디오 통신을 위한 채널 환경에 적응적인 참조 영상 세그먼트 선택(RPSS)기법)

  • ;Soo-Yeal Park
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3A
    • /
    • pp.325-333
    • /
    • 2000
  • The proposed RPSS(Reference Picture Segment Selection) mode is the RPS mode in picture segment of the ISD mode. The RPS mode has the weakness that it has to change the whole reference picture even if transmission error occurs only in the small part of picture. If the RPS mode is applied only to an error-occurred part and a conventional coding scheme is applied to an error-free part, the higher coding efficiency can be obtained. Simulation results show that there is the optimal number of segment which provides that best performance with given environment such as the BER(Bit Error Rate) of wireless channels, the characteristics of imput sequence, what kind of RPSS mode is used, etc. To apply the channel-adoptive RPSS mode later, the scheme which can change the number of segment without INTRA refresh and spatial error propagation is proposed in this paper.

  • PDF

Optimization Techniques for Finite field Operations at Algorithm Levels (알고리즘 레벨 유한체 연산에 대한 최적화 연구)

  • Moon, San-Gook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.651-654
    • /
    • 2008
  • In finite field operations based on $GF(2^m)$, additions and subtractions are easily implemented. On the other hand, multiplications and divisions require mathematical elaboration of complex equations. There are two dominant way of approaching the solutions of finite filed operations, normal basis approach and polynomial basis approach, each of which has both benefits and weakness respectively. In this study, we adopted the mathematically feasible polynomial basis approach and suggest the optimization techniques of finite field operations based of mathematical principles.

  • PDF