• Title/Summary/Keyword: security control center

Search Result 215, Processing Time 0.031 seconds

A Study on Service Security Framework for SW-IaaS Cloud (SW-IaaS 클라우드 서비스 보안 프레임워크에 관한 연구 - SW-IaaS를 중심으로)

  • Choi, Myeonggil;Park, Choonsik;Jeong, Jaehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.319-325
    • /
    • 2016
  • Cloud computing-related security incidents have occurred recently are beyond the scope of a enterprise's security incident is expanded to the entire range of customers who use the cloud computing environment. The control technology for the overall integrated security of the cloud data center is required for this purpose. This study research integrated and additional security elements for the cloud data center control to understand the existing control technology. It is a better understanding of the IaaS cloud environment to build the IaaS cloud environment by CloudStack. SW-IaaS cloud structure by combining CloudStack and IaaS cloud model presented by NIST is proposed in this study. This paper derive a security framework to consider in each layer of The SW-IaaS cloud components, which are composed of the Cloud Manager, Cluster Manager, and Computer Manager.

Improved Security Monitoring and Control Using Analysis of Cyber Attack in Small Businesses (중소기업 유해트래픽 분석을 통한 보안관제 개선 방안)

  • Hong, Jun Suk;Lim, Young Hwan;Park, Won Hyung;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.195-204
    • /
    • 2014
  • Recent, Secure the small and medium-sized enterprises from advanced and intelligence cyber threat, 24 hours of prevention, detection and analysis is essential. Small and Medium Business monitoring center is operated by government financial support to protect and prevent these threats. Currently it provides security to about 900 small and medium-sized enterprises. This paper studies abnormal and attack packets from small and medium-sized businesses[enterprises] which is monitored by Small and Medium Business monitoring center and provides improvement of security control for small and medium-sized enterprises.

Analysis of Security Requirements for Secure Update of IVI(In-Vehicle-Infotainment) Using Threat Modeling and Common Criteria (위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석)

  • Kang, Soo-young;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.613-628
    • /
    • 2019
  • In-Vehicle Infotainment provides navigation and various functions through the installation of the application. And infotainment is very important to control the entire vehicle by sending commands to the ECU. Infotainment supports a variety of wireless communication protocols to install and update applications. So Infotainment is becoming an attack surface through wireless communcation protocol for hacker's access. If malicious software is installed in infotainment, it can gain control of the vehicle and send a malicious purpose command to the ECU, affecting the life of the driver. Therefore, measures are needed to verify the security and reliability of infotainment software updates, and security requirements must be derived and verified. It must be developed in accordance with SDL to provide security and reliability, and systematic security requirements must be derived by applying threat modeling. Therefore, this paper conducts threat modeling to derive infotainment update security requirements. Also, the security requirements are mapped to the Common Criteria to provide criteria for updating infotainment software.

A Study on the Policy Advice of Integrated CCTV Control Center

  • Chung, ChoongSik
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.3
    • /
    • pp.46-55
    • /
    • 2017
  • In recent years, public area CCTV has also begun to become more popular in the Korea. 2011, Korea's Ministry of Public Administration and Security has recommended that other local governments set up an integrated CCTV control center in each of their districts. The ministry was planning to make it compulsory for local governments to install an integrated CCTV control center by 2015. More than 570,000 public cameras are managed by public agencies and local government offices. Currently, the integrated CCTV control center is playing a very positive role in fighting crimes in the district particularly through its liaison with the district police. The CCTVs were operated by a several different agencies and departments in the district, resulting in considerable redundancy in public service, inefficiency and delays in response to crimes, and other emergency situations. Therefore, Control Center should be operated lawfully and efficiently. CCTV Control Center will be managed by three ways: (1) IT Governance through cooperation with civil areas (2) by regulated with proper laws and (3) managed by proper guideline and personal training.

The Evaluation Method for Viewing Angle Image Control (VIC) Technology

  • Kwon, Jung-Bum;Park, Seung-Chul;Le, Don-Gyou;Lee, Lim-Soo;Ahn, Byung-Chul
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.700-702
    • /
    • 2008
  • A new evaluation method which named 'Security Viewing Angle Factor (SVAF)' was suggested for VIC (Viewing-angle Image Control) technology to quantify a visual hiding performance of LCD. Currently, Contrast Ration (CR) is the general method to evaluate VIC technology. However, CR shows a significant difference when compared with the result of human visual system. Furthermore, a perceptional evaluation method and its conditions were established.

  • PDF

A case study on the building of integrated CCTV control center at Busan metropolitan city (부산광역시 CCTV통합관제센터구축 사례연구)

  • Kwon, Chang-Hwan;Seo, Chang-Gab
    • Journal of Digital Convergence
    • /
    • v.9 no.3
    • /
    • pp.191-202
    • /
    • 2011
  • Public agencies and local governments have been installing CCTV cameras for the prevention of crime, traffic jam, and unauthorized waste. Additionally, national government agencies and schools, a special corporation by special law, local construction and industrial company installed CCTV cameras of their own and are operating them. Various types of CCTV systems disclosed technical heterogeneity. In February, 2011, Ministry of Public Administration and Security presented guidelines for building an integrated control center. This study examines the case of Busan by using the administrative guidelines. Busan integrated CCTV control center among themselves, police agency and fire department. This study looks into the potential problems with the integration process of CCTV cameras and proposes a solution to them.

Development of Managing Security Services System Protection Profile (보안관제시스템 보호프로파일 개발)

  • Son, Seung-Wan;Kim, Kwang-Seok;Choi, Jung-Won;Lee, Gang-Soo
    • Journal of Digital Contents Society
    • /
    • v.16 no.2
    • /
    • pp.345-353
    • /
    • 2015
  • Security Management System is a system which operates in the security control center for security control. All living things across the Internet in recent years, with the rapid increase in the subscriber base has increased the need for network security dramatically depending on yirueojim through web services, thus cyber security sheriff, I have a big issue to build a security management system, each agency and perform control tasks. But the security functional requirements for security management system would not specified exactly, in developing a security management system to build and design a situation that PP's needs require a lot of trouble. In this paper, we develop a Managed Security System Protection Profile for the security functional requirements specification of the security management system.

Design and Implementation of PDA-based Image Surveillance System for Harbor Security using IP Camera

  • Shim, Joon-Hwan
    • Journal of Navigation and Port Research
    • /
    • v.31 no.9
    • /
    • pp.779-784
    • /
    • 2007
  • This paper describes a new progressive embedded Internet Protocol(IP) camera available for real-time image transmission. It was applied for ship safety and security on seashore area. The functions of developed embedded system was more effective and excellent than conventional systems. Nowadays, each nation has established harbor security systems to jump up their ports to international port. Recently Incheon port has tried to change man security into center security system used by image security system. The security system of Incheon port has some advantages like effectivity of security system and reduction of manpower and cost, installed by image security system with CCTV cameras at the entrance gate and around the fence. Thus in this paper, we have designed and implemented a Personal Digital Assistants(PDA) based Image Surveillance System for Harbor Security using IP Camera under ubiquitous environment. This system has big advantages which are more effective in an emergency and low cost and small manpower than conventional systems.

Authentication for Security on Satellite Control Communications (위성관제통신에서 안정성을 위한 인증)

  • Park, Jeong-Hyun;Rim, Sun-Bae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2501-2511
    • /
    • 1997
  • This paper presents an authentication model for security on satellite command & control communications. The proposed authentication scheme is based on the modified Shamir's signature scheme using a satellite ID(Identity) and the model uses time stamp for protection of command replay attack from unauthorized center. The message authentication with command counter that includes an available key and the algorithm is for loading and execution of commands in the model. Two-way scheme for key change and confirmation between satellite control center and satellite is also proposed.

  • PDF

Study of Code Signing Technology and Certificate Profile (코드 서명 기술과 인증서 프로파일 연구)

  • Lee, Rae;Lee, Dong-Hoon
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.21-27
    • /
    • 2003
  • 오늘날 많은 웹 페이지들이 제한적인 정보의 제공에서 벗어나 ActiveX Control이나 Java Applet과 같은 응용프로그램을 사용자 컴퓨터에 다운로드 하게 하여 다양한 서비스를 제공하고 있다. 이러한 과정에서 인터넷을 통해 다운로드 되는 소프트웨어에 대한 무결성과 배포자에 대한 신원 확인을 해주는 코드 서명 기술이 필요하게 되었다. 본 논문에서는 Microsoft사의 Authenticode와 Netscape의 Object Signing기술에 대하여 분석하고 이러한 코드 서명 기술을 국내 공개키 기반구조(PKI)에 적용하기 위한 인증서 프로파일을 제안한다.

  • PDF