• Title/Summary/Keyword: security modeling

Search Result 603, Processing Time 0.021 seconds

Design of Phone Card IC with Security and Self-test Features (자체 테스트 및 보안기능을 갖는 공중전화 카드 IC 설계)

  • Park, Tae-Geun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.37 no.1
    • /
    • pp.60-66
    • /
    • 2000
  • This paper proposes a design of phone card IC with the self-test features and the hardware and software security functions. We design and verify the proposed functions with modeling the terminal system environment. The proposed phone card IC provides instructions and a non-volatile memory block containing the manufacturer / issuer / user information, the unit (money) value, and the security key. The self-test functions are designed to improve the test time degradation due to a serial I/O communication. Also some security features are implemented using hardware and software approaches.

  • PDF

A Study of Performance Improvement of Two Dimensional FEC Schemes For Data Security (데이터보안을 위한 2차원 FEC기법의 성능 향상에 관한 연구)

  • Min, Sun-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.957-962
    • /
    • 2013
  • This paper proposes the new enhanced 2-D(2-Dimension) FEC scheme. It analyzes the probability of entire packet loss rate of the existing 2-D FEC by mathematical modeling, finds the problem of the existing 2-D FEC, and deduces the new enhanced 2-D FEC scheme that reduces the entire packet loss probability.

Business Process Reengineering of an Information Exchange Management System for a Nationwide Cyber Threat Intelligence

  • Pramadi, Yogha Restu;Rosmansyah, Yousep;Kim, Myonghee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.279-288
    • /
    • 2017
  • Nowadays, nations cyber security capabilities play an important role in a nation's defense. Security-critical infrastructures such as national defenses, public services, and financial services are now exposed to Advanced Persistent Threats (APT) and their resistance to such attacks effects the nations stability. Currently Cyber Threat Intelligence (CTI) is widely used by organizations to mitigate and deter APT for its ability to proactively protect their assets by using evidence-based knowledge. The evidence-based knowledge information can be exchanged among organizations and used by the receiving party to strengthen their cyber security management. This paper will discuss on the business process reengineering of the CTI information exchange management for a nationwide scaled control and governance by the government to better protect their national information security assets.

Smart and Secure Point of Sale Framework with Threat Modeling and Formal Verification

  • Mona faraj Nasser alwahabi;Shaik Shakeel Ahamad
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.41-48
    • /
    • 2024
  • Existing PoS (Point of Sale) based payment frameworks are vulnerable as the Payment Application's integrity in the smart phone and PoS are compromised, vulnerable to reverse engineering attacks. In addition to these existing PoS (Point of Sale) based payment frameworks do not perform point-to-point encryption and do not ensure communication security. We propose a Smart and Secure PoS (SSPoS) Framework which overcomes these attacks. Our proposed SSPoS framework ensures point-to-point encryption (P2PE), Application hardening and Application wrapping. SSPoS framework overcomes repackaging attacks. SSPoS framework has very less communication and computation cost. SSPoS framework also addresses Heartbleed vulnerability. SSPoS protocol is successfully verified using Burrows-Abadi-Needham (BAN) logic, so it ensures all the security properties. SSPoS is threat modeled and implemented successfully.

Query Processing for Multi-level Databases Using Horizontal Partitioning and Views (수평분할과 뷰를 이용한 다단계 데이터베이스에서의 질의 처리)

  • 나민영;최병갑
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.79-88
    • /
    • 1995
  • Most works done so far have concentrated on developing data modeling techniques such as multi-level relation for data protection. These techniques, however, cannot be applied to practical area. This is because they require new queries or new architectures. In this paper, we propose a query processing technique for multi-level databases using horizontal partitioning and views, which does not need any change in database architecture and query language.

  • PDF

Data management Scheme modeling for Heterogeneous system integration (이종 시스템 통합을 위한 데이터 관리 기법 모델링)

  • Kang, In-Seong;Lee, Hong-Chul
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.436-439
    • /
    • 2010
  • 본 논문에서는 Ubiquitous Computing 환경 하에서 이종 시스템 간의 통합을 위한 데이터 관리 기법 모델을 제안하였다. 이종 시스템 간의 통합이 이루어지면 방대한 양의 데이터를 모든 시스템이 공유해야 하기 때문에 무분별한 데이터의 중복과 저장으로 인해 프로세스의 데이터 처리 성능 및 데이터 무결성을 보장받지 못 하는 등의 문제점이 발생한다. 이를 보완하기 위해 Minimal cost Spanning tree의 원리를 적용하여 시스템 통합에 따른 데이터 처리 및 무결성 문제 해결을 위한 메커니즘을 제시하고자 한다.

  • PDF

A study on the information security compliance and non-compliance causes of organization employees (조직구성원의 정보보안 준수 및 미준수 원인에 대한 연구)

  • Hwang, In-Ho;Hu, Sung-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.9
    • /
    • pp.229-242
    • /
    • 2020
  • The purpose of this study is to present the environmental factors of positive and negative aspects that affect the information security compliance intention, and reveals the relationship of the individual's the security compliance intention. The subjects of this study are employees of organizations that apply information security policies and technologies, and effective samples were obtained through surveys. In the process of analysis, the study model was verified through structural equation modeling. The measurement variables consisted of security policy, security system, technical support, work impediment, security non-visibility, compliance intention and organizational commitment and used for analysis. The results confirmed that security compliance factors such as policy, system, technical support, and non-compliance factors, work impediment, respectively, had an impact on organizational commitment, leading to compliance intention. The verification result of the research model suggests the direction of establishing a security compliance strategy for employees to improve the level of information security compliance of the organization.

Measurement-based Estimation of the Composite Load Model Parameters

  • Kim, Byoung-Ho;Kim, Hong-Rae
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.6
    • /
    • pp.845-851
    • /
    • 2012
  • Power system loads have a significant impact on a system. Although it is difficult to precisely describe loads in a mathematical model, accurately modeling them is important for a system analysis. The traditional load modeling method is based on the load components of a bus. Recently, the load modeling method based on measurements from a system has been introduced and developed by researchers. The two major components of a load modeling problem are determining the mathematical model for the target system and estimating the parameters of the determined model. We use the composite load model, which has both static and dynamic load characteristics. The ZIP model and the induction motor model are used for the static and dynamic load models, respectively. In this work, we propose the measurement-based parameter estimation method for the composite load model. The test system and related measurements are obtained using transient security assessment tool(TSAT) simulation program and PSS/E. The parameter estimation is then verified using these measurements. Cases are tested and verified using the sample system and its related measurements.

A System for Supporting The Cyber Security Control of I&C System (제어계측 시스템 환경에서의 사이버 보안 통제 지원 시스템)

  • Jung, Hyun-Mi;Kim, Seok-Hun;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.442-448
    • /
    • 2013
  • I&C (Instrumentation & Control) system is different from information system and the security design of the two systems are also different. The modeling activity is needed based on the security control guide in order to build I&C system security control. In this paper, the role and by the security control, we designed the relationship (that is, the relation schema) between the documents for 'The system for supporting the cyber security control of I&C system design' based on the security control guide. The designed schema plans 'The system for supporting the cyber security control of I&C system' for observing the security control guide, and is used as the database and content that supports its design and implementation. The process and system of the proposed schema is utilized and designed. The design of the schema and system is intensified in the design phase with the proposed mode and supporting the I&C system cyber security design.

Hierarchical Leisure Constraints on Leisure Motivation and Participation among Security Agent

  • Kim, Kyong-Sik;Park, Young-Man
    • International Journal of Contents
    • /
    • v.6 no.2
    • /
    • pp.59-68
    • /
    • 2010
  • This research looks close the effect of security agent's hierarchical leisure constraint on the leisure motivation and participation based on the Jackson's Model of the hierarchical leisure constraints. This research selected 420 people for sampling, designating security agents who work for security companies located in Seoul in 2009 at present as subjects by utilizing purposive sampling method, but the number of sampling used for ultimate analysis is 356. In this research, reliability analysis's and structural equation modeling's Maximum Likelihood method are used to prove the reliability and validity of questionnaire. By using these research method and procedures, the conclusion of this research is as following. First, intra-personal leisure constraint was affected by interpersonal, structural leisure constraint. Second, leisure motivation was affected negatively by leisure constraint. Third, leisure participation was affected positively by leisure motivation. Synthesizing all things referred above, leisure constraint was affected by inter-personal, structural leisure constraint, and in turn, leisure motivation and leisure participation were affected by its effects. It turned out that leisure motivation has a meaningful effect on leisure participation through leisure participation and adjusting process.