• 제목/요약/키워드: web security

Search Result 1,097, Processing Time 0.037 seconds

A Study on the Privacy Policy Comparison by Domestic and Foreign Portal Sites and Domestic Web sites Classified by Industry (국내·외 포털사이트 및 업종별 국내 사이트의 개인정보취급방침 비교)

  • Jeon, Changuk;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.713-724
    • /
    • 2016
  • In providing services by using informations of each client, business managers have duties to maintain the personal information under the procedure of collecting, storing, using/providing, and destroying them. Besides, they also have duties to inform their clients, the subject of the personal information, of how to manage and use their client's informations. In this study, the privacy policies, stipulated at domestic and foreign portals will be compared with one another, and the differences between domestic and foreign portals will be shown. The implication in each field and categories of domestic web sites will be found.

Design and Implementation of an Efficient Instruction and Student Management System based on the Web (웹 기반의 학습 및 학생관리 시스템 설계 및 구현)

  • Kim, Nam-Hee;Lee, Jong-Chan
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.1-10
    • /
    • 2009
  • In present, an education paradigm of new info-age is consisting by using the Internet in education field, and as that practical use of internet in education is in increasing trend and various education method is showed. Also, as using the web by teacher and student, teacher can achieve efficiently instruction and student management and students can handle various kinds item about studies efficiently. But much of the existent systems were drived on instruction management, systems of student management are very few. Therefore, in this paper, we designed and implemented system that can efficiently manage instruction and student in web. Implemented system was designed by dividing teacher module and student module and various function for instruction management and student management were included in teacher module and in student module include various functions with related to as class, report and result record.

  • PDF

Implementation of Source Analysis Tool for Vulnerability Search of Web Program (웹 프로그램의 취약점 검색을 위한 소스분석 툴 구현)

  • Kim, Soung-Uk;Hoang, Tae-Moon;Kim, Pan-Kyu;Park, Sang-Su;Lee, Jong-Hyeok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.776-779
    • /
    • 2005
  • The Program language for web, such as PHP, JSP, ASP and so on, make it possible to offer more user interactive page by using with HTML. These language and program have been developed with great speed, but security part could not catch up with this development. As a result, it has brought a problem which is expose many server systems to the outside. In this research, we implement Web and SQL analysis program which can analysis hacking causing factor. With this analysis program, we will show you how much efficient it has compared with security patch for server system.

  • PDF

String analysis for detection of injection flaw in Web applications (웹 응용프로그램의 삽입취약점 탐지를 위한 문자열분석)

  • Choi, Tae-Hyoung;Kim, Jung-Joon;Doh, Kyung-Goo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.149-153
    • /
    • 2007
  • One common type of web-application vulnerabilities is injection flaw, where an attacker exploits faulty application code instead of normal input. In order to be free from injection flaw, an application program should be written in such a way that every potentially bad input character is filtered out. This paper proposes a precise analysis that statically checks whether or not an input string variable may have the given set of characters at hotspot. The precision is accomplished by taking the semantics of condition into account in the analysis.

Determinants of Writing Research According to International Standards in Web of Science Journals

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.94-102
    • /
    • 2021
  • The study aimed to define all the main determinants of writing a research paper in an integrated manner within the requirements of the science network journals, by introducing scientific research and the steps of writing a research paper, starting from choosing the title to writing the abstract, identifying the research problem, questions, importance and objectives of the study, how to choose previous studies, research methodology and tools, discussion and results In addition to determining the acceptable percentage of plagiarism for science network journals, recommendations, choosing appropriate references and choosing the appropriate references, in addition to determining the acceptable percentage of plagiarism for the journals of the Network of Science, the researcher used the method of analytical investigative research to find out the axes of the study and analyze different reference citation methods to deal with different sources of information (articles-books-theses-conference works-reviews), In addition to studying the most important international programs for measuring plagiarism ratios that are accredited within the journals of the Science Network, and the study concluded that the researcher must present original and innovative results, add an integrated and logical work, take into account all the scientific conditions in the design of the research, its steps and ethics, and take into account the international standards in citing Reference, taking into account the rates of plagiarism within Web of Science journals.

The Effect of a Web Quests Instructional Program on Developing Saudi EFL Learning Habits

  • Alsamadani, Hashem A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.220-224
    • /
    • 2022
  • The teacher is considered the cornerstone of the educational process; the quality of education is linked mainly to teachers who perform such a necessary process. The shift in pedagogical thinking has led to progress in looking at the teacher's roles; he is no longer transferring knowledge to learners, but instead, he has become a mentor, a mediator, a planner, an intellect, and a leader. If we analyze these missions from the perspective of mental habits, we will see that they require the teacher to develop the skills of perseverance, listening comprehension, thinking flexibly, controlling emotions, self-confidence, communication skills, and other essential skills. The current research verifies the effectiveness of an instructional program based on web quests in developing habits of the mind of English language students. The study employed a quasi-experimental design. The sample consisted of 46 male students representing two classes. They were assigned randomly into an experimental group (n=24) and a control group (n=22). They were undergraduate students majoring in the English language. The findings showed a statistically significant difference in the mean scores of the experimental and control groups favoring the experimental group. The study concludes with some recommendations to differentiate teaching techniques in EFL classrooms.

A Study on the Security System used by PC Camera (PC카메라를 이용한 보안시스템에 관한 연구)

  • Song, Eun-Jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.637-640
    • /
    • 2011
  • 기존의 보안시스템은 설비가 비싸고 녹화를 끊임없이 계속함에 따라 저장 용량이 커야하는 문제점이 있고 영상을 단순히 저장하는 외에 다른 부가적 기능이 없다. 본 연구에서는 고성능, 고가의 장비가 아닌 단순한 PC 카메라 와 일반컴퓨터를 이용한 화상 보안 시스템을 제안 한다. 이 시스템은 단순한 녹화 외에 다양한 부가기능을 포함하고 있으며 프로그램이 설치된 컴퓨터를 떠난 외부에서도 감지한 침입을 통보 받을 수 있다. Main Application의 역할은 감시, 재생, 통계, 필터로 분류된다. 카메라에서 실시간으로 보내오는 영상을 메인 프로그램에서 보여주고 일시 정지, 필터 바로 가기 등을 통하여 필터와 연계된다. 이미 저장된 영상은 재생기능을 통하여 재생하며 이제까지 저장된 영상들은 모두 데이터베이스에 통계 화 되어 저장된다. 또한 실시간으로 보여 지는 영상들을 일정한 간격으로 웹 서버로 보내진다.

  • PDF

Exploring the latest web site vulnerability cases and Designing Web security site (최신 웹 사이트의 취약점 사례 탐구 및 웹 보안 사이트 설계)

  • Jung, You Jin;Kim, Jae Ryong;Lee, Sang Mu;Han, Do Hyeon;Park, Seong hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.220-223
    • /
    • 2017
  • 세계적인 웹 어플리케이션 취약점을 다루는 OWASP(The Open Wed Application Security Project) TOP 10 [1]에 따르면 빈도가 높고 영향이 큰 취약점들은 모두 철저한 웹 보안 코드를 작성하면 어느 정도 예방할 수 있다는 결론이 나왔다. 이에 따라 최근 국내에서 일어난 웹 사이트의 취약점 사례를 알아보고 그 대응법에 대하여 분석한 후, 직접 개발한 웹 사이트에 웹 보안 코드를 적용할 수 있도록 하였다. 또한, 소프트웨어 공학자를 위한 java 시큐어코딩 가이드를 숙지하여 웹 개발 시 보안 유지를 강화하였다.

A Non-Agent based Identification Scheme for Identifying Database Users in 3-tier System Environments (3-tier 시스템 환경에서 비 에이전트 방식의 데이터베이스 사용자 식별 방안)

  • Han, Jung Sang;Shin, Dong Cheon
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.2
    • /
    • pp.147-159
    • /
    • 2018
  • The changes of internet environment have made services through web application server (WAS) popular. Accordingly, technical difficulties in identifying users who access databases through WAS were incurred. In order to solve these problems, many companies adopt an agent-based approach for identifying users by installing additional software on WAS. However, this approach must submit to some disadvantages in terms of cost, maintenance, and development process. In this paper, we devise an non-agent based approach for identifying database users in 3-tier environments.

A Plan of SEED Algorithm apply to XML Encryption (SEED 알고리즘과 XML Encryption 적용 방안)

  • 차무홍;신동규;신동일;김주한;이재승
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.489-493
    • /
    • 2003
  • ebXML, Web Services와 같은 XML을 기반으로 한 프레임워크 기술들이 발전하고 IT 환경이 복잡해지면서 정보보안 기술의 발달과 그 필요성이 더욱 많이 요구되고 있다. UN공식 표준 언어인 XML 문서를 보호화기 위한 보안 메커니즘 가운데 정보의 기밀성을 보장하기 위해 XML 암호화에 대한 관심은 더욱 커지고 있는 상황이지만 XML 암호화 표준 명세에는 국내 표준 암호화 알고리즘인 SEED 암호화 알고리즘은 포함 되어있지 않다. 따라서 ebXML, Web Services등을 국내 표준으로 비준 할 때에 국내 표준암호화의 적용 방안이 필요하므로 본 논문은 국제 표준인 XML 암호화 명세에 국내 표준 암호화 알고리즘인 SEED암호화 알고리즘의 적용방안을 연구한다.

  • PDF