• Title/Summary/Keyword: Security Considerations

Search Result 159, Processing Time 0.027 seconds

Security Consideration of Virtual Reality Service (가상현실 서비스 환경에서의 보안 고려사항)

  • Lim, Sanghyeok;Jeon, Junhyun;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.11-17
    • /
    • 2018
  • As many information and communication technology companies around the world pay attention to the virtual reality as the next generation platform, the virtual reality industry is rapidly growing in various fields. For this reason, virtual reality security is becoming important as the number of users increases. In order to use the virtual reality service safely, security measures must be taken. This paper examines virtual reality trends, analyzes security threats according to vulnerabilities and vulnerabilities of virtual reality, and presents security considerations for threats.

  • PDF

A Study on the FinTech : The consideration of the Security (핀테크의 보안 고려사항에 대한 연구)

  • Lee, Yujin;Chang, Beomhwan;Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.111-123
    • /
    • 2016
  • Recently, mobile devices have been widely used. Therefore, the service users want that are not constrained by time and space. Among them, electronic payment services, mobile finance service is enjoying a tremendous popularity. The FinTech is the result of the fusion of finance and ICT(Information & Communication Technology). Security experts is pointed the FinTech security risk. New technology and Innovative FinTech services are even available, Insecure FinTech services is insignificant. In this paper we were surveyed market and product trends of FinTech and analyzed the threats about FinTech. Also, we analyzed the security considerations for FinTech using a questionnaire. As a result, users considers secure payment process and privacy. Therefore, we proposed security considerations for each vulnerability. So, we must be resolved of security technology and policy issues. If establishing a secure payment process and the unclear legal issue is resolved, FinTech service will provide a secure financial services to the user.

USN Security Considerations in Home Network (홈 네트워크에서의 USN 보안 고려 사항 분석)

  • Park, Woo-Chool;Park, Hyun-Mun;Lee, Myung-Soo;Yoon, Nyung-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.171-173
    • /
    • 2006
  • Because sensor networks use wireless communication, they are vulnerable to attacks which are more difficult launch in the wired domain. Many wired networks benefit from their inherent physical security properties. It is unlikely that an adversary will dig up the Internet backbone and splice into the line. However, wireless communications are difficult to protect; they are by nature a broadcast medium. In a broadcast medium, adversaries can easily eavesdrop on, intercept, inject, and alter transmitted data. In addition, adversaries are not restricted to using sensor network hardware. We have analyzed the IEEE 802.15.4, ZigBee specification which includes a number of security provisions and options. In this paper, we highlight places where USN security considerations and home network attack scenarios.

  • PDF

Practical Considerations for RFID System Security and Privacy Risks (RFID 시스템 보안 및 위험 요소를 위한 실제적인 고려 사항)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.896-899
    • /
    • 2009
  • The fear of unauthorized, hidden readouts has dominated the radio frequency identification (RFID) privacy debate. Therefor all published and previous works for privacy mechanisms so far require consumers to actively and explicitly protect read access to their tagged items. This paper introduces the underlying mechanism of our extension to considerations for security and analyzes its tracking resistance and identification performance, and discusses deployment aspects.

  • PDF

A Study on Evaluation for Network Security Performance and Property (네트워크 보안성능 및 보안성 평가에 관한 연구)

  • 황선명;정연서;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.712-715
    • /
    • 2003
  • The rapid progress of computer networking technology is changing the environment of today's business and its influence is spreading out widely. Although the practical use of business system using the internet technology is providing easy going infrastructures, many security problems of data or equipment in the open field will be exposed if we do not give serious considerations to their securities. In this paper, we suggest advanced methods to measure the network security capability with considerations for the security of data or equipments.

  • PDF

The Security Considerations for Implementation of Secure and Reliable e-Government (안전하고 신뢰성있는 전자정부 구축을 위한 보안요구사항)

  • 김명은;오승희;정연서;서동일
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.77-83
    • /
    • 2004
  • According as information society has been raised, many countries of the world have taken a lot of interests in e-government implementation. The several guidance countries already have offered people various administrative service and popular enmity service in the Internet conveniently People can use e-government service more conveniently by the Internet, but important personal information or state secret can be leaked in the Internet. Because of these security vulnerabilities, a lot of countries are constructing security infrastructure that can protect personal information. In this paper, we examine e-government construction trends of the several guidance countries, and propose security considerations to provide safe and reliable e-government service.

  • PDF

Cyber Security Considerations and Countermeasures for UAM Air Traffic Management Infrastructure (UAM 항공교통관리 인프라의 사이버보안 고려사항 및 대응방안)

  • Kyungwook Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.6
    • /
    • pp.17-29
    • /
    • 2023
  • In this paper, we aim to propose cyber security considerations and countermeasures for infrastructure and services in the UAM(Urban Air Mobility) Air Traffic Management field, which is one of the key elements of the UAM market that has not yet bloomed. Air traffic management is an important factor for safe navigation and social acceptance of UAM. In order to realize air traffic management, infrastructure and services based on solid network connectivity must be established. And for industries where connectivity is the core component, it can become an infiltration route for cyber threats. Therefore, cyber security is essential for the infrastructure and services. In detail, we will look into the definition of the existing air traffic management field and the cyber threats. In addition, we intend to identify cyber security threat scenarios that may occur in the newly designed UAM air traffic management infrastructure. Moreover, in order to study the cyber security countermeasures of the UAM air traffic management infrastructure, there will be analysis of the UAM operation concept. As a result, countermeasures applicable to the infrastructure and service fields will be suggested by referring to the cyber security frameworks.

Considerations for Applying SDN to Embedded Device Security (임베디드 디바이스 보안을 위한 SDN 적용 시 고려사항)

  • Koo, GeumSeo;Sim, Gabsig
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.51-61
    • /
    • 2021
  • In the era of the 4th industrial revolution symbolized by the Internet of Things, big data and artificial intelligence, various embedded devices are increasing exponentially. These devices have communication functions despite their low specifications, so the possibility of personal information leakage is increasing, and security threats are also increasing. Embedded devices can have security issues at most levels, from hardware to services over the network. In addition, it is difficult to apply general security techniques because it has characteristics of resource constraints such as low specifications and low power, and the related technology has not been standardized. In this study, we present vulnerabilities and possible problems and considerations in applying SDN to embedded devices in consideration of structural characteristics and real-world discovered cases. This study presents vulnerabilities and possible problems and considerations when applying SDN to embedded devices. From a hardware perspective, we consider the problems of Wi-Fi chips and Bluetooth, the problems of open flow implementation, SDN controllers, and examples of structural properties. SDN separates the data plane and the control plane, and provides a standardized interface between the two, enabling efficient communication control. It can respond to the security limitations of existing network technologies that are difficult to respond to rapid changes.

A Combined Bulk Electric System Reliability Framework Using Adequacy and Static Security Indices

  • Billinton, Roy;Wangdee, Wijarn
    • Journal of Electrical Engineering and Technology
    • /
    • v.1 no.4
    • /
    • pp.414-422
    • /
    • 2006
  • Deterministic techniques have been applied in power system planning for many years and there is a growing interest in combining these techniques with probabilistic considerations to assess the increased system stress due to the restructured electricity environment. The overall reliability framework proposed in this paper incorporates the deterministic N-1 criterion in a probabilistic framework, and results in the joint inclusion of both adequacy and security considerations in system planning. The combined framework is achieved using system well-being analysis and traditional adequacy assessment. System well-being analysis is used to quantify the degree of N-1 security and N-1 insecurity in terms of probabilities and frequencies. Traditional adequacy assessment is Incorporated to quantify the magnitude of the severity and consequences associated with system failure. The concepts are illustrated by application to two test systems. The results based on the overall reliability analysis framework indicate that adequacy indices are adversely affected by a generation deficient environment and security indices are adversely affected by a transmission deficient environment. The combined adequacy and security framework presented in this paper can assist system planners to realize the overall benefits associated with system modifications based on the degree of adequacy and security, and therefore facilitate the decision making process.

College Students' Housing Values, Expectations and Considerations for Housing in Their 20s - Centered on Chungbuk Province -

  • Lee, Hyun-Jeong
    • International Journal of Human Ecology
    • /
    • v.14 no.1
    • /
    • pp.71-85
    • /
    • 2013
  • The purpose of this study was to investigate Korean college students' housing values and housing expectations as well as considerations for housing in their 20s and to explore influences on housing values and expectations. Items related to four housing functions were developed in conjunction with Maslow's hierarchy of human needs to measure housing values. An on-site questionnaire survey was administered to students of a university-A located in Chungbuk province between May 28, 2012, and June 17, 2012. Among the total 476 responses, 465 responses from Korean students were used for further data analyses. The findings are as follows: (1) Among housing functions, those related to shelter functions were perceived as most important followed by function as a place for self-esteem. (2) More than 70 percent of the respondents expected to rent a housing unit in their 20s and more than half of the respondents expected non-traditional and relatively affordable compact size structure types such as studio, Officetel or Gosiwon. (3) Price, location and transportation were found to be the most important considerations when choosing housing in their 20s. (4) Convenience in use of public transportation and commute time were found to be the most important in location choice, and maintenance conditions and security systems were the most important for building choice. (5) Female respondents tended to consider personal safety, security systems, neighborhood facilities, and distance from family more important than male respondents when choosing housing, while male respondents considered parking space more important than females.