A Study for Vulnerability Analysis and Security Reinforcement Plan of Accredited Certification Service

نویسندگان

  • JONGHYUN BAEK
  • WONCHEUL LEE
  • SEOKLAE LEE
  • JAEIL LEE
چکیده

Accredited Certification Service which was begun with enforcement of Digital Signature Act on July 1, 1999 for secure electronic transaction with allow the legal effect to digital signature, have supported a secure electronic transaction such as internet banking and on-line stocks. But, because ordinary people can obtain hacking tool easily by fast development of informationalization, security of Accredited Certification Service is threatened by hacking. In this paper, Analyzes vulnerability and security reinforcement plan of Accredited Certification Service. Key-Words: Accredited Certification Service, Electronic Transaction, Digital Signature, Internet Banking, On-line Stocks, Hacking

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks

Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact potential. In this paper, we investigate the use of reinforcement learning (RL) for proactive security in the context of denial-of-service (DoS) attacks in peer-to-peer (P2P) networks. Such a tool would be useful for ...

متن کامل

Assessment of Seismic Vulnerability in Urban and Rural Health Service Centers of Hamadan Province Using Geographic Information Systems

Background: Maintaining the performance of healthcare centers during an earthquake is essential. Evaluating the seismic vulnerability of these centers is a priority. This study aims to evaluate seismic vulnerability using geographic information systems (GIS) in urban and rural health service centers of Hamadan Province, Iran, in 2021. Materials and Methods: This is a descriptive, analytical cr...

متن کامل

Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols

In this paper we describe vulnerabilities and possible protections for mobile ad hoc networks (MANET) routing protocols. Vulnerability and adversary models are built to describe impersonation, fabrication and modification attacks. A security model is proposed, considering both preventive and corrective protection. The basic preventive protection consists of a certificate-based authentication me...

متن کامل

A study on information security management system evaluation - assets, threat and vulnerability

The security of information system is like a chain. Its strength is affected by the weakest knot. Since we can achieve 100% Information Security Management System (ISMS) security, we must cautiously fulfill the certification and accreditation of information security. In this paper, we analyzed, studied the evaluation knowledge and skills required for auditing the certification procedures for th...

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005