A Study for Vulnerability Analysis and Security Reinforcement Plan of Accredited Certification Service
نویسندگان
چکیده
Accredited Certification Service which was begun with enforcement of Digital Signature Act on July 1, 1999 for secure electronic transaction with allow the legal effect to digital signature, have supported a secure electronic transaction such as internet banking and on-line stocks. But, because ordinary people can obtain hacking tool easily by fast development of informationalization, security of Accredited Certification Service is threatened by hacking. In this paper, Analyzes vulnerability and security reinforcement plan of Accredited Certification Service. Key-Words: Accredited Certification Service, Electronic Transaction, Digital Signature, Internet Banking, On-line Stocks, Hacking
منابع مشابه
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact potential. In this paper, we investigate the use of reinforcement learning (RL) for proactive security in the context of denial-of-service (DoS) attacks in peer-to-peer (P2P) networks. Such a tool would be useful for ...
متن کاملAssessment of Seismic Vulnerability in Urban and Rural Health Service Centers of Hamadan Province Using Geographic Information Systems
Background: Maintaining the performance of healthcare centers during an earthquake is essential. Evaluating the seismic vulnerability of these centers is a priority. This study aims to evaluate seismic vulnerability using geographic information systems (GIS) in urban and rural health service centers of Hamadan Province, Iran, in 2021. Materials and Methods: This is a descriptive, analytical cr...
متن کاملPreventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols
In this paper we describe vulnerabilities and possible protections for mobile ad hoc networks (MANET) routing protocols. Vulnerability and adversary models are built to describe impersonation, fabrication and modification attacks. A security model is proposed, considering both preventive and corrective protection. The basic preventive protection consists of a certificate-based authentication me...
متن کاملA study on information security management system evaluation - assets, threat and vulnerability
The security of information system is like a chain. Its strength is affected by the weakest knot. Since we can achieve 100% Information Security Management System (ISMS) security, we must cautiously fulfill the certification and accreditation of information security. In this paper, we analyzed, studied the evaluation knowledge and skills required for auditing the certification procedures for th...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کامل