In this paper, we analyse security threats and security requirements about the designated PC solution which restricts usable PCs that are only an user own PCs or a registered PC for online banking or very important services. Accordingly, causable threats of the designated PC solution are classified a process, a network layer, a software module, and an environment of platform, and we draw security requirements based on analysed security threats. Results of this research are considered utilization of criteria for improving security of the designated PC solution and standards for giving hint of imposition of the designated PC solution.
[journal]
Su-Mi Lee
/ 2011
/ Domestic Electronic Financial Status and Classification of Security Threats
/ Review of Korea Institute of Information Security and Cryptology(KIISC)
21(7)
: 53~61
[other]
Neowiz games corporaion
/ 2011
/ Internet connection blocking method through a fixed PC service using an IP address and hardware information, G06F 21/20
/
[confproc]
Kyungroul Lee
/ 2012
/ A Guideline for the Fixed PC Solution
/ proceedings of Smart Convergence Technologies and Applications(SCTA)
: 74~76
[journal]
Yang-Seo Choi
/ 2006
/ Privacy information exposure techniques and countermeasures through Social engineering attacks
/ Review of Korea Institute of Information Security and Cryptology(KIISC)
16(1)
: 40~48
[confproc]
Kyungroul Lee
/ 2015
/ Security Assessment of the Designated PC Solution
/ The Korean Institute of Smart Media(KISM) Spring Conference
[confproc]
Hyeungjun Yeuk
/ 2015
/ An Analysis of the Vulnerability of the Designated PC solution
/ The Korean Institute of Smart Media(KISM) Spring Conference
[journal]
Kangwon Lee
/ 2012
/ Extraction of Platform-unique Information as an Identifie
/ Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Application(JoWUA)
3(4)
: 85~99
[confproc]
Non Thiranant
/ 2012
/ Challenge-Response Authentication with a Smartphone
/ Proceedings of the Korea Society of Computer & Information(KSCI)
20(2)
: 187~190
@article{ART002226593}, author={KYUNGROUL LEE and Lee,Sun-Young and Kangbin Yim}, title={An Analysis of Security Threats and Security Requirements on the Designated PC Solution}, journal={Journal of The Korea Society of Computer and Information}, issn={1598-849X}, year={2017}, volume={22}, number={5}, pages={29-39}, doi={10.9708/jksci.2017.22.05.029}
TY - JOUR AU - KYUNGROUL LEE AU - Lee,Sun-Young AU - Kangbin Yim TI - An Analysis of Security Threats and Security Requirements on the Designated PC Solution JO - Journal of The Korea Society of Computer and Information PY - 2017 VL - 22 IS - 5 PB - The Korean Society Of Computer And Information SP - 29 EP - 39 SN - 1598-849X AB - In this paper, we analyse security threats and security requirements about the designated PC solution which restricts usable PCs that are only an user own PCs or a registered PC for online banking or very important services. Accordingly, causable threats of the designated PC solution are classified a process, a network layer, a software module, and an environment of platform, and we draw security requirements based on analysed security threats. Results of this research are considered utilization of criteria for improving security of the designated PC solution and standards for giving hint of imposition of the designated PC solution. KW - Designated PC solution;Security threat;Security requirement;Identification;Device authentication;User authentication DO - 10.9708/jksci.2017.22.05.029 ER -
KYUNGROUL LEE, Lee,Sun-Young and Kangbin Yim. (2017). An Analysis of Security Threats and Security Requirements on the Designated PC Solution. Journal of The Korea Society of Computer and Information, 22(5), 29-39.
KYUNGROUL LEE, Lee,Sun-Young and Kangbin Yim. 2017, "An Analysis of Security Threats and Security Requirements on the Designated PC Solution", Journal of The Korea Society of Computer and Information, vol.22, no.5 pp.29-39. Available from: doi:10.9708/jksci.2017.22.05.029
KYUNGROUL LEE, Lee,Sun-Young, Kangbin Yim "An Analysis of Security Threats and Security Requirements on the Designated PC Solution" Journal of The Korea Society of Computer and Information 22.5 pp.29-39 (2017) : 29.
KYUNGROUL LEE, Lee,Sun-Young, Kangbin Yim. An Analysis of Security Threats and Security Requirements on the Designated PC Solution. 2017; 22(5), 29-39. Available from: doi:10.9708/jksci.2017.22.05.029
KYUNGROUL LEE, Lee,Sun-Young and Kangbin Yim. "An Analysis of Security Threats and Security Requirements on the Designated PC Solution" Journal of The Korea Society of Computer and Information 22, no.5 (2017) : 29-39.doi: 10.9708/jksci.2017.22.05.029
KYUNGROUL LEE; Lee,Sun-Young; Kangbin Yim. An Analysis of Security Threats and Security Requirements on the Designated PC Solution. Journal of The Korea Society of Computer and Information, 22(5), 29-39. doi: 10.9708/jksci.2017.22.05.029
KYUNGROUL LEE; Lee,Sun-Young; Kangbin Yim. An Analysis of Security Threats and Security Requirements on the Designated PC Solution. Journal of The Korea Society of Computer and Information. 2017; 22(5) 29-39. doi: 10.9708/jksci.2017.22.05.029
KYUNGROUL LEE, Lee,Sun-Young, Kangbin Yim. An Analysis of Security Threats and Security Requirements on the Designated PC Solution. 2017; 22(5), 29-39. Available from: doi:10.9708/jksci.2017.22.05.029
KYUNGROUL LEE, Lee,Sun-Young and Kangbin Yim. "An Analysis of Security Threats and Security Requirements on the Designated PC Solution" Journal of The Korea Society of Computer and Information 22, no.5 (2017) : 29-39.doi: 10.9708/jksci.2017.22.05.029