DOI QR코드

DOI QR Code

SNS disclosure of personal information in M2M environment threats and countermeasures

M2M 환경에서의 SNS 개인정보 유출 위협 및 대응방안

  • Go, Jun-Young (Dept. of Information and Communication, Baekseok University) ;
  • Lee, Keun-Ho (Dept. of Information and Communication, Baekseok University)
  • 고준영 (백석대학교 정보통신학부) ;
  • 이근호 (백석대학교 정보통신학부)
  • Received : 2014.02.05
  • Accepted : 2014.03.25
  • Published : 2014.03.31

Abstract

It appeared with the development of IT skills to help the social network SNS(Social Network Service) on the online form. Many people around the world and in the business environment changes is the emergence of social networks are bringing. And the rapid development of the idea, but are insignificant for the security threats that are used by many people in many companies, and social network services. In addition, although it is true that this connection is increased from the number of mobile machines to the development of M2M, that is not recognized for that vulnerability. To evaluate and identify vulnerabilities against security threats and countermeasures for the SNS access the social network on the M2M After looking for privacy and in the present.

IT기술의 발전과 더불어 온라인상에서 인적 네트워크 형성을 도와주는 소셜네트워크 서비스가 등장한다. 소셜네트워크의 등장은 전 세계인과 기업 환경에도 많은 변화를 가져오고 있다. 수많은 기업과 많은 사람들이 사용하고 있는 소셜 네트워크 서비스는 급격한 발전을 하고 있지만 보안위협 요소에 대해서는 대수롭지 않게 생각을 하고 있다. 또한 M2M의 발전으로 여러 휴대용 기계로부터의 접속이 많아지고 있지만, 그 취약성에 대한 인식을 하지 않고 있는 것이 사실이다. 본 논문에서는 개인정보에 대해 살펴본 후 소셜 네트워크 상에 있는 보안위협 요소와 M2M상에서의 SNS접속에 대한 취약성과 대응방안에 대하여 살펴본다.

Keywords

References

  1. Information and Communication Network Utilization and Information Protection Act Amendment, Information and Communication, 2006.
  2. Dong-Hee Kim, Eun-Jae Yu, Gyeong-Sik Min "Online social network environment, security threats and implications", Information Security Issue Report, 2008.
  3. Gyu-Won Jang, Hyeon-Seok Yun. "Privacy in cyberspace". Information Society Policy Research Forum Article 22, Issue 3 Forum. 2011.
  4. Hee-Yeon Kim, Ju-Hyeon Oh. "Status and social implications of domestic SNS". Information and Communications Policy Studies No. 12, No. 24, 2012.
  5. Keun-Ho Lee, "M2M (Machine to Machine) communication of threat analysis" Korea Academic Society 2010 Spring Conference eye Writings Part 1.
  6. Seun-Gi Mun 3others "M2M communication for building secure mutual authentication and key exchange protocol", Journal of Cryptology, Volume 20, No. 1, pp. 73-83, 2010.
  7. Min-Yeong Ju, "The Twitter account hacking, spamming hundreds of diet", Blotter, 2010.
  8. Cyber Police, http://www.police.go.kr.