Center For Information Security Technologies
The Center for Information Security Technologies at Korea University in Seoul, South Korea is the institute for contribution to the research and development of security such as security protocols (cryptography), network and system security, digital forensics. The Center does a major service to the national operating system related to information security. Research network Companies * Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washing ... * Hidea * MCURIX * NHN * LDCC Government agencies * Ministry of Information and Communication * National Intelligence Service * Defense Security Command * National Police Agency * Ministry of Public Administration and Security * Supreme Public Prosecutor's Office * Korea Institute of Finance and National Election Commission Government-f ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Korea University
Korea University (KU, ) is a private research university in Seoul, South Korea, established in 1905. The university is included as one of the SKY universities, a popular acronym referring to Korea's three most prestigious universities. The student body consists of over 20,000 undergraduate students and over 10,000 graduate students. The university has 81 departments in 19 colleges and divisions, as well as 18 graduate schools. It has over 1,500 full-time faculty members with over 95% of them holding Ph.D. or equivalent qualification in their field. The Korea University Alumni Association consists of more than 280,000 university graduates. Korea University is a large research institution, notable in South Korean history for being the first educational institution to offer academic programs in Korea in various disciplines, such as law, economics and journalism. It is particularly well known for its College of Law. Korea University also has auxiliary educational facilities suc ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Seoul
Seoul (; ; ), officially known as the Seoul Special City, is the capital and largest metropolis of South Korea.Before 1972, Seoul was the ''de jure'' capital of the Democratic People's Republic of Korea (North Korea) as stated iArticle 103 of the 1948 constitution. According to the 2020 census, Seoul has a population of 9.9 million people, and forms the heart of the Seoul Capital Area with the surrounding Incheon metropolis and Gyeonggi province. Considered to be a global city and rated as an Alpha – City by Globalization and World Cities Research Network (GaWC), Seoul was the world's fourth largest metropolitan economy in 2014, following Tokyo, New York City and Los Angeles. Seoul was rated Asia's most livable city with the second highest quality of life globally by Arcadis in 2015, with a GDP per capita (PPP) of around $40,000. With major technology hubs centered in Gangnam and Digital Media City, the Seoul Capital Area is home to the headquarters of 15 ''Fo ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
South Korea
South Korea, officially the Republic of Korea (ROK), is a country in East Asia, constituting the southern part of the Korea, Korean Peninsula and sharing a Korean Demilitarized Zone, land border with North Korea. Its western border is formed by the Yellow Sea, while its eastern border is defined by the Sea of Japan. South Korea claims to be the sole legitimate government of the entire peninsula and List of islands of South Korea, adjacent islands. It has a Demographics of South Korea, population of 51.75 million, of which roughly half live in the Seoul Capital Area, the List of metropolitan areas by population, fourth most populous metropolitan area in the world. Other major cities include Incheon, Busan, and Daegu. The Korean Peninsula was inhabited as early as the Lower Paleolithic period. Its Gojoseon, first kingdom was noted in Chinese records in the early 7th century BCE. Following the unification of the Three Kingdoms of Korea into Unified Silla, Silla and Balhae in the ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Security Protocol
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives. A protocol describes how the algorithms should be used and includes details about data structures and representations, at which point it can be used to implement multiple, interoperable versions of a program. Cryptographic protocols are widely used for secure application-level data transport. A cryptographic protocol usually incorporates at least some of these aspects: * Key agreement or establishment * Entity authentication * Symmetric encryption and message authentication material construction * Secured application-level data transport * Non-repudiation methods * Secret sharing methods * Secure multi-party computation For example, Transport Layer Security (TLS) is a cryptographic protocol that is used to secure web (HTTPS) connections. It has an entit ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security ( data confidentiality, data integrity, authentication, and non-repudiation) are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications. Cryptography prior to the modern age was effectively synonymo ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Network And System Security
Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematics * Networks, a graph with attributes studied in network theory ** Scale-free network, a network whose degree distribution follows a power law ** Small-world network, a mathematical graph in which most nodes are not neighbors, but have neighbors in common * Flow network, a directed graph where each edge has a capacity and each edge receives a flow Biology * Biological network, any network that applies to biological systems * Ecological network, a representation of interacting species in an ecosystem * Neural network, a network or circuit of neurons Technology and communication * Artificial neural network, a computing system inspired by animal brains * Broadcast network, radio stations, television stations, or other electronic media o ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Digital Forensic
Digital usually refers to something using discrete digits, often binary digits. Technology and computing Hardware *Digital electronics, electronic circuits which operate using digital signals ** Digital camera, which captures and stores digital images *** Digital versus film photography ** Digital computer, a computer that handles information represented by discrete values **Digital recording, information recorded using a digital signal Socioeconomic phenomena * Digital culture, the anthropological dimension of the digital social changes *Digital divide, a form of economic and social inequality in access to or use of information and communication technologies *Digital economy, an economy based on computing and telecommunications resources Other uses in technology and computing *Digital data, discrete data, usually represented using binary numbers *Digital marketing, search engine & social media presence booster, usually represented using online visibility. *Digital media, media ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Information Security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g. electronic or physical, tangible (e.g. paperwork) or intangible (e.g. knowledge). Information security's primary focus is the balanced protection of the confidentiality, integrity, and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process that involves: * identifying inform ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Microsoft
Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washington, United States. Its best-known software products are the Windows line of operating systems, the Microsoft Office suite, and the Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface lineup of touchscreen personal computers. Microsoft ranked No. 21 in the 2020 Fortune 500 rankings of the largest United States corporations by total revenue; it was the world's largest software maker by revenue as of 2019. It is one of the Big Five American information technology companies, alongside Alphabet, Amazon, Apple, and Meta. Microsoft was founded by Bill Gates and Paul Allen on April 4, 1975, to develop and sell BASIC interpreters for the Altair 8800. It rose to do ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
NHN Corporation
NHN Corp. () is a Korean IT company that started its business as a game company called Hangame in 1999. Currently its main businesses can be categorized as Cloud, Fin-Tech (cross-border e-commerce, payment), Entertainment (game, webtoon, music) and Advertisement. NHN has been focusing on Cloud service since 2014. It launched a comprehensive cloud solution brand called TOAST Cloud in 2014 and built its own IDC center in 2015 for the secure foundation of cloud solution business. Targeting both the corporate and individual clients, TOAST Cloud provides all sorts of cloud services including SaaS, PaaS and Iaas. History It was founded in December 1999 under the name Hangame Communications, Inc. In July 2000, Hangame Communications officially merged with South Korea's largest search engine company, Naver. Upon the merger, the name of the company was changed to "Next Human Network", or NHN, although the two divisions continue to operate under their original brand names. On 1 Augus ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |