• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > ¿©¼º ICTÀ§¿øȸ Çмú´ëȸ

¿©¼º ICTÀ§¿øȸ Çмú´ëȸ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ºí·ÏüÀÎÀÇ À§Çù°ú ´ëÀÀ¹æ¾È
¿µ¹®Á¦¸ñ(English Title) Blockchain Threats and Countermeasures
ÀúÀÚ(Author) ¿ì¼ºÈñ   ÀÌ¿ëÁÖ   Á¶¿µº¹   SungHee Woo   YongJu Lee   YoungBok Cho  
¿ø¹®¼ö·Ïó(Citation) VOL 2019 NO. 01 PP. 0053 ~ 0056 (2019. 10)
Çѱ۳»¿ë
(Korean Abstract)
4Â÷ »ê¾÷Çõ¸íÀÇ Çٽɱâ¹Ý±â¼ú Áß ÇϳªÀÎ ºí·ÏüÀÎÀº Á¤º¸ÀÇ ¿øº»ÀÌ º¸Á¸µÇ¸é¼­ Åõ¸íÇÑ °Å·¡¿Í ºÐ»êÇÐ µÈ ÀÛ¾÷ Áõ¸íÀ¸·Î Á¤º¸ÀÇ ¹«°á¼ºÀ» º¸ÀåÇÏ´Â ±â¼úÀÌ´Ù. ºí·ÏüÀÎÀº ±â¹Ð¼º£¬¹«°á¼º, °¡¿ë¼ºÀÌ Àû¿ëµÇ¾î ÀÌ·ÐÀûÀ¸·Î´Â ÇØÅ·ÀÌ ºÒ°¡´ÉÇÏ´Ù°í ÇÏÁö¸¸ ÇöÀç´Â ¾ÆÁ÷ ¿ÏÀüÇÑ º¸¾Èü°è¸¦ °®ÃßÁö ¸øÇÏ°í ÀÖ´Ù. ¶ÇÇÑ ºí·ÏüÀÎ Ç÷§Æûµµ ÇϳªÀÇ ¼ÒÇÁÆ®¿þ¾î ÇÁ·Î±×·¥ÀÏ »ÓÀ̹ǷΠ¿ÏÀüÇÏ´Ù°í ÇÒ ¼ö ¾ø´Ù. ºí·ÏüÀÎ ±â¼úÀÌ À̷аú´Â ´Þ¸® Çö½Ç¿¡ Àû¿ëÇßÀ» ¶§ ¸¹Àº ¹®Á¦Á¡ÀÌ Á¸ÀçÇÏ¸ç ´õ Çâ»óµÈ º¸¾È ±â¼úÀ» ÇÊ¿ä·Î ÇÏ°í ÀÖ´Ù. µû¶ó¼­ º» ¿¬±¸¿¡¼­´Â ºí·ÏüÀÎÀÇ ÇÑ°èÁ¡£¬ºí·ÏüÀÎ ÇØÅ· À¯Çü, ºí·ÏüÀÎ ÇØÅ· »ç·Ê¸¦ ºñ±³ ºÐ¼®Çغ¸°í ºí·ÏüÀÎ º¸¾È¸ðµ¨°ú ´ëÀÀ¹æ¾ÈÀ» ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Blockchain technology, which is attracting attention as a key technology leading the 4th Industrial Revolution, is a distributed computing technology that can prevent hacking in online financial transactions requiring credit. Blockchain technology combines transaction information into encrypted blocks and is shared among trading participants, and data is stored in a chain-based, distributed data storage environment. It is used as a security technology of digital authentication, counterfeit money prevention and cryptocurrency because no one can change it arbitrarily. However, although blockchain is said to be impossible to be hacked theoretically due to the application of confidentiality, integrity and availability, it does not yet have a complete security system. Also, blockchain platform is not complete because it is only one software program, so blockchain technology, unlike theory, has many problems when it is applied to reality, and it requires more security technology. Therefore, this study compares and analyzes the limitations of blockchain, blockchain hacking types, and blockchain hacking cases.
Å°¿öµå(Keyword) Blockchain   Integrity   Encryption   Cryptocurrency  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå