• Title/Summary/Keyword: Account Security

Search Result 404, Processing Time 0.028 seconds

Linguistic and Cultural Foundations of in-Depth Study of the National Language at School

  • Vitalii Kononenko;Yana Ostapchuk;Oktaviia Fizeshi;Iryna Humeniuk;Iryna Rozman
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.220-224
    • /
    • 2023
  • The main purpose of the study is to analyze the linguoculturological foundations of in-depth study of the national language. The new requirements facing a modern teacher, his training and professional qualities make it necessary to take into account the experience and latest achievements of other countries in the field of educational policy, in particular, in the field of teaching foreign languages, as well as to identify and overcome negative ones. Based on the results of the study, the key linguoculturological foundations of in-depth study of the national language were characterized.

Digital Technologies for Learning a Foreign Language in Educational Institutions

  • Olha Byriuk;Tetiana Stechenko;Nataliya Andronik;Oksana Matsnieva;Larysa Shevtsova
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.89-94
    • /
    • 2024
  • The main purpose of the study is to determine the main elements of the use of digital technologies for learning a foreign language in educational institutions. The era of digital technologies is a transition from the traditional format of working with information to a digital format. This is the era of the total domination of digital technologies. Digital technologies have gained an unprecedented rapid and general distribution. In recent years, all spheres of human life have already undergone the intervention of digital technologies. Therefore, it is precisely the educational industry that faces a difficult task - to move to a new level of education, where digital technologies will be actively used, allowing you to conveniently and quickly work in the information field for more effective learning and development. The study has limitations and they relate to the fact that the practical activities of the process of using digital technologies in the system of preparing the study of a foreign language were not taken into account.

An Efficient Protocol for the Cross Certification Path Validation (경로기반 상호인증을 위한 효율적 프로토콜)

  • 김홍석;박세현
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.217-220
    • /
    • 2000
  • With the expansion of E-commerce, Public Key Infrastructure (PKI) solutions are requited to resolve Internet security problems. But the certification mechanism for each organization has been independently developed under its own circumstances, so the cooperation of heterogeneous certification mechanisms must be carefully taken into account. In this paper, we propose an efficient protocol for the cross certification based on the path validation. The proposed “cross certification gateway” provides flexibility and convenience with the initial establishment protocol for the cross certification among different certification domains.

  • PDF

New security requirements for cloud services account fraud (클라우드 서비스 계정도용 방지를 위한 새로운 보안 요구사항)

  • Ahn, Dong-Il;Choi, Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.66-69
    • /
    • 2014
  • 클라우드는 IT를 직접 소유하기 보다 제 3 자가 제공하는 소프트웨어, 플랫폼, 인프라구조 등을 필요에 따라 선택하고 이용하는 방식으로 시스템을 중앙에서 집중 관리하여 규모의 경제를 달성하는 데 용이하지만 해커에게는 더 없이 매력적인 공격 대상이 된다. 아무리 완벽한 보안 설비와 정책을 이행하고 있더라도 사용자의 아이디와 패스워드가 도용 되었을 때 발생되는 문제점은 치명적이다. 본 논문에서는 사용자의 편의성을 보장하면서 계정도용을 방지하기 위한 새로운 보안 요구사항을 제시하고자 한다.

Investigating Key Security Factors in Smart Factory: Focusing on Priority Analysis Using AHP Method (스마트팩토리의 주요 보안요인 연구: AHP를 활용한 우선순위 분석을 중심으로)

  • Jin Hoh;Ae Ri Lee
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.185-203
    • /
    • 2020
  • With the advent of 4th industrial revolution, the manufacturing industry is converging with ICT and changing into the era of smart manufacturing. In the smart factory, all machines and facilities are connected based on ICT, and thus security should be further strengthened as it is exposed to complex security threats that were not previously recognized. To reduce the risk of security incidents and successfully implement smart factories, it is necessary to identify key security factors to be applied, taking into account the characteristics of the industrial environment of smart factories utilizing ICT. In this study, we propose a 'hierarchical classification model of security factors in smart factory' that includes terminal, network, platform/service categories and analyze the importance of security factors to be applied when developing smart factories. We conducted an assessment of importance of security factors to the groups of smart factories and security experts. In this study, the relative importance of security factors of smart factory was derived by using AHP technique, and the priority among the security factors is presented. Based on the results of this research, it contributes to building the smart factory more securely and establishing information security required in the era of smart manufacturing.

Security Cost Analysis with Linear Ramp Model using Contingency Constrained Optimal Power Flow

  • Lyu, Jae-kun;Kim, Mun-Kyeom;Park, Jong-Keun
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.3
    • /
    • pp.353-359
    • /
    • 2009
  • This paper proposes a novel technique for calculating the security costs that properly includes ramping constraints in the operation of a deregulated power system. The ramping process is modeled by a piecewise linear function with certain assumptions. During this process, a ramping cost is incurred if the permissible limits are exceeded. The optimal production costs of the power producers are calculated with the ramping cost included, considering a time horizon with N-1 contingency cases using contingency constrained optimal power flow (CCOPF), which is solved by the primal-dual interior point method (PDIPM). A contingency analysis is also performed taking into account the severity index of transmission line outages and its sensitivity analysis. The results from an illustrative case study based on the IEEE 30-bus system are analyzed. One attractive feature of the proposed approach is that an optimal solution is more realistic than the conventional approach because it satisfies physical constraints, such as the ramping constraint.

An Empirical Study on User Acceptance of Micro e-Payment Systems : System Features, Transaction Cost, and Provider (소액 전자결제시스템 수용의지에 관한 실증연구 : 시스템 특성, 거래비용과 제공업체를 중심으로)

  • Chung, Suk-Kyun;Ryoo, Chang-Wan;Ku, Tae-Yong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.4
    • /
    • pp.130-137
    • /
    • 2010
  • This paper analyzes the main factors affecting user selection of a small-sum electronic payment system using survey data of 396 users. Several findings emerge. First, users consider three pillars and eight factors in adopting a new system : system features(stability, security, and flexibility), transaction cost(payment commission and settlement period), and financial capability of provider(stability of financial structure, risk management capability, and funding capability). Second, the stability of the financial structure of the system provider is the most important factor to user acceptance of a new e-payment system. Users tend to consider uncertainty risk more seriously than transaction cost. This reflects the reality that electronic payment system service industry has not fully fledged yet. Third, some moderating effects exist according to payment methods and business usages. As for payment methods, speedy settlement cycle for wired/wireless phone payment, system stability for credit card and account transfer payment, and security for advance payment means are crucial factors. As for business usages, the stability of financial structure for online game content, system stability for music and video content, proxy payment commission for e-learning content, flexibility of the payment system for digital adult content, and security for public services are decisive ones.

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)

  • Sharif, Lukman;Ahmed, Munir
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.177-184
    • /
    • 2010
  • Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs and present a major challenge when designing robust security mechanisms for WSNs. In this paper, we examine some of the most common routing attacks in WSNs. In particular, we focus on the wormhole routing attack in some detail. A variety of countermeasures have been proposed in the literature for such attacks. However, most of these countermeasures suffer from flaws that essentially render them ineffective for use in large scale WSN deployments. Due to the inherent constraints found in WSNs, there is a need for lightweight and robust security mechanisms. The examination of the wormhole routing attack and some of the proposed countermeasures makes it evident that it is extremely difficult to retrofit existing protocols with defenses against routing attacks. It is suggested that one of the ways to approach this rich field of research problems in WSNs could be to carefully design new routing protocols in which attacks such as wormholes can be rendered meaningless.

Reliability Evaluation of Power System Operations Considering Time-Varying Features of Components

  • Hu, Bo;Zheng, Ying;Yang, Hejun;Xia, Yun
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.4
    • /
    • pp.1422-1431
    • /
    • 2015
  • The reliability of power system components can be affected by a numbers of factors such as the health level of components, external environment and operation environment of power systems. These factors also affect the electrical parameters of power system components for example the thermal capacity of a transmission element. The relationship of component reliability and power system is, therefore, a complex nonlinear function related to the above-mentioned factors. Traditional approaches for reliability assessment of power systems do not take the influence of these factors into account. The assessment results could not, therefore, reflect the short-term trend of the system reliability performance considering the influence of the key factors and provide the system dispatchers with enough information to make decent operational decisions. This paper discusses some of these important operational issues from the perspective of power system reliability. The discussions include operational reliability of power systems, reliability influence models for main performance parameters of components, time-varying reliability models of components, and a reliability assessment algorithm for power system operations considering the time-varying characteristic of various parameters. The significance of these discussions and applications of the proposed techniques are illustrated by case study results using the IEEE-RTS.

A Survey of Security Mechanisms with Direct Sequence Spread Spectrum Signals

  • Kang, Taeho;Li, Xiang;Yu, Chansu;Kim, Jong
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.3
    • /
    • pp.187-197
    • /
    • 2013
  • Security has long been a challenging problem in wireless networks, mainly due to its broadcast nature of communication. This opens up simple yet effective measures to thwart useful communications between legitimate radios. Spread spectrum technologies, such as direct sequence spread spectrum (DSSS), have been developed as effective countermeasures against, for example, jamming attacks. This paper surveys previous research on securing a DSSS channel even further, using physical layer attributes-keyless DSSS mechanisms, and watermarked DSSS (WDSSS) schemes. The former has been motivated by the fact that it is still an open question to establish and share the secret spread sequence between the transmitter and the receiver without being noticed by adversaries. The basic idea of the latter is to exploit the redundancy inherent in DSSS's spreading process to embed watermark information. It can be considered a counter measure (authentication) for an intelligent attacker who obtains the spread sequence to generate fake messages. This paper also presents and evaluates an adaptive DSSS scheme that takes both jam resistance and communication efficiency into account.