• Title/Summary/Keyword: Emerging Security

Search Result 357, Processing Time 0.024 seconds

Development Strategy on the Risk Rating Method for Nationwide Emerging IT Infrastructure (국가단위 신규 IT인프라의 위험도 등급화 기법 개발 방향 연구)

  • Kim, Sangkyun
    • Journal of Industrial Technology
    • /
    • v.30 no.B
    • /
    • pp.11-16
    • /
    • 2010
  • To provide a development strategy on the method which assesses a potential risk of nationwide emerging IT infrastructure in planning and design phase, and to classify the assessment result into 5 levels is the goal of this research. The development strategy provided in this paper could improve a benefit-cost-ratio of investments on emerging IT infrastructure. With a premature assessment of the potential risks of a nationwide emerging IT infrastructure which needs astronomical amount of public funds, it could show a way of systematic investments on security systems and improve a benefit-cost-ratio of investments on emerging IT infrastructure. Also, this approach might improve the safety of nationwide IT infrastructure. It could identify and provide an optimized solution for the potential risks of nationwide IT infrastructure.

  • PDF

Restructuring of human security practice model to improve practical utility: Focusing on the COVID-19 situation (실천적 유용성 향상을 위한 인간안보 실천모델의 재구성 : COVID-19 상황을 중심으로)

  • Lee, Sung-Rok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.633-642
    • /
    • 2020
  • The recent COVID-19 pandemic is threatening human life and well-being, causing pain that has not been experienced before. Human security was summoned again as a result of the COVID-19 pandemic. However, it is paradoxically a threat to human security due to its inherent limitations and authoritarian control model. This paper first raises the analytical rigor of the concept of human security, focusing on COVID-19. Based on this, the practical usefulness of human security is improved by constructing a practical model that reflects the human security issues raised in reality. In particular, we approach the COVID-19 pandemic not from a natural disaster, but from the perspective of an artificial catastrophe caused by immorality and division in the international community. At the same time, we propose a multilateralism governance model that reflects the perspective of emerging security in order to realize human rights, the fundamental value of human security, and quarantine, a practical task in a balanced way.

Research on Security Threats Emerging from Blockchain-based Services

  • Yoo, Soonduck
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.1-10
    • /
    • 2021
  • The purpose of the study is to contribute to the positive development of blockchain technology by providing data to examine security vulnerabilities and threats to blockchain-based services and review countermeasures. The findings of this study are as follows. Threats to the security of blockchain-based services can be classified into application security threats, smart contract security threats, and network (P2P) security threats. First, application security threats include wallet theft (e-wallet stealing), double spending (double payment attack), and cryptojacking (mining malware infection). Second, smart contract security threats are divided into reentrancy attacks, replay attacks, and balance increasing attacks. Third, network (P2P) security threats are divided into the 51% control attack, Sybil attack, balance attack, eclipse attack (spread false information attack), selfish mining (selfish mining monopoly), block withholding attack, DDoS attack (distributed service denial attack) and DNS/BGP hijacks. Through this study, it is possible to discuss the future plans of the blockchain technology-based ecosystem through understanding the functional characteristics of transparency or some privacy that can be obtained within the blockchain. It also supports effective coping with various security threats.

Internal and External Characteristics of Information Security Officers Affecting Organization's Information Security Performance (조직 정보보호성과에 영향을 미치는 정보보호담당임원의 내·외적 특성)

  • Oh, Ha-Kyeong;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.4
    • /
    • pp.1-19
    • /
    • 2020
  • Infringement of information security has caused the corporate image to be damaged and share price to fall, and it is emerging as an organizational risk. The value of information assets in enterprises has led to a higher level of security than in the past. As a result, companies are aware of the need for officers to protect information and to oversee a security management system. However, despite the growing importance of information security officers, there is a lack of research on their roles and characteristics. This study validates the relationship between determinants that affect the performance of information security. And a structural equation model was presented and empirically analyzed to see the impact of the internal and external characteristics of the staff in charge of information security on the organization's information security performance.

Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching

  • Hamza, Ali;Shehzad, Danish;Sarfraz, Muhammad Shahzad;Habib, Usman;Shafi, Numan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1051-1077
    • /
    • 2021
  • The secure communication of information is a major concern over the internet. The information must be protected before transmitting over a communication channel to avoid security violations. In this paper, a new hybrid method called compressed encrypted data embedding (CEDE) is proposed. In CEDE, the secret information is first compressed with Lempel Ziv Welch (LZW) compression algorithm. Then, the compressed secret information is encrypted using the Advanced Encryption Standard (AES) symmetric block cipher. In the last step, the encrypted information is embedded into an image of size 512 × 512 pixels by using image steganography. In the steganographic technique, the compressed and encrypted secret data bits are divided into pairs of two bits and pixels of the cover image are also arranged in four pairs. The four pairs of secret data are compared with the respective four pairs of each cover pixel which leads to sixteen possibilities of matching in between secret data pairs and pairs of cover pixels. The least significant bits (LSBs) of current and imminent pixels are modified according to the matching case number. The proposed technique provides double-folded security and the results show that stego image carries a high capacity of secret data with adequate peak signal to noise ratio (PSNR) and lower mean square error (MSE) when compared with existing methods in the literature.

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

Factors influencing nursing students' care intentions toward emerging infectious diseases patients: A descriptive-predictive study

  • Park, Seungmi;Jang, Insun;Yu, Soo-Young
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.28 no.4
    • /
    • pp.421-432
    • /
    • 2022
  • Purpose: As coronavirus disease 2019 (COVID-19) and other emerging infectious diseases continue to threaten health security, a strategy is required to increase nursing students' care intention for patients with such diseases. This study aimed to identify factors influencing Korean nursing students' care intentions in regard to patients with emerging infectious diseases. Methods: The care intention, COVID-19 knowledge level, ethical sensitivity, beliefs, attitudes toward the care intention, subjective norms, and perceived behavioral control were investigated using the theory of planned behavior. An online survey was completed from December 2020 to January 2021 by 227 nursing students who had complete a clinical practicum. Descriptive statistics, correlation, and hierarchical regression analyses were conducted on the data. Results: The care intention was higher in men than in women nursing students and in junior than in senior students. Behavioral and normative beliefs, attitude toward the behavior, and perceived behavioral control significantly predicted care intention. Ethical sensitivity increased the predictability of nursing students' care intentions for emerging infectious disease patients. Conclusion: The theory of planned behavior predicted nursing students' care intentions for emerging infectious diseases. Therefore, an experience-based response program on emerging infectious diseases is required for nursing students.

Security Issues in All-optical networks for High-speed Information Communication (초고속정보통신망을 위한 광 네트워크에서의 보안 모델 해석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.864-867
    • /
    • 2005
  • All-optical networks are emerging as a promising technology for per second class communication. However, they are intrinsically different from electro-optical networks, particularly because they do not regenerate signals in the networks. The characteristics of all-optical network components and architectures manifest and still unstudied security vulnerabilities but also offer a new array of possible countermeasures. In this paper, we have analysed the security issue to protect against intrusion.

  • PDF

Novel Push-Front Fibonacci Windows Model for Finding Emerging Patterns with Better Completeness and Accuracy

  • Akhriza, Tubagus Mohammad;Ma, Yinghua;Li, Jianhua
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.111-121
    • /
    • 2018
  • To find the emerging patterns (EPs) in streaming transaction data, the streaming is first divided into some time windows containing a number of transactions. Itemsets are generated from transactions in each window, and then the emergence of itemsets is evaluated between two windows. In the tilted-time windows model (TTWM), it is assumed that people need support data with finer accuracy from the most recent windows, while accepting coarser accuracy from older windows. Therefore, a limited array's elements are used to maintain all support data in a way that condenses old windows by merging them inside one element. The capacity of elements that accommodates the windows inside is modeled using a particular number sequence. However, in a stream, as new data arrives, the current array updating mechanisms lead to many null elements in the array and cause data incompleteness and inaccuracy problems. Two models derived from TTWM, logarithmic TTWM and Fibonacci windows model, also inherit the same problems. This article proposes a novel push-front Fibonacci windows model as a solution, and experiments are conducted to demonstrate its superiority in finding more EPs compared to other models.

The Role of Information and Communication Technology to Combat COVID-19 Pandemic: Emerging Technologies, Recent Developments and Open Challenges

  • Arshad, Muhammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.93-102
    • /
    • 2021
  • The world is facing an unprecedented economic, social and political crisis with the spread of COVID-19. The Corona Virus (COVID-19) and its global spread have resulted in declaring a pandemic by the World Health Organization. The deadly pandemic of 21st century has spread its wings across the globe with an exponential increase in the number of cases in many countries. The developing and underdeveloped countries are struggling hard to counter the rapidly growing and widespread challenge of COVID-19 because it has greatly influenced the global economies whereby the underdeveloped countries are more affected by its devastating impacts, especially the life of the low-income population. Information and Communication Technology (ICT) were particularly useful in spreading key emergency information and helping to maintain extensive social distancing. Updated information and testing results were published on national and local government websites. Mobile devices were used to support early testing and contact tracing. The government provided free smartphone apps that flagged infection hotspots with text alerts on testing and local cases. The purpose of this research work is to provide an in depth overview of emerging technologies and recent ICT developments to combat COVID-19 Pandemic. Finally, the author highlights open challenges in order to give future research directions.