• Title/Summary/Keyword: Emerging Security

Search Result 363, Processing Time 0.024 seconds

A Study on Priorities of the Components of Big Data Information Security Service by AHP (AHP 기법을 활용한 Big Data 보안관리 요소들의 우선순위 분석에 관한 연구)

  • Biswas, Subrata;Yoo, Jin Ho;Jung, Chul Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.301-314
    • /
    • 2013
  • The existing computer environment, numerous mobile environments and the internet environment make human life easier through the development of IT technology. With the emergence of the mobile and internet environment, data is getting bigger rapidly. From this environment, we can take advantage of using those data as economic assets for organizations which make dreams come true for the emerging Big Data environment and Big Data security services. Nowadays, Big Data services are increasing. However, these Big Data services about Big Data security is insufficient at present. In terms of Big Data security the number of security by Big Data studies are increasing which creates value for Security by Big Data not Security for Big Data. Accordingly in this paper our research will show how security for Big Data can vitalize Big Data service for organizations. In details, this paper derives the priorities of the components of Big Data Information Security Service by AHP.

A policy analysis of nuclear safety culture and security culture in East Asia: Examining best practices and challenges

  • Trajano, Julius Cesar Imperial
    • Nuclear Engineering and Technology
    • /
    • v.51 no.6
    • /
    • pp.1696-1707
    • /
    • 2019
  • This paper conducts a qualitative policy analysis of current challenges to safety culture and security culture in Southeast Asia and emerging best practices in Northeast Asia that are aimed at strengthening both cultures. It analyses lessons, including strengths and limitations, that can be derived from Northeast Asian states, given the long history of nuclear energy in South Korea, China and Japan. It identifies and examines best practices from Northeast Asia's Nuclear Security Centres of Excellence in terms of boosting nuclear security culture and their relevance for Southeast Asia. The paper accentuates the important role of the State in adopting policy and regulatory frameworks and in institutionalising nuclear education and training programmes to deepen the safety-security cultures. Best practices in and challenges to developing a nuclear safety culture and a security culture in East Asia are examined using three frameworks of analysis (i) a comprehensive nuclear policy framework; (ii) a proactive and independent regulatory body; and (iii) holistic nuclear education and training programmes. The paper argues that Southeast Asian states interested in harnessing nuclear energy and/or utilising radioactive sources for non-power applications must develop a comprehensive policy framework on developing safety and security cultures, a proactive regulatory body, and holistic nuclear training programmes that cover both technical and human factors. Such measures are crucial in order to mitigate human errors that may lead to radiological accidents and nuclear security crises. Key lessons from Japan, South Korea and China such as best practices and challenges can inform policy recommendations for Southeast Asia in enhancing safety-security cultures.

Analyses of Requirement of Security based on Gateway Architecture for Secure Internet (사물인터넷망의 보안 및 프라이버시 문제 해결을 위한 게이트웨이 보안 구조 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.461-470
    • /
    • 2016
  • As IoT is broadly used in many fields, the security of IoT is becoming especially important and critical issues. Security and privacy are the key issues for IoT applications, and still faced with some enormous challenges. Sensor has limited resources such as computing power, memory, battery. By means of deeply analyzing the security architecture and features in security framework. While a number of researchers have explored such security challenges and open problems in IoT, there is an unfortunate lack of a systematic study of the security challenges in the IoT landscape. This special issue features recent and emerging advances IoT architecture, protocols, services and applications. The alternative method is IoT security gateway. In this paper, we surveyed the demands and requirements. By means of deeply analyzing the security architecture and features, we analyzed the demands and requirements for security based on gateway application.

Exploring trends in blockchain publications with topic modeling: Implications for forecasting the emergence of industry applications

  • Jeongho Lee;Hangjung Zo;Tom Steinberger
    • ETRI Journal
    • /
    • v.45 no.6
    • /
    • pp.982-995
    • /
    • 2023
  • Technological innovation generates products, services, and processes that can disrupt existing industries and lead to the emergence of new fields. Distributed ledger technology, or blockchain, offers novel transparency, security, and anonymity characteristics in transaction data that may disrupt existing industries. However, research attention has largely examined its application to finance. Less is known of any broader applications, particularly in Industry 4.0. This study investigates academic research publications on blockchain and predicts emerging industries using academia-industry dynamics. This study adopts latent Dirichlet allocation and dynamic topic models to analyze large text data with a high capacity for dimensionality reduction. Prior studies confirm that research contributes to technological innovation through spillover, including products, processes, and services. This study predicts emerging industries that will likely incorporate blockchain technology using insights from the knowledge structure of publications.

Privacy leakage security system research for small physical companies (중소 경호.경비업체의 개인정보 유출 방지를 위한 보안 체계 연구)

  • Kang, Poo-Reum;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.87-97
    • /
    • 2012
  • Privacy of personal information disclosure incident occurs frequently as a problem to our society's most important and sensitive social agenda is emerging. Personal information is actually more accurate, depending on the type or types of economic value and sensitivity, the quality of the information, because it can cause a spill a serious social threat and systematic personal information protection and management are not carried out and the information society in a big mess can result. Customers my affairs when small guard security companies, especially the sensitive personal information of customers who need to work, the collected information be leaked or the company's trade secrets, are exposed on the outside, it could be a serious threat to a greater problem cause. Small escort guard companies, however, compared with large companies to build its own security system, due to issues such as the extent of funding, staffing shortages, there are many difficulties. Status of Information Security, scale and analyze the characteristics of small escort guard companies occupied by guard security companies in the present study, sleep, look at him in the solution of the practical issues of information protection system laid small guard. Expenses supplier of propose a security system for preventing the leakage of personal information.

Perceptions of the Relationship between Port Security Level, Resilience, Cargo Operational Performance, and Sustainability Performance among Korean Port Operators and Shipping Companies

  • Chan-Ho Kim;Sang-Gyun Choi;Sung-Ki Kim
    • Journal of Korea Trade
    • /
    • v.27 no.3
    • /
    • pp.65-86
    • /
    • 2023
  • Purpose - As globalization progresses, complexity also increases, and various factors that threaten port functions are emerging. Accordingly, the demand for port security to prevent the crisis and resilience that quickly recovers its original function after the crisis is also increasing in port operations. However, few studies have examined how to ensure the port security and how the resilience affects operation performance of port and sustainability performance as well. So the study aims to find out how port security affects port resilience and port operational performance, and consequently, this two factors affect socioeconomic and environmental sustainability performance respectively and synthetically. Design/methodology - Confirmatory Factor Analysis (CFA) was first performed to determine the validity of the factors of model and hypothesis test was performed using Structural Equation Model (SEM) to analyze the Port Performance Model, which show the perception logic among port security level, port resilience, operation performance, and sustainability performance. In order to empirically analyze this model, total 264 respondents from port security operators, shipping companies in South Korea were surveyed. Findings - As result of SEM, First, port security level positively affected the resilience (H1) and cargo operational performance (H2) but not in both of the sustainability performances (H3, H4). Second, resilience positively affected only cargo operational performance (H5) and socio-economic sustainability performance (H7). Last, cargo operation performance positively affects the both of sustainability performances (H8, H9). Originality/value - It was confirmed that port security could improve cargo operational performance through ensuring port resilience and eventually increase the socio-economic sustainability. Therefore the study implies that careful integration and management of port security, port resilience, and sustainability are required, along with compromise on sustainable development goals in the social, economic, and environmental area among all stakeholders.

Telemedicine Security Risk Evaluation Using Attack Tree (공격트리(Attack Tree)를 활용한 원격의료 보안위험 평가)

  • Kim, Dong-won;Han, Keun-hee;Jeon, In-seok;Choi, Jin-yung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.951-960
    • /
    • 2015
  • The smart screening in the medical field as diffusion of smart devices and development of communication technologies is emerging some medical security concerns. Among of them its necessary to taking risk management measures to identify, evaluate and control of the security risks that can occur in Telemedicine because of the Medical information interchanges as Doctor to Doctor (D2D), Doctor to Patient (D2P). This research paper studies and suggests the risk analysis and evaluation methods of risk security that can occur in Telemedicine based on the verified results of Telemedicine system and equipment from the direct site which operating in primary clinics, public health centers and it's branches, etc.

Proposal and Analysis of Solution for Improving Problem of Our Country Logistics Security (우리나라 물류보안의 문제점 개선 방안 제안 및 분석)

  • Ahn, Jae-Deok;Lee, Ki-Wook
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.352-360
    • /
    • 2010
  • 9.11 This research since 2001, including shipping and port security and cargo flow international logistics the overall efficiency of the important issues of the international community that reflects the emerging research on the logistics to improve the security problems of I may occur in the logistics sector in the country, such as terrorism and to prevent security incidents from the security system of the logistics in order to operate in real time, and the introduction of advanced logistics and my analysis and logistics for the security system to collect data and develop lesson Logistics problems facing the security sector will want to analyze and improve the present. The analysis of the problems of logistics and security and find ways to improve research and literature selected by experts to improve, and to improve the first part of measures to improve the survey was analyzed through the AHP.

Low-cost AES Implementation for RFID tags (RFID 태그를 위한 초소형 AES 연산기의 구현)

  • Koo, Bon-Seok;Ryu, Gwon-Ho;Yang, Sang-Woon;Chang, Tae-Joo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.67-77
    • /
    • 2006
  • Radio Frequency IDentification (RFID) will soon become an important technology in various industries. Therefore, security mechanisms for Rm systems are emerging crucial problems in RFID systems. In order to guarantee privacy and security, it is desirable to encrypt the transferred data with a strong crypto algorithm. In this paper, we present the ultra-light weight Advanced Encryption Standard (AES) processor which is suitable for RFID tags. The AES processor requires only 3,992 logic gates and is capable of both 128-bit encryption and decryption. The processor takes 446 clock cycles for encryption of a 128-bit data and 607 clock cycles for decryption. Therefore, it shows 55% improved result in encryption and 40% in decryption from previous cases.

Analysis of VANET Authentication Protocol using Casper in the Formal Verification (정형검증 도구인 Casper를 이용한 VANET 인증 프로토콜 분석)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.27-33
    • /
    • 2012
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provide traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. Also, in VANET, vehiculars sho uld be able to authenticate each other to securely communicate with network-based infrastructure, and their location s and identifiers should not be exposed from the communication messages. This paper explains V2I authentication pr otocol using a hash function that preserves the user privacy. In addition, we analyze the security stability of the V2I authentication protocol using Casper in the formal verification technique. As a result, V2I authentication protocol us ing hash function prove a stability.