• 제목/요약/키워드: Information Security Performance

검색결과 2,208건 처리시간 0.028초

노인복지시설 종사자의 정보보안 인지가 역량강화와 정보보안 행동에 미치는 실증 연구 (An Empirical Study information security awareness of elderly welfare workers on Security Empowerment and information security behavior)

  • 윤일현;이재규
    • 중소기업융합학회논문지
    • /
    • 제6권4호
    • /
    • pp.9-15
    • /
    • 2016
  • 노인 고령화에 따른 노인복지시설 증가와 함께 노인에 대한 정보보안 사례관리가 중요시 되었다. 노인복지시설 종사자들은 노인 보호를 위해 노인의 개인정보, 사회복지서비스 정도 등 중요한 정보를 관리함에도 직무수행체계나 정보보안에 관한 연구는 미흡하다. 노인복지시설 종사자들의 정보보안 인지가 정보보안행동에 어떠한 영향을 미치는가에 대하여 정보보안 역량강화를 매개로 한 연구를 실시하였다. 연구는 종사자들의 성별에 따른 잠재평균분석을 통한 실증분석을 진행 하였다. 연구결과 정보보안 인지(개인경험, 정보 기술이해, 정보보안 인식, 정보보안 정책), 정보보안역량강화, 정보보안 행동의 구조 관계에서 성별에 따라 각기 다른 수준으로 집단 간 차이 있었다. 또한 정보보안 행동에 있어서 성별 차이가 있었으며, 정보보안 역량강화가 정보보안 행동에 중요한 영향을 미치고 있었다.

항공보안장비 방사선 누출량 측정을 위한 평가 기준 및 절차에 관한 연구 (A Study on Evaluation Criteria and Procedures for Measuring Radiation Leakage of Aviation Security Equipment)

  • 김기현;정예은;김예준;김용수
    • 품질경영학회지
    • /
    • 제51권3호
    • /
    • pp.435-444
    • /
    • 2023
  • Purpose: To attain advanced performance certification, safety aspects along with functionality and performance are essential. Hence, this study suggests radiation leakage assessment methods for aviation security equipment during its performance certification. Methods: Detection technology guided the choice of radiation leakage assessment targets. We then detailed measurement and evaluation methods based on equipment type and operation mode. Equipment was categorized as container or box types for establishing measurement procedures. Results: We've developed specific radiation leakage assessment procedures for different types of aviation security equipment, crucial for ensuring airport safety. Using these procedures allows efficient evaluation of compliance with radiation leakage standards. Conclusion: The suggested radiation leakage assessment method aims to enhance aviation security and reliability. Future research will focus on identifying risks in novel aviation security equipment detection technologies and establishing safety standards.

개인 통신망에서 적용가능한 인증 및 키분배 프로토콜 (An applicable Key Distribution and Authentication Protocol in Personal Communication Networks)

  • 송희삼;전문석
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 1995년도 종합학술발표회논문집
    • /
    • pp.331-337
    • /
    • 1995
  • In this paper, We present that protocols have already proposed an applicable key distribution and authentication protocol based discrete logarithm and prime-factorization problem in PCN(Personal Communication Network) is anaysised. We newly propose identiity-based protocol using smart card. This proposed potocol is that Fiat-Shamir identification scheme and a new key distribution scheme based on Fiat-Shamir identification scheme are joined. Proposed protocol is compared with suiting protocols with respect to security and efficiency to evalate performance, so its calculation is reduced in key distribution and authentication to evaluate performance.

  • PDF

정보보호인력의 직무이동과정에 대한 분석 (Analysis on a Turnover Process of Information Security Professionals)

  • 김태성;김길환
    • 정보보호학회논문지
    • /
    • 제21권6호
    • /
    • pp.101-108
    • /
    • 2011
  • 정보보호분야에 종사하고 있는 인력 중 10% 이상이 매년 직장을 옮기고 있고, 퇴사 인력 중 50% 이상이 정보보호 이외의 직무로 전환을 하고 있어 정보보호 전문인력의 유출이 상당한 규모이다[1]. 정보보호 분야에 신규로 우수한 인력을 채용하는 것 뿐만 아니라, 이미 정보보호 분야에 근무하고 있는 인력들에게 만족스럽게 업무를 수행할 수 있는 여건을 제공하여 정보보호인력들의 전문성을 높이고 정보보호 관련 업무의 완성도를 높이는 것이 중요한 과제이다. 본 연구에서는 정보보호인력의 직무 이동 과정을 마코프체인을 이용하여 모델링하고 향후 정보보호인력의 직무별 구성에 대하여 전망한다. 본 연구의 결과는 유망 분야 중점 육성의 효과를 예측하는 등 정보보호 인력양성 관련 세부적인 정책추진의 타당성을 확보하는데 참고가 될 수 있을 것이다.

전술통신 환경에서 전송 성능 분석 및 보안 정책 (The Transmission Performance Analysis and Security Policy in Tactical Communication Environment)

  • 홍진근
    • 디지털융복합연구
    • /
    • 제11권12호
    • /
    • pp.303-309
    • /
    • 2013
  • 본 논문에서는 미군 전술통신 운용환경과 정책, 전술링크에서 보안정책 및 전달성능을 분석하였다. 운용환경에서는 운용통신 메시지와 반자동 전투력을 지원하는 프레임워크, 링크계층의 SINCGARS 사양을 살펴보았고, 전술 보안정책에서 COMSEC 정책과 응용계층 보안을 분석하였다. 또한 전술 통신환경에서 전송 성능 및 보안 동기 검출 측면에서 분석하였다. 전술링크와 COMSEC 보안정책은 AFKDMS, AKMS, RBECS, KIV-7/HSB 암호디바이스와 같은 측면에서 분석하였다.

내부 네트워크의 성능저하요인에 따른 이산화탄소 배출에 관한 연구 (A Study of Carbon Dioxide Emissions due to the Performance Degradation Factors of An Inner Network)

  • 전정훈
    • 한국통신학회논문지
    • /
    • 제36권11B호
    • /
    • pp.1315-1322
    • /
    • 2011
  • 최근 지구온난화 문제는 전 세계의 매우 심각한 환경문제로 대두되고 있으며, 이를 해결하기 위한 방안으로 '그린 IT'가 이슈화되고 있다. 이러한 상황에서 네트워크는 진화와 함께 다양한 공격기술들이 나타나고 있어, 대부분의 여러 보안장치 및 시스템들을 추가 배치하고 있다. 그러나 이와 같은 네트워크 구축방법은 내부 네트워크의 성능과 보안에 큰 영향을 미치며, $CO_2$의 배출량을 증가시키고 있다. 따라서 본 논문은 내부 네트워크의 성능저하요인에 따른 $CO_2$배출을 분석하여, 향후 내부 네트워크의 성능 및 보안성 향상과 IT분야의 $CO_2$배출을 경감하기 위한 자료로 활용될 것으로 기대한다.

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

Privacy Inferences and Performance Analysis of Open Source IPS/IDS to Secure IoT-Based WBAN

  • Amjad, Ali;Maruf, Pasha;Rabbiah, Zaheer;Faiz, Jillani;Urooj, Pasha
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.1-12
    • /
    • 2022
  • Besides unexpected growth perceived by IoT's, the variety and volume of threats have increased tremendously, making it a necessity to introduce intrusion detections systems for prevention and detection of such threats. But Intrusion Detection and Prevention System (IDPS) inside the IoT network yet introduces some unique challenges due to their unique characteristics, such as privacy inference, performance, and detection rate and their frequency in the dynamic networks. Our research is focused on the privacy inferences of existing intrusion prevention and detection system approaches. We also tackle the problem of providing unified a solution to implement the open-source IDPS in the IoT architecture for assessing the performance of IDS by calculating; usage consumption and detection rate. The proposed scheme is considered to help implement the human health monitoring system in IoT networks

Physical Layer Security for Two-Way Relay NOMA Systems with Energy Harvesting

  • Li, Hui;Chen, Yaping;Zou, Borong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.2094-2114
    • /
    • 2022
  • Due to the wide application of fifth generation communication, wireless sensor networks have become an indispensable part in our daily life. In this paper, we analyze physical layer security for two-way relay with energy harvesting (EH), where power splitter is considered at relay. And two kinds of combined methods, i.e., selection combining (SC) and maximum ratio combining (MRC) schemes, are employed at eavesdropper. What's more, the closed-form expressions for security performance are derived. For comparison purposes, this security behaviors for orthogonal multiple access (OMA) networks are also investigated. To gain deeper insights, the end-to-end throughput and approximate derivations of secrecy outage probability (SOP) under the high signal-to-noise ratio (SNR) regime are studied. Practical Monte-Carlo simulative results verify the numerical analysis and indicate that: i) The secure performance of SC scheme is superior to MRC scheme because of being applied on eavesdropper; ii) The secure behaviors can be affected by various parameters like power allocation coefficients, transmission rate, etc; iii) In the low and medium SNR region, the security and channel capacity are higher for cooperative non-orthogonal multiple access (NOMA) systems in contrast with OMA systems; iv) The systematic throughput can be improved by changing the energy conversion efficiency and power splitting factor. The purpose of this study is to provide theoretical direction and design of secure communication.

메타버스 보안 모델 연구 (Research on Metaverse Security Model)

  • 김태경;정성민
    • 디지털산업정보학회논문지
    • /
    • 제17권4호
    • /
    • pp.95-102
    • /
    • 2021
  • As social interest in the metaverse increases, various metaverse platforms and services are appearing, and various security issues are emerging accordingly. In particular, since all activities are performed in a variety of virtual spaces, and the metaverse utilizes sensing data using various hardware devices, more information is accumulated than other Internet services, and more damage can occur if information security is not guaranteed. Therefore, in this paper, we propose a metaverse security model that considers the major issues mentioned in previous papers and the necessary evaluation factors for the security functions required in the metaverse platform. As a result of performing the performance evaluation of the proposed model and the existing attribute information collection model, the proposed model can provide security functions such as anonymity and source authentication, which were not provided by the existing models.