• Title/Summary/Keyword: Media Security

Search Result 734, Processing Time 0.026 seconds

A Study on Intensifying Efficiency of Presidential Security Service Organization through the Analysis of Press Media (언론매체 분석을 통한 대통령경호조직의 효율성 제고에 관한 연구)

  • Kim, Il Gon;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.23-32
    • /
    • 2014
  • Quantitative rise and This study carried out qualitative research by utilizing NVivo 10 focusing on the contents of mass media such as newspaper or internet on the presidential security service up to the Park Geun-hye government from the 3rd Republic of Korea, which was established the presidential security service. The aim is to present opinion so that the presidential security organization can strengthen capability and function within the governmental organization down the road based on the contents of categories, which were elicited through this. First, there is a need of solidifying the internal stability with the expansion in the activity sphere of organization and of externally approaching the public with removing sense of difference caused by offering personal protection only to some of the privileged class in the meantime. Second, it is the foundation of a reason related to crime in a cause for Discharge by Authority pertinent to "law on security for president and others" in Article 10 in order to prevent a criminal act of having abused the task characteristic and the position superiority or an external pressure act related to intervention in rights. Third, there is a need of making it recognized as very important organization with putting differentiation from other organizations of the government by providing the disciplinary level more strictly than "disciplinary order on public officials" based on particularity and importance dubbed presidential security service along with correspondingly applying "disciplinary order on public officials" in Article 31 in accordance with "enforcement ordinance of law on security for president and others" in terms of service negligence and false-information report in relation to task performance.

A Study on the Classification of OVAL Definitions for the Application of SCAP to the Korea Security Evaluation System (국내 보안평가체제에 SCAP을 활용하기 위한 OVAL 정의 분류 연구)

  • Kim, Se-Eun;Park, Hyun-Kyung;Ahn, Hyo-Beom
    • Smart Media Journal
    • /
    • v.11 no.3
    • /
    • pp.54-61
    • /
    • 2022
  • With the increase in the types of information systems managed by public institutions and companies, a security certification system is being implemented in Korea to quickly respond to vulnerabilities that may arise due to insufficient security checks. The korea security evaluation system, such as ISMS-P, performs a systematic security evaluation for each category by dividing the categories for technical inspection items. NIST in the United States has developed SCAP that can create security checklists and automate vulnerability checks, and the security checklists used for SCAP can be written in OVAL. Each manufacturer prepares a security check list and shares it through the SCAP community, but it's difficult to use it in Korea because it is not categorized according to the korea security evaluation system. Therefore, in this paper, we present a mechanism to categorize the OVAL definition, which is an inspection item written in OVAL, to apply SCAP to the korea security evaluation system. It was shown that 189 out of 230 items of the Red Hat 8 STIG file could be applied to the korea security evaluation system, and the statistics of the categorized Redhat definition file could be analyzed to confirm the trend of system vulnerabilities by category.

Development of DVCS S/W for wired/wireless Environment (유.무선 통합검증을 위한 DVCS S/W 개발)

  • Cha, Sang-Hee;Kang, Myung-Ho;Park, Jong-Wook;Lee, Yong
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.609-612
    • /
    • 2002
  • 본 논문에서는 데이터 유효성 검증 작업을 수행하는 서버인 DVCS의 효율적인 설계에 대하여 고찰하고, 나아가서 무선 환경에서의 효율적인 DVCS 프로토콜 적용에 관하여 살펴본다. DVCS는 전자서명된 데이터의 유효성 검증 및 특정 시점에서의 인증서 유효성 검증을 위하여 과거에 발행된 CRL들에 대한 분석을 필요로 하는데, 이는 시간 및 공간적인 복잡도가 높은 작업이므로 효율적인 시스템 설계가 요구된다. 또한, 성능이 제한적인 무선 단말기에서 DVCS 프로토콜 및 메시지 처리를 가능하게 하기 위하여, 무선 환경에서의 요구사항 및 이에 대한 해결책을 제시하도록 한다.

  • PDF

Development of Media Crypto Algorithm for anti-hacking into CCTV (CCTV 해킹방지를 위한 미디어 암호화 알고리즘)

  • Hwang, Seon-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.62 no.2
    • /
    • pp.98-102
    • /
    • 2013
  • There are so many CCTV in our streets, buildings and public places. Nevertheless, security methods for CCTV are rarely. This paper describes a study on developing a media crypto algorithm for anti-hacking into CCTV. H.264 codec is used to compress the video stream in CCTV systems. HIGHT algorithm provided by KISA is adopted as a crypto algorithm in our development. Other crypto methods except HIGHT could be selected by company's security police. Only some bytes in VCL(Video Coding Layer) of H.264 are encrypted to improve the performance of limited platforms, such as CCTV, WebCam, smartphone. Very fast and light crypto algorithm was developed by our researches.

Energy Efficient IDS Node Distribution Algorithm using Minimum Spanning Tree in MANETs

  • Ha, Sung Chul;Kim, Hyun Woo
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.41-48
    • /
    • 2016
  • In mobile ad hoc networks(MANETs), all the nodes in a network have limited resources. Therefore, communication topology which has long lifetime is suitable for nodes in MANETs. And MANETs are exposed to various threats because of a new node which can join the network at any time. There are various researches on security problems in MANETs and many researches have tried to make efficient schemes for reducing network power consumption. Power consumption is necessary to secure networks, however too much power consumption can be critical to network lifetime. This paper focuses on energy efficient monitoring node distribution for enhancing network lifetime in MANETs. Since MANETs cannot use centralized infrastructure such as security systems of wired networks, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method to cover all the nodes in a network and enhance the network lifetime. Simulation results show that the proposed algorithm has better performance in comparison with the existing algorithms.

Cyber-Resilience-based Virtual Honeypot Service: Framework Sketch and Feasibility Verification (사이버 탄력성 기반 가상 허니팟 서비스 프레임워크 구상 및 가능성 검증)

  • Cha, Byung Rae;Park, Sun;Kim, Jong Won
    • Smart Media Journal
    • /
    • v.5 no.2
    • /
    • pp.65-76
    • /
    • 2016
  • Cloud Computing has recently begun to emerge as a new attack target. The malice DDoS attacks are ongoing to delay and disturb the various services of the Cloud Computing. In this paper, we propose the Hornet-Cloud using security Honeypot technique and resources of Cloud Computing, define and design the concept of security functions about active low-interaction framework by cyber resilience simply. In addition, for virtual honeypot service, we simulated and vitrified the possibility of functions of the low-interaction vHoneypot using cyber resilience.

Application Of Information Technologies In Network Mass Communication Media

  • Ulianova, Kateryna;Kovalova, Tetiana;Mostipan, Tetiana;Lysyniuk, Maryna;Parfeniuk, Ihor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.344-348
    • /
    • 2021
  • The article examines one of the most important means of visualization of mass information on the Internet - information graphics in the broadest sense of the term as a visual technology for presenting mass information. The main objectives of the article are to determine the genre-typological features of infographics and basic technological principles; identification of features of creation and use of information graphics in modern network. Certain benefits of online infographic editors include savings in resources and time. They allow the user, who has basic PC skills, to create standardized infographics based on their own data. In addition, the use of online services develops visual thinking, allows you to get an idea of quality criteria and current trends in infographics, as well as to gain initial experience in the visual presentation of data.

Design of Secure Information Center Using a Conventional Cryptography

  • Choi, Jun-Hyuk;Kim Tae-Gap;Go, Byung-Do;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.53-66
    • /
    • 1996
  • World Wide Web is a total solution for multi-media data transmission on Internet. Because of its characteristics like ease of use, support for multi-media data and smart graphic user interface, WWW has extended to cover all kinds of applications. The Secure Information Center(SIC) is a data transmission system using conventional cryptography between client and server on WWW. It's main function is to support the encryption of sending data. For encryption of data IDEA(International Data Encryption Algorithm) is used and for authentication mechanism MD5 hash function is used. Since Secure Information Center is used by many users, conventional cryptosystem is efficient in managing their secure interactions. However, there are some restrictions on sharing of same key and data transmission between client and server, for example the risk of key exposure and the difficulty of key sharing mechanisms. To solve these problems, the Secure Information Center provides encryption mechanisms and key management policies.

Comparison of Machine Learning Techniques for Cyberbullying Detection on YouTube Arabic Comments

  • Alsubait, Tahani;Alfageh, Danyah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.1-5
    • /
    • 2021
  • Cyberbullying is a problem that is faced in many cultures. Due to their popularity and interactive nature, social media platforms have also been affected by cyberbullying. Social media users from Arab countries have also reported being a target of cyberbullying. Machine learning techniques have been a prominent approach used by scientists to detect and battle this phenomenon. In this paper, we compare different machine learning algorithms for their performance in cyberbullying detection based on a labeled dataset of Arabic YouTube comments. Three machine learning models are considered, namely: Multinomial Naïve Bayes (MNB), Complement Naïve Bayes (CNB), and Linear Regression (LR). In addition, we experiment with two feature extraction methods, namely: Count Vectorizer and Tfidf Vectorizer. Our results show that, using count vectroizer feature extraction, the Logistic Regression model can outperform both Multinomial and Complement Naïve Bayes models. However, when using Tfidf vectorizer feature extraction, Complement Naive Bayes model can outperform the other two models.

Formation of Anti-Corruption Consciousness of Citizens as a Direction of Interaction of Public Authorities and Institutions of Civil Society

  • Shpak, Yurii;Bandura, Ivan;Primush, Roman;Dokalenko, Varvara;Abdullayev, Vagif
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.17-22
    • /
    • 2022
  • This article defines the process of formation of anti-corruption consciousness as one of the areas of interaction between public authorities and civil society institutions. It is concluded that the implementation of the state anti-corruption policy in Ukraine may be more promising if the institutions of civil society are actively involved. The degree of citizen engagement can be increased by increasing social trust, as well as by increasing the level of political and legal education and culture. Particular attention should be paid to the organization of public control and monitoring of the activities of public authorities, impartial coverage of information on the fight against corruption in the media, as well as the joint conduct of an information and educational campaign and the promotion of the formation of anti-corruption consciousness among a large number of citizens.