• Title/Summary/Keyword: Security Case

Search Result 1,791, Processing Time 0.024 seconds

A Study of Security Level Conversion Scheme for Security Documents (보안 문서의 보안 수준 변환을 위한 기법 연구)

  • Cho, Do-Eun;Yeo, Sang-Soo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.3
    • /
    • pp.405-411
    • /
    • 2011
  • The value of information becomes very high, a large number of research works has been made for acquiring, managing, and using information. In a specific company (or organization), they are classifying company data documents with managed security levels, and they are securing their secured documents. In this paper, we introduce essential technologies enabling to inspect documents securely and to change specific keywords to normal words, in case that a higher security level document should be converted to a lower security level document.

Implementation of the U.S. Aviation Security Policy and Privacy Protection Problem (미국의 항공보안정책 적용과 프라이버시 문제점)

  • Kang, J.Y.;Kim, C.H.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2005
  • TSA needs to be more transparent with the new passenger screening system and its functioning to build the citizen trust. The system is needed to be not only effective but supported by Congress and the general public. Until this occurs, skepticism will underlie any discussion about its effectiveness in balancing the protection from terrorism with respect to individual liberties. CAPPS II can be a viable system if it is developed appropriately. The objectives of the study are to introduce the security program in the U.S. aviation security policy and to discuss privacy problems when it applies. Korea also needs to study a harmonious plan with the basis of global approach mind in the case of considering the transferring of passenger information from other states for the purpose of security.

  • PDF

Security Risk Management of an Educational Institution: Case Study

  • Almarri, Bayenah;Alraheb, Fatimah;Alramis, Shahad;Almilad, Noor;Aldahasi, Ezaz;Ali, Azza
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.172-176
    • /
    • 2021
  • This study is conducted with an educational institution to minimize the potential security hazards to an acceptable level where the vulnerabilities and threats are revealed in this institution. The paper provides a general structure for the risk management process in educational institutions, and some recommendation that increases security levels is presented.

A double-blockchain architecture for secure storage and transaction on the Internet of Things networks

  • Aldriwish, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.119-126
    • /
    • 2021
  • The Internet of Things (IoT) applications are quickly spread in many fields. Blockchain methods (BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography (ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing (CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

Establishing Security Level Standards and Case Studies for Safe Electronic Financial Transactions (안전한 전자금융거래를 위한 보안등급 기준마련 및 사례연구)

  • Jang, Kil-Young;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.729-741
    • /
    • 2018
  • On June 24, 2015, the Financial Services Commission (Financial Services Commission) completely abolished the security review process, and said that it would substitute self-security review obligations with self-security reviews. Security officials at financial institutions conduct security reviews based on CIA security grade when they conduct security reviews for secure electronic financial transactions. However, the recent security review for Internet and mobile electronic financial transactions has carried out a security review, either by checking separate processes or by referring to new technologies and data related to security. This paper proposes the CIAAP security gradesl with the addition of certification and privacy protection indicators to the CIA based security grades, especially through the security review of electronic financial transactions.

A study on method of setting up the defense integrated security system (군 통합보안시스템 구축 방안 연구)

  • Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.575-584
    • /
    • 2012
  • A established military security tast based on existing manual and off-line needs the change and development to support effective and systematic task performance according to environment change of informational and scientific project in the military. Therefore this study suggests to set up the standard model of the defense integrated security system to automate and informationize major defense security task based on actual and problem in the area of major defense of security task and case analysis of these in America, England and other countries. The standard model consist of unit systems were made up integrated security system, security management system, man entrance system, vehicle entrance system, high-tech guard system, terror prevention system and the security accident analysis system, and this suggested model based on possible technology and system. If this model is apply to each real military unit, we will expect the development of defense security.

The Performance Analysis on Remote Access VPN (원격접속 VPN에 대한 성능분석)

  • Kim, Ji-Hong
    • The Journal of Information Technology
    • /
    • v.7 no.4
    • /
    • pp.21-30
    • /
    • 2004
  • A VPN(Virtual Private Network) is constructed using public wires to connect nodes. It can be used like the dedicated line and maintain the security of the data on the VPN. And It uses encryption and other security mechanisms to ensure that only authorized users can access the network. In this paper we summarize IPsec and VPN technology and construct pilot VPN system for analyzing the performance of remote access VPN. Then we analyze the performance of remote VPN system using VPN concentrator in case of single user and in case of multi users.

  • PDF

Study on The RBAC Protocol of Medical Information System (의료정보시스템의 RBAC 프로토콜 연구)

  • Lim, Kyeong Suk;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.77-84
    • /
    • 2016
  • In general RBAC(Role-Based-Access Control) model, senior role has junior role's permissions by virtue of role hierarchy. But although the opposite case is needed partially in medical institutions, such case cannot be performed in medical information systems. This is because inheritances of permissions in role hierarchies are static. In order to tackle this problem, this paper defined a dynamic role assignment, thereby proposed the way for the junior temporarily to be able to perform the permissions of the senior, and showed the applications of medical information systems.

Soft Systems are Ubiquitous-Defenses are Rare: A Case for Contingent Outsourcing of Patch Management

  • Arnett Kirk P.
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.23-30
    • /
    • 2005
  • Computer attacks on vulnerable software are ubiquitous. Today's attacks on client PCs can be used to create armies of zombie computers that are capable of wide reach attacks on high profile businesses and governments. The simple act of patching software vulnerabilities will certainly mitigate this problem, but patching has its own set of problems. Further, it is frequently the case that patches which are available to mitigate vulnerabilities are not being made on a timely basis and sometimes are not being made at all. One solution to the patch management dilemma is outsourcing. This paper notes that outsourcing is not a carte blanche decision that can be made based on dollars, but rather that a contingency decision matrix can provide guidance on outsourcing solutions for patch management and other security components as well. The matrix recognizes that IS staff expertise and employee security awareness are two important factors in the outsourcing decision.

  • PDF

Saudi Universities Electronic Portals: A Case Study of Northern Border University

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.103-109
    • /
    • 2021
  • The study aimed to analyze the current situation of the electronic portal of the Northern Border University, in terms of content and components, the extent of quality of use, service assurance and integrity, linguistic coverage of objective content, in addition to assessing the efficiency of the Blackboard e-learning platform and measuring the degree of safety of the portal, in addition to measuring the extent of satisfaction, through a sample that included 135 faculty members, as the researcher was keen to apply the case study methodology with the use of the questionnaire as the main tool for measurement, and the study found that there is an average trend among faculty members in the degree of content for the components of the portal and electronic security While it rose to good use, and very good at using the Blackboard platform.