• Title/Summary/Keyword: Security Elements

Search Result 549, Processing Time 0.028 seconds

A Study on the Evaluation Indices for Evaluation of the Information Security Level on the Enterprise Organization (기업의 정보보호 수준 평가를 위한 평가지표)

  • Na, Yun-Ji;Ko, Il-Seok;Cho, Young-Suk
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.135-144
    • /
    • 2006
  • Until now, most of the evaluation systems have performed evaluation with an emphasis on in-formation security products. However, evaluating information security level for an enterprise needs analysis of the whole enterprise organization, and a synthetic and systematic evaluation system based on it. In this study we subdivided the information security elements of the whole enterprise such as planning, environment, support, technology, and management; developed indices based on them; finally, made the information security level of the whole enterprise organization possible to be measured. And we tried to grasp the information security level of the whole enterprise organization and develop an evaluation system of information security level for suggesting a more developing direction of information security.

  • PDF

The Implementation of Probabilistic Security Analysis in Composite Power System Reliability (복합전력계통 신뢰도평가의 확률론적 안전도 도입)

  • Cha, Jun-Min;Kwon, Sae-Hyuk;Kim, Hyung-Chul
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.5
    • /
    • pp.185-190
    • /
    • 2006
  • The security analysis relates to the ability of the electric systems to survive sudden disturbances such as electric short circuits or unanticipated loss of system elements. It is composed of both steady state and dynamic security analyses, which are not two separate issues but should be considered together. In steady state security analysis including voltage security analysis, the analysis checks that the system is operated within security limits by OPF (optimal power flow) after the transition of a new operating point. On the other hand, dynamic security analysis deals that the transition will lead to an acceptable operating condition. Transient stability, which is the ability of power systems to maintain synchronism when subjected to a large disturbance, is a principal component in dynamic security analysis. Usually any loss of synchronism will cause additional outages. They make the present steady state analysis of the post-contingency condition inadequate for unstable cases. This is the reason of the need for dynamics of systems. Probabilistic criterion can be used to recognize the probabilistic nature of system components and shows the possibility of system security. A comprehensive conceptual framework for probabilistic static and dynamic assessment is presented in this paper. The simulation results of the Western System Coordinating Council (WSCC) system compare an analytical method with Monte-Carlo simulation (MCS). Also, a case study of the extended IEEE Reliability Test System (RTS) shows the efficiency of this approach.

A Study on DCAS Security Framework Model for Mobile IPTV (모바일 IPTV 환경에 적합한 DCAS 보안 프레임워크 연구)

  • Choi, Jung-Young;Cho, Kwan-Tae;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.105-116
    • /
    • 2011
  • Mobile IPTV is a IPTV interactive broadcasting service through wireless Internet. Mobile IPTV service would be much more promoted. Thus, the methods for protecting the broadcasting contents will be indispensible elements for the successful Mobile IPTV service achievement. This paper describes the characteristics of Mobile IPTV and the related contents protection techniques. To evaluate several security issues, we suggest a DCAS security framework model for Mobile IPTV, and speculate the most widespread, a security technologies for Mobile IPTV such as DCSA. Moreover, candidate models of Mobile IPTV protection system are suggested based on these technologies.

Human Factor & Artificial Intelligence: For future software security to be invincible, a confronting comprehensive survey

  • Al-Amri, Bayan O;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.245-251
    • /
    • 2021
  • This work aims to focus on the current features and characteristics of Human Element and Artificial intelligence (AI), ask some questions about future information security, and whether we can avoid human errors by improving machine learning and AI or invest in human knowledge more and work them both together in the best way possible? This work represents several related research results on human behavior towards information security, specified with elements and factors like knowledge and attitude, and how much are they invested for ISA (information security awareness), then presenting some of the latest studies on AI and their contributions to further improvements, making the field more securely advanced, we aim to open a new type of thinking in the cybersecurity field and we wish our suggestions of utilizing each point of strengths in both human attributions in software security and the existence of a well-built AI are going to make better future software security.

A Quality Evaluation Model for IoT Services (IoT 서비스를 위한 품질 평가 모델)

  • Kim, Mi;Lee, Nam Yong;Park, Jin Ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.9
    • /
    • pp.269-274
    • /
    • 2016
  • In this paper We focuses on suggestion to quality model for IoT infrastructure services for Internet of Things. Quality model is suggested on security set out in ISO25000 quality factors and assessment of the existing traditional software application of ISO 9126 quality model. We validated that the proposed model can be realized it was applied to evaluate the 4 elements and related security in Metrics.

Behavioral Tendency Analysis towards E-Participation for Voting in Political Elections using Social Web

  • Hussain Saleem;Jamshed Butt;Altaf H. Nizamani;Amin Lalani;Fawwad Alam;Samina Saleem
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.189-195
    • /
    • 2024
  • The issue "Exploring Social Media and Other Crucial Success Elements of Attitude towards Politics and Intention for Voting in Pakistan" is a huge study embracing more issues. The politics of Pakistan is basically the politics of semantic groups. Pakistan is a multilingual state more than six languages. There are 245 religious parties in Pakistan, as elaborated by the Daily Times research. The use of social media sites in Pakistan peaked to its maximum after announcement of election schedule by the Election Commission of Pakistan in March 22, 2013. Most of the political parties used it for the recent elections in Pakistan to promote their agenda and attract country's 80 million registered electors. This study was aiming to investigate the role of social media and other critical variables in the attitude towards politics and intention for voting.

Analysis of sustainable interior design elements (지속가능한 실내디자인 요소 분석)

  • Lee, Hyun-Chang;Nam, Kyung-Sook
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2007.11a
    • /
    • pp.169-172
    • /
    • 2007
  • Sustainable interior design elements are related with human health. We know that a demand for environmental-friendly housing and all about the others demanding are for human health. We have to make up basement of natural environment for sustainable space composition. If natural environment is polluted that surrounded by human, we have to effort to revive without any pollution. We have to get accomplished stability, comfortable, security, convenience and organize interior design elements for sustainable space to enhance for the quality of life. Furthermore, it needs to get a respect lifestyle on personal. To study composing of the sustainable interior design, we arranged interior design elements to compose sustainable space of housing. We investigated how to compose energy-efficiency, sustainable, interior tree-planting, alterable of the space.

  • PDF

Hierarchical Identity-Based Encryption with Constant-Size Private Keys

  • Zhang, Leyou;Wu, Qing;Hu, Yupu
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.142-145
    • /
    • 2012
  • The main challenge at present in constructing hierarchical identity-based encryption (HIBE) is to solve the trade-off between private-key size and ciphertext size. At least one private-key size or ciphertext size in the existing schemes must rely on the hierarchy depth. In this letter, a new hierarchical computing technique is introduced to HIBE. Unlike others, the proposed scheme, which consists of only two group elements, achieves constant-size private keys. In addition, the ciphertext consists of just three group elements, regardless of the hierarchy depth. To the best of our knowledge, it is the first efficient scheme where both ciphertexts and private keys achieve O(1)-size, which is the best trade-off between private-key size and ciphertext size at present. We also give the security proof in the selective-identity model.

The Use Of Elements Of Innovative Pedagogical Technologies In Educational Activities

  • Barba, Ihor;Riazantsev, Lev;Koturha, Oleh;Poliakov, Serhii;Bondarets, Nadiia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.117-122
    • /
    • 2021
  • The article considers the position of scientists on the concept of "pedagogical technology", identifies the signs of pedagogical technology and existing classifications, considers non-traditional (innovative) learning technologies, as well as their practical forms of application in the educational process, summarizes the results, makes recommendations for the practical application of the studied material. The article considered the basic concepts of pedagogical technology, as well as some types of non-traditional (innovative) teaching technologies. Also, examples of the use of some elements of innovative technologies in practical educational activities are given. The choice of specific non-traditional pedagogical technologies is determined by the target orientation, content specificity, individualization of training, technical equipment of the educational institution, etc.

Modular Multiplication Algorithm Design for Application of Cryptosystem based on Public Key Structure (공개키 기반의 암호 시스템에 적합한 모듈러 연산기 알고리즘의 효율적인 설계)

  • Kim, Jungl-Tae;Hur, Chang-Woo;Ryu, Kwang-Ryul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.469-472
    • /
    • 2003
  • The computational cost of encryption is a barrier to wider application of a variety of data security protocols. Virtually all research on Elliptic Curve Cryptography(ECC) provides evidence to suggest that ECC can provide a family of encryption algorithms that implementation than do current widely used methods. This efficiency is obtained since ECC allows much shorter key lengths for equivalent levels of security. This paper suggests how improvements in execution of ECC algorithms can be obtained by changing the representation of the elements of the finite field of the ECC algorithm. Specifically, this research compares the time complexity of ECC computation eve. a variety of finite fields with elements expressed in the polynomial basis(PB) and normal basis(NB).

  • PDF