• Title/Summary/Keyword: Security Factor

Search Result 1,100, Processing Time 0.043 seconds

A Study on Employee's Compliance Behavior towards Information Security Policy : A Modified Triandis Model (조직 구성원의 정보보안정책 준수행동에 대한 연구 : 수정된 Triandis 모델의 적용)

  • Kim, Dae-Jin;Hwang, In-Ho;Kim, Jin-Soo
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.209-220
    • /
    • 2016
  • Although organizations are providing information security policy, education and support to guide their employees in security policy compliance, accidents by non-compliance is still a never ending problem to organizations. This study investigates the factors that influence employees' information security policy compliance behavior using elements of Triandis model. We analyzed the relationships among Triandis model's factors using PLS(Partial Least Squares). The result of the hypothesis tests shows that organization can induce individual's information security policy compliance intention and behavior by information security policy and facilitating conditions that support it, and proves the importance of members' expected value, habit and affect about information security compliance. This study is significant in a way that it applies Triandis model in the field of information security, and presents direction for members' information security behavior, and will be able to provide measures to establish organization's information security policy and increase members' compliance behavior.

A Study on Selection Factors of Consulting Company for the Certification of Information Security Management System (정보보호 관리체계(ISMS) 인증을 위한 컨설팅 업체 선정 요인에 관한 연구)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1309-1318
    • /
    • 2014
  • In the past few years, data leakage of information assets has become a prominent social issue. According to the National Industrial Security Center in South Korea, 71 percent who suffer from technology leakage are small and medium sized enterprises. Hence, establishment and operation of ISMS (Information Security Management System) for small and medium sized enterprises become an important issue. Since it is not easy to obtain ISMS certification for a small or medium sized enterprise by itself, consultation with an expert firm in information security is necessary before the security implementation. However, how to select a proper security consulting company for a small or medium sized firm has not been studied yet. In this study, we analyze empirically the selection factors of ISMS certification consulting company for a small or medium sized firm through exploratory factor analysis (EFA). Our study identified the following four important factors in selecting a security consulting company: expertise of the staffs and human resource management proficiency, market leading capability, competence to make progress during the consultation, and the performance and the size of the physical assets and human resources.

Development of Fatigue Scale of Private Security Guards (민간경비원의 피로도 척도개발)

  • Kim, Kyong-Sik;Park, Young-Man
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.175-185
    • /
    • 2014
  • This study is to develop a fatigue scale for the private security guard for a private security guard to effectively manage fatigue were tested for validity and reliability. To achieve that, this study employed purposive sampling to draw 300 samples among private security guards working for the security firms registered in Seoul District Police Office as of 2014, and used 259 samples for final analysis. Fatigue scale was developed on the basis of the scale development methods and procedures in previous studies. For data processing, SPSSWIN 18.0 program was applied to conduct exploratory factor analysis, reliability analysis, and correlation analysis, and AMOS 18.0 program was employed to conduct confirmatory factory analysis. This study came to the following conclusion. First, the validity of the fatigue measurement tool was high. In other words, content validity was high, and construct validity was also high. The factor loading of exploratory factor analysis was .452, and the standard value of confirmatory factor analysis was .403. Therefore, the tool satisfied the basis value of fit index. The sub categories of fatigue, finally drawn from validity test, were mental fatigue, nervous system dysfunction, physical deformity, and exhaustion. Secondly, the reliability of the fatigue measurement tool was high. In other words, according to item analysis, the correlation between items and their sub categories, and between items and total score was more than .602, relatively high. And the reliability coefficient (Cronbach's ${\alpha}$) was high, or more than .658. Fatigue Scale tool will be developed by private security guards in the present study is to measure the validity and reliability verification is clearly tired of the private security guards than the tools that are used in other studies in the existing area.

Study on the Difference of Body Composition, Metabolic Factor, and Blood Components according to Job Form and Stress Level for Security Guard Workers (경호업 종사자의 직무형태와 스트레스 수준에 따른 신체구성, 대사적 변인, 혈액성분의 차이 연구)

  • Kim, Kyong-Tae;Lee, Chang-Han
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.1-14
    • /
    • 2010
  • The purpose of this study was to analyze the difference of body composition, metabolic factor, and blood components according to job forms which are job period and job type and stress level for security guard workers. The conclusion is as follows. 1. There were lower level for the body fat with short term and higher level for the lactate with long term according to the job period. 2. There were lower level for the body fat with the field service and higher level for the lactate and stress with the field service according to the job type. In conclusion, it needs to have a continuous physical activity behavior for the security guard workers to manage for their effective health and to have a rest for the field service workers to decrease their physical and mental stress.

  • PDF

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

A Study on Countermeasures Against Cyber Infringement Considering CPTED

  • Lim, Heon-Wook
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.106-117
    • /
    • 2021
  • The aim is to find cyber measures in consideration of physical CPTED in order to prepare countermeasures for cybercrime prevention. For this, the six applied principles of CPTED were used as the standard. A new control item was created in connection with the control items of ISO27001. A survey was conducted on former and current investigators and security experts. As a result of the reliability analysis, the Kronbar alpha coefficient value was 0.947, indicating the reliability of the statistical value. As a result of factor analysis, it was reduced to six factors. The following are six factors and countermeasures. Nature monitoring blocks opportunities and strengthens business continuity. Access control is based on management system compliance, personnel security. Reinforcement of territoriality is reinforcement of each wife and ethics. Establishment of security policy to enhance readability, security system maintenance. Increasing usability is seeking ways to utilize, periodic incentives. For maintenance, security education is strength and security-related collective cooperation is conducted. The differentiation of this study was to find countermeasures against cybercrime in the psychological part of the past. However, they approached to find in cyber measures. The limitation of the study is to bring the concept of physical CPTED to the cyber concept.

User Authentication Method with Two-Factor Authentication Technology on Smartphone (스마트폰에서 Two-Factor 인증 기술을 활용한 사용자 인증 방식)

  • Park, Junghun;Kim, Kangseok;Choi, Okkyung;Shon, Taeshik;Hong, Manpyo;Yeh, Hongjin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.726-729
    • /
    • 2011
  • 스마트폰의 보급으로 인해 이를 이용한 전자금융거래가 빠르게 확산되고 있다. 대부분의 금융회사가 스마트폰을 이용한 전자금융거래 서비스를 시행하고 있으며, 장소와 시간의 제약이 없는 스마트폰의 특성으로 인해 이용자 수는 계속 증가하고 있다. 그러나, 현재의 스마트폰은 전자금융거래에서 가장 중요하게 처리해야 할 인증 단계에서 보안 취약점을 보유하고 있으며, 이에 대한 보안 대책 기술이 강력하게 마련되지 못하고 있는 실정이다. 따라서 본 연구에서는 기존 연구가 가지고 있는 인증 방식의 취약점을 보안하기 위해 2팩터 인증기술과 인증 이미지 사진의 GPS정보를 활용하여 본인 인증 절차를 강화시키고, 전자금융거래에서 부인방지 기능을 제공한다. 또한, 단계별 시나리오 및 설계 방안을 제시하고 이를 바탕으로 보안 모듈을 설계 및 구현하여 연구의 효율성 및 타당성을 증명해 보이고자 한다.

Zero Trust-Based VPN Authentication Technology Using Multi-Factor Authentication (다중 인증을 이용한 제로 트러스트 기반 VPN 인증 기술)

  • Kwak, Seunghee;Lee, Seungju;Moon, Jeongah;Jeon, Jaeho;Lee, Jaehyuk;Lee, Kyungroul
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.257-258
    • /
    • 2022
  • COVID-19 팬데믹으로 인하여, 재택근무와 같은 비대면 업무환경이 확대됨에 따라, 기업에서는 내부 보안을 위한 VPN 구축 및 사용률이 급격하게 증가하였다. 하지만, 기존의 대면 환경과는 다르게, 비대면 업무환경에서는 자신을 식별할 수 있는 수단을 제한적으로 활용하기 때문에, 사용자의 비밀번호가 노출되면, VPN에 접근하기 위한 사용자 인증이 무력화되는 심각한 문제점이 존재하며, 이러한 보안 취약점을 해결하기 위한 기술이 요구되는 실정이다. 따라서 본 논문에서는 기존 VPN 인증 기술에 내재된 보안 취약점을 해결하기 위하여, 사물 환경 인증, HIP 기술, 위치 인증, 상호 인증 기술을 활용한 다중 인증 기반의 제로 트러스트를 제공하는 VPN 인증 기술을 제안한다. 최종적으로는 본 논문에서 제안하는 기술을 통하여, 보다 안전성이 향상된 VPN을 제공할 것으로 사료된다.

  • PDF

Assessing the Green Total Factor Productivity of Water Use in Mainland China

  • Ning, Meng;Wu, Zheru;Zhou, Zhitian;Yang, Duogui
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.201-206
    • /
    • 2021
  • The significance of high-quality development and green total factor productivity has attracted widespread attention and research, while few studies on green total factor productivity that considers the use of water resources have been conducted in the context of water shortages and water stress. In this study, the green total factor productivity of water use from 2005 to 2015 in mainland China is evaluated based on the global Malmquist-Luenberger productivity index. Results show that: (1) China's green total factor productivity of water use has been improving since 2005 with an annual global Malmquist-Luenberger productivity index of 1.0104. (2) At the regional level, the eastern zone in mainland China owns the highest green total factor productivity of water use, while that in the intermediate zone ranks last. (3) The green total factor productivity of water use in the southern region (1.0113) significantly higher than that in the northern region (1.0095), and also higher than the national average level in the same period. BPC index has been the most important incluencing factor of green total factor productivity of water use at both national level and regional level since 2011.

A STUDY ON THE GROWTH OF PRIVATE SECURITY IN THE UNITED STATES (미국(美國) 민간경비의 성장요인 분석)

  • Lee, Chang-Mu
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.273-289
    • /
    • 2003
  • The purpose of this study is to explore the underlying causes of the development of private security in the United States. These include the increasing crime rates and fear of crime, the poor performance of public policing, the decentralization of political authority, the increase of mass private property, economic growth and increase of personal income, commodification of security, insurance companies' demand for tighter security and fear of litigation, and historical events such as World War I & II. Based on the findings of this study, it is suggested that no single factor would account for the growth of private security in the United States. In other words, the rapid growth of private security in the United States should be attributed to the interrelated influences of the factors given above. Finally, it might be the contribution of this study that the future development of private security in Korea would be guided by understanding the case of the United States because of the similarities of the developmental process in private security industry of two countries.

  • PDF