• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.029 seconds

Gifted Students' Viewpoints on Using Educational Technology in their Schools in the Saudi Context

  • Alammari, Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.245-249
    • /
    • 2022
  • This paper explored gifted students' perspectives on using educational technologies in their schools in the Saudi context. Adopting a descriptive research approach, a questionnaire was used to collect information from a sample of 196 gifted secondary school students in Jeddah. Findings showed that educational technology was used to a high degree, with an overall mean of 3.74 and 4.06 for the degree of importance of technological usage. Based on the findings, the researcher forwards some recommendations for effectively using such technologies to promote gifted students' abilities and talents.

Didactic Games and Gamification in Education

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.417-419
    • /
    • 2022
  • This paper undertakes educational games and gamification, their features, importance, and integration into the educational process. Besides outlining features, benefits, and difficulties, it highlights the difference between gaming, gamification, and game-based learning. The article contends that game-based learning and gamification elements such as reward, completion, and cooperation develop students' positive attitudes toward the curriculum and boost their learning motivation.

Towards a Next Generation of Data Capture Architecture of Honeynets

  • Yong-Kyung Oh;Inhyuk Kim;Young Ik Eom
    • Annual Conference of KIPS
    • /
    • 2008.11a
    • /
    • pp.1469-1472
    • /
    • 2008
  • Honeynets have become one of essential tools in system and network security. As the importance of security has increased over the years, many researchers try to improve the overall Honeynet architecture. Due to their efforts, the Honeynets have evolved up to the third generation. However, the GenIII architecture has some limitations. In this paper, we address some of the limitations and provide solutions by redesigning the framework of data capture of Honeynets.

The Improvement Measures for the Establishment of Emergency Management System in Private Security (위험사회의 전개에 따른 민간경비 산업의 대응과제 - 위기관리를 중심으로)

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.103-125
    • /
    • 2005
  • Hazard are defined here as threat to life, well-being, material goods and environmental from the extremes of natural processes or technology. The challenges of natural and technology in increasing the exposure of people and property to risk pose a dilemma for any government seeking the fullest protection for its people and their property. As society progresses and as technology improves and becomes ever more intricate and far reaching, the human species is confronted with increasingly diverse and numerous catastrophic events. Not so infrequently, unfortunately, the impact of either a man-made or natural disaster is compounded by the fact that policy makers have neither prepared themselves or the public to respond appropriately to a disaster once the tragedy has struck. Many concerns have been raised for importance of emergency management after 1990's numerous urban disasters in Korea. Emergency management is the discipline and profession of applying science, technology, planning, and management to deal with extreme events that can injure or kill large numbers of people, cause extensive damage to property, and disrupt community life. When the primary function of private security is to protect lives and property of clients, emergency management should be included in the security service and many countermeasures should be carried out for that purpose. The purpose of this study is to establish ways and means needed to improve the private security emergency management system in Korea. This study is spilt into four chapters. Chapter I is the introduction part. Chapter II introduces the reader to a private security and emergency management theory, and Chapter III deals with the establishment of an effective emergency management system in Korea private security, Chapter IV is a conclusion. Policy makers and private security industry employers in Korea has not concerned with the importance of training and education by lack of recognition and has been passive about qualified guards. And the authorities supervising and the administrating the guards has not recognized the importance of private security and has neglected the training of the guards. In theses contexts, private security should develop and maintain a educational program of emergency management to meet their responsibilities to provide the protection and safety of the clients. Today's modern corporate security director, is, first of all, a competent, well-rounded business executive and, second, a 'service expert'. And, emergency management personnel in private security industry need continuous training.

  • PDF

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.

PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-Based Systems

  • Lee, Jong-Hyouk;Sohn, Seon-Gyoung;Chang, Beom-Hwan;Chung, Tai-Myoung
    • ETRI Journal
    • /
    • v.31 no.5
    • /
    • pp.554-564
    • /
    • 2009
  • In information security and network management, attacks based on vulnerabilities have grown in importance. Malicious attackers break into hosts using a variety of techniques. The most common method is to exploit known vulnerabilities. Although patches have long been available for vulnerabilities, system administrators have generally been reluctant to patch their hosts immediately because they perceive the patches to be annoying and complex. To solve these problems, we propose a security vulnerability evaluation and patch framework called PKG-VUL, which evaluates the software installed on hosts to decide whether the hosts are vulnerable and then applies patches to vulnerable hosts. All these operations are accomplished by the widely used simple network management protocol (SNMP). Therefore, system administrators can easily manage their vulnerable hosts through PKG-VUL included in the SNMP-based network management systems as a module. The evaluation results demonstrate the applicability of PKG-VUL and its performance in terms of devised criteria.

Implementation of IPSec Cryptographic Processor Based AMBA Architecture (AMBA(Advanced Microcontroller Bus Architecture) 기반의 IPSec 암호 프로세서의 구현)

  • Hwang, Jae-Jin;Choi, Myung-Ryul
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.123-125
    • /
    • 2004
  • The importance for Internet security has being increased and the Internet Protocol Security (IPSec) standard, which incorporates cryptographic algorithms, has been developed as one solution to this problem. IPSec provides security services in IP-Layer using IP Authentication Header (AH) and IP Encapsulation Security Payload (ESP). In this paper, we propose IPSec cryptographic processor design based AMBA architecture. Our design which is comprised Rijndael cryptographic algorithm and HAMC-SHA-1 authentication algorithm supports the cryptographic requirements of IP AH, IP ESP, and any combination of these two protocols. Also, our IPSec cryptographic processor operates as AMBA AHB Slave. We designed IPSec cryptographic processor using Xilinx ISE 5.2i and VHDL, and implemented our design using Xilinx's FPGA Vertex XCV600E.

  • PDF

An Exploratory Study on the Core Technology of the Fourth Industrial Revolution and Information Security Organization: Focusing on Firm Performance (4차산업혁명 핵심기술 도입 및 정보보호조직에 관한 탐색적 연구: 성과측면에서의 비교분석)

  • Kim, Kihyun;Cho, Hyejin;Lim, Sohee
    • Knowledge Management Research
    • /
    • v.21 no.1
    • /
    • pp.41-59
    • /
    • 2020
  • This explorative study examines the difference in firm performance according to the adoption of the core technology of the Fourth industrial revolution, including artificial intelligence(AI), internet of things (IoT), cloud computing, and big data technology. Additionally, we investigate the importance of internal organizational structure exclusively responsible for information security. We analyze unique microdata offered by the Korea Information Society Development Institute to examine the impact of the adoption of the new technologies and the existence of organizational structure for information protection on firm performance, i.e., firm sales. By considering the core information technology as powerful knowledge assets, we argue that the adoption of such technology leads firms to have comparative advantage comparing to the competitors. Also, we emphasize the need to consider the organizational structure suitable for information security, which can become a structural asset of a firm.

A Study on The Managing Practices in SLM for Multimedia System (멀티미디어 시스템 정보보호수준관리를 위한 관리형 프랙티스에 관한 연구)

  • Kim, Tai-Hoon;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.673-680
    • /
    • 2008
  • Multimedia system security can be categorized into groups such as protection of multimedia asset itself and protection of multimedia systems which can process multimedia asset. Divided consideration for these two factors will not hurt the importance of security management. In this paper, managing practices for keeping security level of multimedia systems are induced and categorized.

  • PDF

A Study on the Security Technology of the Location based Tourism Information Service (위치 기반 관광 정보 서비스 보안 기술 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.2
    • /
    • pp.25-29
    • /
    • 2016
  • Owing to the change of economic trends, the importance of the tourism industry is growing more and more. In particular, the number of foreign tourists continues to increase and the type of tourists is being changed into FIT (Foreign Independent Traveler). Therefore it is an important issue to provide the effective information to foreign tourists. To solve these problems, a variety of IT technology is being used in the tourism information systems. Especially the location based tour information service is being emerged. This kinds of tourism information service is a type of LBS (Location Based Services). But if the security of the location based tourism information service is not guaranteed, it can lead to many dangers. In this paper, the trends of location based tourism information service are surveyed. Also the security threats and countermeasures for the location based tourism information service are analyzed. This paper suggests secret considerations for the location based tourism information service.