• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.026 seconds

A Study on Information Security in the Information Society (정보사회에서의 정보보안에 관한 연구)

  • Cho, Chan-Sik
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.34 no.1
    • /
    • pp.155-180
    • /
    • 2000
  • As informatization has been accelerated, the secure information flow has become a major social concern. In that, this paper examines the theoretical background of the information society and the concept of universal service; compares the contrasting perspectives on the social meanings of information; analyzes the definition, importance, and components of information security and suggests some strategies on information security centering around the technical and institutional aspects of it. In so doing, this study aims at establishing the information security and at enhancing our understanding on the information society.

  • PDF

Smart Airport and Next Generation Security Screening Technology (스마트공항과 차세대 보안검색 기술)

  • Hong, J.W.;Oh, J.H.;Lee, H.K.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.2
    • /
    • pp.73-82
    • /
    • 2019
  • Airport is shifted airport 1.0 to airport 4.0 called smart airport and services paradigm is changed into direction to point the customer targeted benefits. Smart airports make use of integrated Internet of Things components to provide added-value services. By integrating smart components, airports are being exposed to a larger attack surface and new attack vectors. Self-services such as web or mobile check-in, self check-in/tagging/back drop/boarding, etc. should be strengthened to make airport processes smarter, and technologies such as automatic immigration, smart security search, and automatic AI-based baggage search should be applied. In this paper, we describe the necessity and importance of smart airports and next generation security screening technology. Further, we describe a walk through-type smart security screening system.

Secure Healthcare Management: Protecting Sensitive Information from Unauthorized Users

  • Ko, Hye-Kyeong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.82-89
    • /
    • 2021
  • Recently, applications are increasing the importance of security for published documents. This paper deals with data-publishing where the publishers must state sensitive information that they need to protect. If a document containing such sensitive information is accidentally posted, users can use common-sense reasoning to infer unauthorized information. In recent studied of peer-to-peer databases, studies on the security of data of various unique groups are conducted. In this paper, we propose a security framework that fundamentally blocks user inference about sensitive information that may be leaked by XML constraints and prevents sensitive information from leaking from general user. The proposed framework protects sensitive information disclosed through encryption technology. Moreover, the proposed framework is query view security without any three types of XML constraints. As a result of the experiment, the proposed framework has mathematically proved a way to prevent leakage of user information through data inference more than the existing method.

A DDoS attack Mitigation in IoT Communications Using Machine Learning

  • Hailye Tekleselase
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.170-178
    • /
    • 2024
  • Through the growth of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have appeared to wireless communication system, especially in cybersecurity. And IoT networks are gradually attractive stages for introduction of DDoS attacks due to integral frailer security and resource-constrained nature of IoT devices. This paper emphases on detecting DDoS attack in wireless networks by categorizing inward network packets on the transport layer as either "abnormal" or "normal" using the integration of machine learning algorithms knowledge-based system. In this paper, deep learning algorithms and CNN were autonomously trained for mitigating DDoS attacks. This paper lays importance on misuse based DDOS attacks which comprise TCP SYN-Flood and ICMP flood. The researcher uses CICIDS2017 and NSL-KDD dataset in training and testing the algorithms (model) while the experimentation phase. accuracy score is used to measure the classification performance of the four algorithms. the results display that the 99.93 performance is recorded.

A Study on Factors Affecting the Level of Information Security Governance in Korea Government Institutions and Agencies (공공기관 정보보호 거버넌스 수준에 영향을 미치는 요인에 관한 연구)

  • Song, Jeong-Seok;Jeon, Min-Jun;Choi, Myeong-Gil
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.1
    • /
    • pp.133-151
    • /
    • 2011
  • To solidate information security, Korea government introduces information security governance. The public institutions and agencies in korea have begun to recognize the importance of information security governance. For solidating information security governance, the government has tried to establish and solidate an information security policy and information security systems. This study suggests factors affecting the level of information security governance in the public agencies and institutions through the factor analysis and the linear regression analysis. The results of this study show that the CEO's support is able to elevate the level of information security governance. The level of information security governance has relation with the number of the staff in information departments, and the budget in the public agencies and the institutions. This study provides directions for the public agencies and the institution for elevating the levels of information security governance.

A Study on Priority of Certification Criteria for IoT Security Certification Service (IoT 보안인증서비스 인증기준 중요도 우선순위에 관한 연구)

  • Kang, Da-Yeon;Hwang, Jong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.13-21
    • /
    • 2019
  • Because security of Internet of Things(IoT) products and others is poor, there are many hacking incidents To prevent security threats, it is important for companies to first make products with high security levels and choose products that are safe for users. In response, the Korea Internet & Security Agency is testing the security of IoT products and linked mobile apps to impose ratings. Security certification service is a service that tests IoT products and linked mobile apps to ensure certain levels of security and issues certificates when they meet the criteria. It can induce autonomous security enhancement of IoT products, contribute to strengthening security capabilities of IoT companies in Korea and vitalizing their overseas advancement, and have the expected effect of resolving public anxiety over IoT products. In this study, the criteria for IoT security certification are presented, but the importance priority is sought to be derived for assessment items that need to be strengthened. This will help to provide guidelines that can contribute to strengthening the security capabilities of domestic Internet companies and boosting their overseas advancement.

A Study on Analysis of Security Functional Requirements for Virtualization Products through Comparison with Foreign Countries' Cases (해외 사례 비교를 통한 가상화 제품의 보안기능 요구사항 분석에 관한 연구)

  • Lee, Ji-Yeon
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.221-228
    • /
    • 2019
  • The importance of security for virtualization products has been increased with the activation policy of cloud computing and it is necessary to analyze cyber security threats and develop security requirements for virtualization products to provide with more secure cloud environments. This paper is a preliminary study with the purpose of developing security functional requirements through analyzing security features and cyber security threats as well as comparison of foreign countries' cases for virtualization products. To do this, the paper compares evaluation schemes for virtualization products in US and UK foreign countries, and analyzes the cyber security threats, security objectives and security requirements in both countries. Furthermore, it proposes the essential checking items and processes for developing security functional requirements about security features of virtualization products to contribute to its more secure development and the establishment of related security evaluation standards.

Analysis of Research Trends in Cloud Security Using Topic Modeling and Time-Series Analysis: Focusing on NTIS Projects (토픽모델링과 시계열 분석을 활용한 클라우드 보안 분야 연구 동향 분석 : NTIS 과제를 중심으로)

  • Sun Young Yun;Nam Wook Cho
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.31-38
    • /
    • 2024
  • Recent expansion in cloud service usage has heightened the importance of cloud security. The purpose of this study is to analyze current research trends in the field of cloud security and to derive implications. To this end, R&D project data provided by the National Science and Technology Knowledge Information Service (NTIS) from 2010 to 2023 was utilized to analyze trends in cloud security research. Fifteen core topics in cloud security research were identified using LDA topic modeling and ARIMA time series analysis. Key areas identified in the research include AI-powered security technologies, privacy and data security, and solving security issues in IoT environments. This highlights the need for research to address security threats that may arise due to the proliferation of cloud technologies and the digital transformation of infrastructure. Based on the derived topics, the field of cloud security was divided into four categories to define a technology reference model, which was improved through expert interviews. This study is expected to guide the future direction of cloud security development and provide important guidelines for future research and investment in academia and industry.

Relationship between Organizational Culture and Job Characteristic and Job Continuance among Private Security Guards (민간경비원의 조직문화와 직무특성 및 직무지속의지의 관계)

  • Lee, Jong-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.1
    • /
    • pp.444-454
    • /
    • 2014
  • The purpose of this study is compares organizational culture and job characteristic and job continuance will of private security searches its investigate relation. This study had selected private security company members from Seoul of 2011 for population. Using purposive sampling method, 280 samples were drawn and were used for the final analysis. Using SPSS WIN 18.0, frequency analysis, factor analysis, reliability analysis, multiple regression analysis were performed. Cronbach's ${\alpha}$ value which shows the reliability of the survey came out to be over .665. The conclusion is following : First, organizational culture of private security service affects in job characteristic. As a work period is long, the job importance and feedback appear high. As development mutual agreement culture is formed, the job importance, autonomy is high. As reasonable culture is formed, the job importance, autonomy, feedback are high. As a hierarchical culture is formed, the job importance, feedback rises, and on the other hand, autonomy decreases. Second, organization culture affects in job continuance will to private security guard. Job expectation is high in man group. As age is high, crisis sense decreases. As attainments in scholarship is high, job satisfaction, shrinkage, alternative expectation increase. As there are much monthly income, job satisfaction, shrinkage, job expectation, alternative expectation, crisis sense become increase. As development mutual agreement culture is formed, job satisfaction, malicious insincerity, job expectation, alternative expectation, crisis sense are high. As reasonable culture is formed, job expectation increases, and on the other hand, malicious insincerity decreases. As a hierarchical culture is formed, job satisfaction, malicious insincerity, job expectation, crisis sense appear high. Third, private security guard job characteristic affects in job continuance will. As attainments in scholarship is high, job satisfaction, job expectation, alternative expectation increase. As a work period is long, job satisfaction, job expectation, alternative expectation, crisis sense appear decreases. As there are much monthly income, job satisfaction, job expectation, alternative expectation, crisis sense increase. Job satisfaction, job expectation increases as recognize the job importance high. Job satisfaction, shrinkage, malicious insincerity, job expectation, alternative expectation increase as recognize autonomy high. If feedback is proceeded well, malicious insincerity decreases.

The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance (정보보호 아키텍처 구성과 보안활동이 정보자산보호 및 조직성과에 미치는 영향)

  • Jeong, Gu-Heon;Yi, Dong-Wook;Jeong, Seung-Ryul
    • The KIPS Transactions:PartD
    • /
    • v.17D no.3
    • /
    • pp.223-232
    • /
    • 2010
  • This study was carried out for the purpose of inquiring into the effect of composition and security activities for information security architecture on information asset protection and organizational performance in terms of general information security. This study made a survey on 300 workers in the government, public institutions and private companies, which it showed that management factors of risk identification and risk analysis, in general, have an usefulness to composition and security activities for information security architecture to prevent inside information leakage. And the understanding and training factors of IT architecture and its component were rejected, requiring the limited composition and security activities for information security architecture. In other words, from the reality, which most institutions and organizations are introducing and operating the information security architecture, and restrictively carrying out the training in this, the training for a new understanding of architecture and its component as an independent variable made so much importance, or it did not greatly contribute to the control or management activities for information security as the generalized process, but strict security activities through the generalization of risk identification and risk analysis management had a so much big effect on the significant organizational performance.