• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.024 seconds

Exploration of Border Security Systems of the ROK Army Using ABMS and GA Algorithm (ABMS와 유전학적 알고리즘을 이용한 한국군 경계시스템에 관한 연구)

  • Oh, Kyungtack;Lee, Jae-Yeong
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.2
    • /
    • pp.33-40
    • /
    • 2013
  • This paper explores a border security system based on agent-based modeling and simulation (ABMS). The ABMS software platform, map aware non-uniform automata, is used to model various scenarios and evaluate the border security system given a set of infiltrators who have evolutionary behavior governed by genetic algorithm (GA). we formulated an optimization model and approximately solved it using a GA in order to capture near optimal behavior of an infiltrating force. The results presented give two significant insights for our border security system in that optimizing the infiltrator's behavior can make a significant difference and the quantitative results regarding the infiltrator's avoidance of each asset can be viewed as capturing their relative importance.

Encryption-based Image Steganography Technique for Secure Medical Image Transmission During the COVID-19 Pandemic

  • Alkhliwi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.83-93
    • /
    • 2021
  • COVID-19 poses a major risk to global health, highlighting the importance of faster and proper diagnosis. To handle the rise in the number of patients and eliminate redundant tests, healthcare information exchange and medical data are transmitted between healthcare centres. Medical data sharing helps speed up patient treatment; consequently, exchanging healthcare data is the requirement of the present era. Since healthcare professionals share data through the internet, security remains a critical challenge, which needs to be addressed. During the COVID-19 pandemic, computed tomography (CT) and X-ray images play a vital part in the diagnosis process, constituting information that needs to be shared among hospitals. Encryption and image steganography techniques can be employed to achieve secure data transmission of COVID-19 images. This study presents a new encryption with the image steganography model for secure data transmission (EIS-SDT) for COVID-19 diagnosis. The EIS-SDT model uses a multilevel discrete wavelet transform for image decomposition and Manta Ray Foraging Optimization algorithm for optimal pixel selection. The EIS-SDT method uses a double logistic chaotic map (DLCM) is employed for secret image encryption. The application of the DLCM-based encryption procedure provides an additional level of security to the image steganography technique. An extensive simulation results analysis ensures the effective performance of the EIS-SDT model and the results are investigated under several evaluation parameters. The outcome indicates that the EIS-SDT model has outperformed the existing methods considerably.

Modeling cryptographic algorithms validation and developing block ciphers with electronic code book for a control system at nuclear power plants

  • JunYoung Son;Taewoo Tak;Hahm Inhye
    • Nuclear Engineering and Technology
    • /
    • v.55 no.1
    • /
    • pp.25-36
    • /
    • 2023
  • Nuclear power plants have recognized the importance of nuclear cybersecurity. Based on regulatory guidelines and security-related standards issued by regulatory agencies around the world including IAEA, NRC, and KINAC, nuclear operating organizations and related systems manufacturing organizations, design companies, and regulatory agencies are considering methods to prepare for nuclear cybersecurity. Cryptographic algorithms have to be developed and applied in order to meet nuclear cybersecurity requirements. This paper presents methodologies for validating cryptographic algorithms that should be continuously applied at the critical control system of I&C in NPPs. Through the proposed schemes, validation programs are developed in the PLC, which is a critical system of a NPP's I&C, and the validation program is verified through simulation results. Since the development of a cryptographic algorithm validation program for critical digital systems of NPPs has not been carried out, the methodologies proposed in this paper could provide guidelines for Cryptographic Module Validation Modeling for Control Systems in NPPs. In particular, among several CMVP, specific testing techniques for ECB mode-based block ciphers are introduced with program codes and validation models.

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak;Bobby Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.190-194
    • /
    • 2023
  • By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

Understanding User's Continuous Use of Financial Technology Products

  • Wanchao Liu;Huosong Xia;Jian Mou
    • Asia pacific journal of information systems
    • /
    • v.31 no.2
    • /
    • pp.236-256
    • /
    • 2021
  • Online financial technology products are an important consumer finance innovation. While a large body of previous research has focused on initial adoption and consumer willingness to use these products, little research explores the continued use of these products beyond the initial adoption phase. In particular, special attention should be paid to how users' trust and perceptions of privacy and security affect continued use behavior. This paper integrates the expectation confirmation model of information system continuance (ECM-ISC), the information system success model (ISSM) and the security and trust literatures to investigate continued use of online financial technology. To test the research model, we collected 398 valid questionnaires from Ant Credit Pay users. The research results show that system and service quality positively impact users' expectation confirmation, while information quality has no significant impact. Expectation confirmation and perceived usefulness positively affect user satisfaction. Moreover, the user's perception of privacy and security plays a vital role in user satisfaction. Satisfaction and perceived trust jointly promote users' continuance behaviors. Findings of this study indicates the importance of the information system success factors and security factors due to their influence on the continued use of Fintech products. This conclusion has implications for enterprises in improving the product qualities and enhancing the degree of security to meet user needs.

A Measure for Service Quality of University Dormitory and Importance - Performance Analysis (대학 기숙사의 서비스품질 측정 및 중요도-성과분석)

  • Riew, Moon-Charn
    • Journal of Korean Society for Quality Management
    • /
    • v.37 no.1
    • /
    • pp.56-68
    • /
    • 2009
  • A measure for service quality of university dormitory is developed to gain a better understanding of the quality issues that impact on students' experiences and to improve service quality. Literature survey, thorough discussion with staff members and a pilot test are utilized to elicit attributes of service quality. Factor analysis is used to group the service quality attributes into dimensions. The resulting measure is consisted of 6 dimensions; competence, attitude, facility, amenity, security and discipline. Importance-performance analysis is utilized to verify which factors to be focused on with high Priority to improve dormitory service.

A Study on the Improvement of Estimation Method of an Appraisal Standard to Select of the Subject in VE. (VE 대상선정을 위한 평가기준 중요도 산정방법 개선에 관한 연구)

  • Kwon Byoung Suk;Lee Dong Jun;Chun Jae Youl
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.291-294
    • /
    • 2001
  • This study has established an appraisal standard to select VE subject when they evaluate of design VE by using of a qualify model in an early design step and has suggested an improvement method for importance's estimation method of an appraisal standard. An importance's estimation method is to arrangement of geometric average method using an AHP method to this study, When an evaluation of a quality model, we estimate an importance by establishing of an appraisal standard of economics, construction, security, environmental influence, maintenance, etc.

  • PDF

A Study on Curriculum Design for Educating Digital Forensic Experts (포렌식 전문가의 양성을 위한 교과과정 설계에 관한 연구)

  • Myeonggil Choi
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.6
    • /
    • pp.113-142
    • /
    • 2023
  • As society becomes more digital, the need for digital forensics experts are gradually increasing. It is necessary to establish a training policy that reflects the special characteristics of digital forensics personnel. Although there are fragmented policies for digital forensics-related systems and human resources training in academia, it is an urgently necessary to establish a systematic and long-term policy to foster digital forensics experts. This study suggests curriculum of digital forensic based on the importance ranking among forensic subjects. The importance ranking can be decided by forensic experts. This study can be used as policy data to foster diverse talent that can effectively meet the increasing demand for digital forensics talent. The systematic curriculum proposed in this study is a practical curriculum at the undergraduate level and can be suitable for university level

Study on Selection Methodology of Applicable Prospective Civil Information Security Technologies in Defense Cyberwarfare Sector (국방 사이버전 분야에 적용 가능한 유망 민간 정보보호 기술 선정 방법론에 대한 고찰)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1571-1582
    • /
    • 2015
  • This paper suggests a methodology for linking technology classification of nongovernmental information security field and technology classification of cyber-warfare in national defense field. Based on this methodology, Multi-Attribute Utility Theory(MAUT) is applied for the purpose of selecting promising nongovernmental technology that is worthy of later introduction or development. After studying the result of the survey regarding the research progression plan of the selected promising technology, the following three facts are discovered: Firstly, the greater the social spillover effect, the greater the need for the government lead R&D. Secondly, among the spillover effects, the social aspect has the highest correlation with respect to the need for the government lead R&D, while the economical aspect and the technological aspect come in the second and the third place, respectively. Finally, according to the correlation analysis, the defense application and the technological importance do not affect the subject of investment or the subject of development. This indicates that even though the R&D for technology with high social spillover effect should be lead by the government, the subject of the investment or the development cannot be determined solely by factors such as military application and technological importance.

Effect on the Job Satisfaction Influenced by Social Capital of Private Security Industry Employees - Focuing on the Role of Mediation for Job Characteristics - (민간경비업체 종사자의 사회자본이 직무만족에 미치는 영향 - 직무특성의 매개효과를 중심으로 -)

  • Oh, Tae-Kon
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.165-195
    • /
    • 2013
  • Today, the importance of social capital is emphasized in modern industry as the third capital. Social capital involves "trust and norms for members" and "social network" related to effective human resource management, which is being investigated actively by many researchers. However, It is difficult to see the report on the social capital of private security industry employees. So, this report suggests effective management practices of employees through the empirical analysis on the relationship between social capital and job satisfaction with a focus on the role of mediation for job characteristics. For the most, this research through analysis on relationship between social capital and job satisfaction shows that of the components of social capital, trust and networks influence effect on job satisfaction significantly. Secondly, as result of analysis on role of mediation for job satisfaction, importance of job involved in job characteristics has an effect of mediation. This result of empirical analysis menas that the pressure of private security industry employees is reduced and cooperation which is based on social capital is need through members' trust and social network. Therefore, the strategy of management about private security industry employees should be considered for both activation of social capital and maintenance.

  • PDF