• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.024 seconds

A Case Study on the Cost-Effectiveness Analysis for the Feasibility Study of Public Project Related to Personal Information Protection (개인정보보호 관련 공공사업의 타당성 조사를 위한 비용효과분석 사례 연구)

  • Jo, Illhyung;Kim, Jin;Yoo, Jinho
    • Knowledge Management Research
    • /
    • v.20 no.3
    • /
    • pp.91-106
    • /
    • 2019
  • In the era of the 4th Industrial Revolution, the importance of information protection is increasing day by day with the advent of the 'hyper-connection society', and related government financial investment is also increasing. The source of the government's fiscal investment projects is taxpayers' money. Therefore, the government needs to evaluate the effectiveness and feasibility of the project by comparing the public benefits created by the financial investment projects with the costs required for it. At present, preliminary feasibility study system which evaluates the feasibility of government financial investment projects in Korea has been implemented since 1994, but most of them have been actively carried out only in some fields such as large SOC projects. In this study, we discuss the feasibility evaluation of public projects for the purpose of information security. we introduce the case study of the personal information protection program of Korean public institutions and propose a cost-effectiveness analysis method that can be applied to the feasibility study of the information protection field. Finally, we presented the feasibility study and criteria applicable in the field of information security.

A case study on the performance of encrypted data (데이터 암호화에 따른 성능 실증 사례 연구)

  • Hong, Jung Hwa;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1301-1313
    • /
    • 2012
  • The importance of protecting personal information is increasing day by day due to invasion of privacy, and data encryption is the most effective way to eliminate it. However, current data encryption methods tend to having problems for applying in practical fields because of critical issues such as low performances and frequent changes of applications. In order to find proper solutions for data security, this paper reviews data encryption technologies and experiments on performance of encrypted data in Oracle Database. On top of that, this paper analyses a data encryption technique not only efficiency of performance but also minimization of application changes.

Study on Machine Learning Techniques for Malware Classification and Detection

  • Moon, Jaewoong;Kim, Subin;Song, Jaeseung;Kim, Kyungshin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4308-4325
    • /
    • 2021
  • The importance and necessity of artificial intelligence, particularly machine learning, has recently been emphasized. In fact, artificial intelligence, such as intelligent surveillance cameras and other security systems, is used to solve various problems or provide convenience, providing solutions to problems that humans traditionally had to manually deal with one at a time. Among them, information security is one of the domains where the use of artificial intelligence is especially needed because the frequency of occurrence and processing capacity of dangerous codes exceeds the capabilities of humans. Therefore, this study intends to examine the definition of artificial intelligence and machine learning, its execution method, process, learning algorithm, and cases of utilization in various domains, particularly the cases and contents of artificial intelligence technology used in the field of information security. Based on this, this study proposes a method to apply machine learning technology to the method of classifying and detecting malware that has rapidly increased in recent years. The proposed methodology converts software programs containing malicious codes into images and creates training data suitable for machine learning by preparing data and augmenting the dataset. The model trained using the images created in this manner is expected to be effective in classifying and detecting malware.

The Belt and Road Initiative in Lebanon: A Promising Initiative in a Complex Society

  • AL SHAHER, Shaher;ZREIK, Mohamad
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.2
    • /
    • pp.151-158
    • /
    • 2022
  • The study aims to investigate Lebanese-Chinese relations within the framework of the Belt and Road Initiative. Lebanon formally joined the effort in 2017; this paper emphasizes Lebanon's geostrategic importance. The paper presents an assessment of the investment risks in Lebanon, which is considered an economically unstable country with a volatile security situation, with many internal and external political hurdles. The paper refers to the obstacles and challenges that the Chinese investor may face in Lebanese society. The study employs qualitative descriptive analysis to address the status of Chinese investment in Lebanon and the consequences of this partnership; the paper examines previous research related to the Belt and Road Initiative and the Lebanese political, security, and economic situation literature. Due to the deteriorating security situation, external intervention, and the economic crisis, the results reveal that Lebanon is not a top investment priority for China, which is a big impediment to China entering into economic cooperation with Lebanon. The findings of this study suggest that the Lebanese government should adopt an anti-corruption policy to build confidence for the Chinese investor, reduce unnecessary public spending, and hold a national dialogue to build confidence among the Lebanese parties.

Commercial ECU-Based Test-Bed for LIN-CAN Co-Analysis and Proof on Ultrasonic Sensors through Physical Error Injection (실차기반 LIN-CAN 연계 통합 분석 테스트베드 개발과 초음파센서 물리적 오류주입 및 분석을 통한 효용성 검증)

  • Yoon-ji Kim;Ye-ji Koh;In-su Oh;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.325-336
    • /
    • 2023
  • With the development of autonomous driving technology, the number of external contact sensors mounted on vehicles is increasing, and the importance is also rising. The vehicular ultrasonic sensor uses the LIN protocol in the form of a bus topology and reports a status message about its surroundings through the vehicle's internal network. Since ultrasonic sensors are vulnerable to various threats due to poor security protocols, physical testing on actual vehicle is needed. Therefore, this paper developed a LIN-CAN co-analysis testbed with a jig for location-specific distance test to examine the operational relation between LIN and CAN caused by ultrasonic sensors.

The Impacts on SLOC Security to Korea's National Economy (해양교통로의 안전 확보가 국가경제 발전에 미치는 영향)

  • Lee, Choon-Kun
    • Strategy21
    • /
    • s.30
    • /
    • pp.31-62
    • /
    • 2012
  • It is a commons sense that the Republic of Korea is a maritime state that depends its survival on International Trade and International Economy. Korea was a peninsula and do it can be both maritime and continental state by its choice. However, after the national division in 1945, South Korea had became a virtual island and pursue a maritime way for national development in the past 60 plus years. Now, South Korea is becoming a world's 12 th largest major trading and maritime state. South Korea has far more ships per capita than any other nations in the world and its economy is heavily depend upon the imports and exports with other nations in the world that pass through the oceans. Therefore, the Koreans regard the security of the sea lanes of communication as vital to the survival of the nation. The SLOC is the life line for Republic of Korea. Since the early 1990s, immediately after the Cold War was over, South Koreans began to recognize the importance of Sea Routes and thus began to build a navy that can handle with the new problems of the post Cold War era. However, the maritime security environments of the Republic of Korea today is shaky and dangerous. Almost every water near the Korean peninsula, some kind of international confrontations are going on. Territorial disputes on Dok do, Senkaku, Scarbrough, Shisha, Nansha and Eodo between and among Korea, Japan, China, Taiwan, Phillipines, Indonesia and Vietnam are the examples. In this essay, the author argues that the S. Korean efforts and capabilities to deal with these challenges are not enough and exhorts more efforts and more powerful navy for the Korean people.

  • PDF

Experimental analysis of blast loading effects on security check-post

  • Muhammed Rizvan Akram;Ali Yesilyurt
    • Structural Engineering and Mechanics
    • /
    • v.87 no.3
    • /
    • pp.273-282
    • /
    • 2023
  • Concrete construction, one of the oldest building practices, is commonly used in all parts of the world. Concrete is the primary building material for both residential and commercial constructions. The challenge of protecting the buildings, hence nation, against the attack of terrorism has raised the importance to explore the understanding of building materials against the explosion. In this research, a security check-post (reinforced concrete frame filled with plain cement concrete) has been chosen to study the behavior of structural elements under blast loading. Eight nitroglycerines-based dynamite blasts with varying amounts of explosive charge, up to 17 kg weight has been carried out at various scale distances. Pressure and acceleration time history records are measured using blast measuring instruments. Security check post after being exposed by explosive loading are photographed to view cracking/failure patterns on the structural elements. It is noted that with the increase of quantity of explosive, the dimensions of spalling and crack patterns increase on the front panels. Simple empirical analyses are conducted using ConWep and other design manuals such as UFC 3-340-02 (2008) and AASTP-1 (2010) for the purpose of comparison of blast parameters with the experimental records. The results of experimental workings are also compared with earlier researchers to check the compatibility of developed equations. It is believed that the current study presents the simple and preliminary procedure for calculating the air blast and ground shock parameters on the structures exposed to blast explosion.

A Hybrid Blockchain-Based Approach for Secure and Efficient IoT Identity Management

  • Abdulaleem Ali Almazroi;Nouf Atiahallah Alghanmi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.11-25
    • /
    • 2024
  • The proliferation of IoT devices has presented an unprecedented challenge in managing device identities securely and efficiently. In this paper, we introduce an innovative Hybrid Blockchain-Based Approach for IoT Identity Management that prioritizes both security and efficiency. Our hybrid solution, strategically combines the advantages of direct and indirect connections, yielding exceptional performance. This approach delivers reduced latency, optimized network utilization, and energy efficiency by leveraging local cluster interactions for routine tasks while resorting to indirect blockchain connections for critical processes. This paper presents a comprehensive solution to the complex challenges associated with IoT identity management. Our Hybrid Blockchain-Based Approach sets a new benchmark for secure and efficient identity management within IoT ecosystems, arising from the synergy between direct and indirect connections. This serves as a foundational framework for future endeavors, including optimization strategies, scalability enhancements, and the integration of advanced encryption methodologies. In conclusion, this paper underscores the importance of tailored strategies in shaping the future of IoT identity management through innovative blockchain integration.

Implementation of the Intelligent MUX System for Green USN (녹색 유비쿼터스 지능형 다중화장비의 구현)

  • Kang, Jeong-Jin;Chang, Hark-Sin;Lee, Young-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • Recently emphasizing the importance of security such as national major institutions' facilities or major industrial facilities for the maintenance of security/crime prevention due to specialization of the Green Information Technology(G-IT) and Green Ubiquitous Technology(G-UT) industry fields, The Security System Building linked high technology within the government-related organization, enterprise and army the military is urgently required. This paper is about the green USN intelligent an unmanned guard MUX system that receive the signals, from alarm device within surveillance area, with various ways of communication techniques and then transmit to local control center and remote control server trough TCP/IP network. This study enables the mutual senergy effect by realizing a total solution of an unmanned guard system and also significantly contributes to the global/domestic market expansion. That can be applied to the crime prevention/security fields in the Green Ubiquitous Environment Implemented Business(survalance-Home, Gu-City, Gu-Health, etc.), and will contribute to expand companies with international competitiveness that can provide the Green Ubiquitous Vision(Gu-Vision).

Study on Disaster Recovery Efficiency of Terminal PC in Financial Company (금융회사 단말PC 재해복구 효율에 관한 연구)

  • Yi, Seung-Chul;Yoon, Joon-Seob;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.211-224
    • /
    • 2015
  • Financial companies have invested a lot in their disaster recovery system and exercised training more than once a year to comply related laws and regulations. But massive PCs(Personal Computers) became disrupted simultaneously and it took a lot of time to recover massive PCs concurrently when March 20 cyber attack occurred. So, it was impossible to meet the tartgeted business continuity level. It was because the importance of PC recovery was neglected compared to other disaster recovery areas. This study suggests the measure to recover massive branch terminal PCs of financial companies simultaneously in cost-effective way utilizing the existing technology and tests recovery time. It means that in the event of disaster financial companies could recover branch terminal PCs in 3 hours which is recommended recovery time by regulatory body. Other financial companies operating similar type and volume of branches would refer to the recovery structure and method proposed by this study.