• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.025 seconds

The Importance of International Transport and Logistics Infrastructure in the Economic Development of the Country: The Case of the EU for Ukraine

  • Atamanenko, Yuliia;Komchatnykh, Olena;Larysa, Sukhomlyn;Viacheslav, Didkivskyi;Sulym, Borys;Losheniuk, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.198-205
    • /
    • 2021
  • For twenty years, in the EU there has been a trend of a lack of maritime infrastructure and a redundance of the road one, which has a negative impact on the economy. The intermodal transport market structure in the EU has not changed over the past ten years. The stability of transport systems due to the lack of changes in the transport market remains under threat, affecting supply chains and networks through the optimization of warehousing and transportation costs. The research methodology is based on a quantitative assessment of cause-and-effect relations between economic growth and transport and logistics in the EU. A statistical analysis of security indicators, intermodal and modal transport, international trade in goods within the EU and in the world trade in goods, the dynamics of GDP of the EU countries, the level of openness of the EU economy, investment and maintenance costs of different modes of transport and infrastructure has been carried out. The results show that in 2000- 2010 there were positive changes in the transport and logistics infrastructure of the EU, which had a positive effect on trade, openness of the economy of the EU, GDP growth. However, at that time, negative effects of environmental impact and the load on road and rail transport were accumulating. Investment in different modes of transport is limited, and technical maintenance and infrastructure maintenance costs form a significant part of GDP of the EU. A slowdown in economic growth leads to budget constraints and infrastructure financing gap. As a result, the freight and passenger intermodal and modal transport market structure remains virtually unchanged. The load on rail and road transport remains stable, despite the reduced level of transport hazards. Transport productivity has declined over the past ten years. Herewith, the intensification of trade and the openness of the EU economies require constant modernization and innovative renewal. The EU policy in this direction remains normative, uncontrolled, which is reflected in investment differences within the EU and maintenance costs.

A Fast Method for Computing Multiplcative Inverses in GF(2$^{m}$ ) Using Normal Bases

  • 장용희;권용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.127-132
    • /
    • 2003
  • Cryptosystems have received very much attention in recent years as importance of information security is increased. Most of Cryptosystems are defined over finite or Galois fields GF($2^m$) . In particular, the finite field GF($2^m$) is mainly used in public-key cryptosystems. These cryptosystems are constructed over finite field arithmetics, such as addition, subtraction, multiplication, and multiplicative inversion defined over GF($2^m$) . Hence, to implement these cryptosystems efficiently, it is important to carry out these operations defined over GF($2^m$) fast. Among these operations, since multiplicative inversion is much more time-consuming than other operations, it has become the object of lots of investigation. Recently, many methods for computing multiplicative inverses at hi호 speed has been proposed. These methods are based on format's theorem, and reduce the number of required multiplication using normal bases over GF($2^m$) . The method proposed by Itoh and Tsujii[2] among these methods reduced the required number of times of multiplication to O( log m) Also, some methods which improved the Itoh and Tsujii's method were proposed, but these methods have some problems such as complicated decomposition processes. In practical applications, m is frequently selected as a power of 2. In this parer, we propose a fast method for computing multiplicative inverses in GF($2^m$) , where m = ($2^n$) . Our method requires fewer ultiplications than the Itoh and Tsujii's method, and the decomposition process is simpler than other proposed methods.

DoS-Resistance Authentication Protocol for Wreless LAN (DoS 공격에 강한 무선 랜 인증 프로토콜)

  • 김민현;이재욱;최영근;김순자
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.3-10
    • /
    • 2004
  • A Wireless Lan has an importance of access control, because we can use wireless Internet via AP(Access Point). Moreover, to use wireless LAN, we will go through authentication process of EAP. DoS(Denial of Service) attack is one of the fatal attack about these AP access and authentication process. That is, if malicious attacker keeps away access of AP or consumes memory of server and calculation ability of CPU and etc. compulsorily in authentication process, legal user can't get any services. In this paper, we presents the way of protection against the each attack that is classified into access control, allocation of resource, attack on authentication protocol. The first thing, attack to access control, is improved by pre-verification and the parameter of security level. The second, attack of allocation of resource, is done by partial stateless protocol. And the weak of protocol is done by time-stamp and parameter of access limitation.

A Study on System Tracing User Activities in the Windows Operating System (윈도우 운영체제 상의 사용자 행위 추적에 관한 연구)

  • Jung, Chang-Sung;Kim, Young-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.101-114
    • /
    • 2011
  • As it seems like critical information leakages have been increasing due to industrial espionage and malicious internal users, the importance of introducing audit and log security technology is growing every now and then. In this paper, we suggest the session logging system for the company's internal control to meet the SOX legislation level, by monitoring and analyzing users behaviors connecting to the business-critical Operating System. The system proposed in this paper aims to monitor the user's illegal activities in the Operating System, and to present the clear evidence of purpose of those activities by detailed logs. For this purpose, we modified Operating System by adding multiple services suggested in this paper. These services utilize interfaces provided by the existing Operating System and add functions to control access and get logs. The system saves and manages session logs of users or administrators connected to the server with centralized log storage. And the system supports session log searching and lookup features required by SOX legislation for the company's internal controls with the level of computer forensics and logging technology.

Estimating Compensation for Personal Information Infringement in Korea Using Contingent Valuation Methods (CVM을 이용한 국내 개인정보 침해사고의 위자료 산정)

  • Kwon, Hong;Lee, Eun-Ju;Kim, Tae-Sung;Jun, Hyo-Jung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.367-377
    • /
    • 2012
  • (Estimating Compensation for Personal Information Infringement) As the value of personal information increases, personal information infringements is more likely to happen. The compensation for personal information infringements needs to be calculated in the process of infringement remedy. However, as personal information is regarded as non-market goods with no exchange price and calculating the remedy for mental sufferings from infringements has no guideline, it is not easy to determine the compensation amount. In this study, we adopt Contingent Valuation Methods (CVM) to analyze Willingness to Accept (WTA) of each type of personal information. Also, this study attempts to examine a standard model for calculating compensation by applying JNSA JO Model of Japan, which is not prepared in Korea. This study does not simply present a plan of estimating compensation. By measuring the value of personal information, it could awaken companies and organizations to the importance of personal information security.

A White Box Implementation of Lightweight Block Cipher PIPO (경량 블록 암호 PIPO의 화이트박스 구현 기법)

  • Ham, Eunji;Lee, Youngdo;Yoon, Kisoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.751-763
    • /
    • 2022
  • With the recent increase in spending growth in the IoT sector worldwide, the importance of lightweight block ciphers to encrypt them is also increasing. The lightweight block cipher PIPO algorithm proposed in ICISC 2020 is an SPN-structured cipher using an unbalanced bridge structure. The white box attack model refers to a state in which an attacker may know the intermediate value of the encryption operation. As a technique to cope with this, Chow et al. proposed a white box implementation technique and applied it to DES and AES in 2002. In this paper, we propose a white box PIPO applying a white box implementation to a lightweight block cipher PIPO algorithm. In the white box PIPO, the size of the table decreased by about 5.8 times and the calculation time decreased by about 17 times compared to the white box AES proposed by Chow and others. In addition, white box PIPO was used for mobile security products, and experimental results for each test case according to the scope of application are presented.

Water footprint estimation of selected crops in Laguna province, Philippines

  • Salvador, Johnviefran Patrick;Ahmad, Mirza Junaid;Choi, Kyung-Sook
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.294-294
    • /
    • 2022
  • In 2013, the Asian Development Bank classified the Philippines among the countries facing high food security risks. Evidence has suggested that climate change has affected agricultural productivity, and the effect of extreme climatic events notably drought has worsened each year. This had resulted in serious hydrological repercussions by limiting the timely water availability for the agriculture sector. Laguna is the 3rd most populated province in the country, and it serves as one of the food baskets that feed the region and nearby provinces. In addition to climate change, population growth, rapid industrialization, and urban encroachment are also straining the delicate balance between water demand and supply. Studies have projected that the province will experience less rainfall and an increase in temperature, which could simultaneously affect water availability and crop yield. Hence, understanding the composite threat of climate change for crop yield and water consumption is imperative to devise mitigation plans and judicious use of water resources. The water footprint concept elaborates the water used per unit of crop yield production and it can approximate the dual impacts of climate change on water and agricultural production. In this study, the water footprint (WF) of six main crops produced in Laguna were estimated during 2010-2020 by following the methodology proposed by the Water Footprint Network. The result of this work gives importance to WF studies in a local setting which can be used as a comparison between different provinces as well as a piece of vital information to guide policy makers to adopt plans for crop-related use of water and food security in the Philippines.

  • PDF

A Study of Authentication of Using Multi-factor (다중체계 인증을 이용한 중요 시스템 보안 접근에 관한 연구)

  • Choi, Byeong-Hun;Kim, Sang-Geun;Bae, Je-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.73-80
    • /
    • 2009
  • Internet accidents have skyrocketed every year. It always has been threatened by the methods such as hacking and Spyware. The majority of security accident is formed of the loss of authentication information, and the internal user who is not authorized. The importance of security is also emphasized when someone tries to do something accessing to the main information system. Accordingly, Biometrics has been used in many ways. OTP, however, must have a few devices accessing to several systems, and Biometrics involve some risk of mis-recognition rate and mis-denial rate. It also has the risk possible to access to the main information system when losing OTP. This research reduced risks about the loss as separating RFID leader for mobile, Tag and the accessor's cellular phone, and is about pseudo random validation key generated from the administration system through contact with RFID leader for mobile and Tag. As sending the key to user's cell phone which is already registered, security is strengthened more than existing connection methods through the ID and password. RFID for mobile not generalized to the present has been studied as a tool accessing to the main information system.

The Development of Artificial Intelligence-Enabled Combat Swarm Drones in the Future Intelligent Battlefield (지능화 전장에서 인공지능 기반 공격용 군집드론 운용 방안)

  • Hee Chae;Kyung Suk Lee;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.65-71
    • /
    • 2023
  • The importance of combat drones has been highlighted through the recent outbreak of the Russia-Ukraine war. The combat drones play a significant role as a a game changer that alters the conventional wisdom of traditional warfare. Many pundits expect the role of combat swarm drones would be more crucial in the future warfare. In this regard, this paper aims to analyze the development of artificial intelligence-enabled combat swarm drones. To transform the human-operated swarm drones into fully autonomous weaponry system our suggestions are as follows. Developments of (1) AI algorithms for optimized swarm drone operations, (2) decentralized command and control system, (3) inter-drones' mission analysis and allocation technology, (4) enhanced drone communication security and (5) set up of ethical guideline for the autonomous system. Specifically, we suggest the development of AI algorithms for drone collision avoidance and moving target attacks. Also, in order to adjust rapidly changing military environment, decentralized command and control system and mission analysis allocation technology are necessary. Lastly, cutting-edging secure communication technology and concrete ethical guidelines are essential for future AI-enabled combat swarm drones.

The Influence of Information Security Related Work Stress on Information Security Policy Resistance through Job Burnout (정보보안 관련 업무 스트레스가 직무 소진을 통해 정보보안 정책 저항에 미치는 영향)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.2
    • /
    • pp.427-436
    • /
    • 2024
  • Recently, the importance of information security (IS) has been socially recognized, leading organizations to adopt IS policies, secure specialized personnel, and demand IS compliance from employees. However, the implementation of these policies can disrupt existing work processes, causing resistance among employees. This study aims to elucidate the mechanism linking work stress, caused by IS policies that do not consider the work system, to individual job burnout and IS policy resistance. We established a research model and hypotheses based on previous studies and utilized structural equation modeling with data collected from organization members of companies that have implemented IS policies. The results of the structural equation modeling confirmed that work ambiguity and work impediment are linked to IS policy resistance through job burnout, characterized by emotional exhaustion and disengagement. Our findings suggest that the swift implementation of IS policies can provoke a backlash from employees, with stress being the primary cause. This paradoxically indicates the need for the development of organization-specific IS policies.