• 제목/요약/키워드: Security Practice

검색결과 374건 처리시간 0.029초

전자결재 시스템에서 보안기법 설계 및 구현 (Design and Implementation of Security Technique in Electronic Signature System)

  • 유영모;강성수;김완규;송진국
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2001년도 추계종합학술대회
    • /
    • pp.491-498
    • /
    • 2001
  • 본 논문에서는 개방형 통신상에서 전송중인 데이터를 암호화시켜 정보의 노출을 방지하고 송신자가 인정한 수신자만이 이러한 정보를 받을 수 있도록 한 암호화 알고리즘을 제시한다. 암호화의 방법에는 크게 관용키 암호화 방법과 공개키 암호화 방법으로 나누는데 본 논문에서는 혼합형 암호화 방식의 개념을 이용했다. 이 알고리즘은 통신시간과 저장공간을 절약하기 위해 전송할 데이터를 압축한 다음 암호화시키게 되며, 암호화 key를 생성하기 위한 파라미터로서 키를 생성하게 하는 것이 특징이다. 파라미터는 키 값이 생성됨과 동시에 전송되고 매 26회마다 파라미터를 변경시켜 키를 재생성 시킨다. 암호화키의 구성요소인 random number 는 table 형태로 저장되는데 키가 40회마다 table을 재편성 key의 보안을 강화하였다. 이렇게 생성된 키와 원래 데이터는 연산과정을 거쳐 암호화가 이루어진다. 복호화는 전송된 파라미터를 조사해 복호화 키를 구한 다음 암호화 동작의 역순으로 수행한다. 본 논문에서 제시한 알고리즘을 구현 및 평가결과는 100KB 메시지 0.0152/sec 정도로 빠른 수행이 되었다.

  • PDF

Household food insecurity, diet quality, and weight status among indigenous women (Mah Meri) in Peninsular Malaysia

  • Pei, Chong Su;Appannah, Geeta;Sulaiman, Norhasmah
    • Nutrition Research and Practice
    • /
    • 제12권2호
    • /
    • pp.135-142
    • /
    • 2018
  • BACKGROUND/OBJECTIVES: This cross-sectional study assessed household food security status and determined its association with diet quality and weight status among indigenous women from the Mah Meri tribe in Peninsular Malaysia. SUBJECTS/METHODS: The Radimer/Cornell Hunger and Food Insecurity Instrument and the Malaysian Healthy Eating Index (HEI) were used to assess household food security status and diet quality, respectively. Information on socio-demographic characteristics and 24-hour dietary recall data were collected through face-to-face interview, and anthropometric measurements including weight, height, and body mass index (BMI) were obtained from 222 women. RESULTS: Majority of households (82.9%) experienced different levels of food insecurity: 29.3% household food insecurity, 23.4% individual food insecurity, and 30.2% fell into the child hunger group. The food-secure group had significantly fewer children and smaller household sizes than the food-insecure groups (P < 0.05). The mean household income, income per capita, and food expenditure significantly decreased as food insecurity worsened (P < 0.001). The food-secure group had significantly higher Malaysian HEI scores for grains and cereals (P < 0.01), as well as for meat, poultry, and eggs (P < 0.001), than the food-insecure groups. The child-hunger group had significantly higher fat (P < 0.05) and sodium (P < 0.001) scores than the food-secure and household food-insecure groups. Compared to the individual food-insecure and child-hunger groups, multivariate analysis of covariance showed that the food-secure group was significantly associated with a higher Malaysian HEI score while the household food-insecure group was significantly associated with a higher BMI after controlling for age (P < 0.025). CONCLUSIONS: The majority of indigenous households faced food insecurity. Food insecurity at the individual and child levels was associated with lower quality of diet, while food insecurity at the household level was associated with higher body weight. Therefore, a substantial effort by all stakeholders is warranted to improve food insecurity among poorer households. The results suggest a pressing need for nutritional interventions to improve dietary intake among low income households.

Corona generated Radio Interference of the 750 kV AC Bundle Conductors in Sandy and Dusty Weather Condition in the High Altitude Area

  • Liu, Yun-Peng;Zhu, Lei;Lv, Fang-Cheng;Wan, Bao-Quan;Pei, Chun-Ming
    • Journal of Electrical Engineering and Technology
    • /
    • 제9권5호
    • /
    • pp.1704-1711
    • /
    • 2014
  • Sandy and dusty weather condition often occurs in the high altitude areas of China, which may greatly influence the corona generated radio interference (RI) characteristics of the bundle conductors of 750 kV AC power transmission lines. Corona generated RI of the conductors of the 750 kV AC power transmission lines used in practice is measured by EMI receiver with a coupling circuit and a coupling capacitor connected between the high voltage side and the earth side in fine and sandy and dusty condition. The measuring frequency is 0.5 MHz, and the quasi-peak detection is used. RI excitation function is calculated based on the corona RI current measured by the EMI receiver. Corona generated RI characteristics were analyzed from sand concentration and sand particle size. The test result shows that the corona generated RI excitation function is influenced by the sandy and dusty condition. Corona discharge of the conductors is more serious in sandy and dusty condition with an ultraviolet (UV) detector. Corona generated RI excitation function increases with the increase of sand concentration and also increases with the increase of particle size.

Identification of Profane Words in Cyberbullying Incidents within Social Networks

  • Ali, Wan Noor Hamiza Wan;Mohd, Masnizah;Fauzi, Fariza
    • Journal of Information Science Theory and Practice
    • /
    • 제9권1호
    • /
    • pp.24-34
    • /
    • 2021
  • The popularity of social networking sites (SNS) has facilitated communication between users. The usage of SNS helps users in their daily life in various ways such as sharing of opinions, keeping in touch with old friends, making new friends, and getting information. However, some users misuse SNS to belittle or hurt others using profanities, which is typical in cyberbullying incidents. Thus, in this study, we aim to identify profane words from the ASKfm corpus to analyze the profane word distribution across four different roles involved in cyberbullying based on lexicon dictionary. These four roles are: harasser, victim, bystander that assists the bully, and bystander that defends the victim. Evaluation in this study focused on occurrences of the profane word for each role from the corpus. The top 10 common words used in the corpus are also identified and represented in a graph. Results from the analysis show that these four roles used profane words in their conversation with different weightage and distribution, even though the profane words used are mostly similar. The harasser is the first ranked that used profane words in the conversation compared to other roles. The results can be further explored and considered as a potential feature in a cyberbullying detection model using a machine learning approach. Results in this work will contribute to formulate the suitable representation. It is also useful in modeling a cyberbullying detection model based on the identification of profane word distribution across different cyberbullying roles in social networks for future works.

Russian and Foreign Experience in Implementing Departmental Control and Prosecutor's Supervision when Verifying Crime Reports

  • Ivanov, Dmitriy Aleksandrovich;Moskovtseva, Kristina Andreevna;Bui, Thien Thuong;Sheveleva, Kseniya Vladimirovna;Vetskaya, Svetlana Anatolyevna
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.299-303
    • /
    • 2022
  • The article examines the stage of verification of a crime report from the standpoint of the need for its legislative regulation. Moreover, it investigates the international experience in this field. The existing procedural models are described in detail on the example of the neighboring and faraway countries. An analysis of the provisions of the current criminal procedure law of Russia and foreign experience allowed the authors to identify existing problems in the implementation of departmental control and prosecutorial supervision at the stage of verifying a crime report. The aim of the study is to develop theoretical provisions and recommendations regarding the implementation of departmental procedural control and prosecutorial supervision over the activities of the investigator during the verification of reports of crimes, based on the study of experience, both in Russia and in a number of countries of the near and far abroad, which could find their reflection in law enforcement practice, as well as aimed at improving the current criminal procedure legislation. The authors substantiated the theory that a detailed examination of the foreign procedural foundations of checking a crime report will allow us to form the most suitable model for checking a crime report for our state, taking into account all possible features and successfully implement it into the current criminal procedural law of the Russian Federation.

Privacy-Preserving Key-Updatable Public Key Encryption with Keyword Search Supporting Ciphertext Sharing Function

  • Wang, Fen;Lu, Yang;Wang, Zhongqi;Tian, Jinmei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권1호
    • /
    • pp.266-286
    • /
    • 2022
  • Public key encryption with keyword search (PEKS) allows a user to make search on ciphertexts without disclosing the information of encrypted messages and keywords. In practice, cryptographic operations often occur on insecure devices or mobile devices. But, these devices face the risk of being lost or stolen. Therefore, the secret keys stored on these devices are likely to be exposed. To handle the key exposure problem in PEKS, the notion of key-updatable PEKS (KU-PEKS) was proposed recently. In KU-PEKS, the users' keys can be updated as the system runs. Nevertheless, the existing KU-PEKS framework has some weaknesses. Firstly, it can't update the keyword ciphertexts on the storage server without leaking keyword information. Secondly, it needs to send the search tokens to the storage server by secure channels. Thirdly, it does not consider the search token security. In this work, a new PEKS framework named key-updatable and ciphertext-sharable PEKS (KU-CS-PEKS) is devised. This novel framework effectively overcomes the weaknesses in KU-PEKS and has the ciphertext sharing function which is not supported by KU-PEKS. The security notions for KU-CS-PEKS are formally defined and then a concrete KU-CS-PEKS scheme is proposed. The security proofs demonstrate that the KU-CS-PEKS scheme guarantees both the keyword ciphertext privacy and the search token privacy. The experimental results and comparisons bear out that the proposed scheme is practicable.

International Legal Measures of Protection of Critical Infrastructure Facilities in Banking Sphere

  • Oleg, Batiuk;Oleg, Novikov;Oleksandr, Komisarov;Natalia, Benkovska;Nina, Anishchuk
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.145-154
    • /
    • 2022
  • Based on the obtained results of the study, the most problematic issues and legal conflicts are identified, which are related to the ratio of norms of domestic and foreign legislation, taking into account the requirements of the Constitution of Ukraine and the provisions of the Law of Ukraine "On international agreements". Along with this, it is stated in this scientific article that there are a number of provisions and examples of positive practice on the specified topic abroad and in international legal acts today, which should be used by Ukraine both in improving legislation on the issues of banking activity and in increasing the level of criminal legal protection of relevant critical infrastructure facilities, especially those that are substantively related to prevention and counteraction of activity, with regard to the legalization (laundering) of criminally obtained funds, financing of terrorism and the financing of the proliferation of weapons of mass destruction, which is quite relevant for our state, given the military conflict that is taking place on its territory in the Donbass. Again, in the same context, the need for more active cooperation between Ukraine and the FATF (international body developing a policy to combat money laundering) has been proven.

A Functional Matrix Approach to Pedagogical Enrichment of the Dispositional Core of Future Specialists' Experience of Social Interaction

  • Kovalenko, E.V.;Gubarenko, I.V.;Kovalenko, V.I.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.255-259
    • /
    • 2022
  • The new social reality emerging amid the global rise of communication links and integration processes acutely emphasizes the problems of communication in large and small social systems. The method of their communication becomes one of the keys to ensuring global security. It has become the mission of humanitarian education to prepare the younger generations for life in a changing world with no image of the future and increasing uncertainty. In psychological and pedagogical research, there is a growing scientific interest in the problems of interaction of the individual with the social environment. The mental trace of a person's practice in society shapes the experience of social interaction, which constitutes simultaneously the source, tool, and condition for the emergence and development of personality. The study outlines the methodological foundations for the study of individual experiences of social interaction. A hypothesis about the productivity of the functional matrix method is tested. Materials for the training of specialists in the humanities include interdisciplinary approaches to the study and transformation of the experience of social interaction and systematic methodology for the study of complex objects. Fundamental to the study is the systematic-dialectical method, and the matrix method is employed as the instrumental-technological method. The paper presents the results of a multidisciplinary overview of scientific literature concerning the essential characteristics and functions of social interaction and the respective experience. The overview points to the fragmented nature of scientific understanding of the elements of experience outside its integrity and systemic properties. Based on the formula "personality interacts with the social environment", the study presents an algorithm for the application of a systematic methodology for the study of complex objects, which made it possible to identify the system parameters of experience at three levels of cognition and develop the reference structural and functional matrices for the didactic system of its pedagogical enrichment.

A Network Packet Analysis Method to Discover Malicious Activities

  • Kwon, Taewoong;Myung, Joonwoo;Lee, Jun;Kim, Kyu-il;Song, Jungsuk
    • Journal of Information Science Theory and Practice
    • /
    • 제10권spc호
    • /
    • pp.143-153
    • /
    • 2022
  • With the development of networks and the increase in the number of network devices, the number of cyber attacks targeting them is also increasing. Since these cyber-attacks aim to steal important information and destroy systems, it is necessary to minimize social and economic damage through early detection and rapid response. Many studies using machine learning (ML) and artificial intelligence (AI) have been conducted, among which payload learning is one of the most intuitive and effective methods to detect malicious behavior. In this study, we propose a preprocessing method to maximize the performance of the model when learning the payload in term units. The proposed method constructs a high-quality learning data set by eliminating unnecessary noise (stopwords) and preserving important features in consideration of the machine language and natural language characteristics of the packet payload. Our method consists of three steps: Preserving significant special characters, Generating a stopword list, and Class label refinement. By processing packets of various and complex structures based on these three processes, it is possible to make high-quality training data that can be helpful to build high-performance ML/AI models for security monitoring. We prove the effectiveness of the proposed method by comparing the performance of the AI model to which the proposed method is applied and not. Forthermore, by evaluating the performance of the AI model applied proposed method in the real-world Security Operating Center (SOC) environment with live network traffic, we demonstrate the applicability of the our method to the real environment.

민간경비 자격제도에 관한 연구 (A Study for the Certified Security Certification in Private Security Industry in Korea)

  • 안황권
    • 시큐리티연구
    • /
    • 제11호
    • /
    • pp.159-181
    • /
    • 2006
  • 최근 경비업체가 비약적으로 증가하고 있는 것은 고무적인 현상이지만, 영세한 업체의 난립은 결국 저가입찰을 하게 되고, 그 결과 경비원은 낮은 보수와 후생복지의 취약 등으로 이직으로 인해 업무 숙련도가 떨어지고 사기가 저하되어 양질의 서비스를 기대하기 어려운 점이 있다. 이러한 문제에 적극적으로 대응하기 위해서는 구조적인 문제해결방안과 더불어 우선적으로 시급한 경비원의 자질향상과 고객의 신뢰도를 제고시키는 방안중의 하나는 자격제도를 활성화시키는 것이다. 자격증은 그 분야에 대한 지식이나 기술의 습득정도를 평가 받고 직무수행에 필요한 전문 능력을 인정하는 제도로 관련 산업계와 사회에서 경쟁력을 높이고 객관적으로 능력을 인정받을 수 있는 도구이다. 전문교육을 받고 전문직종에 종사하게 되는 경우 그 사람의 능력정도를 평가하는 도구로서 자격제도가 실시되고 있다. 자격소지자에게는 자부심과 자신감을, 고객에게는 신뢰감을, 기업에게는 탐색과 교육비용을 절감하는 효과를 가져오는 것이다. 민간경비는 경비업무가 다양하고 경비업체의 규모나 수준이 평균화되어 있지 않고 편차가 심하여 고객이나 일반 대중에게 높은 신뢰감과 만족감을 주지 못하고 있다. 그래서 전문자격증은 결구 고객을 보호하고 경비산업을 활성시키는 방안중의 하나이다. 민간경비 관련 민간자격은 비영리 사단법인인 한국경비협회가 중심이 되어 관리${\cdot}$운영하는 것이 효율적이고 공신력을 높일 수 있다. 민간경비 자격취득자가 취업할 수 있는 노동시장인 경비업체들이 적극적으로 참여하고 협조해야만 활성화될 수 있다. 자격의 종류를 다양화하여 전문화시키는 것이 필요하다. 한국경비협회, 경비업체, 관련학과 교수 등이 협의하여 직무분석을 한 후, 자격취득 예정자가 갖추어야 할 지식과 기능을 추출하여 자격등급, 검정과목, 검정방법 등을 결정하도록 한다. 그리고 직업교육훈련기관의 설치 또는 연계가 필요하다.가 여자보다 더 높게 나타났다. 취업 준비를 위해 중점적으로 준비하는 것으로는 어학 공부가 40.4%로, 취업에 대한 자신감에서는 긍정적인 응답이 39.6%로 나타나 14.0%로 나타난 부정적인 응답보다 월등히 높게 나타났다. 다섯째, 경호관련 대학생들의 직업 선호도에 대해 49.2%가 공경호 분야를 선택해서 안정적인 직종을 원했고, 34.0%가 민간경호, 사설 경비업체를 선택하였다. 또한 공경호쪽에서의 희망 직종으로는 대통령 경호가 28.6%로 가장 높게 나타났다. 민간경호 부분에 있어서는 21.2%가 민간 경호, 경비업체를 선호하는 것으로 나타났다.로 분석하여 특정시기(월)에 국한되어 폐각근과 내장낭의 생화학적 함량변화가 역상관관계를 나타내는 현상을 보였다. 특히, 폐각근과 내장낭내 총 RNA 함량 변화 양상은 총단백질 함량 변화 양상과 유사한 경향을 보여 RNA 함량 증가시 단백질 함량의 증가가 일어나고 있음을 알 수 있었다.순응이 초기에 높을 때 약물 순응률이 보다 높았다. 결국 약물치료 효과에 대한 만족도가 순응률 결정에 가장 중요한 요인이라고 생각되며, 약물치료효과를 높이기 위한 다양한 전략을 사용하여, 약물 순응도를 향상 시킬 필요가 있다고 생각된다.으나, 주의력에서는 전두엽의 실행능력(executive function)과 관련되는 검사들에서 산소흡입이 특이한 효과를 보여준다는 것이 확인되었고, 기억능력에서는 단기기억능력 평가에서 산소흡입군이 대조군보다 유의한 효과를 보여주는 것으로 평가되었다. 이러한 연구결과는 산소흡입이 전두엽과 관련된 수행능력, 작동기억능력 향상에 도움이 될 가능성이 있음을 시사하는 결과라고 생각된다.증 1명(5%)이었다. 모든 대상 아동이 주 진단 이외의 2∼6개 이상의 다양한 공존진단을 보였다. 공존진단에는 주의력결핍-과잉운동장애, 우울병, 경계선지능 및 정신지체, 학습장애, 언어발달장애, 적대적 반항장애, 만성 틱장애, 기능성

  • PDF