• Title/Summary/Keyword: Security Program

Search Result 1,236, Processing Time 0.025 seconds

The analysis of transfer effect through recruit education programs for security personnel (민간 시큐리티 종사자의 신임 교육에 따른 전이효과 분석)

  • Lee, Young-Seok;Bang, Whan-Bog;Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.243-264
    • /
    • 2008
  • Investigation about training of Private Security in Korea has managed status of training and understanding of issue mostly, systematic analysis about transfer effect as well as learning and determinant of training is insufficient. Consequently this investigation research to examine the effect of training program for newly appointed private security guards to learning and transfer then, to analyze factor through incumbent private security guard-oriented hypothesis testing under article 13, section 1 of the security guard law. To grasp effect factors of learning and transfer, this dissertation establishes research model and research hypothesis through domestic and foreign studies and then theoretical as well as positive literatures consideration in the first place. Conclusion of this investigation through techniques mentioned above and data analysis is as follows. First of all, the personal characteristics, training characteristics, work environment, difference of transfer as well as learning are verified in accordance with Sociodemographic characterist of Private Security Guard. After then, there is a difference of great import. Secondly, the effect of personal characteristics of Private Security Guard to the transfer is inspected. As a result, there is a difference of significance statistical. Thirdly, the effect of training characteristics of Private Security Guard to the transfer is inspected. Consequently, there is a difference of import statistical. The following thing, subsequent to inspection about the effect of work environment of Private Security Guard to transfer, statistical difference of import is.

  • PDF

Multiple ASR for efficient defense against brute force attacks (무차별 공격에 효과적인 다중 Address Space Randomization 방어 기법)

  • Park, Soo-Hyun;Kim, Sun-Il
    • The KIPS Transactions:PartC
    • /
    • v.18C no.2
    • /
    • pp.89-96
    • /
    • 2011
  • ASR is an excellent program security technique that protects various data memory areas without run-time overhead. ASR hides the addresses of variables from attackers by reordering variables within a data memory area; however, it can be broken by brute force attacks because of a limited data memory space. In this paper, we propose Multiple ASR to overcome the limitation of previous ASR approaches. Multiple ASR separates a data memory area into original and duplicated areas, and compares variables in each memory area to detect an attack. In original and duplicated data memory areas variables are arranged in the opposite order. This makes it impossible to overwrite the same variables in the different data areas in a single attack. Although programs with Multiple ASR show a relatively high run-time overhead due to duplicated execution, programs with many I/O operations such as web servers, a favorite attack target, show 40~50% overhead. In this paper we develop and test a tool that transforms a program into one with Multiple ASR applied.

A Study on the Analysis of Vulnerabilities in the Program Source Code (프로그램 소스코드 취약성 분석에 관한 연구)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.3-8
    • /
    • 2004
  • The majority of recent intrusions reveal that the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF

A Study on Satisfaction and Healthy Eating Index in Subjects of Nutrition-Plus Program focusing Seodaemun-gu in Seoul (영양플러스 대상자의 만족도와 식생활 평가에 대한 연구 - 서울 서대문구 지역 대상자를 중심으로 -)

  • Rha, Young Ah;Park, Jin Young;Kim, Jung Yun
    • Culinary science and hospitality research
    • /
    • v.22 no.8
    • /
    • pp.172-181
    • /
    • 2016
  • This study evaluated the satisfaction and healthy eating index of nutrition-plus program providing nutritional supplements to pregnancy, lactating women, infant and children. This program was carried out at Public Healthcare Center, Seodaemun-gu in Seoul from February 2014 to June 2014. The subject selected among applicants for low income family financing of the government included 159 subjects. There was no statistically significant difference for degree of satisfaction with supplementary food by age, but the degree tends to get higher at lower age. Degree of satisfaction with supplementary food by the duration for participation was shown higher as the duration gets longer. For questions of 'Do you check nutrition label?' and 'Do you preserve food as described at food label?' in healthy eating index evaluation, the scores appeared higher at younger age group as they check the nutrition label more. Also as the duration for participation gets longer, the scores appeared higher which can be interpreted as effect of nutrition education from Nutrition-Plus. Frequency of having breakfast gets lower at higher age of subjects. And it gets higher as the duration for participation gets longer even though that there's no difference between '3 to 4 months' and '5 to 8 months' of the duration of participation. For evaluation of food security in recent 1 year, 86.8% of subjects responded 'Food sufficiency' and 'Enough but not always the kinds of food we want', and there is no difference by age and the duration of participation. As a result of this research, it is shown that the subjects of nutrition support project are relatively satisfied with the support. And healthy eating index gets improved as the duration of participation gets longer which can be considered as effect of nutrition education. It seems to be necessary to keep nutrition education as well as food support so to perform food life education on appropriate purchase and consumption of food.

A Plagiarism Detection Technique for Java Program Using Bytecode Analysis (바이트코드 분석을 이용한 자바 프로그램 표절검사기법)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.7
    • /
    • pp.442-451
    • /
    • 2008
  • Most plagiarism detection systems evaluate the similarity of source codes and detect plagiarized program pairs. If we use the source codes in plagiarism detection, the source code security can be a significant problem. Plagiarism detection based on target code can be used for protecting the security of source codes. In this paper, we propose a new plagiarism detection technique for Java programs using bytecodes without referring their source codes. The plagiarism detection procedure using bytecode consists of two major steps. First, we generate the token sequences from the Java class file by analyzing the code area of methods. Then, we evaluate the similarity between token sequences using the adaptive local alignment. According to the experimental results, we can find the distributions of similarities of the source codes and that of bytecodes are very similar. Also, the correlation between the similarities of source code pairs and those of bytecode pairs is high enough for typical test data. The plagiarism detection system using bytecode can be used as a preliminary verifying tool before detecting the plagiarism by source code comparison.

A Study on Implementation of Real-Time Multiprocess Trace Stream Decoder (실시간 다중 프로세스 트레이스 스트림 디코더 구현에 관한 연구)

  • Kim, Hyuncheol;Kim, Youngsoo;Kim, Jonghyun
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.67-73
    • /
    • 2018
  • From a software engineering point of view, tracing is a special form of logging that records program execution information. Tracers using dedicated hardware are often used because of the characteristics of tracers that need to generate and decode huge amounts of data in real time. Intel(R) PT uses proprietary hardware to record all information about software execution on each hardware thread. When the software execution is completed, the PT can process the trace data of the software and reconstruct the correct program flow. The hardware trace program can be integrated into the operating system, but in the case of the window system, the integration is not tight due to problems such as the kernel opening. Also, it is possible to trace only a single process and not provide a way to trace multiple process streams. In this paper, we propose a method to extend existing PT trace program to support multi - process stream traceability in Windows environment in order to overcome these disadvantages.

  • PDF

Volume Control using Gesture Recognition System

  • Shreyansh Gupta;Samyak Barnwal
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.161-170
    • /
    • 2024
  • With the technological advances, the humans have made so much progress in the ease of living and now incorporating the use of sight, motion, sound, speech etc. for various application and software controls. In this paper, we have explored the project in which gestures plays a very significant role in the project. The topic of gesture control which has been researched a lot and is just getting evolved every day. We see the usage of computer vision in this project. The main objective that we achieved in this project is controlling the computer settings with hand gestures using computer vision. In this project we are creating a module which acts a volume controlling program in which we use hand gestures to control the computer system volume. We have included the use of OpenCV. This module is used in the implementation of hand gestures in computer controls. The module in execution uses the web camera of the computer to record the images or videos and then processes them to find the needed information and then based on the input, performs the action on the volume settings if that computer. The program has the functionality of increasing and decreasing the volume of the computer. The setup needed for the program execution is a web camera to record the input images and videos which will be given by the user. The program will perform gesture recognition with the help of OpenCV and python and its libraries and them it will recognize or identify the specified human gestures and use them to perform or carry out the changes in the device setting. The objective is to adjust the volume of a computer device without the need for physical interaction using a mouse or keyboard. OpenCV, a widely utilized tool for image processing and computer vision applications in this domain, enjoys extensive popularity. The OpenCV community consists of over 47,000 individuals, and as of a survey conducted in 2020, the estimated number of downloads exceeds 18 million.

Present State of Community Forestry (Hutan Kemasyarakatan/HKm) Program in a Protection Forest and Its Challenges: Case Study in Lampung Province, Indonesia

  • Kaskoyo, Hari;Mohammed, Abrar Juhar;Inoue, Makoto
    • Journal of Forest and Environmental Science
    • /
    • v.30 no.1
    • /
    • pp.15-29
    • /
    • 2014
  • This article discusses the state of a community forestry program in a protection forest in Indonesia, which has been running for almost two decades. We found that the program did not achieve its objective mainly because of frequent changes in regulations. There are also activities such as: measuring and mapping working area boundaries, drawing up a work plan, planting, maintenance and security, paying royalties to those who harvest forest resources, and submitting annual reports on land use to the district government head, which have not worked as expected. We also found that the major incentives for local people to participate in the program are getting certificates of management and the program's effectiveness in minimizing land-use conflicts. Participants perceived that their major role on the program is to follow farmer-group directives or government rules. To achieve the program's purposes, farmer groups need technical assistance related to protection-forest management and opportunities for financing.

Implementation of Android-Based Mobile Messenger with Security Function Using Specific AP (특정 AP를 이용한 안드로이드 기반 모바일 보안 메신저 구현)

  • Kim, Ji-Hyung;Lee, Choong-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.16 no.3
    • /
    • pp.102-107
    • /
    • 2015
  • Personal information leakage is one of the great recent issues, which can be caused by hacking or censorship when a messenger program is used between user groups in Android-based smartphones, In order to solve these problems, companies generally apply complex security procedures inside the messenger, but which degrade the efficiency of work. This paper proposes a method which can improve work efficiency and strengthen security by allowing only the clients that can access a particular AP, and implementing a closed messenger group. The proposed method is validated by implementing on the Android-based smartphones.

Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments

  • Oh, Doohwan;Kim, Ilkyu;Kim, Keunsoo;Lee, Sang-Min;Ro, Won Woo
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.348-358
    • /
    • 2015
  • Mobile devices have been widespread and become very popular with connectivity to the Internet, and a lot of desktop PC applications are now aggressively ported to them. Unfortunately, mobile devices are often vulnerable to malicious attacks due to their common usage and connectivity to the Internet. Therefore, the demands on the development of mobile security systems increase in accordance with advances in mobile computing. However, it is very hard to run a security program on a mobile device all of the time due the device's limited computational power and battery life. To overcome these problems, we propose a novel mobile security scheme that migrates heavy computations on mobile devices to cloud servers. An efficient data transmission scheme for reducing data traffic between devices and servers over networks is introduced. We have evaluated the proposed scheme with a mobile device in a cloud environment, whereby it achieved a maximum speedup of 13.4 compared to a traditional algorithm.