• Title/Summary/Keyword: Security Risk Analysis

Search Result 528, Processing Time 0.029 seconds

Effects of Biased Awareness of Security Policies on Security Compliance Behavior (보안정책에 대한 편향적 사고가 보안준수 행동에 미치는 영향)

  • Heo, Jun;Ahn, Seongjin
    • The Journal of Korean Association of Computer Education
    • /
    • v.23 no.1
    • /
    • pp.63-75
    • /
    • 2020
  • From the perspective of compliance with security policies by members of the organization, which is a major cause of security incidents, this study presented biased thinking as factors that affect compliance with security policies and verified the following: First, the impact of biased thinking on security policies on compliance with security policies is verified. Second, the participation of management, perceived risk, education and punishment of management will verify the adjustment effect of increasing or decreasing biased thinking. Finally, we have verified that compliance attitudes have a significant impact on compliance behavior. To this end, 157 people were surveyed, statistical analysis of research models and structural equations, and conformity analysis were conducted. Studies have shown that biased thinking has a negative effect on the attitude of compliance with information security. In addition, it was analyzed that the attitude of compliance with information security policy increases policy compliance behavior. On the other hand, the higher the perceived risk of information security, the lower the bias was the adjustment effect, but management's participation, education and punishment were found to have no adjustment effect.

Information Security on Learning Management System Platform from the Perspective of the User during the COVID-19 Pandemic

  • Mujiono, Sadikin;Rakhmat, Purnomo;Rafika, Sari;Dyah Ayu Nabilla, Ariswanto;Juanda, Wijaya;Lydia, Vintari
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.1
    • /
    • pp.32-44
    • /
    • 2023
  • Information security breach is a major risk in e-learning. This study presents the potential information security disruptions in Learning Management Systems (LMS) from the perspective of users. We use the Technology Acceptance Model approach as a user perception model of information security, and the results of a questionnaire comprising 44 questions for instructors and students across Indonesia to verify the model. The results of the data analysis and model testing reveals that lecturers and students perceive the level of information security in the LMS differently. In general, the information security aspects of LMSs affect the perceptions of trust of student users, whereas such a correlation is not found among lecturers. In addition, lecturers perceive information security aspect on Moodle is and Google Classroom differently. Based on this finding, we recommend that institutions make more intense efforts to increase awareness of information security and to run different information security programs.

Evaluation of Domestic IT Management Environment through the Development and Application of Automated Risk Analysis Tool (자동화 위험분석도구의 개발 및 적용과정을 통하여 분석한 국내 정보시스템 보안관리체계의 문제점)

  • 윤정원;신순자;이병만
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.68-77
    • /
    • 1997
  • 국내에서도 정보시스템 보안관리가 체계화되면서 보안컨설팅 분야가 중요한 분야로 대두되고 있다. 보안관리에서 핵심부문인 위험분석에 대한 연구는 진행되어 왔으나 국내환경에 적용하기 어려운 점이 많았다. 특히 정보시스템에 대한 분석기준과 정량화가 전무한 국내에서 외국산 위험분석 도구 등을 이용한 분석결과가 객관성을 갖기가 매우 어렵다. 따라서 위험분석 자동화 분석도구의 개발과 적용을 통하여 이러한 문제점을 고찰하고 국내 환경에서 위험분석을 실시할 수 있는 환경을 위하여 필요한 해결방안을 살펴보았다.

  • PDF

An Analysis of the Relative Importance of Security Level Check Items for Autonomous Vehicle Security Threat Response (자율주행차 보안 위협 대응을 위한 보안 수준 점검 항목의 상대적 중요도 분석)

  • Im, Dong Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.4
    • /
    • pp.145-156
    • /
    • 2022
  • To strengthen the security of autonomous vehicles, this study derived checklists through the analysis of the status of autonomous vehicle security. The analyzed statuses include autonomous vehicle characteristics, security threats, and domestic and foreign security standards. The derived checklists are then applied to the AHP(Analytic Hierarchy Process) model to find their relative importance. Relative importance was ranked as one of cyber security management system establishment and implementation, encryption, risk assessment, etc. The significance of this study is to reduce cyber security incidents that cause human casualties as well improve the level of security management of autonomous vehicles in related companies by deriving the autonomous vehicle security level checklists and demonstrating the model. If the inspection is performed considering the relative importance of the checklists, the security level can be identified early.

Information Security Activities of The Analysis Phase (분석단계의 정보보호 활동)

  • Shin, SY;Kim, DK;Lee, CW;Lee, HC;Lee, TW;Park, KH
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.743-744
    • /
    • 2016
  • Information Security is a management problem, not just a technical issue. Information security management is an ongoing activity rather than consisting of a solitary business. Analysis step has to be done with the start information is also protected by the steps of preparing the activity information system development. At this stage, the risk assessment should be carried out together with the expected information technology systems analysis and user requirements are derived.

  • PDF

Fall Risk in the Community-dwelling Elderly who Received Home Care Services: Focused on Residential Environment and Perception of Fall Risk (방문간호를 받는 재가노인의 낙상위험)

  • Lee, Chong Mi;Cho, Bok-Hee
    • Journal of muscle and joint health
    • /
    • v.21 no.1
    • /
    • pp.36-45
    • /
    • 2014
  • Purpose: The purpose of this study was to investigate the factors increasing fall risk in the residential environment risk and the perceived fall risk among the older adults who received home care services to provide information for developing a comprehensive falls intervention program. Methods: The subjects were 227 community-dwelling elderly aged 65 years and over who were taken care of by home-visiting nurses of the national health centers. The data were collected from July to August in 2012 using the Choi's residential environmental risk scale (2010) and the Hong's fall risk scale (2011). Results: Requires an assistive devices to walk, modified residential environment, health security, approval certificate of LTC, residential safety perception, residential environment risk, and perception of fall risk were statistically significant risk factors. A multiple logistic regression analysis showed that room & kitchen, physical perception, medication & ADL perception, floor-related environmental perception, and daily living tool-related perception were statistically significant predictors of fall. Conclusion: The results showed that the residential environment and the perceived fall risk were associated with fall experiences among the elderly. It is necessary to develope multifactorial intervention programs considering both environmental and perceived risk factors as well as physical risk factors to reduce and prevent falls among the elderly.

Research on Integrated Management of ISMS : Comparative Analysis of IT Disaster Recovery Framework (IT재해복구 연관 프레임워크 비교분석을 통한 ISMS의 통합관리방안)

  • Bak, Yurim;Kim, Byungki;Yoon, Ohjun;Khil, Ara;Shin, Yongtea
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.3
    • /
    • pp.177-182
    • /
    • 2017
  • To develop computer and communication in the information society, difficulties exist in managing the enormous data manually. Also, loss of data due to natural disasters or hacker attacks, generate a variety of disasters in the IT securities. Hence, there is an urgent need for an information protection management system in order to mitigate these incidents. Information Security Management System has various existing frameworks for IT disaster management. These include Cyber Security Framework, Risk Management Framework, ISO / IEC 27001: 2013, and COBIT 5.0. Each framework analyses and compares the entry for IT disaster recovery from among the various available data. In this paper, we describe a single integrated management scheme for fast resolution of IT disasters.

Development of ML and IoT Enabled Disease Diagnosis Model for a Smart Healthcare System

  • Mehra, Navita;Mittal, Pooja
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.1-12
    • /
    • 2022
  • The current progression in the Internet of Things (IoT) and Machine Learning (ML) based technologies converted the traditional healthcare system into a smart healthcare system. The incorporation of IoT and ML has changed the way of treating patients and offers lots of opportunities in the healthcare domain. In this view, this research article presents a new IoT and ML-based disease diagnosis model for the diagnosis of different diseases. In the proposed model, vital signs are collected via IoT-based smart medical devices, and the analysis is done by using different data mining techniques for detecting the possibility of risk in people's health status. Recommendations are made based on the results generated by different data mining techniques, for high-risk patients, an emergency alert will be generated to healthcare service providers and family members. Implementation of this model is done on Anaconda Jupyter notebook by using different Python libraries in it. The result states that among all data mining techniques, SVM achieved the highest accuracy of 0.897 on the same dataset for classification of Parkinson's disease.

A novel approach for analyzing the nuclear supply chain cyber-attack surface

  • Eggers, Shannon
    • Nuclear Engineering and Technology
    • /
    • v.53 no.3
    • /
    • pp.879-887
    • /
    • 2021
  • The nuclear supply chain attack surface is a large, complex network of interconnected stakeholders and activities. The global economy has widened and deepened the supply chain, resulting in larger numbers of geographically dispersed locations and increased difficulty ensuring the authenticity and security of critical digital assets. Although the nuclear industry has made significant strides in securing facilities from cyber-attacks, the supply chain remains vulnerable. This paper discusses supply chain threats and vulnerabilities that are often overlooked in nuclear cyber supply chain risk analysis. A novel supply chain cyber-attack surface diagram is provided to assist with enumeration of risks and to examine the complex issues surrounding the requirements for securing hardware, firmware, software, and system information throughout the entire supply chain lifecycle. This supply chain cyber-attack surface diagram provides a dashboard that security practitioners and researchers can use to identify gaps in current cyber supply chain practices and develop new risk-informed, cyber supply chain tools and processes.

A study on the Development of Personnel Security Management for Protection against Insider threat (내부 정보보호를 위한 인원보안 관리 방안 연구)

  • Cha, In-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.4
    • /
    • pp.210-220
    • /
    • 2008
  • Insider threat is becoming a very serious issue in most organizations and management is responsible for security implementation. This study is to develop a personnel security management indicators in the areas of Personnel Assurance, Personnel Competence, and Security Environment and protection against insider threats. In this study, the information security management system and related papers are examined by reviewing the existing researches and cases. Proposed indicators are verified by pilot test, empirically analyzed to expose experts' perception and the validity, importance, and risk level of each indicators through a questionnaire. Result were encouraging, but additional study focused on personnel security management using factor analysis is needed in the future.

  • PDF