• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.027 seconds

Research on Core Technology for Information Security Based on Artificial Intelligence (인공지능 기반 정보보호핵심원천기술 연구)

  • Sang-Jun Lee;MIN KYUNG IL;Nam Sang Do;LIM JOON SUNG;Keunhee Han;Hyun Wook Han
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.99-108
    • /
    • 2021
  • Recently, unexpected and more advanced cyber medical treat attacks are on the rise. However, in responding to various patterns of cyber medical threat attack, rule-based security methodologies such as physical blocking and replacement of medical devices have the limitations such as lack of the man-power and high cost. As a way to solve the problems, the medical community is also paying attention to artificial intelligence technology that enables security threat detection and prediction by self-learning the past abnormal behaviors. In this study, there has collecting and learning the medical information data from integrated Medical-Information-Systems of the medical center and introduce the research methodology which is to develop the AI-based Net-Working Behavior Adaptive Information data. By doing this study, we will introduce all technological matters of rule-based security programs and discuss strategies to activate artificial intelligence technology in the medical information business with the various restrictions.

A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim) (네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구)

  • Bum-Sok Kim;Jung-Hyun Kim;Min-Suk Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis

  • Kookjin Kim;Jaepil Youn;Hansung Kim;Dongil Shin;Dongkyoo Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1273-1300
    • /
    • 2024
  • In the complex virtual environment of cyberspace, comprised of digital and communication networks, ensuring the security of information is being recognized as an ongoing challenge. The importance of 'Cyber Situation Awareness (CSA)' is being emphasized in response to this. CSA is understood as a vital capability to identify, understand, and respond to various cyber threats and is positioned at the heart of cyber security strategies from a defensive perspective. Critical industries such as finance, healthcare, manufacturing, telecommunications, transportation, and energy can be subjected to not just economic and societal losses from cyber threats but, in severe cases, national losses. Consequently, the importance of CSA is being accentuated and research activities are being vigorously undertaken. A systematic five-step approach to CSA is introduced against this backdrop, and a deep analysis of recent research trends, techniques, challenges, and future directions since 2019 is provided. The approach encompasses current situation and identification awareness, the impact of attacks and vulnerability assessment, the evolution of situations and tracking of actor behaviors, root cause and forensic analysis, and future scenarios and threat predictions. Through this survey, readers will be deepened in their understanding of the fundamental importance and practical applications of CSA, and their insights into research and applications in this field will be enhanced. This survey is expected to serve as a useful guide and reference for researchers and experts particularly interested in CSA research and applications.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

The Relationship between Offline Trust and Online Transaction in Internet Banking (인터넷 뱅킹에서 오프라인 신뢰와 온라인 거래의 관계)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.29-47
    • /
    • 2007
  • Owing to the rapid growth of using the Internet, not only click-and-mortar companies but also brick-and-mortar ones have been expanding their distribution channels into online, Moreover, since online channels are more attractive than offline ones in control and maintenance, switching customers into online ones is emerged as one of very important managerial issues in a view of reduction of cost as well as expansion of services. However, the switched customers should be faced by uncertainties which could not have been experienced in offline. Specifically, in online channels, buyers and sellers are separated temporally and spacially and there are always so many kinds of threat for security as well as not enough systems and conventions for them yet. Therefore, trust has been considered as one of the most critical mechanisms for resolution of such uncertainties in online transactions. However, it is not easy to build and maintain the relationships in online since most of them are virtual and indirect generally. Therefore, in order to switch offline customers into online ones, it is very important to make strategies based on identification of the relationship between online transaction and offline trust which has been built in offline business. Generally offline trust, which has been built independent of online, could not include trust for online-dependent activities such as payment security during or after transactions, while most of online trust include it. Therefore, a customer with high offline trust does not always perceive high security and assure safe transactions. Accordingly, while online trust, where technical capabilities for online security is one of main bases, includes control trust implicitly or explicitly, offline trust does not. However. in spite of such clear discrimination and independence between offline trust and perceived security, there can be the significant dependency between these two beliefs. The customers with high offline trust believe that the company would do some activities for online security for customers' safe transactions since it has been believed of doing well for customers' trust. Theoretically, users' perception of security is interpreted as a kind of control trus, which is trust for company's technical control capacities in order to resolve technical uncertainties in online. Therefore, the relationship between two beliefs can be considered as transference from offline trust to another type trust. that is, control trust. The objective of this study is to analyze the effect of offline trust on online transaction uses mediated by perceived security. For this purpose, we suggest a research model based on technology acceptance model (TAM). Reuse intention is adopted as a dependent variable and TAM is modified by adding perceived risk (PR) as well as two beliefs of using Internet banking, perceived usefulness (PU) and perceived ease of use (PEOU). Moreover, perceive security (PS) is adopted as an external variable for PR and PU, while offline trust (OT) is an antecedent of PS. For an empirical test, sampling from 108 visitors to the banks in Daegu, Korea, we analyze our model by partial least square (PLS) approach. In result, our model is shown to explain 51.4% of the variance in reuse intention and all hypothesis are supported statistically. A theoretical implication of this study is to identify a role of PS between offline trust and reuse intention of using online transaction services. According to our result, PS can be considered as a mediation variable for bridging between two different concepts: trust that explains social aspects of customers and companies, and TAM that explains customers' reuse intention.

Feed Resources for Animals in Asia: Issues, Strategies for Use, Intensification and Integration for Increased Productivity

  • Devendra, C.;Leng, R.A.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.24 no.3
    • /
    • pp.303-321
    • /
    • 2011
  • The availability and efficient use of the feed resources in Asia are the primary drivers of performance to maximise productivity from animals. Feed security is fundamental to the management, extent of use, conservation and intensification for productivity enhancement. The awesome reality is that current supplies of animal proteins are inadequate to meet human requirements in the face of rapidly depleting resources: arable land, water, fossil fuels, nitrogenous and other fertilisers, and decreased supplies of cereal grains. The contribution of the ruminant sector lags well behind that of non-ruminant pigs and poultry. It is compelling therefore to shift priority for the development of ruminants (buffaloes, cattle, goats and sheep) in key agro-ecological zones (AEZs), making intensive use of the available biomass from the forage resources, crop residues, agro-industrial by-products (AIBP) and other non-conventional feed resources (NCFR). Definitions are given of successful and failed projects on feed resource use. These were used to analyse 12 case studies, which indicated the value of strong participatory efforts with farmers, empowerment, and the benefits from animals of productivity-enhancing technologies and integrated natural resource management (NRM). However, wider replication and scaling up were inadequate in project formulation, including systems methodologies that promoted technology adoption. There was overwhelming emphasis on component technology applications that were duplicated across countries, often wasteful, the results and relevance of which were not clear. Technology delivery via the traditional model of research-extension linkage was also inadequate, and needs to be expanded to participatory research-extension-farmer linkages to accelerate diffusion of technologies, wider adoption and impacts. Other major limitations concerned with feed resource use are failure to view this issue from a farming systems perspective, strong disciplinary bias, and poor links to real farm situations. It is suggested that improved efficiency in feed resource use and increased productivity from animals in the future needs to be cognisant of nine strategies. These include priorities for feed resource use; promoting intensive use of crop residues; intensification of integrated ruminant-oil palm systems and use of oil palm by-products; priority for urgent, wider technology application, adoption and scaling up; rigorous application of systems methodologies; development of adaptation and mitigation options for the effects of climate change on feed resources; strengthening research-extension-farmer linkages; development of year round feeding systems; and striving for sustainability of integrated farming systems. These strategies together form the challenges for the future.

Islamist Strategic Changes against U.S. International Security Initiative (미국(美國)의 대외안보전략(對外安保戰略)에 대응한 이슬람Terrorism의 전술적(戰術的) 진화(進化))

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.517-534
    • /
    • 2007
  • Since the beginning of human society, there have always been struggles and competitions for survival and prosperity, terrorism is not a recent phenomenon, however in modern times it has progressed to reflect the advances in civilization and power structures. At the time of the 9.11 terrorist attacks in the U.S. A., a new world order was in the process of being established after the breakdown of the Cold War era. The attacks drove both the Western and the Islamic worlds into heightened fear of terrorism and war, which threatened the quality of life of the whole mankind. Through two war campaigns against the Islamic world, it seems the U.S. has been pushing its own militaristic security road map of the Greater Middle East democratic initiative, justifying it as a means to retaliate and eradicate the terrorist threats towards themselves. However, with its five-year lopsided victories that cost the nation almost four thousand military casualties, and the war expenses that could match the Vietnam war, the U.S. does not yet seem to be totally emancipated from the fears of terrorism. Terrorism, in itself, is a means of resisting forced rules a form of alternative competition by the weak against the strong, and a way of expressing a dismissive response against dictatorial ideas or orders which allow for no normal changes. Intrinsically, the nature of terrorism is a reaction opposing power logics. Confronted with the absolute military power of the U.S., the Islamic strategies of terrorism have begun to rapidly evolve into a new stage. The new strategies take advantage of their civilization and circumstances, they train and inspire their front-line fighters on the Internet, and issue their orders through the clandestine network of the Al Qaeda operatives. These spontaneously generated strategies have been gained speed among the second, and third Islamic generations, many of whom are now spread throughout western societies. This represents a failure of the power-driven, one-sided overseas security initiatives by the U.S., and is creating a culture of fear and distrust in western societies. It is feared that the U.S. war campaigns have made the clash of religions far worse than before, and may ever lead to global ethnic separations and large-scale population movements. Eventually, it may result in the terrorist groups, enlarged and secretly supported by the huge sums of oil money, driving all mankind into a series of irreparable catastrophes.

  • PDF

Directions in Promoting Independence in Operational Control (전시작전통제권 단독 행사 추진의 방향)

  • Park, Seung-Sik
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.351-379
    • /
    • 2006
  • Former ministers of national defense and foreign affairs, intellectuals such as former and incumbent professors, and various NGO groups are demanding the South Korean government to stop promoting independence in operational control which is currently held by the United States Armed Forces in Korea commander. Although the Korea should exercise operational control independently in the future, orientation on the direction which should be taken under consideration in promoting this transfer should be assumed. First of all, South Korea must sufficiently examine the criticisms and dissenting opinions, and reflect them in promoting independence in operational control. From now on, the South Korean government should reflect the opinions of experts in operational control, and must promote the transfer with national consensus. Unilateral enforcement of the transfer may cause serious errors and aggravate conflicts Second, ROKA's exercise of independence in operational control should take place only after gaining restraint on North Korea's attack against the South, and the issues on nuclear weapons and weapons of mass destruction(WMD) has been resolved, and a peace regime has been reached. Furthermore, exercise of independence in wartime operational control should be promoted only if there is a guarantee that international trust and the military collaboration will be restored to a level beyond the present state. Third, the USFK and the Korean-US alliance is providing South Korea with national security, not to mention tremendous diplomatical, and economical benefits However, if the alliance between the two countries become weakened due to the exercise of the independence in operational control, we might suffer a great deal of loss. Even though reasonable justification and external independence may be gained through promoting independence in operational control, it should be promoted in a longitudinal manner because national security problems and conflicts may be intensified, and there is no actual profit in doing so. Fourth, if the Korean-US alliance becomes weakened and therefore the United States decides to discuss eastern-asia strategies, North Korea deterrence strategies, and Japanese rearmament issues with other neighboring countries, South Korea may become diplomatically isolated and a subordinate to surrounding countries, destroying the independence we have now instead of restoring it Therefore searching for means to reinforce international trust and collaboration between South Korea and the United States, and leaving ROKA’s independence in operational control as a long term objective would be a more realistic method.

  • PDF

Changing Political-Economic Geography of Energy Flows Northeast Asia (변화하는 동북아시아 에너지 흐름의 정치경제지리)

  • Choi, Byung-Doo
    • Journal of the Korean association of regional geographers
    • /
    • v.12 no.4
    • /
    • pp.475-495
    • /
    • 2006
  • This paper is to analyse a changing space of energy flows in Northeast Asia from geopolitical and geoeconomic perspectives that have been recently promoted for energy security of countries in this region. The research is based on an analytical framework in an integration of political ecology and political economy. Because of an ever-increasing input of energy resources for economic growth and of dramatically increasing price of crude oil and recent instability of oil market, South Korea, China and Japan have been deeply concerned with energy security and conducted very actively geopolitical strategies. And hence the space of energy flows in the region is now in a process of dynamic reconfiguration, in which the project for development of oil and natural gas fields in East Siberia and construction of pipelines to transport them can be seen as one of competitive issues among these countries. In spite of worrying about stagflation due to rapid increase of oil price, such geo-strategies for energy security and reconfiguration of space of energy flows seem to keep the accumulation of capital in this region continue with generation of huge privatized oil companies.

  • PDF

Household food insecurity and coping strategies in a poor rural community in Malaysia

  • Shariff, Zalilah Mohd.;Khor, Geok Lin
    • Nutrition Research and Practice
    • /
    • v.2 no.1
    • /
    • pp.26-34
    • /
    • 2008
  • This cross-sectional study assessed household food insecurity among low-income rural communities and examined its association with demographic and socioeconomic factors as well as coping strategies to minimize food insecurity. Demographic, socioeconomic, expenditure and coping strategy data were collected from 200 women of poor households in a rural community in Malaysia. Households were categorized as either food secure (n=84) or food insecure (n=116) using the Radimer/Cornell Hunger and Food Insecurity instrument. T-test, Chi-square and logistic regression were utilized for comparison of factors between food secure and food insecure households and determination of factors associated with household food insecurity, respectively. More of the food insecure households were living below the poverty line, had a larger household size, more children and school-going children and mothers as housewives. As food insecure households had more school-going children, reducing expenditures on the children's education is an important strategy to reduce household expenditures. Borrowing money to buy foods, receiving foods from family members, relatives and neighbors and reducing the number of meals seemed to cushion the food insecure households from experiencing food insufficiency. Most of the food insecure households adopted the strategy on cooking whatever is available at home for their meals. The logistic regression model indicates that food insecure households were likely to have more children (OR=1.71; p<0.05) and non-working mothers (OR=6.15; p<0.05), did not own any land (OR=3.18; p<0.05) and adopted the strategy of food preparation based on whatever is available at their homes (OR=4.33; p<0.05). However, mothers who reported to borrow money to purchase food (OR=O.84; p<0.05) and households with higher incomes of fathers (OR=O.99; p<0.05) were more likely to be food secure. Understanding the factors that contribute to household food insecurity is imperative so that effective strategies could be developed and implemented.