• 제목/요약/키워드: Security Strategies

Search Result 620, Processing Time 0.032 seconds

TinyECCK : Efficient Implementation of Elliptic Curve Cryptosystem over GF$(2^m)$ on 8-bit Micaz Mote (TinyECCK : 8 비트 Micaz 모트에서 GF$(2^m)$상의 효율적인 타원곡선 암호 시스템 구현)

  • Seo, Seog-Chung;Han, Dong-Guk;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.9-21
    • /
    • 2008
  • In this paper, we revisit a generally accepted opinion: implementing Elliptic Curve Cryptosystem (ECC) over GF$(2^m)$ on sensor motes using small word size is not appropriate because partial XOR multiplication over GF$(2^m)$ is not efficiently supported by current low-powered microprocessors. Although there are some implementations over GF$(2^m)$ on sensor motes, their performances are not satisfactory enough due to the redundant memory accesses that result in inefficient field multiplication and reduction. Therefore, we propose some techniques for reducing unnecessary memory access instructions. With the proposed strategies, the running time of field multiplication and reduction over GF$(2^{163})$ can be decreased by 21.1% and 24.7%, respectively. These savings noticeably decrease execution times spent in Elliptic Curve Digital Signature Algorithm (ECDSA) operations (Signing and verification) by around $15{\sim}19%$.

The Influence on the Information Security Stressor on Information Security Compliance Intention : Focusing on the Moderation of Authentic Leadership (정보보안 스트레서가 정보보안 준수 의도에 미치는 영향: 진성 리더십의 조절 효과 중심)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1101-1112
    • /
    • 2021
  • Organizations continue to increase investment in information security(IS) policies and technologies to prevent external intrusion and internal exposure to information assets. However, as the organization's regulations and behavioral requirements for strict IS policy increase, employees may induce negative behaviors through IS-related stress. The purpose of this study is to suggest the effects of challenge and hindrance stressors on IS compliance intentions and to confirm how authentic leadership moderates the positive and negative effects of stressors. We reflected employees of the organization who are applying IS policy to their work as a study target and applied a survey to obtain a sample for research hypothesis verification. As a result of analysis through structural equation modeling, challenge and hindrance stressors affected IS compliance intentions, and authentic leadership moderated the effects of stressors on compliance intention. Our research helps to establish insiders support strategies to achieve internal IS goals, because the results suggested stressor conditions and leaders' behavioral directions that influence employees IS compliance behavior.

Vulnerability Analysis for Industrial Control System Cyber Security (산업제어시스템의 사이버보안을 위한 취약점 분석)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.137-142
    • /
    • 2014
  • Industrial control system (ICS) is a computer based system which are typically used in nation-wide critical infra-structure facilities such as electrical, gas, water, wastewater, oil and transportation. In addition, ICS is essentially used in industrial application domain to effectively monitor and control the remotely scattered systems. The highly developed information technology (IT) and related network techniques are continually adapted into domains of industrial control system. However, industrial control system is confronted significant side-effects, which ICS is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in industrial control system. The vulnerabilities that may be found in typical ICS are grouped into Policy and Procedure, Platform, and Network categories to assist in determining optimal mitigation strategies. The order of these vulnerabilities does not necessarily reflect any priority in terms of likelihood of occurrence or severity of impact. Firstly, corporate security policy can reduce vulnerabilities by mandating conduct such as password usage and maintenance or requirements for connecting modems to ICS. Secondly, platfom vulnerabilities can be mitigated through various security controls, such as OS and application patching, physical access control, and security software. Thirdly, network vulnerabilities can be eliminated or mitigated through various security controls, such as defense-in-depth network design, encrypting network communication, restricting network traffic flows, and providing physical access control for network components.

Study on Method to Develop Case-based Security Threat Scenario for Cybersecurity Training in ICS Environment (ICS 환경에서의 사이버보안 훈련을 위한 사례 기반 보안 위협 시나리오 개발 방법론 연구)

  • GyuHyun Jeon;Kwangsoo Kim;Jaesik Kang;Seungwoon Lee;Jung Taek Seo
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.91-105
    • /
    • 2024
  • As the number of cases of applying IT systems to the existing isolated ICS (Industrial Control System) network environment continues to increase, security threats in the ICS environment have rapidly increased. Security threat scenarios help to design security strategies in cybersecurity training, including analysis, prediction, and response to cyberattacks. For successful cybersecurity training, research is needed to develop valid and reliable security threat scenarios for meaningful training. Therefore, this paper proposes a case-based security threat scenario development methodology for cybersecurity training in the ICS environment. To this end, we develop a methodology consisting of five steps based on analyzing actual cybersecurity incident cases targeting ICS. Threat techniques are standardized in the same form using objective data based on the MITER ATT&CK framework, and then a list of CVEs and CWEs corresponding to the threat technique is identified. Additionally, it analyzes and identifies vulnerable functions in programming used in CWE and ICS assets. Based on the data generated up to the previous stage, develop security threat scenarios for cybersecurity training for new ICS. As a result of verification through a comparative analysis between the proposed methodology and existing research confirmed that the proposed method was more effective than the existing method regarding scenario validity, appropriateness of evidence, and development of various scenarios.

  • PDF

Feeding the extra billions: strategies to improve crops and enhance future food security

  • Stamm, Petra;Ramamoorthy, Rengasamy;Kumar, Prakash P.
    • Plant Biotechnology Reports
    • /
    • v.5 no.2
    • /
    • pp.107-120
    • /
    • 2011
  • The ability to feed an expanding world population poses one of the greatest challenges to mankind in the future. Accompanying the increased demand for food by the expected nine billion inhabitants of Earth in 2050 will be a continual decrease in arable land area, together with a decline in crop yield due to a variety of stresses. For these formidable challenges to be met, future crops should not only by high-yielding, but also stress-tolerant and disease-resistant. In this review, we highlight the importance of genetic engineering as an indispensable tool to generate just such future crops. We briefly discuss strategies and available tools for biotechnological crop improvement and identify selected examples of candidate genes that may be manipulated so that current biological maxima in yield may be surpassed by comfortable margins. Future prospects and the necessity for basic research aimed at identifying novel target genes are also discussed.

Modeling and Stimulating Node Cooperation in Wireless Ad Hoc Networks

  • Arghavani, Abbas;Arghavani, Mahdi;Sargazi, Abolfazl;Ahmadi, Mahmood
    • ETRI Journal
    • /
    • v.37 no.1
    • /
    • pp.77-87
    • /
    • 2015
  • In wireless networks, cooperation is necessary for many protocols, such as routing, clock synchronization, and security. It is known that cooperator nodes suffer greatly from problems such as increasing energy consumption. Therefore, rational nodes have no incentive to cooperatively forward traffic for others. A rational node is different from a malicious node. It is a node that makes the best decision in each state (cooperate or non-cooperate). In this paper, game theory is used to analyze the cooperation between nodes. An evolutionary game has been investigated using two nodes, and their strategies have been compared to find the best one. Subsequently, two approaches, one based on a genetic algorithm (GA) and the other on learning automata (LA), are presented to incite nodes for cooperating in a noisy environment. As you will see later, the GA strategy is able to disable the effect of noise by using a big enough chromosome; however, it cannot persuade nodes to cooperate in a noisefree environment. Unlike the GA strategy, the LA strategy shows good results in a noise-free environment because it has good agreement in cooperation-based strategies in both types of environment (noise-free and noisy).

A Conceptual Study on Outsourcing Strategy in Betel Industry (관광호텔 아웃소싱 전략에 관한 개념적 고찰)

  • 정연홍;하용규
    • Culinary science and hospitality research
    • /
    • v.8 no.3
    • /
    • pp.123-146
    • /
    • 2002
  • Outsourcing is procuring of outside resources, other than core resources for core competence, by a contract, from which a corporate can focus its core resources on core business. The outsourcing strategies of Korea tourist hotel business are in a rudimentary stage, which has been limited in simple work areas such as housekeeping services, room maid services, parking control services, security services, janitor services, laundry services, facility management, shuttle bus services, and sterilization services and their purposes are mainly to retrench a burden of employment or firm-fixed expenses. Therefore, the outsourcing strategies of Korea tourist hotel business have the following problems. First, their outsourcing has introduced only for the purpose of retrenching expenses. Second, it tends to deteriorate service quality, due to lack of pre-training. Third, it tends to concentrate their attentions only on simple repetition works. Fourth, their outsourcing is slow adjusted to the needs of business cultures. Outsourcing services in Korea tourist hotel business have never contributed to their basic concepts such as 1) maintenance or enhancement of core competences, 2) promotion of business efficiency through service quality improvement and expense retrenchment, and 3) achievement or enhancement of competitive advantage through enlarging their specialties, cultivating their market, learning new knowledge, and developing their asset. Therefore, this study is to insist on fife necessity of overcoming simple repetitive service outsourcing in tourist hotel business. In order to build a core competence and/or achieve a competitive advantage, the scopes of outsourcing services should be enlarged in Korea tourist hotel business.

  • PDF

A Qualitative Study on Successful Aging and Optimization by Selection and Compensation Strategy: Focusing on the Social Activity Elderly Participants (성공적 노화와 선택과 보상 책략에 의한 최적화의 질적 연구: 사회 활동 참여 노인을 중심으로)

  • Cho, Yoon-Joo
    • Journal of the Korean Home Economics Association
    • /
    • v.48 no.6
    • /
    • pp.133-147
    • /
    • 2010
  • This study aimed to identify the dimensions of successful aging, as perceived by elderly Koreans, and to test qualitatively the elders' optimization of selection and compensation strategies in a social activity context. The results were as follows: First, the most important part of life fulfillment and regret was family and work. Second, social activity played a role in self-actualization and physiological needs. Moreover, it contributed to the elders' physical and mental health maintenance. Third, the elderly effectively participated in social activities by optimizing their selection and compensation strategies. Fourth, the elderly realized they are growing old, but considered it as a natural process. In addition, some participants suggested retirement age should be raised, but others were against this idea. Finally, elders thought successful aging means having a sufficient and independent life in old age. Thus, the elderly required good health, economic security, and a positive attitude for aging successfully.

Cervical Cancer Trends in Mexico: Incidence, Mortality and Research Output

  • Anaya-Ruiz, Maricruz;Vincent, Ana Karen;Perez-Santos, Martin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.20
    • /
    • pp.8689-8692
    • /
    • 2014
  • Purpose: To evaluate the recent incidence and mortality of and scientific research trends in cervical cancer in Mexican females. Materials and Methods: Data between 2000 and 2010 from the Department of Epidemiology of the Ministry of Health, and International Agency for Research on Cancer (IARC) of World Health Organization were analyzed, and age-standardized rates (ASRs) were calculated. In addition, scientific research data were retrieved from the Web of Science database from 2003 to 2012, using different terms related to cervical cancer. Results: The incidence rate decreased during last five years, while mortality rates showed an annual decrease of 4.93%. A total of 780 articles were retrieved, and the institutions with the majority of publications were National Autonomous University of Mexico (34.87%), Social Security Mexican Institute (16.02%), and National Institute of Cancerology (15%). The main types of research were treatment, diagnosis, and prevention. Conclusions: The above results show that incidence of cervical cancer decreased over time in Mexico during last five years; similarly, the downturn observed in mortality mainly reflects improved survival as a result of earlier diagnosis and cancer treatment. Also, this article demonstrates the usefulness of bibliometrics to address key evaluation questions and to establish priorities, define future areas of research, and develop cervical cancer control strategies in Mexico.

Purchase Satisfaction of Apparel for Internet Fashion Shopping Mall Users - focused on 20's~30's Men and Women (인터넷 패션 쇼핑몰 이용자의 의류구매 만족도 -20~30대 남녀를 중심으로-)

  • 신수연;김민정
    • The Research Journal of the Costume Culture
    • /
    • v.11 no.4
    • /
    • pp.487-499
    • /
    • 2003
  • The purpose of this study was to suggest marketing strategies to internet fashion shopping malls identifying factors that customers consider important. Data were collected by survey questionnaire and the subjects were 322 men and women in their twenties and thirties living in Seoul and Kyung-gi. SPSS 10.0 package were used and reliability, frequency, cross tabulation, chi-square, paired t-test, ANOV A and Duncan test were conducted for data analysis. The results were as follows. I) Subjects placed the most importance on providing the precise and detail information of products but its satisfaction level was low. 2) Subjects considered the ‘low price’ very importantly but its satisfaction level of it was not high. 3) Subject's importance and satisfaction level of ‘point system’ were about an average. 'Point system' has to be activated by using systems such as 'point network system' by pointbanking co. as one of price-cutting strategies. 4) Internet fashion shopping mall users treated 'the security system of personal data' importantly while they were not sufficiently satisfied with the system. 5) Female placed more importance on design and color of products and suppliance of the trendy items.

  • PDF