• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.025 seconds

A Study on the Strengthening of Smart Factory Security in OT (Operational Technology) Environment (OT(Operational Technology) 환경에서 스마트팩토리 보안 강화 방안에 관한 연구)

  • Young Ho Kim;Kwang-Kyu Seo
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.2
    • /
    • pp.123-128
    • /
    • 2024
  • Major countries are trying to expand the construction of smart factories by introducing ICT such as the Internet of Things, cloud, and big data into the manufacturing sector to secure national-level manufacturing competitiveness in the era of the 4th industrial revolution. In addition, Germany is pushing for Industry 4.0 to build a fully automatic production system through the Internet of Things, and China is pushing for the expansion of smart factories to enhance the country's industrial competitiveness through Made in China 2025, Japan's intelligent manufacturing system, and the Korean government's manufacturing innovation 3.0. In this study, considering the increasing security connectivity of smart factories, we would like to identify security threats in the external connection part of smart factories and suggest security enhancement measures based on domestic and international standard security models to respond to the identified security threats. Eventually the proposed method can be applied by accurately identifying the smart factory security status, diagnosing vulnerabilities, establishing appropriate improvement plans, and expanding security strategies to respond to security threats.

  • PDF

A Study on Zero Trust Building Process (제로 트러스트 구축 프로세스에 관한 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.464-466
    • /
    • 2021
  • Currently, most companies have security solutions such as firewalls or WAF (Web Application Firewall) for web services, cloud systems, and data centers. Recently, as the need for remote access increases, the task of overcoming the security vulnerabilities of remote access control is becoming more important. In this paper, the concept of the network security model from the perspective of zero trust and the strategy and security system using it will be reviewed.

  • PDF

The Strategies for the Development of the Security Industry Utilzing Social Network Services (경호경비산업의 발전을 위한 사회연결망서비스 활용전략)

  • Kim, Doo-Han;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.7-30
    • /
    • 2016
  • This study found the strategies for activating the security industry to utilize social network services based on the platform business model. This research was utilized for in-depth interview and IPA analysis. And use it was to check the contents and strategic improvement projects that can actually materialize and direction of the strategy. First, run a priority need area is a private center of community policing related portal development and operation, universal social networking service(SNS) utilizing expanded, professional training, IT-based security content management and operation of IT infrastructure security guards and security professionals up educational content development, online security guards and security professionals-up refresher training program development. Second, the area over the inventory capabilities increase the effectiveness of the security guards was constructed open-type comprehensive public information system. Third, the area needed to be reviewed are the individual security industry experts workers operating information channels, dedicated customer service and expanding the event of a private security guard & security service providers up. Fourth, the effectiveness of the insufficient area are discuss system improvements, the sharing of community policing closed Cameras for proposals for the expanded utilization of social networking services, private development organizations Social Network Service(SNS).

  • PDF

Experiences of Special Education Teachers in Dealing with Behavioral Problems Presented by Students with Disabilities

  • Alhwaiti, Mohammed M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.129-134
    • /
    • 2022
  • The primary goal of any classroom is effective teaching and student learning, with an emphasis on changing negative students' behaviors into positive ones. This change can occur when students' behavior is always at the forefront of teachers' educational goals. The current study aimed to reveal the experiences of special education teachers in dealing with the behavioral problems that students with disabilities show by identifying behavioral problems among students with disabilities and investigating the efficacy of the application of behavior modification plans and strategies designed to address the behavioral problems presented by students with disabilities. The researcher used a qualitative phenomenological approach, and the study tool consisted of semi-structured interviews that consisted of (13) questions directed to (10) special education male and female teachers who work in special education centres and institutes. The data were analyzed using the thematic analysis method. The findings of the study showed that the most undesirable behaviors prevalent among students with disabilities in the classroom were aggression, bullying and ADHD. The actions taken by teachers in confronting these behaviors were not systematic and were carried out randomly, as no behavior modification plans were applied. The most important strategies used by teachers in facing behavioral problems were applied behavioral analysis (ABA) strategies such as reinforcement, punishment and ignoring. The results have many important implications for future practice, including the need to conduct practical training courses for special education teachers to implement behavior modification plans and develop methods of measuring inappropriate behavior.

Knowledge Assessment of Teachers of Students with Autism Spectrum Disorder from Applied Behaviour Analysis Perspective

  • Saigh, Budor H.;Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.288-294
    • /
    • 2022
  • This study aims to assess the knowledge of teachers working with students with autism spectrum disorder (ASD) regarding applied behaviour analysis (ABA). The study was concerned with teachers' knowledge of ABA, its application in the classroom, barriers to its use and desired training opportunities and/or resources to enhance teacher application of ABA strategies in the classroom. Data were collected via an online survey completed by 190 teachers with students diagnosed with ASD in British schools. The results revealed overall knowledge of ABA strategies for classrooms, with only some teachers uninformed about the broad use and some key elements, and general familiarity with skills crucial for applying ABA. Actual knowledge of ABA was found to be high. In terms of application of ABA, the majority of the teachers employed a wide range of known strategies. A number of barrier to the application of ABA were noted including a lack of knowledge and training, a lack of administrative support and a lack of time and physical resources. Theoretical knowledge is crucial for practical applications; however, practical training was found to be important to ensure intervention efficacy.

European Experience in Implementing Innovative Educational Technologies in the Training of Management Specialists: Current Problems and Prospects for Improvement

  • Tatiana, Voropayeva;Marina, Jarvis;Svitlana, Boiko;Hanna, Tolchieva;Nataliia, Statsenko
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.294-300
    • /
    • 2022
  • The article highlights the European experience of innovative educational technologies of training management specialists. Based on existing strategies, relevant in the European educational space, the introduction of regulatory elements to maintain a balance between the traditional and innovative format of the educational process, which is typical for the Ukrainian education system is proposed. The article aims to single out educational and technological innovations into a separate cluster of managerial training at different levels in the context of the principles of the modern synergetic sociocultural paradigm. The main objectives of the work are to develop settings to ensure the effective functioning of innovative educational technologies. Among the synergetic principles of educational technologies, providing the formation of necessary competencies of future managers, are: self-organization, interdisciplinarity, nonlinearity, individuality, and technologization. The methods used in the scientific study can be attributed to the group of scientific synergetic methodology. So, the training of specialists in management, implemented in the European practice assumes the use of new educational strategies. These technologies provide both the necessary skills of different levels (hard-soft-digital skills) and the observance of value components (solidarity, ethics, inclusiveness, openness).

Effect of Potential Model Pruning on Official-Sized Board in Monte-Carlo GO

  • Oshima-So, Makoto
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.54-60
    • /
    • 2021
  • Monte-Carlo GO is a computer GO program that is sufficiently competent without using knowledge expressions of IGO. Although it is computationally intensive, the computational complexity can be reduced by properly pruning the IGO game tree. Here, I achieve this by using a potential model based on the knowledge expressions of IGO. The potential model treats GO stones as potentials. A specific potential distribution on the GO board results from a unique arrangement of stones on the board. Pruning using the potential model categorizes legal moves into effective and ineffective moves in accordance with the potential threshold. Here, certain pruning strategies based on potentials and potential gradients are experimentally evaluated. For different-sized boards, including an official-sized board, the effects of pruning strategies are evaluated in terms of their robustness. I successfully demonstrate pruning using a potential model to reduce the computational complexity of GO as well as the robustness of this effect across different-sized boards.

Challenges Experienced Use of Distance-Learning by High School Teachers Responses to Students with Depression

  • Almaleki, Deyab A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.192-198
    • /
    • 2021
  • Trustless, depression, happiness is a normal human emotion that everyone experiences at times. People face problems and hard circumstances every day due to an environment, social life, or traumatic developments in their lives. This study focused on a particular type of inconsistency patterns of behavior that experiences' students during the school time. Some students find depression interferes with their learning and test taking to such an extent that their grades are seriously affected. This study examined the awareness and readiness of a sample of Saudi Arabian high school teachers to recognize, understand, and respond to the ways in which students may respond to testing situations with depression. Findings suggest teachers learn from experience to use both direct and indirect ways to identify students with depression; employ test preparation and test taking strategies to help students reduce depression; and reach out to parents for additional assistance where teacher strategies are not sufficient.

Resource Management Strategies in Fog Computing Environment -A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.310-328
    • /
    • 2022
  • Internet of things (IoT) has emerged as the most popular technique that facilitates enhancing humans' quality of life. However, most time sensitive IoT applications require quick response time. So, processing these IoT applications in cloud servers may not be effective. Therefore, fog computing has emerged as a promising solution that addresses the problem of managing large data bandwidth requirements of devices and quick response time. This technology has resulted in processing a large amount of data near the data source compared to the cloud. However, efficient management of computing resources involving balancing workload, allocating resources, provisioning resources, and scheduling tasks is one primary consideration for effective computing-based solutions, specifically for time-sensitive applications. This paper provides a comprehensive review of the source management strategies considering resource limitations, heterogeneity, unpredicted traffic in the fog computing environment. It presents recent developments in the resource management field of the fog computing environment. It also presents significant management issues such as resource allocation, resource provisioning, resource scheduling, task offloading, etc. Related studies are compared indifferent mentions to provide promising directions of future research by fellow researchers in the field.

A New Sort of Study upon Devices Life Span Advancement Techniques with Wireless Sensor Communities

  • KRISHNA, KONDA HARI;NAGPAL, TAPSI;BABU, Y. SURESH
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.51-56
    • /
    • 2022
  • In the previous years, Wireless Sensor Networks (WSNs) have increased expanding consideration from both the clients and scientists. It is utilized as a part of different fields which incorporate ecological, social insurance, military and other business applications. Sensor hubs are battery fueled so vitality imperatives on hubs are extremely strict. At the point when battery gets released, sensor hub will get detached from remaining system. This outcomes in connection disappointment and information misfortune. In a few applications battery substitution is likewise impractical. Consequently, vitality proficient strategies ought to be outlined which will upgrade lifetime of system and precise information exchange. In this paper, diverse wellsprings of vitality dissemination are recorded trailed by vitality effective systems to improve lifetime of the system.