• Title/Summary/Keyword: Security Target

Search Result 702, Processing Time 0.022 seconds

Obstacles to Accessing Finance by Small Business Operators in the Buffalo City Metropolitan Municipality

  • Chimucheka, Tendai
    • Asian Journal of Business Environment
    • /
    • v.3 no.2
    • /
    • pp.23-29
    • /
    • 2013
  • Purpose - The study investigates the obstacles faced by small business owners (SBOs) in accessing finance in the Buffalo City Metropolitan Municipality. The study aims to identify the causes of inaccessibility to finance for SBOs, investigate the role of government agencies in supporting SBOs, assess the extent to which banks support SMMEs, and suggest solutions to ease the challenge of inaccessibility of finance. Research design, data, methodology -We used a triangulation research design, wherein SMME owners and managers in the Buffalo City Metropolitan Municipality were the target population. We used simple random sampling techniques to select respondents, and conducted in-depth interviews to collect qualitative data. Results - We analyzed quantitative data using descriptive statistics, Chi-square tests, and factor analysis. The qualitative data was analyzed using content analysis. The study identifies and discusses the obstacles in accessing finance; the main among which are the lack of collateral security, poor business plans, lack of knowledge, and lack of financial deposit. Conclusions -We urge the banks, government, and government agencies to support the SMME sector, for it remains the economic engine of many African countries and helps in reducing the impact of socio-economic challenges, like unemployment and poverty.

Host-Based Malware Variants Detection Method Using Logs

  • Joe, Woo-Jin;Kim, Hyong-Shik
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.851-865
    • /
    • 2021
  • Enterprise networks in the PyeongChang Winter Olympics were hacked in February 2018. According to a domestic security company's analysis report, attackers destroyed approximately 300 hosts with the aim of interfering with the Olympics. Enterprise have no choice but to rely on digital vaccines since it is overwhelming to analyze all programs executed in the host used by ordinary users. However, traditional vaccines cannot protect the host against variant or new malware because they cannot detect intrusions without signatures for malwares. To overcome this limitation of signature-based detection, there has been much research conducted on the behavior analysis of malwares. However, since most of them rely on a sandbox where only analysis target program is running, we cannot detect malwares intruding the host where many normal programs are running. Therefore, this study proposes a method to detect malware variants in the host through logs rather than the sandbox. The proposed method extracts common behaviors from variants group and finds characteristic behaviors optimized for querying. Through experimentation on 1,584,363 logs, generated by executing 6,430 malware samples, we prove that there exist the common behaviors that variants share and we demonstrate that these behaviors can be used to detect variants.

Polymorphic Path Transferring for Secure Flow Delivery

  • Zhang, Rongbo;Li, Xin;Zhan, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2805-2826
    • /
    • 2021
  • In most cases, the routing policy of networks shows a preference for a static one-to-one mapping of communication pairs to routing paths, which offers adversaries a great advantage to conduct thorough reconnaissance and organize an effective attack in a stress-free manner. With the evolution of network intelligence, some flexible and adaptive routing policies have already proposed to intensify the network defender to turn the situation. Routing mutation is an effective strategy that can invalidate the unvarying nature of routing information that attackers have collected from exploiting the static configuration of the network. However, three constraints execute press on routing mutation deployment in practical: insufficient route mutation space, expensive control costs, and incompatibility. To enhance the availability of route mutation, we propose an OpenFlow-based route mutation technique called Polymorphic Path Transferring (PPT), which adopts a physical and virtual path segment mixed construction technique to enlarge the routing path space for elevating the security of communication. Based on the Markov Decision Process, with considering flows distribution in the network, the PPT adopts an evolution routing path scheduling algorithm with a segment path update strategy, which relieves the press on the overhead of control and incompatibility. Our analysis demonstrates that PPT can secure data delivery in the worst network environment while countering sophisticated attacks in an evasion-free manner (e.g., advanced persistent threat). Case study and experiment results show its effectiveness in proactively defending against targeted attacks and its advantage compared with previous route mutation methods.

News Article Identification Methods with Fact-Checking Guideline on Artificial Intelligence & Bigdata

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.352-359
    • /
    • 2021
  • The purpose of this study is to design and build fake news discrimination systems and methods using fact-checking guidelines. In other words, the main content of this study is the system for identifying fake news using Artificial Intelligence -based Fact-checking guidelines. Specifically planned guidelines are needed to determine fake news that is prevalent these days, and the purpose of these guidelines is fact-checking. Identifying fake news immediately after seeing a huge amount of news is inefficient in handling and ineffective in handling. For this reason, we would like to design a fake news identification system using the fact-checking guidelines to create guidelines based on pattern analysis against fake news and real news data. The model will monitor the fact-checking guideline model modeled to determine the Fact-checking target within the news article and news articles shared on social networking service sites. Through this, the model is reflected in the fact-checking guideline model by analyzing news monitoring devices that select suspicious news articles based on their user responses. The core of this research model is a fake news identification device that determines the authenticity of this suspected news article. So, we propose news article identification methods with fact-checking guideline on Artificial Intelligence & Bigdata. This study will help news subscribers determine news that is unclear in its authenticity.

Impact of Work Motivation on Satisfaction and Turnover of Public Universities Lecturers

  • PHAM, Chinh D.;HOANG, Thao P.D.;NGUYEN, Yen T.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.1135-1146
    • /
    • 2021
  • The paper aims to examine the relationship between various types of motivation and satisfaction as well as turnover intentions of public university lecturers. Intrinsic motivation is found to affect both satisfaction and turnover, while for extrinsic motivation, only one type has a significant effect on satisfaction. The web-based questionnaire with convenience sampling was chosen to approach target respondents. Data was collected by sending a link of the questionnaire to the lecturers' email. There were 700 questionnaires collected. Of which 681 valid responses, after screening out unusual questionnaires. In order to fulfill these aims, the authors employed structural equation modeling with maximum likelihood method supported by AMOS software with 681 valid samples. The evidence confirms the high correlation between intrinsic motivation and satisfaction for university lecturers which has been shown in previous studies. With regard to extrinsic motivation, extrinsic regulation (material) is found to have a positive influence on satisfaction, meaning financial rewards and job security will lead to his contentment while introjected regulation is a source of dissatisfaction. The results also demonstrate that intrinsic motivation is negatively correlated with turnover intentions. A person who is interested in the job itself is less likely to leave his or her job due to a keen passion for it.

Design and characterization of a Muon tomography system for spent nuclear fuel monitoring

  • Park, Chanwoo;Baek, Min Kyu;Kang, In-soo;Lee, Seongyeon;Chung, Heejun;Chung, Yong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.54 no.2
    • /
    • pp.601-607
    • /
    • 2022
  • In recent years, monitoring of spent nuclear fuel inside dry cask storage has become an important area of national security. Muon tomography is a useful method for monitoring spent nuclear fuel because it uses high energy muons that penetrate deep into the target material and provides a 3-D structure of the inner materials. We designed a muon tomography system consisting of four 2-D position sensitive detector and characterized and optimized the system parameters. Each detector, measuring 200 × 200 cm2, consists of a plastic scintillator, wavelength shifting (WLS) fibers and, SiPMs. The reconstructed image is obtained by extracting the intersection of the incoming and outgoing muon tracks using a Point-of-Closest-Approach (PoCA) algorithm. The Geant4 simulation was used to evaluate the performance of the muon tomography system and to optimize the design parameters including the pixel size of the muon detector, the field of view (FOV), and the distance between detectors. Based on the optimized design parameters, the spent fuel assemblies were modeled and the line profile was analyzed to conduct a feasibility study. Line profile analysis confirmed that muon tomography system can monitor nuclear spent fuel in dry storage container.

Best Practices on Validation and Extraction of Object oriented Designs with Code Visualization Tool-chain (코드 가시화 툴체인 기반 UML 설계 추출 및 검증 사례)

  • Lee, Won-Young;Kim, Robert YoungChul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.79-86
    • /
    • 2022
  • This paper focuses on realizing design improvement and high quality through visualization of reverse engineering-based software. As new technologies and complex software emerge in various areas of the fourth industry in the future, software verification with both stability and reliability is becoming an issue. We propose a reverse engineering-based UML design extraction and visualization for high-quality software ranging from simple computational software to machine learning-based data-oriented software. Through this study, it is expected to improve software quality through design improvement by checking the accuracy of the target design and identifying the code complexity.

Shielding Evaluation and Activation Analysis of Facilities by Neutron Generator for the Development of 20 Feet Container Inspection System

  • Jin-Woo Lee;Dae-Sung Choi;Gyo-Seong Jeong
    • Journal of Radiation Industry
    • /
    • v.17 no.4
    • /
    • pp.443-449
    • /
    • 2023
  • KAERI(Korea Atomic Energy Research Institute) is conducting research and development of large-scale radiation generators and the latest radiation measuring instruments. In particular, research and development of security screening equipment using an electron beam accelerator and a neutron generator is in progress recently. Globally, 20 ft containers are used to transport imports and exports, and electron beam accelerators are radiation sources to measure the shape of the material inside the container during customs inspections in each country. KAERI is developing a device that can use an electron beam accelerator and a neutron generator sequentially to grasp the shape of various materials as well as the location of the internal target material. In this study, when using the neutron generator, the radiation dose and the degree of activation by neutron for the facility and surrounding environment, facility equipment were simulated using MCNP and FISPACT code. As a result, the shielding structures inside and outside the radiation control area were satisfactory to the reference level established conservatively based on the Korean Nuclear Act.

Identifying the Facilitating Factors for Web-based Trading: A Case Study of Blockchain & Cryptocurrency

  • Sang Hoon Lee;Hyun-Seok Hwang;Su-Yeon Kim
    • Journal of Web Engineering
    • /
    • v.21 no.6
    • /
    • pp.1767-1792
    • /
    • 2022
  • Blockchain, which is spotlighted as one of the core technologies in the Web 3.0 era, is being used as a tool for high security and decentralization. In addition, blockchain has been positioned as a core technology for services such as cryptocurrency, NFT, De-Fi, and metaverse, and has already provided high-quality services. In particular, cryptocurrency has shown rapid growth and has been receiving worldwide attention. Cryptocurrency is a web technology and has the property that it can be an investment target, and it is expected to develop further in the future. In this research, we analyzed factors influencing the intention to use cryptocurrency and structural causalities among the factors. We considered personal characteristics, characteristics of cryptocurrency itself, and social characteristic, and a research model has been established for an empirical study. In addition, a multi-group analysis was performed to identify differences between users and non-users. As a result of the analysis, it was found that some of the personal characteristics and cryptocurrency characteristics affect the intention to use. And in the case of non-users, it was found that not only personal and cryptocurrency characteristics, but also social characteristic influence their intention to use. The results of this research are expected to provide implications for cryptocurrency service providers and users, as well as institutions that establish related policies.

The Problems and Improvement Measures of Protection for Politician (정치인 경호제도의 문제점 및 개선방안)

  • Jo, Sung-Gu;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.169-196
    • /
    • 2010
  • Although more priority is given to politicians from the aspect that they represent people and decide the future of country, the current situation is that politicians are not free from terrorism because of insufficient guard-concerned law, negative social recognition and increased crime and terrorism. The measure for politician terrorism shall be handled from the aspect of national security rather than public peace. For the purpose, basic legal foundation shall be prepared and specialized guard technique considering specialty of politician shall be established. Basic solution shall be established by reinforcing law against politician terrorism and establishing new law from the national viewpoint. The guard for politician has two faces that both of safety of guard target and voting intention of voter shall be met at the same time. Although special guard technique is required for guarding politician, current situation is that it is not researched professionally. In relation to the measure to develop the system of protection for politician, First, the study suggested legal foundation for politician guard. Although the 17th National Assembly proposed revised legal plan to protect politician from terrorism, it is suspended, expired and abolished now. The legal plan presented by members of the National Assembly was simply restricted to the scope of public guard. The study divided establishment of legal foundation into two things. The first one is the dispatch type of effective public guard and the second one is the transfer to private guard. Second, the study suggested environmental development method of politician guard. in the environment of politician guard, the study suggested improvement and development method by analyzing social recognition, politician's mind and voter's mind psychologically. After the beginning of human society, if human race is continued, political activity won't disappear. It is obvious that the safety of political leader is very important issue for human race because he plays the role to decide the future of human. In the future, more specialized, effective law shall be prepared and deeper study of scholar shall be performed.

  • PDF