• Title/Summary/Keyword: Security Tools

Search Result 552, Processing Time 0.029 seconds

The Importance of Multimedia for Professional Training of Future Specialists

  • Plakhotnik, Oleh;Strazhnikova, Inna;Yehorova, Inha;Semchuk, Svitlana;Tymchenko, Alla;Logvinova, Yaroslava;Kuchai, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.43-50
    • /
    • 2022
  • For high-quality education of the modern generation of students, forms of organizing the educational process and the latest methods of obtaining knowledge that differ from traditional ones are necessary. The importance of multimedia teaching tools is shown, which are promising and highly effective tools that allow the teacher not only to present an array of information in a larger volume than traditional sources of information, but also to include text, graphs, diagrams, sound, animation, video, etc. in a visually integrated form. Approaches to the classification of multimedia learning tools are revealed. Special features, advantages of multimedia, expediency of use and their disadvantages are highlighted. A comprehensive analysis of the capabilities of multimedia teaching tools gave grounds for identifying the didactic functions that they perform. Several areas of multimedia application are described. Multimedia technologies make it possible to implement several basic methods of pedagogical activity, which are traditionally divided into active and passive principles of student interaction with the computer, which are revealed in the article. Important conditions for the implementation of multimedia technologies in the educational process are indicated. The feasibility of using multimedia in education is illustrated by examples. Of particular importance in education are game forms of learning, in the implementation of which educational elements based on media material play an important role. The influence of the game on the development of attention by means of works of media culture, which are very diverse in form and character, is shown. The importance of the role of multimedia in student education is indicated. In the educational process of multimedia students, a number of educational functions are implemented, which are presented in the article. Recommendations for using multimedia are given.

A Study on the Utilization of Artificial Intelligence-Based Infringement Analysis Tools (인공지능 기반 침해분석 도구 활용에 관한 연구)

  • Yang Hwan Seok
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.3-8
    • /
    • 2024
  • Recently, in order to build a cyber threats have increased in number and complexity. These threats increase the risk of using personally owned devices for work. This research addresses how to utilize an AI-enabled breach analysis tool. To this end, we developed and proposed the feasibility of using an AI-based breach analysis tool that reduces the workload of analysts and improves analysis efficiency through automated analysis processes. This allows analysts to focus on more important tasks. The purpose of this research is to propose the development and utilization of an AI-based breach analysis tool. We propose a new research direction in the field of breach analysis and suggest that automated tools should be improved in performance, coverage, and ease of use to enable organizations to respond to cyberattacks more effectively. As a research method, we developed a breach analysis tool using A.I. technology and studied various use cases. We also evaluated the performance, coverage, and ease of use of automated tools, and conducted research on predicting and preventing breaches and automatically responding to them. As a result, this research will serve as a foundation for the development and utilization of AI-based breach analysis tools, which can be used to respond to cyberattacks more effectively through experiments.

Instrumentation Performance Measurement Technique for Evaluating Efficiency of Binary Analysis Tools (바이너리 분석도구 효율성 평가를 위한 Instrumentation 성능 측정기법)

  • Lee, Minsu;Lee, Jehyun;Kim, Hobin;Ryu, Chanho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1331-1345
    • /
    • 2017
  • Binary instrumentation has been developed for monitoring and debugging executables without their source codes. Previous efforts on the binary instrumentation are mainly focused on its capability and accuracy, but not on efficiency for practical application. In particular, criteria and measurement methodologies for evaluating and comparing the efficiency of binary investigation tools and algorithms do not estimated yet. In this paper, we propose the instrumentation primitives which are a unit functionality and measurement methodology. Through the empirical experiments by adopting the proposed methodology on DynamoRIO and Pin, we show the feasibility of the proposal.

Implementation of DevOps based Hybrid Model for Project Management and Deployment using Jenkins Automation Tool with Plugins

  • Narang, Poonam;Mittal, Pooja
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.249-259
    • /
    • 2022
  • Project management and deployment has gone through a long journey from traditional and agile to continuous integration, continuous deployment and continuous monitoring. Software industry benefited with the latest buzzword in the development process, DevOps that not only escalates software productivity but at the same time enhances software quality. But the implementation and assessment of DevOps practices is expository as there are no guidelines to assess and improvise DevOps application in software industries. Hence, there was a need to develop a hybrid model to assist software practitioners in DevOps implementation. The intention behind this paper is to implement the already proposed DevOps hybrid model using suggested tool chains including Jenkins, Selenium, GitLab, Ansible and Nagios automation tools through Jenkins project management environment and plugins. To achieve this implementation objective, a java application is developed with a web-based graphical interface. Further, in this paper, different challenges and benefits of Jenkins implementation shall also be outlined. The paper also presents the effectiveness of DevOps based Model implementation in software organizations. The impact of considering other automation tools and models can also be considered as a part of further research.

Development of Automated Risk Analysis Tools(HAWK) for Information System Environments (전산 시스템 보안을 위한 자동화 위험분석 도구 (HAWK: Hankuk risk Analysis Watch-out Kit)의 개발에 관한 연구)

  • Yoon, Jeong-Won;Shin, Soon-Ja;Kim, Ki-Su;Lee, Byung-Man;Song, Kwan-Ho
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.65-74
    • /
    • 1996
  • Risk analysis is time-consuming and expensive process〔1〕〔6〕. Automated risk analysis tools have been widely used in industry and government to support decision making process and reduce cost. However, difficulties in materializing impact of threats and fast-changing network environments make analysis process more complicated and less trusted since impacts are relative in network environments. HAWK system is developed to improve the accuracy of analysis result in network-oriented environment. It provides user-friendly environments and considers network environments as primary assets.

  • PDF

The Plan and Tools for Vulnerability Testing in Information Software-Based System

  • Kim, In-Jung;Lee, Young-Gyo;Won, Dong-Ho
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.75-78
    • /
    • 2005
  • Although many tests for stabilization of the software have been done, vulnerability test for a system run by combination of the software of various products has not been conducted enough. This has led to increased threats and vulnerability of system. Especially, web-based software system, which is public, has inherent possibility of exposure to attacks and is likely to be seriously damaged by an accident. Consequently, comprehensive and systematic test plans and techniques are required. Moreover, it is necessary to establish a procedure for managing and handling the results of vulnerability test. This paper proposes vulnerability test plans and designs for implementing automated tools, both of which can be complied with on web-based software systems.

Distance Education In Ukraine In The Context Of Modern Challenges: An Overview Of Platforms

  • Ponomarova, Halyna;Kharkivska, Alla;Petrichenko, Larisa;Shaparenko, Khrystyna;Aleksandrova, Oksana;Beskorsa, Victoria
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.39-42
    • /
    • 2021
  • The article examines the opit of foreign authors on the problem distance education, it was found that at present there are many opinions about distance and e-education, but there is no single accepted definition; clarified the definition of distance education in the framework of this work; the main tools of Internet marketing were highlighted, outlined main characteristics, as well as advantages and disadvantages; the tools of promotion on the Internet have been analyzed.

Increasing the Effectiveness of Educational Historical and Cultural Video Content on YouTube with the Help of Built-in Analytical Tools

  • Bratus, Ivan;Boiko, Vita;Zaharchuk, Oleh;Zaitseva, Veronika;Gunka, Anna;Sachok, Viktor
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.137-140
    • /
    • 2022
  • The article deals with increasing the effectiveness of educational content on the YouTube channel with the help of built-in analytics tools. Particular attention is paid to the creation of quality video, taking into account the reaction of end users of video materials. Ways to increase the video audience are considered. Techniques for improving video content apply to individual videos, as well as playlists and channels in general. In this case YouTube is both an independent educational platform and an auxiliary platform in a set of various educational solutions.

A Study on Tools for Android Malware Analysis

  • Almokhtar, Ali;Kwon, Dong-Hyun;Paek, Yun-Heung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.510-512
    • /
    • 2014
  • Malware Analysis tools are being main topic research for many mobile security companies, in this survey, we are trying to go through the most popular tools used to find out the malicious codes and suspected android programs through reverse engineering process. There are so many malware tools have been made and implemented and some of them are efficient enough and others are quite slow and consuming high processing, however we are going to compare briefly some of them.

Research on Major Weakness Rules for Secure Software Development (소프트웨어 개발 보안성 강화를 위한 주요 보안약점 진단규칙 연구)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.10
    • /
    • pp.831-840
    • /
    • 2013
  • Recently, to enhance the security of software, static analysis tools for removing weaknesses, the cause of vulnerability, have been used a lot in the software development stage. Therefore, the tools need to have the rules being able to diagnose various weaknesses. Top 5 weaknesses found in the software developed by major domestic information projects from 2011 to 2012 is 76% of top 10 weaknesses per year. Software security can be improved a lot if top 5 weaknesses just are removed properly in software development. In this paper, we propose the PMD's rules for diagnosing the major weaknesses and present the results of its performance test.