• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.036 seconds

A Way of Securing the Access By Using PCA (주성분분석(PCA)을 이용한 출입인원관리에 대한 보안성 확보 방안)

  • Kim, Min-Su;Lee, Dong-Hwi
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.3-10
    • /
    • 2012
  • This study aimed at making a way of securing the access by using PCA. We got our result through using Box-Plot and PCA with the access data of the area of security level A~E at K(IPS)center. In order to perform PCA, We confirmed the extracted value of commonality has no problem in performing PCA because VIF is below 2.902. Based on this result, We classified people into Green-list, Blue-list, Red-list, and Black-list in a standard of security level with 1.453, as the eigen value of 1 main element, 1.283, as eigen value of 2 main elementm, 1.142, as the eigen value of 3 main element.

Obliquely incident earthquake for soil-structure interaction in layered half space

  • Zhao, Mi;Gao, Zhidong;Wang, Litao;Du, Xiuli;Huang, Jingqi;Li, Yang
    • Earthquakes and Structures
    • /
    • v.13 no.6
    • /
    • pp.573-588
    • /
    • 2017
  • The earthquake input is required when the soil-structure interaction (SSI) analysis is performed by the direct finite element method. In this paper, the earthquake is considered as the obliquely incident plane body wave arising from the truncated linearly elastic layered half space. An earthquake input method is developed for the time-domain three-dimensional SSI analysis. It consists of a new site response analysis method for free field and the viscous-spring artificial boundary condition for scattered field. The proposed earthquake input method can be implemented in the process of building finite element model of commercial software. It can result in the highly accurate solution by using a relatively small SSI model. The initial condition is considered for the nonlinear SSI analysis. The Daikai subway station is analyzed as an example. The effectiveness of the proposed earthquake input method is verified. The effect of the obliquely incident earthquake is studied.

Experimental validation of a nuclear forensics methodology for source reactor-type discrimination of chemically separated plutonium

  • Osborn, Jeremy M.;Glennon, Kevin J.;Kitcher, Evans D.;Burns, Jonathan D.;Folden, Charles M. III;Chirayath, Sunil S.
    • Nuclear Engineering and Technology
    • /
    • v.51 no.2
    • /
    • pp.384-393
    • /
    • 2019
  • An experimental validation of a nuclear forensics methodology for the source reactor-type discrimination of separated weapons-useable plutonium is presented. The methodology uses measured values of intra-element isotope ratios of plutonium and fission product contaminants. MCNP radiation transport codes were used for various reactor core modeling and fuel burnup simulations. A reactor-dependent library of intra-element isotope ratio values as a function of burnup and time since irradiation was created from the simulation results. The experimental validation of the methodology was achieved by performing two low-burnup experimental irradiations, resulting in distinct fuel samples containing sub-milligram quantities of weapons-useable plutonium. The irradiated samples were subjected to gamma and mass spectrometry to measure several intra-element isotope ratios. For each reactor in the library, a maximum likelihood calculation was utilized to compare the measured and simulated intra-element isotope ratio values, producing a likelihood value which is proportional to the probability of observing the measured ratio values, given a particular reactor in the library. The measured intra-element isotope ratio values of both irradiated samples and its comparison with the simulation predictions using maximum likelihood analyses are presented. The analyses validate the nuclear forensics methodology developed.

Cost Risk Analysis for Preparing Budgets of Information Security using Fuzzy AHP (정보보안 예산 수립에서 퍼지 AHP의 적용을 통한 위험 비용 분석)

  • Ryu, Si-Wook;Her, Duk-Gyu
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.3
    • /
    • pp.119-126
    • /
    • 2012
  • Recently, the breakdown of online banking servers and the leakage of customer information give rise to much concern about the security of information systems in financial and banking companies in Korea. The enforcement of security for information system becomes much more important issue than earlier. However, the security reinforcement of information system is restricted by a budget. In addition, the activities' cost to secure information system from threatening are under uncertain circumstances and should be established by a human decision maker who is basically uncertain and vague. Thus, making the budget for information system is exposed to any extent of the risk for these reasons. First, we introduce brief fuzzy set theory and fuzzy AHP (Analytic Hierarchy Process) methodology. Then, the cost elements that comprise yearly budget are presented and the priorities among the cost elements are calculated by fuzzy AHP. The cost elements that are exposed to risk are evaluated from the both perspectives of the risk impact and risk occurrence possibility which are expressed as linguistic terms. To get information on the risk profiles-pessimistic, most likely, and optimistic-for each cost element, the evaluation is accomplished and the result is presented. At last, the budget ranges-minimum, mode, maximum-for each cost element are estimated with the consideration of the risk profiles.

A Study on the Factors Affecting the Information Systems Security Effectiveness of Password (패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.

Privacy-Preserving Kth Element Score over Vertically Partitioned Data on Multi-Party (다자 간 환경에서 수직 분할된 데이터에서 프라이버시 보존 k번째 항목의 score 계산)

  • Hong, Jun Hee;Jung, Jay Yeol;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1079-1090
    • /
    • 2014
  • Data mining is a technique to get the useful information that can be utilized for marketing and pattern analysis by processing the data that we have. However, when we use this technique, data provider's personal data can be leaked by accident. To protect these data from leakage, there were several techniques have been studied to preserve privacy. Vertically partitioned data is a state called that the data is separately provided to various number of user. On these vertically partitioned data, there was some methods developed to distinguishing kth element and (k+1) th element by using score. However, in previous method, we can only use on two-party case, so in this paper, we propose the extended technique by using paillier cryptosystem which can use on multi-party case.

Fiber Optic Security System based on Multimode Fiber (광파이비를 이용한 침입자 감시시스템)

  • Kim, Y.H.;Kim, I.S.;Park, H.S.;Oh, S.K.
    • Proceedings of the KIEE Conference
    • /
    • 1997.07e
    • /
    • pp.1887-1889
    • /
    • 1997
  • This paper reports the principle, design, configuration, and test results of the fiber optic security system using multimode fiber. In this system, optical fiber works as a sensing element. The length of sensing element may be from several meters to several killometers. Physical principle of this system is the dependence of interferometric pattern on the end of the fiber on mechanical perturbation in the area, where this fiber is situated. Near and far field patterns of the output light for multimode fiber are speckle pattern. A number of speckles on the fiber depends on mode numbers. Light intensity in each point of the fiber end depends on phase difference of modes. Finally we introduced a "Fiber Optic Security System based on Multimode" Fiber which we developed, it may be available in the field of the important area and building.

  • PDF

Effects of Information Security Education on the Practice of Information Security for the Youth (정보보호 교육이 청소년의 정보보호 실천에 미치는 영향)

  • Kang, Min-Seong;Kim, Tae-Sung;Kim, Taek-Young
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.2
    • /
    • pp.27-40
    • /
    • 2019
  • As reliance on information and communication becomes widespread, a variety of information dysfunctions such as hacking, viruses, and the infringement of personal information are also occurring. Korean adolescents are especially exposed to an environment in which they are experiencing information dysfunction. In addition, youth cybercrimes are steadily occurring. To prevent cybercrime and the damage caused by information dysfunction, information security practices are essential. Accordingly, the purpose of this study is to discuss the factors affecting the information security practices of Korean youths, considering information security education, perceived severity, and perceived vulnerability as leading factors of the theory of planned behavior. A questionnaire survey was administered to 118 middle and high school students. Results of the hypothesis test show that information security education affects perceived behavior control, and perceived severity affects attitude. Subjective norms, information security attitudes, and perceived behavioral control were found to influence adolescents' practices of information security. However, perceived vulnerabilities did not affect youths' information security attitudes. This study confirms that information security education can help youths to practice information security. In other words, information security education is important, and it is a necessary element in the information curriculum of contemporary youth. However, perceived vulnerability to youth information security threats did not affect information security attitudes. Consequently, we suggest that it is necessary to strengthen the contents of the information security education for Korean youths.

A Development of the Model for Evaluating the Security of Information Systems in Health Care Organizations (의료기관의 정보보안 수준 측정을 위한 평가모형 개발)

  • Ahn, Sun-Ju;Kwon, Soon-Man
    • Korea Journal of Hospital Management
    • /
    • v.10 no.4
    • /
    • pp.98-112
    • /
    • 2005
  • The purpose of this study is to develop a framework for evaluating security levels in hospitals. We classify security indicators into administrative, technical and physical safeguards. The security evaluation model for hospital information systems was applied to three general hospitals. The analysis of the results showed a low security level in information systems. In particular, requirements for administrative and physical safeguards were very low. Hospitals need strict security policies more than other organizations because their information systems contain patients' highly confidential data. The evaluation model developed in this study can be used for guidelines and as a checklist for hospitals. The security evaluation in hospital informational systems needs to be an essential element of hospital evaluation.

  • PDF

A Study on the Effects for the Job Satisfaction in the Special Duty of the Private Security (특수경비원의 직무만족 영향요인에 관한 연구)

  • Ahn, Hwang-Kwon
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.213-231
    • /
    • 2004
  • This paper is concerned with the influence in the job satisfaction by the organization, the job specialty and the self-devotion in the special duty of private security. Today's society is required more intensive security in the diversity, the complexity and the uncertainty, but the public security service could not supply enough for what the society requires. In this circumstance more specialized and special trained security services are demanded from private security industry. With the concerns, this study is based on actual survey. The study is telling us that there is much relationship in job satisfaction between each element. Which means that 1) there is some different from personality, 2) there is much influence in self-devotion by job specialty, 3) there some effectiveness in job satisfaction by job specialty, 4) there is some influence in job satisfaction by self-devotion, and 5) job satisfaction is affected by job specialty and self-devotion.

  • PDF