• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.023 seconds

Design of Window Applicable Blind-type Frequency Selective Surface

  • Lee, In-Gon;Hong, Ic-Pyo
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.682-685
    • /
    • 2014
  • In this paper, we presented the window applicable blind-type frequency selective surface to control the coverage area of wireless communication in secure building or conference room. The proposed frequency selective structure has the reconfigurable frequency range depends on its blind rotation angle. To verify the proposed structure, we fabricated the window blind-type frequency selective surface with four-legged loaded element and ring-type element as a unit cell and performed measurements of the transmission characteristics for different blind rotation angles to prove the feasibility. The measurement results show good agreements with the simulation results. One of the advantages is that the proposed structure does not need to have a bias circuit, so it is very easy to implement at low cost and also can be applied to any planar surface for wireless security applications.

Design and Optimization of Four Element Triangular Dielectric Resonator Antenna using PSO Algorithm for Wireless Applications

  • Dasi swathi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.67-72
    • /
    • 2023
  • This paper portrays the design and optimization of a wideband four element triangular dielectric resonator antenna (TDRA) using PSO. The proposed antenna's radiation characteristics were extracted using Ansoft HFSS software. At a resonant frequency of 5-7 GHz, the four element antenna provides nearly 21 percent bandwidth and the optimized gives 5.82 dBi peak gain. The radiation patterns symmetry and uniformity are maintained throughout the operating bandwidth. for WLAN (IEEE 802.16) and WiMAX applications, the proposed antenna exhibits a consistent symmetric monopole type radiation pattern with low cross polarisation. The proposed antenna's performance was compared to that of other dielectric resonator antenna (DRA) shapes, and it was discovered that the TDRA uses a lot less radiation area to provide better performance than other DRA shapes and PSO optimized antenna increases the gain of the antenna

A Study for Influencing Factors of Organizational Performance: The Perspective of the Mediating Effect of Information Security Maturity Level (조직성과에 미치는 영향요인에 관한 연구: 정보보호 성숙도의 매개효과를 중심으로)

  • Park, Jeong Kuk;Kim, Injai
    • The Journal of Information Systems
    • /
    • v.23 no.3
    • /
    • pp.99-125
    • /
    • 2014
  • Internet environment and innovative ICT(information and communication technology) have brought about big changes to our lifestyle and industrial structure. In spite of the convenience of Internet, various cyber incidents such as malicious code infection, personal information leakage, smishing(sms + phishing), and pharming have frequently occurred. Information security must be recognized as a key and compulsory element for surviving in a global economy. Strategic roles of information security have recently been increasing, but effective implementation of information security is still a major challenge to organizations. Our study examines the influencing factors of information security and investigates the causal relationship between information security maturity level and organizational performance through an empirical survey. According to the results of our study, personal, organizational, technical, and social factors affect organizations's information security maturity level altogether. This result suggests that when dealing with security issues, the holistic and multi-disciplinary approaches should be required. In addition, there is a causal relationship between information security maturity level and organizational performance, and organizations aim to establish the efficient and effective ways to enhance information security maturity level on the basis of the results of this study.

A Comparative Study on Type Approval of Maritime Cyber Security and RMF in the View of System Development Lifecycle (개발 전주기 사이버보안 관점에서의 해상 사이버보안 형식 승인과 RMF 비교 연구)

  • Lee, Suwon;Hwang, Seyoung;Hong, Jina;Kim, Byeong-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.279-287
    • /
    • 2022
  • With the advancement of cyber threats and the development of hacking technologies, cyber security is being emphasized in various fields such as automobiles and ships. According to this trend, various industrial fields are demanding cybersecurity, and related certifications. In this paper, cybersecurity type approval is compared with the RMF stage under the premise that there are common elements with RMF in that cybersecurity elements must be reflected in the entire system development cycle. For comparison, type approval of maritime cyber security of the Korean Register of Shipping was selected. In conclusion, although type approval of maritime cyber security acquisition procedure is not divided by development stage like the RMF, there are the commonalities in the procedure to apply the cybersecurity element to the System development lifecycle like the RMF. Accordingly, the possibility of determining that the cybersecurity element was applied to the entire development cycle was confirmed.

Defense Strategy of Network Security based on Dynamic Classification

  • Wei, Jinxia;Zhang, Ru;Liu, Jianyi;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5116-5134
    • /
    • 2015
  • In this paper, due to the network security defense is mainly static defense, a dynamic classification network security defense strategy model is proposed by analyzing the security situation of complex computer network. According to the network security impact parameters, eight security elements and classification standard are obtained. At the same time, the dynamic classification algorithm based on fuzzy theory is also presented. The experimental analysis results show that the proposed model and algorithm are feasible and effective. The model is a good way to solve a safety problem that the static defense cannot cope with tactics and lack of dynamic change.

Estimating Direct Costs of Enterprises by Personal Information Security Breaches (개인정보 유.노출 사고로 인한 기업의 손실비용 추정)

  • Yoo, Jin-Ho;Jie, Sang-Ho;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.63-75
    • /
    • 2009
  • Recently personal information security breaches by unauthorised access, mistakenly disclosure or stolen become more frequent and the scale of the economic loss of such incidents is growing. Assessing economic loss of personal information security breaches is needed for decision making of information security investment This paper presents a framework to analyze economic impact of personal information security breaches and develops formula for each element to empirically calculate the economic loss. We also compared annual economic loss of Korea with that of Japan to develop some implications.

A Software Architecture for High-speed PCE (Path Computation Element) Protocol (고성능 PCE (Path Computation Element) 프로토콜 소프트웨어 구조)

  • Lee, Wonhyuk;Kim, Seunhae;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.3-9
    • /
    • 2013
  • With the rapidly changing information communication environment and development of technologies, the informati on networks are evolved from traditional fixed form to an active variable network that flexible large variety of data can be transferred. To reflect the needs of users, the next generation using DWDM (Dense Wavelength Division M ultiplexing) transmission system and OXC (Optical Cross Connect) form a dynamic network. After that GMPLS (Ge neralized Multi-Protocol Label Switching) can be introduced to dynamically manage and control the Reconfigurable Optical Add-drop Multiplexer (ROADM)/Photonic Cross Connect (PXC) based network. This paper propose a softw are architecture of Path Computation Element (PCE) protocol that has proposed by Internet Engineering Task Force (IETF) to path computation. The functional blocks and Application Programming Interface (API) of the PCE protoco l implementation are also presented.

Development of a Failure Mode and Effects Analysis Based Risk Assessment Tool for Information Security

  • Lai, Lotto Kim Hung;Chin, Kwai Sang
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.1
    • /
    • pp.87-100
    • /
    • 2014
  • Risk management is recognized as a significant element in Information Security Management while the failure mode and effects analysis (FMEA) is widely used in risk analysis in manufacturing industry. This paper aims to present the development work of the Information Security FMEA Circle (InfoSec FMEA Circle) which is used to support the risk management framework by modifying traditional FMEA methodologies. In order to demonstrate the "appropriateness" of the InfoSec FMEA Circle for the purposes of assessing information security, a case study at Hong Kong Science and Technology Parks Corporation (HKSTP) is employed. The "InfoSec FMEA Circle" is found to be an effective risk assessment methodology that has a significant contribution to providing a stepwise risk management implementation model for information security management.

Establishment of Cyber Security Countermeasures amenable to the Structure of Power Monitoring & Control Systems (전력계통 제어시스템 구조에 따른 사이버 보안대책 수립)

  • Woo, Pil Sung;Kim, Balho H.
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.12
    • /
    • pp.1577-1586
    • /
    • 2018
  • The emergence of the Smart Grid is an integrated solution for the next generation power system that combines IT technology in the power system to create optimal energy utilization and various services. However, these convergence technologies (power systems and information communications) are not only improving the related technologies but also producing various problems especially exposure to cyber risk. In particular, the intelligent power grid has security vulnerabilities through real-time information sharing among various organically linked systems, and it is more complicated than the cyber risk problem in the existing IT field and is directly connected to national disaster accidents. Therefore, in order to construct and operate a more stable smart grid, this paper analyzes the system of power system control system in Korea, and proposes a cyber security element definition and a countermeasure establishment method of power monitoring & control systems based on security standards of smart grid (No. SPS-SGSF-121-1-1).

Research on Security Requirements for Unmanned Ground Vehicles from an Incident-Induced Perspective (사고 유발 관점에서의 무인지상차량 보안 요구사항에 관한 연구)

  • Dong-hoon Kim;Sang-jin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.1135-1148
    • /
    • 2024
  • This paper derives security requirements to ensure the safe operation of unmanned ground vehicles from the perspective of accident causation through threat modeling. By analyzing the components of unmanned ground vehicles and identifying potential vulnerabilities in each element, we constructs attack trees that could lead to accidents such as collisions and sudden stops. From these attack trees, security requirements are derived. These requirements are then compared with the security requirements corresponding to accident causation threats as outlined in the UN's document on autonomous vehicle threats and security requirements, UN R155 Annex 5. The comparison highlights how the security requirements proposed in this paper align with those established by the UN. The application of the security requirements proposed in this paper is expected to facilitate the smooth introduction and operation of unmanned ground vehicles.