• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.036 seconds

Analysis of Information Security Issues and Classification through Metaverse Infringement Cases

  • Mi-Na, Shim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.13-22
    • /
    • 2023
  • In the age of Web 3.0, the metaverse is emerging as a new innovative element to replace the Internet. Leading major ICT companies, it is striving to become a metaverse platform or infrastructure-oriented company. Along with the expansion of the VR and AR market, governments of each country are investing large budgets in this field. However, security concerns about metaverse are also growing. In addition to potential damage to infrastructure, platform and services, personal information leakage and privacy damage are expected to increase further. In this study, we investigated and closely analyzed cases of infringement on the infrastructure, platform, and service of Metaverse. We have clearly identified the current state of metaverse security and the characteristics of the risks of greatest concern. The research procedure is composed of a method of determining the metaverse security area for case analysis first and deriving the type of threat by area through the type of infringement. In particular, the results were mapped into Domain, Case, and Threat, and the implications of the results were analyzed. Through these results, researchers want to contribute to finding the right direction of research by clearly understanding the latest metaverse security status.

Fast Scrambler/Descrambler for H.264/AVC (H.264/AVC를 위한 고속 스크램블러/디스크램블러)

  • Lee, Ho-Jae;Nam, Je-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.289-290
    • /
    • 2006
  • With increasing the volume of digital multimedia market, the security and multimedia content protection issues are arising. Interest in H.264/AVC is emerging and special features in H.264/AVC element stream must be considered. We developed a new algorithm which scrambles and descrambles H.264/AVC element stream in compressed domain using manipulating CABAC initialization table and DCT coefficients. Extensive experimental results indicate that the proposed algorithm is effective and promising.

  • PDF

A Design of Technology Element-based Evaluation Model and its Application on Checklist for the IoT Device Security Evaluation (사물인터넷 기기 보안평가를 위한 기술요소 기반의 모델 설계 및 체크리스트 적용)

  • Han, Seul Ki;Kim, Myuhng Joo
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • As the demand for Internet of Things(IoT) increases, the need for the security of IoT devices is increasing steadily. It is difficult to apply the conventional security theory to IoT devices because IoT devices are subject to be constrained by some factors such as hardware, processor, and energy. Nowadays we have several security guidelines and related documents on IoT device. Most of them, however, do not consider the characteristics of specific IoT devices. Since they describes the security issues comprehensively, it is not easy to explain the specific security level reflecting each characteristics of IoT devices. In addition, most existing guidelines and related documents are described in view of developers and service proposers, and thus ordinary users are not able to assess whether a specific IoT device can protect their information securely or not. We propose an security evaluation model, based on the existing guidelines and related documents, for more specific IoT devices and prove that this approach is more convenient to ordinary users by creating checklists for the smart watch.

  • PDF

Development of the Agro-Industrial Complex for Improving the Economic Security of the State

  • Petrunenko, Iaroslav;Pohrishcuk, Borys;Abramova, Maryna;Vlasenko, Yurii;Halkin, Vasyl
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.191-197
    • /
    • 2021
  • Ensuring the economic security of agro-industrial complexes of Ukrainian regions has become a top-priority task of state regional policy, as their stable functioning is an essential element of economic security of the whole country. It is overcoming threats to the development of the agro-industrial complex that ensures its further effective functioning and has a significant impact on the economic security of our state. Methods: logical method; methods of system analysis; synthesis; economic and statistical method; method of expert assessment; SWOT analysis; economic and mathematical modelling and planning. Results. Characteristic features of economic security have been given. The essence and significance of the agro-industrial complex in improving the economic security of the state have been determined. It has been noted that in recent years, the agro-industrial complex, which acts as a driver of the domestic economy and has a direct impact on the development of the country, has been growing (in 2019 the cereal and legume harvest exceeded 75 million tons, 20,269 thousand tons of potatoes were dug, more than 15 million tons of sunflower, 9,688 thousand tons of vegetables and 2,119 thousand tons of fruits and berries were harvested, meat and egg production increased by 137.5 thousand tons (or 5.8%) and 545.5 million pieces (or 3.4%), respectively, the number of employed population in agriculture increased by 139.8 thousand people (or 4.9%), the labour productivity in crop production increased by UAH 294.4 thousand (or 44.6%), in livestock production - by UAH 311.3 thousand (or 61.8%)). Based on the system of production and economic indicators, the analysis of the state of the agro-industrial complex has been carried out. Taking into account the results of the obtained data and using SWOT-analysis, the major threats to the development of the agro-industrial complex have been identified. Ways of overcoming threats enhancing the economic security of Ukraine have been proposed.

A study on the occupational fraud symptoms and detection methods for managing human element vulnerability in financial industry security (금융산업보안상 인적보안 취약요소인 업무부정의 발생징후와 적발방법에 관한 연구)

  • Suh, Joon-Bae;Shim, Hee-Sub
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.37-59
    • /
    • 2017
  • This study aims to contribute to the early detection of occupational fraud in the Korean financial industry by analyzing fraud symptoms. Firstly, the definition, cause of occupational fraud, and fraud symptoms were discussed through literature review. Secondly, survey data were collected from the employees of the financial industry such as bank, insurance, and securities companies to conduct statistical analysis. The result of analysis showed that the symptoms of 'excessive stock investment' and 'unsettled life style' were statistically significant predictors of fraud detection experience. Plus, 'tips and complaints' were the most frequent method for detecting occupational fraud in the Korean financial industry. The financial institutions can minimize the loss of occupational fraud by early detection through educating their employees and vendors on these important symptoms of occupational fraud.

  • PDF

Explosive loading of multi storey RC buildings: Dynamic response and progressive collapse

  • Weerheijm, J.;Mediavilla, J.;van Doormaal, J.C.A.M.
    • Structural Engineering and Mechanics
    • /
    • v.32 no.2
    • /
    • pp.193-212
    • /
    • 2009
  • The resilience of a city confronted with a terrorist bomb attack is the background of the paper. The resilience strongly depends on vital infrastructure and the physical protection of people. The protection buildings provide in case of an external explosion is one of the important elements in safety assessment. Besides the aspect of protection, buildings facilitate and enable many functions, e.g., offices, data storage, -handling and -transfer, energy supply, banks, shopping malls etc. When a building is damaged, the loss of functions is directly related to the location, amount of damage and the damage level. At TNO Defence, Security and Safety methods are developed to quantify the resilience of city infrastructure systems (Weerheijm et al. 2007b). In this framework, the dynamic response, damage levels and residual bearing capacity of multi-storey RC buildings is studied. The current paper addresses the aspects of dynamic response and progressive collapse, as well as the proposed method to relate the structural damage to a volume-damage parameter, which can be linked to the loss of functionality. After a general introduction to the research programme and progressive collapse, the study of the dynamic response and damage due to blast loading for a single RC element is described. Shock tube experiments on plates are used as a reference to study the possibilities of engineering methods and an explicit finite element code to quantify the response and residual bearing capacity. Next the dynamic response and progressive collapse of a multi storey RC building is studied numerically, using a number of models. Conclusions are drawn on the ability to predict initial blast damage and progressive collapse. Finally the link between the structural damage of a building and its loss of functionality is described, which is essential input for the envisaged method to quantify the resilience of city infrastructure.

Hysteresis performance of earthquake-damaged resilient RAC shear walls retrofitted with CFRP strips and steel plates

  • Jianwei Zhang;Siyuan Wang;Man Zhang;Yuping Sun;Hongwei Wang
    • Steel and Composite Structures
    • /
    • v.52 no.3
    • /
    • pp.357-376
    • /
    • 2024
  • In this paper, weakly bonded ultra-high-strength steel bars (UHSS) were used as longitudinal reinforcement in recycled aggregate concrete shear walls to achieve resilient performance. The study evaluated the repairability and hysteresis performance of shear walls before and after retrofitting. Quasi-static tests were performed on recycled aggregate concrete (RAC) and steel fiber reinforced recycled aggregate concrete (FRAC) shear walls to investigate the reparability of resilient shear walls when loaded to 1% drift ratio. Results showed that shear walls exhibited drift-hardening properties. The maximum residual drift ratio and residual crack width at 1% drift ratio were 0.107% and 0.01mm, respectively, which were within the repairable limits. Subsequently, shear walls were retrofitted with bonded X-shaped CFRP strips and steel plates wrapped at the bottom and retested. Except for a slight reduction in initial stiffness, earthquake-damaged resilient shear walls retrofitted with a composite method still had satisfactory hysteresis performance. A revised damage assessment index D, has been proposed to assess of damage degree. Moreover, finite-element analysis for the shear wall before and after retrofit retrofitting was established in OpenSees and verified with experimental results. The finite element results and test results were in good agreement. Finally, parametric analysis was performed.

Introduction Plans of Japanese AEO System for the Trade Security and Trade Facilitation (무역의 안전과 원활화를 위한 일본기업의 AEO 제도 도입방안에 관한 연구)

  • Woo, Sung-Koo;Kim, Jae-Myeong
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.47
    • /
    • pp.263-298
    • /
    • 2010
  • The global trading system is vulnerable to terrorist exploitation while the international trade is an essential element for the economic development. Customs has a unique role in the international trade to provide increased security while ensuring facilitation of the legitimate flow of goods and the role of Customs has become more and more indispensable these days. In response to this trend, the World Customs Organization(WCO), the organization of more than 170 Customs administrations all over the world, adopted an international framework("SAFE Framework") in 2005, which includes the Authorized Economic Operator(AEO) concept, whereby a party involved in the international movement of goods would be approved by Customs as complying with the supply chain security standards, and given benefits, such as simplified Customs procedure and less Customs intervention. In this stream, the Japanese government has developed and promoted AEO Program in close cooperation with the business sector, aiming at ensuring security while facilitating legitimate trade. For that purpose, Japan Customs, as a main entity in the field of international trade, has developed comprehensive AEO program with combination of programs for importers, exporters, warehouse operators, Customs brokers and logistics operators, such as forwarders and carriers, which are consistent with the "SAFE Framework" developed by the WCO. The purpose of this paper aims to analyse the introduction plans of AEO program for the trade security and trade facilitation with Japanese AEO system.

  • PDF

Numerical investigation on seismic performance of reinforced rib-double steel plate concrete combination shear wall

  • Longyun Zhou;Xiaohu Li;Xiaojun Li
    • Nuclear Engineering and Technology
    • /
    • v.56 no.1
    • /
    • pp.78-91
    • /
    • 2024
  • Double steel plate concrete composite shear wall (SCSW) has been widely utilized in nuclear power plants and high-rise structures, and its shear connectors have a substantial impact on the seismic performance of SCSW. Therefore, in this study, the mechanical properties of SCSW with angle stiffening ribs as shear connections were parametrically examined for the reactor containment structure of nuclear power plants. The axial compression ratio of the SCSW, the spacing of the angle stiffening rib arrangement and the thickness of the angle stiffening rib steel plate were selected as the study parameters. Four finite element models were constructed by using the finite element program named ABAQUS to verify the experimental results of our team, and 13 finite element models were established to investigate the selected three parameters. Thus, the shear capacity, deformation capacity, ductility and energy dissipation capacity of SCSW were determined. The research results show that: compared with studs, using stiffened ribs as shear connectors can significantly enhance the mechanical properties of SCSW; When the axial compression ratio is 0.3-0.4, the seismic performance of SCSW can be maximized; with the lowering of stiffener gap, the shear bearing capacity is greatly enhanced, and when the gap is lowered to a specific distance, the shear bearing capacity has no major affect; in addition, increasing the thickness of stiffeners can significantly increase the shear capacity, ductility and energy dissipation capacity of SCSW. With the rise in the thickness of angle stiffening ribs, the improvement rate of each mechanical property index slows down. Finally, the shear bearing capacity calculation formula of SCSW with angle stiffening ribs as shear connectors is derived. The average error between the theoretical calculation formula and the finite element calculation results is 8% demonstrating that the theoretical formula is reliable. This study can provide reference for the design of SCSW.

The Design of NPC Encryption Algorithms for Electronic Commerce (전자상거래를 위한 NPC 암호 알고리즘 설계)

  • 김재각;전문석
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.2
    • /
    • pp.159-166
    • /
    • 2001
  • EC(Electronic Commerce) is increasing with high speed based on the expansion of Internet. EC which is done through Internet has strong point like independence from time and space, On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet. Therefore, we need the solutions that protect the security problem for safe and useful U activity, One of these solutions is the implementation of strong cipher algorithm. NPC(Non-Polynomial Complete) cipher algorithm proposed in this paper is good for the security and it overcome the limit of current 64bits cipher algorithm using 256bits key for input output and encryption key, Moreover, it is designed for the increase of calculation complexity and probability calculation by adapting more complex design for subkey generation regarded as one of important element effected to encryption.

  • PDF