• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.023 seconds

From Propaganda to Reputational Security: An Intellectual Journey around the role of media in international relations

  • Nicholas J. Cull
    • Journal of Public Diplomacy
    • /
    • v.3 no.1
    • /
    • pp.37-56
    • /
    • 2023
  • In this invited essay Nicholas J. Cull considers his career journey exploring the intersection of media and foreign policy, beginning with his first contact with ideas of propaganda and political communication. It continues with exposure to the historical study of propaganda and international relations at the University of Leeds, charting influences and key ideas. His thesis/first book research on Britain's attempt to draw the United States into World War Two before Pearl Harbor emphasized effective approaches to political communication other than the hard sell. Britain's wartime approach prefigured approaches of the United States Information Agency during the Cold War which became Cull's second major research project. Cull discusses the evolution of his work during the expansion of the public diplomacy field in the years following 9/11. Milestones include his articulation of a five-element description of public diplomacy with an emphasis on listening, and a more recent repositioning of Soft Power as Reputational Security, which goes beyond the usual emphasis on accentuating the positives of a nation's culture and values, to call for the active elimination of unattractive realities.

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

A Study on the Coping Strategy for Job Stress from the Personality Type of Security Agents (시큐리티 요원의 성격특성이 직무스트레스 및 대처방식에 미치는 영향)

  • Kim, Eui-Young;Cho, Sung-Jin
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.263-292
    • /
    • 2014
  • This study is an attempt to introduce an effective human resource management way by analyzing the relationship of personality type of Security Agents and coping strategy for job stress and the job satisfaction. To achieve this purpose, this study surveyed users of the Gyeonggi and Chungnam in based on cluster sampling method. A total of 283 samples were used for this study, except 17 erroneous samples dropped. For the data process of the questionnaire, each answer content was coded and an element analysis, credibility analysis, frequency analysis, co-relationship analysis and regression analysis were performed using the SPSS version 18.0 of Angel for Windows. Through the data analysis following the research methods above, the conclusion was acquired as follows: First, the nature of the security personnel Factors affecting job stress. Second, the nature of the security personnel Factors affect coping behavior.

  • PDF

A Study on Smart EDR System Security Development (Smart EDR 시스템구축을 위한 보안전략과 발전방안)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.41-47
    • /
    • 2020
  • In the corporate information system environment, detecting and controlling suspicious behaviors occurring at the end point of the actual business application is the most important area to secure the organization's business environment. In order to accurately detect and block threats from inside and outside, it is necessary to be able to monitor all areas of all terminals in the organization and collect relevant information. In other words, in order to maintain a secure business environment of a corporate organization from the constant challenge of malicious code, everything that occurs in a business terminal such as a PC beyond detection and defense-based client security based on known patterns, signatures, policies, and rules that have been universalized in the past. The introduction of an EDR solution to enable identification and monitoring is now an essential element of security. In this study, we will look at the essential functions required for EDR solutions, and also study the design and development plans of smart EDR systems based on active and proactive detection of security threats.

A Study on Acceptance Factors of Financial Mydata Service from Information Security Perspectives (정보보호 관점의 금융 마이데이터 서비스 수용 요인에 관한 연구)

  • Lee, Seok Ho;Bae, Chang Hang
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.137-152
    • /
    • 2022
  • Consumers' enhanced intention to adopt the Mydata service or their voluntary provision of personal information is a very essential element in the stable growth of the Mydata industry along with the creation of corporate values. The growing leakage of customer information according to the rising value of data can have negative impacts on the use of Mydata service and shrink quality custom service needs based on the personal information provided by financial consumers. This study set out to identify security risks that financial consumers could recognize and security factors that could supplement them and investigate the effects of these security factors on consumers' intention to adopt the Mydata service, thus providing useful implications for increasing the acceptance of financial consumers and finding a strategy to expand safe utilization. The findings raise a need to guarantee the stability and transparency of information provided by customers as information subjects, and they should be essential requirements for the Mydata service. The security factors applied to guarantee them should include convenience in terms of financial service.

Optimization of Information Security Investment Portfolios based on Data Breach Statistics: A Genetic Algorithm Approach (침해사고 통계 기반 정보보호 투자 포트폴리오 최적화: 유전자 알고리즘 접근법)

  • Jung-Hyun Lim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.201-217
    • /
    • 2020
  • Information security is an essential element not only to ensure the operation of the company and trust with customers but also to mitigate uncertain damage by preventing information data breach. Therefore, It is important to select appropriate information security countermeasures and determine the appropriate level of investment. This study presents a decision support model for the appropriate investment amount for each countermeasure as well as an optimal portfolio of information countermeasures within a limited budget. We analyze statistics on the types of information security breach by industry and derive an optimal portfolio of information security countermeasures by using genetic algorithms. The results of this study suggest guidelines for investing in information security countermeasures in various industries and help to support objective information security investment decisions.

타원곡선위에서의 연산

  • 최영주;황효선
    • Review of KIISC
    • /
    • v.3 no.1
    • /
    • pp.86-90
    • /
    • 1993
  • Finite field GF$(2^n)5에서 정의된 elliptic curve가 있을때 그 curve위의 어떤 point p를 k배하는 연산은 암호론에서 매우 자주 쓰여진다. 이때 optimal normal bases를 이용하여 GF$(2^n)의 element를 표현하고, 또 elliptic curve를 선택할 때 animalous curve가 되도록 한다면, 기존이 방법 보다 매우 빠르게 k P를 구할 수 있다.

  • PDF

Fire Endurance Estimate of Reinforced Concrete Structure Using Nonlinear Finite Element Method (비선형 유한요소해석을 이용한 철근콘크리트 구조물의 내화성능평가)

  • Byun, Sun-Joo;Im, Jung-Soon;Hwang, Jee-Wook
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.6 no.1 s.20
    • /
    • pp.17-27
    • /
    • 2006
  • To estimate the retained strength of reinforced concrete structure after fire is very difficult because the complex behavior of structure is hard to understand during course of a fire. However, the damages which is caused by fire of the traffic facility infrastructure are enormous. Therefore the security against fire is important element that must not be overlooked. For this reason, an exact estimate method of the fire endurance is highly demanded. In this study, the validity of the nonlinear finite element method approach for the fire endurance of reinforced concrete structure is verified. The results of fire endurance estimate of underground road way by nonlinear finite element method approach are compared with those by ACI 216R-89.

Kaplansky-type Theorems, II

  • Chang, Gyu-Whan;Kim, Hwan-Koo
    • Kyungpook Mathematical Journal
    • /
    • v.51 no.3
    • /
    • pp.339-344
    • /
    • 2011
  • Let D be an integral domain with quotient field K, X be an indeterminate over D, and D[X] be the polynomial ring over D. A prime ideal Q of D[X] is called an upper to zero in D[X] if Q = fK[X] ${\cap}$ D[X] for some f ${\in}$ D[X]. In this paper, we study integral domains D such that every upper to zero in D[X] contains a prime element (resp., a primary element, a t-invertible primary ideal, an invertible primary ideal).

Infrared Target Extraction Using Weighted Information Entropy and Adaptive Opening Filter

  • Bae, Tae Wuk;Kim, Hwi Gang;Kim, Young Choon;Ahn, Sang Ho
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.1023-1031
    • /
    • 2015
  • In infrared (IR) images, near targets have a transient distribution at the boundary region, as opposed to a steady one at the inner region. Based on this fact, this paper proposes a novel IR target extraction method that uses both a weighted information entropy (WIE) and an adaptive opening filter to extract near finely shaped targets in IR images. Firstly, the boundary region of a target is detected using a local variance WIE of an original image. Next, a coarse target region is estimated via a labeling process used on the boundary region of the target. From the estimated coarse target region, a fine target shape is extracted by means of an opening filter having an adaptive structure element. The size of the structure element is decided in accordance with the width information of the target boundary and mean WIE values of windows of varying size. Our experimental results show that the proposed method obtains a better extraction performance than existing algorithms.