• Title/Summary/Keyword: Security incidents

Search Result 344, Processing Time 0.028 seconds

Improvement Mechanism of Security Monitoring and Control Model Using Multiple Search Engines (다중 검색엔진을 활용한 보안관제 모델 개선방안)

  • Lee, Je-Kook;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.284-291
    • /
    • 2021
  • As the current security monitoring system is operated as a passive system only for response after an attacker's attack, it is common to respond to intrusion incidents after an attack occurs. In particular, when new assets are added and actual services are performed, there is a limit to vulnerability testing and pre-defense from the point of view of an actual hacker. In this paper, a new security monitoring model has been proposed that uses multiple hacking-related search engines to add proactive vulnerability response functions of protected assets. In other words, using multiple search engines with general purpose or special purpose, special vulnerabilities of the assets to be protected are checked in advance, and the vulnerabilities of the assets that have appeared as a result of the check are removed in advance. In addition, the function of pre-checking the objective attack vulnerabilities of the protected assets recognized from the point of view of the actual hacker, and the function of discovering and removing a wide range of system-related vulnerabilities located in the IP band in advance were additionally presented.

A Study on Security Threats and Countermeasures in Smart Farm Environments (스마트 팜 환경에서 보안 위협 및 대응 방안에 관한 연구)

  • Sun-Jib Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.53-58
    • /
    • 2024
  • IoT, Big-data, AI, and Cloud technologies, which are core technologies of the 4th Industrial Revolution, have recently been applied to various fields and are being used as core technologies for new growth engines. Accordingly, these core technologies are applied to the agricultural field without exception, contributing to solving the problem of labor shortage, reducing production costs, and reducing environmental burden through remote and automated production without time and space constraints. However, as these core technologies are utilized, security incidents are occurring in the agricultural field as well. Accordingly, this study divides smart farms into three stages(Basic, Middle, and High) and presents the characteristics and security threats of each stage. In particular, as the number of container-based services and research increases under cloud platforms, we would like to suggest countermeasures focusing on security threats.

The Effects of the Organizational Characteristics and Ethics of Private Security Industry on the Organizational Citizenship Behavior of the Employees (민간경비업의 조직특성과 조직윤리가 조직시민행동에 미치는 영향)

  • Kang, Min-Wan
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.7-28
    • /
    • 2013
  • In Korea, the size of the private security industry has grown rapidly since the enactment of the Security Business Act in 1976. Unfortunately, the quantitative development has not been accompanied by the comparable qualities, and this shortcoming can be attributed to different unethical incidents caused by the private security officers. This study examined the causal relationship between the organizational characteristics according to the organizational ethics and the organizational citizenship behavior to provide suggestions to promote the ethics of the private security officers, and ultimately play the role of a theoretical foundation for the qualitative advancement of the industry. Private security officers in Seoul and the Gyeonggi province in Korea were studied by using the purposive sampling method and the following results were obtained. First, except for the altruism factor, the levels of organizational ethics perceptions and organizational citizenship behavior of the subjects were relatively high. Moreover, organizational characteristics had a positive partial effect on organizational ethics and organizational citizenship behavior. Furthermore, organizational ethics partially affected organizational citizenship behavior in a positive way, and organizational ethics had a partial mediation effect between organizational characteristics and organizational citizenship behavior. With the results of the analyses, development and management of the ethics training and programs and promoting the ethics among the executives were recommended as a future direction.

  • PDF

The Effect of Job Satisfaction of Casino Security Employees on Organizational Commitment and Turnover Intention (카지노 시큐리티 종사원의 직무만족이 조직몰입 및 이직의도에 미치는 영향)

  • Lee, Seok-Man;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.161-184
    • /
    • 2017
  • In general, security employees are more vulnerable to the risk of various incidents and accidents due to the specificity of their work, and they are less exposed to job satisfaction due to irregular working hours such as night shifts and physical labor. There is a concern that conflicts over turnover will be intensified. Therefore, companies should pay attention to job satisfaction, organizational commitment and turnover intention through effective human resource management of security employees who have influence on company's profit creation, so that companies should strive for competitiveness and development. The purpose of this study is to investigate the effect of casino security employee's job satisfaction on organizational commitment and turnover intentions in a questionnaire survey of security employees at Grand Korea Leisure Corporation. Frequency analysis, factor analysis, reliability analysis and multiple regression analysis were performed using SPSS 24.0. As a result of this study, it can be concluded that the higher the job satisfaction of the public enterprise security workers, the higher the organizational commitment and the lower the turnover intention. Therefore, if the company has competitiveness through effective human resource management that affects the wage satisfaction, promotion satisfaction, boss satisfaction and turnover intention affecting the organizational commitment, This study can be applied in the sense that it is possible to give.

  • PDF

Establishment of Korea National Counter-terrorism System and Development Plan (국가대테러체제의 구축 및 발전방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.229-249
    • /
    • 2015
  • As the post-cold war era and globalization go on, national security problems which were not traditional national security problems such as terrorism, crime, environmental disasters, economic crises, cyber-terrorism, diseases, and energy problems threat humanity and nations and demands changes. Also, with the change, the concept of "big government" has emerged as the role of nation expanded. The modern society sees every country change from small government to big government in order to realize the establishment of welfare state. A comprehensive interpretation of security is needed in order to comprehensive protection of citizens beyond outside invasion such as crime, new disaster, terrorism. In Korea, incidents such as Cheonan-Ham, Yeonpeyong-Do, foot-and-mouth disease, Ddos terrorism, pirates hostages, mad cow disease, AI are happening and the humanitarian support for North Korea and the summit of South and North Korea are at a standstill. Also, National emergency management system, comprehensive emergency management center, countrol tower, national security system, cooperation with citizens, establishment of legal and institutional system are needed. The importance of this research is on the reestablishment of new national security and emergency management system according to the comparison between the national security and counter-terrorism system of Korea and that of the United States which is a leading country in this field. Also, the establishment of national emergency management act is needed as a statute for effective function as currently various laws and administrative organizations are dispersed.

  • PDF

A Study on the Recognition for Food Caused by Broadcasting, through Big Data Analysis - Based on the incident of Giant Castella

  • Cho, Myunggeun;Oh, Jungjoo;Jung, Hyun;Lee, Hwansoo
    • Agribusiness and Information Management
    • /
    • v.9 no.1
    • /
    • pp.23-36
    • /
    • 2017
  • The incidents of garbage dumplings in 2004 and the report on giant castella are the examples that shows how big the influence of broadcasting on the industry is. There were discussions on the importance of securing the objectivity of broadcasting, however, the existing related researches have lacked the analysis of actual proof for the influence of broadcasting contents, and as that of the law and system was confined to theoretical arguments, there were not enough suggestions for realistic alternatives. In this paper, we will examine the influence of broadcasting contents on the food industry through an analysis of actual proof, and propose alternatives in terms of the law and policy for securing the objectivity and fairness of broadcasting, to solve this problem.

A Fall Detection Technique using Features from Multiple Sliding Windows

  • Pant, Sudarshan;Kim, Jinsoo;Lee, Sangdon
    • Smart Media Journal
    • /
    • v.7 no.4
    • /
    • pp.79-89
    • /
    • 2018
  • In recent years, falls among elderly people have gained serious attention as a major cause of injuries. Falls often lead to fatal consequences due to lack of prompt response and rescue. Therefore, a more accurate fall detection system and an effective feature extraction technique are required to prevent and reduce the risk of such incidents. In this paper, we proposed an efficient feature extraction technique based on multiple sliding windows and validated it through a series of experiments using supervised learning algorithms. The experiments were conducted using the public datasets obtained from tri-axial accelerometers. The results depicted that extraction of the feature from adjacent sliding windows led to high accuracy in supervised machine learning-based fall detection. Also, the experiments conducted in this study suggested that the best accuracy can be achieved by keeping the window size as small as 2 seconds. With the kNN classifier and dataset from wearable sensors, the experiments achieved accuracy rates of 94%.

Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity

  • Shahabi, Cyrus;Kim, Seon Ho;Nocera, Luciano;Constantinou, Giorgos;Lu, Ying;Cai, Yinghao;Medioni, Gerard;Nevatia, Ramakant;Banaei-Kashani, Farnoush
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.1-22
    • /
    • 2014
  • Recent technological advances provide the opportunity to use large amounts of multimedia data from a multitude of sensors with different modalities (e.g., video, text) for the detection and characterization of criminal activity. Their integration can compensate for sensor and modality deficiencies by using data from other available sensors and modalities. However, building such an integrated system at the scale of neighborhood and cities is challenging due to the large amount of data to be considered and the need to ensure a short response time to potential criminal activity. In this paper, we present a system that enables multi-modal data collection at scale and automates the detection of events of interest for the surveillance and reconnaissance of criminal activity. The proposed system showcases novel analytical tools that fuse multimedia data streams to automatically detect and identify specific criminal events and activities. More specifically, the system detects and analyzes series of incidents (an incident is an occurrence or artifact relevant to a criminal activity extracted from a single media stream) in the spatiotemporal domain to extract events (actual instances of criminal events) while cross-referencing multimodal media streams and incidents in time and space to provide a comprehensive view to a human operator while avoiding information overload. We present several case studies that demonstrate how the proposed system can provide law enforcement personnel with forensic and real time tools to identify and track potential criminal activity.

Intrusion Artifact Acquisition Method based on IoT Botnet Malware (IoT 봇넷 악성코드 기반 침해사고 흔적 수집 방법)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid increase in the use of IoT and mobile devices, cyber criminals targeting IoT devices are also on the rise. Among IoT devices, when using a wireless access point (AP), problems such as packets being exposed to the outside due to their own security vulnerabilities or easily infected with malicious codes such as bots, causing DDoS attack traffic, are being discovered. Therefore, in this study, in order to actively respond to cyber attacks targeting IoT devices that are rapidly increasing in recent years, we proposed a method to collect traces of intrusion incidents artifacts from IoT devices, and to improve the validity of intrusion analysis data. Specifically, we presented a method to acquire and analyze digital forensics artifacts in the compromised system after identifying the causes of vulnerabilities by reproducing the behavior of the sample IoT malware. Accordingly, it is expected that it will be possible to establish a system that can efficiently detect intrusion incidents on targeting large-scale IoT devices.

Modeling of Collection Process for Real-time Forensic Data (포렌식 데이터의 실시간 수집 절차 모델링)

  • Kim, Tae-Hoon;Park, Nam-Kyu;Choi, Han-Na;Lee, Dae-Yoon;Ahn, Jong-Deuk;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.139-145
    • /
    • 2009
  • This study proposes a model of collection process for real-time forensic data, in which the manager was to respond to infringement incidents in terms of system operation and inspection and to collect, analyze and restore forensic data immediately after an incident took place. The suggested model was modeled in seven processes according to functional elements. Unlike the old and managerial forensic processes, the model allowed the manager to react to infringement incidents in the aspects of system operation and inspection and to follow the processes of collecting, analyzing, and restoring forensic data in case of an incident. There also was a feedback process designed towards the step of gathering forensic data through the stages of systematizing reaction strategies in order that he or she be able to bring about comprehensive and structural responses to an incident like the former processes in which it is difficult to bring about instant responses.