• Title/Summary/Keyword: Security rating

Search Result 68, Processing Time 0.026 seconds

A Study of Security QoS(Quality of Service) Measurement Methodology for Network Security Efficiency (MOS(Mean Opinion Score)를 이용한 네트워크 보안 QoS(Quality of Service) 평가체계)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.11-17
    • /
    • 2012
  • Network security performance evaluation is a complex and diverse system environments, a single, specific performance measurements alone performance evaluation measure itself and the meaning of the reliability of the evaluation results do not limit the number of days only. In this paper, we propose a method to measure the security features of security, QoS measurement techniques using MOS satisfaction. MOS(Mean Opinion Score) Rating specifications for network security, QoS satisfaction and how to operate the development and operational model for future customer's satisfaction for information systems that can be used to evaluate the QoS measurement/analysis be utilized in the field. Objectified in the form of standards and performance measurement system provider (supplier development) and consumers(users) all the results available so that how to develop a system. Development is the development of information security features, the performance of these two features networking capabilities and a comprehensive evaluation of a three-gaeyoungyeok Correlating performance measurement methodology. Systematic measurement environment designed using the proposed methodology of this study, when the operating system is on the satisfaction of the security, QoS can be calculated. Forward In addition, a variety of performance metrics and performance measurement methods by extending the network security system satisfaction rating upgrade by the way will be.

A Global Comparative Study on the Game Rating System (게임물 등급분류제도의 국제 비교 연구)

  • Kim, Sung-Won;Lee, Hwan-Soo;Jung, Hae-Sang
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.91-108
    • /
    • 2019
  • Game have become a universal leisure culture for the world. However, not only did the development of the game industry have a positive impact on society, but it also brought about various social problems, such as adversely affecting youth and encouraging criminal acts. In order to minimize these effects, countries around the world operate a game rating system to provide games suitable for age and social values from children and young people to the general public. Since games are new digital content, the limitations of the rating system are still discussed in many studies. Therefore, this study investigates the current status of global game regulation by investigating game rating systems of various countries including Korea. In addition, by comparing and analyzing the game rating system in Korea and the system of other countries, this study suggests a direction to improve our system more appropriately. The results of this study will contribute to securing the effectiveness and standardization of domestic game classification system.

A Study on the Method of Optimizing the Test Order of Explosive Detection System Using Analytic Hierarchy Process and Objective Rating (계층분석방법 및 객관적평가법을 활용한 폭발물탐지장비 시험순서 최적화 방법에 관한 연구)

  • Sun-Ju, Won;Hyun Su, Sim;Yong Soo, Kim
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.4
    • /
    • pp.793-810
    • /
    • 2022
  • Purpose: As improving the search performance of aviation security equipment is considered essential, this study proposes the need for research on how to find an optimized test sequence that can reduce test time and operator power during the search function test of explosive detection systems. We derive the weights and work difficulty adjustment factor required to find the optimized test order. Methods: First, after setting the test factors, the time of each test and the difficulty scale determined by the worker who performed the test directly were used to derive weights. Second, the work difficulty adjustment coefficient was determined by combining the basic weight adjustment factor and corresponding to the body part used by the test using objective rating. Then the final standard time was derived by calculating the additional weights for the changeability of the test factors. Results: The order in which the final standard time is minimized when 50 tests are performed was defined as the optimized order. 50 tests should be conducted without duplication and the optimal order of tests was obtained when compared to previously numbered tests. As a result of minimizing the total standard time by using Excel's solver parameters, it was reduced by 379.14 seconds, about 6.32 minutes. Conclusion: We tried to express it in mathematical formulas to propose a method for setting an optimized test sequence even when testing is performed on other aviation security equipment. As a result, the optimal test order was derived from the operator's point of view, and it was demonstrated by minimizing the total standard time.

The Relation of Attachment and Mother-Child Interactions to Peer Interactions (유아의 애착 및 어머니-유아 상호작용과 또래 상호작용간의 관계)

  • Lee, Young;Rah, Yu Mee
    • Korean Journal of Child Studies
    • /
    • v.20 no.3
    • /
    • pp.19-32
    • /
    • 1999
  • This study analyzed the relation of children's attachment security and mother-child interaction to children's peer interactions. The subjects were 51 preschoolers, 44 to 57 months of age and their mothers. Attachment was assessed using the Attachment Q-set (Waters, 1987), mother-child interactions at home were observed with the use of the Teaching Strategies Rating Scales (Erickson, Sroufe, Egeland, 1985), and peer interactions were observed during free play time, using the Holloway and Erickson(1988) categories. Pearson correlation and multiple regression showed that attachment security scores were negatively related to dependency toward peers. Mother's "structure and limit setting" and "respect for child's autonomy" were positively related to "helping with peers" and negatively to "asking for help" and "physical attack". The variables accounting for dependency toward peers were mother's hostility and attachment security.

  • PDF

A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods

  • Kumar, Rajeev;Ansari, Md Tarique Jamal;Baz, Abdullah;Alhakami, Hosam;Agrawal, Alka;Khan, Raees Ahmad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.240-263
    • /
    • 2021
  • One of the biggest challenges that the software industry is facing today is to create highly efficient applications without affecting the quality of healthcare system software. The demand for the provision of software with high quality protection has seen a rapid increase in the software business market. Moreover, it is worthless to offer extremely user-friendly software applications with no ideal security. Therefore a need to find optimal solutions and bridge the difference between accessibility and protection by offering accessible software services for defense has become an imminent prerequisite. Several research endeavours on usable security assessments have been performed to fill the gap between functionality and security. In this context, several Multi-Criteria Decision Making (MCDM) approaches have been implemented on different usability and security attributes so as to assess the usable-security of software systems. However, only a few specific studies are based on using the integrated approach of fuzzy Analytic Network Process (FANP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) technique for assessing the significant usable-security of hospital management software. Therefore, in this research study, the authors have employed an integrated methodology of fuzzy logic, ANP and TOPSIS to estimate the usable - security of Hospital Management System Software. For the intended objective, the study has taken into account 5 usable-security factors at first tier and 16 sub-factors at second tier with 6 hospital management system softwares as alternative solutions. To measure the weights of parameters and their relation with each other, Fuzzy ANP is implemented. Thereafter, Fuzzy TOPSIS methodology was employed and the rating of alternatives was calculated on the foundation of the proximity to the positive ideal solution.

The Study of domestic application for the Guideline of Model Outdoor Lighting Ordinance (MLO 옥외조명 설치지침의 국내 적용성 연구)

  • Jung, Jong-Hwan;Lee, Kyumok;Gu, Jinhoi
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.26 no.11
    • /
    • pp.20-29
    • /
    • 2012
  • The outdoor lighting is provided for a variety of purposes, for work or recreation, for safety or security, for amenity and for advertising or display. But the effects of lighting on the natural environment can be difficult to quantify. At present, in many countries, various policies to manage the light trespass from outdoor light have been planned. For example, Model Lighting Ordinance(MLO) will allow communities to drastically reduce light pollution and glare and lower excessive light levels. The recommended practices of the IES can be met using readily available, reasonably priced lighting equipment. So, it this paper, we analyze the effect of road lighting on light trespass using by RELUX program. And then we consider the possibility of practical application of BUG rating in Korea.

Development Strategy on the Risk Rating Method for Nationwide Emerging IT Infrastructure (국가단위 신규 IT인프라의 위험도 등급화 기법 개발 방향 연구)

  • Kim, Sangkyun
    • Journal of Industrial Technology
    • /
    • v.30 no.B
    • /
    • pp.11-16
    • /
    • 2010
  • To provide a development strategy on the method which assesses a potential risk of nationwide emerging IT infrastructure in planning and design phase, and to classify the assessment result into 5 levels is the goal of this research. The development strategy provided in this paper could improve a benefit-cost-ratio of investments on emerging IT infrastructure. With a premature assessment of the potential risks of a nationwide emerging IT infrastructure which needs astronomical amount of public funds, it could show a way of systematic investments on security systems and improve a benefit-cost-ratio of investments on emerging IT infrastructure. Also, this approach might improve the safety of nationwide IT infrastructure. It could identify and provide an optimized solution for the potential risks of nationwide IT infrastructure.

  • PDF

A Study on Unconstitutionality of Insurance Premium Rating System in Accordance with National Health Insurance Act. - Focused on Age and Gender in Premium Rating Standards Activity Rate and Living Standards of the Local Insured - (국민건강보험법상 보험료부과체계에 관한 법적 고찰 -지역가입자 생활수준 및 경제활동 참가율 부과기준 중 성과 연령을 중심으로 -)

  • Song, Kimin;Jeong, Jeong-Ile
    • The Korean Society of Law and Medicine
    • /
    • v.15 no.1
    • /
    • pp.185-209
    • /
    • 2014
  • While the local health insurance and the employment-based insurance were integrated in July 2000, the insured is divided into employment-based insured and the local insured and the relevant premium has been applied to both groups. The health insurance premium having the feature of social solidarity has to be determined depending on income, that is, the ability to pay in accordance with the principles of social insurance. While employment-based insurance premium has been determined depending on the earned income, the local insurance premium for the local insured has been determined by scoring gross income(evaluated income), property and possession of automobiles. A variety of improvement approaches has been implemented including introduction of the employment-based insurance premium ceiling system (2002) and the change of property scoring system for the local insured (2006). However, the health insurance system which was merged in 2000 has been implemented up to now without significant change even though there were lots of socio-demographic change including increase of income level and the population structure such as low birth and aging. In other words, it is required to implement the premium rating system securing the income-based equity. Nevertheless, it was inevitable to apply the diverse rating standards in the early stage because it was very difficult to verify the income of the self-employed. Although the income verification rate was significantly increased from 23% in 1989 to 44% in 2010, the irrational standards including property, automobiles, living standard and activity rate have been still applied to the local insured because it is difficult to secure the validity of insurance premium rating system and it severely lacks of security. This paper investigated whether the current insurance premium rating system for the local insured imposing the premium on the basis of 'gender' and 'age' complies with the basic human rights secured by the current Constitution of the Republic of Korea with respect to the practical and theoretic irrationality of insurance premium rating system and standards for he local insured. In accordance with the analysis results, this paper proposed the approach to improve the system.

  • PDF

Protecting Memory of Process Using Mandatory Access Control (강제적 접근제어를 통한 프로세스 메모리 보호)

  • Shim, Jong-Ik;Park, Tae-Kyou;Kim, Jin-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1947-1954
    • /
    • 2011
  • There are various attacks such as tampering, bypassing and spoofing which are caused with system-wide vulnerabilities of Windows operating system. The underlying operating system is responsible for protecting application-space mechanisms against such attacks. This paper provides the implementation of mandatory access control known as multi-level security (MLS) rating with TCSEC-B1 level on th kernel of Windows$^{TM}$. By adding especially the protection feature against tampering memory of processes to the security kernel, this implementation meets the responsibility against system-wide vulnerabilities.

A Multichannel Authentication Technique In The Internet Banking System Using OTP (OTP를 이용한 인터넷뱅킹 시스템의 다중 채널 인증 기법)

  • Yoon, Seong Gu;Park, Jae Pyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.131-142
    • /
    • 2010
  • Due to the development of the Internet, Internet banking that we are liberated from time and space has evolved into banking system. So modern life became comfortable. However, Dysfunction (malicious Information leakage and hacking etc.) of the Internet development has become a serious social problem. According to this, The need for security is rapidly growing. In this paper, we proposed the Internet Banking Authentication System using a dual-channel in OTP(One Time Password) authentication. This technology is that A user transfer transaction information to Bank through one Internet channel then bank transfer transaction information to user using the registered mobile phone or smart phone. If user confirm transaction information then bank request user's OTP value. User create OTP value and transfer to bank and bank authenticate them throgth the ARS. If authentication is pass then transaction permitted. Security assessment that the proposed system, the security requirement that the confidentiality and integrity, authentication, repudiation of all of the features provide a key length is longer than the current Internet banking systems, such as using encryption, the security provided by the Financial Supervisory Service Level 1 rating can be applied to more than confirmed.