• Title/Summary/Keyword: Security risk

Search Result 1,331, Processing Time 0.024 seconds

An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification (실증검증을 통한 N/A 점검항목이 보안 수준 결과에 미치는 영향에 관한 연구)

  • Lee, Jun Ho;Sung, Kyung Sang;Oh, Hea Seok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.8
    • /
    • pp.271-276
    • /
    • 2014
  • This study analyzed that N/A check items affect the results of the security level degree, when performing vulnerability analysis evaluation. For this, we were used vulnerability analysis evaluation range, check items and quantitative calculation method. Furthermore, were applied grade and weight for the importance of the items. In addition, because technology develop rapidly, the institution is always exposed risk. therefore, this study was carried out empirical analysis by applying RAL(Risk Acceptabel Level). According to the analyzed result N/A check items factors affecting the level of security has been proven. In other words, this study found that we shall exclude inspection items irrelevant to the institution characteristics, when perform vulnerability analysis evaluation. In this study suggested that security level evaluation shall performed, after that exclude items irrelevant to the institution characteristics based on empirical verification. And also, it proposed that model research is required for establish check items for which analysis-evaluate vulnerability based on empirical verification.

A Study on the Intention of the Use of Mobile Payment Services: Application of the Technology Acceptance Model (모바일 간편 결제 서비스 이용 의도에 관한 연구 : 기술 수용 모델을 중심으로)

  • Lee, Soo Yeon;Park, Jowon
    • Korean Management Science Review
    • /
    • v.33 no.2
    • /
    • pp.65-74
    • /
    • 2016
  • The present study applies the TAM (Technology Acceptance Model) to investigate the factors that affect the intention to use the mobile payment services. For this purpose five potential variables (perceived usefulness, perceived convenience, ubiquity, innovativeness, and safety risk) that are expected to affect the intention to use the mobile payment services were selected. An online survey was administered, and 339 questionnaires were analyzed. Structure Equation Model (SEM) Analysis revealed that TAM variables (perceived usefulness and perceived convenience) partially influenced the attitude. The perceived usefulness predicted the attitude while perceived convenience did not predict the attitude toward the mobile payment service. Personal characteristics variable (innovativeness) and mobile nature variables (ubiquity, and security risk) were identified as the predictors of the attitude toward the mobile payment service. While innovativeness and ubiquity affected the attitude positively, security risk affected the attitude negatively. Finally, the analysis substantiated the influence of attitude toward the mobile payment services on the intention to use the services. On the basis of findings, managerial implications and suggestions for further studies were discussed.

A Study on Risk Influence Factors of Ground Subsidence through Soil Investigation Analysis (지반조사 분석을 통한 지반함몰 위험영향인자 연구)

  • Joung, Ho Young;Lee, Gil Hwan
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.43-46
    • /
    • 2017
  • Recently, the development of underground space is being actively carried out in the urban area by saturation, and the excavation works are mainly carried out by various excavation methods by the structures adjacent to the ground and underground excavation. During such excavation work, ground subsidence accidents are occurring due to inattention construction, lack of construction technology, and leakage of ground water. For the prevention of ground subsidence we studied the method of risk influence factors by soil investigation. Analysis of 75 sites soil investigation by U.S.C.S (Unified Soil Classification System), construction method, depth of excavation and we studied the risk influence factors with ground subsidence.

Exploring the Factors That Influence Unexpected Change of E-Customer Behaviour and Perceived Cybercrime Risk during COVID-19 in Saudi Arabia

  • Ibrahim, Rehab;Li, Alice;Soh, Ben
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.101-109
    • /
    • 2021
  • Cybercrimes are the biggest threat that can influence the future of e-commerce, particularly in difficult times such as the COVID-19 pandemic. This pandemic has resulted in noticeable changes in e-customer behaviour represented in three types: spending rates, types of goods bought, and the number of purchasing times. Moreover, the percentage of cybercrime in many countries, including Saudi Arabia, has increased during the pandemic. The increase in the number of cybercrimes during the COVID-19 crisis and the changes in consumer behaviour shows that there is an urgent need to conduct research on the factors that have led to this. This study will explore the most significant factors that have an effect on the unexpected change of customer behaviour and cybercrime perceived risk during the COVID-19 pandemic in Saudi Arabia. The finding of the study will hopefully contribute to attempts in finding safer methods for shopping online during COVID-19 and similar crisis.

A Model to Identify Expeditiously During Storm to Enable Effective Responses to Flood Threat

  • Husain, Mohammad;Ali, Arshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.23-30
    • /
    • 2021
  • In recent years, hazardous flash flooding has caused deaths and damage to infrastructure in Saudi Arabia. In this paper, our aim is to assess patterns and trends in climate means and extremes affecting flash flood hazards and water resources in Saudi Arabia for the purpose to improve risk assessment for forecast capacity. We would like to examine temperature, precipitation climatology and trend magnitudes at surface stations in Saudi Arabia. Based on the assessment climate patterns maps and trends are accurately used to identify synoptic situations and tele-connections associated with flash flood risk. We also study local and regional changes in hydro-meteorological extremes over recent decades through new applications of statistical methods to weather station data and remote sensing based precipitation products; and develop remote sensing based high-resolution precipitation products that can aid to develop flash flood guidance system for the flood-prone areas. A dataset of extreme events has been developed using the multi-decadal station data, the statistical analysis has been performed to identify tele-connection indices, pressure and sea surface temperature patterns most predictive to heavy rainfall. It has been combined with time trends in extreme value occurrence to improve the potential for predicting and rapidly detecting storms. A methodology and algorithms has been developed for providing a well-calibrated precipitation product that can be used in the early warning systems for elevated risk of floods.

Information Security Strategy by Risk Factors based on Smart Railway Communications (스마트 철도 통신기반 위험요인에 따른 정보보호 방안)

  • Park, Eun-Kyung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.4
    • /
    • pp.695-702
    • /
    • 2022
  • Smart railway system, which has been actively studied in recent years, is entering the intelligent stage beyond the automation stage based on ICT (Information & Communication Technology) such as communication technology and information technology. ICT technology used in smart railways is generally supported by various information protection technologies as it is vulnerable to information infringement. As a means of high-speed/mass transportation, it is essential to devise an information protection plan for ICT technology that forms the basis for smartening the railway system. Therefore, this paper presents the necessity of step-by-step information protection that measures for smart railway communication by examining potential risk factors of smart railway communication base and considering information protection factors that can respond to them.

A Process of the Risk Management for a Space Launch Vehicle R&D Project (우주발사체 개발사업의 위험관리 프로세스)

  • Cho, Dong Hyun;Yoo, Il Sang
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.12 no.2
    • /
    • pp.19-27
    • /
    • 2016
  • Many countries concentrated on the space developments to enhance the national security and the people's quality of life. A space launch vehicle for accessing the space is a typical large complex system that is composed of the high-technology like high-performance, high-reliability, superhigh-pressure, etc. The project developing large complex system like space launcher is mostly conducted in the uncertain environment. To achieve a goal of the project, its success probability should be enhanced consistently by reducing its uncertainty during the life cycle: it's possible to reduce the project's uncertainty by performing the risk management (RM) that is a method for identifying and tracing potential risk factors in order to eliminate the risks of the project. In this paper, we introduce the risk management (RM) process applied for a Space Launch Vehicle R&D Project.

Design and Implementation of Road Construction Risk Management System based on LPWA and Bluetooth Beacon

  • Lee, Seung-Soo;Kim, Yun-cheol;Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.145-151
    • /
    • 2018
  • While commercialization of IoT technologies in the safety management sector is being promoted in terms of industrial safety of large indoor businesses, implementing a system for risk management of small outdoor work sites with frequent site movements is not actively implemented. In this paper, we propose an efficient dynamic workload balancing strategy which combined low-power, wide-bandwidth (LPWA) communication and low-power Bluetooth (BLE) communication technologies to support customized risk management alarm systems for each individual (driver/operator/manager). This study was designed to enable long-term low-power collection and transmission of traffic information in outdoor environment, as well as to implement an integrated real-time safety management system that notifies a whole field worker who does not carry a separate smart device in advance. Performance assessments of the system, including risk alerts to drivers and workers via Bluetooth communication, the speed at which critical text messages are received, and the operation of warning/lighting lamps are all well suited to field application.

Security Education Training Program Characteristics needed to Development Task of Security Software in Security Majors of 5 Universities of Seoul Region (서울지역 5개 대학 보안 전공들의 보안소프트웨어의 개발 직무에 필요한 보안 교육 훈련 프로그램 특성)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.16-22
    • /
    • 2020
  • In this paper, the technology and capabilities required for the job of developing security software recommended by the Cybersecurity Human Resources Development Framework of the National Initiative for Cybersecurity Education (NICE) were studied. In this paper, we describe what security skills are needed for the task of developing security software and what security capabilities should be held. The focus of this paper is to analyze the consistency between security technologies (core and specialized technologies) required for security software development tasks and the curriculum of information protection-related departments located in Seoul, Korea. The reason for this analysis is to see how the curriculum at five universities in Seoul is suitable for performing security software development tasks. In conclusion, if the five relevant departments studied are to intensively train developers of development tasks for security software, they are commonly required to train security testing and software debugging, how secure software is developed, risk management, privacy and information assurance.

Development of Security Metrics of Enterprise Security Management System (통합보안관리시스템의 보안성 메트릭 개발)

  • Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.303-311
    • /
    • 2017
  • As new information technology emerges, companies are introducing an Enterprise Security Management system to cope with new security threats, reducing redundant investments and waste of resources and counteracting security threats. Therefore, it is necessary to construct a security evaluation metric based on related standards to demonstrate that the Enterprise Security Management(ESM) System meets security. Therefore, in order to construct a metric for evaluating the security of the ESM, this study analyzed the security quality related requirements of the ESM and constructed a metric for measuring the degree of satisfaction. This metric provides synergies through the unification of security assessments that comply with ISO/IEC 15408 and ISO/IEC 25000 standards. It is expected that the evaluation model of the security quality level of ESM will be established and the evaluation method of ESM will be standardized in the future.