• Title/Summary/Keyword: Social Threat

Search Result 246, Processing Time 0.025 seconds

A Study Of Mining ESM based on Data-Mining (데이터 마이닝 기반 보안관제 시스템)

  • Kim, Min-Jun;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.3-8
    • /
    • 2011
  • Advanced Persistent Threat (APT), aims a specific business or political targets, is rapidly growing due to fast technological advancement in hacking, malicious code, and social engineering techniques. One of the most important characteristics of APT is persistence. Attackers constantly collect information by remaining inside of the targets. Enterprise Security Management (EMS) system can misidentify APT as normal pattern of an access or an entry of a normal user as an attack. In order to analyze this misidentification, a new system development and a research are required. This study suggests the way of forecasting APT and the effective countermeasures against APT attacks by categorizing misidentified data in data-mining through threshold ratings. This proposed technique can improve the detection of future APT attacks by categorizing the data of long-term attack attempts.

A Study on the Security Structure of Next Generation E-mail System (차세대 이메일 보안 기술에 관한 연구)

  • Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.183-189
    • /
    • 2008
  • E-mail's role has been increased due to its merit which is sending demanded information in real-time anywhere, anytime. However, Today's E-mail security threats have being changed intelligently to attack against the specific agency. The threat is a limit to respond. Therefore precise definition and development of security technology is needed to analyze changing environment and technologies of e-mail so that remove fundamental security threat. we proposed Next Generation E-mail System Security Structure and the Next Generation fusion System using authentication As a result, in this study, we development of Next Generation E-mail System Security Structure. This system can protect E-mail user from social engineering hacking technique, spam, virus, malicious code and fabrication.

  • PDF

A study on analysis of 7-Eleven's competition structure and competitiveness using Porter's 5 Force model

  • Kwang-Keun LEE
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.1
    • /
    • pp.202-208
    • /
    • 2024
  • Objective: The purpose of this study is to examine the competitive environment of 7-Eleven using Porter's 5 Force model to analyze the specific competitiveness of 7-Eleven that has maintained continuous growth as a competitive company. Methods: This study is a case study of 7-Eleven. Results: As a result of the analysis, 7-Eleven has reinforced its competitiveness with existing competitors by raising entry barriers by expanding domestic stores and developing overseas convenience store business, focusing on North America, based on economy of scale. In addition, 7-Eleven seeks to differentiate itself from other convenience stores by developing a "private brand" and strengthens its bargaining power with suppliers through the development of new products by gathering information and know-how of experts in product development based on customer needs. The bargaining power with customers has been strengthened by building loyalty and trust in the brand by allowing consumers to purchase the same products at the same price no matter which store they visit. As a threat to potential competitors, 7-Eleven has secured a competition advantage by raising the barrier to entry by concentrating stores in specific areas through a dominant franchise development strategy and increasing awareness of 7-Eleven among consumers. In the case of threats from substitute products, it was confirmed that 7-Eleven has overcome the threat from substitute products by opening 24 hours a day and providing various services such as ATMs and copiers.

A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations (사회공학 사이버작전을 고려한 사회공학 사이버킬체인 개념정립 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1247-1258
    • /
    • 2018
  • The Cyber Kill Chain originally proposed by Lockheed Martin defines the standard procedure of general cyber attacks and suggests tailored defensive actions per each step, eventually neutralizing the intent of the attackers. Defenders can effectively deal with Advanced Persistent Threat(APT)s which are difficult to be handled by other defensive mechanisms under the Cyber Kill Chain. Recently, however, social engineering techniques that exploits the vulnerabilities of humans who manage the target systems are prevail rather than the technical attacks directly attacking the target systems themselves. Under the circumstance, the Cyber Kill Chain model should evolve to encompass social engineering attacks for the improved effectiveness. Therefore, this paper aims to establish a definite concept of Cyber Kill Chain for social engineering based cyber attacks, called Social Engineering Cyber Kill Chain, helping future researchers in this literature.

Trend Analysis by Risk Observation: How the German Statutory Accident Insurance Prepares for the Future in Occupational Safety and Health

  • Angelika Hauke;Eva Flaspoler;Ruth Kluser;Ina Neitzner;Dietmar Reinert
    • Safety and Health at Work
    • /
    • v.13 no.4
    • /
    • pp.429-439
    • /
    • 2022
  • Background: The risk observatory (RO) of the German Social Accident Insurance (DGUV) provides strategic support to the German Social Accident Insurance Institutions (GSAII) in proactive prevention. It does so by identifying future challenges and opportunities for occupational safety and health (OSH) resulting from new trends and developments that affect employees as well as children in elementary education, pupils, and students. Methods: The core of the RO is an online survey that relies on a pool of new trends and developments identified via internet and literature research. 865 prevention experts of the GSAII and the DGUV participated in the survey. They rated trends and developments regarding their sector-specific risks and opportunities for OSH in the 5 years to come. Results: Sector-specific and over-all results show that besides well-known OSH risks such as musculoskeletal stress and noise, developments relevant for OSH come to the fore that do not have their origin in work itself, but are strongly influenced by political, social, economic, environmental, or technical developments that accident insurance can only peripherally influence. Shortage of skilled staff was identified as a threat to OSH in almost all sectors. Conclusions: Prevention must find ways to address repercussions of such OSH risks. Cooperation and political awareness are therefore gaining in importance. Also, implementing a prevention culture in society and strengthening individuals' health and safety literacy, e.g., by target-group-specific communication and sensitization, as well as early safety and health education, help to counteract those OSH risks.

Effects of Nurses' Workplace Violence Experiences on Post-Traumatic Stress Disorder: Focusing on the Moderating Effect of Resilience and Social Support at Work (간호사의 폭력 경험이 외상 후 스트레스 장애에 미치는 영향: 회복탄력성과 조직 내 사회적 지지의 조절 효과를 중심으로)

  • Kang, Chae Eun;Eun, Young
    • Journal of Korean Clinical Nursing Research
    • /
    • v.28 no.2
    • /
    • pp.99-111
    • /
    • 2022
  • Purpose: This study aimed to identify the relationship between the experiences of workplace violence and post-traumatic stress disorder and the moderating effect of resilience and social support at work on the relationship in tertiary hospital nurses. Methods: This was a descriptive correlation study to confirm the moderating effect of resilience and social support at work on the factors affecting post-traumatic stress disorder for nurses who have experienced violence. A total of 146 registered nurses were recruited from a tertiary hospital from March to July 2020. The Participants who worked for more than one year and experienced violence at work completed self-reported questionnaires that measured the experiences of workplace violence and post-traumatic stress disorder, resilience, social support at work, and demographic information. The collected data were analyzed using t-test, ANOVA, Pearson's correlation coefficient, and hierarchical regression analysis. Results: The nurses experienced verbal abuse an average of 3.70±2.06 times a week, physical threat an average of 2.30±1.71 times a month, and physical assault an average of 0.76±0.82 times a year. The Experiences of workplace violence were significantly increased post-traumatic stress disorder. The result also showed that resilience moderated the relationship between the experience of verbal abuse and post-traumatic stress disorder in hospital nurses. However, there was no significant moderating effect of social support between workplace violence and post-traumatic stress disorder. Conclusion: The experiences of workplace violence influenced post-traumatic stress disorder in nurses and were moderated by resilience. Therefore, hospital administrators need to develop and provide a workplace violence prevention and resilience reinforcement program to reduce post-traumatic stress disorder in nurses. In addition, we suggest further research on the effect of social support in a workplace on the experiences of violence.

Analysis of Attitudes and Influencing Factors on Foreign Workers (외국인 근로자에 대한 태도와 영향요인 분석)

  • Lee, Misook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.150-160
    • /
    • 2018
  • The purpose of this study is to classify the attitudes of Korean people regarding foreign workers and to analyze the influence factors. Analysis of the attitude difference and the influential factors utilized the SPSS ${\chi}^2$ test and multinomial logistic regression analysis using 2016 data obtained from the 'Koreans' Consciousness and Values'. Socio-demographic variables, national identity, and socioeconomic variables were used as explanatory variables. The attitude types (friendly, negative, and dual) of respondents were identified, and the influence of explanatory variables influencing these attitudes was identified. Analysis found they have a relatively generous stance on granting legal rights, while they are negative regarding the economic and social threats from foreign workers. As a result of analyzing the factors affecting attitudes, there are significant differences in each influence. However, negative attitudes and dual attitude concerning with negative legal rights found common to the influence of the factors of national identity. Gender and ratio of foreign workers were influential factors for dual attitudes with a high economic threat. On the other hand, socioeconomic factors reflecting the realistic conflict theory were not found to have any effect. The negative attitude of foreign workers in our society can be regarded as cognitive threats rather than realistic experiences or conflicts.

Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique (사회공학기법을 이용한 피싱 공격 분석 및 대응기술)

  • Lee, Dong-Hwi;Choi, Kyong-Ho;Lee, Dong-Chun;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.171-177
    • /
    • 2006
  • The hacking aspect of recent times is changing, the phishing attack which uses a social engineering technique is becoming the threat which is serious in Information Security. It cheats the user and it acquires a password or financial information of the individual and organization. The phishing attack uses the home page which is fabrication and E-mail and acquires personal information which is sensitive and financial information. This study proposes the establishment of National Fishing Response Center, complement of relation legal system Critical intelligence distribution channel of individual and enterprise.

  • PDF

Environmental Sustainability and Social Desirability Issues in Pig Feeding

  • Yang, T.S.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.20 no.4
    • /
    • pp.605-614
    • /
    • 2007
  • Feeding pigs used to be a means of managing domestic resources that may otherwise have been wasted into valuable animal protein. Feeding pigs thus was a form of husbandry. Following recent rapid industrial development, pig rearing has changed from extensive to intensive, but this transformation has been associated with major concerns. The concentration of large amounts of pig manure in small arrears is environmentally hazardous. Moreover, high densities of animals in intensive production systems also impose a health threat for both animals and humans. Furthermore, the use of growth promoters and preventive medicines for higher production efficiencies, such as in-feed antibiotics, also induces microbial resistance thus affects human therapeutics. In addition, consumers are questioning the ethics of treating animals in intensive production systems. Animal welfare, environmental and bio-safe issues are re-shaping the nature of pig production systems. Feeding pigs thus involves not only the consideration of economic traits, but also welfare traits and environmental traits. Thus, a focus on technological feasibility, environmental sustainability and social desirability is essential for successful feeding operations. Feeding pigs now involves multiple projects with different sustainability goals, but goal conflicts exist since no pattern or scenario can fulfill all sustainability goals and the disagreements are complicated by reduced or even no use of in-feed antibiotics. Thus it is difficult to feed pigs in a manner that meets all goals of high quality, safe product, eco- and bio-sustainability, animal welfare and profit. A sustainable pig production system thus requires a prioritization of goals based on understanding among consumers, society and producers and needs to view from both a local and global perspective.

A Study on Improving Information Security Compliance of Organization Insider (조직 내부자의 정보보안 준수 향상에 대한 연구)

  • Hwang, In-Ho
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.4_2
    • /
    • pp.421-434
    • /
    • 2021
  • The expansion of information sharing activities using online can increase the threat of information exposure by increasing the diversity of approaches to information within an organization. The purpose of this study is to present conditions for improving the information security compliance intention of insiders to improve the level of information security within the organization. In detail, the study applies the theory of planned behavior that clearly explains the cause of an individual's behavior and proposes a way to increase the compliance intention by integrating the social control theory and goal-setting theory. The study presented research models and hypotheses based on previous studies, collected samples by applying a questionnaire technique, and tested hypotheses through structural equation modeling. As a result, information security attitude, subjective norms, and self-efficacy had a positive influence on the intention to comply. Also, attachment, commitment, and involvement, which are the factors of social control theory, formed a positive attitude toward information security. Goal difficulty and goal specificity, which are the factors of goal setting theory, formed a positive self-efficacy. The study presents academic and practical implications in terms of suggesting a method of improving the information security compliance intention of employees.