• Title/Summary/Keyword: Technical Security

Search Result 930, Processing Time 0.021 seconds

A Study on the Enterprise security convergence strategy in the IoT(the Internet of Things) Era (IoT시대의 기업 융합보안 전략에 대한 연구)

  • Noh, Jong-ho;Lee, Jong-hyeong;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.33-39
    • /
    • 2017
  • In the age of full scale IoT, concept of "security convergence" has been popularized widely. However, it is not clear whether current "security convergence" concept reflects IoT characteristics and traits. In this thesis, a new concept, complementing "security convergence" concept researches up to date, has been suggested considering IoT characteristics. Required governance methodology and key technical factors are suggested for re-establishment of "security convergence" concept and for enterprise security strategy development.

A Study of Aesthetical Value of Composition Principle on Security Guard Martial Arts (경호무도 구성원리의 미학적 탐색)

  • Kim, Pyong-Soo;Lim, Dae-yong;Son, Jin
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.131-146
    • /
    • 2010
  • Purpose of this research about reduction the scholastic systematic triangular position of the security guard martial art which repeats a development is insufficient with demand of the while society to recognize and for the philosophic value research of security guard martial art composition principle puts out with the one method and from the reporter to search the aesthetics which appears does. In order to attain the goal of the research which sees the literature which relates with an security guard martial art widly, was an investigation and observed the aesthetics from concept and martial art of aesthetics and this the technical free use ability from actual site of the technical find which leads the practice voluntary repetition practice of security guard martial art with character and the body guard aesthetic integral part experience possibly did, there being will be able to acquire an aesthetic inspiration, confirmed. So the security guard martial art follows the composition principle of maximization central attitude and shock point breath control and mental intensive etc. of reinforcement of direction shock of relativity redundancy mental moral culture body agreement characteristic force and relaxation force and is completed and will be able to embody an aesthetic value with aesthetic elements of technical polishing process inside goes about reduction.

  • PDF

The Relationship between Offline Trust and Online Transaction in Internet Banking (인터넷 뱅킹에서 오프라인 신뢰와 온라인 거래의 관계)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.29-47
    • /
    • 2007
  • Owing to the rapid growth of using the Internet, not only click-and-mortar companies but also brick-and-mortar ones have been expanding their distribution channels into online, Moreover, since online channels are more attractive than offline ones in control and maintenance, switching customers into online ones is emerged as one of very important managerial issues in a view of reduction of cost as well as expansion of services. However, the switched customers should be faced by uncertainties which could not have been experienced in offline. Specifically, in online channels, buyers and sellers are separated temporally and spacially and there are always so many kinds of threat for security as well as not enough systems and conventions for them yet. Therefore, trust has been considered as one of the most critical mechanisms for resolution of such uncertainties in online transactions. However, it is not easy to build and maintain the relationships in online since most of them are virtual and indirect generally. Therefore, in order to switch offline customers into online ones, it is very important to make strategies based on identification of the relationship between online transaction and offline trust which has been built in offline business. Generally offline trust, which has been built independent of online, could not include trust for online-dependent activities such as payment security during or after transactions, while most of online trust include it. Therefore, a customer with high offline trust does not always perceive high security and assure safe transactions. Accordingly, while online trust, where technical capabilities for online security is one of main bases, includes control trust implicitly or explicitly, offline trust does not. However. in spite of such clear discrimination and independence between offline trust and perceived security, there can be the significant dependency between these two beliefs. The customers with high offline trust believe that the company would do some activities for online security for customers' safe transactions since it has been believed of doing well for customers' trust. Theoretically, users' perception of security is interpreted as a kind of control trus, which is trust for company's technical control capacities in order to resolve technical uncertainties in online. Therefore, the relationship between two beliefs can be considered as transference from offline trust to another type trust. that is, control trust. The objective of this study is to analyze the effect of offline trust on online transaction uses mediated by perceived security. For this purpose, we suggest a research model based on technology acceptance model (TAM). Reuse intention is adopted as a dependent variable and TAM is modified by adding perceived risk (PR) as well as two beliefs of using Internet banking, perceived usefulness (PU) and perceived ease of use (PEOU). Moreover, perceive security (PS) is adopted as an external variable for PR and PU, while offline trust (OT) is an antecedent of PS. For an empirical test, sampling from 108 visitors to the banks in Daegu, Korea, we analyze our model by partial least square (PLS) approach. In result, our model is shown to explain 51.4% of the variance in reuse intention and all hypothesis are supported statistically. A theoretical implication of this study is to identify a role of PS between offline trust and reuse intention of using online transaction services. According to our result, PS can be considered as a mediation variable for bridging between two different concepts: trust that explains social aspects of customers and companies, and TAM that explains customers' reuse intention.

A Study on the Isolated Cloud Security Using Next Generation Network

  • Park, Jae-Kyung;Lee, Won Joo;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.9-16
    • /
    • 2017
  • In this paper, we propose to present a model of cloud security that has emerged as the biggest topic of cloud computing, replacing the traditional IT environment. While cloud computing is an extension of existing IT technology, security issues and threats can be applied to traditional security technologies. However, the biggest difference between a typical computing environment and a cloud computing environment is a virtualized environment with a hypervisor. Currently, there are many weaknesses in the virtualized environment, and there are few related security products. In order for a cloud computing environment to function as a reliable IT environment, we expect more research on hypervisor-based security technologies, and we expect to secure safer cloud services through a secure model over the next generation of new-based networks.

X-Ray Security Checkpoint System Using Storage Media Detection Method Based on Deep Learning for Information Security

  • Lee, Han-Sung;Kim Kang-San;Kim, Won-Chan;Woo, Tea-Kun;Jung, Se-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1433-1447
    • /
    • 2022
  • Recently, as the demand for physical security technology to prevent leakage of technical and business information of companies and public institutions increases, the high tech companies are operating X-ray security checkpoints at building entrances to protect their intellectual property and technology. X-ray security checkpoints are operated to detect cameras and storage media that may store or leak important technologies in the bags of people entering and leaving the building. In this study, we propose an X-ray security checkpoint system that automatically detects a storage medium in an X-ray image using a deep learning based object detection method. The proposed system consists of an edge computing unit and a cloud-computing unit. We employ the RetinaNet for automatic storage media detection in the X-ray security checkpoint images. The proposed approach achieved mAP of 95.92% on private dataset.

Study on the Association between Personal Information Protection Legislation and Information Security Product (개인정보보호 관련 법령의 내용과 보안제품 분포간의 연관성 분석)

  • Kim, Min-Jeong;Lee, Jung Won;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1549-1560
    • /
    • 2015
  • For the past few years, personal information breach incidents, great and small, occurred constantly. Accordingly, the Personal Information Protection related Ordinances are enacted and amended persistently, and the information security products also keep advancing and developing in the same way. There are the certification systems such as Common Criteria Evaluation and Validation(CC) and Korea Cryptographic Module Validation Program(KCMVP) for the information security products. These are also strictly carried out. This paper analyzes and categorizes the 5 Personal Information Protection related Ordinances in the aspects of technical protection measures by using key words. Here are the 5 related ordinances; 'the Personal Information Protection Act', 'the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc', 'the Act on the Protection, Use, Etc, of Location Information', 'the Use and Protection of Credit Information Act', and 'the Electronic Financial Transactions Act.' Moreover, this study analyzes the association between the technical protection measures in the 5 relevant laws and the information security products that are obtaining the CC Evaluation & Validation(CC) and the products that are now produced at KISIA's member companies.

Regulatory Policy: Bibliometric Analysis Using the VOSviewer Program

  • Zhavoronok, Artur;Chub, Anton;Yakushko, Inna;Kotelevets, Dmytro;Lozychenko, Oleksandr;Kupchyshynа, Olga
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.39-48
    • /
    • 2022
  • Today the regulation of socio-economic development has been the subject of active scientific debate. The modern paradigm of regulatory policy in foreign countries involves a change in the role and strategy of the state, which determines the relevance of this topic. The aim of the article is to study the current state of regulatory policy research. The article is based on a bibliographic analysis of the study of regulatory policy. The study is based on the data search functions of the Scopus platform. It uses a set of VOSviewer program, online visualization of keywords in the titles of scientific journals and citations of publications. The study led to the conclusion that the number of publications that directly study the nature and features of regulatory policy is insignificant, but constantly growing. In our opinion, further research should determine the essence of regulatory policy as a separate category, a description of its features and factors of formation. It is also necessary to develop a common concept that governments should be actively involved in ensuring the quality of regulation, rather than responding to the shortcomings of regulation, which is evolving into regulatory governance.

Business Environment of Public Sector Enterprises: Using the International Rankings for Evaluation

  • Shalimova, Nataliia;Kuzmenko, Halyna;Shalimov, Volodymyr;Reshetov, Valerii;Androshchuk, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.297-309
    • /
    • 2022
  • Taking into account the globalization of the economy and the intensification of European integration processes, it has been proved that an important part of evaluating the effectiveness of activity of public sector enterprises should be a comparative analysis of the overall operation environment, namely public procurement, economic environment and tax policy, with the relevant systems of other countries of the world. The indicators and components of international ratings "Doing Business", "Paying Taxes", "Benchmarking Public Procurement" have been studied. Different groups of indicators forming "Doing Business" and "Paying Taxes" in the context of the impact on public sector enterprises have been identified: those which fully comply with the need to evaluate the operating environment of public sector enterprises and those which should be used with restrictions, regarding the peculiarities of creating and functioning of public sector enterprises. A comparative analysis of the place of Ukraine, Lithuania and Slovenia among other countries of the world in accordance with the international rankings of "Doing Business", "Paying Taxes", "Benchmarking Public Procurement" have been made. It has been substantiated that the results of such comparative analysis will allow identifying risk areas, and relevant information can be used in developing of recommendations for improving the effectiveness of activity of public sector enterprises.

A Proposed Conception of Technical Solutions to Address the Educational Loss in Mathematics in the Fifth Grade of Primary School

  • Ahmad Almassaad;Abdullah ALSHdaied
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.35-48
    • /
    • 2023
  • The study aimed to provide a proposed conception of technical solutions to address the educational loss in mathematics in the fifth grade of primary school, and the study adopted the descriptive approach. male and female teachers, and to achieve the study objective, the researcher built a tool for the study, a "questionnaire", in which he used the comprehensive inventory method, and the results of the study showed: identifying the learning outcomes that represent an educational loss, and identifying the learning outcomes that are considered essential in teaching and learning mathematics for the fifth grade of primary school. In the event that it is not achieved by students, it is considered an educational loss that may affect the future of students' education and learning. Because it is a basis for later experiences in mathematics in other classes, and the study also found the effectiveness of the proposed visualization of technical solutions provided to address the educational loss in mathematics for the fifth grade: (short electronic tests, YouTube channel, homework, educational platform, electronic worksheets, and communication channels).