• Title/Summary/Keyword: Threat Intelligence

Search Result 125, Processing Time 0.029 seconds

A Study on Difference between Private Security and Private Investigation (민간경비업과 민간조사업의 차이점 연구)

  • Son, Dong-Woon;Jo, Sung-Gu;Kim, Dong-Je
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.295-317
    • /
    • 2014
  • In advanced country, private investigation system is made up of private security and in domestic, there is growing need constantly to introduce private investigation but it is not passed until now in assembly so a messenger office which is run illegally is growing because of demand by subdividing business areas. That is a proof that both the police and private security don't meet demand of public peace to the public. that's why the police has own businesses like a investigation, traffic, intelligence, crime prevention and private security's business areas are limited like a facilities security, escort security, protection of a person, machine security, special security as the Private Security Act. This study attempts to know structural difference between private security system and private investigation system in case private investigation system becomes one of the private security. on some question, respondents reply like that private security and private investigation is very different(71.2%), different(22.4%), average(6.3%), similar(0.0%), very similar(0.0%). the result seems like respondents recognize private security and private investigation as different businesses. In the result of non-quantity analysis, the differences seem like a business character, expense, business scope, public power, scale of organization, object of threat, legislation. In domestic, effort to legislate private investigation system has undergone difficulty since congressman Ha Soon Bong's motion in 1999 and today, congressman Yoon Jae Ok's All Amendments Private Security Act and congressman Song Young Geun's Private Inveswtigation Act are pending in assembly. This study's result is intended for examining difference in exploration between private security and private investigation and then there is going to propose to the policy in case private investigation system is passed in assembly by amending Private Security Act like congressman Yoon Jea Ok's All Amendment Private Security Act.

  • PDF

An Auto-Verification Method of Security Events Based on Empirical Analysis for Advanced Security Monitoring and Response (보안관제 효율성 제고를 위한 실증적 분석 기반 보안이벤트 자동검증 방법)

  • Kim, Kyu-Il;Park, Hark-Soo;Choi, Ji-Yeon;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.507-522
    • /
    • 2014
  • Domestic CERTs are carrying out monitoring and response against cyber attacks using security devices(e.g., IDS, TMS, etc) based on signatures. Particularly, in case of public and research institutes, about 30 security monitoring and response centers are being operated under National Cyber Security Center(NCSC) of National Intelligence Service(NIS). They are mainly using Threat Management System(TMS) for providing security monitoring and response service. Since TMS raises a large amount of security events and most of them are not related to real cyber attacks, security analyst who carries out the security monitoring and response suffers from analyzing all the TMS events and finding out real cyber attacks from them. Also, since the security monitoring and response tasks depend on security analyst's know-how, there is a fatal problem in that they tend to focus on analyzing specific security events, so that it is unable to analyze and respond unknown cyber attacks. Therefore, we propose automated verification method of security events based on their empirical analysis to improve performance of security monitoring and response.

How does Man and Non-human beings meet? (인간과 비인간 존재는 어떻게 만나는가?)

  • Sim, Gui-yeon
    • Journal of Korean Philosophical Society
    • /
    • v.147
    • /
    • pp.239-260
    • /
    • 2018
  • Is an artificial intelligence robot, a non-human beings newly emerging in the age of technology, a threat to human beings, or a mutual cooperation or ensemble with human beings? The desire to control nature through the use of the power of science and technology is manifested in the fear that humans can annihilate themselves. This study attempts to identify the problems of Cartesian epistemology underlying these questions and fears and to answer these questions based on Merleau - Ponty 's ontological ontology using the Ontology and Latour' s ontology and technological philosophy. The cogito derived from the Cartesian philosophy became the basis of the structure of dichotomous epistemology of 'subjectivity and objectivity' based on human - reason. In the human-centered world, all non-human beings were tools or controls for humans. The problem of the modern people is not only to get help from the natural scientific methods to control the nature including man, but also to think that scientific method is the only way to understand the world. In criticizing this, Merleau-Ponty shows that the body mediates between human beings and non-human beings, and provides a possible ontological basis for the ontology. Merleau - Ponty 's phenomenological methodology and ontology are newly developed by Simondon under the influence of phenomenological philosopher and phenomenology. The relationship between human beings and nonhuman beings by Simondon appears as an ensemble of human and technical objects or a mutual co - operation of human and technical objects. In particular, Latour goes a step further in Simondon and defines all the bodies living in the world as actor-network theory, denying the core concept of modernity. Merleau - Ponty 's phenomenological view can be a new possible basis for the philosophical discussion of the technological age. We will see that the problem itself can be solved by shifting modern fear to a phenomenological attitude.

A Study on the Feasibility of the Espionage Charges for the Industrial Technology Divulgence (산업기술의 해외유출행위에 대한 간첩죄 처벌 타당성 연구)

  • Kim, Hang-Gon;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.253-275
    • /
    • 2018
  • Economic security emerged as a strong element of national security. Nations around the world are exerting their efforts to collect economic intelligence to serve their national interest while making added efforts to uncover industrial espionage and arrest industrial spies in defensive aspect. Cases in point are the enactment of "Economic Espionage Act(1996)" of the U.S. and the "Act on Prevention of Divulgence and Protection of Industrial Technology(2006)"of Korea. Korea is trying to punish industrial spying on the same level as espionage that poses national security threat by revising Criminal Code. It is necessary to review whether the move to toughen the punishment of industrial spying from "up to 15 years in prison and/or up to 1.5 billion won in fine" to "minimum seven years of imprisonment, life imprisonment or death penalty" is appropriate. Advanced nations regulate industrial spying with a special act on economy although they have applied espionage act not to "enemy states" but to "foreign countries" in the first place. Likewise, preventing industrial spying by applying espionage act through the revision of criminal code poses a risk of undermining the autonomy of industry sector by excessive influence of state power. Furthermore, the penalty of minimum imprisonment of seven years, life imprisonment or death penalty with the application of espionage act under the criminal code is an legal application by stretching of the law, posing a risk of dampening healthy economic activities. Therefore, revising and applying relevant economic laws such as aforementioned 'Act on Prevention of Divulgence and Protection of Industrial Technology(2006)' is thought to be desirable to achieve the goal of protecting industrial technologies.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.

COVID-19-related Korean Fake News Detection Using Occurrence Frequencies of Parts of Speech (품사별 출현 빈도를 활용한 코로나19 관련 한국어 가짜뉴스 탐지)

  • Jihyeok Kim;Hyunchul Ahn
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.267-283
    • /
    • 2023
  • The COVID-19 pandemic, which began in December 2019 and continues to this day, has left the public needing information to help them cope with the pandemic. However, COVID-19-related fake news on social media seriously threatens the public's health. In particular, if fake news related to COVID-19 is massively spread with similar content, the time required for verification to determine whether it is genuine or fake will be prolonged, posing a severe threat to our society. In response, academics have been actively researching intelligent models that can quickly detect COVID-19-related fake news. Still, the data used in most of the existing studies are in English, and studies on Korean fake news detection are scarce. In this study, we collect data on COVID-19-related fake news written in Korean that is spread on social media and propose an intelligent fake news detection model using it. The proposed model utilizes the frequency information of parts of speech, one of the linguistic characteristics, to improve the prediction performance of the fake news detection model based on Doc2Vec, a document embedding technique mainly used in prior studies. The empirical analysis shows that the proposed model can more accurately identify Korean COVID-19-related fake news by increasing the recall and F1 score compared to the comparison model.

Machine- and Deep Learning Modelling Trends for Predicting Harmful Cyanobacterial Cells and Associated Metabolites Concentration in Inland Freshwaters: Comparison of Algorithms, Input Variables, and Learning Data Number (담수 유해남조 세포수·대사물질 농도 예측을 위한 머신러닝과 딥러닝 모델링 연구동향: 알고리즘, 입력변수 및 학습 데이터 수 비교)

  • Yongeun Park;Jin Hwi Kim;Hankyu Lee;Seohyun Byeon;Soon-Jin Hwang;Jae-Ki Shin
    • Korean Journal of Ecology and Environment
    • /
    • v.56 no.3
    • /
    • pp.268-279
    • /
    • 2023
  • Nowadays, artificial intelligence model approaches such as machine and deep learning have been widely used to predict variations of water quality in various freshwater bodies. In particular, many researchers have tried to predict the occurrence of cyanobacterial blooms in inland water, which pose a threat to human health and aquatic ecosystems. Therefore, the objective of this study were to: 1) review studies on the application of machine learning models for predicting the occurrence of cyanobacterial blooms and its metabolites and 2) prospect for future study on the prediction of cyanobacteria by machine learning models including deep learning. In this study, a systematic literature search and review were conducted using SCOPUS, which is Elsevier's abstract and citation database. The key results showed that deep learning models were usually used to predict cyanobacterial cells, while machine learning models focused on predicting cyanobacterial metabolites such as concentrations of microcystin, geosmin, and 2-methylisoborneol (2-MIB) in reservoirs. There was a distinct difference in the use of input variables to predict cyanobacterial cells and metabolites. The application of deep learning models through the construction of big data may be encouraged to build accurate models to predict cyanobacterial metabolites.

Mechanical behavior of 316L austenitic stainless steel bolts after fire

  • Zhengyi Kong;Bo Yang;Cuiqiang Shi;Xinjie Huang;George Vasdravellis;Quang-Viet Vu;Seung-Eock Kim
    • Steel and Composite Structures
    • /
    • v.50 no.3
    • /
    • pp.281-298
    • /
    • 2024
  • Stainless steel bolts (SSB) are increasingly utilized in bolted steel connections due to their good mechanical performance and excellent corrosion resistance. Fire accidents, which commonly occur in engineering scenarios, pose a significant threat to the safety of steel frames. The post-fire behavior of SSB has a significant influence on the structural integrity of steel frames, and neglecting the effect of temperature can lead to serious accidents in engineering. Therefore, it is important to evaluate the performance of SSB at elevated temperatures and their residual strength after a fire incident. To investigate the mechanical behavior of SSB after fire, 114 bolts with grades A4-70 and A4-80, manufactured from 316L austenitic stainless steel, were subjected to elevated temperatures ranging from 20℃ to 1200℃. Two different cooling methods commonly employed in engineering, namely cooling at ambient temperatures (air cooling) and cooling in water (water cooling), were used to cool the bolts. Tensile tests were performed to examine the influence of elevated temperatures and cooling methods on the mechanical behavior of SSB. The results indicate that the temperature does not significantly affect the Young's modulus and the ultimate strength of SSB. Up to 500℃, the yield strength increases with temperature, but this trend reverses when the temperature exceeds 500℃. In contrast, the ultimate strain shows the opposite trend. The strain hardening exponent is not significantly influenced by the temperature until it reaches 500℃. The cooling methods employed have an insignificant impact on the performance of SSB. When compared to high-strength bolts, 316L austenitic SSB demonstrate superior fire resistance. Design models for the post-fire mechanical behavior of 316L austenitic SSB, encompassing parameters such as the elasticity modulus, yield strength, ultimate strength, ultimate strain, and strain hardening exponent, are proposed, and a more precise stress-strain model is recommended to predict the mechanical behavior of 316L austenitic SSB after a fire incident.

An Exploratory study on the Direction of Home Economics Education associated with the future social change: focusing on the new recognition of the characteristic as the Subjects for Life and Happiness (미래 사회의 변화와 가정과교육의 방향 탐색 - '삶 중심 교과'와 '행복 교과'로서의 성격 재인식을 중심으로 -)

  • Wang, Seok-Soon
    • Journal of Korean Home Economics Education Association
    • /
    • v.28 no.3
    • /
    • pp.17-32
    • /
    • 2016
  • This exploratory study which applied environmental scanning method to analyse a change in a future society tried to diagnose a reaction ability of our education system for the change in the future society. In addition, the study tried to explore an adequate direction for Home Economics Subject to be an mandatory subject continuously toward the change in the future society. Main changes in the future society can be expected as 1) demographic change due to low birth rate and aging society, 2) an increasing threat of a human living environment due to unexpectable natural disasters and accidents, 3) a radical progress into a ubiquitous computing environment led by AI, 4) an advent of a borderless economic society and a change for jobs, 5) a change in North Korea, and so on. Our education system which mostly concentrates on education to develop constructive intelligence by halving the society and schooling as yet, however, is diagnosed as it has a paradox that can not understand an emotional competency as a target for studying. Home Economics Subject is worth as the subject that can exactly complement a blind spot of our education system which can not respond to the future society adequately. This is because Home Economics Subject has had a characteristic as a 'Subject of Life' traditionally that has dealt with an overall 'life' of human beings, and the characteristic is favorable to develop human practical intelligence. Thus, because the 'life' is the main point of Home Economics Subject, it has the characteristic as a 'Subject of Happiness' which is the most effective method to develop a tendency to appreciate, a sense of empathy, and lots of pro-social behaviors that are important capacities to seek for happiness. As Alderfer's ERG Theory is to understand human beings' behavior based on the satisfactory of human beings' hierarchical desires, it is suggested as an adequate frame for the theory to restructure the characteristic of Home Economics Subject which develops the 'capacity to seek for happiness' by focusing the 'life', into core concept and core capacity of curriculum. A follow-up study should make a connection between ERG Theory and core concept and core capacity of curriculum to explore how the theory can be reflected on Home Economics curriculum.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.