• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.039 seconds

A Study on Establishing of the Future Development Strategy for National Cyber Terror Response (국가 사이버테러대응 미래 발전전략 수립에 관한 연구)

  • Kim, MinSu;Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.15-24
    • /
    • 2020
  • Cyber terror and cyberwarfare are no longer virtual, but real, and as an actual security situation, it is necessary to have new understanding through expanding the concept of war to neutralize not only the other country's military command system, but also the country's main functions such as telecommunications, energy, finance, and transport systems, and it also needs to establish the future development strategy of cyber terror response at the national level. Through analysis of cyberwarfare trends in each country and current status of cyberwarfare in Korea, it will systematically explore the demand of new policy based on laws and systems, including the strategies of cyber security technology development, industry promotion, and manpower training and existing information protection policies. through this, it effectively manages a sustainable national crisis, and it suggests to establish a future strategy for the medium and long term cyber security that can effectively and actively respond to cyberwarfare.

Adaptive Multi-Layer Security Approach for Cyber Defense (사이버 방어를 위한 적응형 다중계층 보호체제)

  • Lee, Seong-kee;Kang, Tae-in
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.1-9
    • /
    • 2015
  • As attacks in cyber space become advanced and complex, monotonous defense approach of one-one matching manner between attack and defense may be limited to defend them. More efficient defense method is required. This paper proposes multi layers security scheme that can support to defend assets against diverse cyber attacks in systematical and adaptive. We model multi layers security scheme based on Defense Zone including several defense layers and also discuss essential technical elements necessary to realize multi layers security scheme such as cyber threats analysis and automated assignment of defense techniques. Also effects of multi layers security scheme and its applicability are explained. In future, for embodiment of multi layers security scheme, researches about detailed architecture design for Defense Zone, automated method to select the best defense technique against attack and modeling normal state of asset for attack detection are needed.

Implementation of Collaboration Distance Guarding System based CBM(Computer Based Multimedia) (CBM 기반의 상호참여형 원격 방범시스템 구현)

  • 김석수;신광철
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.2
    • /
    • pp.161-168
    • /
    • 1998
  • This paper proposes the distance-video-guarding system technology based on collaboration CBM personal computer which enables additional functions such as monitoring each room while the guarding is in progress. This system sends the atmosphere of guarding by checking the status of environment with the sensor using ISDN. Current remote guarding desktop system uses leased lines (T1/E1 ) applying fast speed rate and security. This system provides an external monitoring system which runs on ISDN Public line also. Monitoring system transfers the natural status of each site to center controller of the guarding system.

  • PDF

Dynamic Analysis of a System Using Reduced Modeling of Substructures (부분구조물의 단순모델화를 이용한 시스템의 동적해석)

  • Hwang, Woo-Seok
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.19 no.2
    • /
    • pp.200-207
    • /
    • 2009
  • Complex systems are made of many subsystems, those are developed and manufactured by many part companies. Even though the information for a part is necessary to analyze the performance of the other part, it is not so easy to get the information for that part from other companies due to many reasons like security or compatibilities. If the modal parameters of a system between the connecting points are available, we can reconstruct a reduced model for that system in a physical coordinate not in a generalized coordinate. The assemble of the equations of motion for the main system and the reduced equations of motion for the connected system can give a response of the main system considering the effects of connected systems. The results show that the proposed method can give the response of a system accurately. The rule for the selection of modes is to use the fundamental modes whose natural frequencies are low.

A study for Electronic Billing System on the Cyber Supporting Site (사이버 도우미를 위한 전자후원시스템 구축에 관한 연구)

  • 김석수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.33-39
    • /
    • 2000
  • This paper designed the electronic billing system for implementation web site of the social welfare and help-line. And, it possible to the various supporting method between supporter and receiver on the cyberspace. Also, this system is modified to electronic supporting system from the electronic billing system of EC(Electronic Commercial). The electronic billing system is more security and efficiencial billing system than the conventional off-line system.

  • PDF

Use of Innovation and Information Technologies In Music Lessons

  • Potapchuk, Tetiana;Fabryka-Protska, Olga;Gunder, Liubov;Dutchak, Violetta;Osypenko, Yaroslav;Fomin, Kateryna;Shvets, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.300-308
    • /
    • 2021
  • The processes of informatization of the modern educational space are inextricably linked with the active introduction of innovative information technologies, which diversify the forms of education and upbringing. The use of these technologies in education due to their specific properties significantly enhances the clarity of learning, emotional impact on students, helps to deepen interdisciplinary links, intensifies students' work, and improves the organization of educational activities. Innovative information technologies offer new opportunities for the use of text, audio, graphic, and video information in lessons, enriching the methodological possibilities of the lesson. Today, the use of these technologies is becoming an integral part of the study of any subject. Using multimedia presentations, publications, and websites created by students in the learning process, they can develop learning skills. According to researchers, there are many multimedia programs for working with a computer in a music lesson, namely: a music player, a program for singing karaoke, a music constructor, music encyclopedias, and training programs. The introduction of innovative information technologies in the system of music education allows expanding learning opportunities.

Care Cost Prediction Model for Orphanage Organizations in Saudi Arabia

  • Alhazmi, Huda N;Alghamdi, Alshymaa;Alajlani, Fatimah;Abuayied, Samah;Aldosari, Fahd M
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.84-92
    • /
    • 2021
  • Care services are a significant asset in human life. Care in its overall nature focuses on human needs and covers several aspects such as health care, homes, personal care, and education. In fact, care deals with many dimensions: physical, psychological, and social interconnections. Very little information is available on estimating the cost of care services that provided to orphans and abandoned children. Prediction of the cost of the care system delivered by governmental or non-governmental organizations to support orphans and abandoned children is increasingly needed. The purpose of this study is to analyze the care cost for orphanage organizations in Saudi Arabia to forecast the cost as well as explore the most influence factor on the cost. By using business analytic process that applied statistical and machine learning techniques, we proposed a model includes simple linear regression, Naive Bayes classifier, and Random Forest algorithms. The finding of our predictive model shows that Naive Bayes has addressed the highest accuracy equals to 87% in predicting the total care cost. Our model offers predictive approach in the perspective of business analytics.

Empirical Investigation of User Behavior for Financial Mydata: The Moderating Effects of Organizational Information Transparency and Data Security Policy (금융마이데이터 사용자 행동에 관한 실증 연구: 기관정보투명성, 데이터 보안정책의 조절효과)

  • Sohn, Chang Yong;Park, Hyun Sun;Kim, Sang Hyun
    • The Journal of Information Systems
    • /
    • v.32 no.3
    • /
    • pp.85-116
    • /
    • 2023
  • Purpose The importance of data as a key resource of the intelligence revolution is being highlighted, among all those phenomena MyData is attracting attention as a key concept by organizations and individuals that eventually leads the data economy. In this regard, this study was started to contribute to the successful settlement and continuous growth of the domestic MyData industry, which has just entered the system. Design/methodology/approach To develop and test all proposed casual relationships within the research model, we used the Value-Attitude-Behavior(VAB) model as a basic framework. A total of 385 copies were used for the final analysis, and for SPSS 25.0, MS-Excel 2016, and AMOS 24.0 to summarize respondent demographic characteristics, measurement model, and structural model. Findings Findings show that all proposed hypotheses were supported with the exception of the moderating effect of organizational information transparency between data controllability and perceived value, and between data controllability and attitude toward MyData service.

Design of Intrusion Detection System to be Suitable at the Information System Organized by Homogeneous Hosts (동질형 호스트들로 구성된 정보시스템에 적합한 침입탐지시스템의 설계)

  • 이종성;조성언;조경룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.267-282
    • /
    • 2000
  • With the development of computer&network technology and the growth of its dependance, computer failures not only lose human and material resources but also make organization's competition weak as a side-effect of information society. Therefore, people consider computer security as important factor. Intrusion Detection Systems (IDS) detect intrusions and take an appropriate action against them in order to protect a computer from system failure due to illegal intrusion. A variety of methods and models for IDS have been developed until now, but the existing methods or models aren't enough to detect intrusions because of the complexity of computer network the vulnerability of the object system, insufficient understanding for information security and the appearance of new illegal intrusion method. We propose a new IDS model to be suitable at the information system organized by homogeneous hosts and design for the IDS model and implement the prototype of it for feasibility study. The IDS model consist of many distributed unit sensor IDSs at homogeneous hosts and if any of distributed unit sensor IDSs detect anomaly system call among system call sequences generated by a process, the anomaly system call can be dynamically shared with other unit sensor IDSs. This makes the IDS model can effectively detect new intruders about whole information system.

  • PDF

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.