• 제목/요약/키워드: major in security science

검색결과 372건 처리시간 0.024초

Comparison of Health Status and Life Satisfaction According to Food Security in Single-Person Households of Elderly Population

  • Dong Hoon Jung;Jae Won Han;Wonha Kim;Hee-Sook Lim
    • Clinical Nutrition Research
    • /
    • 제13권1호
    • /
    • pp.42-50
    • /
    • 2024
  • This study analyzed the 2019 Community Health Survey data to compare and analyze the health levels and life satisfaction of single-person elderly households based on food security. The final study subjects were 15,606 single-person elderly individuals aged 65 and above. These subjects were classified based on their response to food security into three groups: food sufficient-diverse, food sufficient-not diverse, and food insufficient. The study results showed that the proportion of the food insufficient group among single-person elderly households was 7.4% for men and 10.6% for women, with a slightly higher rate for female elderly. Both male and female elderly over 80 years of age, with low education levels, and basic living support recipients showed significantly higher proportions in the sufficient-not diverse and food insufficient groups. For male elderly, significant differences were observed in subjective health status and oral health level in the food insufficient group, and for female elderly, stress levels also showed significant differences. Life satisfaction scores were generally lower for female elderly compared to male, and significant differences were found in both male and female elderly based on food security. Common factors that significantly influence life satisfaction among single-person elderly households, both male and female, include food security, subjective health status, and living environment satisfaction, with food security being the most impactful factor. The study suggests that it is necessary to include these significant factors in the development of various social activity programs, such as dietary programs, to enhance life satisfaction and food security of single-person elderly households.

Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint

  • Kumari, Shipra;Om, Hari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.4987-5014
    • /
    • 2015
  • The bilinear pairing, also known as Weil pairing or Tate pairing, is widely used in cryptography and its properties help to construct cryptographic schemes for different applications in which the security of the transmitted data is a major concern. In remote login authentication schemes, there are two major requirements: i) proving the identity of a user and the server for legitimacy without exposing their private keys and ii) freedom for a user to choose and change his password (private key) efficiently. Most of the existing methods based on the bilinear property have some security breaches due to the lack of features and the design issues. In this paper, we develop a new scheme using the bilinear property of an elliptic point and the biometric characteristics. Our method provides many features along with three major goals. a) Checking the correctness of the password before sending the authentication message, which prevents the wastage of communication cost; b) Efficient password change phase in which the user is asked to give a new password after checking the correctness of the current password without involving the server; c) User anonymity - enforcing the suitability of our scheme for applications in which a user does not want to disclose his identity. We use BAN logic to ensure the mutual authentication and session key agreement properties. The paper provides informal security analysis to illustrate that our scheme resists all the security attacks. Furthermore, we use the AVISPA tool for formal security verification of our scheme.

Empirical Risk Assessment in Major Graphical Design Software Systems

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • 제8권4호
    • /
    • pp.259-266
    • /
    • 2021
  • Security vulnerabilities have been reported in major design software systems such as Adobe Photoshop and Illustrator, which are recognized as de facto standard design tools in most of the design industries. Companies need to evaluate and manage their risk levels posed by those vulnerabilities, so that they could mitigate the potential security bridges in advance. In general, security vulnerabilities are discovered throughout their life cycles repeatedly if software systems are continually used. Hence, in this study, we empirically analyze risk levels for the three major graphical design software systems, namely Photoshop, Illustrator and GIMP with respect to a software vulnerability discovery model. The analysis reveals that the Alhazmi-Malaiya Logistic model tends to describe the vulnerability discovery patterns significantly. This indicates that the vulnerability discovery model makes it possible to predict vulnerability discovery in advance for the software systems. Also, we found that none of the examined vulnerabilities requires even a single authentication step for successful attacks, which suggests that adding an authentication process in software systems dramatically reduce the probability of exploitations. The analysis also discloses that, for all the three software systems, the predictions with evenly distributed and daily based datasets perform better than the estimations with the datasets of vulnerability reporting dates only. The observed outcome from the analysis allows software development managers to prepare proactively for a hostile environment by deploying necessary resources before the expected time of vulnerability discovery. In addition, it can periodically remind designers who use the software systems to be aware of security risk, related to their digital work environments.

경호전공 대학생의 전공만족, 진로정체감 및 진로결정 자기효능감의 구조적 관계 (Structural Relations of Security Science Majors' Major Satisfaction, Career Identity and Career Decision-making Self Efficacy)

  • 염대관;김창호;김우진
    • 시큐리티연구
    • /
    • 제43호
    • /
    • pp.121-145
    • /
    • 2015
  • 본 연구는 경호전공 대학생 중심으로 전공만족, 진로정체감 및 진로결정 자기효능감의 구조적 관계를 규명하는데 그 목적이 있다. 또한 각 변인들간의 직접효과, 간접효과와 총효과를 확인하여 합리적인 진로탐색과 진로프로그램 개발의 기초를 제공해주고자 한다. 이를 위해 경호전공 대학생 239명의 설문자료를 수집하였으며 구조방정식 모형분석을 적용하였다. 연구결과를 요약하면 다음과 같다. 첫째, 교과만족은 진로결정, 진로확신, 진로흥미에 유의한 영향을 미치는 것으로 나타났다. 둘째, 관계만족과 일반적 만족은 진로결정과 진로확신에 유의한 영향을 미치는 것으로 나타났다. 셋째, 사회적 인식은 진로흥미에 유의한 영향을 미치는 것으로 나타났다. 넷째, 진로결정, 진로확신은 문제해결, 정보수집, 계획설정에 유의한 영향을 미치는 것으로 나타났으며 진로흥미는 문제해결과 정보수집에 유의한 영향을 미치는 것으로 나타났다. 다섯째, 교과만족은 진로결정을 통하여 문제해결과 정보수집에 매개효과를 가지는 것으로 나타났다. 여섯째, 교과만족은 진로확신을 통하여 문제해결과 정보수집에 매개효과를 가지는 것으로 나타났다. 일곱째, 관계만족은 진로흥미를 통하여 문제해결, 정보수집과 계획설정에 매개효과를 가지는 것으로 나타났다. 여덟째, 일반적 만족은 진로결정을 통하여 문제해결과 정보수집에 매개효과를 가지는 것으로 나타났다. 이상의 연구결과를 중심으로 경호학에서의 시사점과 추후연구를 위한 제언들을 논의하였다.

  • PDF

Security Measures by Diagnosing Vulnerabilities in Web Applications

  • Kim, Hee Wan
    • International journal of advanced smart convergence
    • /
    • 제10권4호
    • /
    • pp.22-29
    • /
    • 2021
  • For web application vulnerability diagnosis, from the development stage to the operation stage, it is possible to stably operate the web only when there is a policy that is commonly applied to each task through diagnosis of vulnerabilities, removal of vulnerabilities, and rapid recovery from web page damage. KISA presents 28 evaluation items for technical vulnerability analysis of major information and communication infrastructure. In this paper, we diagnose the vulnerabilities in the automobile goods shopping mall website and suggest security measures according to the vulnerabilities. As a result of diagnosing 28 items, major vulnerabilities were found in three items: cross-site scripting, cross-site request tampering, and insufficient session expiration. Cookie values were exposed on the bulletin board, and personal information was exposed in the parameter values related to passwords when personal information was edited. Also, since the session end time is not set, it was confirmed that session reuse is always possible. By suggesting security measures according to these vulnerabilities, the discovered security threats were eliminated, and it was possible to prevent breaches in web applications and secure the stability of web services.

Information Security on Learning Management System Platform from the Perspective of the User during the COVID-19 Pandemic

  • Mujiono, Sadikin;Rakhmat, Purnomo;Rafika, Sari;Dyah Ayu Nabilla, Ariswanto;Juanda, Wijaya;Lydia, Vintari
    • Journal of information and communication convergence engineering
    • /
    • 제21권1호
    • /
    • pp.32-44
    • /
    • 2023
  • Information security breach is a major risk in e-learning. This study presents the potential information security disruptions in Learning Management Systems (LMS) from the perspective of users. We use the Technology Acceptance Model approach as a user perception model of information security, and the results of a questionnaire comprising 44 questions for instructors and students across Indonesia to verify the model. The results of the data analysis and model testing reveals that lecturers and students perceive the level of information security in the LMS differently. In general, the information security aspects of LMSs affect the perceptions of trust of student users, whereas such a correlation is not found among lecturers. In addition, lecturers perceive information security aspect on Moodle is and Google Classroom differently. Based on this finding, we recommend that institutions make more intense efforts to increase awareness of information security and to run different information security programs.

A Review of Security Threats of Internet of Things

  • Nargis Jamal;Sataish Riaz;Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.99-108
    • /
    • 2024
  • The Internet of Things (IoT) is a novel concept that allows a large number of objects to be connected to the Internet while also allowing them to be controlled remotely. The Internet of Things is extensive and has become an almost inseparable part of our daily lives. Users' personal data is frequently obtained by these linked gadgets and stored online. In recent years, the security of acquired data has become a major concern. As devices grow more linked, privacy and security concerns grow more pressing, and they must be addressed as soon as possible. IoT implementations and devices are particularly vulnerable to attacks that might adversely affect customer security and privacy, which might have an impact on their practical utility. The goal of this study is to bring attention to the security and privacy concerns that exist in IoT systems. To that purpose, the paper examines security challenges at each level of the IoT protocol stack, identifies underlying impediments and critical security requirements, and provides a rapid overview of available security solutions for securing IoT in a layered environment.

경호학과 학생들의 전공 선택 및 취업에 대한 만족도와 향후 대응 방안 (Satisfaction to Major selection and employment of majoring in Security Students and future correspondence plan)

  • 최정일;장예진
    • 시큐리티연구
    • /
    • 제48호
    • /
    • pp.57-78
    • /
    • 2016
  • 본 연구는 경호학과 학생들을 대상으로 전공으로 선택하고 교과과정에 대한 만족도가 높을수록 졸업 후 진로선택 및 취업에 대한 만족도가 높을 것이라는 연구가설을 설정하고 설문조사를 실시하였다. 검증 결과 Chronbach's Alpha 계수가 0.833으로 산출되어 내적 일관성을 확보했으며 단순회귀분석 결과 각 항목별 상관계수가 0.811로 제시되어 매우 높은 상관관계를 보여 주었다. 따라서 '전공 선택 및 교과과정에 대한 만족도'가 높을수록 '진로 선택 및 졸업 후 취업에 대한 만족도'가 높을 것으로 분석되었다. 따라서 대학에서는 학생들에게 전공 선택 및 교과과정에 대한 만족도를 높여주기 위한 효율적인 교육설계가 필요해 보인다. 이론과 실무 교육의 수준을 높이기 위해 산 학 연의 관심과 적극적인 지원이 요구된다. 향후 경호학 발전과 종사자들의 만족도를 높이기 위하여 대학에서 효율적인 교육이 우선되어야 하는 필요성이 제기된다.

  • PDF

An Exhaustive Review on Security Issues in Cloud Computing

  • Fatima, Shahin;Ahmad, Shish
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3219-3237
    • /
    • 2019
  • The Cloud Computing is growing rapidly in the current IT industry. Cloud computing has become a buzzword in relation to Grid & Utility computing. It provides on demand services to customers and customers will pay for what they get. Various "Cloud Service Provider" such as Microsoft Azure, Google Web Services etc. enables the users to access the cloud in cost effective manner. However, security, privacy and integrity of data is a major concern. In this paper various security challenges have been identified and the survey briefs the comprehensive overview of various security issues in cloud computing. The classification of security issues in cloud computing have been studied. In this paper we have discussed security challenges in cloud computing and also list recommended methods available for addressing them in the literature.

경호학전공대학생의 진로장벽과 전공만족도가 진로준비행동에 미치는 영향 (The effect of career barrier and major satisfaction on the career preparation behavior in the group of security major college students)

  • 백경화;유경호
    • 시큐리티연구
    • /
    • 제29호
    • /
    • pp.115-137
    • /
    • 2011
  • 본 연구는 경호학전공대학생을 대상으로 진로장벽과 전공만족이 진로준비행동에 미치는 영향을 알아보는데 그 목적이 있다. 연구조사대상은 충남소재대학과 전북소재대학의 경호학과에 재학 중인 대학생 200명이었으며 이중응답이 부실하거나 조사내용의 일부가 누락된 자료 30부를 제외한 유효표본 170부를 연구에 사용하였으며 자료의 수집을 위해 사용한 도구는 진로탐색장애 척도, 전공만족도 척도, 진로준비행동 척도 등이다. 자료처리는 SPSS 18.0을 사용하여 분석하였고 수집된 자료는 측정도구에 대한 탐색적요인분석, 상관 관계분석, 다중회귀분석, 일원변량분석을 하였다. 분석결과에 의하면 진로장벽은 진로준비 행동에 부적인 상관을 미치며 특히 자기명확성부족이 뚜렷하게 영향을 미치는 것으로 나타났다. 전공만족도와 진로준비행동은 정적인 상관을 미치며 특히 적성만족이 뚜렷하게 영향을 미치는 것으로 나타났다. 학년에 따른 진로장벽은 3, 4학년이 1, 2학년에 비해 진로장벽을 덜 느끼고, 전공만족은 3, 4학년이 1, 2학년보다 더 만족스러운 것으로 나타났다. 경호학 전공 대학생을 대상으로 진로장벽과 전공만족이 진로준비행동에 미치는 영향이 어떠한지 알아보는 것은 큰 의미가 있으며 경호학 전공학생들과 취업담당자들에게 진로를 준비하고 상담을 하는 과정에 도움을 줄 수 있을 것이다.

  • PDF