• Title/Summary/Keyword: major in security science

검색결과 372건 처리시간 0.032초

The Security Architecture for Secure Cloud Computing Environment

  • Choi, Sang-Yong;Jeong, Kimoon
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권12호
    • /
    • pp.81-87
    • /
    • 2018
  • Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.

경호무도 전공자의 지각된 자율성지지가 내재적 동기 및 열정에 미치는 영향 (Effects of Perceived Autonomy Support on Intrinsic Motivation and Passion for Major students of Security Martial Arts)

  • 양진영;임태희;김동현
    • 시큐리티연구
    • /
    • 제46호
    • /
    • pp.87-112
    • /
    • 2016
  • 본 연구의 목적은 경호무도 전공자의 지각된 자율성지지가 내재적 동기와 열정에 미치는 영향을 규명하는 것이었다. 연구대상은 편의표본추출법(convenience sampling method)을 이용하여 수도권 대학의 경호무도 전공자들 317명을 선정하였다. 조사도구는 자율성지지, 내재적 동기, 열정으로 구인타당도 검증 후 통계처리에 활용하였다. 자료처리는 기술통계, 탐색적 및 확인적 요인분석, 상관관계분석, 구조모형검증을 하였다. 결론은 다음과 같다. 첫째, 경호무도 전공자의 지각된 자율성지지는 내재적 동기에 긍정적인 영향을 미친다. 둘째, 경호무도 전공자의 자율성지지는 조화열정에 긍정적인 영향을 미친다. 셋째, 경호무도 전공자의 자율성지지는 강박열정에 영향을 미치지 않는다. 넷째, 경호무도 전공자의 내재적 동기는 조화열정에 긍정적인 영향을 미친다. 다섯째, 경호무도 전공자의 내재적 동기는 강박열정에 부정적 영향을 미친다. 경호무도 전공자의 지각된 자율성지지와 조화열정 및 강박열정 간의 관계에서 내재적 동기는 부분 및 완전 매개역할로 작용함을 확인하였다. 종합해볼 때, 경호무도 전공자의 자율성지지에 의한 무도수련활동에서 자기 결정적 동기화를 통하여 자발적인 의지가 발생됨을 알 수 있었다. 또한 경호무도 전공자의 자율성지지에 의한 내재적 욕구충족에 따른 개인 및 대인적 압박감에 의해 빠른 시기에 설정된 목표를 이루고자 하는 욕구가 발생될 가능성도 고려해야 함을 확인하였다.

  • PDF

보안성 평가 도구 사례 분석 연구 (A Study and Analysis on Case Study of Security Evaluation Tool)

  • 김현일;박경연;서창호;문대성
    • 디지털융복합연구
    • /
    • 제17권1호
    • /
    • pp.347-356
    • /
    • 2019
  • 최근, 산업제어 시스템의 개방화로 인해 민간, 공공 분야 정보시스템에서 구조적 패러다임의 큰 변화가 제안되고 있다. 이에 따라, 기존 정보시스템의 보안 기술 수준으로 대응할 수 없는 미래 주요 기반 시설 제어시스템의 잠재적 사이버 보안 문제가 최근 대두되고 있으며, 이러한 보안 취약점에 대응하기 위해 다양한 기반 시설 제어 시스템 환경에 대해 입체적으로 보안 취약성을 평가할 수 있는 보안 평가 도구가 필요하다. 하지만 현재 국내 사이버 보안 평가 환경은 점검 항목의 대부분이 기술적인 영역에 한정되어 있어 한계점이 존재한다. 이를 극복하기 위해, 미국의 사이버 보안 평가 도구인 CSET(Cyber Security Evaluation Tool)을 국내 다양한 기반 시설의 제어 시스템 환경에 맞게 적용하기 위한 많은 연구가 필요하다. 따라서, 본 논문에서는 기존의 보안 평가 도구를 적용하는 다양한 연구 사례 분석을 통해 국내 원전, 전력 등의 기반 시설에 적용할 방안에 대해 분석하고 앞으로의 연구 방향을 제안한다.

A Survey of Cybersecurity Vulnerabilities in Healthcare Systems

  • Adwan Alownie Alanazi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.155-161
    • /
    • 2023
  • In the process of remarkable progress in the medical and technical field and activating the role of technology in health care services and applications, and since the safety of medical data and its protection from security violations plays a major role in assessing the security of health facilities and the safety of medical servers Thus, it is necessary to know the cyber vulnerabilities in health information systems and other related services to prevent and address them in addition to obtaining the best solutions and practices to reach a high level of cybersecurity against attackers, especially due to the digital transformation of health care systems and the rest of the dealings. This research is about what cyberattacks are and the purpose of them, in addition to the methods of penetration. Then challenges, solutions and some of the security issues will be discussed in general, and a special highlight will be given to obtaining a safe infrastructure to enjoy safe systems in return.

Crop Science Approaches to Alleviate the Food Security Concerns in Korea

  • Hee-Jong Koh
    • 한국작물학회:학술대회논문집
    • /
    • 한국작물학회 2022년도 추계학술대회
    • /
    • pp.8-8
    • /
    • 2022
  • Unstable crop production and distribution affected by climate change and COVID-19 pandemic has raised the food security concerns worldwide. In particular, Russia's invasion to Ukraine has blocked the grain trade such as wheat and com to importing countries, which has aggravated the situation. Korea has relied on foreign imports for about 80% of domestic grain demand, raising great concerns on food security. Considering situations related to Korea's food security, some points in view of a crop scientist are suggested and discussed as follows; 1) Domestic production of major grain crops should be increased through encouraging farmers by appropriate governmental subsidy programs 2) International corporation should be strengthened and diversified for sustainable overseas agricultural development and for stable import even in case of food crisis and emergency. 3) Self-sufficiency target should be specified by law so that more budget investments could be put to alleviate the food security concerns. 4) Technologies for climate smart agriculture and for competitive agricultural products should be developed aided by social and governmental support.

  • PDF

Mobile Devices Technologies: Risks and Security

  • Alsaqour, Raed;Alharthi, Sultan;Aldehaimi, Khalid;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.249-254
    • /
    • 2021
  • Our society is depending on mobile devices that play a major role in our lives. Utilizing these devices is possible due to their speed power and efficiency in performing basic as well as sophisticated operations that can be found in traditional computers like desktop workstations. The challenge with using mobile devices is that organizations are concerned with the interference between personal and corporate use due to Bring Your Own Device (BYOD) trend. This paper highlights the importance of mobile devices in our daily tasks and the associated risks involved with using these devices. Several technologies and countermeasures are reviewed in this paper to secure the mobile devices from different attempts of attacks. It is important to mention that this paper focuses on technical measures rather than considering different aspects of security measures as recommended by the cybersecurity community.

A Novel Method for Avoiding Congestion in a Mobile Ad Hoc Network for Maintaining Service Quality in a Network

  • Alattas, Khalid A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.132-140
    • /
    • 2021
  • Under the mobile ad-hoc network system, the main reason for causing congestion is because of the limited availability of resources. On the other hand, the standardised TCP based congestion controlling mechanism is unable to control and handle the major properties associated with the shared system of wireless channels. It creates an effect on the design associated with suitable protocols along with protocol stacks through the process of determining the mechanisms of congestion on a complete basis. Moreover, when bringing a comparison with standard TCP systems the major environment associated with mobile ad hoc network is regraded to be more problematic on a complete basis. On the other hand, an agent-based mobile technique for congestion is designed and developed for the part of avoiding any mode of congestion under the ad-hoc network systems.

Intrusion Detection using Attribute Subset Selector Bagging (ASUB) to Handle Imbalance and Noise

  • Priya, A.Sagaya;Kumar, S.Britto Ramesh
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.97-102
    • /
    • 2022
  • Network intrusion detection is becoming an increasing necessity for both organizations and individuals alike. Detecting intrusions is one of the major components that aims to prevent information compromise. Automated systems have been put to use due to the voluminous nature of the domain. The major challenge for automated models is the noise and data imbalance components contained in the network transactions. This work proposes an ensemble model, Attribute Subset Selector Bagging (ASUB) that can be used to effectively handle noise and data imbalance. The proposed model performs attribute subset based bag creation, leading to reduction of the influence of the noise factor. The constructed bagging model is heterogeneous in nature, hence leading to effective imbalance handling. Experiments were conducted on the standard intrusion detection datasets KDD CUP 99, Koyoto 2006 and NSL KDD. Results show effective performances, showing the high performance of the model.

A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption

  • Muhammad, Khan;Ahmad, Jamil;Farman, Haleem;Jan, Zahoor;Sajjad, Muhammad;Baik, Sung Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권5호
    • /
    • pp.1938-1962
    • /
    • 2015
  • Security of information during transmission is a major issue in this modern era. All of the communicating bodies want confidentiality, integrity, and authenticity of their secret information. Researchers have presented various schemes to cope with these Internet security issues. In this context, both steganography and cryptography can be used effectively. However, major limitation in the existing steganographic methods is the low-quality output stego images, which consequently results in the lack of security. To cope with these issues, we present an efficient method for RGB images based on gray level modification (GLM) and multi-level encryption (MLE). The secret key and secret data is encrypted using MLE algorithm before mapping it to the grey-levels of the cover image. Then, a transposition function is applied on cover image prior to data hiding. The usage of transpose, secret key, MLE, and GLM adds four different levels of security to the proposed algorithm, making it very difficult for a malicious user to extract the original secret information. The proposed method is evaluated both quantitatively and qualitatively. The experimental results, compared with several state-of-the-art algorithms, show that the proposed algorithm not only enhances the quality of stego images but also provides multiple levels of security, which can significantly misguide image steganalysis and makes the attack on this algorithm more challenging.

An Economic Perspective on Food Security

  • Seung-Ryong Yang
    • 한국작물학회:학술대회논문집
    • /
    • 한국작물학회 2022년도 추계학술대회
    • /
    • pp.9-9
    • /
    • 2022
  • The concept of food security has gained increasing attention during the food crisis period between 2006 and 2011. According to the FAO, food security is defined as an access by all people at all times to the food needed for healthy and active life. Achieving food security means that sufficient food is available, food supply is relatively stable, and those in need of food can afford food at a reasonable cost. After a short period of stable food prices the world is facing another food crisis due mainly to the COVID-19 pandemic and the Russian invasion over Ukraine. Food security has re-emerged as an urgent problem to the world. There have been two conflicting opinions about how to achieve food security. Agricultural exporting countries insist diversification of food sources and freer trade on the top of domestic self-reliance. On the other hand, food importing countries emphasize self-sufficiency of major food crops. This study investigates whether domestic agricultural production contributes to strengthening food security. The panel data analysis shows that the increase in food self-sufficiency raises the Global Food Security Index and lessens the probability of food riots, while lower import tariffs (implying freer trade) do not. Some related issues are discussed accordingly.

  • PDF