• Title/Summary/Keyword: security collaboration

Search Result 143, Processing Time 0.027 seconds

A Study on Critical Success Factors for Enterprise Security Collaboration (전사적 보안협업을 위한 핵심성공요인에 관한 연구)

  • Do, Jung-Min;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.235-242
    • /
    • 2014
  • Although the requirement of enterprise security implementation has been raised, a few research on security collaboration, which is one of the methods for enterprise security has been performed. This paper approached information security from the collaboration-centric perspective and propose critical success factors for security collaboration. In this study, a model of security collaboration, which includes coordination and cooperation activities was devised. Based on the previous research on organizational collaboration literature, the eight success factors for collaboration were deduced and examined the significance of the eight factors using the PLS-SEM statistical method with data of 106 samples who are security and IT professionals who have worked for more than 7 years. The result of the hypothesis test supported that trust, expertise motivation, collaboration performance criteria, top manager support and collaboration tools are the prominent factors of security collaboration.

Design on Security Protocols Reflecting Collaboration in Workflow Management Systems (협업 기반 워크플로우 관리시스템의 보안 프로토콜 설계)

  • Choi, Myeong-Gil;Lee, Dong-Ho;Hwang, Won-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1271-1278
    • /
    • 2008
  • As the collaboration of WFMS(workflow management systems) in enterprises increases, security protocols could be considered a critical factor affecting secure operation of WMFS. The security protocol of WFMS could not reflect the nature of collaboration in WFMS, resulting to collaboration of WFMS on Internet causing the operation problems of WFMS. This study suggests collaboration based security protocols based on the collaboration of WFMS on Internet. To reflect the nature of collaboration in WFMS, this study analyzes security requirements for WFMS. Based on security requirements, this study suggests a security architecture and security protocols for WFMS using security agents.

Inter-Territorial Collaboration in the Context of Strengthening Its Economic Security

  • Hlazov, Oleksandr;Kalashnikova, Khrystyna;Zolotarov, Volodymyr;Levchenko, Iaroslava;Britchenko, Igor;Losonczi, Peter
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.675-683
    • /
    • 2021
  • An article is devoted to developing the concept of inter-territorial collaboration in the context of strengthening its economic security. This concept is based on the study of international experience and successful OTG functioning in Ukraine. The idea includes directions, forms, tools, procedures, and financial sources for joint projects that strengthen territorial associations' economic security. The research consists of assessing the state of economic development of territorial communities and forms of their cooperation with other territorial communities. Analysis, synthesis, induction, and deduction are the main methods of scientific knowledge used to summarize statistical information, normative and legal support, and global experience of cooperation of territorial communities. The study results include the main areas of cooperation of territorial communities in Ukraine, including long-term collaboration. The study also contains successful examples of collaboration between different territorial communities, applying practical aspects and tools to form effective interaction. The main points of discussion concern various forms of interaction between territorial communities, which allow achieving the economic goal more quickly and effectively.

Analysis of Vulnerability in Electron Based Collaboration Tools (Electron 기반 협업 프로그램 취약점 분석)

  • Lee, Hyomin;Jang, Yeonseok;Kwon, Yonghee;Lim, Eunji;Kim, Jongmin;Park, Jinwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.573-586
    • /
    • 2021
  • As the proportion of non-contact work is increasing in the situation of COVID-19 pandemic, the collaboration program market is growing rapidly. As the size of the market grows, vulnerabilities in collaborative programs are constantly being disclosed which increases interest in the security of collaborative tools. In this paper, we introduce the results of vulnerability analysis on Electron-based collaboration programs, noting that a number of collaboration programs are based on the Electron framework, and propose countermeasures to enhance the security of Electron-based applications.

On Artifact Analysis for User Behaviors in Collaboration Tools - Using differential forensics for distinct operating environments (협업 툴의 사용자 행위별 아티팩트 분석 연구 - 운영환경에 따른 differential forensic 개념을 이용하여)

  • Kim, Young-hoon;Kwon, Tae-kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.353-363
    • /
    • 2021
  • As the Untact era is rapidly changing, collaboration tools are increasing their utilization and value as digital technologies for non-face-to-face work. While instant messenger-based collaboration tools support a variety of functions, crime and accident concerns are also increasing in proportion to their convenience, such as information leakage and security incidents. Meanwhile, the digital forensics perspective on collaborative tools is not enough, so forensics research is needed. This study analyzes significant artifacts in the two operating environments through Windows and Android forensics research on Microsoft Teams, the collaboration tool with the highest share in the world. Also, based on differences in artifacts and data attributes according to the operating environment, by applying 'differential forensic', we proved that the usefulness of evidence can be improved by presenting a complementary analysis method and timeline configuration through information linkage.

Collaboration Contents Fractal Service and Intrusion Detection framework based on Cloud (클라우드 기반 협업 콘텐츠 프랙탈 서비스 및 침입탐지 프레임워크)

  • Park, SangHyun;Lee, Hyejoo;Lee, Suk-Hwan;Kwon, Ki-Ryong;Park, Yun Kyoung;Moon, Kyoung Deok
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.1
    • /
    • pp.58-65
    • /
    • 2017
  • The recent years, the cloud-based paradigm of cloud services are developed rapidly, it come with many a new problems. However, the collaboration between a individual with other users is still difficult. Cloud service is considered when users need to take advantage of security and the availability of cloud services. In this paper, we proposed an detection framework to detect an intrusion attack that threaten to cloud-based collaboration services and cloud security. Identify vulnerabilities and prepare for the safety of the collaboration services to create a variety of content in the cloud, it help to prevent the threats.

A Study on Factors Affecting Intention to Use Online Collaboration Tools for the Non-Face-to-Face Educational Environment (비대면 교육 환경에서 온라인 협업 툴 사용의도에 영향을 미치는 요인에 관한 연구)

  • Seo, Jay;An, Sunju;Choi, Jeongil
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.3
    • /
    • pp.571-591
    • /
    • 2022
  • Purpose: The purpose of this study is to examine the factors affecting the intention to use online collaboration tools for non-face-to-face educational environment in the perspective of the learners. Methods: For empirical analysis, the survey of this study was administered with data that were limited to experienced learners using online collaboration tools such as Google Docs, Allo, Padlet, and Slido in online education environments such as Zoom, Webex, MS Teams, etc. and valid 400 data were analyzed by SPSS(ver 22.0) and R(ver 4.1.0) program package. Results: The results of empirical analysis showed that performance expectancy were found to have an effect on reliability of system quality, empathy of service quality, playfulness and informativity of content quality among the characteristics of online collaboration tools. On the other hand, it was found that the security of system quality, responsiveness of service quality, and extroversion of user personality characteristics did not affect. It was analyzed that playfulness had the greatest positive effect, followed by informativity, empathy, and reliability. Among the characteristics of online collaboration tools, it was found that the reliability and security of system quality and informativity of content quality had an effect on the effort expectancy. It was analyzed that informativity has the greatest influence, followed by security and reliability. Conclusion: This study is meaningful in that it examines the perspectives of users and learners, who can be said to be the end customers of online collaboration tools. Based on the results of this study, it is expected that not only platform operators that provide online collaborative tools, but also providers that use online collaboration tools will have a significant impact on the development of edutech and infrastructure in the educational environment.

SPRT-based Collaboration Construction for Malware Detection in IoT

  • Jun-Won Ho
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.64-69
    • /
    • 2023
  • We devise a collaboration construction method based on the SPRT (Sequential Probability Ratio Test) for malware detection in IoT. In our method, high-end IoT nodes having capable of detecting malware and generating malware signatures harness the SPRT to give a reward of malware signatures to low-end IoT nodes providing useful data for malware detection in IoT. We evaluate our proposed method through simulation. Our simulation results indicate that the number of malware signatures provided for collaboration is varied in accordance with the threshold for fraction of useful data.

A Detection Rule Exchange Mechanism for the Collaborative Intrusion Detection in Defense-ESM (국방통합보안관제체계에서의 협업 침입탐지를 위한 탐지규칙 교환 기법)

  • Lee, Yun-Hwan;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.57-69
    • /
    • 2011
  • Many heterogeneous Intrusion Detection Systems(IDSs) based in misuse detection technique including the self-developed IDS are now operating in Defense-ESM(Enterprise Security Management System). IDS based on misuse detection may have different capability in the intrusion detection process according to the frequency and quality of its signature update. This makes the integration and collaboration with other IDSs more difficult. In this paper, with the purpose of creating the proper foundation for integration and collaboration between heterogeneous IDSs being operated in Defense-ESM, we propose an effective mechanism that can enable one IDS to propagate its new detection rules to other IDSs and receive updated rules from others. We also prove the performance of rule exchange and application possibility to defense environment through the implementation and experiment.

Capability based Access Control Mechanism in Ubiquitous Collaboration Environment (유비쿼터스 협업 환경에서의 Capability 기반 접근 제어 방법)

  • Han, Areum;Kim, Kangseok;Kim, Kihyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.831-833
    • /
    • 2011
  • IT 기술의 결정체로 불리는 스마트폰은 보급이 확대됨에 따라 진정한 유비쿼터스 환경 구현을 위한 필수품으로 자리 잡아가고 있다. 이로 인해 시간과 장소에 대한 구애 없이 네트워크에 접속할 수 있는 환경이 조성되어 편의성이 극대화 되었지만, 보안 위험성 증가로 인한 문제점도 가지고 있다. 스마트폰을 통해 제공되는 유비쿼터스 협업(Collaboration)은 프라이버시 침해 문제를 야기할 수 있으며, 이를 완화하기 위한 방법으로 다양한 연구들이 진행되고 있다. 본 논문에서는 Capability 기반의 Access Control 을 제안한다.