• Title/Summary/Keyword: security collaboration

Search Result 146, Processing Time 0.021 seconds

Development Plan for the Identity and Future of Security Science (경호학의 정체성과 미래에 대한 발전 방안)

  • Kwon, Hyuck-Bin;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.145-172
    • /
    • 2017
  • In 2015 the Department of Education announced that it will make downsizing efforts by recommending classified downsizing ratio according to the evaluation of universities for active support toward autonomous efforts of universities with the possibilities of reform and qualitative structural reform for customized human resource cultivation according to the social demands. This is the preemtive structural reform preparing against the rapid decrease of the number of students, and the preparation for changing into competitive universities so that customized human resource that is needed in the society can be trained. Security Science Departments of Korea, first established in 1996, need changes in curriculum in order to prepare for the fourth revolution of the future, and are stagnant on the education goal and employment course. Therefore the adoption of related certificates, curriculum, NCS, and professional curriculum is needed. For example, Hansei University, Chung-Ang University, and Far East University have established the Department of Industrial Security, and Kyonggi University and Sungshin Women's University have established the Department of Convergence Security. Also, Konkuk University has established the Graduate School of Security and Disasters, the Graduate School of Information and Policy, the Graduate School of Criminal Justice, Gachon University the Graduate School of National Security, Sungkyunkwan University the Graduate School of Strategic Studies. This shows that the field of Security Science should not settle for itself. This article analyzes current curriculum and subjects of security, police, industrial security, military related academic departments of key universities. It is necessary to prepare for the future by predicting the change from the merge of academic departments and the demands of the times. As technical colleges are adopting NCS, this is the time to seek for systematic collaboration between universities and technical colleges and between industry, government, and academida.

  • PDF

A Model of Artificial Intelligence in Cyber Security of SCADA to Enhance Public Safety in UAE

  • Omar Abdulrahmanal Alattas Alhashmi;Mohd Faizal Abdullah;Raihana Syahirah Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.173-182
    • /
    • 2023
  • The UAE government has set its sights on creating a smart, electronic-based government system that utilizes AI. The country's collaboration with India aims to bring substantial returns through AI innovation, with a target of over $20 billion in the coming years. To achieve this goal, the UAE launched its AI strategy in 2017, focused on improving performance in key sectors and becoming a leader in AI investment. To ensure public safety as the role of AI in government grows, the country is working on developing integrated cyber security solutions for SCADA systems. A questionnaire-based study was conducted, using the AI IQ Threat Scale to measure the variables in the research model. The sample consisted of 200 individuals from the UAE government, private sector, and academia, and data was collected through online surveys and analyzed using descriptive statistics and structural equation modeling. The results indicate that the AI IQ Threat Scale was effective in measuring the four main attacks and defense applications of AI. Additionally, the study reveals that AI governance and cyber defense have a positive impact on the resilience of AI systems. This study makes a valuable contribution to the UAE government's efforts to remain at the forefront of AI and technology exploitation. The results emphasize the need for appropriate evaluation models to ensure a resilient economy and improved public safety in the face of automation. The findings can inform future AI governance and cyber defense strategies for the UAE and other countries.

A Study on Intrusion Detection Method using Collaborative Technique (협업 기법을 이용한 침입탐지 탐지 방법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.121-127
    • /
    • 2021
  • MANET, which does not have any infrastructure other than wireless nodes, has the advantage of being able to construct a fast network. However, the movement of nodes and wireless media are also the causes of security vulnerabilities of MANET. In particular, the damage caused by the attacking nodes existing on the network is considerably greater than that of other networks. Therefore, it is necessary to detection technique for attacking nodes and techniques to reduce damage caused by attacks. In this paper, we proposed a hierarchical structure technique to increase the efficiency of intrusion detection and collaboration-based intrusion detection technique applying a P2P mesh network configuration technique to reduce damage caused by attacks. There was excluded the network participation of the attacking node in advance through the reliability evaluation of the nodes in the cluster. In addition, when an attack by an attacking node is detected, this paper was applied a method of minimizing the damage of the attacking node by transmitting quickly the attack node information to the global network through the P2P mesh network between cluster heads. The ns-2 simulator was used to evaluate the performance of the proposed technique, and the excellent performance of the proposed technique was confirmed through comparative experiments.

A Novel Trust Establishment Method for Wireless Sensor Networks

  • Ishmanov, Farruh;Kim, Sung Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1529-1547
    • /
    • 2015
  • Establishment of trust is important in wireless sensor networks for security enhancement and successful collaboration. Basically, a node establishes trust with other nodes by estimating a trust value based on monitored behavior of the other nodes. Since a malicious/misbehaving node might launch different attack strategies and might demonstrate random misbehavior, a trust estimation method should be robust against such attacks and misbehavior. Otherwise, the operation of trust establishment will be meaningless, and performance of an application that runs on top of trust establishment will degrade. In this paper, we propose a robust and novel trust estimation method. Unlike traditional trust estimation methods, we consider not only the weight of misbehavior but also the frequency of misbehavior. The frequency-of-misbehavior component explicitly demonstrates how frequently a node misbehaves during a certain observed time period, and it tracks the behavior of nodes more efficiently, which is a main factor in deriving an accurate trust value. In addition, the weight of misbehavior is comprehensively measured to mitigate the effect of an on-off attack. Frequency and weight of misbehavior are comprehensively combined to obtain the trust value. Evaluation results show that the proposed method outperforms other trust estimation methods under different attacks and types of misbehavior.

A Study on the Interface Model of Information sharing between nations for an efficient global SCM (효율적인 글로벌 SCM에 적합한 국가 간 정보 연계를 위한 인터페이스 모델 연구)

  • Park, Soo Min;Kim, Min Sik;Ahn, Kyeong Rim
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.217-230
    • /
    • 2012
  • To look at Korea trade environment, as increasing the quantity of goods transported in North-East Asia and deepening national competitive, information-oriented logistics environment is needed. That means it is automated work process and can provide value-added service. To do this, logistics business can be efficiently handled through "Electronic Means for the Clearance of Ships" and electronically data processing. Also, by increasing the risk of international terrorism, regulation regarding to logistics security has strengthened around the advanced country, such as USA and EU, etc. or international organization, such as IMO, ISO, etc.. Furthermore, because trade and logistics environment is changing and security becomes more important in logistics area, movement or status information of goods within the port or in entry in/out becomes more and more be needed in real time. In case cross-border logistics activities, international cooperation or agreement between countries is very important. However, different opinions much happened on defining the interface. If to follow one format or type using at a specific country or organization, it was occurred to difficulty in respect of interoperability as well as additional costs or time. Therefore, this paper proposes common interface model to exchange information for the efficient global SCM for using by the output of Korea R&D project, "National Logistics Standardization System Development".

Aspects Of Architectural Design Using BIM Technologies

  • Tikhonova, Oleksandra;Selikhova, Yana;Donenko, Vasyl;Kulik, Mykhailo;Frolov, Denys;Iasechko, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.85-92
    • /
    • 2022
  • In this article, we look at the application of BIM (Building Information Modeling) in sustainable infrastructures. In response to global warming, energy shortages, and environmental degradation, people are trying to build eco-friendly, low-carbon cities and promote eco-friendly homes. A "green" building is the entire life cycle of a building that includes maximizing the conservation of resources (energy, water, land, and materials), protecting the environment, reducing pollution, providing people with healthy, comfortable, and efficient use of space, and establishing harmony between nature and architecture. In the field of ecological and sustainable buildings, BIM modeling can be integrated into buildings with analog energy, air flow analysis, and solar building ecosystems. Using BIM technologies, you can reduce the amount of waste and improve the quality of construction. These technologies create "visualization" of digital building models through multidimensional digital design solutions that provide" modeling and analysis "of Scientific Collaboration Platforms for designers, architects, utility engineers, developers, and even end users. Moreover, BIM helps them use three-dimensional digital models in project design and construction and operational management.

Utilizing Machine Learning Algorithms for Recruitment Predictions of IT Graduates in the Saudi Labor Market

  • Munirah Alghamlas;Reham Alabduljabbar
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.113-124
    • /
    • 2024
  • One of the goals of the Saudi Arabia 2030 vision is to ensure full employment of its citizens. Recruitment of graduates depends on the quality of skills that they may have gained during their study. Hence, the quality of education and ensuring that graduates have sufficient knowledge about the in-demand skills of the market are necessary. However, IT graduates are usually not aware of whether they are suitable for recruitment or not. This study builds a prediction model that can be deployed on the web, where users can input variables to generate predictions. Furthermore, it provides data-driven recommendations of the in-demand skills in the Saudi IT labor market to overcome the unemployment problem. Data were collected from two online job portals: LinkedIn and Bayt.com. Three machine learning algorithms, namely, Support Vector Machine, k-Nearest Neighbor, and Naïve Bayes were used to build the model. Furthermore, descriptive and data analysis methods were employed herein to evaluate the existing gap. Results showed that there existed a gap between labor market employers' expectations of Saudi workers and the skills that the workers were equipped with from their educational institutions. Planned collaboration between industry and education providers is required to narrow down this gap.

Analyzing Research Trends in Blockchain Studies in South Korea Using Dynamic Topic Modeling and Network Analysis (다이나믹 토픽모델링 및 네트워크 분석 기법을 통한 블록체인 관련 국내 연구 동향 분석)

  • Kim, Donghun;Oh, Chanhee;Zhu, Yongjun
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.3
    • /
    • pp.23-39
    • /
    • 2021
  • This study aims to explore research trends in Blockchain studies in South Korea using dynamic topic modeling and network analysis. To achieve this goal, we conducted the university & institute collaboration network analysis, the keyword co-occurrence network analysis, and times series topic analysis using dynamic topic modeling. Through the university & institute collaboration network analysis, we found major universities such as Soongsil University, Soonchunhyang University, Korea University, Korea Advanced Institute of Science and Technology (KAIST) and major institutes such as Ministry of National Defense, Korea Railroad Research Institute, Samil PricewaterhouseCoopers, Electronics and Telecommunications Research Institute that led collaborative research. Next, through the analysis of the keyword co-occurrence network, we found major research keywords including virtual assets (Cryptocurrency, Bitcoin, Ethereum, Virtual currency), blockchain technology (Distributed ledger, Distributed ledger technology), finance (Smart contract), and information security (Security, privacy, Personal information). Smart contracts showed the highest scores in all network centrality measures showing its importance in the field. Finally, through the time series topic analysis, we identified five major topics including blockchain technology, blockchain ecosystem, blockchain application 1 (trade, online voting, real estate), blockchain application 2 (food, tourism, distribution, media), and blockchain application 3 (economy, finance). Changes of topics were also investigated by exploring proportions of representative keywords for each topic. The study is the first of its kind to attempt to conduct university & institute collaboration networks analysis and dynamic topic modeling-based times series topic analysis for exploring research trends in Blockchain studies in South Korea. Our results can be used by government agencies, universities, and research institutes to develop effective strategies of promoting university & institutes collaboration and interdisciplinary research in the field.

A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone (스마트폰에서 Smishing 해킹 공격과 침해사고 보안 연구)

  • Park, In-Woo;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2588-2594
    • /
    • 2013
  • Damage is increasing by (Smishing) hacking attack Smishing you use a smart phone after entering 2013. Takeover of personal information and direct financial damage in collaboration with graphics sewing machine hacking attack has occurred. Monetary damage that leads to Internet payment service (ISP) and secure payment system in conjunction with graphics sewing machine hacking attack on a smartphone has occurred. In this paper, I will study analysis in the laboratory examples of actual infringement vinegar sewing machine hacking attack. It is a major power security measures to prevent damage to the secure payment system that a case analysis and practical principle technical nest sewing machine hacking attack, using Smishing. In this paper, I will be to research to be able to through a smart phone, to the online payment safer and more convenient.

A Study on the Domestic Model for Cyber Threat Information Sharing by Analyzing the Relevant Systems of Major Advacnced Countries (주요국의 사이버위협정보 공유체계 분석을 통한 국내 적용모델 연구)

  • Yoon, Oh Jun;Cho, Chang Seob;Park, Jeong Keun;Bae, Sun Ha;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.101-111
    • /
    • 2016
  • The recent cyber threats are becoming real threats to our lives. This gloomy situation from cyber threats necessarily demands the establishment of the cyber threat information sharing system between the public and private area. Key countries, like the US, Japan and the UK, are stabilizing the cyber threat information sharing systems by founding exclusive organizations for sharing information and setting up and implementing relevant measures. In this thesis, I would like to propose the model for cyber threat information sharing in order to cope efficiently with the ever-intensifying cyber threats. My model would include key elements for the efficient information sharing, such as the clear designation of main operator of information sharing system, the management of collaboration system between the public and private sector, the build-up of the integrated and automated system and the supplementation of legal system including the grant of privilege, and so on.