• Title/Summary/Keyword: security evaluation criteria

Search Result 201, Processing Time 0.021 seconds

Comparative Analysis on Methods for Evaluating Vulnerability of Debris Flow Hazard (토석류 재해 위험성 평가 방법의 비교 분석)

  • Joe, Jeong-Ha;Hwang, Hui-Seok;Yoo, Nam-Jae
    • Journal of Industrial Technology
    • /
    • v.36
    • /
    • pp.49-55
    • /
    • 2016
  • Different criteria for evaluating vulnerability of debris flow hazard proposed by various institutes such as Korea Forest Service(KFS), Korea Institute of Geoscience and Mineral Resources(KIGAM), Ministry of Public Safety and Security (MPSS) and Korea Expressway Corporation (KEC) were reviewed and discussed. Assessment of debris flow hazard for natural slopes around land for house development was carried out on the basis of the report about results of performing in-situ survey. Results of evaluating vulnerability of debris flow hazard by using these methods were compared to each other to discuss appropriateness of their evaluation and to recommend improvement.

  • PDF

A Study on Priority Rankings of Actions Providing Personal Information Security (개인정보의 안전성 확보조치 기준에서의 우선순위 정립에 관한 연구)

  • Kim, Young Hee;Kook, Kwang Ho
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.9-17
    • /
    • 2014
  • With the rapid development of the Internet and information technology, a company that deals with personal information does not have proper action to protect personal privacy and not take measures for the safe handling and management of personal information. It generates the case to abuse of personal information occurring frequently. In order to focus the effort to reduce damage and protect the privacy of personal information entity and enhance privacy laws based on the connection method and the processing of personal information, Korea encourages a company to follow regulation by providing certain criteria. However, in the case of items of measures standard of safety of personal information such as priority applicable criteria in accordance with the importance of itemized characteristics and the company of each individual information processing is not taken into account, and there are some difficulties to execute. Therefore, we derive criteria by law and reviewing existing literature related, the details of the measures standard of safety of personal information in this study and generate a hierarchical structure by using the KJ method for layering and quantification of the evaluation in integration of the reference item similar and the grouping. Accordingly, the weights calculated experts subject using the AHP method hierarchical structures generated in this manner, it is an object of the proposed priority for privacy and efficient more rational enterprise.

Proposal of Early-Warning Criteria for Highway Debris Flow Using Rainfall Frequency (1): Proposal of Rainfall Criteria (확률 강우량을 이용한 고속도로 토석류 조기경보기준 제안 (1) : 강우기준 제안)

  • Choi, Jaesoon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.2
    • /
    • pp.1-13
    • /
    • 2019
  • In this study, we propose rainfall frequency criteria for the development of early-warning system based on the evaluation of the highway debris flow that includes the contents of the rainfall recurrence cycle. The rainfall criterion was recommended based on the results of previous researches and the recommended rainfall criterion was 1 hour, 6 hours, and 3 days. At this time, the study subjects were located in Gangwon area and the probability rainfall of 8 stations in Gangwon area was collected. Also, the probabilistic distribution of the 1 hour, 6 hour, and 3 day rainfall criteria to be used for the early warning for the highway debris flow in Kangwon area was estimated through the probability analysis. In addition, we analyzed the correlation between 3 types of rainfall criteria selected from the rainfall data and the actual destructive damages of debris flow at 12 points in 7 lines of Gangwon highways. At this time, the rainfall criterion on the probability distribution was divided into an average value and a lower limit value. As a result of the review, it was found that the case of using the lower limit value of the rainfall according to the recurrence intervalwell simulates the situation of actual debris flow hazards.

Internet Service Evaluation System: A Design Science Research

  • Babunji, Lujen;Alzahrani, Shahad;Almarghalani, Shada;Babour, Amal;Bitar, Hind
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.35-44
    • /
    • 2022
  • The Internet is extremely important to accomplish numerous items, from education to businesses and entertainment. Therefore, the quality of its performance must be efficient. Nowadays, there is a lack of information available for users to choose a suitable Internet service. What information is available might be insufficient, inaccurate, or regularly updated. Accordingly, there is a need to develop an electronic system that enables users to evaluate their current Internet service subscription. Several factors are used as evaluation criteria in the system that affect users' decisions. In this paper, a prototype of a design science research project is proposed to address a few objectives. First, it can help Internet service users in Saudi Arabia to make the best decision for themselves regarding Internet services subscriptions. Second, it can assist the Saudi government to seek one of the 2030 vision goals: the digital transformation that depends on having a good Internet connection. The proposed solution is a promising one that would help Internet service users to make the best decision for themselves and choose the best Internet service that fits their needs. A qualitative method has been used to evaluate the efficiency and the utility of the proposed system prototype. The results showed the extent of participants' acceptance of the Internet Service Evaluation System.

Analysis of Information Assurance Schemes for New Korean Information Assurance Scheme (새로운 한국형 정보보증 제도 개발을 위한 기존의 정보보증 제도의 분석)

  • Ha, Soo-Cheol;Lee, Gang-Soo
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.207-240
    • /
    • 2011
  • There are many information assurance schemes(i.e., evaluation criteria and methodology) for security assurance of information systems, since the security is one of the most important characteristics in the modem information systems. However, there are confusions among schemes and redundancies of assurance. In this paper, we survey and classify conventional information assurance schemes by view points of assurance targets, life-cycles and nations. We propose three new information assurance schemes as the result of survey. Those are as follows: the schemes of the assurance on the requirement itself which is evaluated and certificated after standardizing the security requirements about the organizations and the applications, on the developing information system, and on the accreditation and certification about new information system. This will be helpful to set up a security assurance of National Defense.

  • PDF

A Study on Evaluation of Information Security Awareness and Security Level about Legislative Authority (입법기관의 보안성 평가와 정보보호 인식 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.269-273
    • /
    • 2010
  • 7.7 DDoS incident due to recent events and the emerging importance of privacy and Privacy laws are being discussed in the National Assembly. In this study, Legislative Assembly Secretariat support organization focused on using the system, such as the Internet network and the administrative, technical and physical security elements on the status of confidentiality, availability, integrity and security criteria to identify and follow and We are analyzing. In addition, the Internet, including network and use the system primarily for use, Legislative support agency, The National Assembly Secretariat staff awareness about information security and privacy on the survey for compliance with codes of conduct and We are analyzing. Through this analysis of legislative support agencies' security status, and social responsibility as an institution will wish to encourage the role.

  • PDF

The Evaluation Criteria of Learning Abilities for Personal Robots and It's Application to a Cleaning Robot (개인용 로봇을 위한 학습능력 평가기준 및 청소로봇에 대한 적용 사례)

  • Kim Yong Jun;Kim Jin-Oh;Yi Keon Young
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.5
    • /
    • pp.300-306
    • /
    • 2005
  • In this paper we present a guideline to evaluate how easy the use of personal robots is and how good their learning abilities are, based on the analysis of their built-in commands, user interfaces, and intelligences. Recently, we are living with robots that can be able to do lots of roles; cleaning, security, pets and education in real life. They can be classified as home robots, guide robots, service robots, robot pets, and so on. There we, however, no standards to evaluate their abilities, so it is not easy to select an appropriate robot when a user wants to buy it. Thus, we present, as a guideline that can be a standard for the evaluation of the personal robots, the standards by means of analyzing existing personal robots and results of the recent research works. We will, also, demonstrate how to apply the evaluation method to the cleaning robot as an example.

Developing Evaluation Criteria and Indicators of Decent Forest Jobs (양질의 산림일자리 평가 기준 및 지표 개발)

  • Han, Hee;Bae, Jae Soo;Chang, Chu Youn;Kim, Ki Dong;Jeon, Hyon Sun
    • Journal of Korean Society of Forest Science
    • /
    • v.107 no.4
    • /
    • pp.446-455
    • /
    • 2018
  • With respect to the quantity, quality and social value of forest jobs, we have developed three major criteria and 11 indicators for evaluating decent forest jobs. The importance and weighted value of the criteria and indicators were investigated through a survey which was conducted on 50 experts involved in Governmental Forest Job Committee, academic and different groups of communities. The 35 experts responded to the survey chose the 'job creation potential' as the most important criterion, and they recognized the 'job quality' has a relatively higher importance than the 'social contribution'. The survey results showed that 'political will' and 'job security' have the highest weighted values among indicators while 'wage level' has the lowest value. The developed criteria and indicators are able to be used as a means of evaluating degree of decent forest jobs for both new and existing jobs.

A Study on Vulnerability Severity Evaluation Considering Attacker Skill Level Based on Time Series Characteristics (시계열 특성 기반의 공격자 기술 수준을 고려한 취약점 심각도 평가 방안 연구)

  • Seong-Su Yoon;Ieck-chae Euom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.281-293
    • /
    • 2023
  • Industrial control systems (ICS) are increasingly targeted by security incidents as attackers' knowledge of ICS characteristics grows and their connectivity to information technology expands. Vulnerabilities related to ICS are growing rapidly, but patching all vulnerabilities in a timely manner is challenging. The common vulnerability assessment system used to patch vulnerabilities has limitations as it does not consider weaponization after discovery. To address this, this study defines criteria for classifying attacker skill levels based on open information including operating technology and vulnerability information in ICS. The study also proposes a method to evaluate vulnerability severity that reflects actual risk and urgency by incorporating the corresponding attribute in the existing severity score calculation. Case studies based on actual accidents involving vulnerabilities were conducted to confirm the effectiveness of the evaluation method in the ICS environment.

The Reliability Evaluation of User Account on Facebook (페이스북 사용자 계정의 신뢰도 평가에 대한 연구)

  • Park, Jeongeun;Park, Minsu;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1087-1101
    • /
    • 2013
  • Most people are connected to Social Network Services (SNS) through smart devices. Social Network Services are tools that transport information fast and easily. It does not care where he or she comes from. A lot of information circulates and is shared on Social Network Services. but Social Network Services faults are magnified and becoming a serious issue. For instance, malicious users generate multiple IDs easily on Facebook and he can use personal information of others on purpose, because most people tend to undoubtedly accept friend requests. In this paper, we have specified research scope to Facebook, which is one of most popular Social Network Services in the world. We propose a way of minimizing the number of malicious actions on Facebook from malignant users and malicious bots by setting criteria and applying reputation system.