• Title/Summary/Keyword: security modeling

Search Result 602, Processing Time 0.024 seconds

Effects of Perceived Autonomy Support on Intrinsic Motivation and Passion for Major students of Security Martial Arts (경호무도 전공자의 지각된 자율성지지가 내재적 동기 및 열정에 미치는 영향)

  • Yang, Jin-Young;Lim, Tae-Hee;Kim, Dong-Hyun
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.87-112
    • /
    • 2016
  • The purpose of this study was to investigate the influence of perceived autonomy support on intrinsic motivation and passion for major students of security martial arts. The subjects were selected 317 people to security martial arts majors universities in the metropolitan area extraction using a convenience sample. AS autonomy support, intrinsic motivation, and passion by research tools construct validity were utilized for statistical verification. Data were analyzed through descriptive statistics, frequency analysis, exploratory factors analysis, reliability analysis, correlation analysis using the SPSS 21.0 and confirmatory factors analysis and structural equation modeling(SEM) using AMOS 21.0. The results of this study were as follows. First, autonomy support of major students for security martial arts had a positive impact on intrinsic motivation. Second, autonomy support of major students for security martial arts had a positive impact on harmonious passion. Third, autonomy support of major students for security martial arts had a impact on obsessive passion. Forth, intrinsic motivation of major students for security martial arts had a positive impact on harmonious passion. Fifth, intrinsic motivation of major students for security martial arts had a negative impact on obsessive passion. The results of structural equation modeling showed that intrinsic motivation partially mediated the relationship between autonomy support and harmonious passion. And the relationships between autonomy support and obsessive passion were completely mediated by the intrinsic motivation.

  • PDF

A Study on Security Requirements for 5G Base Station (5G 기지국에 대한 보안성평가기준 연구)

  • Hong, Paul;Kim, Yejun;Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.919-939
    • /
    • 2021
  • As a next-generation communication technology, 5G networks are capable of handling large amounts of traffic based on higher speeds, shorter communication delays, and higher connectivity compared to 4G networks. In this 5G network environment, base stations are installed all over the city at high density due to their characteristics, and are connected to user terminals to provide services. Therefore, if the base station is damaged by a malicious attacker, it is expected to cause great damage to users and society as a whole. So the need for secure communication equipment such as 5G base stations has emerged. Therefore, in this paper, we propose the security functional requirements derived using threat modeling, a systematic methodology for 5G base stations, and the security assurance requirements at the level that can cope with the backdoor issues. The security requirements proposed in this paper can be used for base station design and development to construct a secure network environment as a security evaluation standard for 5G base stations.

A Study on the Effects of Information Security Policy Types and Information Security Stress on Information Security Behavior (정보보안 정책 유형과 보안 스트레스가 정보보안 행동에 미치는 영향에 대한 연구)

  • Lee Kwang Ho;Jung Chan gi
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.113-120
    • /
    • 2022
  • Despite the limitations of existing security policies due to technological development, companies are unable to actively respond to changes by maintaining a closed security policy. This study classified information security policy into three types: regulatory type policy, advisory type policy, and informative type policy. For each classified policy type, the effect on the information security policy compliance behavior of organizational members was investigated by applying the extended theory of planned behavior, and the moderating effect of information security stress was investigated. SmartPLS 2.0 and SPSS 21.0, which are structural equation modeling techniques, were used to analyze the relationship affecting each factor. As a result of the study, regulatory type, advisory type, and informative type security policies affected organizational members' information security policy compliance behavior, and security stress had an effect on information security compliance attitudes and subjective norms on information security, which are prerequisites for planned behavior theory. gave. This study suggests that various types of corporate information security policies can be applied and that security stress can affect information security behaviors of members.

A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network

  • Raed Alsaqour;Maha Abdelhaq;Njoud Alghamdi;Maram Alneami;Tahani Alrsheedi;Salma Aldghbasi;Rahaf Almalki;Sarah Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.111-119
    • /
    • 2023
  • Mobile Ad-hoc Network (MANET) is an infrastructure-less network that can configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attacks is the Resource Consumption Attack (RCA). In this type of attack, the attacker consumes the normal node energy by flooding it with bogus packets. Routing in MANET is susceptible to RCA and this is a crucial issue that deserves to be studied and solved. Therefore, the main objective of this paper is to study the impact of RCA on two routing protocols namely, Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR); as a try to find the most resistant routing protocol to such attack. The contribution of this paper is a new RCA model (RCAM) which applies RCA on the two chosen routing protocols using the NS-2 simulator.

CRF Based Intrusion Detection System using Genetic Search Feature Selection for NSSA

  • Azhagiri M;Rajesh A;Rajesh P;Gowtham Sethupathi M
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.131-140
    • /
    • 2023
  • Network security situational awareness systems helps in better managing the security concerns of a network, by monitoring for any anomalies in the network connections and recommending remedial actions upon detecting an attack. An Intrusion Detection System helps in identifying the security concerns of a network, by monitoring for any anomalies in the network connections. We have proposed a CRF based IDS system using genetic search feature selection algorithm for network security situational awareness to detect any anomalies in the network. The conditional random fields being discriminative models are capable of directly modeling the conditional probabilities rather than joint probabilities there by achieving better classification accuracy. The genetic search feature selection algorithm is capable of identifying the optimal subset among the features based on the best population of features associated with the target class. The proposed system, when trained and tested on the bench mark NSL-KDD dataset exhibited higher accuracy in identifying an attack and also classifying the attack category.

Propagation Modeling of WannaCryptor Wormable Malware (WannaCryptor 워머블 악성코드 확산 방식 연구)

  • Park, Tae Hwan;Lee, Howoong;Shin, Weon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.389-396
    • /
    • 2020
  • WannaCryptor is a type of ransomware which encrypts users' personal data or files and demands ransom payment in order to regain access. But it peculiarly spreads by itself like a Internet worm using Windows vulnerabilities of shared folder. In this paper, we analyzed and estimated the spread of WannaCryptor focusing on the wormable spread features different from the existed ransomware. Thus we observed its behaviors in virtual environments, and experimented the various spreads of WannaCryptor based on our prediction modeling.

Interpretive Structural Modeling in the Adoption of IoT Services

  • Kim, Yonghee;Park, Youngju;Song, Gwangsuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1184-1198
    • /
    • 2019
  • This study aims to use ISM to identify the enablers affecting the acceptance of IoT services. For this purpose, this study conducted an ISM analysis and a MICMAC analysis, extracted the enablers from Internet of Things - An Action Plan for Europe published by the EU for the research, and conducted interviews and surveys. The study found that it would be preferentially necessary to prepare the base for successful IoT services through international cooperation and the security of objective data. In addition, it turned out that it would be necessary to make efforts to spread and develop IoT services by conducting R&D and implementing projects through public-private partnerships and the organization of a consultative group. Lastly, since information security and standardization are the desired objects of the IoT industry, it was found that both the government and the industrial world should focus on them. This study has significance in that it can provide practical implications for the effective acceptance of IoT services.

Modeling Exponential Growth in Population using Logistic, Gompertz and ARIMA Model: An Application on New Cases of COVID-19 in Pakistan

  • Omar, Zara;Tareen, Ahsan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.192-200
    • /
    • 2021
  • In the mid of the December 2019, the virus has been started to spread from China namely Corona virus. It causes fatalities globally and WHO has been declared as pandemic in the whole world. There are different methods which can fit such types of values which obtain peak and get flattened by the time. The main aim of the paper is to find the best or nearly appropriate modeling of such data. The three different models has been deployed for the fitting of the data of Coronavirus confirmed patients in Pakistan till the date of 20th November 2020. In this paper, we have conducted analysis based on data obtained from National Institute of Health (NIH) Islamabad and produced a forecast of COVID-19 confirmed cases as well as the number of deaths and recoveries in Pakistan using the Logistic model, Gompertz model and Auto-Regressive Integrated Moving Average Model (ARIMA) model. The fitted models revealed high exponential growth in the number of confirmed cases, deaths and recoveries in Pakistan.

Towards a Taxonomy of Business Process and Its Anomalies

  • Suchenia, Anna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.230-240
    • /
    • 2021
  • This paper presents the definition of a business process and a taxonomy of anomalies in BPMN. Graphical modeling is very popular nowadays and is easily understood by various specialists from different fields. Modeling is a graphical representation of processes in an organization using available rules and resources. Therefore, it is important to use a universal and comprehensive standard to describe models of processes, decisions and software. Such a standard is the BPMN notation, which is a precise notation, but unfortunately it is only a descriptive and graphical form that may contain inaccuracies. The aim of this paper is to collect and analyze available literature describing current state of knowledge about BPMN notation and to present problems and shortcomings related to this topic. The paper includes a taxonomy of problems, their definitions and examples of occurrence in real cases.

The Role of Computer Technologies in Contemporary Jewelry

  • Romanenkova, Julia;Bratus, Ivan;Gnatiuk, Liliia;Zaitseva, Veronika;Karpenko, Olga;Misko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.71-76
    • /
    • 2022
  • The article aims to consider the role of computer technologies in contemporary jewelry art. The importance of computer programming, 3D-modeling and 3D-printing for the process of jewelry creating, its advertising and sales is emphasized. Both the positive features of the possibility of using computer technologies in jewelry and their shortcomings are considered. The process of changing the nature of jewelry design after the start of the use of digital technologies is highlighted. The issue of changing the perception and evaluation of a work of jewelry art, the creation of which uses mechanization, has been updated.