• Title/Summary/Keyword: strength of security

Search Result 281, Processing Time 0.022 seconds

A Study on Countermeasures Against Cyber Infringement Considering CPTED

  • Lim, Heon-Wook
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.106-117
    • /
    • 2021
  • The aim is to find cyber measures in consideration of physical CPTED in order to prepare countermeasures for cybercrime prevention. For this, the six applied principles of CPTED were used as the standard. A new control item was created in connection with the control items of ISO27001. A survey was conducted on former and current investigators and security experts. As a result of the reliability analysis, the Kronbar alpha coefficient value was 0.947, indicating the reliability of the statistical value. As a result of factor analysis, it was reduced to six factors. The following are six factors and countermeasures. Nature monitoring blocks opportunities and strengthens business continuity. Access control is based on management system compliance, personnel security. Reinforcement of territoriality is reinforcement of each wife and ethics. Establishment of security policy to enhance readability, security system maintenance. Increasing usability is seeking ways to utilize, periodic incentives. For maintenance, security education is strength and security-related collective cooperation is conducted. The differentiation of this study was to find countermeasures against cybercrime in the psychological part of the past. However, they approached to find in cyber measures. The limitation of the study is to bring the concept of physical CPTED to the cyber concept.

The Effect of Practicing Martial Art upon job Performance of Employees Engaged in Security Industry (Security관련 종사자의 무도수련이 직무수행에 미치는 영향)

  • Lee, Sang-Chul;Shin, Sang-Min
    • Korean Security Journal
    • /
    • no.4
    • /
    • pp.257-277
    • /
    • 2001
  • The purpose of this study was to examine effects of practicing martial arts upon job performance of employees engaged in security industry. For positive investigation, 400 employees were questioned using some questionnaires; as a result, we obtained the following conclusion of the relation between the extent of the practicing martial art and the ability of performing their jobs. First, the more they practice martial art, the better and higher their mental health and psychological stability more than control group. Especially, when crime is reported to them or they arrest a criminal taken in an act of crime, the degree of their anxiety was low and they strongly expose self-confidence, their view of moral achievement and their sense of morality. Second, the more they practice martial art, the higher their ability of arrestment a criminal in an act and self-defense is. Because practicing martial art make their vital power and physical strength promoted. Third, the more they practice martial art, the more sincere the trust and friendship among colleagues are. As well they seem to feel strong solidarity oneanother. But practicing martial art appeared that it doesnt have an effect on coping with complications among generations and the gaps between master sergeant and them. Fourth, employees engaged in security industry practicing martial art is not only used in job performance merely as a technique; it is also effective on the mind that it make their anxiety dissolved and give them self-confidence.

  • PDF

Negative Corona Onset Characteristic of the UHV Conductors Based on the Corona Cage

  • Liu, Yun-Peng;Zhu, Lei;Lv, Fang-Cheng;Xie, Xiongjie
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.6
    • /
    • pp.2089-2097
    • /
    • 2014
  • Negative corona onset characteristics of the stranded conductors based on the ultra-high voltage (UHV) corona cage were studied in the paper. Based on the corona self-sustaining criterion in extreme uneven electric fields and the secondary emission process of the photoelectrons, the corona onset calculation model in the UHV corona cage is established and the corona current tests of the single LGJ900-75, 6 bundle LGJ900-75, 8 bundle LGJ400-35 conductors in dry and rain conditions were done in the UHV corona cage, and the rain rates are 2.4 mm/h, 20 mm/h and 30 mm/h. Corona onset electric field strength is gained by E-I tangent method, and the onset electric field strength in dry condition proves that the calculation model can be used to calculate the corona onset characteristics of the bundle conductors in the UHV corona cage. A further analysis proves that: the negative corona onset voltage of the conductor increases with the bundle number and the diameter of the sub conductor, but decreases with the bundle space in the corona cage. The onset electric field strength is influenced little by bundle space and bundle number, but decreases with the increase of the diameter of the sub-conductor. The surface irregularity coefficient decreases with the rain rate.

A Study on Encryption Process and Decryption of Ransomware in 2019 (2019년 랜섬웨어 암호화 프로세스 분석 및 복호화 방안 연구)

  • Lee, Sehoon;Youn, Byungchul;Kim, Soram;Kim, Giyoon;Lee, Yeongju;Kim, Daeun;Park, Haeryong;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1339-1350
    • /
    • 2019
  • Ransomware is a malicious software which requires money to decrypt files that were encrypted. As the number of ransomware grows, the encryption process in ransomware has been more sophisticated and the strength of security has been more stronger. As a result, analysis of ransomware becomes more difficult and the number of decryptable ransomware is getting smaller. So, research on encryption process and decryption method of ransomware is necessary. In this paper, we show encryption processes of 5 ransomwares which were revealed in 2019, and analyze whether or not those ransomwares are decryptable.

Message Encryption Methods for DDS Security Performance Improvement (DDS Security 성능 향상을 위한 메시지 암호화 기법 연구)

  • Han, Jae-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1554-1561
    • /
    • 2018
  • This paper surveys the DDS, a real - time communication middleware, and proposes ways to improve the DDS secure communication performance. DDS is a communication middleware standard by the OMG. The OMG has released the DDS Security standard to resolve the security issues. The security performance of DDS can be considered into transmission speed and confidentiality. In terms of confidentiality, AES-GCM, currently the encryption algorithm specified by DDS Security, is a very strong encryption algorithm, but there are well known weaknesses associated with authentication. In terms of speed, The computational load for the security function is a restriction to use DDS in systems which requires real-time performance. Therefore, in order to improve the DDS security, algorithms that are faster than AES-GCM and strong in encryption strength are needed. In this paper, we propose a DDS message encryption method applying AES-OCB algorithm to meet these requirements and Compared with the existing DDS, the transmission performance is improved by up to 12%.

A Study on Modeling Instruction And Training Program for Korean Private Security Guard (한국 민간경호원 교육프로그램 방향에 관한 연구)

  • Lee, Sang-Chul;Shin, Sang-Min
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.201-235
    • /
    • 2005
  • This study is designed to contribute for development of Private Security Business by fact-finding in instruction and training of private security guard serviced in this realm and domestic and foreign guard service and modeling effective and rational instruction and training program based on drawn problem. For this study, basically I collected and analyzed documents, theses, and papers of the inside and outside of the country. For practical use of data, I used materials of private security related institutes and police agency. And for private security educating training programs of the inside and outside of the country, I collected materials on internet, and with the help of police agency and interpol. For korean private security company's educating training programs, I made a study with the interview of private security company's businessmen. This study's conclusion is as follows. In a domestic private security enterprise, when set theory instruction minimize instruction and training program and must set up instruction and training program as practical affairs center enemy instruction, and theory instruction must be composed for instruction me that it is connected to practical affairs instruction too. The instruction course of private security guard instruction and training program composed with a security outline, a security plan, an information-gathering, civilian expenses, a security way, terror and terrorism, a related law, security trial, electronic security, a security analysis technique, company introduction, instruction and training program about a professional tube with theory instruction. Practical affairs instruction composed with the selection and a preventive security, close contact attendance security, vehicle security, security driving the security martial arts and self-protection liquor, first aid, security equipment, a gun and shooting, a security protocol, customer satisfaction, facilities security and expenses, a fire fighting instruction, teamwork training, explosive and a dangerous substance, physical strength, a documentation practical affairs, service, instruction and training program about foreigh language instruction.

  • PDF

A Study on Generalization of Security Policies for Enterprise Security Management System (통합보안관리시스템을 위한 보안정책 일반화에 관한 연구)

  • Choi, Hyun-H.;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.823-830
    • /
    • 2002
  • Enterprise security management system proposed to properly manage heterogeneous security products is the security management infrastructure designed to avoid needless duplications of management tasks and inter-operate those security products effectively. In this paper, we propose the model of generalized security policies. It is designed to help security management build invulnerable security policies that can unify various existing management infrastructures of security policies. Its goal is not only to improve security strength and increase the management efficiency and convenience but also to make it possible to include different security management infrastructures while building security policies. In the generalization process of security policies. we first diagnose the security status of monitored networks by analyzing security goals, requirements, and security-related information that security agents collect. Next, we decide the security mechanisms and objects for security policies, and then evaluate the properness of them on the basis of security goals, requirements and a policy list. With the generalization process, it is possible to integrate heterogeneous security policies and guarantee the integrity of them by avoiding conflicts or duplications among security policies. And further, it provides convenience to manage many security products existing in large networks.

Effects of Spinal Stabilization Training Program on Muscle Function and Gait Ability for Private Security Guard (민간경호원의 규칙적인 척추안정화운동 프로그램 참여가 근기능 및 보행능력에 미치는 영향)

  • Kim, Kyong-Tae;Cho, Ji-Hoon
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.33-51
    • /
    • 2010
  • The purpose of this study was to analyze the variation of muscle function and gait ability according to regular spinal stabilization exercise program for private security guards and the conclusion as follows. First, it increased lumbar extension strength and lumbar flexion strength both exercise and non exercise group according to the variation of muscle function with the spinal stabilization exercise program. There was significant difference between exercise and non exercise group after the program but not before the program. Second, it appeared the functional vanishment of lumbar extensor before the program both exercise and non exercise group according to the variation of muscle function with the spinal stabilization exercise program for lumbar flexor extensor ratio. Third, it analyzed for the spinal stabilization with 8 ways according to the variation of muscle function with the spinal stabilization exercise program for the change of the spinal stabilization. The spinal stabilizaton increased each angle for the execise group but decreased or not changed for non exercise group. Fourth, it used 10m gait test for the speed and step length according to the variation of muscle function with the spinal stabilization exercise program. It appeared the increasement of gait ability for exercise group and there was significant difference between exercise and non exercise group. In conclusion, there was a positive effect for lumbar extension strength, lumbar flexion strength, lumbar flexor extensor ratio, spinal stabilization, and gait ability with regular spinal stabilization exercise program. This means that spinal stabilization exercise program give positive effect to the decrease of back pain and the development of muscular strength for private security guard, also will help to recover and return to work more faster. Also, it seems that the exercise prescription program may be applicable to prevent or to improve the function for private security guard.

  • PDF

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.

Research on the Importance of Security and Personal Information in Mobile Commerce (모바일커머스에서 보안과 개인정보의 중요성에 대한 연구)

  • Lee, Chan-Hee;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.913-921
    • /
    • 2017
  • Mobile electronic commerce is rapidly growing up on the strength of popularization of smart devices such as smart phone followed by internet user increase. Concurrently with this, the anxiety on information security and personal information leakage of the user of mobile electronic commerce significantly built up in recent. In this respect, the information security and personal information protection should be become aware of their importance for the sustainable expansion and development of mobile commerce. Based on the demands as mentioned, this study analyzed the effects of the awareness of personal information security on recognized risk, recognized confidence and intent to use. The result of this study indicates that information security and personal information protection contribute to improvement in confidence by decreasing anxiety and uncertainty related to mobile commerce. Reduction of anxiety and uncertainty implies a crucial point that affects psychological mechanism making intent to use higher.