• Title/Summary/Keyword: 인지된 취약성

Search Result 156, Processing Time 0.022 seconds

Exploring the Relationship between the Level of News Usage on Influenza A(H1N1) and Media Users' Behavioral Intention toward Personal and Public Health Protection: Focusing on Protection Motivation Theory (신종플루 뉴스 이용 정도가 개인 및 공중에 대한 건강보호 행위의도에 미치는 영향에 관한 연구: 보호동기이론을 중심으로)

  • Kim, Yeo-Ra
    • Korean journal of communication and information
    • /
    • v.51
    • /
    • pp.5-25
    • /
    • 2010
  • The purpose of this research examined the relationship between the level of news usage on Influenza A(H1N1) and media users' behavioral intention toward health protection. Specifically, the study investigated causal relationships among exposure of media information on Influenza A(H1N1) as an independent variable, psychological protection motivation factors such as perceived severity, vulnerability, response efficacy, & self-efficacy as mediated variables and behavioral intention on personal and public health protection as dependent variables using structure equation model analysis. Self-reported questionnaires were administrated to 460 college students. The result indicated the followings. First, the level of news usage on Influenza A(H1N1) was not statistically significant on influencing behavioral intention toward personal and public health protection. Second, perceived severity, vulnerability, and self-efficacy were significant variables on behavioral intention toward personal health protection whereas perceived vulnerability and response efficacy were significant on public health protection. The function among factors in protection motivation theory is dependent upon whom protected from illness.

  • PDF

Privacy Aware Authentication Protocol for Cognitive Radio Networks (인지무선 네트워크를 위한 프라이버시가 강화된 인증 프로토콜)

  • Kim, Hyun-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.33-40
    • /
    • 2010
  • Recently, the spectrum scarcity is becoming a big issue because there are exponential growth of broadcasting and communication systems in the spectrum demand. Cognitive radio is a technology that is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. Kuroda et al. proposed a radio-independent authentication protocol for cognitive radio networks. This paper first shows the privacy weaknesses in the authentication protocol by Kuroda et al. and proposes a privacy aware authentication protocol to solve the weaknesses.

A Study on Analysis and Control by Vulnerability of Integrated Database (통합 DB의 취약점 분석 및 제어 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.403-406
    • /
    • 2011
  • 현재 DB 보안시스템에서 DB 서버의 주요정보 및 개인정보 등의 전체 오브젝트 정보를 파악하여 보안취약 오브젝트에 대한 인지 및 차단을 수행하고, 업무범위를 벗어난 접근 등에 대한 오남용을 방지하고, 보안취약점을 자체 점검해야 할 필요성이 있다. 본 논문에서는 현 기술로 제어 불가한 DB의 보안취약 오브젝트에 대한 추출과, 추출 정보의 저장 및 관리, 메모리에 적재 및 오브젝트 명과 정보의 치환 분석 등의 보안 적용방안을 연구한다. 또한 보안 대상 내 주요 오브젝트의 변경이력을 관리하고, 보안 취약 오브젝트의 스캔결과 및 정책의 기본관리, 예약수행관리, 관리자 통보 등의 관리방안을 연구한다. 보안 취약에 대한 사전 차단을 위한 제어가능 시스템과의 연동은 ESM 등 정보수집 모듈과의 연동 및 보안정책 적용결과에 대한 연동 및 정책 재적용 방안을 설계한다. 본 논문의 연구는 지능형 DB보안 기능구현을 가능케 할 자료로 사용될 것이다.

  • PDF

Effect of Administration of Iron on the Lipid Concentrations in the RBC Membrane and Plasma (철분 투여가 적혈구막 및 혈장내의 지질함량에 미치는 영향)

  • Kim, Sung-hoon;Huh, Rhin-sou;Park, Hang-kyun;Do, Jae-chul;Lee, Young-ho
    • Korean Journal of Veterinary Research
    • /
    • v.25 no.2
    • /
    • pp.125-131
    • /
    • 1985
  • 철분투여가 용혈성 빈혈에 미치는 영향을 알아보기 위하여 흰쥐의 사료내에 철분을 혼합급여 또는 근육내에 주사하면서 60일간 사육하고 체중은 10일 간격으로 측정하였으며 적혈구의 취약성 실험과 적혈구막 및 혈장내의 vitamin E 함량과 인지질의 함량을 비색방법으로 측정한 결과 다음과 같은 성적을 얻었다. 증체량 측정에서는 A군의 190g에 비하여 C군 155g, B군 142g, D군 112g으로 철분함량이 높은 군에서 낮은 증가를 보였으며 적혈구 취약성 실험 결과 5마리 암수 평균값이 각각 A군 7.63% 및 2.68%, C군 10.84% 및 16.75%, B군 25.54% 및 33.62%, D군 47.23% 및 38.35%로 철분함량에 비례하여 각 실험군 사이에 유의한 증가를 나타내었다. 또한 적혈구막의 vitamin E 및 인지질의 함량은 5마리 암수 평균값이 각각 A군에서 18.54mg/dl 및 17.43mg/dl 그리고 120.55mg/dl 및 113.94mg/dl, C군에서 14.99mg/dl 및 10.56mg/dl 그리고 108.54mg/dl 및 99.97mg/dl, B군에서 13.10mg/dl 및 11.02mg/dl 그리고 91.67mg/dl 및 87.45mg/dl, D군에서 6.86mg/dl 및 8.87mg/dl 그리고 79.78mg/dl 및 70.12mg/dl로서 철분 투여량에 비례적으로 감소하였다. 혈장내의 vitamin E 및 인지질의 함량은 A군, C군, B군, D군의 순으로 각각 함량이 2.51mg/dl 및 31mg/dl, 1.94mg/dl 및 21mg/dl, 1.37mg/dl 및 20mg/dl 그리고 1.37mg/dl 및 15mg/dl로 철분 투여량에 비례적으로 감소하는 경향을 나타내었다.

  • PDF

Web-based Automated Network Service Security Vulnerability Analysts & Management System (웹 기반의 자동화된 네트워크 서비스 보안 취약성 분석 및 관리 시스템)

  • Lim, Mun-Hee;Yang, Jin-Suck;Kim, Hyun-Ku;Chang, Beom-Hwan;Chung, Tai-Myung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.853-856
    • /
    • 2002
  • 인터넷이라는 거대한 네트워크에 연결되어 있는 시스템의 보안 상태를 주기적으로 점검하여 외부로부터의 공격에 취약한 부분을 보완하여 주는 일은 공격에 대한 방어를 위하여 가장 기본적인 일이다. 그러나 수많은 호스트가 상호 연결된 네트워크 관리 시스템에서 관리자가 각 시스템의 보안상 취약점을 전부 인지하고 이에 대한 보완을 수행하는 것은 상당히 어려운 일이다. 따라서 관리자의 수작업에 의한 취약점 분석 작업보다는 자동화된 관리 도구에 의한 취약점 분석이 효율적이다. 이에 본 논문에서는 네트워크 서비스인 HTTP, SMTP의 취약점을 원격에서 분석하는 시스템을 설계 및 구현하였다. WAVAMS는 에이전트와 독립된 mobile 코드의 이동에 의한 동적 분석 모듈의 추가로 가장 최근의 취약점을 신속하게 분석 할 수 있으며 확장성이 높다. 또한 웹 기반으로 설계되어 관리자가 용이하게 관리할 수 있다.

  • PDF

3-Step Security Vulnerability Risk Scoring considering CVE Trends (CVE 동향을 반영한 3-Step 보안 취약점 위험도 스코어링)

  • Jihye, Lim;Jaewoo, Lee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.87-96
    • /
    • 2023
  • As the number of security vulnerabilities increases yearly, security threats continue to occur, and the vulnerability risk is also important. We devise a security threat score calculation reflecting trends to determine the risk of security vulnerabilities. The three stages considered key elements such as attack type, supplier, vulnerability trend, and current attack methods and techniques. First, it reflects the results of checking the relevance of the attack type, supplier, and CVE. Secondly, it considers the characteristics of the topic group and CVE identified through the LDA algorithm by the Jaccard similarity technique. Third, the latest version of the MITER ATT&CK framework attack method, technology trend, and relevance between CVE are considered. We used the data within overseas sites provide reliable security information to review the usability of the proposed final formula CTRS. The scoring formula makes it possible to fast patch and respond to related information by identifying vulnerabilities with high relevance and risk only with some particular phrase.

Technology Risk and Social Responsibility of Innovation: The Shut-Down Law and On-line Game as a Post Catch-up Innovation (기술위험과 혁신의 사회적 책임 - 셧다운제와 탈추격형 혁신으로서 온라인게임 -)

  • Jung, Byung Kul
    • Informatization Policy
    • /
    • v.20 no.4
    • /
    • pp.71-88
    • /
    • 2013
  • Probability of technology risk is expected to increase as the post catch-up innovation, characterized by high uncertainty and high risk, would dominate in the coming era of post catchup. Social controversy on online game as a post catch-up innovation is still ongoing, though the shutdown law was enacted by the government. Socio-technical vulnerability causing technology risk paradoxically arose from the world top-level ICT infrastructures and has been reinforced by developmentalism. While both the pros and cons of the regulation fail to recognize dilemma objectively, social cost is brought about and accumulated. With recognizing dilemma between technology innovation and risks, we can tackle technology risks and ensure responsible innovation in post catch-up era.

  • PDF

A Study on Risk Transference Processes of Natural Hazard - Focus on the human adjustment according socio-economic structure - (자연재해의 위험성 전이 과정에 대한 연구 - 사회.경제적 구조에 따른 인간의 적응양식을 중심으로 -)

  • Park, Eui-Joon
    • Journal of the Korean association of regional geographers
    • /
    • v.8 no.2
    • /
    • pp.247-255
    • /
    • 2002
  • In recent decades, the characteristics of natural hazard has been changed and the global cost of natural disasters has increased substantially. There are several trends in society and nature that suggest this pattern may continue, with more frequent mega-disasters occurring in the future. In particular, risk perception that is at odds with the "real" risk underlies the process of risk transference increases long-term vulnerability. Therefore investigating the correct risk transference and adjustments according to regional socio-economic structure can mitigate and reduce environmental, so called man-made hazard.

  • PDF

System Design and Implementation for Security Policy Management of Windows Based PC and Weakness Inspection (Windows 기반의 PC 보안 정책 관리 및 취약성 점검을 위한 시스템 설계 및 구현)

  • Park, Byung-Yeon;Yang, Jong-Won;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.23-30
    • /
    • 2008
  • Attempt to protect personal computer from hacking, virus, worm, and the troy wooden horse is progressed variously. Nevertheless, it is very difficult fer public users to understand configurations to enhance security stability in windows based personal computer, and many security problem is due to there lack of recognize about information accessability, various kind of configuration, these necessity, and efficiency. Accordingly, it is demandded to develop an efficient system to protect networks and personal computer with automated method. In this paper, we derive problems of personal computer by analyzing various vulnerableness and policy on security, through which we design and implement the system to solve various windows system problem conveniently.

A Study on Reuse Intention of the Easy Payment Service (간편 결제서비스 재사용의도에 관한 연구)

  • Kim, Jun-Woo;Nam, Jung-Ki;Jeon, Dong-Jin
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.303-312
    • /
    • 2018
  • The purpose of this study is to design the easy payment service research model and to find the influencing effect on the intention for the reuse of easy payment service by analysing the factors such as the social influence, the promotion condition, the security and the convenience as UTAUT model has. Also the research model employs the trust and the user satisfaction as parameters. The result shows that even though people feel the trust due to the convenience by the social influence, it has a negative influence on the user satisfaction if the risk recognized in the easy payment service and the weakness in the security are anticipated. The results of this study are academically meaningful as they established the research model for the easy payment service and the theoretical basis of the easy payment service area; they have provided the various practical implications.