• Title/Summary/Keyword: 행위통제

Search Result 357, Processing Time 0.021 seconds

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

Factors Affecting on the Intention to Use of Information and Communication Technology for the Elderly Based on the Theory of Planned Behavior (계획된 행위이론을 기반으로 노인의 정보통신 테크놀로지 사용 의도에 영향을 미치는 요인)

  • Ha, Yeongmi;Yang, Seung-Kyoung;Choi, Moon-Jong
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.141-149
    • /
    • 2021
  • The purpose of this study was to identify the intention to use of information and communication technology(ICT) for the elderly residing in community based on the theory of planned behavior. The subjects were 99 elderly aged 60 or older living in G and S cities from January 1 to 31 in 2020 using questionnaire. The data was analyzed using the SPSS 23.0 program for descriptive statistics, t-test, ANOVA, Pearson's correlation coefficient, multiple regression. As a result, the mean of the attitude to use of ICT for the elderly was 3.79±0.74, subjective norm was 3.43±0.66, perceived behavioral control was 3.12±0.71, behavior intention was 3.23±0.77. The intent to use of ICT for the elderly are subjective norm(β=.35, p<.001), perceived behavior control(β=.35, p<.001), had an explanatory power of 48.7%. Therefore, it is necessary that systematic program considering the above factors for elderly residing in community to promote the intent to use of ICT.

금융 어플리케이션을 위한 효율적인 역할추출과 안전한 역할기반 접근통제 적용 방안

  • Jeong, Seong-Min
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.49-61
    • /
    • 2008
  • IT기술의 변화에 따라 금융기관의 정보보호 또한 안정성을 보장하면서도 새로운 비즈니스모델에 적합한 보안대책이 요구되고 있다. 금융 어플리케이션의 보안은 정보의 기밀성, 무결성, 가용성을 만족하는 안전하고 신뢰할 수 있는 시스템과 네트워크, 그리고 보안사고에 큰 비중을 차지하고 있는 내부 사용자에 대한 적절한 권한 부여와 접근통제가 요구되어진다. 정당한 사용자가 접근하여 발생하는 보안 문제, 즉 내부자에 의한 악의적인 행위나 오용, 실수 등에 의한 기업의 피해는 외부자에 의한 의도적인 공격보다 피해 규모가 크다. 따라서 정당한 사용자로 인증을 받았다고 할지라도 업무처리에 있어서 필요한 최소한의 권한만을 부여하는 것이 필요한 것이다. 이를 위해 금융기관에 적합한 접근통제가 필요하다. 역할기반 접근통제는 적용범위가 제한적인 강제적 접근통제와 분산된 보안관리로 중앙에서 통제가 어려운 자율적 접근통제의 단점을 보완하고, 실제 업무처리에 적합한 특성을 갖는다. 하지만 기존 역할기반 접근통제를 금융기관의 다양한 금융 어플리케이션에 적용하면 다음과 같은 문제가 발생할 수 있다. 첫째, 금융 어플리케이션에서 사용되는 역할 추출 및 관리가 어렵다. 둘째, 다양한 비즈니스모델이 원하는 직무분리가 복잡하고 어렵다. 셋째, 악의적인 내부 사용자가 역할을 변조하여 과도한 권한을 가질 수 있다. 따라서 본 논문에서는 기존의 역할기반 접근통제에 인사정보 연동을 통한 효율적인 역할 추출 및 분류방안과 역할관리, 직무분리의 세분화 그리고 역할의 안전한 관리를 위해 X.509기반의 권한관리 기반구조(PMI)를 이용한 권한관리 기술을 금융 어플리케이션 환경에 효율적으로 적용하는 방안을 제시한다.

국내 원자력시설 EMP 침해방지를 위한 방호체계 연구현황과 규제체계 구축현황

  • Ryu, Jinho;SONG, DONG HOON;HWANG, HO JONG;SHIN, ICK HYUN
    • Review of KIISC
    • /
    • v.28 no.6
    • /
    • pp.88-95
    • /
    • 2018
  • 방사능방재법의 개정을 통해 전자적 침해행위의 유형으로 고출력 전자기파(Electromagnetic Pulse, 이하 EMP) 위협에 대한 대책이 원자력시설별로 마련되도록 요구되었다. 그동안 국내의 EMP 위협에 대한 방호 대책은 군사시설 중심으로 오랫동안 연구되고 적용된 바 있으나, 공공 및 민간시설에 대해서는 이제 막 첫발을 내딛은 상황이다. 본고에서는 한국원자력통제기술원 사이버보안실에서 추진하고 있는 국내 원자력시설에 대한 EMP 방호 규제체계 구축현황에 대해 소개하고, 이에 배경이 되는 법적 근거 및 국내 외 유관 연구사례 및 기술표준 등에 대해 살펴보고자 한다.

Relationship between oral health locus of control and oral health behavior promotion in the adolescents (청소년의 구강건강 통제의 소재와 구강건강증진행위와의 관계)

  • Kim, Im-Young
    • Journal of Korean society of Dental Hygiene
    • /
    • v.15 no.4
    • /
    • pp.575-582
    • /
    • 2015
  • Objectives: The purpose of the study was to investigate the relationship between oral health locus of control and oral health behavior promotion in the adolescents. Methods: A self-reported questionnaire was completed by 493 high school students in Jeonju by convenience sampling from March to June, 2014. The questionnaire consisted of fourteen questions of oral health locus of control, fifteen questions of oral health behavior promotion, and seven questions of the general characteristics of the subjects. Data analysis was done by frequency analysis, t-test, ANOVA, and Duncan's multiple range test. Results: Oral health behavior promotion and oral health behavior index of internal locus of control showed a positive correlation, Higher internal locus of control showed a positive oral health behavior promotion. The higher propensity of oral health on the external locus of control showed the negative effects. Conclusions: The oral health internal locus of control was closely related to better oral health behavior in the adolescents.

A Study of the Smoking Cessation Behavior of University Student- Based on the Theory of Planned Behavior, Self Efficacy, Health Locus of Control - (대학생의 금연 행위에 대한 연구- 계획된 행위이론, 자기효능, 건강통제위와의 관계 고찰을 중심으로 -)

  • Ahn Hye-Young
    • Child Health Nursing Research
    • /
    • v.7 no.3
    • /
    • pp.371-382
    • /
    • 2001
  • This study was conducted to investigate correlation theory of planned behavior, self efficacy and health locus of control about smoking cessation behavior for university student. We sampled 204 university student smokers using questionnaires and analyzed the data using Pearson correlation coefficient. The results of this study were as follows : 1. There were significant positive correlation between theory of planned behavior(intention : r=.215, p=.005, attitude : r=.160, p=.025, perceived behavior control : r=.298, p=.000) and self efficacy. 2. There were significant positive correlation between theory of planned behavior(attitude : r=.228, p=.002) and internal health locus of control. There were significant positive correlation between theory of planned behavior(attitude : r=.203, p=.004, subjective norm : r=.141, p=.047) and external health locus of control. There were significant negative correlation between theory of planned behavior(perceived behavior control : r=-.152, p=.034) and accidental health locus of control. This study has shown a correlation between theory of planned behavior and self efficacy and health locus of control. As a result of these findings, I suggest to develop the intervention program for smoking cessation.

  • PDF

Chaebol and Earnings Management (대규모기업집단의 차별적 이익조정 행태)

  • Lim, Hyoung-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.385-394
    • /
    • 2012
  • This study investigates whether earnings management behavior of chaebol firms differ from that of non-chaebol firms. The ownership structure of chaebol firms is characterized by the dominance of one largest shareholder and his family members who typically participate in the management of the firm directly or indirectly and influence most of the important management decision. This study adopts the random effect model and the hausman and talyor model, using a panel of 5092 firm-year over a period from 1991 to 2010 to control for potential heterogeneity and endogeneity that may cause sever bias. This study finds that there is no difference in accrual based earnings management level between chaebol firms and non-chaebol firms. However, chaebol firms appeared to engage less real earnings management that is known to negatively affect future earnings and share prices. The results are consistent when controlling for potential heterogeneity and endogeneity in the hausman and taylor model. The results may be of interest to various stakeholders, policy makers, standard setters and academic researchers.

A Study on System Tracing User Activities in the Windows Operating System (윈도우 운영체제 상의 사용자 행위 추적에 관한 연구)

  • Jung, Chang-Sung;Kim, Young-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.101-114
    • /
    • 2011
  • As it seems like critical information leakages have been increasing due to industrial espionage and malicious internal users, the importance of introducing audit and log security technology is growing every now and then. In this paper, we suggest the session logging system for the company's internal control to meet the SOX legislation level, by monitoring and analyzing users behaviors connecting to the business-critical Operating System. The system proposed in this paper aims to monitor the user's illegal activities in the Operating System, and to present the clear evidence of purpose of those activities by detailed logs. For this purpose, we modified Operating System by adding multiple services suggested in this paper. These services utilize interfaces provided by the existing Operating System and add functions to control access and get logs. The system saves and manages session logs of users or administrators connected to the server with centralized log storage. And the system supports session log searching and lookup features required by SOX legislation for the company's internal controls with the level of computer forensics and logging technology.

An Empirical Test of Social Learning Theory and Complementary Approach in Explanation of University Students' Crimes in Social Network Services (SNS상의 범죄행위 설명에 있어 사회학습이론과 보완적 논의의 검증)

  • Lee, Seong-Sik
    • Informatization Policy
    • /
    • v.22 no.4
    • /
    • pp.91-104
    • /
    • 2015
  • This study tests the effects of differential association, definitions, differential reinforcement and imitation from social learning theory in the explanation of university students' crimes in social network services. In addition, this study tests the interaction effects between social learning factors and other factors such as low self-control, subcultural environment, and crime opportunity for the integrated approach. Using data from 486 university students in Seoul, results show that both definition and imitation have significant influences on crimes, even though differential association and differential reinforcement factors have no significant influences on crimes in social network services. Results also reveal that there are significant interaction effects between definition and subcultural environment, which meana that definition has a strong effect on crimes in high subcultural environment. In addition, it is found that reinforcement has also a strong effect on crimes in high crime opportunity and that interaction effect between imitation and low self-control is significant, which means that imitation has a strong effect on crimes in low self-control students.

Controlling Agent Government in Contract with State (국가와의 계약에서 대리인 정부에 대한 통제)

  • Lee, Hyukwoo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.168-178
    • /
    • 2015
  • Besides the imposition of taxes and mandatory actions, why in a special rules needed in the contract between state and civilians. The contract between the state and civilian are unlike with civilian's contract in the comparable effect, even if the effect of the agreement and the parties bear the structural nature of the self-other agreement between private economic actors and there are a variety of different specificity. In other words, the agents of the contract with the state government for control of opportunistic behavior are very specific rules exist. Through this, even if it is the relationship between state and non-mandatory private realms of the contract, even if the area forced me to the fact that the difference can be confirmed. Representative of the government of the country to understand the delegate decisions and judgments and other opportunistic behavior always seem to exist on the possibility of such devices for the pre-control needed.