• 제목/요약/키워드: Benefits of Information Security

검색결과 184건 처리시간 0.023초

Review Of Some Cryptographic Algorithms In Cloud Computing

  • Alharbi, Mawaddah Fouad;Aldosari, Fahd;Alharbi, Nawaf Fouad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.41-50
    • /
    • 2021
  • Cloud computing is one of the most expanding technologies nowadays; it offers many benefits that make it more cost-effective and more reliable in the business. This paper highlights the various benefits of cloud computing and discusses different cryptography algorithms being used to secure communications in cloud computing environments. Moreover, this thesis aims to propose some improvements to enhance the security and safety of cloud computing technologies.

기업의 정보보안 활동이 구성원의 정보보안 준수의도에 미치는 영향 연구 (A Study on the influence of firm's Information Security Activities on the Information Security Compliance Intention of Employees)

  • 정재원;이정훈;김채리
    • 융합보안논문지
    • /
    • 제16권7호
    • /
    • pp.51-59
    • /
    • 2016
  • 기업의 정보시스템에 대한 내 외부의 위협이 증가되고 있으며 이를 감소시키기 위해 많은 돈과 인력을 투자하고 있다. 하지만 이러한 투자에도 불구하고 보안위협과 사고는 지속적으로 발생하고 있다. 본 연구는 기업의 사고 방지를 위한 다양한 정보보호 활동을 예방 지향적과 억제 지향적으로 구분하고 건강신념모델을 이용하여 기업의 정보보안 활동이 구성원들에게 어떤 영향을 미치고 정보보안 정책을 준수하도록 하는지 연구하였다. 연구결과 예방 지향적 활동은 심각성에, 억제 지향적 활동은 유익성에 유의미한 영향을 주고, 심각성과 유익성은 각각 준수의도에 영향을 주었다. 이러한 결과로 미루어보아, 기업에서 교육, 홍보, 모니터링 등 사전적인 활동을 시행할 경우 미 준수로 발생할 수 있는 부정적인 결과에 대해 강조하여야 하며, 감사, 처벌 등 사후적인 활동을 통해 보안을 유지하고자 할 경우 기업의 의지를 보임으로써 보안 정책을 준수하는 것이 유익할 것이라는 판단을 구성원 스스로 하도록 하는 것이 더욱 효과적인 정보보안 활동이 될 것이다.

정보보호 관련 법의 과제와 합리적인 개선방향 (Securing Information Related Lawful Problems and it's Rationalities of Remedy)

  • 이영수
    • 융합보안논문지
    • /
    • 제3권2호
    • /
    • pp.71-83
    • /
    • 2003
  • 정보통신 기술의 발달은 인류에게 고도의 합리화를 추구하고, 시간 공간을 초월하여 다양한 혜택을 누리게 만들었다. 정보가 자원인 사회구조에서 정보통신 기술의 발달은 정보화 혁명을 일으켰고, 인간의 발전에 크게 기여하고 있다. 정보통신 기술의 발달로 인하여 인류의 발전에 기여한 반면 동시에 인류사회를 위협하는 역기능을 수반하고 있다. 지식정보사회 발전의 관건은 정보화 사회의 순기능을 발전시키고 역기능을 적절히 규제 할 수 있는 정보보호 기술의 발전과 제도적으로 정보보호를 효율적으로 할 수 있는 방안을 찾는 것이다. 지식정보사회의 발전을 가로막고 있는 정보사회의 역기능에 대한 사례 및 정보보호관련 법률의 구조 및 개념에 대한 문제와 현 사회에 부적절한 법규제도의 개선방안에 대하여 논하였다.

  • PDF

부합성 분석을 통한 정보보안 평가지표 개발 (A Development of Evaluation Indicators for Information Security by Means of the Coincidence Analyses)

  • 이영규;김상훈
    • 한국IT서비스학회지
    • /
    • 제7권3호
    • /
    • pp.175-198
    • /
    • 2008
  • The wide spread of the Internet has become a momentum to promote informatization, and thus individuals, organizations, and government bodies are competitively participating in this kind of new wave. Informatization enables us not only to circulate and utilize information without any limitation but also to maximize users' benefits and convenience. On the other hand, it brings about negative effects-security incidents such as cyber terror, Internet fraud and technology leakage, etc. Evaluation on security level should precede over all the others in order to minimize damage by security incidents since it diagnoses current status on security as it is and can be used as a guideline for appropriate security management. In this study, evaluation domains, items and indicators of information security to evaluate information security are theoretically developed on the basis of critically reviewing the major existing research. And then the coincidence level(content validity, ease and reliability of evaluation) of each evaluation indicators are empirically analyzed through performing the field study of 83 information security experts.

Vulnerability and Information Security Investment Under Interdependent Risks: A Theoretical Approach

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • 제21권4호
    • /
    • pp.27-43
    • /
    • 2011
  • This article explores economic models that show the optimal level of information security investment in the presence of interdependent security risks, Using particular functional forms, the analysis shows that the relationship between the levels of security vulnerability and the levels of optimal security investments is affected by externalities caused by agents' correlated security risks. This article further illustrates that, compared to security investments in the situation of independent security risks, in order to maximize the expected benefits from security investments, an agent should invest a larger fraction of the expected loss from a security breach in the case of negative externalities, while an agent should spend a smaller fraction of the expected loss in the case of negative externalities.

LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications

  • Roy, Siddhartha;Roy, Saptarshi;Biswas, Arpita;Baishnab, Krishna Lal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.4122-4144
    • /
    • 2021
  • In this fast-paced technological world, the Internet of Things is a ground breaking technology which finds an immense role in the present electronic world which includes different embedded sensors, devices and most other things which are connected to the Internet. The IoT devices are designed in a way that it helps to collect various forms of data from varied sources and transmit them in digitalized form. In modern era of IoT technology data security is a trending issue which greatly affects the confidentiality of important information. Keeping the issue in mind a novel light encryption strategy known as LCB is designed for IoT devices for optimal security. LCB exploits the benefits of Feistel structure and the architectural benefits of substitution permutation network both to give more security. Moreover, this newly designed technique is tested on (Virtex-7) XC7VX330T FPGA board and it takes much little area of 224 GE (Gate Equivalent) and is extremely fast with very less combinational path delay of 0.877 ns. An in-depth screening confirms the proposed work to promise more security to counter cryptographic attacks. Lastly the Avalanche Effect (AE) of LCB showed as 63.125% and 63.875% when key and plaintext (PT) are taken into consideration respectively.

System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats

  • Choi, Seul-Ki;Yang, Chung-Huang;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권2호
    • /
    • pp.906-918
    • /
    • 2018
  • The advent of the Internet of Things (IoT) technology, which brings many benefits to our lives, has resulted in numerous IoT devices in many parts of our living environment. However, to adapt to the rapid changes in the IoT market, numerous IoT devices were widely deployed without implementing security by design at the time of development. As a result, malicious attackers have targeted IoT devices, and IoT devices lacking security features have been compromised by attackers, resulting in many security incidents. In particular, an attacker can take control of an IoT device, such as Mirai Botnet, that has insufficient security features. The IoT device can be used to paralyze numerous websites by performing a DDoS attack against a DNS service provider. Therefore, this study proposes a scheme to minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT service environment.

Incoterms(R) 2010상 수출입 당사자의 보안관련 의무에 관한 연구 (A Study on the Security related Obligations of Contracting Party under the Incoterms(R) 2010 Rules)

  • 양정호
    • 무역상무연구
    • /
    • 제54권
    • /
    • pp.45-80
    • /
    • 2012
  • Since the 9.11 terror attack, the event which caused supply chain disruption, supply chain security has become more important than ever before. With this as a momentum, a customs supply chain security paradigm emerged intended to guarantee secure flow of cargo across boarder. Under this circumstances Incoterms(R) 2010 rules have allocated obligations between the buyer and seller to obtain or to render assistances in obtaining security clearances. Thus, security related obligations such as providing advance manifest information is the mandatory requirements for any export and import. The impact on the seller and buyer of security related obligations under the Incoterms(R) 2010 rules environment is obvious. Assistance to provide the security information in advance has become indispensable obligations to the seller and buyer. As such assistances is at the cost and risk of the party responsible for the clearances of the goods, the choice of recognised partner and compliance with the relevant security program, in order to enjoy the relevant benefits, becomes paramount.

  • PDF

Physical Layer Security of AF Relay Systems With Jamming.

  • Ofori-Amanfo, Kwadwo Boateng;Lee, Kyoung-Jae
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2019년도 춘계학술대회
    • /
    • pp.288-289
    • /
    • 2019
  • This paper studies the secrecy capacity for a wireless cooperative network with perfect channel state information at the relays, and receiver. A similar assumption is also made for the instance where there exist a direct link between the transmitter and receiver. Physical Layer security techniques are employed in wireless networks to mitigate against the activity of eavesdroppers. It offers a viable alternative to computationally intensive encryption. In this paper the design of a protocol utilizing jamming (via jamming nodes) for better security and relaying (via relay nodes) for the amplify-and-forward (AF) operation, is investigated. A a signal-to-noise variant of secrecy known as secrecy gap is explored because of its use of lesser computational power - preferable for practical systems. Thus we maximize this signal-to-noise approach instead of the conventional secrecy capacity maximization method. With this, an iterative algorithm using geometric programming (GP) and semi-definite programming (SDP) is presented with appreciable benefits. The results show here highlight the benefits of using fractional components of the powers of the relays to offer better secrecy capacity.

  • PDF

The Use of Artificial Intelligence in Healthcare in Medical Image Processing

  • Elkhatim Abuelysar Elmobarak
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.9-16
    • /
    • 2024
  • AI or Artificial Intelligence has been a significant tool used in the organisational backgrounds for an effective improvement in the management methods. The processing of the information and the analysis of the data for the further achievement of heightened efficiency can be performed by AI through its data analytics measures. In the medical field, AI has been integrated for an improvement within the management of the medical services and to note a rise in the levels of customer satisfaction. With the benefits of reasoning and problem solving, AI has been able to initiate a range of benefits for both the consumers and the medical personnel. The main benefits which have been noted in the integration of AI would be integrated into the study. The issues which are noted with the integrated AI usage for the medical sector would also be identified in the study. Medical Image Processing has been seen to integrate 3D image datasets with the medical industry, in terms of Computed Tomography (CT) or Magnetic Resonance Imaging (MRI). The usage of such medical devices have occurred in the diagnosis of the patients, the development of guidance towards medical intervention and an overall increase in the medical efficiency. The study would focus on such different tools, adhered with AI for increased medical improvement.