• 제목/요약/키워드: Comprehensive Security

검색결과 441건 처리시간 0.021초

Resource Management Strategies in Fog Computing Environment -A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.310-328
    • /
    • 2022
  • Internet of things (IoT) has emerged as the most popular technique that facilitates enhancing humans' quality of life. However, most time sensitive IoT applications require quick response time. So, processing these IoT applications in cloud servers may not be effective. Therefore, fog computing has emerged as a promising solution that addresses the problem of managing large data bandwidth requirements of devices and quick response time. This technology has resulted in processing a large amount of data near the data source compared to the cloud. However, efficient management of computing resources involving balancing workload, allocating resources, provisioning resources, and scheduling tasks is one primary consideration for effective computing-based solutions, specifically for time-sensitive applications. This paper provides a comprehensive review of the source management strategies considering resource limitations, heterogeneity, unpredicted traffic in the fog computing environment. It presents recent developments in the resource management field of the fog computing environment. It also presents significant management issues such as resource allocation, resource provisioning, resource scheduling, task offloading, etc. Related studies are compared indifferent mentions to provide promising directions of future research by fellow researchers in the field.

주요국 사이버보안 정책 동향 및 시사점 (Trends and Implications of Cybersecurity Policies in Major Countries)

  • 이재성;최선미;안춘모;유영상
    • 전자통신동향분석
    • /
    • 제38권4호
    • /
    • pp.58-69
    • /
    • 2023
  • Cyberspace is emerging as a critical domain requiring national-level governance and international cooperation owing to its potential financial and societal impacts. This research aims to investigate the cybersecurity policies from major countries for understanding with comprehensive perspectives. Global trends emphasize a comprehensive command-centered approach, with top leadership directing cybersecurity policies. Key policy areas include security across technology ecosystems, protection of critical infrastructure, and software supply chain security. Investment is being focused on zero-trust architectures, software bills, and new technologies like artificial intelligence. For countries like Korea, immediate response and adaptation to these trends are crucial to develop and enforce national cybersecurity policies.

보안 및 통제와 정보기술 사용자의 성격의 관계 (Relationship of Information Technology User Personality, Security and Control)

  • 이장형;김종원
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제19권3호
    • /
    • pp.1-12
    • /
    • 2010
  • Personality is comprehensive nature of the mood and attitude of people, most clearly revealed in the interaction with other people. This study is a analysis on personality type to information system security and control from financial institute employee. Based on 'The Big Five' personality model, this study develops hypothetical causal relationships of potential organization member's personality and their information system security and control. Research hypotheses are empirically tested with data collected from 901 employees. Results show that employees of high level security mind are the owner of conscientious and emotional stable personality and the employees of high level control mind are the owner of agreeable and emotional stable personality. Therefore the owner of agreeable and stable personality is higher security and control than others.

정보보안수준 계량화 연구 (A Study on the Quantification of Information Security Level)

  • 김현수
    • Asia pacific journal of information systems
    • /
    • 제9권4호
    • /
    • pp.181-201
    • /
    • 1999
  • This study presents an information security level index and a quantification scheme. A comprehensive survey on previous researches in information security checklists has been performed. A candidate indicator list for information security level has been developed, Desirability of each indicator has been tested by 4 criteria, They are general validity, relative importance, probability of accident and impact of accident. 67 experts' opinion has been collected and analysed. The result shows that selected indicators are a very good candidate set for the determination of information security level. A factor analysis shows indicators are well structured. There exists strong correlation between validity and probability, validity and impact, and importance and probability. A quantification scheme of information security index has been developed by experts' judgement and statistical tests.

  • PDF

Classification of NFT Security Issues and Threats through Case Analysis

  • Mi-Na, Shim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권1호
    • /
    • pp.23-32
    • /
    • 2023
  • Since NFTs can be used like certificates due to the nature of blockchain, their use in various digital asset trading markets is expanding. This is because NFTs are expected to be actively used as a core technology of the metaverse virtual economy as non-transferable NFTs are developed. However, concerns about NFT security threats are also growing. Therefore, the purpose of this study is to investigate and analyze NFT-related infringement cases and to clearly understand the current security status and risks. As a research method, we determined NFT security areas based on previous studies and analyzed infringement cases and threat types for each area. The analysis results were systematically mapped in the form of domain, case, and threat, and the meaning of the comprehensive results was presented. As a result of the research, we want to help researchers clearly understand the current state of NFT security and seek the right research direction.

제1차 국민건강보험 종합계획 (The First Comprehensive Plan of National Health Insurance)

  • 박은철
    • 보건행정학회지
    • /
    • 제29권2호
    • /
    • pp.99-104
    • /
    • 2019
  • On May 1, 2019, the Minister of Health and Welfare announced publicly the first Comprehensive Plan of National Health Insurance (NHI). The Comprehensive Plan which is the 5-year plan including expenditure and revenue aspect of NHI, is desirable in 42 years of introduction of NHI and 30 years of universal coverage of NHI, though the Plan was late and had some conflict process. The Comprehensive Plan was established without evaluation of Moon's Care Plan, did not included to relationship with NHI and other health security systems, and did not have the blue print of NHI. The Plan was not sufficient in content of adequate health care utilization and relationship with service benefit and cash benefit. The Comprehensive Plan should be modified in considering the blue print of NHI and national healthcare system with participating stakeholder in turbulent environment-low fertility, rapid ageing, low economic growth rate, era of non-communicable diseases, unification of the Korean Peninsula, and 4th industrial revolution. Therefore, I suggest to establish the President's Committee of Improving Healthcare System for the blue print of health care and NHI.

Enhancing Cyber-Physical Systems Security: A Comprehensive SRE Approach for Robust CPS Methodology

  • Shafiq ur Rehman
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.40-52
    • /
    • 2024
  • Cyber-Physical Systems (CPS) are introduced as complex, interconnected systems that combine physical components with computational elements and networking capabilities. They bridge the gap between the physical world and the digital world, enabling the monitoring and control of physical processes through embedded computing systems and networked communication. These systems introduce several security challenges. These challenges, if not addressed, can lead to vulnerabilities that may result in substantial losses. Therefore, it is crucial to thoroughly examine and address the security concerns associated with CPS to guarantee the safe and reliable operation of these systems. To handle these security concerns, different existing security requirements methods are considered but they were unable to produce required results because they were originally developed for software systems not for CPS and they are obsolete methods for CPS. In this paper, a Security Requirements Engineering Methodology for CPS (CPS-SREM) is proposed. A comparison of state-of-the-art methods (UMLSec, CLASP, SQUARE, SREP) and the proposed method is done and it has demonstrated that the proposed method performs better than existing SRE methods and enabling experts to uncover a broader spectrum of security requirements specific to CPS. Conclusion: The proposed method is also validated using a case study of the healthcare system and the results are promising. The proposed model will provide substantial advantages to both practitioners and researcher, assisting them in identifying the security requirements for CPS in Industry 4.0.

러시아의 크림반도 합병의 해양안보적 고찰 (A Maritime Security Review of Russia's Annexation of Crimea)

  • 정민기
    • 해양안보
    • /
    • 제6권1호
    • /
    • pp.57-81
    • /
    • 2023
  • 본 연구는 러시아의 크림반도 합병의 해양안보적 고찰을 목표로 하였다. 본 연구는 러시아의 국가안보 인식에 대한 포괄적인 분석을 바탕으로 러시아의 해양안보전략과 흑해·아조프해의 안보적 중요성에 대해서 검토하였으며, 이후 크림반도 합병을 해양 안보적으로 고찰하였다. 이를 통해 본 연구는 러시아의 크림반도 합병이 군사적으로는 흑해함대의 활동을 보장하며 대서양으로의 진출 통로를 확보하여 NATO의 동진에 대항하고 경제적으로는 천연자원의 생산 및 수송, 해운의 안정적인 보장, 흑해경제권 내에서의 영향력 확보를 위한 전략적 고려를 바탕으로 이뤄졌음을 드러냈다.

  • PDF

기술스트레스가 정보보안에 미치는 영향에 관한 연구 (An Investigation into the Role of Technostress in Information Security Context)

  • 박철주;임명성
    • 디지털융복합연구
    • /
    • 제10권5호
    • /
    • pp.37-51
    • /
    • 2012
  • 본 연구의 목적은 정보보안을 기술, 조직, 인적 요소 등을 포함하는 포괄적인 관점에서 접근하는 것이다. 정보보안 역시 최종 사용자와 관련된 기술을 포함하고 있기 때문에 기술스트레스를 증가시킬 수 있다. 따라서 기술스트레스 프레임워크를 활용하여 보안상황에서 보안인식훈련이라는 상황적 요인이 기술스트레스에 어떠한 영향을 미치며, 기술스트레스가 보안정책준수행위에 어떠한 영향을 미치는지 실증적으로 분석해보았다. 분석결과 보안인식훈련은 업무과중과 기술불확실성에 유의한 영향을 미치는 것으로 나타났으며, 이들은 보안정책 준수에 유의한 영향을 미치는 것으로 나타났다.

전자금융기반시설 정보보호 수준강화 방안 (정보보호 관리수준 분석을 통한) (Improvements of Information Security Level in Electronic Financial Infrastructure(By Analyzing Information Security Management Level))

  • 박근덕;염흥열
    • 정보보호학회논문지
    • /
    • 제26권6호
    • /
    • pp.1605-1618
    • /
    • 2016
  • 최근 몇 년 동안 금융회사(은행, 증권사, 신용카드사, 보험사 등)를 대상으로 한 개인정보 유출, 홈페이지 해킹, 분산 서비스거부공격(DDoS) 등 보안사고가 꾸준히 증가하고 있다. 본 논문에서는 현행 전자금융기반시설의 정보보호 관리수준의 문제점을 법적 준거성과 정보보호 인증제도 관점에서 분석하고 금융 분야 특성에 적합한 종합적인 관리체계 하에서 높은 수준의 정보보호 활동이 지속 가능하도록 정보보호관리체계, 정보보호 준비도 평가 및 주요정보통신기반시설 취약점 분석 평가 제도를 활용한 개선방안을 제시하고자 한다.