• Title/Summary/Keyword: Computer Security Act

Search Result 65, Processing Time 0.023 seconds

Classes in Object-Oriented Modeling (UML): Further Understanding and Abstraction

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.139-150
    • /
    • 2021
  • Object orientation has become the predominant paradigm for conceptual modeling (e.g., UML), where the notions of class and object form the primitive building blocks of thought. Classes act as templates for objects that have attributes and methods (actions). The modeled systems are not even necessarily software systems: They can be human and artificial systems of many different kinds (e.g., teaching and learning systems). The UML class diagram is described as a central component of model-driven software development. It is the most common diagram in object-oriented models and used to model the static design view of a system. Objects both carry data and execute actions. According to some authorities in modeling, a certain degree of difficulty exists in understanding the semantics of these notions in UML class diagrams. Some researchers claim class diagrams have limited use for conceptual analysis and that they are best used for logical design. Performing conceptual analysis should not concern the ways facts are grouped into structures. Whether a fact will end up in the design as an attribute is not a conceptual issue. UML leads to drilling down into physical design details (e.g., private/public attributes, encapsulated operations, and navigating direction of an association). This paper is a venture to further the understanding of object-orientated concepts as exemplified in UML with the aim of developing a broad comprehension of conceptual modeling fundamentals. Thinging machine (TM) modeling is a new modeling language employed in such an undertaking. TM modeling interlaces structure (components) and actionality where actions infiltrate the attributes as much as the classes. Although space limitations affect some aspects of the class diagram, the concluding assessment of this study reveals the class description is a kind of shorthand for a richer sematic TM construct.

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Research on John School as a policy to prevent recidivism of online sex trafficking

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.143-149
    • /
    • 2018
  • Recently, President Donald Trump signed FOSTA (Fight Online Sex Trafficking Act) in April 11, 2018, which makes online service no more immune from civil liability for the action of third party facilitating sex trafficking content. Although it is also important to enhance security regulations and cognition on law, but it will be economically more effective to put more energy on preventing recidivism. For John School in Korea, it should increase implementation rate by putting core manpower and budget for preventing needs of sex purchase and then, check operation method and efficacy to improve the actual program. One way is first, empirical analysis and data is required on efficacy of John School program. Second, should have clear definition in Special Sex Trade Law. Third, more strick regulation for selecting participant is required. Fourth, more manpower and budget is required. Fifth, charging the participant for educational fee shall be reviewed. Sixth, educational program should be reviewed. The most important point of education is to make those criminals feel guilty about financially purchasing the sex, basically making them to recognize that it is ethically wrong. However, the current education system contains no clear explanation about the ethical issue of such problem but focusing more on other factors such as sexual disease and structural problem of sexual business. Therefore, this failed to deliver the right psychological training to those criminals without any ethical control. Knowing why women feel hurt when having unwanted sexual relationship by being paid is required part in terms of education for preventing sex trafficking.

A Study on the Improvement of Protection System for Public Interest Reporters

  • Lee, Young-Woo;Jang, Su-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.195-200
    • /
    • 2020
  • Korea enacted the Protection of Public Interest Reporters Act in March 2011 to protect whistleblowers from acts of infringement of public interest in the private sector. Most acts of infringement of the public interest are carried out secretly within the organization, which is known to the outside world by reports from members of the organization who are well aware of the problems within the organization. However, whistleblowers are at a disadvantage due to reporting and are reluctant to report. In addition, measures are needed to strengthen institutional mechanisms such as confidentiality, protection of personal information, responsibility, and prohibition of disadvantageous measures to effectively protect reporters due to lack of practical protective measures. Therefore, practical protection measures for whistleblowers are needed in line with the purpose of protecting whistleblowers, and measures to expand the corresponding compensation system will also be needed. Therefore, in this study, we would like to review the main contents of the current system for protecting whistleblowers in Korea and suggest reasonable improvement measures for protecting whistleblowers.

IPv4 Address Trading Using Resource Certificate

  • Park, Cheol-Soon;Ryou, Jae-Cheol;Park, Yong-Tae
    • Journal of Information Processing Systems
    • /
    • v.6 no.1
    • /
    • pp.107-120
    • /
    • 2010
  • The Internet has been growing at unprecedented rates. The problem of an address shortage could act as a barrier on this growth. In principle, a new Internet standard, IPv6 solves the problem of the address shortage because it has a very large address space. But IPv6 is not yet compatible with the IPv4 and during the IPv4-to-IPv6 transition period IPv4 address will continue to be in demand. Thus for quite some time, the problem of IP address shortage will persist. To solve the problem, we propose the mechanism of secure IP address trading. This mechanism is based on the Resource PKI (RPKI). The RPKI is the working item of IETF. This proposed mechanism maximizes the trust of IP address trading using RPKI.

A Study on the System of Private Investigation

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.1
    • /
    • pp.167-174
    • /
    • 2022
  • Since the Promotion Committee was established on March 25, 2021, urging the enactment of the Detective Business Act, many opinions and attention from all walks of life have been gathered. The Detective Business system, which is also one of the presidential pledges of the current 19th President Moon Jae In, is expected to be significant in that it can promote the development of a welfare state as well as efficient parts such as meeting the demand for security reinforcement services, improving the judicial system, and enhancing internationalization. In accordance with the consensus of the nine judges of the Constitutional Court that the lower part of Article 40 of the "Act on the Use and Protection of Credit Information" which prohibits the use of similar names such as investigating the general life of certain people does not violate the Constitution, detective work became possible regardless of the general life investigation. In particular, the detective job officially appeared on August 5, 2020, and it will be able to provide effective work services to the public by competing with prosecutors, police, and lawyers who have occupied exclusive positions in the field of a criminal investigations. However, although the role of detectives is gradually expanding and society is rapidly changing, illegal activities are prevalent throughout society, and more than 1,600 companies are currently operating suspiciously using the only name of "detectives", but the police are virtually letting go of the situation saying that they are "unauthorized.", and the damage is only going to the people, so at this point, the most worrisome thing is the absence of the law. Meanwhile, amid concerns over institutions overseeing illegal activities caused by the emergence of the detective industry, private security and detectives are similar to each other as in the United States, and it is expected to be able to gain public trust by entrusting the police in charge of managing and supervising private security companies. Therefore, at this time when most OECD countries except Korea legislate the Detective Business Act, prematurely allowing only the detective industry without enacting industry-related laws and systems can further fuel social confusion and hinder the detective industry along with the new fourth industry.

Classification of HTTP Automated Software Communication Behavior Using a NoSQL Database

  • Tran, Manh Cong;Nakamura, Yasuhiro
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.94-99
    • /
    • 2016
  • Application layer attacks have for years posed an ever-serious threat to network security, since they always come after a technically legitimate connection has been established. In recent years, cyber criminals have turned to fully exploiting the web as a medium of communication to launch a variety of forbidden or illicit activities by spreading malicious automated software (auto-ware) such as adware, spyware, or bots. When this malicious auto-ware infects a network, it will act like a robot, mimic normal behavior of web access, and bypass the network firewall or intrusion detection system. Besides that, in a private and large network, with huge Hypertext Transfer Protocol (HTTP) traffic generated each day, communication behavior identification and classification of auto-ware is a challenge. In this paper, based on a previous study, analysis of auto-ware communication behavior, and with the addition of new features, a method for classification of HTTP auto-ware communication is proposed. For that, a Not Only Structured Query Language (NoSQL) database is applied to handle large volumes of unstructured HTTP requests captured every day. The method is tested with real HTTP traffic data collected through a proxy server of a private network, providing good results in the classification and detection of suspicious auto-ware web access.

Research on improvement of law for invigorating autonomous vehicle

  • Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.167-173
    • /
    • 2018
  • The Korean government announced its goal of commercializing autonomous vehicle by year 2020. With such changes, it is expecting to decrease car accident mortality by half. To commercialize autonomous car, not only worries on safety of autonomous vehicle has to be solved but at the same time, institutional system has to be clear to distinguish legal responsibilities in case of accident. This paper will present the legal improvement direction of the introduction of autonomous vehicles as follows. First, it is necessary to re-establish concept of 'driver' institutionally. Second, it is appropriate to focus on Level 3 autonomous vehicle which is about to be commercialized in year 2020 and organize legal responsibility. Third, we should have a clear understanding on how level 3 autonomous vehicle will be commercialized in the future. Fourth, it is necessary to revise The Traffic Law, Act on Special Cases concerning the Settlement of Traffic Accident, and Automobile Accident Compensation Security Law in line with level 3 autonomous vehicle. Fifth, it is necessary to review present car insurance system. Sixth, present Product Liability Law is limited to movable products (Article 2), however, it is necessary to include intangible product which is software. Seventh, we should review on making special law related to autonomous car including civil, criminal, administrative, and insurance perspectives.

A Study on Changes in Media Report of Police Assigned for Special Guard Using Big Kinds

  • Park, Su-Hyeon;Cho, Cheol-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.167-172
    • /
    • 2021
  • The objective of this study is to present the academic implications and developmental direction of the police assigned for special guard system through big data analysis on the objective and macroscopic viewpoint of the media. As research method, this study conducted the analysis on 'police assigned for special guard' and the analysis of related words that would visualize the keywords highly related to keyword trend and news. Also, after dividing the period into the 1990s, 2000s, and 2010s, the number of relevant articles in each period was drawn for understanding the flow. In the results of this study, the perception of media report of police assigned for special guard was about the recruitment of police assigned for special guard, and relevant events/accidents, which showed the coexistence of positive interest in the recruitment of police assigned for special guard and negative image of events/accidents related to police assigned for special guard. As a result, however, the necessity and demand for police assigned for special guard are increasing. Thus, the police assigned for special guard should be engaged in work after carefully thinking of its role in charge of ethical responsibility and safety as an axis for maintaining the national safety and social order.

The Formation of Managerial Competence of the Future Head of Preschool Education by Means of Information and Communication Technologies

  • Nataliia, Dudnyk;Valentyna, Kryvda;Svitlana, Popychenco;Nelia, Skrypnyk;Tetiana, Duka
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.287-299
    • /
    • 2022
  • The article deals with the formation of managerial competence of the future head of preschool education institution by means of information and communication technology as a prerequisite for his ability to act competently and objectively evaluate actions and understand the interaction of forms and content of preschool education. The article aimed to study the effectiveness of information and communication technologies in the formation of managerial competence of the future head of preschool education institution. To achieve the objectives, the methods of comparative and systematic analysis were used to compare different views on the problem under study, namely, the formation of managerial competence of the future head of preschool education institution by means of information and communication technologies. The authors of the article determined that the use of information and communication technologies in the preparation of future heads of preschool educational institutions is of great importance and is an indicator in the structure of managerial competence. The priority directions of the use of various software products for the study of the modern Ukrainian language, methods of teaching the Ukrainian language contribute to the intensification of learning material. It is noted that the current state of development of information technologies and their widespread use in education satisfies the requirements of the objectivity of the assessment obtained the quality of the control process of forming the managerial competence of the future leader in the context of the general problems of pre-school education. It is noted that the means of information and communication technologies play a leading role in creating new educational policies and projects, as they motivate the way of access to knowledge.