• 제목/요약/키워드: Human security

검색결과 1,178건 처리시간 0.025초

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • 제11권4호
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.

금융보안 리스크 기반의 IT도급 정책 연구 (A Study on IT Outsourcing Policy Based on Operational Risks of Financial Industries)

  • 최창래;윤장호;이경호
    • 정보보호학회논문지
    • /
    • 제24권4호
    • /
    • pp.681-694
    • /
    • 2014
  • 2011년 대형 금융 사고가 연달아 발생하자 정부는 인력, 조직, 예산을 포함한 전자금융감독 규정 전면 개정을 발표했다. 규정에 주요 내용은 전자금융거래법 대상 기업들은 전체 직원의 5%를 IT인력으로 채용하고, IT인력의 5%는 보안인력으로, 또 IT예산의 7%는 정보보호 예산으로 편성하게 하는 내용이었다. 본 연구는 전자금융감독 규정 전면 개정에 따른 금융보안 리스크 기반의 IT도급 정책 결정 방안에 대해 연구하였다. 외주인력 문제를 해결하기 위한 정책 결정 Flow를 제공하고 IT 업무 분류 시 프로그램 품질 향상을 위한 개선 방안과 사례 연구를 통해 외주 인력의 효율적 운영정책을 제시하고자 한다.

클라우드 환경에서 보안 가시성 확보를 위한 자동화된 패킷 분류 및 처리기법 (Near Realtime Packet Classification & Handling Mechanism for Visualized Security Management in Cloud Environments)

  • 안명호;류미현
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.331-337
    • /
    • 2014
  • 컴퓨팅 패러다임이 클라우드 컴퓨팅으로 변화됨에 따라 보안 이슈가 더욱 더 중요하게 되었다. 컴퓨팅 플랫폼 서비스 제공자들은 Firewall, Identity Management 등을 제공하지만 클라우드 컴퓨팅 인프라는 사용자가 맘대로 제어하거나 새로운 장치들을 부착하여 사용할 수 없기 때문에 비교적 보안에 취약한 것이 사실이다. 이런 환경에서는 사용자 스스로 보안을 대비해야 하기 때문에 직관적인 방법으로 전체 네트워크 트래픽 상황을 가시적으로 조망할 수 있는 기법이 필요하다. 이를 위해서는 네트워크 패킷을 실시간으로 저장하고, 저장된 데이터를 준 실시간으로 분류할 수 있는 기술이 요구된다. 네트워크 패킷 분류에서 중요한 사항은 패킷 분류를 비지도 방식으로 사람의 개입 없이도 판단 기준을 지능적으로 생성하고 이를 통해 패킷을 스스로 판별할 수 있는 기술개발이 필요하다. 또한, 이를 위해서 Naive-Bayesian Classifier, Packet Chunking 등의 방법들을 활용해 사용자 개입없이 분류에 필요한 시그니쳐(Signature)를 탐색하고 이를 학습해 스스로 자동화된 패킷 분류를 실현할 수 있는 방안을 제시한다.

  • PDF

Remote Control of Autonomous Robots via Internet

  • Sugisaka, Masanori;Johari, Mohd Rizon M
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.24-27
    • /
    • 2004
  • This paper describes the method how to control an autonomous robot remotely using Internet. The autonomous robot that has an artificial brain is called "Tarou". (1) It is able to move along the line on the floor based on processing the image data obtained from two CCD cameras. (2) It is able to understand dialogs between human being and it and is able to take actions such as turn right and lefts, go forward 1m and go backward 0.5m, etc. (3) It is able to recognize patterns of objects. (4) It is able to recognize human faces. (5) It is able to communicate human being and to speak according to contents written in the program. We show the techniques to control the autonomous robot "Tarou" remotely by personal computer and/or portable Phone via Internet. The techniques developed in our research could dramatically increase their performance for..the need of artificial life robot as the next generation robot and national homeland security needs.

  • PDF

Face Recognition Based on PCA on Wavelet Subband of Average-Half-Face

  • Satone, M.P.;Kharate, G.K.
    • Journal of Information Processing Systems
    • /
    • 제8권3호
    • /
    • pp.483-494
    • /
    • 2012
  • Many recent events, such as terrorist attacks, exposed defects in most sophisticated security systems. Therefore, it is necessary to improve security data systems based on the body or behavioral characteristics, often called biometrics. Together with the growing interest in the development of human and computer interface and biometric identification, human face recognition has become an active research area. Face recognition appears to offer several advantages over other biometric methods. Nowadays, Principal Component Analysis (PCA) has been widely adopted for the face recognition algorithm. Yet still, PCA has limitations such as poor discriminatory power and large computational load. This paper proposes a novel algorithm for face recognition using a mid band frequency component of partial information which is used for PCA representation. Because the human face has even symmetry, half of a face is sufficient for face recognition. This partial information saves storage and computation time. In comparison with the traditional use of PCA, the proposed method gives better recognition accuracy and discriminatory power. Furthermore, the proposed method reduces the computational load and storage significantly.

Digital Transformation Requirements at Saudi Universities from Faculty Members' Perspectives

  • Taha Mansor Khawaji
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.8-20
    • /
    • 2023
  • The current study aims to determine digital transformation (organizational, technical, and human resources) requirements at Saudi universities from Umm Al-Qura University faculty members' perspectives. The researcher used a quantitative approach based on the descriptive analytical design. To answer the questions of the study, the researcher used the questionnaire as a data collection tool. The questionnaire was sent electronically to faculty members working in colleges and institutes affiliated with Umm Al-Qura University in Makkah Al-Mukarramah, Saudi Arabia. The questionnaire consisted of the three dimensions of digital transformation: organizational; technical; and human resources requirements. The results showed that requirements related to human resources came first with an average of 2.25 then the organizational requirements with an average of 1.95, and in the last, technical requirements came with an average of 1.64. In addition, some suggestions were given by the participants (faculty members) related to the mechanism that could contribute to implementing digital transformation at Saudi universities. Likewise, at the end of the study, the researcher has given some suggestions related to the implementation of digital transformation requirements at Saudi universities.

Creation of Integrated of Industrial Security with the use of Modern Information Technology

  • Sattarov, Sh.B.;Adilov, F.T.;Ivanyan, A.I.
    • Journal of Multimedia Information System
    • /
    • 제2권3호
    • /
    • pp.281-286
    • /
    • 2015
  • This article considers Honeywell solutions in the branch of integration of subsystems of industrial safety and security for industrial enterprises with the creation of a unified Human-machine interface for centralized management and control of safety at the plant.

Cognitive Bias and Information Security Research: Research Trends and Opportunities

  • Park, Jongpil;Oh, Chang-Gyu
    • Asia pacific journal of information systems
    • /
    • 제26권2호
    • /
    • pp.290-298
    • /
    • 2016
  • Human cognition and decision-making related to information systems (IS) is a major area of interest in IS research. Among these areas, cognitive bias rooted in behavioral economics is gaining considerable attention from researchers. In the present study, we identify the role of cognitive biases and discuss how they shape the information security behavior. We also seek research opportunities to provide directions and implications for future research.

사물인터넷 통신을 위한 경량 암호기술 동향 분석 (Analyses of Light-weight Cryptography Technology for Internet of Things)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 추계학술대회
    • /
    • pp.234-235
    • /
    • 2016
  • With the development of the Internet, the popularization of internet has become the new trend and enormously changed the way of human communication. There is a strong need for security. The following research will provide the definition and purpose of IoT and examine its security concerns, In this paper, we surveyed at energy consumption of lightweight block ciphers implemented in reconfigurable devices, and we analyze d the effects that round unrolling might have on the energy consumed during the encryption.

  • PDF

노약자의 낙상가능지역 진입방지를 위한 보안로봇의 주행경로제어 (Navigation Trajectory Control of Security Robots to Restrict Access to Potential Falling Accident Areas for the Elderly)

  • 진태석
    • 제어로봇시스템학회논문지
    • /
    • 제21권6호
    • /
    • pp.497-502
    • /
    • 2015
  • One of the goals in the field of mobile robotics is the development of personal service robots for the elderly which behave in populated environments. In this paper, we describe a security robot system and ongoing research results that minimize the risk of the elderly and the infirm to access an area to enter restricted areas with high potential for falls, such as stairs, steps, and wet floors. The proposed robot system surveys a potential falling area with an equipped laser scanner sensor. When it detects walking in elderly or infirm patients who in restricted areas, the robot calculates the velocity vector, plans its own path to forestall the patient in order to prevent them from heading to the restricted area and starts to move along the estimated trajectory. The walking human is assumed to be a point-object and projected onto a scanning plane to form a geometrical constraint equation that provides position data of the human based on the kinematics of the mobile robot. While moving, the robot continues these processes in order to adapt to the changing situation. After arriving at an opposite position to the human's walking direction, the robot advises them to change course. The simulation and experimental results of estimating and tracking of the human in the wrong direction with the mobile robot are presented.