• Title/Summary/Keyword: Human security

Search Result 1,178, Processing Time 0.026 seconds

Security Analysis to an Biometric Authentication Protocol for Wireless Sensor Networks (WSN 환경에서 Biometric 정보를 이용한 사용자 인증 스킴의 안전성 분석)

  • Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.59-67
    • /
    • 2015
  • A novel authentication mechanism is biometric authentication where users are identified by their measurable human characteristics, such as fingerprint, voiceprint, and iris scan. The technology of biometrics is becoming a popular method for engineers to design a more secure user authentication scheme. In terms of physiological and behavioral human characteristics, biometrics is used as a form of identity access management and access control, and it services to identity individuals in groups that are under surveillance. In this article, we review the biometric-based authentication protocol by Althobati et al. and provide a security analysis on the scheme. Our analysis shows that Althobati et al.'s scheme does not guarantee server-to-user authentication. The contribution of the current work is to demonstrate this by mounting threat of data integrity and bypassing the gateway node on Althobati et al.'s scheme. In addition, we analysis the security vulnerabilities of Althobati et al.'s protocol.

Senior Level Leadership of the Knowledge-Intelligence-Science Military (지식.정보.과학군대의 고급대제 리더십)

  • Jo, Yeong-Gap
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.1-44
    • /
    • 2006
  • Today, the times of knowledge-intelligence made changes of the ordinary life of citizens society, and also changed greatly the circumstance of leadership in the military. The times of knowledge-intelligence changed the circumstances of national security and the features of warfares, and also make affecting decisively to senses and style of new who were servicing in the military. In order to response effectively against the changes of those leadership circumstances, senior level leadership should be understand in depth human psychology and battlefield circumstances in the dimension of policies and strategies, and should be executed their leadership. In this thesis, I reviewed the concept and vision of senior level leadership theories and cases about traits and roles In addition, I suggested development options for senior level leadership such as (1) high charactenstics and professionalism, (2)educational center of military for advanced democratic citizen and leadership, (3)execution of leadership in psychological leadership, (4)development of leadership needed in the battlefield Finally, the current military senior level leadership should be changed from one-side and authority style to the change-orientated style, which could believe and participate by themselves.

  • PDF

Regional Level of Inclusive Development

  • Shashyna, Maryna V.;Butko, Mykola P.;Tulchynska, Svitlana O.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.133-138
    • /
    • 2021
  • The concept of inclusive development provides equal opportunities for all participants in access to the labor market and resource allocation. This concept emphasizes the equality of human capital, the ecological state of the environment, social protection and food security. This concept is fundamentally different from the standard perception of economic growth, because it has broader goals than simply increasing incomes and GDP. It rejects the position that positive results are an automatic consequence of growth; here the basic condition is human development and increase of its well-being, reduction of poverty. Therefore, it is not the result of distribution that becomes primary, but the involvement in the process of social reproduction. An alternative system of characterization of the country's position according to the resulting indicator of the Inclusive Development Index was presented at the World Economic Forum in Davos. In this research the methodical development of the system of estimation of the index of inclusive development for regions of the NUTS 4 level of the European classification is resulted.

Terahertz-based Security Screening System Technology (테라헤르츠파 기반 대인 보안검색 기술의 동향과 발전 전망)

  • Lee, I.M.;Lee, E.S.;Kim, M.G.;Choi, D.H.;Park, D.W.;Shin, J.H.;Kim, Y.H.;Kim, J.S.;Cho, J.C.;Kim, Y.H.;Jo, S.;Kwak, D.Y.;Park, K.H.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.2
    • /
    • pp.11-20
    • /
    • 2022
  • Terahertz electromagnetic waves are considered the waves for the next generation of security checking technology. They can penetrate opaque materials, such as plastics, fibers, papers, and leathers. In addition, they are harmless to humans they cannot penetrate human skins. Moreover, because their frequencies are higher than those of millimeter waves, higher resolution and more detailed information is expected than the millimeter wave-based technologies In this study, we describe the trends and prospectives of terahertz technology as security checking technology that can be directly applied to a human body.

A Study on Influence of Information Security Stress and Behavioral Intention for Characteristic factors of Information Security Policy Perceived by Employee (통제수용자에 의해 인지된 정보보안정책 특성요인이 보안스트레스와 보안준수의도에 미치는 영향에 대한 연구)

  • Im, Kwang-su;Kwon, Hun Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.243-253
    • /
    • 2016
  • Company strengthen various information security policy and activity in order to protect important information assets that the company has been dealing with and prevents information security accidents such as personal information spill. However, some study said these policy and activity increase employee's information security stress and still information security accidents by employees have happened so far. Therefore, this study will review preceding theories and studies used in many various fields including Information Security areas needed to explain human's behavioral intention and determinants and summarize characteristic factors that have influence on control of human's behavioral intention in the results of the above theories and studies. Secondly, this study will implement exploratory analysis on characteristic factors perceived by employees that has been stemmed from various company's information security policy and activity in order to increase employee/'s information security compliance intention under the its surrounding security circumstance. Thirdly, this study will fulfil multiple-regression analysis in order to identify cause-effect relationship between employee's perceived information security stress and employee's perceived characteristic factor. Finally, this study will explain casual relationship with same analysis methods between information security stress and information security compliance intention based on results of the survey conducted on the financial firm's employees with same analysis methods.

Analysis of the Security and Technical Problem of National Education Information System (교육행정정보시스템의 보안 및 기술적 문제 분석)

  • Lee, Dae Sik;Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.9-18
    • /
    • 2004
  • This paper is to analyze security and technical problem of NEIS and suggest an improving methods about the effective system. Therefore questionnaire was performed in the five items with security as well as technical problem of NEIS to primary and secondary school teachers. The result of questionnaire analysis on each item is that they think of NEIS as the essential system for the age of information, despite problems such as the invasion of human right and security as well as reveal of personal data.

  • PDF

Structural Dashboard Design for Monitoring Job Performance of Internet Web Security Diagnosis Team: An Empirical Study of an IT Security Service Provider

  • Lee, Jung-Gyu;Jeong, Seung-Ryul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.113-121
    • /
    • 2017
  • Company A's core competency is IT internet security services. The Web diagnosis team analyzes the vulnerability of customer's internet web servers and provides remedy reports. Traditionally, Company A management has utilized a simple table format report for resource planning. But these reports do not notify the timing of human resource commitment. So, upper management asked its team leader to organize a task team and design a visual dashboard for decision making with the help of outside professional. The Task team selected the web security diagnosis practice process as a pilot and designed a dashboard for performance evaluation. A structural design process was implemented during the heuristic working process. Some KPI (key performance indicators) for checking the productivity of internet web security vulnerability reporting are recommended with the calculation logics. This paper will contribute for security service management to plan and address KPI design policy, target process selection, and KPI calculation logics with actual sample data.

ICT Adoption and Cyber Security of Korean SMEs (중소기업의 ICT 도입과 사이버 안전에 관한 연구)

  • Jung, Jeyong
    • Journal of the Korea Safety Management & Science
    • /
    • v.23 no.2
    • /
    • pp.53-63
    • /
    • 2021
  • Small and medium-sized enterprises(SMEs) continue to adopt ICT to gain an edge in organizational innovation and competition. This has a management advantage, but it also brings vulnerabilities as to cyber security. Therefore, the purpose of this study is to conduct an exploratory study on the cyber security situation of SMEs. A survey was conducted on Korean SMEs to determine how well they are connected to ICT and how much they are exposed to cyber security threats. The results suggest two things. First, Korean SMEs are well connected to ICT, but there is a gap between the actual adoption and human recognition of its importance. Second, security threats and breaches affect the majority of SMEs, but several problems including costs have not been properly evaluated. The results of this study are expected to help improve the cyber security management system of Korean SMEs.

Combining Encryption and Preservation in Information Security to Secure Sending a Message

  • Nooh, Sameer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.285-291
    • /
    • 2022
  • With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.

Influence of Strategic Human Resource Management of on Organizational Culture and Organizational Citizenship Behavior of Private Facility Security Guards (시설경비조직의 전략적 인적자원관리가 조직문화 및 조직시민행동에 미치는 영향)

  • Kang, Min-Wan;Kim, Hyo-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.389-403
    • /
    • 2011
  • The objective of this study is to find out how strategic human resource management(SHRM) of a facility security firm affects its organizational culture and behaviors of its members. This study was executed in June 2010 with facility security officers(FSO) in four private security firms by using a judgment sampling technique. A total of 343 FSOs were used in final analysis. Coefficient of reliability(Cronbach's coefficient alpha) of the survey was 0.691. The conclusion was as follows: First, SHRM of facility security firms exert its influence on organizational culture. That is, promotion of education/training, compensation, making avid followers, and career development may facilitate settlement of hierarchical, development-oriented, agreement -based and rationality-oriented culture. Second, SHRM of security firms would affect organizational citizenship behaviors(OCB), i.e., the promotion of education/training, compensation, making avid followers, and career development would tend to enhance consideration for others and altruistic, participatory, conscientious and gentlemanly behaviors. On the other hand, if proper compensation is not made, above-mentioned behaviors would decrease. Third, organizational culture of security firms tends to affect OCB. That is, when hierarchical, development-oriented, agreement-based and rationality-oriented culture is settled, consideration for others, altruistic, participatory, conscientious and gentlemanly behaviors tends to be enhanced.