• Title/Summary/Keyword: IS Threat

Search Result 2,310, Processing Time 0.027 seconds

The Necessity of A Cognitive-scientific Analysis on A Security threat Act - The Foundation for A Establishment of The Scientific Preventive Social-security Countermeasure - (경호위해행위에 대한 인지과학적 분석의 필요성 고찰 - 과학적 예방적 사회안전 대책 수립을 위한 기초 -)

  • Kim, Doo-Hyun;Son, Ji-Young
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.33-51
    • /
    • 2008
  • According to dictionary, the meaning of protection is "guard and protect" that means protecting the Protectee's safety in case of sudden attack or various accident and Security means all protecting activity including Protectee and place where he is in or will be as comprehensively meaning of safe. As you see in the definition, Protection and security is the act to protect or will to protect from a security-threat act. A security-threat act can be discussed in the range of the concept of a criminal act in Criminal Law. A security-threat act is based on criminal act in Criminal Law, we are going to review such a security-threat act in a point of view in a sphere of learning in today's remarkable a brain-neuro science and cognitive science based on cognitive psychology, and to use an analysis on such a security-threat act to make a foundation for a establishment of the scientific preventive social security countermeasure. To do so, First of all we are going to review a security-threat act based on criminal act in Criminal Law in a point of protection police logic view. Next, we are going to introduce how cognitive science understand about act of man before we analyse a threat act as one of an act of man in cognitive science point of view. Finally, we are going to discuss the need of cognitive scientific analyse in order to establish the Scientific Preventive Social-security Countermeasure at the same time we are going to analyse a threat act in a cognitive scientific view.

  • PDF

Type of Subjective Perception on the Fear Message - Q-methodological analysis on the latest Report of Korean Peninsula Situation - (위협적 메시지에 대한 주관적 인식 유형 - 최근 한반도 정세 관련 보도의 Q방법론적 분석 -)

  • Lee, Soonmo
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.2
    • /
    • pp.223-236
    • /
    • 2013
  • Related to the situation on the Korean Peninsula, by North Korea's threat of war the tension escalates and serious crisis continues. The purpose of this study is to evaluate the subjective perception which the residents of South Korea feel about North Korea's threat of war through a Q methodological analysis framework. In the result of the study, for the North Korea's threat of war the South Korean's recognition type is analyzed into four type such as 'non-reactive', 'fearreactive', 'psychological anxiety' and 'cynical ignorance type'. First, the No. 1 type 'non-reactive' does not empathize with North Korea's threat of war itself, and second type 'fear-reactive' have uneasy feeling like that 'What would happen as things go' and feel a sense of crisis about the North Korea's threat of war. The third type 'psychological anxiety' is type which feels that due to North Korea's threat of war inter-Korean relations is in the crisis. Finally the fourth type 'cynical ignorance' think that North Korea's threat of war is bluffing and also North Korea is like a shepherd boy. The reason to apply Q-methodology in this study is to make it possible to a more in-depth approach to subjective perception and threat of psychological meaning for the threatening message of study participants.

Response and Threat of Home Network System in Ubiquitous Environment (유비쿼터스 환경에서의 홈네트워크 시스템 침해 위협 및 대응 방안)

  • Oh, Dae-Gyun;Jeong, Jin-Young
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.27-32
    • /
    • 2005
  • Recently The social interest regarding is coming to be high about Home Network accordong to intelligence anger of diffusions and the family home appliance machineries and tools of the superhigh speed Internet In the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases in the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases Beacaues of Home network is starting point to go ubiquitous computing enviorment, The Increase of Cyber attack through Internet will raise its head with the obstacle to disrupt the activation of the groove network. So there is a possibility of saying that the counter-measure preparation is urgent, In the various environment like this, It means the threat which present time than is complicated will exist. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment.

  • PDF

Doing More by Seeing Less: Gritty Applicants are Less Sensitive to Facial Threat Cues

  • Shin, Ji-eun;Lee, Hyeonju
    • Science of Emotion and Sensibility
    • /
    • v.25 no.1
    • /
    • pp.21-28
    • /
    • 2022
  • People differ greatly in their capacity to persist in the face of challenges. Despite significant research, relatively little is known about cognitive factors that might be involved in perseverance. Building upon human threat-management mechanism, we predicted that perseverant people would be characterized by reduced sensitivity (i.e., longer detection latency) to threat cues. Our data from 5,898 job applicants showed that highly perseverant individuals required more time to correctly identify anger in faces, regardless of stimulus type (dynamic or static computer-morphed faces). Such individual differences were not observed in response to other facial expressions (happiness, sadness), and the effect was independent of gender, dispositional anxiety, or conscientiousness. Discussions were centered on the potential role of threat sensitivity in effortful pursuit of goals.

A Study on the Analysis of Internal and External Factors of Software Threat Elements (소프트웨어 위협 요소의 내부적·외부적 요인 분석에 관한 연구)

  • Lee Eun Ser
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.6
    • /
    • pp.278-283
    • /
    • 2024
  • When implementing software, there can be side effects that pose a threat to human life. Therefore, it is necessary to measure the impact of software on safety and create alternatives to mitigate and prevent threats. To conduct a software safety assessment to measure the impact of threat factors, the following components are necessary. This paper aims to classify the threat factors of software into internal and external factors and quantitatively demonstrate the impact of these threat factors.

A Study on Airport Security Performance Improvement based on Risk Management Concept (위험관리 개념에 근거한 항공보안업무 합리화 방안 연구)

  • Hwang, Kyung-Chul;Yoo, Kwang-Eui
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.20 no.2
    • /
    • pp.47-57
    • /
    • 2012
  • The strengthened aviation security measurements caused by increased terror threat all around the world have air passengers annoyed by uneasy treatment and some delayed process. The service level of air travel and competitiveness of airlines industry has been weakened also. The aviation security process is mainly conducted at an airport. The threat level of airport is not usually same airport to airport, and the quality of aviation security activity is neither same. However, ICAO requires every international airport to conduct similar process to ensure aviation security without considering situational difference of each airport. The paper has objectives to develop reasonable security measurements based on risk management concept. It studied the ways of achieving target level of security of an airport, considering the threat situation of the airport and its ability to conduct security procedures.

Relationship between Cognitive Appraisal and Cardiac Risk Reduction Behavior Following Coronary Angioplasty (PTCA 시술 환자의 인지적 평가와 위험요인수정행위)

  • Hahn, Sook-Won;Lee, Myung-Sun
    • Korean Journal of Adult Nursing
    • /
    • v.16 no.4
    • /
    • pp.556-565
    • /
    • 2004
  • Purpose: According to Lazarus & Folkman (1984), appraising a stressor as a threat is associated with negative psychological and physical adjustment, whereas appraising a stressor as a challenge is positive psychological and physical adjustment. This study examined how cognitive appraisal of PTCA(heart disease threat and treatment appraisal) related to the cardiac risk reduction behaviors(smoking cessation, low salt and low cholesterol diet, regular exercise and stress management) 6 weeks following discharge. Method: Data were collected from 50 subjects with successful primary PTCA. Result: Heart disease threat was negative related to treatment appraisal (r=-0.240, p=0.046). Psychological well-being was negative related to heart disease threat (r=-0.317, p=0.012) and positive related to treatment appraisal(r=0.402, p=0.002). The cardiac risk reduction behaviors score was negative related to heart disease threat(r= -0.296, p=0.018) and positive related to treatment appraisal(r=-0.291, p=0.020). Conclusion: More negative appraisal was related to lower the cardiac risk reduction behaviors score. But more positive appraisal was related to higher the cardiac risk reduction behaviors score. So, there is a need to develop the cognitive-behavioral intevention that increase the coping strategy to replace with positive appraisal.

  • PDF

Cyber Terror Threat Elimination Method Study for Safe Smart World (안전한 스마트월드를 위한 사이버 테러위협 제거 방안 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.107-113
    • /
    • 2021
  • Recently, large-scale research and efforts aimed at the smart world such as smart city, smart home, smart transportation, and smart care are continuing. As these smart worlds become more common, the expansion of connectivity with the Internet and the threat of cyber terrorism will be inevitable. Increasing the threat of cyber terrorism is increasing the likelihood of a massive disaster and safety accident. Therefore, in this paper, we examine smart worlds that are expanded in various forms and derive the security threat factors that smart worlds have. In addition, it is proposed to block the threat of terrorism from abroad if access from abroad is not required when constructing a smart world. Through this, we intend to present a method to eliminate cyber terror threats for the establishment and operation of a safe smart world.

Web Attack Classification via WAF Log Analysis: AutoML, CNN, RNN, ALBERT (웹 방화벽 로그 분석을 통한 공격 분류: AutoML, CNN, RNN, ALBERT)

  • Youngbok Jo;Jaewoo Park;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.587-596
    • /
    • 2024
  • Cyber Attack and Cyber Threat are getting confused and evolved. Therefore, using AI(Artificial Intelligence), which is the most important technology in Fourth Industry Revolution, to build a Cyber Threat Detection System is getting important. Especially, Government's SOC(Security Operation Center) is highly interested in using AI to build SOAR(Security Orchestration, Automation and Response) Solution to predict and build CTI(Cyber Threat Intelligence). In this thesis, We introduce the Cyber Threat Detection System by analyzing Network Traffic and Web Application Firewall(WAF) Log data. Additionally, we apply the well-known TF-IDF(Term Frequency-Inverse Document Frequency) method and AutoML technology to classify Web traffic attack type.

Automatic Classification of Radar Signals Using CNN (CNN을 이용한 레이다 신호 자동 분류)

  • Hong, Seok-Jun;Yi, Yearn-Gui;Jo, Jeil;Lee, Sang-Gil;Seo, Bo-Seok
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.2
    • /
    • pp.132-140
    • /
    • 2019
  • In this paper, we propose a classification method for radar signals depending on the type of threat by applying machine learning to parameter data of radar signals. Currently, the army uses a library of mapping relations between the parameters and the types of threat to recognize threat signals. This approach has certain limitations when classifying signals and recognizing new types of threat or types of threat that do not exist in the current libraries. In this paper, we propose an automatic radar signal classification method depending on the type of threat that uses only parameter data without a library. A convolutional neural network is used as the classifier and machine learning is applied to train the classifier. The proposed method does not use a library, and hence, can classify threat signals that are new or do not exist in the current library.