• 제목/요약/키워드: Information security behavior

검색결과 540건 처리시간 0.027초

A Study on Insider Behavior Scoring System to Prevent Data Leaks

  • Lim, Young-Hwan;Hong, Jun-Suk;Kook, Kwang Ho;Park, Won-Hyung
    • 융합보안논문지
    • /
    • 제15권5호
    • /
    • pp.77-86
    • /
    • 2015
  • 조직은 고객 정보 유출과 관련된 비즈니스 위험을 최소화하고, 자발적인 사전 검사를 통해 정보 보안 활동을 강화하고 부주의 방치 사고에 의한 개인 정보의 누출을 검출하는 방법을 발견해야 한다. 최근 많은 기업들이 정보유출방지솔루션을 도입하였으나, 업무산 필요에 의한 허용된 권한을 가진 내부 사용자에 의한 유출가능성이 존재한다. 이에 정보취급행위 및 활동에 대한 정보를 수집하여 분석할 수 있는 환경이 필요하다. 본 연구에서는 내부자의 활동 수준을 평가하기 위해서 RFM 모델을 응용한 SFI 분석기법을 활용, 실제 기업에 적용하여 사례 연구를 수행하였다.

Formation of Resilience in the Context of Volunteer Activities Using Information and Communications Technology

  • Lazarenko, NataLiia;Sabat, Nataliia;Sabat, Nadiia;Sylenko, Nadiia;Rundong, Wang;Duchenko, Anna;Shuppe, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.374-381
    • /
    • 2022
  • The article identifies and theoretically substantiates the trends of national resilience in the context of establishing the security of the country and its civilizational subjectivity. The strategy of development of the pedagogical university in the conditions of European integration into the European educational and scientific space based on certain characterological features of the personality of the volunteer in the context of allocation of personal resilience is developed. The analysis of both external and internal challenges and threats to the civilization of the country needs to be understood in the context of economic, socio-political, legal, military-political, spiritual-cultural, educational-scientific and network-information resilience. The concepts of "national resilience" and "national security" are quite close - at first glance, even identical. However, a deeper understanding clarifies the differences: national security is a state of protection of the country identity and its very existence, the realization of its national interests. In turn, resilience is a fairly effective strategy and a fundamental guarantee of national security. At the same time, it is extremely important to understand that both national security as a state and national resilience as a strategy are only means of achieving and developing a strong and humanistic civilizational subjectivity of the country. After all, such subjectivity opens for citizens the opportunity for development, dignified self-realization and a proper life. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The use of information and communication technologies in volunteering will contribute to the formation of resilience traits in the structure of personality formation. Directly to the personal traits of resilience should be included methodological competencies, which include methodological knowledge, skills and abilities (ability to define ultimate and intermediate goals, plan, conduct and analyze knowledge, establish and implement interdisciplinary links with disciplines of medical-psychological-pedagogical cycles, etc.). All these competencies form the professional resilience of the volunteer.

저조도 환경 감시 영상에서 시공간 패치 프레임을 이용한 이상행동 분류 (Spatiotemporal Patched Frames for Human Abnormal Behavior Classification in Low-Light Environment)

  • ;공성곤
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 추계학술발표대회
    • /
    • pp.634-636
    • /
    • 2023
  • Surveillance systems play a pivotal role in ensuring the safety and security of various environments, including public spaces, critical infrastructure, and private properties. However, detecting abnormal human behavior in lowlight conditions is a critical yet challenging task due to the inherent limitations of visual data acquisition in such scenarios. This paper introduces a spatiotemporal framework designed to address the unique challenges posed by low-light environments, enhancing the accuracy and efficiency of human abnormality detection in surveillance camera systems. We proposed the pre-processing using lightweight exposure correction, patched frames pose estimation, and optical flow to extract the human behavior flow through t-seconds of frames. After that, we train the estimated-action-flow into autoencoder for abnormal behavior classification to get normal loss as metrics decision for normal/abnormal behavior.

모바일 기기 사용자는 왜 정보보호에 위험한 행동을 하는가? : 위험행동 결정요인 모델을 중심으로 (Why Do Mobile Device Users Take a Risky Behavior?: Focusing on Model of the Determinants of Risk Behavior)

  • 김종기;김지윤
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제28권2호
    • /
    • pp.129-152
    • /
    • 2019
  • Purpose The purpose of this study is to empirically identify the risky behavior of mobile device users using the Internet of Things on a situational perspective. Design/methodology/approach This study made a design of the research model based on model of the determinants of risk behavior. Data were collected through a survey including hypothetical scenario. SmartPLS 2.0 was used for the structural model analysis and t-test was conducted to compare the between normal and situational behavior. Findings The results were as follows. First, the central roles of risk propriety and risk perception were verified empirically. Second, we identified the role of locus of control as a new factor of impact on risky behavior. Third, mobile risk propensity has been shown to increase risk perception. Fouth, it has been shown that risk perception does not directly affect risky behavior and reduce the relationship between mobile risk propensity and risk behavior. According to the empirical analysis result, Determinants of risk behavior for mobile users were identified based on a theoretical framework. And it raised the need to pay attention to the impact of locus of control on risk behavior in the IS security field. It provided direction to the approach to risky behavior of mobile device users. In addition, this study confirmed that there was a possibility of taking risky behavior in the actual decision-making.

안드로이드에서 앱 사용과 터치 정보를 이용한 행위 기반 사용자 인증 기술 연구 (A Study of Behavior Based Authentication Using Touch Dynamics and Application Usage on Android)

  • 김민우;김승연;권태경
    • 정보보호학회논문지
    • /
    • 제27권2호
    • /
    • pp.361-371
    • /
    • 2017
  • 스마트폰 기기 내에 저장되는 사용자 정보가 다양화되어 개인정보에 대한 위협도 함께 증가하고 있다. 패턴 잠금, 지문 인식 등 다양한 사용자 인증 기술이 스마트폰에 적용되어 있으나 사용자 의존적, 거부감 유발 등의 한계점을 보이고 있다. 최근 주목받고 있는 행위 기반 인증은 기기 사용과 동시에 인증이 가능하여 사용자에게 높은 편의성을 제공하나 타 인증 기술에 비해 정확도가 낮아 이를 개선하기 위한 연구가 꾸준히 수행되고 있다. 본 연구에서는 이전 연구에서 고려되지 않았던 앱 사용 정보를 새로운 인증 요소로 활용하는 방법을 제안한다. 또한 실제 앱 사용 상황을 고려한 데이터 수집 및 분석을 통해 제안 기술의 성능을 상세하게 분석한다.

A System for Improving Data Leakage Detection based on Association Relationship between Data Leakage Patterns

  • Seo, Min-Ji;Kim, Myung-Ho
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.520-537
    • /
    • 2019
  • This paper proposes a system that can detect the data leakage pattern using a convolutional neural network based on defining the behaviors of leaking data. In this case, the leakage detection scenario of data leakage is composed of the patterns of occurrence of security logs by administration and related patterns between the security logs that are analyzed by association relationship analysis. This proposed system then detects whether the data is leaked through the convolutional neural network using an insider malicious behavior graph. Since each graph is drawn according to the leakage detection scenario of a data leakage, the system can identify the criminal insider along with the source of malicious behavior according to the results of the convolutional neural network. The results of the performance experiment using a virtual scenario show that even if a new malicious pattern that has not been previously defined is inputted into the data leakage detection system, it is possible to determine whether the data has been leaked. In addition, as compared with other data leakage detection systems, it can be seen that the proposed system is able to detect data leakage more flexibly.

인터넷에서 건강정보 이용의도에 대한 실증 연구: 성별에 따른 비교 (An Empirical Study of Intention of Usage of Health Information on the Internet: Comparison by Gender)

  • 임세헌;이성호;김대길
    • 한국IT서비스학회지
    • /
    • 제10권3호
    • /
    • pp.77-94
    • /
    • 2011
  • Since the general quality of life has been improving, people have become interested in "well-being." The widespread acceptance of the importance of "well-being" to quality of life has encouraged people to take more interest in getting health information online when they need it. Expansive use of online health information suggests that individual characteristics (i.e., gender and other traits), Website features, and perceived trust are related to the primary concern for many online health information consumers. This study examines whether familiarity, perceived security, and reputation of health information on various Websites influence the relationship of trust and intention to use by gender. These research results will contribute to the adoption of online health information by gender and, moreover, will provide companies with an understanding of key characteristics of consumers who use emoticons and provide useful implications for marketing strategies to current and future consumers.

캐릭터 성장 유형 분류를 통한 온라인 게임 하드코어 유저와 게임 봇 탐지 연구 (A study on hard-core users and bots detection using classification of game character's growth type in online games)

  • 이진;강성욱;김휘강
    • 정보보호학회논문지
    • /
    • 제25권5호
    • /
    • pp.1077-1084
    • /
    • 2015
  • 온라인 게임에서 게임 봇의 사용은 개인정보 탈취, 계정도용의 보안 문제를 발생시킨다. 또한, 게임 봇은 게임 내재화를 불공정하게 수집하여 게임 콘텐츠의 빠른 소비와 정당한 게임 사용자에게 상대적 박탈감을 주어 게임시장 침체를 일으킨다. 본 연구에서는 실제 온라인 게임 내 캐릭터의 성장 과정 분석을 통해 성장 유형을 정의하고, 성장 유형에서 게임봇을 탐지 및 하드코어 유저와 봇을 분류하는 프레임워크를 제안한다. 실제 게임 데이터에 제안한 프레임워크를 적용하여 5가지로 성장 유형을 분류하였고, 93%의 정확도로 봇 탐지 및 하드코어 유저와 봇을 구분하였다. 또한 기존 연구에서 봇으로 탐지되었던 하드코어 유저를 구분해내고, 게임 봇을 성장 전에 사전 탐지함으로써 향상된 성능을 보였다.

LSTM Android Malicious Behavior Analysis Based on Feature Weighting

  • Yang, Qing;Wang, Xiaoliang;Zheng, Jing;Ge, Wenqi;Bai, Ming;Jiang, Frank
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권6호
    • /
    • pp.2188-2203
    • /
    • 2021
  • With the rapid development of mobile Internet, smart phones have been widely popularized, among which Android platform dominates. Due to it is open source, malware on the Android platform is rampant. In order to improve the efficiency of malware detection, this paper proposes deep learning Android malicious detection system based on behavior features. First of all, the detection system adopts the static analysis method to extract different types of behavior features from Android applications, and extract sensitive behavior features through Term frequency-inverse Document Frequency algorithm for each extracted behavior feature to construct detection features through unified abstract expression. Secondly, Long Short-Term Memory neural network model is established to select and learn from the extracted attributes and the learned attributes are used to detect Android malicious applications, Analysis and further optimization of the application behavior parameters, so as to build a deep learning Android malicious detection method based on feature analysis. We use different types of features to evaluate our method and compare it with various machine learning-based methods. Study shows that it outperforms most existing machine learning based approaches and detects 95.31% of the malware.

클라우드 네이티브 환경을 위한 오픈소스 기반 모니터링 서비스 간편 배포 및 이미지 서명 검사기 구현 (Implementation of Opensource-Based Automatic Monitoring Service Deployment and Image Integrity Checkers for Cloud-Native Environment)

  • 곽송이;응 웬 부 렁;정수환
    • 정보보호학회논문지
    • /
    • 제32권4호
    • /
    • pp.637-645
    • /
    • 2022
  • 클라우드 컴퓨팅은 수십 년을 걸쳐 인기를 얻고 있으며, 그에 따라 클라우드 네이티브 애플리케이션에 주요하게 사용되는 기술인 컨테이너 또한 주목을 받고 있다. 이러한 컨테이너 기술은 기존 VM보다 가볍고 성능이 뛰어나지만, 호스트 시스템과 커널을 공유하거나 이미지 레지스트리에서 이미지를 업/다운로드 하는 등의 문제로 여러 가지 보안상의 위협이 존재한다. 컨테이너의 보안 위협 중 하나로 컨테이너 생성의 소스가 되는 컨테이너 이미지의 무결성을 언급할 수 있다. 또한, 컨테이너 애플리케이션이 동작하는 동안의 런타임 보안이 매우 중요하며, 런타임에서 컨테이너 애플리케이션의 동작을 모니터링함으로써 컨테이너에서 발생하는 이상 행위를 탐지하는 데에 도움을 줄 수 있다. 따라서 본 논문에서는 첫째로, 컨테이너 이미지의 무결성을 보장하기 위해 기존의 Docker Content Trust(DCT) 기술을 기반으로 자동으로 이미지의 서명을 검사하는 서명 검사기를 구현한다. 다음으로 Cloud Native Computing Foundation (CNCF)의 오픈소스 프로젝트인 falco를 기반으로 falco 이미지의 배포 간편성을 위해 새로 생성한 이미지를 소개하고, 간편하게 모니터링 시스템을 구축할 수 있도록 돕는 docker-compose를 구현 및 패키지 구성을 제안한다.