• 제목/요약/키워드: Information security education

검색결과 906건 처리시간 0.032초

Community Empowerment Models of Tourism Village Based on Superior Commodities: Realizing Economic Resilience

  • Cahyono, Arie Eko;Kurniawan, Moh. Usman;Sukidin, Sukidin;Kantun, Sri
    • 유통과학연구
    • /
    • 제16권11호
    • /
    • pp.29-36
    • /
    • 2018
  • Purpose - Research on community empowerment based on superior commodities to improve the economic resilience of the tourist village of Lumajang Regency is an investigative descriptive study to obtain an overview of the problems of community economic development, especially regarding economic resilience. The output of this research activity is the formation of integrated and comprehensive strategic programs and activities in order to improve economic empowerment and food security of the community around the tourist village. Research design, data, and methodology - This research method applies several methods of analysis such as the Loqation Quotion (LQ) method, SWOT analysis, Trend analysis, and analysis of Community Economic Empowerment in the agricultural sub-sector. Results - This research has strategic values and objectives in addition to providing important information to improve food security of tourism villages in Lumajang district in particular and disadvantaged communities in Indonesia in general. Through this supportive community economic empowerment programs, Lumajang District has an agricultural area and at the same time as a nature-based tourism area that supports it. Conclusion - Village tourism community empowerment activities are taken based on existing superior commodities. The existing tourism village program in Lumajang district can be used as one of the references for the upcoming tourism village program.

Learning a Foreign Language Using Information Technologies for Comfortable Implementation of the Professional Position of a Future Specialist in a Foreign Language Environment

  • Postolenko, Iryna;Biletska, Iryna;Kmit', Olena;Paltseva, Valentyna;Mykhailenko, Olena;Yatsyna, Svitlana;Kuchai, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.63-70
    • /
    • 2022
  • At the present stage, the main directions of the professional position of a specialist in the implementation of English-language Education are to improve and spread the practice of learning languages throughout a person's life by involving information, communication and digital technologies in the educational process. Computerization of the educational process in Higher Education Institutions is considered as one of the first and most promising areas for improving the quality of education in Higher Education Institutions. The necessity of ensuring timely training and retraining of specialists of various profiles (in particular teachers) on the effective use of domestic and foreign electronic resources with the help of modern information technologies for the implementation of the professional position of a future specialist in a foreign-language environment is noted. The main goal of teaching a foreign language (the formation of students' communicative competence, which means mastering the language as a means of intercultural communication) is defined. The types of speech activity that cover the content of teaching a foreign language are highlighted. The main types of assessment in a foreign language are shown - current (non-classroom), thematic, semester, annual assessment and final state certification. The task of the teacher is drawn, which is to create conditions for practical language acquisition for each student, to choose such teaching methods by means of information technologies that would allow each student to show their activity, their creativity; to activate the cognitive activity of the student in the process of learning a foreign language.

New Approaches to Quality Monitoring of Higher Education in the Process of Distance Learning

  • Oseredchuk, Olga;Drachuk, Ihor;Teslenko, Valentyn;Ushnevych, Solomiia;Dushechkina, Nataliia;Kubitskyi, Serhii;Сhychuk, Antonina
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.35-42
    • /
    • 2022
  • The article identifies the problem of monitoring the quality of higher education in three main areas, which are comparative pedagogical systems of education. The first direction is determined by dissertation works, the second - monographs and textbooks, and the third reveals scientific periodicals. According to its internal structure, monitoring the quality of education combines important management components identified in the article (analysis, evaluation and forecasting of processes in education; a set of methods for tracking processes in education; collecting and processing information to prepare recommendations for research processes and make necessary adjustments). Depending on the objectives, three areas of monitoring are identified: informational (involves the accumulation, structuring and dissemination of information), basic (aimed at identifying new problems and threats before they are realized at the management level), problematic (clarification of patterns, processes, hazards, those problems that are known and significant from the point of view of management). According to its internal structure, monitoring the quality of education combines the following important management components: analysis, evaluation and forecasting of processes in education; a set of techniques for tracking processes in education; collection and processing of information in order to prepare recommendations for the development of the studied processes and make the necessary adjustments. One of the priorities of the higher education modernization program during the COVID-19 pandemic is distance learning, which is possible due to the existence of information and educational technologies and communication systems, especially for effective education and its monitoring in higher education. The conditions under which the effectiveness of pedagogical support of monitoring activities in the process of distance learning is achieved are highlighted. According to the results of the survey, the problems faced by higher education seekers are revealed. A survey of students was conducted, which had a certain level of subjectivity in personal assessments, but the sample was quite representative.

SW 형태의 보안카드와 PGP 기반 안전한 E-mail 송신자 인증 기법 (Sender Authentication Mechanism based on SW Security Card with PGP for Secure E-mail)

  • 이형우
    • 컴퓨터교육학회논문지
    • /
    • 제10권3호
    • /
    • pp.57-66
    • /
    • 2007
  • 전자메일(e-mail)시스템은 인터넷을 통해 개인의 정보를 전달하는 매체로 가장 많이 사용된다. 그러나 송신자의 위변조 및 다수 사용자에게 메일을 전송하는 기법 등을 이용한 전자메일의 역기능 또한 늘어나고 있는 추세이다. 본 논문에서는 송신자의 위변조를 막기 위해 보안카드를 이용한 송신자 인증 기법을 제안 한다. 송신자는 메일 전송시 보안카드의 특정 코드번호를 송신자의 메일 서버로부터 요청 받는다. 송신자는 메일 서버로부터 요청 받은 코드 번호를 입력해 송신자 인증 절차를 거친 후 세션키를 생성한다. 생성된 세션키는 송신자의 서명 및 메시지를 안전하게 전송할 수 있는 암호화 키로 사용된다. 제안한 기법은 송신자 인증과 송신자 서명 및 메시지 암호화를 통해 기존의 스팸 방지 기법 보다 더욱 안전한 인증 구조를 제공한다.

  • PDF

A Novel Node Management in Hadoop Cluster by using DNA

  • Balaraju. J;PVRD. Prasada Rao
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.134-140
    • /
    • 2023
  • The distributed system is playing a vital role in storing and processing big data and data generation is speedily increasing from various sources every second. Hadoop has a scalable, and efficient distributed system supporting commodity hardware by combining different networks in the topographical locality. Node support in the Hadoop cluster is rapidly increasing in different versions which are facing difficulty to manage clusters. Hadoop does not provide Node management, adding and deletion node futures. Node identification in a cluster completely depends on DHCP servers which managing IP addresses, hostname based on the physical address (MAC) address of each Node. There is a scope to the hacker to theft the data using IP or Hostname and creating a disturbance in a distributed system by adding a malicious node, assigning duplicate IP. This paper proposing novel node management for the distributed system using DNA hiding and generating a unique key using a unique physical address (MAC) of each node and hostname. The proposed mechanism is providing better node management for the Hadoop cluster providing adding and deletion node mechanism by using limited computations and providing better node security from hackers. The main target of this paper is to propose an algorithm to implement Node information hiding in DNA sequences to increase and provide security to the node from hackers.

Conceptual Approaches to Training Specialists Using Multimedia Technologies

  • Shchyrbul, Oleksandr;Babalich, Viktoriya;Mishyn, Sergii;Novikova, Viktoriia;Zinchenko, Lina;Haidamashko, Iryna;Kuchai, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.123-130
    • /
    • 2022
  • Modernization of the educational sector requires globalization, democratization, and the transition to an information technology society. The main goal of education at the present stage is to solve the problem of ensuring the priority of the development of education and science. In modern conditions, the quality of training of qualified specialists is becoming particularly relevant. The great role of teacher education is emphasized by its main goal, which is to train specialists who can ensure the versatile and innovative development of a person as a person and the highest value of society, its mental, physical and aesthetic abilities, high moral qualities, and, consequently, the enrichment on this basis of the intellectual, creative and cultural potential of the people. Among the strategic tasks of modernizing higher education is to ensure informatization of the educational process and access to International Information Systems. The essence of the concept of multimedia is clarified. In the context of media education, multimedia lists a number of functions: informational, interpretive, cultural, entertainment, and educational. The need to meet the needs outlined in the article in the conditions of informatization of the educational process requires the teacher to have knowledge and skills in the field of multimedia pedagogical technologies, knowledge of advanced methods and means of modern science. It is considered what relevant concepts of media education have been developed and are being developed in Ukraine and form an important basis for the modernization of education, which will contribute to the construction of an information society in the country and the formation of civil society. Distance learning is considered - the most democratic form of education that allows broad segments of society to get an education. Distance learning methods are used in higher education institutions, in school education, in the system of advanced training of teachers, in the system of training managerial personnel.

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권12호
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

테러방지를 위한 민간경비의 역할과 과제 (Role and Subject of Private Security to Counter-Terrorism)

  • 권정훈
    • 한국재난정보학회 논문집
    • /
    • 제7권2호
    • /
    • pp.130-139
    • /
    • 2011
  • 이 논문에서는 인간정보 역할의 중요성이 제기되고 있는 상황에서 테러방지를 위한 보완책으로 민간경비와의 적용성을 검토하였다. 국가중요시설과 교통수단 그리고 다중이용시설에서 민간경비의 적용성을 검토한 결과, 민 관간의 협력체결을 통한 지속적인 위탁교육실시와 민간 무장경비요원의 선박탑승을 위한 법제정 마련, 민간경비원의 탐지견 활용과 지하철 역사의 민간경비요원 대체 방안, 관계기관의 시설주에 대한 지도 감독체계와 시설주의 테러대응 방안의 인식 전환을 위한 산 관의 적극적인 홍보가 필요하다.

XML 전자서명을 이용한 다중인증 멀티 에이전트시스템 (Multi-Certification of Agent System Using XML)

  • 김귀남
    • 융합보안논문지
    • /
    • 제5권1호
    • /
    • pp.29-34
    • /
    • 2005
  • 정보화 시대의 요구에 대한 교육적 대응은 학습자중심의 교육이며, 정보통신 기술을 기반으로 한 원격 교육이다. WBI(Web Based Instruction)는 웹을 매체로 활용하여 원거리에 있는 학습자를 교육시키는 형태로서 교수자와 학습자간 상호작용을 가능하게 하고, 다양한 형태의 학습 자료를 제공하며, 공간적 제약을 극복할 수 있다는 장점이 있다. 차세대 웹 표준문서 포맷으로 부상되고 있는 XML(eXtensible Markup Language)을 사용한 규격에 대한 국내외적인 표준화 작업이 가속화되고 있으며, 최근 XML 보안에 대한 연구가 활성화 되고 있다. XML 보안은 XML 엘리먼트 암호화, XML 전자서명, XML 접근제어 등으로 분류되는데 특히 XML 전자서명은 XML문서를 이용하는 여러 분야에 사용되어 전자서명 시스템간의 상호 연동성을 높일 수 있다. 본 논문에서는 웹상에서 사용되어지는 공인인증서에 대한 사용자의 ID, PW로 인한 보안적 측면을 고려한 방법으로 XML 전자서명 기법을 이용한 다중인식 원격교육 에이전트 시스템을 제안 하였다.

  • PDF