• Title/Summary/Keyword: Intensive security control

Search Result 16, Processing Time 0.036 seconds

A Study on Effective Security Control Model Based on Characteristic of Web Service (웹 서비스 특성 기반 효율적인 보안관제 모델 연구)

  • Lee, Jae-heon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.175-185
    • /
    • 2019
  • The security control is to protect IT system from cyber infringement by deriving valid result values in the process of gathering and analyzing various information. Currently, security control is very effective by using SIEM equipment which enables analysis of systematic and comprehensive viewpoint based on a lot of data, away from analyzing cyber threat information with only fragmentary information. However, It can also be said that cyber attacks are analyzed and coped with the manual work of security personnel. This means that even if there is excellent security equipment, the results will vary depending on the user using. In case of operating a characteristic web service including information provision, This study suggests the basic point of security control through characteristics information analysis, and proposes a model for intensive security control through the type discovery and application which enable a step-wise analysis and an effective filtering. Using this model would effectively detect, analyze and block attacks.

Predicting the popularity of TV-show through text mining of tweets: A Drama Case in South Korea

  • Kim, Do Yeon;Kim, Yoosin;Choi, Sang Hyun
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.131-139
    • /
    • 2016
  • This paper presents a workflow validation method for data-intensive graphical workflow models using real-time workflow tracing mode on data-intensive workflow designer. In order to model and validate workflows, we try to divide as modes have editable mode and tracing mode on data-intensive workflow designer. We could design data-intensive workflow using drag and drop in editable-mode, otherwise we could not design but view and trace workflow model in tracing mode. We would like to focus on tracing-mode for workflow validation, and describe how to use workflow tracing on data-intensive workflow model designer. Especially, it is support data centered operation about control logics and exchange variables on workflow runtime for workflow tracing.

Verification of Human Error Factors for Access Control of Bodyguards through Multiple Risk Case Analysis

  • Kim, Jin-Hwan;Kim, Sang-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.143-150
    • /
    • 2020
  • The purpose of this study is to investigate the human error of bodyguards caused in the process of performing access control activities between security missions, focusing on multiple risk cases, and to suggest countermeasures accordingly. To verify this, after arranging the sequence of events in a time series, the VTA technique and Why-Why analysis technique that can easily identify the problem centered on the variable node were used. In addition, environmental factors and personal factors that cause human errors were extracted through M-SHEL Metrix. As a result of analyzing multiple risk cases through such a method, the security environment factors that cause access control accidents include lack of time (impatience), prejudice against visitors, intensive work methods, lack of security management, unattended travel, and familiar atmosphere. (Relaxation), formal work activities, convenience provision, and underestimation were surveyed. In addition, human errors caused by personal security guards were investigated as low alertness, formal work, negligence of inspection, and comfortable coping.

Physical Layer Security of AF Relay Systems With Jamming.

  • Ofori-Amanfo, Kwadwo Boateng;Lee, Kyoung-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.288-289
    • /
    • 2019
  • This paper studies the secrecy capacity for a wireless cooperative network with perfect channel state information at the relays, and receiver. A similar assumption is also made for the instance where there exist a direct link between the transmitter and receiver. Physical Layer security techniques are employed in wireless networks to mitigate against the activity of eavesdroppers. It offers a viable alternative to computationally intensive encryption. In this paper the design of a protocol utilizing jamming (via jamming nodes) for better security and relaying (via relay nodes) for the amplify-and-forward (AF) operation, is investigated. A a signal-to-noise variant of secrecy known as secrecy gap is explored because of its use of lesser computational power - preferable for practical systems. Thus we maximize this signal-to-noise approach instead of the conventional secrecy capacity maximization method. With this, an iterative algorithm using geometric programming (GP) and semi-definite programming (SDP) is presented with appreciable benefits. The results show here highlight the benefits of using fractional components of the powers of the relays to offer better secrecy capacity.

  • PDF

A Study of Aesthetical Value of Composition principle on Security Guard Martial Arts (경호무도 구성 원리의 미학적 탐색)

  • Jeong, Yeon-Wan;Hong, Eun-Sun
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.2
    • /
    • pp.108-122
    • /
    • 2009
  • Purpose of this research about reduction the scholastic systematic triangular position of the security guard martial art which repeats a development is insufficient with demand of the while society to recognize and for the philosophic value research of security guard martial art composition principle puts out with the one method and from the reporter to search the aesthetics which appears does. In order to attain the goal of the research which sees the literature which relates with an security guard martial art widly, was an investigation and observed the aesthetics from concept and martial art of aesthetics and this the technical free use ability from actual site of the technical find which leads the practice voluntary repetition practice of security guard martial art with character and the body guard aesthetic integral part experience possibly did, there being will be able to acquire an aesthetic inspiration, confirmed. So the security guard martial art follows the composition principle of maximization central attitude and shock point breath control and mental intensive etc. of reinforcement of direction shock of relativity redundancy mental moral culture body agreement characteristic force and relaxation force and is completed and will be able to embody an aesthetic value with aesthetic elements of technical polishing process inside goes about reduction.

  • PDF

Auto-Configuration Downlink Transmission Power Approach For Femtocell Base Station

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.223-228
    • /
    • 2022
  • Femtocells are being incorporated into heterogeneous networks in order to increase the network capacity. However, intensive deployment of femtocells results in undesired interference, which lowers the system's performance. Controlling the femtocell transmission power is one of of the aspects that can be addressed in order to mitigate the negative effects of the interference. It may also be utilized to facilitate the auto-configuration of the network's conductance, if necessary. This paper proposes the use of an auto-configuration technique for transmission power. The suggested technique is based on the transmission power of macrocells and the coverage provided by femtocells. The simulation findings show that the network's capacity has increased, and the amount of interference has decreased.

The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine) (VM(Virtual Machine) 을 이용한 분리된 가상화 침해유형 학습 데이터베이스 관리와 보안방안)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.947-953
    • /
    • 2011
  • These days, a consistent and fatal attack attribute toward a database has proportionally evolved in the similar development form to that of security policy. Because of access control-based defensive techniques regarding information created in closed networks and attacks on a limited access pathway, cases of infringement of many systems and databases based on accumulated and learned attack patterns from the past are increasing. Therefore, the paper aims to separate attack information by its types based on a virtual infringement pattern system loaded with dualistic VM in order to ensure stability to limited certification and authority to access, to propose a system that blocks infringement through the intensive management of infringement pattern concerning attack networks, and to improve the mechanism for implementing a test that defends the final database, the optimal defensive techniques, and the security policies, through research.

A Study of IT Convergence Technology For Health Exercise (건강운동을 위한 IT 융합기술의 접근 동향)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.15 no.3_2
    • /
    • pp.77-82
    • /
    • 2015
  • IT convergence has been approached from national strategic dimension with an aim to drive forward technology development and industrial advancement in other fields by taking the IT to the next advanced level, and has been the focus of intensive investment of research resources. Against this backdrop, IT convergence has emerged as a cutting-edge convergence industry that helps spur development of new growth engine being pushed forward at inter-ministerial level, as well as help turn the mainstay industries into high value-added industries and create new IT industry. Health-related convergence services have shifted its focus towards the exercise/sports and rehabilitation-oriented entertainment experiential industry away from conventional disease prevention and control-centric treatment/therapy technology industry. Thus, this study was intended to examine the trends of IT convergence technological development related to health exercise and present recommendation on the future course for development of major technologies and advancement of convergence industry, given the importance assigned to IT convergence.

Abnormal Situation Detection on Surveillance Video Using Object Detection and Action Recognition (객체 탐지와 행동인식을 이용한 영상내의 비정상적인 상황 탐지 네트워크)

  • Kim, Jeong-Hun;Choi, Jong-Hyeok;Park, Young-Ho;Nasridinov, Aziz
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.2
    • /
    • pp.186-198
    • /
    • 2021
  • Security control using surveillance cameras is established when people observe all surveillance videos directly. However, this task is labor-intensive and it is difficult to detect all abnormal situations. In this paper, we propose a deep neural network model, called AT-Net, that automatically detects abnormal situations in the surveillance video, and introduces an automatic video surveillance system developed based on this network model. In particular, AT-Net alleviates the ambiguity of existing abnormal situation detection methods by mapping features representing relationships between people and objects in surveillance video to the new tensor structure based on sparse coding. Through experiments on actual surveillance videos, AT-Net achieved an F1-score of about 89%, and improved abnormal situation detection performance by more than 25% compared to existing methods.

A Study of Aesthetical Value of Composition Principle on Security Guard Martial Arts (경호무도 구성원리의 미학적 탐색)

  • Kim, Pyong-Soo;Lim, Dae-yong;Son, Jin
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.131-146
    • /
    • 2010
  • Purpose of this research about reduction the scholastic systematic triangular position of the security guard martial art which repeats a development is insufficient with demand of the while society to recognize and for the philosophic value research of security guard martial art composition principle puts out with the one method and from the reporter to search the aesthetics which appears does. In order to attain the goal of the research which sees the literature which relates with an security guard martial art widly, was an investigation and observed the aesthetics from concept and martial art of aesthetics and this the technical free use ability from actual site of the technical find which leads the practice voluntary repetition practice of security guard martial art with character and the body guard aesthetic integral part experience possibly did, there being will be able to acquire an aesthetic inspiration, confirmed. So the security guard martial art follows the composition principle of maximization central attitude and shock point breath control and mental intensive etc. of reinforcement of direction shock of relativity redundancy mental moral culture body agreement characteristic force and relaxation force and is completed and will be able to embody an aesthetic value with aesthetic elements of technical polishing process inside goes about reduction.

  • PDF