• Title/Summary/Keyword: Network Assets

Search Result 170, Processing Time 0.031 seconds

Trends and Prospects for the Development of Virtual Reality and Digital Property

  • Kirillova, Elena Anatolyevna;Blinkov, Oleg Evgenyevich;Blinkova, Elena Victorovna;Vrazhnov, Aleksey Sergeevich;Magomedov, Firdousi Bilyamudinovich
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.284-290
    • /
    • 2022
  • The study considers trends and prospects for developing virtual (augmented) reality and civil transactions in relation to digital property. In jurisprudence, there is a need to determine the legal status of virtual and augmented reality to regulate legal relations in the digital environment. Legal relations using new digital technologies require the creation of new legislative approaches and rules of their legal regulation. The article dwells on the legal status of virtual (augmented) reality and determines the methods of regulating legal relations in the sphere of digital property. The study utilized methods for collecting single and multiple facts in order to identify the main trends in the civil circulation of digital assets, as well as private law methods. The methods of generalization, concreteness, induction and deduction reveal the legal nature and main features of virtual (augmented) reality and digital property. The paper highlights the specifics of virtual reality and civil transactions in relation to digital assets. The research has concluded that the sale, exchange and other actions with digital objects in virtual reality have distinctive features, while digital property has also unique characteristics since it is involved in civil circulation and legal relations.

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

  • Liu, Liang;Huang, Cheng;Fang, Yong;Wang, Zhenxue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5260-5275
    • /
    • 2019
  • In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.

A Study on the Establishment of One-stop Portal Service for Humanities and Social Assets (인문사회자산 원스톱 포털 서비스 구축 방안 연구)

  • Noh, Younghee;Jeong, Daekeun;Kwak, Woojung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.1
    • /
    • pp.73-97
    • /
    • 2018
  • The study is to make a development initiative for humanities and social assets one-stop portal services intended for researchers, thereby establishing long-term road map for Korean Research Memory(KRM) in National Research Foundation of Korea(NRF). The empirical studies conducted for this purpose are as follows: SWOT analysis of KRM's internal and external environment; Usability test for 90 graduate students; Focus group interview for 8 experts. The results of the studies are as follows. First, KRM needs to focus on the sustainability of information provision as well as the integration of research provision. Second, KRM needs to establish the strategy of acquisition for R&D products in quality. Third, KRM needs to be the hub of humanities and social assets and social network platform for researchers. Forth, KRM needs to develop education service for lay users as well as research services for professional researchers.

Network Defense Mechanism Based on Isolated Networks (격리 네트워크를 활용한 네트워크 방어 기법)

  • Jung, Yongbum;Park, Minho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1103-1107
    • /
    • 2016
  • Network assets have been protected from malware infection by checking the integrity of mobile devices through network access control systems, vaccines, or mobile device management. However, most of existing systems apply a uniform security policy to all users, and allow even infected mobile devices to log into the network inside for completion of the integrity checking, which makes it possible that the infected devices behave maliciously inside the network. Therefore, this paper proposes a network defense mechanism based on isolated networks. In the proposed mechanism, every mobile device go through the integrity check system implemented in an isolated network, and can get the network access only if it has been validated successfully.

Development of Automated Risk Analysis Tools(HAWK) for Information System Environments (전산 시스템 보안을 위한 자동화 위험분석 도구 (HAWK: Hankuk risk Analysis Watch-out Kit)의 개발에 관한 연구)

  • Yoon, Jeong-Won;Shin, Soon-Ja;Kim, Ki-Su;Lee, Byung-Man;Song, Kwan-Ho
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.65-74
    • /
    • 1996
  • Risk analysis is time-consuming and expensive process〔1〕〔6〕. Automated risk analysis tools have been widely used in industry and government to support decision making process and reduce cost. However, difficulties in materializing impact of threats and fast-changing network environments make analysis process more complicated and less trusted since impacts are relative in network environments. HAWK system is developed to improve the accuracy of analysis result in network-oriented environment. It provides user-friendly environments and considers network environments as primary assets.

  • PDF

Review of methodologies on network defects and vulnerability

  • Park, Won-Joo;Seo, Dong-Il;Kim, Dae-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1590-1593
    • /
    • 2005
  • Security defects occurring within corporate networks and the Internet may be abused by internal or external malicious attackers. Such abuses cause a financial toll through expenditures on additional human resources, the impact of down-time as problems are fixed, as well as damage from divulging corporate informational assets. Hence, through the precise analysis of the possible defects in network security and the identification of risks, preventative policy should be established to ensure maximum security. This report reviews methodologies that calculate and analyze levels of network security in order to resolve these problems, and generates appropriate test steps, test methods, and test items.

  • PDF

Impact of Network Formation on Entrepreneurial Performance and Growth: A Study of Selected Small Enterprises in Bangladesh

  • Bhuiyan, Bashir Ahmed;Imam, Mahmood Osman
    • Asia-Pacific Journal of Business
    • /
    • v.3 no.1
    • /
    • pp.29-38
    • /
    • 2012
  • This study aims at evaluating the impact of network formation variables and found to have positive impact on the economic performance and growth of the enterprises. The calucation of the weighted scores of networking statements brought some affirmative results to influence the performance of the enterprises. Through multiple regression and logistic regression models it is identified that network formation variables like service receiving status, consultation of the family, other business dummy and attendance in fair have some significant positive impact both on the growth and performance of the enterprises. In addition to above variables, from the set of enterprise characteristics natural logarithm of the market value of total assets and from the entrepreneurs' characteristics set of variables, schooling year and squared value of the experience have been found to have significant positive impact. Finally, it is concluded in the study that to enhance the performance and growth of the enterprises, government and policy rlated organizations need to consider important variables that have positive impact in supplying the entrepreneurial resources especially, developing the net-working relationship.

  • PDF

Content Modeling Based on Social Network Community Activity

  • Kim, Kyung-Rog;Moon, Nammee
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.271-282
    • /
    • 2014
  • The advancement of knowledge society has enabled the social network community (SNC) to be perceived as another space for learning where individuals produce, share, and apply content in self-directed ways. The content generated within social networks provides information of value for the participants in real time. Thus, this study proposes the social network community activity-based content model (SoACo Model), which takes SNC-based activities and embodies them within learning objects. The SoACo Model consists of content objects, aggregation levels, and information models. Content objects are composed of relationship-building elements, including real-time, changeable activities such as making friends, and participation-activity elements such as "Liking" specific content. Aggregation levels apply one of three granularity levels considering the reusability of elements: activity assets, real-time, changeable learning objects, and content. The SoACo Model is meaningful because it transforms SNC-based activities into learning objects for learning and teaching activities and applies to learning management systems since they organize activities -- such as tweets from Twitter -- depending on the teacher's intention.

A Study of the Performance Degradation Factors of An Internal Network (내부 네트워크의 성능저하요인에 관한 연구)

  • Jeon, Jeon-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.43-50
    • /
    • 2011
  • Recently, Hacking Attacks are appearing as a various Attack techniques with evolution of the Network and most of the network through a various Security Systems are responding to an attack. In addition, it should be placed adding the Security Systems to protect the Internal Network's Information Assets from External attacks. But, The use of Security Systems and Network deployment inside the network makes a significant impact on Security and Performance. Therefore, In this paper, it will be to analyze the Performance Degradation Factors of the Internal Network according to the Security System's use and placement. In a future, This paper is expected to serve as a valuable information for the Network Performance and Security improvements.

Investigating the Global Financial Markets from a Social Network Analysis Perspective (소셜네트워크분석 접근법을 활용한 글로벌 금융시장 네트워크 분석)

  • Kim, Dae-Sik;Kwahk, Kee-Young
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.38 no.4
    • /
    • pp.11-33
    • /
    • 2013
  • We analyzed the structures and properties of the global financial market networks using social network analysis approach. The Minimum Spanning Tree (MST) lengths and networks of the global financial markets based on the correlation coefficients have been analyzed. Firstly, similar to the previous studies on the global stock indices using MST length, the diversification effects in the global multi-asset portfolio can disappear during the crisis as the correlations among the asset class and within the asset class increase due to the system risks. Second, through the network visualization, we found the clustering of the asset class in the global financial markets network, which confirms the possible diversification effect in the global multi-asset portfolio. Meanwhile, we found the changes in the structure of the network during the crisis. For the last one, in terms of the degree centrality, the stock indices were the most influential to other assets in the global financial markets network, while in terms of the betweenness centrality, Gold, Silver and AUD. In the practical perspective, we propose the methods such as MST length and network visualization to monitor the change of the correlation risk for the risk management of the multi-asset portfolio.