• Title/Summary/Keyword: Network Assets

Search Result 170, Processing Time 0.035 seconds

Learning Model Development of utilizing a Tutor to study cyber-terrorism (사이버테러에 대비한 국가정보보안 현장 튜터를 활용한 교수-학습 모형 개발)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.49-57
    • /
    • 2015
  • Changes in the national intelligence security industry is becoming increasingly rapidly changing due to the development of the network and the use of the Internet. Information also can be called by critical information assets, as well as social infrastructure of the country's reality is that individuals at risk. These professionals make to prevent terrorists to destroy national defense system and network was absolutely necessary. But, Cyber Terror Response NCOs to be responsible for cyber terrorism requires a professional NCOs with advanced knowledge. National Competency Standards(NCS) using a national information security field tutors to conduct training courses teaching - learning model to develop and to apply.

A Study on the Structure and Characteristics of Social Games (소셜 게임의 구조와 특징에 대한 연구)

  • Jeon, Gyong-Ran
    • Journal of Korea Game Society
    • /
    • v.11 no.6
    • /
    • pp.13-22
    • /
    • 2011
  • In the digital media environment, the convergence is in the progress creating the new service and contents by users and developing the new needs of users by the service and contents as well. Social games are actualizing the new meaning of convergence. shows not only a new situation blurring the boundary of work and leisure, labor and playing and private and public sector, but how meaningful it is to make connection of social interactions and social assets a solid network. As the most popular social game text, reveals how the personal connections and personal networks constructs the social capital by making the ritual communication more interesting and flexible to the social gamers.

A Study on the Impact of the SNS-Based Virtual Brand Community Identity on Brand Loyalty (SNS에 기반한 가상 브랜드 커뮤니티의 아이덴티티가 브랜드 충성도에 미치는 영향)

  • Chen, Xinyan;Kim, Minsung;Kang, Daeseok;Suh, Woojong
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.181-203
    • /
    • 2015
  • Customers who show high level of brand loyalty are one of the most important corporate assets. Accordingly, customers' brand loyalty has been addressed as a critical issue for the business success. In today's business environment where business channels to customers have expanded and diversified continuously, especially the use of social network services (SNSs) have drawn a lot of attention as an effective channel to promote customers' brand loyalty. This study, thus, analyzes the impact of the virtual brand community identity on customers' brand loyalty, focusing on the role of the sense of communities as mediators. The analysis was conducted by using the data collected from 239 users of Chinese virtual brand communities. The results show that both virtual brand community identity and the sense of communities significantly influence on customers' brand loyalty. Furthermore, the results reveal that both of the community belongingness and community trust composing the sense of community partially mediate virtual brand community and brand loyalty as hypothesized. Based on the results, the strategic implications are suggested and discussed, focusing on improving the customers' brand loyalty in the context of SNSs. Our findings and discussions can help companies develop their customer strategies for utilizing the virtual communities to strengthen customers' brand loyalty.

Health Monitoring System based on Wireless Sensor Network for Weapon Asset (무선 센서 네트워크 기반 무기 자산 건전성 모니터링 시스템)

  • Yoon, Kyung-Hyo;Lee, Seung-Il;Lee, Jin-Young;Ha, Sung-Gi;You, Chang-Seok;Kim, Seong-Ryul;Seo, Dae-Wha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.97-108
    • /
    • 2012
  • This paper introduces a health monitoring system based on a wireless sensor network for weapon asset. This system can estimate the remaining lifetime and decide what should be done and when should it be done using the environmental conditions such as temperature, humidity and shock for weapon assets by sensor tag. And we describes its operating scenario and routing method for this system. Finally we introduce the developments of the sensor tag, portable reader, gateway and monitoring server.

Development of field programmable gate array-based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network

  • Elakrat, Mohamed Abdallah;Jung, Jae Cheon
    • Nuclear Engineering and Technology
    • /
    • v.50 no.5
    • /
    • pp.780-787
    • /
    • 2018
  • This article presents a security module based on a field programmable gate array (FPGA) to mitigate man-in-the-middle cyber attacks. Nowadays, the FPGA is considered to be the state of the art in nuclear power plants I&C systems due to its flexibility, reconfigurability, and maintainability of the FPGA technology; it also provides acceptable solutions for embedded computing applications that require cybersecurity. The proposed FPGA-based security module is developed to mitigate information-gathering attacks, which can be made by gaining physical access to the network, e.g., a man-in-the-middle attack, using a cryptographic process to ensure data confidentiality and integrity and prevent injecting malware or malicious data into the critical digital assets of a nuclear power plant data communication system. A model-based system engineering approach is applied. System requirements analysis and enhanced function flow block diagrams are created and simulated using CORE9 to compare the performance of the current and developed systems. Hardware description language code for encryption and serial communication is developed using Vivado Design Suite 2017.2 as a programming tool to run the system synthesis and implementation for performance simulation and design verification. Simple windows are developed using Java for physical testing and communication between a personal computer and the FPGA.

Asset Localization in Wireless Sensor Networks

  • Jo, Jung-Hee;Kim, Kwang-Soo;Kim, Sun-Joong
    • Korean Journal of Remote Sensing
    • /
    • v.23 no.5
    • /
    • pp.465-471
    • /
    • 2007
  • Many hospitals have been considering new technology such as wireless sensor network(WSN). The technology can be used to track the location of medical devices needed for inspections or repairs, and it can also be used to detect of a theft of an asset. In an asset-tracking system using WSN, acquiring the location of moving sensor nodes inherently introduces uncertainty in location determination. In fact, the sensor nodes attached to an asset are prone to failure from lack of energy or from physical destruction. Therefore, even if the asset is located within the predetermined area, the asset-tracking application could "misunderstand" that an asset has escaped from the area. This paper classifies the causes of such unexpected situations into the following five cases: 1) an asset has actually escaped from a predetermined area; 2) a sensor node was broken; 3) the battery for the sensor node was totally discharged; 4) an asset went into a shadow area; 5) a sensor node was stolen. We implemented and installed our asset-tracking system in a hospital and continuously monitored the status of assets such as ventilators, syringe pumps, wheel chairs and IV poles. Based on this real experience, we suggest how to differentiate each case of location uncertainty and propose possible solutions to prevent them.

AVOIDITALS: Enhanced Cyber-attack Taxonomy in Securing Information Technology Infrastructure

  • Syafrizal, Melwin;Selamat, Siti Rahayu;Zakaria, Nurul Azma
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.1-12
    • /
    • 2021
  • An operation of an organization is currently using a digital environment which opens to potential cyber-attacks. These phenomena become worst as the cyberattack landscape is changing rapidly. The impact of cyber-attacks varies depending on the scope of the organization and the value of assets that need to be protected. It is difficult to assess the damage to an organization from cyberattacks due to a lack of understanding of tools, metrics, and knowledge on the type of attacks and their impacts. Hence, this paper aims to identify domains and sub-domains of cyber-attack taxonomy to facilitate the understanding of cyber-attacks. Four phases are carried in this research: identify existing cyber-attack taxonomy, determine and classify domains and sub-domains of cyber-attack, and construct the enhanced cyber-attack taxonomy. The existing cyber-attack taxonomies are analyzed, domains and sub-domains are selected based on the focus and objectives of the research, and the proposed taxonomy named AVOIDITALS Cyber-attack Taxonomy is constructed. AVOIDITALS consists of 8 domains, 105 sub-domains, 142 sub-sub-domains, and 90 other sub-sub-domains that act as a guideline to assist administrators in determining cyber-attacks through cyber-attacks pattern identification that commonly occurred on digital infrastructure and provide the best prevention method to minimize impact. This research can be further developed in line with the emergence of new types and categories of current cyberattacks and the future.

A Study on Improvement of Level of Highway Maintenance Service Using Self-Organizing Map Neural Network (자기조직화 신경망을 이용한 고속도로 유지관리 서비스 등급 개선에 대한 연구)

  • Shin, Duksoon;Park, Sungbum
    • Journal of Information Technology Services
    • /
    • v.20 no.1
    • /
    • pp.81-92
    • /
    • 2021
  • As the degree of economic development of society increases, the maintenance issues on the existing social overhead capital becomes essential. Accordingly, the adaptation of the concept of Level of service in highway maintenance is indispensable. It is also crucial to manage and perform the service level such as road assets to provide universal services to users. In this regards, the purpose of this study is to improve the maintenance service rating model and to focus on the assessment items and weights among the improvements. Particularly, in determining weights, an Analytic Hierarchy Process (AHP) is performed based on the survey response results. After then, this study conducts unsupervised neural network models such as Self-Organizing Map (SOM) and Davies-Bouldin (DB) Index to divide proper sub-groups and determine priorities. This paper identifies similar cases by grouping the results of the responses based on the similarity of the survey responses. This can effectively support decision making in general situations where many evaluation factors need to be considered at once, resulting in reasonable policy decisions. It is the process of using advanced technology to find optimized management methods for maintenance.

Condition assessment model for residential road networks

  • Salman, Alaa;Sodangi, Mahmoud;Omar, Ahmed;Alrifai, Moath
    • Structural Monitoring and Maintenance
    • /
    • v.8 no.4
    • /
    • pp.361-378
    • /
    • 2021
  • While the pavement rating system is being utilized for periodic road condition assessment in the Eastern Region municipality of Saudi Arabia, the condition assessment is costly, time-consuming, and not comprehensive as only few parts of the road are randomly selected for the assessment. Thus, this study is aimed at developing a condition assessment model for a specific sample of a residential road network in Dammam City based on an individual road and a road network. The model was developed using the Analytical Hierarchy Process (AHP) according to the defect types and their levels of severity. The defects were arranged according to four categories: structure, construction, environmental, and miscellaneous, which was adopted from sewer condition coding systems. The developed model was validated by municipality experts and was adjudged to be acceptable and more economical compared to results from the Eastern region municipality (Saudi Arabia) model. The outcome of this paper can assist with the allocation of the government's budget for maintenance and capital programs across all Saudi municipalities through maintaining road infrastructure assets at the required level of services.

A Brief Survey of the Uses of Non-Fungible Tokens

  • Zain Patras;Sidra Minhas
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.59-62
    • /
    • 2024
  • Non-fungible tokens (NFTs) are interchangeable rights to digital assets such as art, in-game items, collectibles or music, etc. NFTs have the potential to be infinitely useful in many industries by increasing security and processing costs for transactions and providing a new platform for the gigeconomy to work through. Its markets have grown fast and significantly since early 2021. We investigate the uses of NFTs and research the facts and figures on the usage of NFTs supporting websites. Using daily data between 2019 to 2021. NFTs took the world by storm in 2021, bringing forth a digital art revolution while becoming one of the fastest-growing asset classes of the year. While the NFTs market has been growing at a rapid pace, many are still wary of entering it because of the theoretical insanity around its worth. NFTs have been out there for quite some time and this trend doesn't plan to go any further. NFTs services have many practical use cases and their potential will only grow over time. While celebrities dive into this marketplace to maintain their onlinepresence andincrease their Net worth.