• Title/Summary/Keyword: Network Security Level

Search Result 715, Processing Time 0.024 seconds

An Information Security Model for Digital Contents (디지털 콘텐츠의 정보보호 분석 모델)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.9-14
    • /
    • 2010
  • The network architecture and analysis model for evaluating the information security are presented to distribute the reliable and secure multimedia digital contents. Using the firewall and IDS, the function of the proposed model includes the security range, related data collection/analysis, level evaluation and strategy proposal. To develop efficient automatic analysis tool, the inter-distribution algorithm and network design based on the traffic analysis between web-server and user are needed. Furthermore, the efficient algorithm and design of DRM/PKI also should be presented before the development of the automatic information security model.

Honeypots Tools Study and Analysis

  • Al-Jameel, Sultan;Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.162-173
    • /
    • 2021
  • The Honeypot is the mechanism that is made to learn more about the attackers like knowing about the method and pattern of attack and is also used to obtain very useful info about all intrusive activities. Honeypots usually categorized according to the interaction's level as (high, medium, low) interaction. The main purpose which is used as honey production and honey research. This paper includes a detailed study of two honeypot tools. The different honey pot findings are put in in this paper to illustrate how honey is working in a real environment and even how it reacts when undesirable interest obtain in this network, and these tools are used to improve the concept of security, protection and confidentiality within or outside the organization to avoid attacks, vulnerabilities and breaches.

A Study on the VCR Cryptographic System Design Adapted in Wire/Wireless Network Environments (유무선 네트워크 환경에 적합한 VCR 암호시스템 설계에 관한 연구)

  • Lee, Seon-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.65-72
    • /
    • 2009
  • This paper proposed VCR cryptographic algorithm that adapted in TCP/IP protocol architecture and wire/wireless communication network environments. we implemented by hardware chip level because proposed VCR cryptographic algorithm perform scalable & reconfigurable operations into the security system. Proposed VCR cryptographic algorithm strengthens security vulnerability of TCP/IP protocol and is very profitable real-time processing and encipherment of high-capacity data and multi-user communication because there is important purpose to keep security about many user as that have variable round numbers function in network environments.

Opportunity Coefficient for Cluster-Head Selection in LEACH Protocol

  • Soh, Ben;AlZain, Mohammed;Lozano-Claros, Diego;Adhikari, Basanta
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.6-11
    • /
    • 2021
  • Routing protocols play a pivotal role in the energy management and lifespan of any Wireless Sensor Network. Lower network lifetime has been one of the biggest concerns in LEACH protocol due to dead nodes. The LEACH protocol suffers from uneven energy distribution problem due to random selection of a cluster head. The cluster head has much greater responsibility compared to other non- cluster head nodes and consumes greater energy for its roles. This results in early dead nodes due to energy lost for the role of cluster- head. This study proposes an approach to balance the energy consumption of the LEACH protocol by using a semi-deterministic opportunity coefficient to select the cluster head. This is calculated in each node with the battery energy level and node ID. Ultimately, based on the opportunity cost, cluster head will be selected and broadcasted for which other nodes with higher opportunity cost will agree. It minimizes the chances of nodes with lower battery level being elected as cluster head. Our simulation experiments demonstrate that cluster heads chosen using our proposed algorithm perform better than those using the legacy LEACH protocol.

Design and Implementation of Network Access Control based on IPv6 (IPv6 기반의 네트워크 접근제어 시스템 설계 및 구현)

  • Shin, HaeJoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6310-6316
    • /
    • 2014
  • The increase in the Internet and smart device users requires high-level network security. Network security consists of Web Firewall, Network Firewall, IPS, DDoS system, UTM (Unified Treat Management), VPN, NAC (Network Access Control), Wireless security, Mobile security, and Virtualization. Most network security solutions running on IPv4, and IPv6 network services are not sufficiently ready. Therefore, in this paper, this study designed and implemented important functions of Network Access Control (NAC), which include IPv6 host detection, isolation, blocking and domain assignment for the IPv6 network. In particular, domain assignment function makes 128 bits IPv6 address management easy. This system was implemented on a KISA IPv6 test-bed using well known devices. Finally, the test result showed that all IPv6 based wired and wireless devices were well-controlled (detection, blocking, isolation and domain assignment).

Evaluate Students' Interaction and Happiness in Distance Learning Among Students with Learning-Difficulties During Covid-19 Pandemic

  • Almaleki, Deyab A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.119-130
    • /
    • 2021
  • This study aimed at Evaluate Students' Interaction and Happiness in Distance Learning Among Students with Learning-Difficulties, by identifying the level of students' interaction in distance education and differences between them, as well as its impact on their happiness to learn. To achieve the aim of the study, two scales were designed for this purpose and were applied to a sample consisting of (310) individuals. The results showed that the level of students' interaction through the e-learning platform was at a high level. The results also showed that there was no statistically significant difference between the mean scores of males and females in the scale of students' interaction through the e-learning platform. There was no statistically significant difference between them in their happiness for distance learning via the online platform. There were also no statistically significant differences related to the grade variable in the level of interaction through the electronic platform and in the happiness to learn, while there was a positive statistically significant effect of interaction through the electronic platform on students' happiness to learn.

Security Risk Management of an Educational Institution: Case Study

  • Almarri, Bayenah;Alraheb, Fatimah;Alramis, Shahad;Almilad, Noor;Aldahasi, Ezaz;Ali, Azza
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.172-176
    • /
    • 2021
  • This study is conducted with an educational institution to minimize the potential security hazards to an acceptable level where the vulnerabilities and threats are revealed in this institution. The paper provides a general structure for the risk management process in educational institutions, and some recommendation that increases security levels is presented.

Management of Innovations and Projects in the System of Improving the Performance of Personnel as a Factor in Ensuring the Competitiveness and Investment Security of the Enterprise

  • Kopytko, Marta;Nikolchuk, Yulia;Urba, Svitlana;Darmits, Rostyslav
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.201-206
    • /
    • 2022
  • The main purpose of the study is to analyze the features of innovation and project management in the system of improving the performance of personnel as a factor in ensuring competitiveness and investment security. For the successful operation of enterprises, regardless of their form of ownership and field of activity, in order to carry out effective activities, they turn to innovative methods related to the formation of the potential of the workforce, and increasing the level of education and qualifications of staff and establishing their potential ability to make independent decisions. Based on the results of the study, the key features of innovation and project management in the system of improving the performance of personnel as a factor in ensuring competitiveness and investment security are characterized.

A Novel Hybrid Algorithm Based on Word and Method Ranking for Password Security

  • Berker Tasoluk;Zuhal Tanrikulu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.161-168
    • /
    • 2023
  • It is a common practice to use a password in order to restrict access to information, or in a general sense, to assets. Right selection of the password is necessary for protecting the assets more effectively. Password finding/cracking try outs are performed for deciding which level of protection do used or prospective passwords offer, and password cracking algorithms are generated. These algorithms are becoming more intelligent and succeed in finding more number of passwords in less tries and in a shorter duration. In this study, the performances of possible password finding algorithms are measured, and a hybrid algorithm based on the performances of different password cracking algorithms is generated, and it is demonstrated that the performance of the hybrid algorithm is superior to the base algorithms.

A Survey of Cybersecurity Vulnerabilities in Healthcare Systems

  • Adwan Alownie Alanazi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.155-161
    • /
    • 2023
  • In the process of remarkable progress in the medical and technical field and activating the role of technology in health care services and applications, and since the safety of medical data and its protection from security violations plays a major role in assessing the security of health facilities and the safety of medical servers Thus, it is necessary to know the cyber vulnerabilities in health information systems and other related services to prevent and address them in addition to obtaining the best solutions and practices to reach a high level of cybersecurity against attackers, especially due to the digital transformation of health care systems and the rest of the dealings. This research is about what cyberattacks are and the purpose of them, in addition to the methods of penetration. Then challenges, solutions and some of the security issues will be discussed in general, and a special highlight will be given to obtaining a safe infrastructure to enjoy safe systems in return.