• Title/Summary/Keyword: Program Security

Search Result 1,229, Processing Time 0.03 seconds

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

Factors contributing to participation in food assistance programs in the elderly population

  • Hong, Seo Ah;Kim, Kirang
    • Nutrition Research and Practice
    • /
    • v.8 no.4
    • /
    • pp.425-431
    • /
    • 2014
  • BACKGROUND/OBJECTIVES: The study objectives were to examine the participation rate in food assistance programs and explore the factors that contribute to such participation among the Korean elderly population. SUBJECTS/METHODS: The study sample comprised 3,932 respondents aged 65 years or older who were selected from a secondary data set, the fourth Korean Welfare Panel Study (KoWePS). The factors, related to participation in programs were examined based on the predisposing, enabling and need factors of the help-seeking behavior model. Multiple logistic regression analysis was used to select the best contributors among the factors related to program participation. RESULTS: The predisposing rate in food assistance programs was 8.5% (7.1% for men and 10.4% for women). When all variables were included in the model, living without spouse, no formal education, low income, having social security benefits and food insecurity in elderly men, and age, low income, having social security benefits and feeling poor in elderly women were significantly related to a higher tendency to program participation. CONCLUSIONS: The predisposing and need factors, such as living without spouse, low education level, food insecurity and feeling poor were important for program participation, as well as enabling factors, such as household income and social security benefits. A comprehensive approach considering these factors to identify the target population for food assistance programs is needed to increase the effectiveness and target population penetration of these programs.

Common Criteria of statistics using DEVS Modeling (DEVS 모델링을 이용한 보안제품 공동평가 통계)

  • Lee, Ki Sung;Kim, Tae Kyung;Seo, Hee Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.71-80
    • /
    • 2010
  • This thesis is purposed on developing security product co-evaluation statistics administrate program which is can administrate or analysis CC accreditation product using by DEVS modeling via portal site of member of CCRA. Via developing security product evaluation statistics administrate program, it can analysis the trend of all countries of the world in many ways, and noticed the ways of evaluation and accreditation of most countries via scheme analysis. Except this, it can analysis the situation of accreditation trend of any countries via data analysis of ICCC 2009. Also, For trend analysis to evaluation technique of CCRA member, it analyzed up to date technology and policy of the evaluation organization and the Certification Authority of most countries. And it peformed analysis the most trend of information security of evaluation authorization in CCRA member countries. In this program, It provide the function of trend statistics analysis which can statically analyzed the evaluation accreditation trends of most countries and automatical statistics by categorization ( by Product, Class and statistics in national) and report creation functions which can easily extraction and use the needed data. It has been updated the related informations until latest accredited product using by CC(Common Criteria) portal home page's data.

Machine-Learning Anti-Virus Program Based on TensorFlow (텐서플로우 기반의 기계학습 보안 프로그램)

  • Yoon, Seong-kwon;Park, Tae-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.441-444
    • /
    • 2016
  • Peace on the Korean Peninsula is threatened by physical aggressions and cyber terrors such as nuclear tests, missile launchings, senior government officials' smart phone hackings and DDos attacks to banking systems. Cyber attacks such as vulnerability for the hackings, malware distributions are generally defended by passive defense through the detecting signs of first invasion and attack, data analysis, adding library and updating vaccine programs. In this paper the concept of security program based on Google TensorFlow machine learning ability to perform adding libraries and solving security vulnerabilities by itself is researched and proposed.

  • PDF

Value and Meaning of Dietary Management Based on the Agrifood Voucher in the Republic of Korea (농식품바우처 기반 식생활 관리의 의미와 가치)

  • Kim, Jung Hyun;Yoon, Jihyun;Choi, Seul Ki
    • Journal of the Korean Society of Food Culture
    • /
    • v.37 no.5
    • /
    • pp.410-417
    • /
    • 2022
  • The Ministry of Agriculture, Food and Rural Affairs introduced the Agrifood Voucher in 2020. The Agrifood Voucher is the program that provides vouchers to purchase selected food items with dietary management education. This study aimed to explore value and meaning of dietary management based on the Agrifood Voucher. First, the Supplemental Nutrition Assistance Program of the United States and the Agrifood Voucher of Korea were reviewed. Second, various terms used for describing the purpose of food assistance programs were comparatively reviewed and 'food and nutrition security', together with the corresponding Korean term, was proposed to be the most appropriate term for the purpose. Subsequently, the value and meaning of dietary management based on the Agrifood Voucher were presented as enhancing food and nutrition security of the vulnerable. Diverse education programs should be developed and implemented to improve the dietary management capacity of the Agrifood Voucher recipients in order to properly realize the meaning and value of dietary management based on the Agrifood Voucher in the future.

QRIS as a Drivers of Product Distribution Flows in Indonesia: Factors of Consumer Purchasing Behavior in the Use of Fintech Payments

  • Ariani BAKHITAH;Ricardo INDRA;Wandy HALIM;Vicky FERBIAN;Zinggara HIDAYAT
    • Journal of Distribution Science
    • /
    • v.21 no.12
    • /
    • pp.59-69
    • /
    • 2023
  • Purpose: Consumers can experience better service for distribution of products with payment technology such as QRIS (Quick Response Code Indonesian Standard) compared to conventional purchase methods. This research aims to determine the experience of QRIS service users in Indonesia. Perceived Usefulness, Ease of Use, and Perceived Security were independent factors. Behavioral Intention to Use is the dependent variable. Furthermore, Word of Mouth Attitude is an intervening variable. Research Design, Data, and Methodology: Involving active QRIS users in a survey-based quantitative study in Indonesia. A survey sample of 400 people was taken from data records of 30.87 million QRIS users in Indonesia. Data were analyzed using SEM-PLS. Results: Show that Perceived Usefulness and Perceived Ease of Use significantly impact Attitudes Word of Mouth, and Behavioral Intention to Use. This research also found that Behavioral Intention to Use does not significantly impact Perceived Security. Conclusion: QRIS, as a revolutionary innovation, offers faster payments than previous methods, with a payment time of no more than one minute. QRIS is seen as valuable, simple, and safe, disseminating information to the public and continuing to use QRIS. The implications of this research are very significant in accelerating the flow of distribution of goods and services and facilitating transactions.

Problem Analysis and Countermeasures Research through Security Threat Cases of Physical Security Control Systems (물리보안 관제시스템의 보안위협 사례를 통한 취약점 분석 및 대응방안 연구)

  • Ko, Yun Seong;Park, Kwang Hyuk;Kim, Chang Soo
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.1
    • /
    • pp.51-59
    • /
    • 2016
  • Physical security protecting people from physical threats, such as a person or vehicle, has received a great attention. However, it has many risks of hacking and other security threats because it is highly dependent on automated management systems. In addition, a representative system of physical security, a CCTV control system has a high risk of hacking, such as video interceptions or video modulation. So physical security needs urgent security measures in accordance with these threats. In this paper, we examine the case of security threats that have occurred in the past, prevent those from threatening the physical security, and analyze the security problem with the threats. Then we study the countermeasures to prevent these security threats based on the problems found in each case. Finally we study for the method to apply these countermeasures.

A Study on the Activation Plan of the Industry Security Career Education through the Middle School Free Semester (중학교 자유학기제도를 통한 산업보안 진로교육 활성화 방안에 관한 연구)

  • Shin, Min-ji;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.133-159
    • /
    • 2019
  • The free semester system, introduced on a trial basis in 2013, has been fully implemented in all middle schools since 2016. The free semester system for middle school students is divided into subject activities and free semester activities with the purpose of students' dream and career exploration. While the activities of various vocational groups linked to subjects during the free semester are discussed, studies on the industrial security career education in middle schools are hard to find. In addition, the career sites that provide diverse information on career path for teachers, students and parents with support from the Ministry of Education have not established any program regarding industrial security. This study aims to look at the status of career education by the analysis of keywords for industrial security in the career experience network currently operated by the Ministry of Education and in-depth interview with career education teachers, students and parents, and industrial security experts. Based on such analysis, this study attempts to figure out a comprehensive understanding of the free semester system and to explore strategies for promoting industrial security education. The results of this study found that the activation plan for industrial security education requires the industry security education through career network, development of industrial security education program, training and placement of professional industrial security lecturer, and establishment of support systems for experience in industrial security.

A Study on development of general hospital security service (종합병원 경비업무의 발전방안에 관한 연구)

  • Ha, Jeong-Hun
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.187-208
    • /
    • 2017
  • The purpose of this study is to find the development of the general hospital security business plan based on the problem that guards are now aware of general hospital security service. To achieve the purpose of this study, the interview was conducted by interviewing interviews with nine field specialists who are currently engaged in the hospital for more than six years. The guard who perform general hospital security service proposed a development plan of general hospital security services as follows. First, the security guards at the General Hospital must complete a new education program suitable for the nature of the workplace. Second, the job training of the comprehensive hospital guard service is also needed to improve the quality of the program in accordance with the actual situation. Third, general hospital security guards should be provided with CS training, CPR and use of defibrillators, etc., and how to respond to infectious diseases. Fourth, there should be a detailed description of the extent to which aggregations and violent acts at the General Hospital should be addressed. Fifth, the Security Association needs to develop active programs for security guards and various efforts to improve the security of hospitals. Sixth, it is necessary to change the recognition of general hospital' security services, and the form of direct employment is required rather than the subcontract contract.

  • PDF

A Study on the Consultation for Technology Leakage Victim Using NLP

  • KANG, In-Seok;LIM, Heon-Wook
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.2
    • /
    • pp.33-39
    • /
    • 2020
  • Purpose: The purpose of this study is that victims of technology leaks and people concerned about leaks complain of stress over security concerns. However, there are no psychological treatments among the government's comprehensive plans to prevent technology leaks. Therefore, the government intends to present education methods using the NLP (Neuro Linguistic Program), a collective counseling technique, to heal the psychological injury of the victims. Psychological counseling methods include cognitive behavioral therapy, psychoanalytic behavioral therapy, humanism therapy, art therapy, and other psychological therapies. Among them, NLP (Neuro Linguistic Programming) method was used. NLP has three concepts: neuron, language, and programming, and is used as a general method for group counseling. Research design, data and methodology: In relation to composition, Chapter 1 explained the purpose and necessity of the study, Chapter 2 explained the types of psychological counseling and NLPs to help understand the study, introduced the prior study related to the development of collective counseling programs through NLP, and Chapter 3 developed a security psychological counseling education program. In addition, FGI(Focus Group Interview) was conducted for professionals. Results: Corporate counseling considered most in this study should satisfy client, counselor and manager differently from individual counseling. For this purpose, the result was composed of 11 times. In order to derive personal problems for clients, they consisted of finding, loving, expressing, and emancipating self. And, It solved the leakage anxiety to suggest a professional solution for the counselor. In addition, this course helps them become familiar with counseling techniques for becoming a good security administrator. Lastly, it was configured to leave the result for the manager to suggest the organizational development method through this training. The implication of this study is to derive psychological counseling methods for security officers. Most companies in the field of security counseling complain about technology leakage stress. There is currently no psychotherapy support project under the policy. And It was developed because it can expect sales improvement from security consultation. Conclusions: In conclusion, the results were organized to be left to the manager so that he could suggest how to develop the organization through this time.