• Title/Summary/Keyword: Security Analysis

Search Result 6,489, Processing Time 0.031 seconds

Correlation between Customer Orientation and Job Stress due to Degree of Emotional Labor on Security Agents (시큐리티 요원의 감정노동 수준에 따른 직무스트레스와 고객지향성의 관계)

  • Kim, Eui-Young;Lee, Jong-Hwan;Cho, Sung-Jin
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.23-35
    • /
    • 2014
  • This study aims to verify the relationship between customer orientation and job stress due to the degree of emotional labor on security agents. Objects of study are from 10 security companies, randomly selected from those registered on the Regional Police Agencies in Daejeon and Chungnam, from November 10th to 20th, 2013; thirty agents from each company, or three-hundred in total, were selected as research subjects by random sampling method. Twenty-five subjects were excluded for poor response contents and/or low reliability. Thus, only 275 subjects were included in actual analysis. The research tool was the questionnaire which was re-composed on the basis of domestic/overseas preliminary studies, while the data was processed through the frequency analysis, the reliability analysis, the confirmatory factor analysis and structure model analysis, using SPSS version 19.0 and AMOS 17.0 statistics package. Through the data analysis following the research methods above, the conclusion was acquired as follows. First, as job stress of security agents decreased, customer orientation increased. Second, the group of security agents with lower level of emotional labor positively affected job stress and customer orientation.

A Study on Event Log Correlation Analysis for Control System Threat Analysis (제어시스템 위협분석을 위한 Event Log 상관분석에 관한 연구)

  • Kim, Jongmin;Kim, Minsu;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.35-40
    • /
    • 2017
  • The control system can have such threats as information leakage and falsification through various routes due to communications network fusion with public network. As the issues about security and the infringe cases by new attack methods are diversified recently, with the security system that makes information data database by simply blocking and checking it is difficult to cope with new types of threats. It is also difficult to respond security threats by insiders who have security access authority with the existing security equipment. To respond the threats by insiders, it is necessary to collect and analyze Event Log occurring in the internal system realtime. Therefore, this study could find out whether there is correlation of the elements among Event Logs through correlation analysis based on Event Logs that occur real time in the control system, and based on the analysis result, the study is expected to contribute to studies in this field.

An Analysis of Structural Changes on the Linux Pseudo Random Number Generator (리눅스 의사난수발생기의 구조 변화 분석)

  • Taeill Yoo;Dongyoung Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.365-378
    • /
    • 2024
  • The operating system (OS) of mobiles or embedded devices is based on the Linux kernel. These OSs request random numbers from the Linux kernel for system operation, such as encryption keys and security features. To provide random numbers reliably, the Linux kernel has a dedicated random number generator (Linux Pseudo Random Number Generator, LPRNG). Recently, LPRNG has undergone a major structural changes. However, despite the major changes, no security analysis has been published on the structure of the new LPRNG. Therefore, we analyze these structural changes as a preliminary study to utilize the security analysis of the new LPRNG. Furthermore, the differences between before and after the changes are divided into cryptographic and performance perspectives to identify elements that require security analysis. This result will help us understand the new LPRNG and serve as a base for security analysis.

A Study on the Security Improvement for Mobile Payment Systems by the Fault Fishbone Analysis (결함 어골도 분석에 의한 모바일 결제 시스템의 보안성 개선에 관한 연구)

  • Seo, Jin-Ho;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.1
    • /
    • pp.26-33
    • /
    • 2018
  • As financial transactions using mobile devices have been activated, mobile payment services have appeared and many changes have been made to the existing financial service methods. Due to the simplified payment method of mobile payment service, security threats such as personal information leakage, phishing damage, and malicious code are increasing. Research that can solve this is needed. In this paper, we discuss the features and security factors of mobile payment system. In order to improve the security of mobile payment system, we propose a fault analysis method based on frequency of occurrence using Fault Fishbone Analysis(FFA) technique.

Business model correlation analysis according to the technology maturity of the information security industry (정보보호 산업의 기술성숙도에 따른 비즈니스 모델 상관성 분석)

  • Lim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.165-171
    • /
    • 2019
  • The domestic information security market is booming, For the development of the information security industry. I wanted to suggest a strategy for finding and developing a good business model. So the main products were classified by similar industries. And The sector was selected as the dependent variable. Expert interviews were conducted and classified according to technical maturity. Independent variables were sales, number of employees, and performance. Average analysis result, sales amounted to 8.798 billion won, 13.51 years in industry, and 64.3 employees. As a result of SPSS statistical analysis, the correlation between industry type and sales according to technical maturity (r = -.729) was within 5% of significance level. The regression results were significant. (p= .047<0.05) Therefore, industry classification and sales are related to technological maturity.

A Research on Information Security Risk-based Antecedents Influencing Electronic Commerce User's Trust (전자상거래 사용자의 신뢰에 영향을 미치는 정보보안위험 기반의 선행요인 연구)

  • Kim, Jong-Ki;Lee, Dong-Ho
    • Asia pacific journal of information systems
    • /
    • v.15 no.2
    • /
    • pp.65-96
    • /
    • 2005
  • It is generally believed that, compared to traditional commerce, Electronic Commerce(EC) is more difficult to gain and sustain customers. One of the major reasons that customers do not use EC is lack of trust. Previous researches on the EC user's trust suggested that risk is an antecedent of trust and the concept of trust is highly related to risk. This study proposed a combined model in which includes the factors based on generic information security risk analysis methodology and trust factors in EC. The objectives of this study are follows; first, investigating the relationship between trust and risk that are antecedent factors of purchase intention, and second, examining the validity of information security risk analysis approach in EC environment. Based on the survey results of 143 MBA students statistical analysis showed that factors like threats and controls were significantly related to risk, but assets did not have statistically significant relationship with risk. Controls and knowledge of EC had meaningful effect on user's trust. This study found that risk analysis methodology which is generally used at organizational level is practically useful at user level on EC environment. In conclusion, the results of this study would be applied to generic situation of information security for analyzing and managing the risk. Besides, this study emphasized that EC vendors need to pay more attention to the information security risk to gain customer's trust.

Obliquely incident earthquake for soil-structure interaction in layered half space

  • Zhao, Mi;Gao, Zhidong;Wang, Litao;Du, Xiuli;Huang, Jingqi;Li, Yang
    • Earthquakes and Structures
    • /
    • v.13 no.6
    • /
    • pp.573-588
    • /
    • 2017
  • The earthquake input is required when the soil-structure interaction (SSI) analysis is performed by the direct finite element method. In this paper, the earthquake is considered as the obliquely incident plane body wave arising from the truncated linearly elastic layered half space. An earthquake input method is developed for the time-domain three-dimensional SSI analysis. It consists of a new site response analysis method for free field and the viscous-spring artificial boundary condition for scattered field. The proposed earthquake input method can be implemented in the process of building finite element model of commercial software. It can result in the highly accurate solution by using a relatively small SSI model. The initial condition is considered for the nonlinear SSI analysis. The Daikai subway station is analyzed as an example. The effectiveness of the proposed earthquake input method is verified. The effect of the obliquely incident earthquake is studied.

A Empirical Validation of Risk Analysis Model in Electronic Commerce (전자상거래환경에서 위험분석방법론의 타당성에 대한 연구)

  • 김종기;이동호;서창갑
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.61-74
    • /
    • 2004
  • Risk analysis model is systematic and structural process that considers internal security problems and threat factors of the information systems to find optimal level of security control. But, the risk analysis model is just only defined conceptually and there are not so many empirical studies. This research used structural equation modeling(SEM) research methodology with rigorously validated research instrument. Based on results of this study, risk analysis methodology was proved to be practically useful in e-commerce environment. Factors like threat and control were significantly related to risk. In conclusion, the results of this study can be applied to general situation or environment of information security for analyzing and managing the risk and providing new approach to comprehend concept of risk in e-commerce environment.

The Effects of Emotional Labor on Fatigue Scale of Private Security Guards in Regular Exercise (시큐리티 요원의 규칙적인 운동참여 활동이 감정노동과 피로도에 미치는 영향)

  • Kim, Eui-Young
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.205-221
    • /
    • 2020
  • The purpose of this study was to examine the effects of emotional labor on fatigue in regular private participation of sports workers, and to provide basic data to improve the welfare and working environment of private security guards, the core of private security industry. The survey response of 260 private security guards was used as the final analysis data, and the following conclusions were drawn through statistical tests of factor analysis, t-test, correlation analysis, and multiple regression analysis using the SPSS Windows 18.0 statistical program. First, the private security guards who regularly participate in sports showed lower sub-variability of fatigue, physical, exhaustion, and nervous system fatigue than private security guards who did not participate in sports. Second, it was found that fatigue was lower as the inner variables became higher, and that as the surface behavior became higher, the fatigue factor was lower. In conclusion, regular exercise participation can reduce emotional labor and improve fatigue of civil security personnel.

A Security Log Analysis System using Logstash based on Apache Elasticsearch (아파치 엘라스틱서치 기반 로그스태시를 이용한 보안로그 분석시스템)

  • Lee, Bong-Hwan;Yang, Dong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.382-389
    • /
    • 2018
  • Recently cyber attacks can cause serious damage on various information systems. Log data analysis would be able to resolve this problem. Security log analysis system allows to cope with security risk properly by collecting, storing, and analyzing log data information. In this paper, a security log analysis system is designed and implemented in order to analyze security log data using the Logstash in the Elasticsearch, a distributed search engine which enables to collect and process various types of log data. The Kibana, an open source data visualization plugin for Elasticsearch, is used to generate log statistics and search report, and visualize the results. The performance of Elasticsearch-based security log analysis system is compared to the existing log analysis system which uses the Flume log collector, Flume HDFS sink and HBase. The experimental results show that the proposed system tremendously reduces both database query processing time and log data analysis time compared to the existing Hadoop-based log analysis system.