• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.025 seconds

Study of Pre-Filtering Factor for Effectively Improving Dynamic Malware Analysis System (동적 악성코드 분석 시스템 효율성 향상을 위한 사전 필터링 요소 연구)

  • Youn, Kwang-Taek;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.563-577
    • /
    • 2017
  • Due to the Internet and computing capability, new and variant malware are discovered around 1 Million per day. Companies use dynamic analysis such as behavior analysis on virtual machines for unknown malware detection because attackers use unknown malware which is not detected by signature based AV effectively. But growing number of malware types are not only PE(Portable Executable) but also non-PE such as MS word or PDF therefore dynamic analysis must need more resources and computing powers to improve detection effectiveness. This study elicits the pre-filtering system evaluation factor to improve effective dynamic malware analysis system and presents and verifies the decision making model and the formula for solution selection using AHP(Analytics Hierarchy Process)

A Study on Factors Related to Individuals' Corruption Behaviors (개인의 부정부패 행위 실행에 미치는 영향요인)

  • Kim, Heungtae;Lee, Chang-Bae;Shim, Hyunjung
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.125-144
    • /
    • 2018
  • Despite anti-corruption has been one of the major governmental tasks in Korea, anti-corruption policies have been focused largely on government officials in public sectors, and most of the prior studies have examined government employees not public citizens. In order to fill the vacuum in the literature, this study aims to develop evidence-based anti-corruption policies via a survey of people in various job categories for the relationship between their experiences of any corruption and related factors. Researchers analyzed a secondary data gathered by the Korean Institute of Public Administration, which included a sample of 1,000 adults aged over 19. The results showed that indirect experiences of corruption and interaction with the corrupted were positively related to individuals' corruption behaviors. In addition, their perception towards low- and mid-ranking officials were statistically signifiant in explaining the corruption behavior. Thus, policy-makers should consider focusing on indirect experiences of corruption, interaction with the corrupted, and perception towards low- and mid-ranking officials. This study contributed as an attempt to suggest policy implications and further research ideas by examining factors related to individuals' corruption behaviors.

Towards Integrating the Knowledge Management Mechanisms to Employ Innovation Factors within Universities: Critical Appraisal Study

  • Alsereihy, Hassan Awad M.;Harasani, Meshal Hesham
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.327-341
    • /
    • 2021
  • The knowledge management was considered as the inevitable result of the rule of knowledge in this era, and its importance became clear in being the main source for achieving success, the need to consider and manage knowledge as an independent field that must be addressed with a clear scientific methodology has become intangible - they are very valuable and a strategic asset. On the other hand, the innovation process relates to all parts of the organization, and helps to improve the behavioral patterns of individuals and their attitudes towards adopting modern and innovative ideas, it is a purposeful process adopted by the senior management and works to provide the capabilities and requirements for embodying the innovative behavior in it. In the field of dealing with the market, it is a product of the organization's innovative approach, which aims at advancement, change, and intended and organized renewal. The main objective of this article is to determine the most appropriate ways to integrate knowledge management mechanisms to employ innovation factors within universities based on the role of universities in supporting innovation. This was achieved through reviewing many relevant research and listing the most prominent concepts of knowledge management, its importance, objectives, and processes determining the stages of knowledge management application, the requirements for applying knowledge management, and the obstacles that impede its application; Then the statement "Innovation in universities, through which it addressed the concept of innovation, its importance, stages, and requirements for its application, as well as identifying the most prominent models of innovation, and obstacles to innovation, in addition to that the role of universities in supporting innovation will be identified. From the surveyed study done in this article, we concluded that the relationship among organizational culture, knowledge management and innovation capability can provide useful insights for managers regarding developing a strong culture, promote knowledge management practices effectively and eventually enhance the whole organization's innovation capability. Also, we found that different components of Knowledge Management as Knowledge activities, Knowledge types, transformation of knowledge and technology have a significant positive effect in bringing innovation through transformation of knowledge into knowledge assets in universities.

Information Technology Knowledge Management taxonomy to enhance government electronic services in existence of COVID 19 outbreak

  • Badawood, Ashraf;AlBadri, Hamad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.353-359
    • /
    • 2021
  • Information technology and the need for timely and effective communication during the Covid-19 have made most governments adopt technological approaches to provide their services. E-government services have been adopted by most governments especially in developed countries to quickly and effectively share information. This study discusses the reasons why governments in the Gulf region should develop a new model for information technology knowledge management practices. To achieve this, the author identified possible benefits of adopting information technology knowledge management practices and why most governments in the Gulf find it hard to adopt them. Knowledge management allows for learning, transfer as well as sharing of information between government organizations and citizens and with the development of technology, the effectiveness of electronic services can easily be achieved. Also, effective adoption of information technology can improve knowledge management with the help of techniques that enhance capture, storage, retrieval as well as sharing of information. The author used systematic literature review to select 28 journals and articles published post 2019. IEEE, Google Scholar and Science Direct were used to select potential studies from which 722 journals and articles were selected. Through screening and eligibility assessment, 21 articles were retained while the back and forward search had 7 more articles which were also included in the study. Using information gathered from these articles and journals a new conceptual model was developed to help improve information technology knowledge management for governments in the Gulf region to effectively deliver e-services during Covid-19. This model was developed based on the process of KM, Theory of Planned Behavior and Unified Theory of Acceptance and Use of Technology. Based on the developed model. From UTAUT model, performance expectancy, effort expectancy as well as social influence had a great impact.

Android Application Call Relationship Analysis Based on DEX and ELF Binary Reverse Engineering (DEX와 ELF 바이너리 역공학 기반 안드로이드 어플리케이션 호출 관계 분석에 대한 연구)

  • Ahn, Jinung;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.45-55
    • /
    • 2019
  • DEX file and share objects (also known as the SO file) are important components that define the behaviors of an Android application. DEX file is implemented in Java code, whereas SO file under ELF file format is implemented in native code(C/C++). The two layers - Java and native can communicate with each other at runtime. Malicious applications have become more and more prevalent in mobile world, they are equipped with different evasion techniques to avoid being detected by anti-malware product. To avoid static analysis, some applications may perform malicious behavior in native code that is difficult to analyze. Existing researches fail to extract the call relationship which includes both Java code and native code, or can not analyze multi-DEX application. In this study, we design and implement a system that effectively extracts the call relationship between Java code and native code by analyzing DEX file and SO file of Android application.

Interrelationship between Records and Information (기록과 정보의 상관관계)

  • Song, Byoung-Ho
    • The Korean Journal of Archival Studies
    • /
    • no.20
    • /
    • pp.3-32
    • /
    • 2009
  • When the record management faces to the information environment, the practices based on self-judgment needs more open and considerate policies. New viewpoint that treat records as information and treat information as records will produce new mutual-conscious behavior that create records based on the value of information usage and maintain information data based on the reliability as an record. As the internal aspect how to create records well, how to transfer them well, and how to archives them well used to be the focus of record management, existing legislation, guidelines, and training seem to be mainly related to this front steps. We should also address issues according to the succeeding information services, including opening to the relevant, sharing, duplicating, information security, privacy protection, and constructing collections with continual supplement. This paper observe the confusion of the viewpoints in the recent reports, explain the need of fusion viewpoint, and suggest interconnecting feedback cycle between record management system and general information system.

A Malware Detection Method using Analysis of Malicious Script Patterns (악성 스크립트 패턴 분석을 통한 악성코드 탐지 기법)

  • Lee, Yong-Joon;Lee, Chang-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.613-621
    • /
    • 2019
  • Recently, with the development of the Internet of Things (IoT) and cloud computing technologies, security threats have increased as malicious codes infect IoT devices, and new malware spreads ransomware to cloud servers. In this study, we propose a threat-detection technique that checks obfuscated script patterns to compensate for the shortcomings of conventional signature-based and behavior-based detection methods. Proposed is a malicious code-detection technique that is based on malicious script-pattern analysis that can detect zero-day attacks while maintaining the existing detection rate by registering and checking derived distribution patterns after analyzing the types of malicious scripts distributed through websites. To verify the performance of the proposed technique, a prototype system was developed to collect a total of 390 malicious websites and experiment with 10 major malicious script-distribution patterns derived from analysis. The technique showed an average detection rate of about 86% of all items, while maintaining the existing detection speed based on the detection rule and also detecting zero-day attacks.

Administrative Leaders and Their Role in Bringing About Development and Organizational Change in Universities (Northern Border University Case Study)

  • Abdelrahman, Rashid Abdelbasit Saad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.67-78
    • /
    • 2021
  • The research aims to identify the role of administrative leaders working in universities in the success of organizational development and change, and the extent of the relationship and ability of administrative leaders at all levels of leadership within universities to the effectiveness of the process of development and organizational change at Northern Border University. In addition to presenting some recommendations and suggestions that can contribute to identifying the best leadership styles that contribute to the success of the development process and positive organizational change. Where leadership, whether in the private sector or the public sector, is one of the main functions concerned with the processes of direction, development, and modernization in the performance of the facility and an important element to activate the organizations' ability to perform their role and achieve their goals. The behavior and trends of leaders represent an important indicator in knowing the type of efforts made by them to improve performance and develop organizations and human resources. The research reached many results, perhaps the most important of which is that the dominant leadership style in universities is the democratic style, followed by the bureaucratic leadership style. The results also showed that there is a significant role for administrative leaders in bringing about development and positive change at Northern Border University at the level of individuals, groups, and organizations. And it became clear that there is an availability of leadership capabilities to an acceptable degree in the administrative leaders. The results of the statistical analysis showed a positive relationship between administrative leadership ability and democratic style. In addition to the existence of a negative relationship between the administrative leadership ability and the bureaucratic style and the freestyle. It was also clear that there were no differences in dealing between males and females, as well as age, educational qualification, experience, and job grade, but there were differences in dealing with the job title.

A Study on the Influence of Securities on Corporate Financing Behavior in Financial Markets (금융시장에서 담보가 기업의 자금조달선택에 미치는 영향에 관한 연구)

  • Park, seok gang
    • International Area Studies Review
    • /
    • v.22 no.3
    • /
    • pp.201-219
    • /
    • 2018
  • This paper suggested a theoretical model, in which a security-based(secured loan, non-secured loan) credit agreement determines the form of corporate cost function through a loaning company's cost minimization in the light of a company which behaves monopolistically in product markets. Also, this paper analyzed the influence of a corporate credit agreement on market equilibrium, and economic welfare in product markets. As a result, it was found that in case a company, whose equity capital is small, implements borrowing based on a secured loan from a financial institution, the company comes to face borrowing restraints, in which the company has no choice but to get a loan within the scope of securities. When a company offers its capital goods, i.e. a production factor, as a security, there occurs a distortion to the production factor input ratio. Meanwhile, when a company comes to get a loan based on an unsecured loan, for which the interest rate is high, marginal cost rises; accordingly, the company comes to choose a credit agreement aiming at maximizing its profits. However, a company's choice of a credit agreement is not quite desirable from a consumer's viewpoint, and from the whole economic point of view; overall, such a choice is likely to aggravate economic welfare.

A Study on Anomaly Detection based on User's Command Analysis (사용자 명령어 분석을 통한 비정상 행위 판정에 관한 연구)

  • 윤정혁;오상현;이원석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.59-71
    • /
    • 2000
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while various information has been provided to users conveniently. As a results, many studies are necessary to detect the activities of intruders effectively. In this paper, a new association algorithm for the anomaly detection model is proposed in the process of generating user\`s normal patterns. It is that more recently observed behavior get more affection on the process of data mining. In addition, by clustering generated normal patterns for each use or a group of similar users, it is possible to identify the usual frequency of programs or command usage for each user or a group of uses. The performance of the proposed anomaly detection system has been tested on various system Parameters in order to identify their practical ranges for maximizing its detection rate.