• Title/Summary/Keyword: Security Benefit

Search Result 264, Processing Time 0.026 seconds

Formalizing the Design, Evaluation, and Analysis of Quality of Protection in Wireless Networks

  • Lim, Sun-Hee;Yun, Seung-Hwan;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.634-644
    • /
    • 2009
  • A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical crosslayer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks.

A Comparative Study of Economical Efficiency in Apartment Security System: Focused on a Enhancing the Effectiveness of Senior Employment Programs (아파트 유·무인 경비시스템의 경제성 비교 연구: 노인일자리 사업의 효용성 제고를 중심으로)

  • Ha, Jai-Ryong;Lee, Kwang-Won
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.7-36
    • /
    • 2014
  • Recently the Korean government announced that minimum wage policy would be applied even to apartment security staffs by 2015 who had been waived from the policy enforcement for their unique work conditions. This caused apartment management to introduce unmanned security system instead of employing security staffs because of fearing possible hike of management fees. People recklessly tend to believe unmaned system is cheaper than maned system if minimum wage guideline is applied. This study examines the economic feasibility of two different apartment security systems by utilizing cost-benefit analysis: maned and unmaned security systems. The authors estimate the costs and the benefits of each security system for 5 years(2014-2018) with application of social discount rate(5.5%). Thirty six apartment complexes at 8 different areas(meons and dongs) in Asan, Chungcheongnam-do province were surveyed. And to attain the exact costs of unmaned system establishment and operation, the authors interviewed persons working for the unmaned security corporations. The benefit-cost(B/C) ratio for unmanned security system is 1.66% at minimum and 1.30% at maximum. while B/C ratio for manned security system is 1.42% and 1.66% respectively. This results mean that people's belief is not correct, that is, transferring from maned system to unmaned is not always economically efficient. Benefits of maned security system is more diverse than unmaned system. The former provides living conveniences(parking helps and keeping parcels) and social benefits(employing aged worker and giving them opportunities to enjoy happier lives) as well as security benefits like crime prevention. The latter provides security benefits only, but that effect is also doubtable. Taking into account these diverse benefits maned system provides, the B/C ratio of maned system is equitable or higher than unmaned system.

  • PDF

The Development Direction of Vulnerable People's Welfare-related Legislation (서민취약계층복지 관련 법제의 발전방향)

  • Yoon, Seok-Jin
    • Journal of Legislation Research
    • /
    • no.41
    • /
    • pp.171-200
    • /
    • 2011
  • Protection of vulnerable people in our country today, "the National Basic Livelihood Security Act," is primarily responsible. But current law income and wealth, and by a person responsible for supporting consider only the absolute protection of the poor, and because it is insufficient for the protection of vulnerable people. Specifically, current law does not mean the relative poverty of vulnerable people is limited to the protection of economic demand. It also incorporates the payment of salaries paid individual because the people most vulnerable to social protection is insufficient demand. Dependent regulation is too strict and a person responsible for supporting do not receive legal protection by forming a dead zone is a major cause. In this study, the development direction for the protection of vulnerable people suggests. The first, "National Basic Livelihood Security Act" award in determining the minimum cost of living is relatively proposed to introduce the concept of poverty. Second, payment of the consolidation benefit and the individual benefit to adopt a intermix approach, the social needs of vulnerable people to adapt to that proposed. Third, a person responsible for supporting dependent criteria and whether according to the actual supporting to be judged.

A Proposed Framework for the Automated Authorization Testing of Mobile Applications

  • Alghamdi, Ahmed Mohammed;Almarhabi, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.217-221
    • /
    • 2021
  • Recent studies have indicated that mobile markets harbor applications (apps) that are either malicious or vulnerable, compromising millions of devices. Some studies indicate that 96% of companies' employees have used at least one malicious app. Some app stores do not employ security quality attributes regarding authorization, which is the function of specifying access rights to access control resources. However, well-defined access control policies can prevent mobile apps from being malicious. The problem is that those who oversee app market sites lack the mechanisms necessary to assess mobile app security. Because thousands of apps are constantly being added to or updated on mobile app market sites, these security testing mechanisms must be automated. This paper, therefore, introduces a new mechanism for testing mobile app security, using white-box testing in a way that is compatible with Bring Your Own Device (BYOD) working environments. This framework will benefit end-users, organizations that oversee app markets, and employers who implement the BYOD trend.

How Vulnerability Research Motives Influence the Intention to Use the Vulnerability Market? (취약점 연구동기가 취약점마켓 이용의도에 어떠한 영향을 미치는가?)

  • Hyeong-Yeol Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.201-228
    • /
    • 2017
  • Vulnerability information, which can cause serious damage to information assets, has become a valuable commodity, thereby leading to the creation of a vulnerability market. Vulnerability information is traded on the vulnerability market from several hundred dollars to hundreds of thousands of dollars depending on its severity and importance, and the types and scope of the vulnerability markets are varying. Based on previous studies on vulnerability markets and hackers, this study empirically analyzed the effects of the security researcher's vulnerability research motivation on his/her vulnerability market use intention. The results are discussed as follows. First, vulnerability research self-efficacy had a significant effect on flow and on white and black market use intention but not on perceived benefit. Second, flow had a significant effect on perceived benefit and on black market use intention but had no effect on white market use intention. Third, perceived profit had a significant effect on white and black market use intention. Fourth, vulnerability research self-efficacy had a significant effect on perceived benefit through flow. Fifth, flow had a significant effect on white and black market use intention through perceived profit. These findings can be used to predict the behavior of security researchers who have experience in exploiting vulnerabilities.

The Federal Employees Pension System: Institutional Traits and the Directions of its Reform (미국의 연방공무원 연금제도: 제도적 특성과 개혁방향)

  • Jun, Chang-Hwan
    • 사회경제평론
    • /
    • v.29 no.1
    • /
    • pp.99-117
    • /
    • 2016
  • This paper aims to explore the institutional traits of the federal employees pension system in the United States and the direction of its reform. Currently the United States has two systems of the federal employees pension. One is CSRS, the other is FERS. The former was firstly introduced in 1920 as a generous DB pension well before the establishment of the Social Security System(OASDI). What led to the latter, FERS was the Social Security Amendment Act of 1983 and Federal Employee Retirement System Act of 1986. The crucial difference between the CSRS and the FERS is the contrasting characteristic of their relationships with OASDI. The CSRS has just one source of retirement benefit(DB pension) without OASDI benefit, whereas the FERS has three sources(OASDI benefit, basic annuity(DB), DC typed TSP benefit). When it comes to FERS, what matters most is TSP(Thrift Savings Plan).

Custody Transfer of Bundle layer in Security Mechanism for Under water Inter net of Things (UIoT)

  • Urunov, Khamdamboy;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.506-523
    • /
    • 2015
  • The intent is to determine whether or not the custody transfer is helpful for data transmission in challenging underwater communications when running Bundle protocol or underwater protocols. From the point of view defending side, Underwater Acoustic Network (UAN) will be a serious threat for its strong functionality long rang and high precision of surveillance and detection. Therefore, countermeasures must be taken to weaken its effect. Our purpose is analyzed that how to benefit from the UIoT to learn from, exploit and preserve the natural underwater resources. Delay/Disruption Tolerant Network (DTN) is essential part of the network heterogeneity communication network. The vulnerability and potential security factors of UIoT are studied thereafter. Security mechanisms for an underwater environment are difficult to apply owing to the limited bandwidth. Therefore, for underwater security, appropriate security mechanisms and security requirements must be defined simultaneously. The paper consists of mathematical and security model. Most important point of view in the security challenges of effective Buffer and Storage management in DTN.

Analysis of Socio-economic Effects of Land Consolidation and On-farm Development Project (경지정리사업(耕地整理事業)의 사회경제적효과분석(社會經濟的效果分析))

  • Lim, Jae Hwan;Kim, Jae Hong;Yeo, Soon Duck
    • Korean Journal of Agricultural Science
    • /
    • v.27 no.2
    • /
    • pp.158-175
    • /
    • 2000
  • Up to date, the economic feasibility analysis on land consolidation and on-farm development projects were mainly depended upon the direct benefits from market value of project outputs. Therefore the projects were neglected in allocation of the government's financial funds and loans on account of undervaluation of the project benefits including socio-economic and environmental values of the projects. Accordingly the Extended Benefit Cost Analysis Method should be adapted to cover not only the benefits such as non-market values of environmental functions of the projects and but also the economic market values of the project outputs. The main objectives of this study is (1) to provision of the guideline for economic feasibility analysis based on the IBRD and ADB guidelines, (2) to estimate the benefits such as Productivity increase effect, labor saving effect, off-farm income increase effect during off-farm season, saving of O&M cost of farm mechanization, enhance of farmer's public health, increase of environmental public function of paddy fields, effect of food security and establishment of peaceful and uncontroversial rural society by implementing the land consolidation and on-farm development, (3) to introduce the newly adapted analytical method as the extended benefit cost analysis which could make possible the analysis of non-market goods such as the food security value and the environmental public value of paddy fields. To carry out the study, the publication on the guideline for economic analysis of agricultural projects were reviewed and consulted and for the post evaluation of the land consolidation and on-farm development project, field survey in Jeongja area were made for the feasibility study of the project by new method. According to the initial project plan, Jeongja land consolidation and on-farm development project has 96ha of benefit area and the project was started in 1989 and completed in the spring, 1990. The total project costs were amounted to 1,052 million won and the annual project benefits were estimated at 135.4 million in 1989 constant market prices. On the other hand, the newly estimated project benefits as a part of post evaluation of the project were amounted to 602.1 million won including all the benefits from the market and non-market commodities of the project as mentioned above column. The original IRP(Internal rate of return) of the project was estimated at 15.81%. On the other hand, the IRR of the post evaluation of the project was amounted to 16.83%. In case of including the benefit from the environment public function of paddy field, the SRR(Social Rate of Return) was reached to 38.81% and when we added the benefit from food security of the project, the SRR showed very high rate as 46.41%. In conclusion, the project were verified socio-economically feasible and environmentally sustainable considering the above decision making criteria.

  • PDF

Probabilistic Precontract Pricing for Power System Security (전력계통 안정성확보를 위한 확률적 예약요금제)

  • 임성황;최준영;박종근
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.43 no.2
    • /
    • pp.197-205
    • /
    • 1994
  • Security of a power system refers to its robustness relative to a set of imminent disturbances (contingencies) during operation. The socially optimal solution for the actuall level of generation/consumption has been well-known spot pricing at shot-run marginal cost. The main disadvantage of this approach arises because serious contingencies occur quite infrequently. Thus by establishing contractual obligations for contingency offering before an actual operation time through decision feedback we can obtain socially optimal level of system security. Under probabilistic precontract pricing the operating point is established at equal incremental cost of the expected short-run and collapse cost of each participant. Rates for power generation/consumption and for an offer to use during a contingency, as well as information on the probability distribution of contingency need for each participant, are derived so that individual optimization will lead to the socially optimal solution in which system security is optimized and the aggregate benefit is maxmized.

  • PDF

USN Security Considerations in Home Network (홈 네트워크에서의 USN 보안 고려 사항 분석)

  • Park, Woo-Chool;Park, Hyun-Mun;Lee, Myung-Soo;Yoon, Nyung-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.171-173
    • /
    • 2006
  • Because sensor networks use wireless communication, they are vulnerable to attacks which are more difficult launch in the wired domain. Many wired networks benefit from their inherent physical security properties. It is unlikely that an adversary will dig up the Internet backbone and splice into the line. However, wireless communications are difficult to protect; they are by nature a broadcast medium. In a broadcast medium, adversaries can easily eavesdrop on, intercept, inject, and alter transmitted data. In addition, adversaries are not restricted to using sensor network hardware. We have analyzed the IEEE 802.15.4, ZigBee specification which includes a number of security provisions and options. In this paper, we highlight places where USN security considerations and home network attack scenarios.

  • PDF