• Title/Summary/Keyword: Security Checklists

Search Result 26, Processing Time 0.02 seconds

Classification of Security Checklist Items based on Machine Learning to Manage Security Checklists Efficiently (보안 점검 목록을 효율적으로 관리하기 위한 머신러닝 기반의 보안 점검 항목 분류)

  • Hyun Kyung Park;Hyo Beom Ahn
    • Smart Media Journal
    • /
    • v.11 no.11
    • /
    • pp.75-83
    • /
    • 2022
  • NIST in the United States has developed SCAP, a protocol that enables automated inspection and management of security vulnerability using existing standards such as CVE and CPE. SCAP operates by creating a checklist using the XCCDF and OVAL languages and running the prepared checklist with the SCAP tool such as the SCAP Workbench made by OpenSCAP to return the check result. SCAP checklist files for various operating systems are shared through the NCP community, and the checklist files include ID, title, description, and inspection method for each item. However, since the inspection items are simply listed in the order in which they are written, so it is necessary to classify and manage the items by type so that the security manager can systematically manage them using the SCAP checklist file. In this study, we propose a method of extracting the description of each inspection item from the SCAP checklist file written in OVAL language, classifying the categories through a machine learning model, and outputting the SCAP check results for each classified item.

Estimating the Validity of CPTED Guidelines on Residence Hall in University: Through the Comparison between CPTED Checklists and Space Syntax Analysis

  • Han, Dongho;Park, Changbae
    • Architectural research
    • /
    • v.17 no.4
    • /
    • pp.117-126
    • /
    • 2015
  • University residence halls have become one of the most important issues for students when selecting their academic institutions. However, in South Korea, while universities maintain technologically up-to-date facilities, when it comes to safety or security, the management is unsatisfactory. As a result, the number of violent crime has been increasing. However, there are few researches in terms of practical validity of CPTED Guidelines even though a myriad of researchers study about CPTED Guidelines. Therefore, this study endeavours to investigate the validity of theoretical CPTED Guidelines that to what extent it might be adopted for design process. As a methodology, Space Syntax Convex map and Visibility Graph Analysis (VGA) are chosen. As a result, since the types of space which have a high level of Space Syntax Index are analogous with space treated on CPTED Guidelines, it roughly shows that the theoretical CPTED Guidelines could be adopted in practical architectural design process. Furthermore, it reveals that there is a close relationship between detail design guide stated in CPTED Guidelines and the result of VGA. That is, through the analysis, it is proved that the validity of CPTED Guidelines is quite enough to be adopted in practical design process.

The Case Study for the UNISDR Certification of the Making Resilience City - Focusing on the Busan Geumjeong gu - (UNISDR의 재해에 강한 도시 만들기 사례 연구 - 부산광역시 금정구를 중심으로 -)

  • Lee, Taeshik;Kim, Yongmoon;Cheung, Chongsoo;Seok, Geumcheol;Cho, Woncheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.1
    • /
    • pp.9-18
    • /
    • 2016
  • This research has been shown the systematic method about that the disaster resilient city make to certificate the UNISDR's role model city, the first case study in Korea, of that the Busan Geumjeong-gu city project to take part in and to lead the campaign of the 'Climate Change, the making resilient city' in Korea. For the making the life safety community, we research and analysis and apply the 10 Essentials and 41 Key Questions of the campaign making UNISDR's disaster resilient city, and check the disaster management items about the government and local ones ordering every years, and study to analyze the Geumjeong-gu factors about the seven checklists of life safety improvement, and educate and train and make the questionnaire for the safety campaign the citizen and volunteer in the 17 local areas, and show the vision and target, and 5 steps approaching strategy of 'Climate change, the making resilient city,'

Improvement of the Checklist for Residential Housing's Crime Prevention Accreditation Assessment (주거시설에 대한 CPTED 평가인증 기준 개선방안 연구)

  • Park, Hyeon-Ho;Kim, Kang-Il;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.117-141
    • /
    • 2018
  • Police crime statistics report that residential housing such as apartment, low rise, detached houses is the second most vulnerable to crime, which is closely followed by the number of street crimes. Also residential houses are often exposed to quality-of-life crime, e.g burglary. It threatens the basic human rights of house residents in terms of safety and comfort within the urban living environment. This study examines related precedent studies regarding the vulnerability of residential housing including studios, multi-family housing from the viewpoint of crime prevention through environment design(CPTED), extracted the elements and items suitable for the safety of residential facilities and the certification evaluation indicators and check items to be the basis for the checklist are derived. Based on these evaluation indicators and inspection items, we conducted on-site surveys of residential facilities in three areas of Seoul, Yongin and Asan, and the final draft of the checklist was revised based on the results of the field survey. There are 43 items on the 7 fields of evaluation in the final version of checklist, 11 items in the management and operation, 20 items in the surveillance, 7 items in the access control, 1 item in the territoriality, 2 items in the activity support, and 2 items in the security and safety facilities. In addition, various points of interest were added to allow the administrator of the residential facility to earn points for special measures taken for safety. This checklist can be appropriately modified and utilized in consideration of the characteristics of each facility. Korean national police agency has CPOs to check the residential facilities in their jurisdiction using checklists and to certify excellent facilities with high level of safety.

Analyze the Affective and Learning Strategy Difference of Engineering Students under Academic Probation and other College Students (이공계 학사경고 대학생과 일반 대학생의 동기 및 학습전략 차이 분석)

  • Kim, Ock-boon;Cho, Young-bok
    • Journal of Practical Engineering Education
    • /
    • v.11 no.1
    • /
    • pp.25-31
    • /
    • 2019
  • The purpose of this study is to investigate the difference between motivation and learning strategies of students who have received academic probation and who have not while attending engineering college. The subjects of this study were engineering college students in Seoul and they participated in the learning strategy test at the teaching and learning center. The subjects of this study were 553 students, 22 of whom received academic probation and 531 didn't. In order to achieve the purpose of this study, we used MLST (Multi-dimensional Learning Strategy test) learning strategy checklists of Korea Guidance, which is a standardized test. A t-test was conducted to compare motivational and learning strategies between students with and without academic probation. As a result, the motivation score of the students with the academic probation was lower than that of those without the academic probation, and the score of the time management and note taking factors of the students with the academic probation were lower than those of the students without the academic probation.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.