• 제목/요약/키워드: Security Concerns

검색결과 413건 처리시간 0.036초

Crop Science Approaches to Alleviate the Food Security Concerns in Korea

  • Hee-Jong Koh
    • 한국작물학회:학술대회논문집
    • /
    • 한국작물학회 2022년도 추계학술대회
    • /
    • pp.8-8
    • /
    • 2022
  • Unstable crop production and distribution affected by climate change and COVID-19 pandemic has raised the food security concerns worldwide. In particular, Russia's invasion to Ukraine has blocked the grain trade such as wheat and com to importing countries, which has aggravated the situation. Korea has relied on foreign imports for about 80% of domestic grain demand, raising great concerns on food security. Considering situations related to Korea's food security, some points in view of a crop scientist are suggested and discussed as follows; 1) Domestic production of major grain crops should be increased through encouraging farmers by appropriate governmental subsidy programs 2) International corporation should be strengthened and diversified for sustainable overseas agricultural development and for stable import even in case of food crisis and emergency. 3) Self-sufficiency target should be specified by law so that more budget investments could be put to alleviate the food security concerns. 4) Technologies for climate smart agriculture and for competitive agricultural products should be developed aided by social and governmental support.

  • PDF

Self-Driving and Safety Security Response : Convergence Strategies in the Semiconductor and Electronic Vehicle Industries

  • Dae-Sung Seo
    • International journal of advanced smart convergence
    • /
    • 제13권2호
    • /
    • pp.25-34
    • /
    • 2024
  • The paper investigates how the semiconductor and electric vehicle industries are addressing safety and security concerns in the era of autonomous driving, emphasizing the prioritization of safety over security for market competitiveness. Collaboration between these sectors is deemed essential for maintaining competitiveness and value. The research suggests solutions such as advanced autonomous driving technologies and enhanced battery safety measures, with the integration of AI chips playing a pivotal role. However, challenges persist, including the limitations of big data and potential errors in semiconductor-related issues. Legacy automotive manufacturers are transitioning towards software-driven cars, leveraging artificial intelligence to mitigate risks associated with safety and security. Conflicting safety expectations and security concerns can lead to accidents, underscoring the continuous need for safety improvements. We analyzed the expansion of electric vehicles as a means to enhance safety within a framework of converging security concerns, with AI chips being instrumental in this process. Ultimately, the paper advocates for informed safety and security decisions to drive technological advancements in electric vehicles, ensuring significant strides in safety innovation.

클라우드 컴퓨팅에서의 보안 고려사항에 관한 연구 (Study on Security Considerations in the Cloud Computing)

  • 박춘식
    • 한국산학기술학회논문지
    • /
    • 제12권3호
    • /
    • pp.1408-1416
    • /
    • 2011
  • 클라우드 컴퓨팅은 컴퓨팅 리소스의 경비 절감과 효율은 물론 서비스의 확장 및 향상을 제공한다. 그러나 클라우드 서비스 사용자(기업 등)들은 클라우드 컴퓨팅 특성에 의한 여러 가지 위험들에 대해서 많은 염려를 갖고 있다. 본 논문에서는 클라우드 컴퓨팅 환경으로 인한, 시큐리티를 포함한 여러 가지 주요 이슈들을 검토하여 보고자 한다. 또한 시큐리티에 관한 문제들을 보다 구체적으로 분석하고 클라우드 컴퓨팅에 관한 위협들을 식별하여 시큐리티 위험을 줄일 수 있는 대략적인 대응책들을 제안하였다.

IT 실무자들이 전망하는 미래 정보보안의 우려와 예측 (Concern and Prediction for Future Information Security expected by IT Executives)

  • 김태양
    • 융합정보논문지
    • /
    • 제8권6호
    • /
    • pp.117-122
    • /
    • 2018
  • 본 논문에서는 매년 기관에서 보도된 보안이슈 내용을 살펴보고 IT 환경에서 종사하는 실무자들이 업무를 진행하면서 필요한 보안사항이라고 우려한 사항들과의 공통점과 차이점에 대해 분석하고자 한다. 정부기관, 금융업, 일반 기업, 항공사 등 다양한 IT 업무 환경에서 종사하는 실무자를 대상으로 미래 정보보안 관점에서의 우려 사항이 무엇인지 직접 인터뷰 및 설문조사를 하여 의견을 수집했다. 수집된 의견을 분석하여 핵심 키워드를 도출했다. 도출된 결과를 매년 상반기와 하반기 시점에 보안업체나, 정보보호와 관련된 기관들이 보도하는 당해 보안이슈 키워드나 통계자료와 비교하여 공통으로 고려되는 보안 동향을 발견하고 차이점을 분석하여 추가로 보완해야 할 위험사항은 없는지 살펴보았다. 보안업체나, 정보보호와 관련된 기관들에서 보도된 주요 보안이슈와 IT 실무자들이 예측하는 미래의 보안 우려 사항을 종합적으로 분석하여 발견된 보완점을 현존하는 4차 산업혁명 시대의 보안위협에 대비하고자 한다.

Access Policy Transfer Between Active Nodes Using Identities

  • Kim, Young-Soo;Han, Jong-Wook;Seo, Dong-Il;Sohn, Seung-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2178-2181
    • /
    • 2003
  • Active networks allow active node’s functionality to be extended dynamically through the use of active extensions. This flexible architecture facilitates the deployment of new network protocols and services. However, the active nature of a network also raises serious safety and security concerns. These concerns must be addressed before active networks can be deployed. In this paper we look at how we can control active extension’s access to different active nodes. Specifically, the authentication between active nodes is very important in this case. We use unique identity each node has for transferring access policies between active nodes. In this paper, we suggest a new method of transferring access policies performing authentications using identities between active nodes.

  • PDF

A Review of Security Threats of Internet of Things

  • Nargis Jamal;Sataish Riaz;Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.99-108
    • /
    • 2024
  • The Internet of Things (IoT) is a novel concept that allows a large number of objects to be connected to the Internet while also allowing them to be controlled remotely. The Internet of Things is extensive and has become an almost inseparable part of our daily lives. Users' personal data is frequently obtained by these linked gadgets and stored online. In recent years, the security of acquired data has become a major concern. As devices grow more linked, privacy and security concerns grow more pressing, and they must be addressed as soon as possible. IoT implementations and devices are particularly vulnerable to attacks that might adversely affect customer security and privacy, which might have an impact on their practical utility. The goal of this study is to bring attention to the security and privacy concerns that exist in IoT systems. To that purpose, the paper examines security challenges at each level of the IoT protocol stack, identifies underlying impediments and critical security requirements, and provides a rapid overview of available security solutions for securing IoT in a layered environment.

Enhancing Cyber-Physical Systems Security: A Comprehensive SRE Approach for Robust CPS Methodology

  • Shafiq ur Rehman
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.40-52
    • /
    • 2024
  • Cyber-Physical Systems (CPS) are introduced as complex, interconnected systems that combine physical components with computational elements and networking capabilities. They bridge the gap between the physical world and the digital world, enabling the monitoring and control of physical processes through embedded computing systems and networked communication. These systems introduce several security challenges. These challenges, if not addressed, can lead to vulnerabilities that may result in substantial losses. Therefore, it is crucial to thoroughly examine and address the security concerns associated with CPS to guarantee the safe and reliable operation of these systems. To handle these security concerns, different existing security requirements methods are considered but they were unable to produce required results because they were originally developed for software systems not for CPS and they are obsolete methods for CPS. In this paper, a Security Requirements Engineering Methodology for CPS (CPS-SREM) is proposed. A comparison of state-of-the-art methods (UMLSec, CLASP, SQUARE, SREP) and the proposed method is done and it has demonstrated that the proposed method performs better than existing SRE methods and enabling experts to uncover a broader spectrum of security requirements specific to CPS. Conclusion: The proposed method is also validated using a case study of the healthcare system and the results are promising. The proposed model will provide substantial advantages to both practitioners and researcher, assisting them in identifying the security requirements for CPS in Industry 4.0.

그레이박스를 사용한 컴포넌트의 관심사 분리 보안 모델 (Separation of Concerns Security Model of Component using Grey Box)

  • 김영수;조선구
    • 한국컴퓨터정보학회논문지
    • /
    • 제13권5호
    • /
    • pp.163-170
    • /
    • 2008
  • 컴포넌트에 대한 의존도 및 활용도가 증가하면서 컴포넌트의 보안성 강화를 위한 필요성이 증가하고 있다. 컴포넌트는 재사용을 통한 소프트웨어의 개발 생산성을 향상시키는 이점을 제공한다. 이러한 이점에도 불구하고 컴포넌트의 보안 취약성은 재사용에 제한을 한다. 이의 개선을 위해 컴포넌트의 보안성을 높이는 경우에 가장 문제가 되는 부분이 재사용성에 대한 제한이 확대된다는 것이다. 따라서 컴포넌트의 재사용성과 보안성을 동시에 고려하는 컴포넌트의 모델이 제공되어야 한다. 이의 해결책으로 정보은폐와 수정의 용이성을 제공하여 보안성과 재사용을 확대할 수 있도록 재사용 모델을 결합하고 포장 및 애스펙트 모델을 통합한 컴포넌트 재사용 확대를 위한 관심사의 분리보안 모델을 제안하고 응용시스템을 구축하여 모델의 적합성을 검증하였다. 이의 응용은 핵심 및 보안 관심사의 분리를 통한 컴포넌트 기능의 확장과 수정의 용이성을 제공함으로써 보안성을 높이는 동시에 재사용성을 확대한다.

  • PDF

Fuzzy AHP를 적용한 클라우드 컴퓨팅 환경에서 보안 속성의 상대적 중요도 평가 (Relative priority evaluation of security attributes in cloud computing using fuzzy AHP)

  • 최철림;송영재
    • 한국항행학회논문지
    • /
    • 제15권6호
    • /
    • pp.1098-1103
    • /
    • 2011
  • 클라우드 컴퓨팅의 장점에도 불구하고 보안성에 대한 문제들이 많은 사용자들의 선택에 장애가 되고 있다. 본 논문에서는 클라우드 컴퓨팅의 보안성에 대한 ISO 7498-2 표준의 관련 속성들이 전체 보안 품질에 미치는 상대적 영향도를 평가하였다. 많은 요인들의 영향도를 객관적으로 평가하기 위하여 Fuzzy AHP(Analytic hierarchical process)를 적용하였다. 본 연구는 클라우드 컴퓨팅 서비스의 보안 관련 각 속성들의 상대적 중요성을 구체적으로 수치화 할 수 있었고, 클라우드 컴퓨팅 서비스의 효율적인 선택 및 개발에 필요한 관리 방법을 제시할 수 있었다.

CRF Based Intrusion Detection System using Genetic Search Feature Selection for NSSA

  • Azhagiri M;Rajesh A;Rajesh P;Gowtham Sethupathi M
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.131-140
    • /
    • 2023
  • Network security situational awareness systems helps in better managing the security concerns of a network, by monitoring for any anomalies in the network connections and recommending remedial actions upon detecting an attack. An Intrusion Detection System helps in identifying the security concerns of a network, by monitoring for any anomalies in the network connections. We have proposed a CRF based IDS system using genetic search feature selection algorithm for network security situational awareness to detect any anomalies in the network. The conditional random fields being discriminative models are capable of directly modeling the conditional probabilities rather than joint probabilities there by achieving better classification accuracy. The genetic search feature selection algorithm is capable of identifying the optimal subset among the features based on the best population of features associated with the target class. The proposed system, when trained and tested on the bench mark NSL-KDD dataset exhibited higher accuracy in identifying an attack and also classifying the attack category.