• Title/Summary/Keyword: Security Concerns

Search Result 413, Processing Time 0.026 seconds

Crop Science Approaches to Alleviate the Food Security Concerns in Korea

  • Hee-Jong Koh
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.8-8
    • /
    • 2022
  • Unstable crop production and distribution affected by climate change and COVID-19 pandemic has raised the food security concerns worldwide. In particular, Russia's invasion to Ukraine has blocked the grain trade such as wheat and com to importing countries, which has aggravated the situation. Korea has relied on foreign imports for about 80% of domestic grain demand, raising great concerns on food security. Considering situations related to Korea's food security, some points in view of a crop scientist are suggested and discussed as follows; 1) Domestic production of major grain crops should be increased through encouraging farmers by appropriate governmental subsidy programs 2) International corporation should be strengthened and diversified for sustainable overseas agricultural development and for stable import even in case of food crisis and emergency. 3) Self-sufficiency target should be specified by law so that more budget investments could be put to alleviate the food security concerns. 4) Technologies for climate smart agriculture and for competitive agricultural products should be developed aided by social and governmental support.

  • PDF

Self-Driving and Safety Security Response : Convergence Strategies in the Semiconductor and Electronic Vehicle Industries

  • Dae-Sung Seo
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.25-34
    • /
    • 2024
  • The paper investigates how the semiconductor and electric vehicle industries are addressing safety and security concerns in the era of autonomous driving, emphasizing the prioritization of safety over security for market competitiveness. Collaboration between these sectors is deemed essential for maintaining competitiveness and value. The research suggests solutions such as advanced autonomous driving technologies and enhanced battery safety measures, with the integration of AI chips playing a pivotal role. However, challenges persist, including the limitations of big data and potential errors in semiconductor-related issues. Legacy automotive manufacturers are transitioning towards software-driven cars, leveraging artificial intelligence to mitigate risks associated with safety and security. Conflicting safety expectations and security concerns can lead to accidents, underscoring the continuous need for safety improvements. We analyzed the expansion of electric vehicles as a means to enhance safety within a framework of converging security concerns, with AI chips being instrumental in this process. Ultimately, the paper advocates for informed safety and security decisions to drive technological advancements in electric vehicles, ensuring significant strides in safety innovation.

Study on Security Considerations in the Cloud Computing (클라우드 컴퓨팅에서의 보안 고려사항에 관한 연구)

  • Park, Choon-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1408-1416
    • /
    • 2011
  • Cloud computing provides not only cost savings and efficiencies for computing resources, but the ability to expend and enhance services. However, cloud service users(enterprisers) are very concerned about the risks created by the characteristics of cloud computing. In this paper, we discuss major concerns about cloud computing environments including concerns regarding security. We also analyze the security concerns specifically, identify threats to cloud computing, and propose general countermeasures to reduce the security risks.

Concern and Prediction for Future Information Security expected by IT Executives (IT 실무자들이 전망하는 미래 정보보안의 우려와 예측)

  • Kim, Tae-Yang
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.117-122
    • /
    • 2018
  • In this paper, we review the security issues reported by the organizations every year and analyze the similarities and differences with the concerns that the practitioners engaged in the IT environment are concerned about the necessary security matters. Interviews and questionnaires were collected for practitioners working in various IT work environments such as government agencies, financial companies, general companies, airlines, etc. to gather their opinions on the concerns of future information security. We analyzed the collected opinions and derived key keywords. The results should be compared with the security issue keywords or statistical data reported by the security companies or related organizations in the first half and the second half of each year to find common security trends and to analyze the differences and supplement them I checked whether there was any danger. We will comprehensively analyze key security issues reported by security companies and information security related organizations and future security concerns predicted by IT practitioners to prepare for the security threats of the current era of the fourth industrial revolution.

Access Policy Transfer Between Active Nodes Using Identities

  • Kim, Young-Soo;Han, Jong-Wook;Seo, Dong-Il;Sohn, Seung-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2178-2181
    • /
    • 2003
  • Active networks allow active node’s functionality to be extended dynamically through the use of active extensions. This flexible architecture facilitates the deployment of new network protocols and services. However, the active nature of a network also raises serious safety and security concerns. These concerns must be addressed before active networks can be deployed. In this paper we look at how we can control active extension’s access to different active nodes. Specifically, the authentication between active nodes is very important in this case. We use unique identity each node has for transferring access policies between active nodes. In this paper, we suggest a new method of transferring access policies performing authentications using identities between active nodes.

  • PDF

A Review of Security Threats of Internet of Things

  • Nargis Jamal;Sataish Riaz;Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.99-108
    • /
    • 2024
  • The Internet of Things (IoT) is a novel concept that allows a large number of objects to be connected to the Internet while also allowing them to be controlled remotely. The Internet of Things is extensive and has become an almost inseparable part of our daily lives. Users' personal data is frequently obtained by these linked gadgets and stored online. In recent years, the security of acquired data has become a major concern. As devices grow more linked, privacy and security concerns grow more pressing, and they must be addressed as soon as possible. IoT implementations and devices are particularly vulnerable to attacks that might adversely affect customer security and privacy, which might have an impact on their practical utility. The goal of this study is to bring attention to the security and privacy concerns that exist in IoT systems. To that purpose, the paper examines security challenges at each level of the IoT protocol stack, identifies underlying impediments and critical security requirements, and provides a rapid overview of available security solutions for securing IoT in a layered environment.

Enhancing Cyber-Physical Systems Security: A Comprehensive SRE Approach for Robust CPS Methodology

  • Shafiq ur Rehman
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.40-52
    • /
    • 2024
  • Cyber-Physical Systems (CPS) are introduced as complex, interconnected systems that combine physical components with computational elements and networking capabilities. They bridge the gap between the physical world and the digital world, enabling the monitoring and control of physical processes through embedded computing systems and networked communication. These systems introduce several security challenges. These challenges, if not addressed, can lead to vulnerabilities that may result in substantial losses. Therefore, it is crucial to thoroughly examine and address the security concerns associated with CPS to guarantee the safe and reliable operation of these systems. To handle these security concerns, different existing security requirements methods are considered but they were unable to produce required results because they were originally developed for software systems not for CPS and they are obsolete methods for CPS. In this paper, a Security Requirements Engineering Methodology for CPS (CPS-SREM) is proposed. A comparison of state-of-the-art methods (UMLSec, CLASP, SQUARE, SREP) and the proposed method is done and it has demonstrated that the proposed method performs better than existing SRE methods and enabling experts to uncover a broader spectrum of security requirements specific to CPS. Conclusion: The proposed method is also validated using a case study of the healthcare system and the results are promising. The proposed model will provide substantial advantages to both practitioners and researcher, assisting them in identifying the security requirements for CPS in Industry 4.0.

Separation of Concerns Security Model of Component using Grey Box (그레이박스를 사용한 컴포넌트의 관심사 분리 보안 모델)

  • Kim, Young-Soo;Jo, Sun-Goo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.163-170
    • /
    • 2008
  • As the degree of dependency and application of component increases, the need to strengthen security of component is also increased as well. The component gives an advantage to improve development productivity through its reusable software. Even with this advantage, vulnerability of component security limits its reuse. When the security level of a component is raised in order to improve this problem, the most problematic issue will be that it may extend its limitation on reusability. Therefore, a component model concerning its reusability and security at the same time should be supplied. We suggest a Separation of Concerns Security Model for Extension of Component Reuse which is integrated with a wrapper model and an aspect model and combined with a reuse model in order to extend its security and reusability by supplying information hiding and easy modification, and an appropriate application system to verify the model's compatibility is even constructed. This application model gives the extension of component function and easy modification through the separation of conceits, and it raise its security as doll as extends its reusability.

  • PDF

Relative priority evaluation of security attributes in cloud computing using fuzzy AHP (Fuzzy AHP를 적용한 클라우드 컴퓨팅 환경에서 보안 속성의 상대적 중요도 평가)

  • Choi, Cheol-Rim;Song, Young-Jae
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1098-1103
    • /
    • 2011
  • In spite of many advantages of cloud computing, security concerns are a barrier in users' adopting the cloud service. In this paper, we evaluate relative priorities between security attributes of ISO 7498-2 standards affecting overall security quality in cloud computing. For an objective evaluation, the fuzzy AHP(Analytic hierarchical process) is applied. The evaluation results represented the relative priority with concrete number can be an effective management method to choose and develop the cloud computing service.

CRF Based Intrusion Detection System using Genetic Search Feature Selection for NSSA

  • Azhagiri M;Rajesh A;Rajesh P;Gowtham Sethupathi M
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.131-140
    • /
    • 2023
  • Network security situational awareness systems helps in better managing the security concerns of a network, by monitoring for any anomalies in the network connections and recommending remedial actions upon detecting an attack. An Intrusion Detection System helps in identifying the security concerns of a network, by monitoring for any anomalies in the network connections. We have proposed a CRF based IDS system using genetic search feature selection algorithm for network security situational awareness to detect any anomalies in the network. The conditional random fields being discriminative models are capable of directly modeling the conditional probabilities rather than joint probabilities there by achieving better classification accuracy. The genetic search feature selection algorithm is capable of identifying the optimal subset among the features based on the best population of features associated with the target class. The proposed system, when trained and tested on the bench mark NSL-KDD dataset exhibited higher accuracy in identifying an attack and also classifying the attack category.