• Title/Summary/Keyword: Security Data Analysis

Search Result 2,275, Processing Time 0.027 seconds

Analysis and Design of Security Feature in IMT-2000 (IMT-2000 이동통신시스템의 보안기능 요구 분석 및 설계)

  • 권수근;신경철;김진업;김대식
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.469-472
    • /
    • 2000
  • Security-related issues in mobile communications are increasing. The security requirements of mobile communications for the mobile users include authentication of the mobile user, the data confidentiality, the data confidentiality and the location privacy of mobile user. These services require security features compatible with the wireline networks. However, wireless networks have many restrictions compare to wireline networks such as the limited computational capability of mobile equipment and limited resource(bandwidth) between a mobile user and a fixed network. So, security features for IMT-2000 are designed to meet the limited capacity. In this paper, we analyze the required security features and mechanism, and design network access security feature effective for IMT-2000 Systems. The design includes security functions allocation to each system. Finally, discuss the computational power of each system based on at]coated functions to it

  • PDF

Meta-Analysis of Healthcare Information Security Education Effect for Life-care Promotion (라이프 케어 증진을 위한 의료정보보안 교육 효과 메타 분석)

  • Song, Ji-Young;Lee, Eun-Won
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.3
    • /
    • pp.75-82
    • /
    • 2020
  • It is important to secure patient healthcare information in medical institutions. Education can enhance healthcare information security practice. The purpose of this study is to investigate the effect size of the correlation between healthcare information security education and healthcare information security practice in medical institutions. Systematic Review and Meta-Analysis were used for this study. Data were collected from January 1, 2010 to July 31, 2019 through DBpia, RISS, NDSL. Four studies were eligible for inclusion in the analysis. Data were analyzed with R. The results of the Meta-Analysis demonstrated statistically significant large effect size of correlation with education and practice. Based on the results of this study, we will be able to understand the importance of healthcare information security education in medical institutions and use them as a basis for developing healthcare information security education programs.

Network intrusion detection method based on matrix factorization of their time and frequency representations

  • Chountasis, Spiros;Pappas, Dimitrios;Sklavounos, Dimitris
    • ETRI Journal
    • /
    • v.43 no.1
    • /
    • pp.152-162
    • /
    • 2021
  • In the last few years, detection has become a powerful methodology for network protection and security. This paper presents a new detection scheme for data recorded over a computer network. This approach is applicable to the broad scientific field of information security, including intrusion detection and prevention. The proposed method employs bidimensional (time-frequency) data representations of the forms of the short-time Fourier transform, as well as the Wigner distribution. Moreover, the method applies matrix factorization using singular value decomposition and principal component analysis of the two-dimensional data representation matrices to detect intrusions. The current scheme was evaluated using numerous tests on network activities, which were recorded and presented in the KDD-NSL and UNSW-NB15 datasets. The efficiency and robustness of the technique have been experimentally proved.

The Effect on Professional Ethic, Organizational Trust and Job Satisfaction among Private Security Guard (민간경비원의 직업윤리의식이 조직신뢰, 직무만족에 미치는 영향)

  • Chung, Hun;Kang, Jin-Hyung
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.7-28
    • /
    • 2013
  • Based on the status of which the research is not active and the analysis is not progressed, the purpose of this study life up pride, value and professional ethic of private security guard. Also, through this research, it offers the effect on professional ethic, organizational trust and job satisfaction. The data collection and survey are taken by the private security business members who work staff member or manager. They are surveyed with convenience sampling that among 500 data, 46 data which are thought to be answered insincerely or lack are excluded, so the total of 454 answered data are included in the final analysis. After coding and input process, the data is analyzed by factor analysis, reliability analysis, correlation analysis and multiple regression analysis using window SPSS 19.0 version. Significance level is 0.05. The conclusion that has been made based on the statistical analysis results are the followings. Professional ethic has a positive impact on organizational trust, job satisfaction. The educational training of the company is connected job satisfaction resultantly. Also the professional ethics education will improve the ability of the individual. Finally, the professional ethics raises a job satisfaction. Also, Organizational trust has a positive impact on job satisfaction. This the while to agree with a research result about the other type of business worker who is researched. In order raising the job satisfaction, the effort for raising a organizational trust is necessary.

  • PDF

Stock Forecasting Using Prophet vs. LSTM Model Applying Time-Series Prediction

  • Alshara, Mohammed Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.185-192
    • /
    • 2022
  • Forecasting and time series modelling plays a vital role in the data analysis process. Time Series is widely used in analytics & data science. Forecasting stock prices is a popular and important topic in financial and academic studies. A stock market is an unregulated place for forecasting due to the absence of essential rules for estimating or predicting a stock price in the stock market. Therefore, predicting stock prices is a time-series problem and challenging. Machine learning has many methods and applications instrumental in implementing stock price forecasting, such as technical analysis, fundamental analysis, time series analysis, statistical analysis. This paper will discuss implementing the stock price, forecasting, and research using prophet and LSTM models. This process and task are very complex and involve uncertainty. Although the stock price never is predicted due to its ambiguous field, this paper aims to apply the concept of forecasting and data analysis to predict stocks.

Analysis on Cyber Security and Its Challenges to Society

  • Shashank Mishra;Raghav Sandhane
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.141-152
    • /
    • 2024
  • Cyber security plays an important role in the field of IT industry and other industry too. Whenever we talk about cyber security, the word cybercrime pops out. Cybercrime is the biggest issues we are facing right now. Every 39 seconds an attacker is hacking something. Since 2008 to 2019 there are more than 8800 data breach cases is being found or filed. Even as we are aware of cybercrime and its stats, only 5% organization are fully secured and other 95% are not fully secured. According to survey 56% organization have weak controls. Basically they are not secured. Apart from taking measures cyber security are facing huge challenges or disturbs to many. This paper mainly focuses on dare to cyber security and also center of attraction is cyber security expertise, morals with changing in technology with time. [1]

Analysis of related words for each private security service through collection of unstructured data

  • Park, Su-Hyeon;Cho, Cheol-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.219-224
    • /
    • 2020
  • The purpose of this study is mainly to provide theoretical basis of private security industry by analyzing the perception and flow of private security from the press-released materials according to periodic classification and duties through 'Big Kinds', a website of analyzing news big data. The research method has been changed to structured data to allow an analysis of various scattered unstructured data, and the keywords trend and related words by duties of private security were analyzed in growth period of private security. The perception of private security based on the results of the study was exposed a lot by the media through various crimes, accidents and incidents, and the issues related permanent position. Also, it tended to be perceived as a simple security guard, not recognized as the area of private security, and judging from the high correlation between private security and police, it was recognized not only as a role to assist the police force, but also as a common agent in charge of the public peace. Therefore, it should objectively judge the perception of private security, and through this, it is believed that it should be a foundation for recognizing private security as a main agent responsible for the safety of the nation and maintaining social orders.

ILVA: Integrated audit-log analysis tool and its application. (시스템 보안 강화를 위한 로그 분석 도구 ILVA와 실제 적용 사례)

  • 차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.13-26
    • /
    • 1999
  • Widespread use of Internet despite numerous positive aspects resulted in increased number of system intrusions and the need for enhanced security mechanisms is urgent. Systematic collection and analysis of log data are essential in intrusion investigation. Unfortunately existing logs are stored in diverse and incompatible format thus making an automated intrusion investigation practically impossible. We examined the types of log data essential in intrusion investigation and implemented a tool to enable systematic collection and efficient analysis of voluminous log data. Our tool based on RBDMS and SQL provides graphical and user-friendly interface. We describe our experience of using the tool in actual intrusion investigation and explain how our tool can be further enhanced.

The Effect of the Department Satisfaction of the College Students Majoring in Security on the Career Expectation Consciousness (경호전공대학생의 학과만족이 직업기대의식에 미치는 영향)

  • Kim, Jin-Hwan;Cho, Cheol-Kyu
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.59-69
    • /
    • 2014
  • The purpose of this study is to investigate an effect of the department satisfaction of college students majoring in security on the career expectation consciousness, and through this to propose basic data to help college students prepare positive school life and career and increase school life adaptation; doing this, it is to investigate the cause to promote not only their development but also school development. As of 2013, I set up a population targeting female and male college students majoring in security at Y University located in Y City, Gyeonggi Province, K University in G City, North Gyeongsang Province, and H University in C City, South Chungcheong Province and conducted study targeting the total 352 students using the random sampling method. The research tool was questionnaires, which I used by recomposing on the basis of the precedent studies at home and abroad. Regarding data processing, I used SPSS WIN 18.0 and carried out frequency analysis, one-way analysis of duncan variance, post hoc analysis, reliability analysis, factorial analysis, correlation analysis and multiple regression analysis. Through the above research methods and data analysis according to the procedures I drew conclusions as follows: First, the department satisfaction according to demographic characteristics of the college students majoring in security had a partially significant difference. Second, the career expectation according to demographic characteristics of the college students majoring in security had a partially significant difference. Third, the effect of the department satisfaction of the college students majoring in security on the career expectation consciousness was partial.

The Effects of Security Agents' Job Stresses on Coping Strategy: Focussing on Moderating Effects of Five Personality Factors (시큐리티 요원의 직무스트레스가 대처행동에 미치는 영향 -성격5요인의 조절효과-)

  • Kim, Eui-Young;Lee, Jong-Hwan;Cho, Sung-Jin
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.69-80
    • /
    • 2016
  • The purpose of this study is to examine the effects of job stress factors on Coping Strategy' turnover intention, and to analyze the moderating effects of five personality factors between each job stress factor and turnover intention. To achieve this purpose, this study surveyed users of the Seoul and Gyeonggi in based on cluster sampling method. A total of 262 samples were used for this study, except 18 erroneous samples dropped. For the data process of the questionnaire, each answer content was coded and an element analysis, credibility analysis, frequency analysis, co-relationship analysis and regression analysis were performed using the SPSS version 18.0 of Angel for Windows. Through the data analysis following the research methods above, the conclusion was acquired as follows: First, thejob stress of the security personnel affect coping behavior. Second, in the effects of Security Agents Job Stress on Coping Strategy, Five Personality Factors showed moderating effects.