• Title/Summary/Keyword: Security Department

Search Result 4,701, Processing Time 0.034 seconds

A Case Study of Business Process Centered Risk Analysis for Information Technology Security (업무 프로세스 중심의 정보기술 보안 위험분석 적용 사례-클라이언트/서버 시스템 중심으로)

  • Ahn, Choon-Soo;Cho, Sung-Ku
    • IE interfaces
    • /
    • v.16 no.4
    • /
    • pp.421-431
    • /
    • 2003
  • Due to the increasing complexity of the information systems environment, modern information systems are facing more difficult and various security risks than ever, there by calling for a higher level of security safeguard. In this paper, an information technology security risk management model, which modified by adopting the concept of business processes, is applied to client/server distributed systems. The results demonstrate a high level of risk-detecting performance of the model, by detecting various kinds of security risks. In addition, a practical and efficient security control safeguard to cope with the identified security risks are suggested. Namely, using the proposed model, the risks on the assets in both of the I/O stage(on client side) and the request/processing stage(on server side), which can cause serious problems on business processes, are identified and the levels of the risks are analyzed. The analysis results show that maintenance of management and access control to application systems are critical in the I/O stage, while managerial security activities including training are critical in the request/processing stage.

Development and Validation of Food Security Measure (식품 보장 측정의 개발과 타당도 연구)

  • Kim, Ki-Rang;Kim, Mi-Kyung
    • Journal of Nutrition and Health
    • /
    • v.42 no.4
    • /
    • pp.374-385
    • /
    • 2009
  • This study aims to develop an index of food security in order to assess food security status in Korea and to evaluate reliability and validity of the index. The index of food security was developed based on the US Household Food Security Survey Module (US-HFSS). After the US-HFSS was translated and back-translated, it was evaluated and modified by a focus interview for experts. The developed Korean Household Food Security Survey Module (K-HFSS) was tested by cognitive interviews and a pretest for general community population to assess its application for Korean population. For the reliability and validity of K-HFSS, the survey was conducted with 300 adults aged 40 years or more living in a rural community and 212 infants and toddlers living in an urban community. The reliability was assessed by Cronbach' alpha and the validity was evaluated by content validity, construct validity, and criterion-related validity. The questionnaire items of K-HFSS were partly modified, accounting for Korean social and cultural backgrounds and adapted by general community population. The reliability was relatively high, showing Cronbach' alpha coefficients ranged from 0.80 (for adults) to 0.87 (for infants and toddlers). The content and construct validities were all acceptable. The result of criterion-related validity showed that food security status was significantly related to the household income level. In conclusion, the K-HFSS would be used as a reliable and valid instrument to assess food security status in parts of the Korean population.

The Study of Information Security Technologies for Security Incidents in Online Game Service (게임 서비스 침해유형에 따른 기술적 대응방안 연구)

  • Chang, Hang-Bae;Kim, Kyung-Kyu;Lee, Si-Jin
    • Information Systems Review
    • /
    • v.9 no.3
    • /
    • pp.83-98
    • /
    • 2007
  • This study focused on online game security, which has been considered relatively insignificant when compared to the online game industry's rapid growth. In this study, the state of security incidents in the Korean game industry and security solutions for such cases were examined. At first the security incidents were classified according to the type of game security infringement. Based upon this classification, this study analyzed the causes that give rise to infringement of online game security, and developed technical solutions for such cases. Finally, this study verified whether or not these technical solutions could be applied to online game sites.

The Effect of Attachment Security on Preschoolers' Perspective Taking: Executive Function as a Mediator (유아의 애착안정성이 조망수용에 미치는 영향: 실행기능의 매개효과를 중심으로)

  • Park, Ha-Yeon;Yi, Soon-Hyung
    • Korean Journal of Child Studies
    • /
    • v.37 no.6
    • /
    • pp.19-33
    • /
    • 2016
  • Objective: This study aimed to examine the prospective links among perspective taking, attachment security, and executive function and the mediating role of executive function on the relationship between attachment security and perspective taking. Methods: The participants included 147 preschoolers living in Gyeonggi. The data-analysis methods included descriptive statistics, independent t-tests, one-way ANOVAs, Pearson's correlation analysis, hierarchical multiple regression analysis, and the Sobel test. Results: First, preschoolers' perspective taking was significantly related to attachment security, and executive function. Furthermore, there was a significant association between attachment security and executive function. As expected, the correlations were positive in all cases. Second, the effects of attachment security on intention and emotion perspective takings were fully mediated by executive function when holding children's age and vocabulary constant. However, executive function did not predict thought perspective taking, whereas attachment security did. Conclusion: Given that parent-child attachment security might play an important role in child cognitive and socio-cognitive development, parents' endeavors to enhance the quality of the attachment relationship could be a fruitful path for preschoolers' developing executive capacities and perspective taking.

A practical challenge-response authentication mechanism for a Programmable Logic Controller control system with one-time password in nuclear power plants

  • Son, JunYoung;Noh, Sangkyun;Choi, JongGyun;Yoon, Hyunsoo
    • Nuclear Engineering and Technology
    • /
    • v.51 no.7
    • /
    • pp.1791-1798
    • /
    • 2019
  • Instrumentation and Control (I&C) systems of nuclear power plants (NPPs) have been continuously digitalized. These systems have a critical role in the operation of nuclear facilities by functioning as the brain of NPPs. In recent years, as cyber security threats to NPP systems have increased, regulatory and policy-related organizations around the world, including the International Atomic Energy Agency (IAEA), Nuclear Regulatory Commission (NRC) and Korea Institute of Nuclear Nonproliferation and Control (KINAC), have emphasized the importance of nuclear cyber security by publishing cyber security guidelines and recommending cyber security requirements for NPP facilities. As described in NRC Regulatory Guide (Reg) 5.71 and KINAC RS015, challenge response authentication should be applied to the critical digital I&C system of NPPs to satisfy the cyber security requirements. There have been no cases in which the most robust response authentication technology like challenge response has been developed and applied to nuclear I&C systems. This paper presents a challenge response authentication mechanism for a Programmable Logic Controller (PLC) system used as a control system in the safety system of the Advanced Power Reactor (APR) 1400 NPP.

Effects of Information Security Education on the Practice of Information Security for the Youth (정보보호 교육이 청소년의 정보보호 실천에 미치는 영향)

  • Kang, Min-Seong;Kim, Tae-Sung;Kim, Taek-Young
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.2
    • /
    • pp.27-40
    • /
    • 2019
  • As reliance on information and communication becomes widespread, a variety of information dysfunctions such as hacking, viruses, and the infringement of personal information are also occurring. Korean adolescents are especially exposed to an environment in which they are experiencing information dysfunction. In addition, youth cybercrimes are steadily occurring. To prevent cybercrime and the damage caused by information dysfunction, information security practices are essential. Accordingly, the purpose of this study is to discuss the factors affecting the information security practices of Korean youths, considering information security education, perceived severity, and perceived vulnerability as leading factors of the theory of planned behavior. A questionnaire survey was administered to 118 middle and high school students. Results of the hypothesis test show that information security education affects perceived behavior control, and perceived severity affects attitude. Subjective norms, information security attitudes, and perceived behavioral control were found to influence adolescents' practices of information security. However, perceived vulnerabilities did not affect youths' information security attitudes. This study confirms that information security education can help youths to practice information security. In other words, information security education is important, and it is a necessary element in the information curriculum of contemporary youth. However, perceived vulnerability to youth information security threats did not affect information security attitudes. Consequently, we suggest that it is necessary to strengthen the contents of the information security education for Korean youths.

Vulnerability and Security Requirement Analysis on Security Token and Protection Profile Development based on Common Criteria Version 3.1 (보안토큰의 취약성/보안요구사항 분석 및 CC v3.1 기반 보호프로파일 개발)

  • Kwak, Jin;Hong, Soon-Won;Yi, Wan-Suck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.139-150
    • /
    • 2008
  • Recently, financial institutes and industrial companies are adopted to security token such as OTP, smart card, and USB authentication token and so on for secure system management and user authentication. However, some research institutes have been introduced security weaknesses and problems in security tokens. Therefore, in this paper, we analyses of security functions and security requirements in security token performed by analyses of standardization documents, trends, security problems, attack methods for security tokens. Finally, we propose a CC v.3.1 based security token protection profile.

Mobile IPv6 Problem with Firewalls (Mobile IPv6 환경에서 방화벽 사용에 관한 문제점)

  • Ha Dong-Joo;Youm Heung-Youl
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.741-744
    • /
    • 2006
  • Mobile IPv6은 방화벽의 사용을 전혀 고려하지 않은 채 설계되었다. 그렇기 때문에 방화벽을 사용하는 네트워크에서는 정상적으로 동작하지 않는 문제가 생긴다. 본 논문에서는 일반적인 방화벽의 패킷 판단에 사용되는 상태테이블에 관하여 설명하고, Mobile IPv6 환경에서 방화벽을 사용함으로써 생기는 문제점을 알아본 뒤 향후 Mobile IPv6 환경에서의 방화벽 사용에 관한 연구의 방향을 제안한다.

  • PDF

The Effect of Security Awareness Training on the Use of Biometric Authentication: Focusing on the Protection Motivational Behaviors

  • Jung, Seungmin;Park, Joo Yeon
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.2
    • /
    • pp.1-21
    • /
    • 2020
  • The purpose of this study is to investigate the behavioral factors affecting the security attitude and intention to use biometrics password based on the protection motivation theory. This study also investigates security awareness training to understand trust, privacy, and security vulnerability regarding biometric authentication password. This empirical analysis reveals security awareness training boosts the protection motivational factors that affect on the behavior and intention of using biometric authentication passwords. This study also indicates that biometric authentication passwords can be used when the overall belief in a biometric system is present. After all, security awareness training enhances the belief of biometric passwords and increase the motivation to protect security threats. The study will provide insights into protecting security vulnerability with security awareness training.

Internal and External Characteristics of Information Security Officers Affecting Organization's Information Security Performance (조직 정보보호성과에 영향을 미치는 정보보호담당임원의 내·외적 특성)

  • Oh, Ha-Kyeong;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.4
    • /
    • pp.1-19
    • /
    • 2020
  • Infringement of information security has caused the corporate image to be damaged and share price to fall, and it is emerging as an organizational risk. The value of information assets in enterprises has led to a higher level of security than in the past. As a result, companies are aware of the need for officers to protect information and to oversee a security management system. However, despite the growing importance of information security officers, there is a lack of research on their roles and characteristics. This study validates the relationship between determinants that affect the performance of information security. And a structural equation model was presented and empirically analyzed to see the impact of the internal and external characteristics of the staff in charge of information security on the organization's information security performance.