• Title/Summary/Keyword: Security Domain

Search Result 509, Processing Time 0.028 seconds

Communication Models and Performance Evaluation for the Delivery of Data and Policy in a Hybrid-Type Intrusion Detection System (혼합형 침입 탐지 시스템에서 데이터 및 정책 전달 통신 모델과 성능 평가)

  • Jang, Jung-Sook;Jeon, Yong-Hee;Jang, Jong-Soo;Sohn, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.727-738
    • /
    • 2003
  • Much research efforts are being exerted for the study of intrusion detection system(IDS). However little work has been for the communication medels and performance eveluation of the IDS. Here we present a communication framework for doing hybrid intrusion detection in which agents are used for local intrusion detections with a centralized data anaysis componenta for a global intrusion detection at multiple domains environment. We also assume the combination of host-based and network-based intrusion detection systems in the oberall framework. From the local domain, a set of information such as alert, and / or log data are reported to the upper level. At the root of the hierarchy, there is a global manager where data coalescing is performed. The global manager delivers a security policy to its lower levels as the result of aggregation and correlation of intrusion detection alerts. In this paper, we model the communication mechanisms for the hybrid IDS and develop a simular using OPNET modeller for the performance evaluation of transmission capabillities for the delivery of data and policy. We present and compare simulation results based on several scenarios focuding on communication delay.

Correlation of Occupational Stress Index with 24-hour Urine Cortisol and Serum DHEA Sulfate among City Bus Drivers: A Cross-sectional Study

  • Du, Chung-Li;Lin, Mia Chihya;Lu, Luo;Tai, John Jen
    • Safety and Health at Work
    • /
    • v.2 no.2
    • /
    • pp.169-175
    • /
    • 2011
  • Objectives: The questionnaire of occupational stress index (OSI) has been popular in the workplace, and it has been tailored for bus drivers in Taiwan. Nevertheless, its outcomes for participants are based on self-evaluations, thus validation by their physiological stress biomarker is warranted and this is the main goal of this study. Methods: A cross-sectional study of sixty-three city bus drivers and fifty-four supporting staffs for comparison was conducted. Questionnaire surveys, 24-hour urine cortisol testing, and blood draws for dehydroepiandrosterone-sulfate (DHEA-S) testing were performed. The measured concentrations of these biological measures were logarithmically transformed before the statistical analysis where various scores of stressor factors, moderators, and stress effects of each OSI domain were analyzed by applying multiple linear regression models. Results: For drivers, the elevated 24-hour urine cortisol level was associated with a worker's relationship with their supervisor and any life change events in the most recent 3 months. The DHEA-S level was higher in drivers of younger age as well as drivers with more concerns relating to their salary and bonuses. Non-drivers showed no association between any stressor or satisfaction and urine cortisol and blood DHEA-S levels. Conclusion: Measurements of biomarkers may offer additional stress evaluations with OSI questionnaires for bus drivers. Increased DHEA-S and cortisol levels may result from stressors like income security. Prevention efforts towards occupational stress and life events and health promotional efforts for aged driver were important anti-stress remedies.

Exhaustion of Social Workers for Organizational Effectiveness for the Fusion Age: Mediation Effectiveness of Empowerment (융합시대를 위한 사회복지사의 소진이 조직효과성에 미치는 융합연구 : 임파워먼트의 매개효과)

  • Kim, San Yong
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.361-366
    • /
    • 2018
  • In this study, 200 social workers in Seoul and Gyeonggi area were surveyed using convenience extraction method. Data were analyzed by frequency, reliability, correlation, and regression analysis using IBM SPSS Statistics 20, and Sobel test was performed. The purpose of this study was to investigate the effects of empowerment on the relationship between exhaustion and organizational effectiveness of social workers and to provide basic data for improving organizational effectiveness. The results of the study are as follows. Empowerment was found to be mediated in the relationship between exhaustion and job satisfaction, which is a sub - area of organizational effectiveness. Empowerment was found to be mediated in the relationship between exhaustion and turnover intention, which is a sub - domain of organizational effectiveness. Therefore, it is necessary to have a resting place that gives a sense of security to the exhausted social worker rather than granting authority for the social welfare organization.

Proposal of the development plan for the ROK military data strategy and shared data model through the US military case study (미군 사례 고찰을 통한 한국군 데이터 전략 및 공유 데이터 모델 개발방안 제안)

  • Lee, Hak-rae;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.757-765
    • /
    • 2021
  • To carry out multi-domain operations included in the U.S. Department of Defense's national security strategy in 2018, timely data sharing between C4I systems is critical. Several studies of the Korean military have also raised the problems of interface and standardization between C4I systems, and it is necessary to establish a new plan to solve this problem. In this study, a solution to the problem was derived through case analysis that the U.S. Department of Defense has been pursuing for about 20 years to implement the data strategy after establishing the data strategy in 2003. and by establishing a data strategy suitable for the ROK military C4I system operating environment, developing a data model, selecting a standard for data sharing, and proposing a shared data development procedure, we intend to improve the data sharing capability between ROK military C4I systems.

Improving the Decision-Making Process in the Higher Learning Institutions via Electronic Records Management System Adoption

  • Mukred, Muaadh;Yusof, Zawiyah M.;Mokhtar, Umi Asma';Sadiq, Ali Safaa;Hawash, Burkan;Ahmed, Waleed Abdulkafi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.90-113
    • /
    • 2021
  • Electronic Records Management System (ERMS) is a computer program or set of applications that is utilized for keeping up to date records along with their storage. ERMS has been extensively utilized for enhancing the performance of academic institutions. The system assists in the planning and decision-making processes, which in turn enhances the competencies. However, although ERMS is significant in supporting the process of decision-making, the majority of organizations have failed to take an initiative to implement it, taking into account that are some implementing it without an appropriate framework, and thus resulted in the practice which does not meet the accepted standard. Therefore, this study identifies the factors influencing the adoption of ERMS among employees of HLI in Yemen and the role of such adoption in the decision-making process, using the Unified Theory of Acceptance and Use of Technology (UTAUT) along with Technology, Organization and Environment (TOE) as the underpinning theories. The study conducts a cross-sectional survey with a questionnaire as the technique for data collection, distributed to 364 participants in various Yemeni public Higher Learning Institutions (HLI). Using AMOS as a statistical method, the findings revealed there are significant and positive relationships between technology factors (effort expectancy, performance expectancy, IT infrastructure and security), organizational factors (top management support, financial support, training, and policy),environmental factors (competitiveness pressure, facilitating conditions and trust) and behavioral intention to adopt ERMS, which in return has a significant relationship with the process of decision-making in HLI. The study also presents a variety of theoretical and empirical contributions that enrich the body of knowledge in the field of technology adoption and the electronic record's domain.

How to Respond to Complex Disasters on Future Megacities at the Government Level (미래 메가시티의 복합재난과 범정부 차원의 대응 방향)

  • Moon, Sang Jun;Cho, Sang Keun;Jung, Min-Sub;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.211-215
    • /
    • 2021
  • The number of megacities are increasing, due to the global urbanization. Along with this change, climate change, social development and technology advance make the calamities complicated and more devastating. Especially, megacities are hyper-netted, hyper-connected and hyper-converged with population more than 10 million and their domain. When calamities break out, the damage will be aggravated for they lead to another ones. Since megacities are the center of politics, economics and culture of a nation. so when complex disaster break out in megacities, this may be developed to a peril to the national security. Therefore, pan-government effort must be concentrated in preparing abilities to forecast, react, rapid response and resilience.

Development of a Portable Detection System for Simultaneous Measurements of Neutrons and Gamma Rays (중성자선과 감마선 동시측정이 가능한 휴대용 계측시스템 개발에 관한 연구)

  • Kim, Hui-Gyeong;Hong, Yong-Ho;Jung, Young-Seok;Kim, Jae-Hyun;Park, Sooyeun
    • Journal of radiological science and technology
    • /
    • v.43 no.6
    • /
    • pp.481-487
    • /
    • 2020
  • Radiation measurement technology has steadily improved and its usage is expanding in various industries such as nuclear medicine, security search, satellite, nondestructive testing, environmental industries and the domain of nuclear power plants (NPPs). Especially, the simultaneous measurements of gamma rays and neutrons can be even more critical for nuclear safety management of spent nuclear fuel and monitoring of the nuclear material. A semiconductor detector comprising cadmium, zinc, and tellurium (CZT) enables to detect gamma-rays due to the significant atomic weight of the elements via immediate neutron and gamma-ray detection. Semiconductor sensors might be used for nuclear safety management by monitoring nuclear materials and spent nuclear fuel with high spatial resolution as well as providing real-time measurements. We aim to introduce a portable nuclide-analysis device that enables the simultaneous measurements of neutrons and gamma rays using a CZT sensor. The detector has a high density and wide energy band gap, and thus exhibits highly sensitive physical characteristics and characteristics are required for performing neutron and gamma-ray detection. Portable nuclide-analysis device is used on NPP-decommissioning sites or the purpose of nuclear nonproliferation, it will rapidly detect the nuclear material and provide radioactive-material information. Eventually, portable nuclide-analysis device can reduce measurement time and economic costs by providing a basis for rational decision making.

Hybrid Trust Computational Model for M2M Application Services (M2M 애플리케이션 서비스를 위한 하이브리드형 신뢰 평가 모델)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.53-62
    • /
    • 2020
  • In the end-user domain of an IoT environment, there are more and more intelligent M2M devices that provide resources to create and share application services. Therefore, it can be very useful to manage trust by transferring the role of the existing centralized service provider to end users in a P2P environment. However, in a decentralized M2M computing environment where end users independently provide or consume services, mutual trust building is the most important factor. This is because malicious users trying to build malfunctioning services can cause security problems in M2M computing environments such as IoT. In this paper, we provide an integrated analysis and approach for trust evaluation of M2M application services, and an optimized trust evaluation model that can guarantee reliability among users of the M2M community.

Analysis and implications on Ukrainian Military Intelligence Team's Decapitation Operation (우크라이나 군사정보팀의(Military Intelligence Team) 핀셋작전 분석과 시사점)

  • Cho, Sang Keun;Zhytko, Andrii;Park, Sung Jun;Kwon, Bum June;Seo, Kanh ll;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.435-439
    • /
    • 2022
  • ROK has a lot to benchmark from how Ukraine is fighting Russia back with its tactical wins. They have taken a targeted strategy to strike Russia's top generals with high precision. To carry out this strategy, Ukraine is operating a Special Operations Force, which utilizes US/NATO forces, civilian and own resources for maximum impact. Of note, they utilize Starlink for seamless connection from detection, decision-making to strike to maximize operational efficiency. As ROK faces security threat of weapons of mass destruction, Ukraine's military intelligence organization set-up, weapons system and operations can provide some guidance on how to leverage its various SOF as well.

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.