• Title/Summary/Keyword: Security Evaluation Model

Search Result 389, Processing Time 0.026 seconds

A Study on the Fire Fighting General Index for Fire Fighting of Crowded Wooden Building Cultural Asset (군집 목조 건축문화재의 화재대응을 위한 소방방재 종합지수 연구)

  • Kwon, Heung-Soon;Lee, Jeong-Soo
    • Journal of architectural history
    • /
    • v.21 no.2
    • /
    • pp.37-52
    • /
    • 2012
  • This research has set up the fire fighting general index for Fire fighting of Crowded Wooden Building Cultural Asset which is composed of traditional wooden building instinct or complex. The results of this study are as follows. First, Fire fighting general index for crowded wooden building cultural asset, it is necessary to set fire fighting priority by considering fire risk and cultural asset characteristic and establish the system to cope with fire disaster in the most effective way by arranging facilities with restricted resource. Second, Fire risk is the index to draw fire and spread risk of cultural asset by applying index calculation processes such as fire load, burning velocity and ignition material spread characteristic to various aspects such as individual building and complex and combining their results. Cultural asset importance index consists of individual building evaluation, publicity security degree, area importance evaluation and historical landscape degree evaluation. Third, for each index combination process, weight of each index is drawn on the basis of AHP analysis result that is performed to the specialists of related fields. The formula to apply and combine it is prepared to apply the model to include meaning of each index and comparative importance degree.

Educational Needs Analysis of General Security Jobs in Physical Protection Field using the DACUM Technique (DACUM기법을 활용한 물리적방호 분야 일반보안 직무의 교육 요구분석)

  • Lee, Jin Gu;Jung, Il Chan;Park, Min Ju
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.234-246
    • /
    • 2021
  • The purpose of this study is to develop the main subjects of the job-based curriculum by deriving the job analysis results of general security job workers in the physical protection field responsible for responding to threats to nuclear materials and nuclear facilities. In the job analysis stage, FGI was conducted on 7 content experts to derive 8 duties and 55 tasks. In addition, knowledge and skills were drawn for each task. In the analysis of educational needs, surveys were conducted for workers in general security jobs to derive the top 25 educational priorities through t-test and Borich needs assess model. At the stage of selecting core tasks and organizing required/optional contents, 42 tasks, both above average or at least one of them, were derived as core tasks based on the result of evaluation of importance and difficulty ratings of 55 tasks through a questionaire. In addition, tasks applied to the top 25 rankings derived from Borich needs assess model were applied as the required contents when designing courses, and tasks which applied only one of them were selected as optional contents. At the stage of required/optional modules and educational contents, four required modules and five optional modules were derived by drifting similar tasks between the required and optional contents. Based on the above results, the study suggested academic and practical implications and future suggestions.

A Evaluation of Strategic Informed Trader Model with Broker (브로커가 존재하는 전략적 정보거래모형의 평가)

  • Kim, Sung-Tak
    • Korean Business Review
    • /
    • v.12
    • /
    • pp.103-118
    • /
    • 1999
  • Many security companies in Korea play the same role as the broker who can do dual trading in the American securities market. It seems that the proper model for the Korean market microstructure should contain the existence of broker. But the broker occupied little attention in U.S. until the early 1990. The purpose of this paper is to review and evaluate the strategic trader models of market microstructure theory which contain the broker as player. Three major models, Sarkar(1995), Chakravarty(1994), Chun, Oh, and Weller(1996) were compared and evaluated critically in the context of the Korean security market microstructure. The model of Sarkar(1995) was evaluated to be more appropriate for the Korean securities market context. Finally, limitations of this paper were indicated and some directions for the further research were suggested.

  • PDF

Efficiency of Financing High-Tech Industries: The Case of Kazakhstan

  • SADYKHANOVA, Gulnara;EREZHEPOVA, Aiman;NURMANOVA, Biken;AITBEMBETOVA, Aida;BIMENDIYEVA, Laila
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.4
    • /
    • pp.287-295
    • /
    • 2019
  • The study aims to build a model for evaluating the effectiveness of activities and the effectiveness of financial investments in high-tech industries in Kazakhstan. The development of high-tech industries plays an important role in the economic growth of a country. In this regard, it is relevant to study the effectiveness of financing the most important industry in Kazakhstan. The development of the high-tech sector ensures the efficient functioning of the national innovation system. High-tech enterprises are one of the competitive sectors that allow us to develop and implement leading-edge innovations with the goal of their subsequent commercialization domestically and abroad. The author defines the multicriteria of efficiency in a knowledge-based economy associated with achieving an economic effect with multivariate correlation of results with costs. A multivariate dynamic model, an integral indicator of performance, an integral indicator of cost-effectiveness is proposed. The assessment of the effectiveness of financial costs and performance indicators in all regions of Kazakhstan have the positive dynamics of indicators, as well as a high economic effect. The results of the study can be applied in regional management to adequately assess the effectiveness of high-tech organizations and the effectiveness of financial investments, contribution to ensuring the economic security of the region.

A Supervised Feature Selection Method for Malicious Intrusions Detection in IoT Based on Genetic Algorithm

  • Saman Iftikhar;Daniah Al-Madani;Saima Abdullah;Ammar Saeed;Kiran Fatima
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.49-56
    • /
    • 2023
  • Machine learning methods diversely applied to the Internet of Things (IoT) field have been successful due to the enhancement of computer processing power. They offer an effective way of detecting malicious intrusions in IoT because of their high-level feature extraction capabilities. In this paper, we proposed a novel feature selection method for malicious intrusion detection in IoT by using an evolutionary technique - Genetic Algorithm (GA) and Machine Learning (ML) algorithms. The proposed model is performing the classification of BoT-IoT dataset to evaluate its quality through the training and testing with classifiers. The data is reduced and several preprocessing steps are applied such as: unnecessary information removal, null value checking, label encoding, standard scaling and data balancing. GA has applied over the preprocessed data, to select the most relevant features and maintain model optimization. The selected features from GA are given to ML classifiers such as Logistic Regression (LR) and Support Vector Machine (SVM) and the results are evaluated using performance evaluation measures including recall, precision and f1-score. Two sets of experiments are conducted, and it is concluded that hyperparameter tuning has a significant consequence on the performance of both ML classifiers. Overall, SVM still remained the best model in both cases and overall results increased.

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

A study on Convergent & Adaptive Quality Analysis using DQnA model (데이터 품질 분석 모델(DQnA)을 이용한 융합적·적응적 품질 분석에 관한 연구)

  • Kim, Yong-Won
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.21-25
    • /
    • 2014
  • Now, almost enterprise is applying data analysis method using the information systems on based information technology. The data analysis is focusing on the Quality of the data affecting the decision-making of various companies. This is the result of the data quality is due to the important role in the various parts as well as the effective operation of the enterprise. In this study, we describe about the data quality assessment models that are currently being studied. Based on this, we describe about the adaptive DQnA model being utilized for data quality analysis, and discuss about the quality analysis using this method.

The Effect on Information Communication Ethics of Experience Type Smart Learning Contents Application for High School Information Security Education (고등학교 정보보안단원의 체험형 스마트교육 콘텐츠 적용 수업이 정보통신윤리의식에 미치는 영향)

  • Seo, Hyun-Jeong;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.19 no.6
    • /
    • pp.81-89
    • /
    • 2016
  • As the social and technical circumstance changes rapidly, passive learners who were knowledge-finders not only remember and regenerate about the given information but also critically grasp the phenomena of real life, and then also it became necessary for us to help cultivate the ability to solve the problem creatively in the new form of educational goal, educational content, educational methods and evaluation, educational environment. As a result, this study analyzes the smart learning education, fit the model of smart learning education training in high school information ethics parts, design the lesson that is proposal class of 'Information protection and Security' section, and develop the teaching and experience educational contents, furthermore, It is to investigate the impact on the ethics consciousness about information communications.

A Study on Weapon Systems Acquisition for the Use of Modeling & Simulation(M&S) (무기체계 획득을 위한 모델링 및 시뮬레이션(M&S) 활용에 관한 연구)

  • Lee, Pil-Jung;Lee, Young-Uk
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.11-17
    • /
    • 2011
  • The acquisition of weapons systems test and evaluation in the early stages of the acquisition process as a source of data used for modeling and simulation are being actively encouraged. Thus, in the reliability of weapon systems acquisition can be called the most important part, and M&S to apply for this test reliability and accuracy of the assessment can provide, test time and cost savings, the pre-and post-test predictions and available data can provide. In this study, theoretical study of M&S to acquire weapon systems used for the importance of M&S, acquired the characteristics of the model, utilization for weapon systems acquisition, and weapon systems acquisition review for an effective utilization of M&S tries to find out.

FuzzyGuard: A DDoS attack prevention extension in software-defined wireless sensor networks

  • Huang, Meigen;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3671-3689
    • /
    • 2019
  • Software defined networking brings unique security risks such as control plane saturation attack while enhancing the performance of wireless sensor networks. The attack is a new type of distributed denial of service (DDoS) attack, which is easy to launch. However, it is difficult to detect and hard to defend. In response to this, the attack threat model is discussed firstly, and then a DDoS attack prevention extension, called FuzzyGuard, is proposed. In FuzzyGuard, a control network with both the protection of data flow and the convergence of attack flow is constructed in the data plane by using the idea of independent routing control flow. Then, the attack detection is implemented by fuzzy inference method to output the current security state of the network. Different probabilistic suppression modes are adopted subsequently to deal with the attack flow to cost-effectively reduce the impact of the attack on the network. The prototype is implemented on SDN-WISE and the simulation experiment is carried out. The evaluation results show that FuzzyGuard could effectively protect the normal forwarding of data flow in the attacked state and has a good defensive effect on the control plane saturation attack with lower resource requirements.