• Title/Summary/Keyword: Security Evaluation System

Search Result 682, Processing Time 0.029 seconds

An Implementation and Performance Evaluation of IPsec System engaged IKEv2 Protocol Engine (IPsec System에서 IKEv2 프로토콜 엔진의 구현 및 성능 평가)

  • Kim, Sung-Chan;Chun, Jun-Ho;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.35-46
    • /
    • 2006
  • The current Internet Key Exchange protocol(IKE) which has been used for key exchange of security system was pointed out the faults of scalability, speed, efficiency and stability. In this research, we tried to resolve those faults, and implemented the newly designed IKEv2 protocol in the IPsec test bed system. In the trend of network expansion, the current Internet Key Exchange protocol has a limitation of network scalability, so we implemented the new Internet Key Exchange protocol as a recommendation of RFC proposal, so as to resolve the fault of the key exchange complexity and the speed of authentication process. We improved the key exchange speed as a result of simplification of complex key exchange phase, and increased efficiency with using the preexistence state value in negotiation phase.

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF

Romanian-Lexicon-Based Sentiment Analysis for Assesing Teachers' Activity

  • Barila, Adina;Danubianu, Mirela;Gradinaru, Bogdanel
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.43-50
    • /
    • 2022
  • The students' feedback is important to measure and improve teaching performance. Many teacher performance evaluation systems are based on responses to closed question, but the free text answers can contain useful information which had to be explored. In this paper we present a lexicon-based sentiment analysis to explore students' text feedback. The data was collected from a system for the evaluation of teachers by students developed and used in our university. The students comments are in Romanian language so we built a Romanian sentiment word lexicon. We used this to categorize the feeback text as positive, negative or neutral. In addition, we added a new polarity - indifferent - in order to categorize blank and "I don't answer" responses.

A Study on Improving the System for Qualification of Personal Guardian: Mainly on Practical Examinations (신변보호사 자격검정제도의 개선방안: 실기시험을 중심으로)

  • Ha, jeong hoon
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.277-293
    • /
    • 2020
  • The purpose of this study is to select the talented and competent personal caregiver personnel through a professional and rational inspection system, and to provide safer personal care services to the public so that the people who are eligible for service can lead a safe life. The purpose of this study is to cultivate qualified and competent personal guardian personnel and provide professional and stable services to the people so that the people who can use the service can lead a safer life. In order to grow into a system that meets the objectives of the personal guardian qualification screening system, it must be revised and supplemented from various evaluation methods. The improvement measures related to the practical test of the system for qualifying personal guardians are as follows. First, the fitness evaluation items should be added. Second, it is necessary to reestablish the test technology. (Remove technology that causes the second threat) (Adds skills that can be used as civilian status) Third, the fallout and application action must be added. Fourth, evaluation in various starting positions is necessary. Fifth, evaluation should be made by diversifying the distance and direction with the opponent.

Internet Service Evaluation System: A Design Science Research

  • Babunji, Lujen;Alzahrani, Shahad;Almarghalani, Shada;Babour, Amal;Bitar, Hind
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.35-44
    • /
    • 2022
  • The Internet is extremely important to accomplish numerous items, from education to businesses and entertainment. Therefore, the quality of its performance must be efficient. Nowadays, there is a lack of information available for users to choose a suitable Internet service. What information is available might be insufficient, inaccurate, or regularly updated. Accordingly, there is a need to develop an electronic system that enables users to evaluate their current Internet service subscription. Several factors are used as evaluation criteria in the system that affect users' decisions. In this paper, a prototype of a design science research project is proposed to address a few objectives. First, it can help Internet service users in Saudi Arabia to make the best decision for themselves regarding Internet services subscriptions. Second, it can assist the Saudi government to seek one of the 2030 vision goals: the digital transformation that depends on having a good Internet connection. The proposed solution is a promising one that would help Internet service users to make the best decision for themselves and choose the best Internet service that fits their needs. A qualitative method has been used to evaluate the efficiency and the utility of the proposed system prototype. The results showed the extent of participants' acceptance of the Internet Service Evaluation System.

A Study of Quality Metrics Process Design Methodology for Field Application Encryption under Network Security Environment (네트워크 보안 환경에서의 현장적용 중심 암호품질 만족도 평가 메트릭스 설계 프로세스)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.29-35
    • /
    • 2015
  • The network security encryption type is divided into two, one is point-to-point, second method is link type. The level of security quality attributes are a system security quality requirements in a networked environment. Quality attributes can be observed and should be able to be measured. If the quality requirements can be presented as exact figures, quality requirements are defined specifically setting quality objectives. Functional requirements in the quality attribute is a requirement for a service function which can be obtained through the encryption. Non-functional requirements are requirements of the service quality that can be obtained through the encryption. Encryption quality evaluation system proposed in this study is to derive functional requirements and non-functional requirements 2 groups. Of the calculating measure of the evaluation index in the same category, the associated indication of the quality measure of each surface should be created. The quality matrix uses 2-factor analysis of the evaluation for the associated surface quality measurements. The quality requirements are calculated based on two different functional requirements and non-functional requirements. The results are calculated by analyzing the trend of the average value assessment. When used this way, it is possible to configure the network security encryption based on quality management.

An Estimation Process of Effort and Cost in Security Evaluation of Information Technology Security Systems by utilizing Evaluation Work Break-down Structure (EWBS를 통한 정보보호 시스템의 보안성 평가 업무량 및 비용 산정 프로세스)

  • You, Hyung-Joon;Ko, Jeong-Ho;Chang, Soo-Jin;Ahn, Sun-Suk;Lee, Gang-Soo;Jung, Hong-Jin
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.2
    • /
    • pp.134-147
    • /
    • 2000
  • Even though software industry has been activated, there lack in results of studies on evaluation effort and cost of software systems including Information Technology Security System (ITSS). In this paper, we present a process and a tool for evaluation effort and cost of ITSS, which are conformed to a ITSS evaluation criteria(i. e., Common Criteria or ISO/IEC 15408), by utilizing Evaluation Work Break-down Structure (EWBS) and conventional software development cost estimation methods. Even though we concentrate on ITSS, results of this paper can be applied to estimation of effort and cost of evaluation of software development process and software products.

  • PDF

Developing Strategies to Improve Operational Test and Evaluation of Weapon System in the Age of the Fourth Industrial Revolution (4차 산업혁명 시대에 적합한 무기체계 운용시험평가 개선전략 도출)

  • Lee, Kangkyong;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.6
    • /
    • pp.591-601
    • /
    • 2020
  • After North Korea's sixth nuclear test, the operational environment on the Korean Peninsula has fundamentally changed, and the South Korean military faces various security challenges, including a reduction in military service resources and shorter military service periods. In particular, the South Korean military is seeking a new paradigm in military construction amid changes in the defense acquisition environment linked to the push for defense reform 2.0 and the utilization of the fourth industrial revolution. Therefore, this study considered strategies for improving the operational test and evaluation of weapons systems suitable for changes in the defense acquisition environment to effectively prepare for existing military threats and future warfare patterns. For this purpose, external environment analysis and internal capabilities were diagnosed using PEST Analysis and SPRO Analysis, and improvement strategies were derived through SWOT analysis.

Usability and Security Analysis of Authentication Methods for Mobile Fin-Tech Services (모바일 핀테크 서비스에서 이용 가능한 인증 수단의 사용성, 안전성 분석 연구)

  • Kim, KyoungHoon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.843-853
    • /
    • 2017
  • In the case of electronic payment, the obligation to use the certificate-based authentication was abolished. As Fin-tech service providers gain autonomy, various authentication methods are provided. SMS, ARS, PIN, Text-passwords, Fingerprints are popular authentication methods in the mobile Fin-tech services. In this study evaluate the usability and security of authentication methods in a unified mobile environment. We evaluate the usability through SUS and interview. Also we evaluate the security level of authentication methods through NIST guideline. At the result of the usability evaluation, Fingerprint authentication method had been determined as the highest usability, also Fingerprint authentication method had been determined as the safest authentication method by obtaining Security Level 4.

A Study on Analysis of Collaborative Governance in the Process of Local Government Co-evaluation Based on Virtual Policy Studio (지방행정 평가정보 시스템을 활용한 지방자치단체 합동평가 과정의 협력적 거버넌스 분석에 관한 연구)

  • Mun, Young Hoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.191-201
    • /
    • 2010
  • The Korean central government has been investing a lot of efforts to promote performance of local governments. For example, the Ministry of Public Administration and Security (MOPAS) supported the local governments to develop and provide with a 'balanced score card' and a 'customer satisfaction innovation. ' Many other central ministries also conducted individual evaluations for local governments in their substantive policy areas. These evaluation systems of 78 appraisals for local governments conducted by the MOPAS and other ministries had made the local governments to work harder. However, most local governments have appealed their 'reform fatigue' caused by the overlapping evaluation systems. In this context, the MOPAS initiated merging the evaluations into a co-evaluation system under the new Government Performance Evaluation Act of 2006. In this process of introduction of new evaluation system, there are two significant movements. Firstly, as Korean Government has strong information technology, MOPAS has developed 'Virtual Policy Studio (VPS)' which evaluates the performance of each local government with on line. In other words, in the co-evaluation system for local government performance most evaluation steps are implemented by computer and Internet. So most stakeholder can access and work on the VPS in real time when they want to. And the other thing is that cooperation among stakeholders has been occurred in the co-evaluation system. Furthurmore the cooperative governance is systemized and sustain for a long time because MOPAS made IT based co-evaluation system. Therefore this paper intends to illustrate the process of introduction of VPS, main process of co-evaluation system based on VPS and analyze collaborative governance of the co-evaluation system.