• Title/Summary/Keyword: Security Information Event Management

Search Result 93, Processing Time 0.024 seconds

Information Aspects of Changes in the Labor Market of the EU and Ukraine in the Context of Ensuring Safety Through COVID-19

  • Andriyiv, Nataliya;Zachepa, Andryi;Petrukha, Nina;Shevchuk, Inna;Berest, Ihor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.657-663
    • /
    • 2021
  • The main purpose of the study is to analyze the information aspects of the impact of COVID-19 on the labor market in the EU and Ukraine. In addition to studying the key parameters of changes in the labor market under the influence of COVID-19, i.e. the unemployment rate and the share of the employed population, a thorough study of gender equality, labor migration and the impact on youth made it possible to characterize the effectiveness of the policy of stabilization and restoration of the labor market in the EU and Ukraine. The results obtained form the necessary information basis for modeling labor market regulation in the event of possible subsequent disturbances, in particular under the influence of global pandemics.

The study about role of enforcement stage in safety activity for the international conference (국제회의 안전활동에 있어서 실시단계의 역할에 관한 연구)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.387-416
    • /
    • 2013
  • This study's purpose is to present the improvement of effectiveness of security activity for international conference which can be held hereafter. On the basis of security activity problems originating in G20 summit meeding that had been held in Seoul in 2010. I made up questions three times to on the members of the police, military, fire figher and national intelligence service who had experienced in Seoul G20 summit meeding and recognition of possible problem and possibility of improvement on each item of questions was analyzed by Delphi Method. Also interviews with 4 security experts selected from each security agency were conducted to present improvement in each part of problem. The results obtained from the face to face interview with four experts of security-enforcement agency about the role of event site activity stage for international conference are as followings; First, 'security protocol section' protocol and security are needed mutual win-win enough to be compared with adaptative relationship, thereby being demanded the closer cooperation and information exchange. Second, 'situation management section' there is a need of reinforcing the cooperative system between situation rooms of each agency in order to possibly operate all of the security manpower integrally, which are dispersed by function and by event site, in addition to the swift and organic information exchange between wide-area local government and all the security agencies focusing on a preparation planning group. Third, 'security manpower resource management section' there is a need of encouragement and interest in the leadership in order to devise system that all of the security manpower can concentrate on event and to be possibly satisfied the given conditions. Fourth, 'local government cooperative support section' the wide-area local government of a hosting city as international city operates several kinds of the facilities for international conference, supports operation of conference, achieves a ripple effect of event such as tourism, maximizes service of accomodations, and performs the primary responsibility for the maintenance of the traffic facilities, thereby needing to execute special inspection under the responsibility of Si-Do governors.

  • PDF

A Study of Preventing Social Engineering Attack on Smartphone with Using NFC (NFC를 이용한 스마트폰 상의 사회 공학적 공격 방지 기법 연구)

  • Suh, Jangwon;Lee, Eunyoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.23-35
    • /
    • 2015
  • When people stands near someone's mobile device, it can easily be seen by others. To rephrase this, attackers use human psychology to earn personal information or credit information or other. People are exposed by social engineering attacks. It is certain that we need more than just recommendation for the security to avoid social engineering attacks. This is why I proposed this paper. In this paper, I proposed an authentication technique using NFC and Hash function to stand against social engineering attack. Proposed technique result is showing that it could prevent shoulder surfing, touch event information, spyware attack using screen capture and smudge attack which relies on detecting the oily smudges left behind by user's fingers. Besides smart phone, IPad, Galaxy tab, Galaxy note and more mobile devices has released and releasing. And also, these mobile devices usage rate is increasing widely. We need to attend these matters and study in depth.

A Study on the Emergency Response System for Internet game event with simulation circumstance (시뮬레이션 환경하에서 인터넷 게임 사고 대응시스템모델 연구)

  • Shin, Seung-Jung;Choi, Woon-Ho
    • Journal of Korea Game Society
    • /
    • v.5 no.1
    • /
    • pp.41-44
    • /
    • 2005
  • This paper is model can be useful and capable of automatically collecting and classifying the various information about a wide range of security incidents such as hackings, worms, spyware, cyber-terror, network espionage and information warfare from firewall, IDS, VPN and so on. According to them Internet game and an automated/integrated computer emergency response system can perform an attack assessment and an early warning for any incidents based on Enterprise Security Management environment.

  • PDF

통합로그관리시스템의 기술 동향과 발전 방향

  • Yu, Ki-Soon;Im, Sul-Hwa;Kim, Hak-Beom
    • Review of KIISC
    • /
    • v.23 no.6
    • /
    • pp.90-99
    • /
    • 2013
  • 최근 급증하고 있는 고도화된 사이버 공격은 많은 피해를 낳고 있다. 이러한 문제를 미연에 방지하기 위해 각종 보안 솔루션의 도입으로 보안 시스템 환경이 복잡하게 변하게 되었다. 보안 관리자는 복잡한 환경으로 인해 보안 시스템 관리의 어려움으로 우수한 보안 솔루션이 있음에도 위협에 제대로 대처하지 못하고 있다. 본 논문에서는 보안시스템을 체계적으로 관리할 수 있고, IT 시스템에서 생성되는 이벤트와 로그를 통합해 늘어나고 있는 보안 위협에 적절한 대응이 가능하도록 도와주는 보안 시스템 관리 솔루션인 SIEM(Security Information and Event Management)에 대해 알아보고자 한다. 고도화되고 있는 사이버 공격과 복잡해진 클라우드 컴퓨팅, 데이터가 대량화됨에 따라 생겨난 빅데이터, 갈수록 강화되고 있는 컴플라이언스 요구사항을 만족할 수 있는 방안을 모색해봄으로써 SIEM이 앞으로 나아가야 할 방향에 대해 알아보고자 한다.

A Study on Intrusion Alert Redustion Method for IDS Management (침입탐지 시스템 관리를 위한 침입경보 축약기법 적용에 관한 연구)

  • Kim, Seok-Hun;Jeong, Jin-Young;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.1-6
    • /
    • 2005
  • Today the malicious approach and information threat against a network system increase and, the demage about this spread to persnal user from company. The product which provides only unit security function like an infiltration detection system and an infiltration interception system reached the limits about the composition infiltration which is being turn out dispersion anger and intelligence anger Necessity of integrated security civil official is raising its head using various security product about infiltration detection, confrontation and reverse tracking of hacker. Because of the quantity to be many analysis of the event which is transmitted from the various security product and infiltration alarm, analysis is difficult. So server is becoming the charge of their side. Consequently the dissertation will research the method to axis infiltration alarm data to solve like this problem.

  • PDF

A Design of File Leakage Response System through Event Detection (이벤트 감지를 통한 파일 유출 대응 시스템 설계)

  • Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.7
    • /
    • pp.65-71
    • /
    • 2022
  • With the development of ICT, as the era of the 4th industrial revolution arrives, the amount of data is enormous, and as big data technologies emerge, technologies for processing, storing, and processing data are becoming important. In this paper, we propose a system that detects events through monitoring and judges them using hash values because the damage to important files in case of leakage in industries and public places is serious nationally and property. As a research method, an optional event method is used to compare the hash value registered in advance after performing the encryption operation in the event of a file leakage, and then determine whether it is an important file. Monitoring of specific events minimizes system load, analyzes the signature, and determines it to improve accuracy. Confidentiality is improved by comparing and determining hash values pre-registered in the database. For future research, research on security solutions to prevent file leakage through networks and various paths is needed.

Marine Incidents Management and Information Exchange Technologies in the Process of Safe Ship Operation

  • Oleksiy, Melnyk;Yana, Volianska;Oleg, Onishchenko;Svitlana, Onyshchenko;Alla, Bondar;Andrii, Golovan;Nataliia, Cheredarchuk;Iryna, Honcharuk;Tetyana, Obnyavko
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.64-70
    • /
    • 2023
  • Maritime transport is dominant in the overall volume of all international transportation. Existence and overcoming of problems, which cause pressure on shipping safety, remain actual and fully concern both maritime and inland transport. Increasing speed and cargo capacity of the ships along with the reduction of crew members lead to the automation of a growing number of work processes, which indicates the need to actively introduce appropriate measures in the security system of sea-going ships and commercial ports and to develop modern approaches to minimize negative events and incidents in the process of ship operation. Advantages in use of modern methods of monitoring the safety of ship operations, management of possible events and incidents, including investigation of accidents, first, aimed at prevention of negative occurrences and ways of prevention on this basis. Considering statistics on incidents increase, this work presents analysis of general ship accident rate, study of major accidental events growth annually, and investigation of causes of incidents, which most frequently occur in port waters and at open sea. A survey of current approaches to ensuring the safety of shipping by implementing effective tools, such as event and incident management, has been conducted.

A Policy-driven RFID Data Management Event Definition Language (정책기반 RFID 데이터 관리 이벤트 정의 언어)

  • Song, Ji-Hye;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.55-70
    • /
    • 2011
  • In this paper, we propose a policy-driven RFID data management event definition language, which is possibly applicable as a partial standard for SSI (Software System Infrastructure) Part 4 (Application Interface, 24791-4) defined by ISO/IEC JTC 1/SC 31/WG 4 (RFID for Item Management). The SSI's RFID application interface part is originally defined for providing a unified interface of the RFID middleware functionality―data management, device management, device interface and security functions. However, the current specifications are too circumstantial to be understood by the application developers who used to lack the professional and technological backgrounds of the RFID middleware functionality. As an impeccable solution, we use the concept of event-constraint policy that is not only representing semantic contents of RFID domains but also providing transparencies with higher level abstractions to RFID applications, and that is able to provide a means of specifying event-constraints for filtering a huge number of raw data caught from the associated RF readers. Conclusively, we try to embody the proposed concept by newly defining an XML-based RFID event policy definition language, which is abbreviated to rXPDL. Additionally, we expect that the specification of rXPDL proposed in the paper becomes a technological basis for the domestic as well as the international standards that are able to be extensively applied to RFID and ubiquitous sensor networks.

RFID Ubiquitous Public Information Documental Administration System construction and Security research (RFID 유비쿼터스 영구기록물관리시스템 구축과 보안 연구)

  • Jang, Young-Sang;Lee, Sung-Yooung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.111-121
    • /
    • 2009
  • Public Information Documental of the administrative, legislative and judicial etc. is lastingness documental and need administration. Whenever the crime event happens, judicature's documental is lent frequently to reference data and is returned, event posting of documental, hysteresis inquiry, lending/return, conservation search, documental exhaust management must consist for administration of lastingness documental. RFID is utilized by the practical use plan of recent Ubiquitous information. Because attaching tag to lastingness documental that use RFID in this treatise, register and manage documental, and chase hysteresis, and design upkeep, present condition analysis of lastingness documental to search, S/W, H/W, network layout, Ubiquitous RFID lastingness recording administration system. Construct lastingness recording administration system after a performance experiment and a chase experiment that is applied in spot that attach 900MHz important duty's RFID tag. After construction practice, create link sex with connection system, security analysis and Forensic data and analyze improvement effect. Is going to contribute Ubiquitous information technology application and Forensic technology development in country documental administration through. research of this treatise.