• Title/Summary/Keyword: Security Intelligence

Search Result 755, Processing Time 0.03 seconds

Adopting e-Government Services in Less Developed Countries According to the Characteristics of Business Intelligence: (Sudan as a model)

  • Adrees, Mohmmed S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.204-212
    • /
    • 2022
  • In this paper, a contribution is presented covering the data set in improving and developing electronic services provided to citizens through e-government services based on business intelligence in government agencies in the Republic of Sudan. The Business Intelligence Concept Survey was conducted from the perceptions of information department employees in government agencies. The survey was conducted from April to June 2021 using questionnaires. The dataset contains responses about the factors that influence the use of business intelligence and the barriers and limitations to the use of business intelligence. A five-point Likert scale was used to analyze the quantitative data. The opportunities and challenges associated with it were also discussed and explored. As evidenced by the results, the information department employees agree that business intelligence improves the government decision-making process, which helps decision makers and decision-makers to find alternatives and opportunities that contribute to making more accurate and timely decisions. The results also indicate that creating the infrastructure for applying business intelligence in the e-government work model contributes to the successful implementation of business intelligence in Sudan.

A survey on the relation between the employees' viewpoint with knowledge management and cultural intelligence among the employees working in Social Security Organization of Ardabil

  • Borjian, Sheyda;Alavi, Soheila
    • The Journal of Economics, Marketing and Management
    • /
    • v.5 no.2
    • /
    • pp.1-9
    • /
    • 2017
  • This study has reviewed the "A survey on the relation between the employees' viewpoint with knowledge management and cultural intelligence among the employees working in Social Security Organization of Ardabil". The present study is functional in terms of objective and the method is descriptive and survey. This has asked the others' ideas and viewpoints concerning a specific subject and has analyzed them. About the nature and the method used, the present research is of correlation research. The population applied in this research includes all employees working in Social Security Organization of Ardabil consisting of 400. The method used for sampling is simple random sampling. To collect the information in the first step of the research the library method has been used. In this research the data has been collected through standard questionnaires. Then, via descriptive and inferential statistics the research data has been characterized and regarding the spatial scaling of the measurement to test the hypothesis the, correlation analysis of Pearson has been used and also to specify the reliability of the questionnaire the Chronbach's Alpha has been taken in use and the SPSS software to analyze the data also. The findings resulted from the study showed that there is a significant relation between the factors concerning employees' efficiency with knowledge management and the cultural intelligence and all hypotheses was confirmed.

Artificial Intelligence-based Security Control Construction and Countermeasures (인공지능기반 보안관제 구축 및 대응 방안)

  • Hong, Jun-Hyeok;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.531-540
    • /
    • 2021
  • As cyber attacks and crimes increase exponentially and hacking attacks become more intelligent and advanced, hacking attack methods and routes are evolving unpredictably and in real time. In order to reinforce the enemy's responsiveness, this study aims to propose a method for developing an artificial intelligence-based security control platform by building a next-generation security system using artificial intelligence to respond by self-learning, monitoring abnormal signs and blocking attacks.The artificial intelligence-based security control platform should be developed as the basis for data collection, data analysis, next-generation security system operation, and security system management. Big data base and control system, data collection step through external threat information, data analysis step of pre-processing and formalizing the collected data to perform positive/false detection and abnormal behavior analysis through deep learning-based algorithm, and analyzed data Through the operation of a security system of prevention, control, response, analysis, and organic circulation structure, the next generation security system to increase the scope and speed of handling new threats and to reinforce the identification of normal and abnormal behaviors, and management of the security threat response system, Harmful IP management, detection policy management, security business legal system management. Through this, we are trying to find a way to comprehensively analyze vast amounts of data and to respond preemptively in a short time.

Theoretical And Technological Aspects Of Intelligent Systems: Problems Of Artificial Intelligence

  • Frolov, Denys;Radziewicz, Wojciech;Saienko, Volodymyr;Kuchuk, Nina;Mozhaiev, Mykhailo;Gnusov, Yurii;Onishchenko, Yurii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.35-38
    • /
    • 2021
  • The article discusses approaches to the definition and understanding of artificial intelligence, research directions in the field of artificial intelligence; artificial intelligence in the anthropological dimension; the importance of the systems approach as a methodological basis for the design of intelligent systems; structural and functional components of intelligent systems; intelligent systems in the technological aspect; problems and prospects of relations in the system "man - intellectual system".

Injection of Cultural-based Subjects into Stable Diffusion Image Generative Model

  • Amirah Alharbi;Reem Alluhibi;Maryam Saif;Nada Altalhi;Yara Alharthi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.1-14
    • /
    • 2024
  • While text-to-image models have made remarkable progress in image synthesis, certain models, particularly generative diffusion models, have exhibited a noticeable bias to- wards generating images related to the culture of some developing countries. This paper introduces an empirical investigation aimed at mitigating the bias of image generative model. We achieve this by incorporating symbols representing Saudi culture into a stable diffusion model using the Dreambooth technique. CLIP score metric is used to assess the outcomes in this study. This paper also explores the impact of varying parameters for instance the quantity of training images and the learning rate. The findings reveal a substantial reduction in bias-related concerns and propose an innovative metric for evaluating cultural relevance.

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Using Machine Learning Techniques for Accurate Attack Detection in Intrusion Detection Systems using Cyber Threat Intelligence Feeds

  • Ehtsham Irshad;Abdul Basit Siddiqui
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.179-191
    • /
    • 2024
  • With the advancement of modern technology, cyber-attacks are always rising. Specialized defense systems are needed to protect organizations against these threats. Malicious behavior in the network is discovered using security tools like intrusion detection systems (IDS), firewall, antimalware systems, security information and event management (SIEM). It aids in defending businesses from attacks. Delivering advance threat feeds for precise attack detection in intrusion detection systems is the role of cyber-threat intelligence (CTI) in the study is being presented. In this proposed work CTI feeds are utilized in the detection of assaults accurately in intrusion detection system. The ultimate objective is to identify the attacker behind the attack. Several data sets had been analyzed for attack detection. With the proposed study the ability to identify network attacks has improved by using machine learning algorithms. The proposed model provides 98% accuracy, 97% precision, and 96% recall respectively.

The Nature of Reform in the U.S., UK, Germany National Intelligence Systems and Implications for Reform of the Korean National Intelligence Service (미국·영국·독일 국가정보체계 개혁 양상과 한국 국가정보원 개혁에 대한 시사점)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.167-177
    • /
    • 2018
  • Major countries, such as the U.S., UK and Germany have reformed their national intelligence systems in the face of transnational, asymmetric and comprehensive threats since September 11, 2001 and have strengthened the intelligence capacity involved in countering terrorism and WMD proliferation, right/left extremism threats. The Korean Moon Jae-in government is preparing a reform plan to eliminate illegal political intervention and abuse of power by the National Intelligence Service(NIS) and to rebuild it as an efficient national intelligence agency for national security. In discussing the reform direction of the NIS, it is necessary to discuss in detail whether adopting a separate model of intelligence agencies to restrict domestic intelligence activities of the NIS and concentrate on foreign intelligence activities or establish new domestic intelligence agencies. Second, as for the issue of transferring anti-Communism investigation authority of the NIS to the police, it needs to be carefully considered in terms of balancing the efficiency and professionalism of intelligence agency activity in the context of North Korea's continuous military provocation, covert operations and cyber threats. Third, it should strive to strengthen the control and supervision functions of the administration and the National Assembly to ensure the political neutrality of the NIS in accordance with the democratization era, to guarantee citizens' basic rights and to improve the transparency of budget execution.

  • PDF

Senior Level Leadership of the Knowledge-Intelligence-Science Military (지식.정보.과학군대의 고급대제 리더십)

  • Jo, Yeong-Gap
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.1-44
    • /
    • 2006
  • Today, the times of knowledge-intelligence made changes of the ordinary life of citizens society, and also changed greatly the circumstance of leadership in the military. The times of knowledge-intelligence changed the circumstances of national security and the features of warfares, and also make affecting decisively to senses and style of new who were servicing in the military. In order to response effectively against the changes of those leadership circumstances, senior level leadership should be understand in depth human psychology and battlefield circumstances in the dimension of policies and strategies, and should be executed their leadership. In this thesis, I reviewed the concept and vision of senior level leadership theories and cases about traits and roles In addition, I suggested development options for senior level leadership such as (1) high charactenstics and professionalism, (2)educational center of military for advanced democratic citizen and leadership, (3)execution of leadership in psychological leadership, (4)development of leadership needed in the battlefield Finally, the current military senior level leadership should be changed from one-side and authority style to the change-orientated style, which could believe and participate by themselves.

  • PDF