• Title/Summary/Keyword: Security Plans

Search Result 321, Processing Time 0.027 seconds

Research on Security Threats Emerging from Blockchain-based Services

  • Yoo, Soonduck
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.1-10
    • /
    • 2021
  • The purpose of the study is to contribute to the positive development of blockchain technology by providing data to examine security vulnerabilities and threats to blockchain-based services and review countermeasures. The findings of this study are as follows. Threats to the security of blockchain-based services can be classified into application security threats, smart contract security threats, and network (P2P) security threats. First, application security threats include wallet theft (e-wallet stealing), double spending (double payment attack), and cryptojacking (mining malware infection). Second, smart contract security threats are divided into reentrancy attacks, replay attacks, and balance increasing attacks. Third, network (P2P) security threats are divided into the 51% control attack, Sybil attack, balance attack, eclipse attack (spread false information attack), selfish mining (selfish mining monopoly), block withholding attack, DDoS attack (distributed service denial attack) and DNS/BGP hijacks. Through this study, it is possible to discuss the future plans of the blockchain technology-based ecosystem through understanding the functional characteristics of transparency or some privacy that can be obtained within the blockchain. It also supports effective coping with various security threats.

A Study on Security Plans At Large-Scale International Event Halls: Focusing on Assessment of Escape Safety of K Stadium for The Incheon Asian Games (대규모 국제행사장의 경호경비계획에 관한 연구: 인천 아시안게임 K경기장의 피난안전성 평가를 중심으로)

  • Park, Nam-Kwun;Lee, Young-Ju;Yoon, Myong-O
    • Korean Security Journal
    • /
    • no.30
    • /
    • pp.7-32
    • /
    • 2012
  • Korea faces The 2014 Incheon Asian Games and 2018 Pyungchang Winter Olympics. It is imperative to hold a safe event for the economic benefits, enhancing Korea's image, social integration, national harmony and unity in order to be evaluated as a successful international event. Furthermore, since the international event tends to draw many spectators, the host country must be ready to accommodate a large number of injured people in the event of an accident or terror attack. As stadiums for international events are where a large number of spectators gather in, a large refuge is essential, when dangerous situations happen. In this study, evacuation simulation was conducted using three scenarios in order to predict escape behaviors of spectators during the large escape by destruction of safety systems of stadiums and assess escape safety. As the result, the following results and proposals were extracted. Firstly, it is considered that dangerous situations during the security of stadiums should be predicted in advance and concrete plans for a large refuge of spectators have to be established to minimize damage. Secondly, it was found that the reduction in evacuation exits has an important impact on evacuation in an emergency situation. It implies that securing escape exits are quite important. Thirdly, there were areas where spectators stayed, due to blocked escape exits, while they were dispersed and concentrated at once. It demonstrates that security plans considering properties of facilities are required to solve these problems.

  • PDF

Security-Based Intranet Structure

  • Lee, S. M.;Lee, P. J.
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.265-273
    • /
    • 1997
  • Intranet is an enterprise network using Internet protocols as communication standard and HTML as content standard. The Internet is like a house built on information water. It has a lot of strong points as a future enterprise network. However, companies wish to have confidence in its functional and economic effectiveness and security before adopting it. The security issue especially is a problem to solve inevitably. Enterprises will hold back to adopt Intranet unless there are enough security counter plans and countermeasures against vulnerabilities of Intranet(it is the wise decision !). Nevertheless the researches related to Intranet has been concentrated on techniques for building it. In this paper, we focus the security aspect of Intranet. Intranet security must be considered on the whole from structure design to users' services. We propose a security-based Intranet structure and security management system.

  • PDF

Study on Students' Consciousness Regarding Their Plans after Graduation (경호학 전공 만족도와 진로의식 조사)

  • Kim, Chang-Ho
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.91-107
    • /
    • 2008
  • This study aims to grasp the general conditions regarding university students in security related majors in Korea. Followings will be covered here: what motivated them to choose those majors, hw much are they git jobs through the education, what is their conscioucness on their majors, jobs, and courses like, and what effects their job preference. And ths study also aims at helping the student with their future plans such as admission to a school of higher grade and choosing their job. For this study, we distributed 340 copies to the students in security related majors at 4 four-year colleges and 1 two-year college, and collected 298 copies by means of quota sampling method. For collected questionnaires, we used individual T-test verification and one-way ANOVA analysis to grasp the situation. Significance stabdard for the test results was set as p<0.05. Followings are the test results. The results on analysis of satisfaction rate on their curriculums, classes, and majors show that students in security-related majors showed different satisfaction rate and different averages according to their sex and the year of the college. In the analysis on the relationship between major education and employment of students in security-related majors, the result of curriculum improvement and scholaril attainments analysis showed statistically significant relation. When students in security-related majors were surveyed on their consciousness of their future plans such as getting jibs, two-year college students had more certificates of qualification for employment than four-year college students.

  • PDF

A Study on Change of Aviation Law and System to Aviation Security for Major Countries after 9. 11 Aviation Terror (주요국가의 항공보안 관련 법 및 제도의 변화 연구)

  • Lee, Kang-Seok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.21 no.2
    • /
    • pp.123-155
    • /
    • 2006
  • 2001. 9. 11 aviation terror showed us that there are lots of problems in aviation security and we need efficient counter-plans. According to this event, many countries are coming up with various countermeasures. After first hijacking in 1950, the aviation terror is occurring with more various methods until these days. And the scale is bigger than former so they're making much bigger damages. Especially, the case of 9.11 terror attracted people's eye of the world because of enormous casualties and damages. It aroused many people's self-awakening therefore as an important factor the security is given much weight in the aviation safety. In order to keep the step like this tendency and the development of aviation security, beginning with America lots of countries of the world are pursuing diverse aviation security's counter-plans of new side. At this point of time, for our development in aviation industry we should make efficient aviation security countermeasures. In this study, We compared our aviation security activities with major countries after 9.11 terror.

  • PDF

Improvement of Information Security Management System Evaluation Model Considering the Characteristics of Small and Medium-Sized Enterprises (중소기업의 특성을 고려한 정보보호 관리체계 평가 모델 개선)

  • Kim, Yi Heon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.1
    • /
    • pp.81-102
    • /
    • 2022
  • Although more than 99% of all Korean companies are small and medium-sized enterprises (SMEs), which accounts for a large part of the national economy, they are having difficulties in securing information protection capabilities due to problems such as budget and manpower. On the other hand, as 97% of cyber incidents are concentrated in SMEs, it is urgent to strengthen the information protection management and response capabilities of SMEs. Although the government is promoting company-wide information security consulting for SMEs, the need for supplementing it's procedures and consulting items is being raised. Based on the results of information security consulting supported by the government in 2020, this study attempted to derive improvement plans by interviewing SME workers, information security consultants, and system operators. Through the research results, it is expected to create a basis for SMEs to autonomously check the information security management system and contribute to the reference of related policies.

Experiences of Special Education Teachers in Dealing with Behavioral Problems Presented by Students with Disabilities

  • Alhwaiti, Mohammed M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.129-134
    • /
    • 2022
  • The primary goal of any classroom is effective teaching and student learning, with an emphasis on changing negative students' behaviors into positive ones. This change can occur when students' behavior is always at the forefront of teachers' educational goals. The current study aimed to reveal the experiences of special education teachers in dealing with the behavioral problems that students with disabilities show by identifying behavioral problems among students with disabilities and investigating the efficacy of the application of behavior modification plans and strategies designed to address the behavioral problems presented by students with disabilities. The researcher used a qualitative phenomenological approach, and the study tool consisted of semi-structured interviews that consisted of (13) questions directed to (10) special education male and female teachers who work in special education centres and institutes. The data were analyzed using the thematic analysis method. The findings of the study showed that the most undesirable behaviors prevalent among students with disabilities in the classroom were aggression, bullying and ADHD. The actions taken by teachers in confronting these behaviors were not systematic and were carried out randomly, as no behavior modification plans were applied. The most important strategies used by teachers in facing behavioral problems were applied behavioral analysis (ABA) strategies such as reinforcement, punishment and ignoring. The results have many important implications for future practice, including the need to conduct practical training courses for special education teachers to implement behavior modification plans and develop methods of measuring inappropriate behavior.

Plans for constructing National transportation Networks for security of Railway System Safety (철도시스템 안전확보를 위한 네트워크망 구축 방안 연구)

  • Hong Seon-Ho
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.612-617
    • /
    • 2005
  • Safety of railway systems is made by understanding causes and process of railway accidents and grasping contents of a many of accidents. Now, Being carried out a research and analysis about an extensive areas(the whole country, the metropolitan area, the five metropolitan cities, the city of three hundred thousands and over of people) and field, thereafter the National Transportation (Railway) Database has been constructed and developed to prepare the base that reduced an overlapping survey using a standardized-material offer. A purpose of this research is to derive plans to apply National transport DB including information in the field of transportation systems to domestic railway safety management. The research analyses the present conditions of establishing national transport DB, and reviews problems when that use to railway system. As being based in this, the research derived definitions and using plans of layers available to use, and plans of establishing and systematizing information for desirable railway network.

  • PDF

Design and Implementation of Enterprise Information Security Portal(EISP) System for Financial Companies (금융회사를 위한 기업 정보보호 포털(EISP) 시스템의 설계 및 구현)

  • Kim, Do-Hyeong
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.101-106
    • /
    • 2021
  • To protect financial information, financial companies establish strategies and plans for information security, operate information security management systems, establish and operate information security systems, check vulnerabilities, and secure information. This paper aims to present an information security portal system for financial companies that can gain visibility into various information security activities being undertaken by financial companies and can be integrated and managed. The information security portal system systemizes the activities of the information security department, providing an integrated environment for information security activities to participate from CEOs to executives and employees, not just from the information security department. Through this, it can also be used as information security governance that can be used by top executives to reflect information security in corporate management.

A Study on the Network Centric Warfare Information Security for Ubiquitous Network Computing (유비쿼터스 환경에서의 NCW 정보보호 대책)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.15-22
    • /
    • 2010
  • Information security is a critical issue for network centric warfare(NCW). This paper provides defense information security guidelines for NCW, especially for ubiquitous network computing environment. For this purpose, this paper identified changes of battle aspect of tactical level and characteristics of information threats, and finally, the research suggested several information security guidelines for NCW. This paper is to intended to help military organization's planners determine practical and implemental plans in the near future.