• 제목/요약/키워드: Security Recommendations

검색결과 143건 처리시간 0.029초

스마트폰 사용자의 보안수칙 실천 부족에 관한 연구 : 효능감의 역할을 중심으로 (A Study on Disconfirmity to Security Practices of Smart-phone : Focused on Roles of Efficacy)

  • 김재현;김종기
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제24권3호
    • /
    • pp.1-19
    • /
    • 2015
  • Purpose This study discusses the contradictory behavior of smart-phone users who consider security is important, but they do not follow the security recommendations. We found through literature research that this contradictory behavior is resulted from a low level of efficacy. Design/methodology/approach Research hypotheses were set based on Extended Parallel Process Model, Control Theory, and Self Efficacy Mechanism. The data were collected from undergraduate students. Total of 178 data were used for the analysis. Findings Results of the analysis, first, showed that the relationship between threat and security attitude varies with the level of coping efficacy. Second, showed that the relationship between threat and fear does not vary with the level of coping efficacy. Both the groups with high coping efficacy and low coping efficacy had a statistically significant effect on the relationship between threat and fear.

대규모 조직에서의 패스워드 관리에 관한 권고 고찰 (A Study On Enterprise Password Management Recommendations)

  • 박진섭
    • 안보군사학연구
    • /
    • 통권8호
    • /
    • pp.421-465
    • /
    • 2010
  • Passwords are used in many ways to protect data, systems, and networks. Passwords are also used to protect files and other stored information. In addition, passwords are often used in less visible ways for authentication. In this article, We provides recommendations for password management, which is the process of defining, implementing, and maintaining password policies throughout an enterprise. Effective password management reduces the risk of compromise of password-based authentication systems. Organizations need to protect the confidentiality, integrity, and availability of passwords so that all authorized users - and no unauthorized users - can use passwords successfully as needed. Integrity and availability should be ensured by typical data security controls, such as using access control lists to prevent attackers from overwriting passwords and having secured backups of password files. Ensuring the confidentiality of passwords is considerably more challenging and involves a number of security controls along with decisions involving the characteristics of the passwords themselves.

  • PDF

Fifteen Deadly Cybersecurity Threats Aimed Covid-19

  • Alaboudi, Abdulellah A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.123-130
    • /
    • 2021
  • Cybersecurity has been vital for decades and will remain vital with upcoming ages with new technological developments. Every new day brings advancement in technology, which leads to new horizons, and at the same time, it brings new security challenges. Numerous researchers around the globe are continuously striving hard to provide better solutions for the daily basis of new arising security issues. However, the challenges are always there. These challenges become new norms during the current Covid pandemic, where most industries, small industrial enterprises, education, finance, public sectors, etc. were under several attacks and threats globally. The hacker has more opportunities during the pandemic period by shifting most of the operations live. This research enlightened the several cybersecurity attacks and threats during this pandemic time globally. It provided the best possible recommendations to avoid them using the cyber awareness and with appropriately linked training. This research can provide a guideline to the above stated sector by identifying the related attacks.

금융부문 암호기술의 안전성 강화를 위한 보안고려사항 (The Considerable Security Issues on the Security Enforcement of Cryptographic Technology in Finance Fields)

  • 김영태;이수미;노봉남
    • 정보보호학회논문지
    • /
    • 제19권4호
    • /
    • pp.137-142
    • /
    • 2009
  • 최근까지 암호기술에 대해 알려진 공격이나 안전성 저하현상에 의해 국내외 주요기관들은 권장되는 암호기술의 종류, 사용기간, 안전성 파라미터 등을 명확하게 명시하고 있다. 이에 따라 국내 금융권에서도 일부 암호기술을 교체하기 위한 작업이 이루어져야 할 것이다. 본 논문에서는 금융권에서 시급히 이루어져야하는 금융권 암호기술 적용 현황파악 및 취약 암호기술 선별 등 선행작업과 금융권 암호기술관리 방안에 대해 살펴보고, 향후 암호기술의 안전성에 대한 급격한 변화에도 금융시스템의 신뢰도를 유지할 수 있도록 중장기적인 관점에서의 암호기술 관리방안에 대해 제시한다.

Analysis of the Features of Corporate Governance by the State: Similarity and Difference of Models

  • Martynyshyn, Yaroslav;Kukin, Igor;Khlystun, Olena;Zrybnieva, Iryna;Pidlisnyi, Yevhen
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.29-34
    • /
    • 2021
  • The article formulates the key characteristics and features of country models of corporate governance. It was revealed that all countries are characterized by a fairly high concentration of ownership, insider control; Key gaps in the implementation of corporate governance principles were found: transparency and disclosure of information, protection of shareholders' rights, gender diversity of boards of directors, implementation of recommendations on the share of independent directors; The criterion of countries' efficiency (total investments) was identified and recommendations for their improvement were developed.

한국의 해양안보: 1998년과 2018년 (Maritime Security of the Republic of Korea: year 1998 and year 2018)

  • 정호섭
    • Strategy21
    • /
    • 통권43호
    • /
    • pp.57-88
    • /
    • 2018
  • Security situations are fundamentally and rapidly changing on the Korean Peninsula. Above all, as North Korea(NK) is heightening its nuclear and missile capabilities, Republic of Korea(ROK) is facing an existential threat. At the same time, as China's economic, diplomatic and military power is quickly rising, the balance of power is shifting and strategic competition between the Unite States(US) and China is accelerating in the Asia-Pacific region. Under the pressure of development of these situations, ROK seems to face allegedly the most serious crisis in its national security since the end of the Korean War. In the current grim geopolitical situation, maritime security may become the most difficult security challenge for ROK in the years to come. The purpose of this paper is to compare major changes in maritime security affairs of the ROK during last twenty years from 1998 until now(2018). 1998 was when this journal 『Strategy 21』 was published for the first time by the Korea Institute for Maritime Strategy. Then, this paper tries to identify challenges and risks with which this country has to deal for its survival and prosperity, and to propose some recommendations for the government, the Navy, and the Coast Guard as they are responsible for the maritime security of the country. The recommendations of this paper are as follows: strengthen ROK-US alliance and expand security cooperation with regional powers in support of the maintenance of the current security order in the region; building-up of maritime security capacity in preparation for crisis on the maritime domain with the navy targeting to acquire 'a non-nuclear, balance-of-terror capability, to improve interoperability with the Coast Guard based on 'a national fleet,' and to actively pursue innovation in naval science and technology. Finally, this paper proposes that naval capability the country needs in another twenty years depends on how effectively and rigorously the navy put its utmost efforts towards building 'a strongest navy' today.

The extent of the role of internal control of Northern Borders University in maintaining the non-waste of public money

  • Oweis, Khaled Adnan
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.187-199
    • /
    • 2021
  • The research aims to measure the control procedures' effectiveness, followed by the University of Northern Borders employees. A questionnaire was developed and distributed to the target sample of financial and auditing affairs employees at the university, where the researcher followed the existing descriptive-analytical approach. The researcher relied on the field survey, and statistical analysis (spss) was used. The researcher has found that the control procedures used are highly efficient in reducing public money waste. The researcher has presented recommendations that may contribute to developing the work of oversight in combating waste of public money. These recommendations include: Increase the interaction between the General Oversight Office and the internal oversight departments at the University of Northern Borders, the incentives provided to the oversight and accounting staff for their efforts to combat public money waste. It encourages them to maintain public money and work to obliging employees to undertake training courses periodically to develop their skills and rehabilitate them in line with modern control procedures. Also, more studies and scientific research on the waste of public money and types of administrative and financial Corruption and the law in all state sectors and reach conclusions and recommendations will help decision-makers amend laws and regulations to serve the public benefit of the university and the state.

E-Safety Awareness of Saudi Youths: A Comparative Study and Recommendations

  • Alharbi, Nawaf F;Soh, Ben;AlZain, Mohammed A;Alharbi, Mawaddah F
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.181-188
    • /
    • 2021
  • The use of the internet has become a basic need for many across the globe. The situation is very much the same for the youth in many countries like Saudi Arabia who have grown up surrounded and accessing the internet. This demographic, however, is at an increased risk of falling as victims to cybercrime because of a low level of technical awareness. This review looks at the level of technical awareness of internet use in 3 different countries which include the USA, South Africa, and New Zealand. The review will compare the situation in these nations with those in KSA. Based on the review and comparisons, recommendations are made for culturally and socially acceptable e-Safety awareness of Saudi youths.

Social Media Security and Attacks

  • Almalki, Sarah;Alghamdi, Reham;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.174-183
    • /
    • 2021
  • The advent of social media has revolutionized the speed of communication between millions of people around the world in various cultures and disciplines. Social media is the best platform for exchanging opinions and ideas, interacting with other users of similar interests and sharing different types of media and files. With the phenomenal increase in the use of social media platforms, the need to pay attention to protection and security from attacks and misuse has also increased. The present study conducts a comprehensive survey of the latest and most important research studies published from 2018-20 on security and privacy on social media and types of threats and attacks that affect the users. We have also reviewed the recent challenges that affect security features in social media. Furthermore, this research pursuit also presents effective and feasible solutions that address these threats and attacks and cites recommendations to increase security and privacy for the users of social media.

Security Risk Assessment in Conducting Online Exam

  • Danah AlDossary;Danah AlQuaamiz;Fai AlSadlan;Dana AlSharari;Lujain AlOthman;Raghad AlThukair;Ezaz Aldahasi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.77-83
    • /
    • 2023
  • This research is conducted to minimize the potential security risks of conducting online exams to an acceptable level as vulnerabilities and threats to this type of exam are presented. This paper provides a general structure for the risk management process and some recommendations for increasing the level of security.