• Title/Summary/Keyword: Security Test

Search Result 1,256, Processing Time 0.031 seconds

The Effect of Selection Motivation of Security-related Department Students on NCS Curriculum and Career Decision (경호관련학과 학생들의 선택 동기가 NCS교육과정 및 진로결정에 미치는 영향 분석)

  • Choi, Jeong-Il;Jang, Ye-Jin
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.159-166
    • /
    • 2018
  • The purpose of this study is to investigate the effect of selection motivation on the NCS curriculum and career decision of the students in security related department. The contents of the questionnaire consisted of "First, Motivation to select major, Second, NCS curriculum, Third, Career decision". In this study, Chronbach's Alpha coefficients were presented to analyze the reliability of variables and exploratory factors, and the Berimax method was performed. The AVE and CR values of the items were calculated to be 0.5 and 0.7, respectively. Therefore, it was analyzed that the Intensive feasibility of items were well-focused. As a result of the hypothesis test, the standardized coefficients were calculated as follows: 'Selective motivation ⇨ NCS curriculum' is 0.563, 'NCS curriculum ⇨ career decision' is 1.339. The relationship between the two hypotheses was found to be positive (+). In order to improve the career decision of students in security related departments, it seems necessary to raise the motivation of selection and to improve the satisfaction of NCS curriculum.

  • PDF

The Effect of Security Major University Students' Major Selection Motivation on Major Satisfaction and Career Decision (물리보안 전공 대학생들의 선택 동기가 전공만족도 및 진로결정에 미치는 영향)

  • Ye-Jin Jang;Jeong-Il Choi
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.159-166
    • /
    • 2022
  • The purpose of this study conducted to conduct a survey to understand the effect of security major college students' major selection motives on major satisfaction and career decisions. The questionnaire was written as "First, motivation for choice, second, major satisfaction, third, career decision". In this study, Chronbach's Alpha coefficient was calculated to analyze the reliability and importance of variables and to identify exploratory factors. And the Berimax method was performed. Both the AVE and CR values of the measured items were calculated to be above the reference value of 0.7, and thus, the convergent validity of each item was investigated as favorable. In the hypothesis test results, the standardization coefficient of 'selection motive ⇨ major satisfaction' was 0.653 and 'major satisfaction ⇨ career decision' was 0.403, so both research hypotheses were adopted. However, 'selection motive ⇨ career decision' was rejected with 0.392. In the future, universities and related professors seem to need more efforts to simultaneously increase the selection motive and major satisfaction in order to improve the career decisions of college security students.

Asymmetric Signal Scanning Scheme to Detect Invasive Attacks (침투 공격 검출을 위한 비대칭 신호 스캐닝 기법)

  • Da Bin Yang;Ga Young Lee;Young-woo Lee
    • Smart Media Journal
    • /
    • v.12 no.1
    • /
    • pp.17-23
    • /
    • 2023
  • Design-For-Security (DFS) methodology is to protect integrated circuits from physical attacks, and that can be implemented by adding a security circuit to detect abnormal external access. Among the abnormal accesses called invasive attack, microprobing and FIB circuit editing are classified as the most powerful methods because they have direct access. Microprobing deliberately inject defects into the wire of circuit through probes, or reads and changes data. FIB circuit editing is methods of reconnecting or destroying circuits to neutralize security circuits or to access data. Previous DFS methodology have responded to the attacks by detecting arrival time asymmetry between the two signals or by comparing input/output data based on encrypted communication. This study conducted to reduce hardware overhead, and the proposed circuit detects the reflected signal asymmetry generated through probe or FIB circuit editing and detects the attacks through comparison. Since the proposed security circuit reduces the size and test cycle of the circuit compared to previous studies, the cost used for security can be reduced.

University Students Impact of Martial-Arts Training on Self-Realization among Security Majors (경호전공 대학생의 무도수련이 자아실현에 미치는 영향)

  • Son, Sung-Rak;Jung, Sung-Suk;Wang, Sug-Won;Jang, Ye-Jin
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.101-118
    • /
    • 2008
  • The subjects in this study were 500 students who were selected from a population that consisted of security majors who took courses in martial arts in four different four-year-course universities. After a survey was conducted, the answer sheets from 451 students were analyzed except 49 incomplete ones. The collected data were analyzed with SPSS Ver. 12.0 program. Frequency analysis, t-test and one-way ANOVA were utilized, and LSD and regression analysis were employed to make a post-hoc comparison. All the hypotheses formulated in this study were verified at the a=.05(Chronbach's alpha) level of significance. The findings of the study were as follows: First, as for relations between demographic characteristics and self- realization, the college students investigated were statistically different according to gender in three subvariables of self-realization that included ability development, ability display and attainment of ideal. Age and academic year made a significant difference to their ability development and attainment of ideal, and they differed statistically significantly in terms of ability development according to black lebel test. Second, concerning connections between the degree of martial-arts training and self-realization, training term, one of the subvariables of the degree of martial-arts training had a positive correlation to their ability development and attainment of ideal at the 5% level of significance, and training time was positively correlated to their ability development at the 5% level of significance. Third, training term, one of the subvariables of the degree of martial- arts training, had an impact on ability development, and that exerted a firsthand influence on attainment of ideal as well.

  • PDF

Evaluation Criteria of Reliability on Transmission Control Unit for Passenger Car

  • Choi, M.;Ryu, S.;Lim, J.H.;Jeong, H.S.
    • International Journal of Reliability and Applications
    • /
    • v.11 no.1
    • /
    • pp.55-67
    • /
    • 2010
  • There has been a recent upsurge in demand for the improvement of car reliability in the Northern American which is the primary market of South Korea automobile industry. It has been required that the warranty for transmission control unit for passenger cars directly related to passenger safety or security should be extended for 10 years and 160,000 km. In this paper, the test method for reliability and evaluation criteria is presented to evaluate the reliability on the automatic transmission controller. Reliability certification test can be roughly divided into two types: a quality test and life assessment test and a quality test can be subdivided into a basic performance test and environmental resistance test. There are 3 types of tests on the performance test for automatic transmission controller and environmental resistance test is composed of 14 items. Life test is performed with only the product passed this quality test. In this study, operation limit test at the high-temperatures, accelerated life test under specific temperature and accelerated life test for 2 or 3 stress levels are shown as a way for life test.

  • PDF

The International Legality of the North Korean Missile Test (북한미사일 실험의 국제법상 위법성에 관한 연구)

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.2
    • /
    • pp.211-234
    • /
    • 2009
  • North Korea conducted the launcher test, which, as North Korea claimed, belonged to the sovereign rights for the purpose of peaceful utilization and exploration of the outer space. The launching was allegedly done for the sole purpose of putting the satellite into earth orbit, while international community stressed the fact that the orbiting of satellite was not confirmed and that the technology used was not distinct from the purpose of building intercontinental ballistic missile. UN Security Council adopted the resolutions which took the effect that the launching was deemed as the missile launching, not the mere launcher test. North Korea declared the moratorium of suspending its test activity. Controversial issues have been raised regarding whether the launcher itself has the legal status of enjoying the freedom of space flight based upon the 1967 Outer Space Treaty. The resolutions, however, has put forward a binding instrument forbidding the launching. UN Security Council resolutions, however, should be read not as defining the missile test illegal, in that the language of resolutions, such as 'demand', should be considered as not formulating a sort of obligatory act or inact. On the other hand, the resolutions should be read as having binding force with respect to any activity relating to the weapons of mass destruction. The resolution 1718 is written in more specific language such as 'decides that the DPRK shall suspend all activities related to its ballistic missile programme and in this context re-establish its pre-existing commitments to a moratorium on missile launching'. Therefore, the lauching activity of the North Korea is banned by the UN Security Council resolution. It should be noted that the resolution does not include any specific provisions defining the space of activity of the North Korea as illegal. But, the legal effect of the moratorium is not denied as to its launching itself, which is corresponding to the missile test clearisibanned in accordance with the resolutions.

  • PDF

An Analysis on the Physical Strength Factor of the Collegians Majoring in Security Services (경호전공대학생의 체력요인 분석)

  • Jeon, Man-Joong
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.431-447
    • /
    • 2007
  • The purpose of this study was to investigate the An analysis on the physical strength factor of the Collegians majoring in Security Services. In order to accomplish this purpose, subjects of this study were 80 person J university student men. Physical fitness tests was grip strength, back strength, sit-ups, stand long jump, 50m run, side step test, shuttle run, 2000m run, standing trunk flexion, and closed eye foot balance. Factor analysis applied for analysis factorial structure of each physical fitness components. The results of this study were as follow; First, the factor affecting the performance of the Collegians majoring in Security Services of their was appeared with the Power, Balance and Strength. Second, the factor affecting the performance of the Collegians majoring in Security Services of their was appeared with the Taekwondo major group with the Balance, Power, Strength and Cardiovascular Endurance. Third, the factor affecting the performance of the Collegians majoring in Security Services of their was appeared with the Judo major group with the Power, Flexibility and Strength. Fourth, the factor affecting the performance of the Collegians majoring in Security Services of their was appeared with the Hapkido major group with the Muscular Endurance, Strength, Cardiovascular Endurance and Flexibility. Fifth, the factor affecting the performance of the Collegians majoring in Security Services of their was appeared with the Gumdo major group with the Cardiovascular Endurance and Power.

  • PDF

The Sub Authentication Method For Driver Using Driving Patterns (운전 패턴을 이용한 운전자 보조 인증방법)

  • Jeong, Jong-Myoung;Kang, Hyung Chul;Jo, Hyo Jin;Yoon, Ji Won;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.919-929
    • /
    • 2013
  • Recently, a variety of IT technologies are applied to the vehicle. However, some vehicle-IT technologies without security considerations may cause security problems. Specially, some researches about a smart key system applied to automobiles for authentication show that the system is insecure from replay attacks and modification attacks using a wireless signal of the smart key. Thus, in this paper, we propose an authentication method for the driver by using driving patterns. Nowadays, we can obtain driving patterns using the In-vehicle network data. In our authentication model, we make driving ppatterns of car owner using standard normal distribution and apply these patterns to driver authentication. To validate our model, we perform an k-fold cross validation test using In-vehicle network data and obtain the result(true positive rate 0.7/false positive rate is 0.35). Considering to our result, it turns out that our model is more secure than existing 'what you have' authentication models such as the smart key if the authentication result is sent to the car owner through mobile networks.

The Relationship between Offline Trust and Online Transaction in Internet Banking (인터넷 뱅킹에서 오프라인 신뢰와 온라인 거래의 관계)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.29-47
    • /
    • 2007
  • Owing to the rapid growth of using the Internet, not only click-and-mortar companies but also brick-and-mortar ones have been expanding their distribution channels into online, Moreover, since online channels are more attractive than offline ones in control and maintenance, switching customers into online ones is emerged as one of very important managerial issues in a view of reduction of cost as well as expansion of services. However, the switched customers should be faced by uncertainties which could not have been experienced in offline. Specifically, in online channels, buyers and sellers are separated temporally and spacially and there are always so many kinds of threat for security as well as not enough systems and conventions for them yet. Therefore, trust has been considered as one of the most critical mechanisms for resolution of such uncertainties in online transactions. However, it is not easy to build and maintain the relationships in online since most of them are virtual and indirect generally. Therefore, in order to switch offline customers into online ones, it is very important to make strategies based on identification of the relationship between online transaction and offline trust which has been built in offline business. Generally offline trust, which has been built independent of online, could not include trust for online-dependent activities such as payment security during or after transactions, while most of online trust include it. Therefore, a customer with high offline trust does not always perceive high security and assure safe transactions. Accordingly, while online trust, where technical capabilities for online security is one of main bases, includes control trust implicitly or explicitly, offline trust does not. However. in spite of such clear discrimination and independence between offline trust and perceived security, there can be the significant dependency between these two beliefs. The customers with high offline trust believe that the company would do some activities for online security for customers' safe transactions since it has been believed of doing well for customers' trust. Theoretically, users' perception of security is interpreted as a kind of control trus, which is trust for company's technical control capacities in order to resolve technical uncertainties in online. Therefore, the relationship between two beliefs can be considered as transference from offline trust to another type trust. that is, control trust. The objective of this study is to analyze the effect of offline trust on online transaction uses mediated by perceived security. For this purpose, we suggest a research model based on technology acceptance model (TAM). Reuse intention is adopted as a dependent variable and TAM is modified by adding perceived risk (PR) as well as two beliefs of using Internet banking, perceived usefulness (PU) and perceived ease of use (PEOU). Moreover, perceive security (PS) is adopted as an external variable for PR and PU, while offline trust (OT) is an antecedent of PS. For an empirical test, sampling from 108 visitors to the banks in Daegu, Korea, we analyze our model by partial least square (PLS) approach. In result, our model is shown to explain 51.4% of the variance in reuse intention and all hypothesis are supported statistically. A theoretical implication of this study is to identify a role of PS between offline trust and reuse intention of using online transaction services. According to our result, PS can be considered as a mediation variable for bridging between two different concepts: trust that explains social aspects of customers and companies, and TAM that explains customers' reuse intention.

Malware Detector Classification Based on the SPRT in IoT

  • Jun-Won Ho
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.59-63
    • /
    • 2023
  • We create a malware detector classification method with using the Sequential Probability Ratio Test (SPRT) in IoT. More specifically, we adapt the SPRT to classify malware detectors into two categories of basic and advanced in line with malware detection capability. We perform evaluation of our scheme through simulation. Our simulation results show that the number of advanced detectors is changed in line with threshold for fraction of advanced malware information, which is used to judge advanced detectors in the SPRT.