• Title/Summary/Keyword: Security Test

Search Result 1,256, Processing Time 0.036 seconds

Integrity Verification in Vehicle Black Box Video Files with Hashing Method (차량용 블랙박스 영상파일의 무결성 검증에 해시함수 이용 방법)

  • Choi, Jin-young;Chang, Nam Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.241-249
    • /
    • 2017
  • Recently, as a vehicle black box device has propagated, it has been increasingly used as a legal proof and there are the needs to verify an integrity of the video data. However, since the black box classified as the embedded system has a small capacity and low processing speed, there are limitations to the storage of video files and the integrity verification processing. In this paper, we propose a novel method for video files integrity in the black box environment with limited resources by using lightweight hash function LSH and the security of HMAC. We also present the test results of CPU idle rate at integrity verification in vehicle black box device by implementing this method, and verify the effectiveness and practicality of the proposed method.

Factors Affecting the Behavioral Intention and Behavior of Using E-Wallets of Youth in Vietnam

  • PHAN, Trong Nhan;HO, Truc Vi;LE-HOANG, Phuong Viet
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.295-302
    • /
    • 2020
  • The study examines an empirical case that explores the key constructs of the Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh, Morris, Davis & Davis, 2003) and the relationship between security and privacy of the Theory of Perceived Risk (TPR) (Bauer, 1960). This study employs survey data of 200 young Internet users aged 18 to 25. The study was conducted through two steps: preliminary research by qualitative research method to form the official research scale then formal research by quantitative research method using CFA and SEM to test the research model. The research results show that performance expectancy and social influence significantly predict behavioral intention to use e-wallets in payment. In contrast, the factors, namely, security and privacy, and effort expectancy, are statistically insignificant on behavioral intention. Nevertheless, the facilitating conditions factor still affects the behavior of using e-wallets. The study proposes a model to generalize the online payment environment through the integration of UTAUT and TPR models that are important for online payment management and researchers in the technology environment. The findings of this study suggest that social influence significantly affects the intention of young people to use e-wallets instead of security and privacy.

Analysis of Encryption Algorithm Performance by Workload in BigData Platform (빅데이터 플랫폼 환경에서의 워크로드별 암호화 알고리즘 성능 분석)

  • Lee, Sunju;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1305-1317
    • /
    • 2019
  • Although encryption for data protection is essential in the big data platform environment of public institutions and corporations, much performance verification studies on encryption algorithms considering actual big data workloads have not been conducted. In this paper, we analyzed the performance change of AES, ARIA, and 3DES for each of six workloads of big data by adding data and nodes in MongoDB environment. This enables us to identify the optimal block-based cryptographic algorithm for each workload in the big data platform environment, and test the performance of MongoDB by testing various workloads in data and node configurations using the NoSQL Database Benchmark (YCSB). We propose an optimized architecture that takes into account.

A RFID Privacy protection system using H/W friendly security algorithm Environment (하드웨어 친화적인 암호 알고리즘을 사용한 RFID 프라이버시 보호 시스템)

  • Kim, Jin-mook;Ryou, Hwang-Bin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.280-284
    • /
    • 2005
  • In ubiquitous computing environment, An RFID system will be the important way that recognizing an object instead of Bar-code system. But a privacy infringement problem is predicted between a tag and leader to be serious. There is many difficulty that just uses an existing research method because it has an Hardware restriction. Therefore we will suggest that A RFID Privacy Protect system using Hareware friendly security algorithm. we will use RC5 and CBC_MAC because the tag has hardware restriction .To implement, We will simulate and test on One chip microprcessor environment. In the result of the experiment, We will know that a suggested system solves privacy problem on RFID system that it was using CBC-MAC and RC5 security algorithm.

  • PDF

Predicting Employment Status of Injured Workers Following a Case Management Intervention

  • Awang, Halimah;Mansor, Norma
    • Safety and Health at Work
    • /
    • v.9 no.3
    • /
    • pp.347-351
    • /
    • 2018
  • Background: The success of an injury intervention program can be measured by the proportion of successful return to work (RTW). This study examined factors of successful return to employment among workers suffering from work-related injuries. Methods: Data were obtained from the Social Security Organization, Malaysia database consisting of 10,049 RTW program participants in 2010-2014. The dependent variable was the RTW outcome which consisted of RTW with same employer, RTW with new employer or unsuccessful return. Multinomial logistic regression was performed to test the likelihood of successful return with same employer and new employer against unsuccessful return. Results: Overall, 65.3% of injured workers were successfully returned to employment, 52.8% to the same employer and 12.5% to new employer. Employer interest; motivation; age 30-49 years; intervention less than 9 months; occupational disease; injuries in the lower limbs, upper limbs, and general injuries; and working in the manufacturing, services, and electrical/electronics were associated with returning to work with the same employer against unsuccessful return. Male, employer interest, motivation, age 49 years or younger, intervention less than 6 months, occupational disease, injuries in the upper limbs and services sector of employment were associated with returning to new employer against unsuccessful return. Conclusion: There is a need to strengthen employer commitment for early and intensified intervention that will lead to improvement in the RTW outcome.

A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns (SSL VPN기반의 행위.순서패턴을 활용한 접근제어에 관한 연구)

  • Jang, Eun-Gyeom;Cho, Min-Hee;Park, Young-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.125-136
    • /
    • 2013
  • In this paper, we proposed SSL VPN-based network access control technology which can verify user authentication and integrity of user terminal. Using this technology, user can carry out a safety test to check security services such as security patch and virus vaccine for user authentication and user terminal, during the VPN-based access to an internal network. Moreover, this system protects a system from external security threats, by detecting malicious codes, based on behavioral patterns from user terminal's window API information, and comparing the similarity of sequential patterns to improve the reliability of detection.

Blockchain-Based Mobile Cryptocurrency Wallet

  • Yeom, Gwyduk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.59-66
    • /
    • 2019
  • As the monetary value of cryptocurrency increases, the security measures for cryptocurrency becomes more important. A limitation of the existing cryptocurrency exchanges is their vulnerability to threats of hacking due to their centralized manner of management. In order to overcome such limitation, blockchain technology is increasingly adopted. The blockchain technology enables decentralization and Peer-to-Peer(P2P) transactions, in which blocks of information are linked in chain topology, and each node participating in the blockchain shares a distributed ledger. In this paper, we propose and implement a mobile electronic wallet that can safely store, send and receive cryptocurrencies. The proposed mobile cryptocurrency wallet connects to the network only when the wallet actively is used. Wallet owner manages his or her private key offline, which is advantageous in terms of security. JavaScript based wallet apps were implemented to respectively run on Android and iOS mobile phones. I demonstrate the process of transferring Ethereum cryptocurrency from an account to another account through Ropsten, a test net for Ethereum. Hardware wallets, such as Ledger Nano S, provide a slightly higher level of security, yet have the disadvantages of added burden of carrying additional physical devices and high costs (about 80$).

Audio Steganography Method Using Least Significant Bit (LSB) Encoding Technique

  • Alarood, Alaa Abdulsalm;Alghamdi, Ahmed Mohammed;Alzahrani, Ahmed Omar;Alzahrani, Abdulrahman;Alsolami, Eesa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.427-442
    • /
    • 2022
  • MP3 is one of the most widely used file formats for encoding and representing audio data. One of the reasons for this popularity is their significant ability to reduce audio file sizes in comparison to other encoding techniques. Additionally, other reasons also include ease of implementation, its availability and good technical support. Steganography is the art of shielding the communication between two parties from the eyes of attackers. In steganography, a secret message in the form of a copyright mark, concealed communication, or serial number can be embedded in an innocuous file (e.g., computer code, video film, or audio recording), making it impossible for the wrong party to access the hidden message during the exchange of data. This paper describes a new steganography algorithm for encoding secret messages in MP3 audio files using an improved least significant bit (LSB) technique with high embedding capacity. Test results obtained shows that the efficiency of this technique is higher compared to other LSB techniques.

An Electronic Strategy in Innovative Learning Situations and the Design of a Digital Application for Individual Learning to Combat Deviant Intellectual Currents in Light of the Saudi Vision 2030

  • Aisha Bleyhesh, Al-Amri;Khaloud, Zainaddin;Abdulrahman Ahmed, Zahid;Jehan, Sulaimani
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.217-228
    • /
    • 2022
  • The study aimed to build an electronic strategy in innovative learning situations for the role of education in combating intellectual currents. A total of 525 Saudi university faculty members and general education teachers were surveyed using two electronic questionnaires. Arithmetic averages and standard deviations, One-way ANOVA, Scheffé's test, Pearson's correlation coefficient, and Cronbach's alpha stability coefficient were used as statistical methods. The study statistically identifies the differences between the study sample at the level of significance (0.05). and the design of a digital application for individual learning to combat deviant intellectual currents to activate them in light of Saudi Vision 2030 by combining the theoretical academic material and turning it into a learning e-game called (crosswords). The game is equipped with hyper media that supports education with entertainment to direct ideas towards the promotion of identity, the development of values towards moderation and the consolidation of intellectual security. Additionally, the learning e-game represents awareness messages in three short films to activate the role of curricula and intellectual awareness centers to apply realistically, innovatively, and effectively.

Determining Dimensions of Job Satisfaction among Employees: Evidence from Commercial Bank Industries in Bangladesh

  • Md. Sayed, UDDIN;Md. Atikur, RAHAMAN;Wasib Bin, LATIF
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.10 no.2
    • /
    • pp.195-201
    • /
    • 2023
  • Since the banking industry relies so heavily on strong customer-staff interactions, measuring employee job satisfaction has become a critical problem. To achieve benefits for both individuals and organizations, it is crucial to foster and ensure employee job satisfaction. The main objective of this study is to determine the influencing factors of employees' job satisfaction in commercial banks in Bangladesh. This study focused on some significant factors such as employee empowerment, job security, management support, and attractive compensation in an organization. In terms of research purpose, non-probability convenience sampling has been used, and the study is quantitative in nature. For data collection purposes, an online survey questionnaire was prepared based on previously published articles. The targeted population was the bank employees of commercial banks in Bangladesh where the final sample size was n = 200. For analyzing the collected data, SPSS 26.0 version has been used to test the study model and the proposed hypotheses. This study also shows that employee empowerment, job security, management support, and attractive compensation have positive and significant effects on employees' job satisfaction at the workplace. Finally, this study has offered some extraordinary directions and implications for future research on commercial bank authorities in Bangladesh.