• Title/Summary/Keyword: Security Test

Search Result 1,256, Processing Time 0.025 seconds

Probabilistic Analysis of AIS.31 Statistical Tests for TRNGs and Their Applications to Security Evaluations (진난수발생기용 난수성 검정 방법 AIS.31에 대한 확률론적 분석 및 보안성 평가 적용 방법)

  • Park, Hojoong;Kang, Ju-Sung;Yeom, Yongjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.49-67
    • /
    • 2016
  • SP 800-90B of NIST(USA) and AIS.31 of BSI(Germany) are representative statistical tests for TRNGs. In this paper, we concentrate on AIS.31 which is under the ongoing international standardization process. We examine the probabilistic meaning of each statistic of the test in AIS.31 and investigate its probability distribution. By changing significance level and the length of sample bits, we obtain formalized accept region of the test. Furthermore we propose the accept regions for some iterative tests, that are not mentioned in AIS.31, and provide some simulations.

A Security Design for a Smart Power Grid Field Test based-on Power IT Systems (전력 IT 기반스마트 파워그리드 실증 보안 체계 설계)

  • Lee, Myung-Hoon;Bae, Si-Hwa;Son, Sung-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2497-2506
    • /
    • 2010
  • Smart power grid is targeting to improve grid operation by integrating existing power IT technologies in the jeju smart grid field test. Real-time two-way communication and interoperability in power grid are essential to smart power grid. Adopting smart grid will increase security vulnerabilities in power grid by increasing the number of wireless sensors and the chances of the external exposure of communication networks. In addition, hackers can cause chaos in the power grid system with eavesdropping and forgery attacks in communication networks. Smart power grid is one of the most important systems in deploying smart grid, and it is important to design security system systematically since smart grid can be seriously damaged when problem occurs. In this paper, local and global smart grid security standard and security vulnerabilities in power grid are reviewed, and 2 level smart grid service model is proposed.

Design and Implementation of Linux-based Integrated Security System(LISS) Using Open Security Tools (공개 보안 도구를 이용한 리눅스 기반 통합 보안 시스템의 설계 및 구현)

  • Jeon, Yong-Hee;Kim, Min-Soo;Jang, Jung-Sook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.485-496
    • /
    • 2004
  • The wide spread of Internet makes susceptible to the attacks via communication Web from hackers using the vulnerability of both computer and network systems. In this paper, we design and implement an integrated security system, named as LISS(Linux-based Integrated Security System) in which an integrated security management is possible. This system is based on the open operating system, Linux and consists of open security tools, which is effective in security management of Linux based-servers. We also construct a test-bed in order to testify the performance of the LISS. It is revealed that the implemented system captures all the attack Patterns generated from Network Mapper.

The Mitigation of Information Security Related Technostress and Compliance Intention (조직 내 정보보안 기술스트레스 완화와 준수의도)

  • Hwang, Inho;Hu, Sungho
    • The Journal of Information Systems
    • /
    • v.29 no.1
    • /
    • pp.23-50
    • /
    • 2020
  • Purpose As information management grows in importance around the world, organizations are investing in information security technology. However, the higher the level of information security technology in an organization, the higher the techno-stress of employees. The purpose of this study is to suggest stress factors related to information security technology that affect the reduction of employees' intention to comply with information security and to suggest ways to alleviate stress. Design/methodology/approach The research presented a model for mitigating technical stress related to information security based on technical stress theory and person-organization fit theory. 346 questionnaire data were analyzed from the members of the organization who applied the information security technology, and the research hypothesis was verified through the structural equation modeling. Findings The hypothesis test confirms that security-related techno-stress reduces the information security compliance intention of employees, organizational technical support mitigates technical stress, and person-organization fitness mitigates the negative relationship between techno-stress and compliance intention. The results of the study contribute to the organization's strategy for minimizing the reduction of the information security compliance intention of employees, and are meaningful in that the theoretical basis for mitigating techno-stress is provided in the field of information security.

Reliability Verification of Evidence Analysis Tools for Digital Forensics (디지털 포렌식을 위한 증거 분석 도구의 신뢰성 검증)

  • Lee, Tae-Rim;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.165-176
    • /
    • 2011
  • In this paper, we examine the reliability verification procedure of evidence analysis tools for computer forensics and test the famous tools for their functional requirements using the verification items proposed by standard document, TIAK.KO-12.0112. Also, we carry out performance evaluation based on test results and suggest the way of performance improvement for evidence analysis tools. To achieve this, we first investigate functions that test subjects can perform, and then we set up a specific test plan and create evidence image files which contain the contents of a verification items. We finally verify and analyze the test results. In this process, we can discover some weaknesses of most of analysis tools, such as the restoration for deleted & fragmented files, the identification of the file format which is widely used in the country and the processing of the strings composed of Korean alphabet.

Examine the Influence of the Fellowship of an Organization Empowerment of Security Officer (민간경비원의 팔로워십이 조직 임파워먼트에 미치는 영향)

  • Kim, Chan-Sun;Park, Young-Man;Ahn, Hwang-Kwon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.4
    • /
    • pp.375-385
    • /
    • 2010
  • The purpose of this study is to examine the influence of the fellowship of an organization empowerment of security officers. By using stratified cluster random sapling, 264 people from private security enterprises which are located in Seoul, 2009, were selected as final samples. However, the cases used in the final analysis were counted as 238. The reliability of the questionnaire used in the study was measured by Cronbach's $\alpha$ statistics, being over .761. The collected data were analyzed by factor analysis, reliability analysis, t-test, F-test, and multiple regression etc., using SPSSWIN 17.0. The conclusions were drawn as following. First, there are difference in fellowship according to the demographic characteristics of security officers. Second, there are difference in organization empowerment according to the demographic characteristics of security officers. Third, the fellowship of security officers affects an organization empowerment. That is to say, when vigorous and active participation, and independent and critical thinking are perceived more highly, the intensity of influence, meaning, capability, and self-determination increase.

Inner and Outer Resources of Coping in Newly Diagnosed Breast Cancer Patients : Attachment Security and Social Support

  • Woo, Jungmin;Rim, Hyo-Deog
    • Korean Journal of Biological Psychiatry
    • /
    • v.21 no.4
    • /
    • pp.141-150
    • /
    • 2014
  • Objectives The purpose of this study is to evaluate the effects of attachment security, social support and health-related burden in the prediction of psychological distress and the mediation effects of social support and health-related burden in relationship between attachment security and psychological distress. Methods Finally, 161 patients were included for the analysis. Chi-square test and independent samples t-test were used for comparing differences between depressive/anxious group and non-depressive/non-anxious group. For evaluating the relationship among attachment security, social support, psychological distress and health-related burden, structural equation modeling analysis were performed. Results 40.7% and 32.0% of the patients have significant depressive symptoms and anxiety symptoms, respectively. In the analysis for testing the differences between groups who have psychological distress and who have not, there were no significant differences of sociodemographic factors and medical characteristics between groups, except for association between depressive symptoms and type of surgery (p = 0.01). Contrary to sociodemographic and medical characteristics, there were significant differences of health-related burden and two coping resources (attachment security and social support) between groups (all p < 0.01), except for the support from medical team in between anxious group and non-anxious group (p = 0.20). In the structural equation model analysis (Model fit : chi-square/df ratio = 0.8, root mean square error of approximation = 0.000, comparative fit index = 1.000, non-normed fit index =0.991), attachment security and social support emerged as an important predictor of psychopathology. Conclusions Attachment security and social support are important factors affecting the psychological distress. We suggest that individual attachment style and the social support state must be considered to approach the newly diagnosed breast cancer patients with psychological distress.

Economic Security of Household: The Comparison of Short-term and Long-term Indicators (가계의 경제적 안정도: 단기지표와 장기지표의 비교)

  • 김강자
    • Journal of Families and Better Life
    • /
    • v.11 no.1
    • /
    • pp.107-118
    • /
    • 1993
  • A dimension of well-being economic security was analyzed and compared with economic adequacy. Again it was tested whether two indicators of economic security(short-term vs. long-term) yield same distribution across all household groups. Economic Security was defined as the household ability to sustain a given level of consumption in the case of economic emergency; specifically loss of income. Measure of 8 different kinds of economic security were constructed from household net worth including and excluding home equity. Data were taken from the 1988 U.S. Consumer Expenditure Survey and 2148 households were selected to test hypotheses concerning the economic security of American households Empirical results showed a very low level of economic security in general. The first hypothesis that distribution of economic adequacy and economic security are same across all population groups was rejected. On the average security measure rather than adequacy measure was favor to white female-headed households and households who have old and highly educated house-holder. The second hypothesis that the indicators of long-term and short-term economic security yield the same results across all household was not rejected. In general the level of economic security was relatively higher when long-term indicator was used than short-term indicator was however the direction and relative size of effect of income and each control variable was almost same.

  • PDF

Teaching Book and Tools of Elementary Network Security Learning using Gamification Mechanism (게이미피케이션 메커니즘을 이용한 초등 네트워크 정보보안 학습교재 및 교구 개발)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.787-797
    • /
    • 2016
  • This paper is directed for the information security education of the elementary students. The dependence on human involvement and human behavior to protect information assets necessitates an information security education to make the awareness of their roles and responsibilities towards information security. The information security education is needed even to elementary school students. The information security learning model integrating knowledge, attitudes, and ways to practice was developed, and the teaching plan and learning material hand-out were accordingly made out. As the test result analysis, it was verified that the developed teaching tools of elementary network security learning using gamification mechanism was effective to help the students learn the knowledge, attitudes, skills and ways to practice.

Developing Strategies to Improve Operational Test and Evaluation of Weapon System in the Age of the Fourth Industrial Revolution (4차 산업혁명 시대에 적합한 무기체계 운용시험평가 개선전략 도출)

  • Lee, Kangkyong;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.6
    • /
    • pp.591-601
    • /
    • 2020
  • After North Korea's sixth nuclear test, the operational environment on the Korean Peninsula has fundamentally changed, and the South Korean military faces various security challenges, including a reduction in military service resources and shorter military service periods. In particular, the South Korean military is seeking a new paradigm in military construction amid changes in the defense acquisition environment linked to the push for defense reform 2.0 and the utilization of the fourth industrial revolution. Therefore, this study considered strategies for improving the operational test and evaluation of weapons systems suitable for changes in the defense acquisition environment to effectively prepare for existing military threats and future warfare patterns. For this purpose, external environment analysis and internal capabilities were diagnosed using PEST Analysis and SPRO Analysis, and improvement strategies were derived through SWOT analysis.