• Title/Summary/Keyword: Security ability

Search Result 578, Processing Time 0.031 seconds

The Effects of Self-Leadership on Problem-Solving Ability : A Comparison of College Students in the Department of Noncommissioned Officer and Those in the General Program (셀프리더십이 문제해결력에 미치는 영향 : 부사관과 일반과 대학생 비교)

  • kwon, Jung Min;Kim, Cheol Woo;Lee, Han Gyu
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.43-51
    • /
    • 2018
  • The purpose of this research is to analyze whether the Department of Noncommissioned Officer's(DNO) training influences the improvement of self-leadership and to investigate whether such an influence has a positive effect on the trainees' problem-solving ability. 317 students in the DNO and 263 who are enrolled in the general program at a college located in Busan-Geyongnam Area participated in the study. The results of the study are as follows. First, students in the of DNO had a higher level of self-leadership, and this difference was highly significant(t=5.60, p=.000). Second, students in the DNO also had a greater problem-solving ability, this difference also being highly significant(t=6.54, p=.000). Third, in analyzing the correlation between self-leadership and problem-solving ability, it was determined that there was a significant(r=.631, p=.000) static correlation between the two. It is anticipated that the results of this study will become a useful tool to support the efficient mastery of necessary for the students of the DNO(according to the school-military agreement). Moreover, it is expected that such training will contribute to the stabilization of supply of and demand for professional DNO.

  • PDF

Administrative Leaders and Their Role in Bringing About Development and Organizational Change in Universities (Northern Border University Case Study)

  • Abdelrahman, Rashid Abdelbasit Saad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.67-78
    • /
    • 2021
  • The research aims to identify the role of administrative leaders working in universities in the success of organizational development and change, and the extent of the relationship and ability of administrative leaders at all levels of leadership within universities to the effectiveness of the process of development and organizational change at Northern Border University. In addition to presenting some recommendations and suggestions that can contribute to identifying the best leadership styles that contribute to the success of the development process and positive organizational change. Where leadership, whether in the private sector or the public sector, is one of the main functions concerned with the processes of direction, development, and modernization in the performance of the facility and an important element to activate the organizations' ability to perform their role and achieve their goals. The behavior and trends of leaders represent an important indicator in knowing the type of efforts made by them to improve performance and develop organizations and human resources. The research reached many results, perhaps the most important of which is that the dominant leadership style in universities is the democratic style, followed by the bureaucratic leadership style. The results also showed that there is a significant role for administrative leaders in bringing about development and positive change at Northern Border University at the level of individuals, groups, and organizations. And it became clear that there is an availability of leadership capabilities to an acceptable degree in the administrative leaders. The results of the statistical analysis showed a positive relationship between administrative leadership ability and democratic style. In addition to the existence of a negative relationship between the administrative leadership ability and the bureaucratic style and the freestyle. It was also clear that there were no differences in dealing between males and females, as well as age, educational qualification, experience, and job grade, but there were differences in dealing with the job title.

Improvement Plans for Private Security Guard Certification System -mainly on application prerequisites and partially exemptible qualifications- (신변보호사 자격검정제도의 개선방안 - 응시자격 및 자격검정 일부면제를 중심으로 -)

  • Kang, Dong Beom;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.11-17
    • /
    • 2015
  • Private security guard certification system was recognized as a national certification in 12. 2012 after it was first given in 2006 as a civil certification and then became a national test in 2013. Thinking it short of regulations on some of exemptible requirements as well as test-taking age limit due to the certification's specificity, the current researcher tried to present the following improvement plans. First, in taking the test, only the bottom age limit is given with no top age limit, so a regulation on its top age limit needs to be newly made so that it can select those substantially able to protect persons. Second, it can expand some of its exemptible requirements to not only police civil officials, private security guard civil officials but also military civil officials and college graduates who have taken all the courses for its primary test and have career in private security guard. Third, certain validity period can be set by standard of the date when the certification test application is accepted after retirement from related occupations so that they can maximally exert their ability in actual works. Fourth, the exemptible courses of the test must be limited to the primary test only while its hands-on test must not be exempted to meet the requirement of the ability for actual personal protection. In this manner, it's necessary that the personal protection certification system, as a national certificate, should be carefully reviewed to keep abreast with the growing civil protection industry.

Development of Integrated Security Control Service Model based on Artificial Intelligence Technology (인공지능 기술기반의 통합보안관제 서비스모델 개발방안)

  • Oh, Young-Tack;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.108-116
    • /
    • 2019
  • In this paper, we propose a method to apply artificial intelligence technology efficiently to integrated security control technology. In other words, by applying machine learning learning to artificial intelligence based on big data collected in integrated security control system, cyber attacks are detected and appropriately responded. As technology develops, many large capacity Is limited to analyzing individual logs. The analysis method should also be applied to the integrated security control more quickly because it needs to correlate the logs of various heterogeneous security devices rather than one log. We have newly proposed an integrated security service model based on artificial intelligence, which analyzes and responds to these behaviors gradually evolves and matures through effective learning methods. We sought a solution to the key problems expected in the proposed model. And we developed a learning method based on normal behavior based learning model to strengthen the response ability against unidentified abnormal behavior threat. In addition, future research directions for security management that can efficiently support analysis and correspondence of security personnel through proposed security service model are suggested.

Study of Information Security Management Model in Public Institution (공공기관의 정보보안 관리 모델 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.43-50
    • /
    • 2013
  • Recently, Cyber threats that is doing intelligence and sophistication from the organization's information assets to secure order technical disciplines, as well as managerial and environmental sectors, such as mind-response system is must established. In this paper, possible to analyze the case for the theory in network security, such as the logical network and physical network separation suitable for the corporate environment and constantly respond and manage the Information Security Management Model A secure network design is proposed. In particular, the proposed model improvements derived from the existing network, network improvements have been made in order to design improved ability to respond to real-time security and central manageability, security threats, pre-emptive detection and proactive coping, critical equipment in the event of a dual hwalreu through applied features such as high-availability, high-performance, high-reliability, ensuring separation of individual network security policy integrated management of individual network, network security directional.

A Study on Integration Security Management Model in Cloud Environment (클라우드 환경에서의 통합 보안관제 모델 연구)

  • Byun, Yun Sang;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.407-415
    • /
    • 2013
  • Recently, Interest variety of IT services and computing resources are increasing. As a result, the interest in the security of cloud environments is also increasing. Cloud environment is stored that to provide services to a large amount of IT resources on the Cloud. Therefore, Cloud is integrity of the stored data and resources that such as data leakage, forgery, etc. security incidents that the ability to quickly process is required. However, the existing developed various solutions or studies without considering their cloud environment for development and research to graft in a cloud environment because it has been difficult. Therefore, we proposed wire-wireless integrated Security management Model in cloud environment.

The Effects of Information Security Vaccine User's Construal Level and Message Type on the Information Security Behavior (정보보안 백신 사용자의 해석수준과 메시지유형이 정보보안행동에 미치는 영향)

  • Lee, Kyong Eun;Kim, Jung Yoon;Hyun, Jung Suk;Park, Chan Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.6
    • /
    • pp.33-42
    • /
    • 2015
  • Based on the Construal Level Theory, this study aims to investigate how information security vaccine users' selection intentions differ from each other according to the selection time of information security vaccine, advertisement message types, and information security knowledge levels. For the foregoing, this study conducted an experiment by applying an experimental design of 2(knowledge level: high/low) ${\times}2$(temporal distances: short distance/long distance) ${\times}2$(advertisement message types: how(concrete)/why(abstract)) on computer security vaccine softwares. As a result, this study confirmed that the selection intentions about information security vaccines differed from each other according to the temporal distance and advertisement message type, and also varied according to the information security knowledge level. In conclusion, this study provides an implication that the consideration of well-timed persuasive message is especially important for the users at the high level of knowledge. Also, this research implies the necessity of development of abstract thinking ability based on temporal distance for the users at the low level of knowledge.

Provably Secure Tree-Based Centralized Group Key Distribution: Security Model and Modular Approach (증명 가능한 트리기반 중앙 분배 방식의 그룹키 기법: 안전성 모델 및 변환모듈)

  • Kim Hyun-Jeong;Lee Su-Mi;Lee Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.69-78
    • /
    • 2004
  • During the last decade, security models have been defined for two- and three-parity key exchange protocols. Currently there is a growing research interest in security models for group key management schemes. While various security models and provably secure protocols have been proposed for distributed group key exchange schemes, no results are hewn for centralized group key distribution schemes in spite of their theoretical and practical importance. We describe security requirements and a formal security model for centralized group key distribution scheme: we define the model on the channel controlled by adversaries with the ability of strong user corruption. In the security model, we propose a conversion module which can transform centralized tree-based group key distribution schemes in the literature to provably secure centralized tree-based group key distribution schemes.

An Adaptive Security Model for Dynamic Node Behaviour in MANETs

  • Anand, Anjali;Rani, Rinkle;Aggarwal, Himanshu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2861-2880
    • /
    • 2018
  • Mobile Ad hoc Networks (MANETs) have become a viable platform owing to their potential of providing communication without any pre-existing infrastructure and central administrating authority. Mutual support and co-operation among nodes are prerequisites for performing functions in such networks. The scarcity of resources makes it economical for nodes to conserve their resources and misbehave by avoiding participation in the network. Therefore, a mechanism is required to detect and handle such misbehaving nodes and promote co-operation in the network. Existing techniques for handling misbehaving nodes focus only on their current behaviour without considering the antecedent behaviour of nodes. In real world, a node may dynamically change its behaviour in accordance to its requirements. Hence, an efficient mechanism is required for providing security against such misbehaviour. This paper proposes an Adaptive Security Model which contemplates the present as well as anterior behaviour of nodes for providing security against dynamic node behaviour. The adaptivity of the model is nested in its ability to requite well-behaving nodes and penalize misbehaving ones in conformity with their overall behaviour. Simulation results indicate the efficiency of proposed scheme in securing the network from the menace of dynamic behaviour of nodes.

A Study on the BIL Bitstream Reverse-Engineering Tool-Chain Analysis (BIL 비트스트림 역공학 도구 분석 연구)

  • Yoon, Junghwan;Seo, Yezee;Kim, Hoonkyu;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.287-293
    • /
    • 2018
  • Field Programmable Gate Array (FPGA) is widely used in a variety of fields because of its ability to be programmed as desired. However, when an externally implemented program is loaded on FPGA in the form of a bitstream, there is a possibility that hardware Trojans which cause malfunctions or leak information may be included. For this reason, bitstream reverse engineering is essential, and therefore related research has been conducted, such as BIL. In this paper, we analyze the BIL bitstream reverse engineering tool, which is the most representative algorithm, regarding its performance and limitations.