• Title/Summary/Keyword: Security activity

Search Result 595, Processing Time 0.021 seconds

On the Application of Public Search Measures to Detect and Obtain Information

  • Kozytska, Olena;Tsilmak, Olena;Protsenko, Olena;Yankovyi, Mykola;Lysenko, Аndrii;Shulzhenko, Assol
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.109-112
    • /
    • 2021
  • The article considers the state of legislation that regulates the use of public methods of obtaining information by authorized state bodies. The correlation of public investigative (search) actions with operative-search measures as concepts denoting the application of public methods of obtaining information has been studied. In addition, it argues the need for more detailed delineation and legislative regulation of public investigative (search) actions and operational and investigative measures at the legislative and departmental levels. The purpose of the article is to analyze certain provisions of the Law of Ukraine "On operational and investigative activities" to identify inconsistencies in the content of the text of the law in order to correct and prevent ambiguity in the theory and practice of law enforcement.

Customer Activity Recognition System using Image Processing

  • Waqas, Maria;Nasir, Mauizah;Samdani, Adeel Hussain;Naz, Habiba;Tanveer, Maheen
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.63-66
    • /
    • 2021
  • The technological advancement in computer vision has made system like grab-and-go grocery a reality. Now all the shoppers have to do now is to walk in grab the items and go out without having to wait in the long queues. This paper presents an intelligent retail environment system that is capable of monitoring and tracking customer's activity during shopping based on their interaction with the shelf. It aims to develop a system that is low cost, easy to mount and exhibit adequate performance in real environment.

Evolutionary Theory Of Management In Education

  • Moskalenko-Vysotska, Olena;Melnyk, Emiliia;Tovstenko-Zabelin, Serhii;Lehka, Svitlana;Didenko, Maryna;Hrubych, Kostiantyn
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.312-318
    • /
    • 2022
  • The article notes that one of the reasons for the crisis in education was the sharp discrepancy between the emerging new forms and content and the model of macro-management that has developed over the decades. The level of management of the educational system did not emerge as a specific activity characterized by its own mechanisms and processes, just as qualified carriers of this activity - professionals - managers - did not appear. At the same time, there is practically no theoretical and methodological model of the macrolevel of education management, that is, management of the educational system as an integral structure.

Problems of Employment of the Population and Directions of Their Regulation in the Conditions of War

  • Zakharchyn, Galyna;Antonov, Andriі;Voityk, Oleksandra;Plotka, Lyubov;Mirko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.303-307
    • /
    • 2022
  • The purpose of the study is to determine the key aspects of the problems of employment of the population and the directions of their state regulation in war conditions. Employment policy involves a system of measures to create conditions for a more complete use of the potential of labor and business activity of the able-bodied population, linking this activity through taking into account the specifics of group interests with the tasks and guidelines for socio-economic development. But in the conditions of war, this problem acquires a new relevance. For the study, a number of theoretical methods of analysis were used. Based on the results of the study, the key aspects of the problems of employment of the population and the directions of their state regulation in war conditions were identified.

Multiclass Botnet Detection and Countermeasures Selection

  • Farhan Tariq;Shamim baig
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.205-211
    • /
    • 2024
  • The increasing number of botnet attacks incorporating new evasion techniques making it infeasible to completely secure complex computer network system. The botnet infections are likely to be happen, the timely detection and response to these infections helps to stop attackers before any damage is done. The current practice in traditional IP networks require manual intervention to response to any detected malicious infection. This manual response process is more probable to delay and increase the risk of damage. To automate this manual process, this paper proposes to automatically select relevant countermeasures for detected botnet infection. The propose approach uses the concept of flow trace to detect botnet behavior patterns from current and historical network activity. The approach uses the multiclass machine learning based approach to detect and classify the botnet activity into IRC, HTTP, and P2P botnet. This classification helps to calculate the risk score of the detected botnet infection. The relevant countermeasures selected from available pool based on risk score of detected infection.

Korean Private Security for the Academic Directivity and Security Industry for the Market Directivity (시큐리티의 학문적 지향성과 시큐리티 산업의 시장 지향성 - 한국 시큐리티의 발전현황을 중심으로 -)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.15-31
    • /
    • 2008
  • This study aims to analysis and measure on the private security for the academic directivity and security industry for the market directivity in Korea. For this study we compare and analysis the curriculum of 15 universities in Korea and the papers which were published on "Korean Security Science Review" that is a report in a professional private security. In conclusion, 269 subjects are used as instructional materials in 15 universities, thus 103 subjects for the private security and 60 for the leisure sports and first-aid treatment, 46 for the social science, 30 for the martial arts and shooting, 16 for the secretary affairs, 14 for the foreign languages. Regarding scientistic papers, 45.7% of papers for the private security of all and 14.6% for the public security, 14.6% for the criminal, and 11.6% for the terror etc. But there are any papers for the facilities guard or security in spite of the facilities guard is pivotal role in this field. The facilities guard or security, or maybe house detective, holds 80.5% of the private security market and it is important role in this industry in Korea. Besides, considering development of private security, the security market makeup the body-guard field hold 12.2%, prevention security system by censor hold 4.1%. So, this statistics show that the facilities guard lead practically the private security industry in this field, but there are any subjects for the education and any research for the paper. Thus some modification on the universities curriculum is required, also needs activity research in the facilities guard field for the development private security.

  • PDF

Physical activity convergence contents for health care of the elderly (융합형 노인건강관리 신체활동 콘텐츠)

  • Kang, Sunyoung;Kang, Seungae
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.63-68
    • /
    • 2015
  • In rapid aging society, the disease prevention and management for healthy life of the elderly is very important. Regular physical activity is known to be a useful intervention for the physical and mental health of the elderly. In this study, we explore the convergence contents using IT technology as the intervention for encouraging the regular physical activity in the elderly. There are u-Healthcare and serious game as the convergence of health care and IT technology, and the serious game which is added special purpose such as education, training, and treatment to the fun-one of the game element- can be suitable to provide a variety of contents that leads to physical activity in the elderly. The contents inducing physical activities are "Puffer(ATARI, USA)", "WiiFit(Nintendo, JAPAN)", "Age Invaders(MXR Lab, SINGAPORE)", "Xbox $360^{\circ}$+kinect(Microsoft, USA)", "Tangible bicycle game(Donsin Univ., KOREA)", and "3D Gateball game(Soongsil Univ., KOREA)", and these contents can help health care of the elderly. By increasing physical activity through the use of these contents, it will be able to promote physical fitness and body function required in daily life, disease prevention, and maintain health in the elderly.

Conceptual bases of the Investment Mechanism of the Innovative Activity of Enterprises in the Context of Achieving the Tasks of Strategic Development

  • Komandrovska, Veronika;Kolesnyk, Maksym;Barkova, Kateryna;Vasylyk, Sergii;Dorofieiev, Denys
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.111-118
    • /
    • 2021
  • The authors of the study highlight the conceptual foundations of the investment mechanism of innovation of enterprises in the context of strategic development. Such indicators of investment attraction for the enterprise as investment attractiveness, investment activity of the enterprise, critical mass of investments, minimum sufficiency of investments and others are singled out. It is proved that the balance of investment resources is facilitated by the action of the investment mechanism of innovation activity at the enterprise in the context of achievements of strategic development tasks. Investment processes and their intensification have an impact on the expansion of production capacity of economic entities in strategic development and on improving the efficiency of existing capacities. The investment mechanism of innovative activity at the enterprise in the context of achievement of tasks of strategic development contains system of complex actions which provides: definition of the clear purpose and tasks for the mechanism and achievement of the purposes of the enterprise; assessment of the investment potential of the enterprise; definition of tasks of innovative development of enterprises and investment resources necessary for this purpose, etc. The tasks of the investment mechanism of innovative activity at the enterprise in the context of achievements of tasks of strategic development and its economic, organizational and information components are singled out, as well as levers of influence and regulators of the investment mechanism of innovation in the enterprise.

Information Security Activity(Analysis Phase) (정보보호 활동 (분석단계))

  • Shin, Seong-Yoon;Lee, Hyun-Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.203-204
    • /
    • 2017
  • SDLC 중에서 분석단계는 정보시스템의 개발을 준비하는 단계로서 정보기술 체계의 분석과 사용자의 요구 사항 도출 및 예측되는 위험 요소에 대한 평가도 함께 수행하였다. 정보보호의 요구사항은 도출은 기밀성, 무결성, 가용성, 그리고 책임 추적성 등의 관점에서 하였다.

  • PDF

A Research on the Cloud Computing Security Framework (클라우드 컴퓨팅 정보보호 프레임워크에 관한 연구)

  • kim, Jung-Duk;Lee, Seong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1277-1286
    • /
    • 2013
  • Cloud computing's unique attributes such as elasticity, rapid provisioning and releasing, resource pooling, multi-tenancy, broad-network accessibility, and ubiquity bring many benefits to cloud adopters(company and organization), but also entails specific security risks associated with the type of adopted cloud and deployment mode. To minimize those types of risk, this paper proposed cloud computing security framework refered to strategic alliance model. The cloud computing security framework has main triangles that are cloud threat, security controls, cloud stakeholders and compose of three sides that are purposefulness, accountability, transparent responsibility. Main triangles define purpose of risk minimization, appointment of stakeholders, security activity for them and three sides of framework are principles of security control in the cloud computing, provide direction of deduction for seven service packages.