• Title/Summary/Keyword: Security activity

Search Result 598, Processing Time 0.027 seconds

Formation of Resilience in the Context of Volunteer Activities Using Information and Communications Technology

  • Lazarenko, NataLiia;Sabat, Nataliia;Sabat, Nadiia;Sylenko, Nadiia;Rundong, Wang;Duchenko, Anna;Shuppe, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.374-381
    • /
    • 2022
  • The article identifies and theoretically substantiates the trends of national resilience in the context of establishing the security of the country and its civilizational subjectivity. The strategy of development of the pedagogical university in the conditions of European integration into the European educational and scientific space based on certain characterological features of the personality of the volunteer in the context of allocation of personal resilience is developed. The analysis of both external and internal challenges and threats to the civilization of the country needs to be understood in the context of economic, socio-political, legal, military-political, spiritual-cultural, educational-scientific and network-information resilience. The concepts of "national resilience" and "national security" are quite close - at first glance, even identical. However, a deeper understanding clarifies the differences: national security is a state of protection of the country identity and its very existence, the realization of its national interests. In turn, resilience is a fairly effective strategy and a fundamental guarantee of national security. At the same time, it is extremely important to understand that both national security as a state and national resilience as a strategy are only means of achieving and developing a strong and humanistic civilizational subjectivity of the country. After all, such subjectivity opens for citizens the opportunity for development, dignified self-realization and a proper life. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The use of information and communication technologies in volunteering will contribute to the formation of resilience traits in the structure of personality formation. Directly to the personal traits of resilience should be included methodological competencies, which include methodological knowledge, skills and abilities (ability to define ultimate and intermediate goals, plan, conduct and analyze knowledge, establish and implement interdisciplinary links with disciplines of medical-psychological-pedagogical cycles, etc.). All these competencies form the professional resilience of the volunteer.

Designing of The Enterprise Insider-Threats Management System Based on Tasks and Activity Patterns (사용자 직무와 활동패턴 기반의 내부자위협통합관리체계 설계)

  • Hong, Byoung Jin;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.3-10
    • /
    • 2015
  • Recent massive data breaches or major security incidents show that threats posed by insiders have greatly increased over time. Especially, authorized insiders can cause more serious problems than external hackers can. Therefore there is a growing need to introduce a system that can monitor the insider threats in real time and prevent data breaches or security incidents in early-stage. In this paper, we propose a EITMS(Enterprise Insider-Threats Management System). EITMS detects the abnormal behaviors of authorized insiders based on the normal patterns made from their roles, duties and private activities. And, in order to prevent breaches and incidents in early-stage, a scoring system that can visualize the insider threats is also included.

Transaction Mining for Fraud Detection in ERP Systems

  • Khan, Roheena;Corney, Malcolm;Clark, Andrew;Mohay, George
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.2
    • /
    • pp.141-156
    • /
    • 2010
  • Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

A System for National Intelligence Activity Based on All Kinds of OSINT(Open Source INTelligence) on the Internet (인터넷의 다원적 공개출처정보(OSINT)에 기반을 둔 국가정보활동 체계)

  • 조병철
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.41-55
    • /
    • 2003
  • Today the traditional national intelligence activities which are mainly based on classified informations are confronted with several problems. These are excessive collection cost, morality of intelligence activity, objectivity of intelligence, intelligence dead zone and timeliness of intelligence etc. On the other hand, circumstances of national intelligence activity are rapidly changed. Those are rapid growth of internet, transformation of classified information into open one and rapid growth of intelligence capabilities of private sector. To cope these problems and circumstances, we reevaluated OSINT(Open Source INTelligence) which is collected from all kinds of open source informations on the internet. First, we classified OSINT into four categories corresponding to the traditional classified collection methods i.e., IMINT, SIGINT, HUMINT and MASINT. And we evaluate the value of OSINT in comparison with classified collection methods. Finally a system for national intelligence activity based on all kinds of open source intelligence on the internet is proposed, described and compared with the system of traditional national intelligence activity.

  • PDF

A study on the Safety Monitoring Theory and Application for the Human Security (인간보호를 위한 안전모니터링 이론과 적용에 관한 연구)

  • Lee, Tae Shik;Seo, Jung Pyo;Seok, Geum Cheol;Cho, Won Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.29-36
    • /
    • 2012
  • This paper focused on the new theory and algorithm improving the citizen's safety which they experience to change from the developing country to the developed country, and analyzed the gained and applicate results, and show the theories and application's evidence for the incident prevention of citizen's life and house. The Safety Monitoring Theory for human security, show the six theories for which they are analyzed and reduced the accident's death, as is the priority of the disaster prevention activity, its decision, continuous minimization of the accident's death number, the environment security, the personal security, the community security. This study is applied to educate and exercise the disaster prevention and safety management's program which applied the seven step's model of the safety monitoring, show on continuously improvement effects through the case study of the personal's and team's monitoring during five years.

An Empirical Study on the Effects of Business Performance by Information Security Management System(ISMS) (정보보호 관리체계(ISMS)가 기업성과에 미치는 영향에 관한 실증적 연구)

  • Jang, Sang Soo;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.107-114
    • /
    • 2015
  • Since 2002, information security management system has been implemented (ISMS) certification scheme whilst providing telecommunications services to enhance the level of enterprise information security was ongoing and Prevent accidents and avoid spread of infringement, such as rapid response and there is a lot of it came true. However, this system is the protection of the country or the investment company, as part of the actual information on how management affects the performance came from or how measures are still lacking for. In this study, the companies have their own privacy ISMS certification measures the level of activity continued to improve information security performance measures and methodology are presented. The government is also based on the validity of the certification system to ensure the overall implementation of the ISMS itself is this a step increase effective information security system is to be certified in advance to prevent security incidents and to improve business performance to help.

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

Comparison of Health Status and Life Satisfaction According to Food Security in Single-Person Households of Elderly Population

  • Dong Hoon Jung;Jae Won Han;Wonha Kim;Hee-Sook Lim
    • Clinical Nutrition Research
    • /
    • v.13 no.1
    • /
    • pp.42-50
    • /
    • 2024
  • This study analyzed the 2019 Community Health Survey data to compare and analyze the health levels and life satisfaction of single-person elderly households based on food security. The final study subjects were 15,606 single-person elderly individuals aged 65 and above. These subjects were classified based on their response to food security into three groups: food sufficient-diverse, food sufficient-not diverse, and food insufficient. The study results showed that the proportion of the food insufficient group among single-person elderly households was 7.4% for men and 10.6% for women, with a slightly higher rate for female elderly. Both male and female elderly over 80 years of age, with low education levels, and basic living support recipients showed significantly higher proportions in the sufficient-not diverse and food insufficient groups. For male elderly, significant differences were observed in subjective health status and oral health level in the food insufficient group, and for female elderly, stress levels also showed significant differences. Life satisfaction scores were generally lower for female elderly compared to male, and significant differences were found in both male and female elderly based on food security. Common factors that significantly influence life satisfaction among single-person elderly households, both male and female, include food security, subjective health status, and living environment satisfaction, with food security being the most impactful factor. The study suggests that it is necessary to include these significant factors in the development of various social activity programs, such as dietary programs, to enhance life satisfaction and food security of single-person elderly households.

The Protection in Security Situation and Effective Ways in the International Major Meetings (국제정상회의 경호안전 실태 및 대책방안)

  • Kwon Jeong-Hun;Lee Sae-Hwan
    • Journal of the Korean Society of Safety
    • /
    • v.20 no.2 s.70
    • /
    • pp.151-157
    • /
    • 2005
  • One of the most significant parts in the international major meetings is to stand attendants over various danger and keep the safe of the nation. The International major meetings such as the summit, the athletic meeting are often held around the world while the activity of the terrorists unseen increases at the high speed. The goal of this thesis is to present some effective ways for successful opening of the international event. Some of the proposals that I come up with the research can be summarized as follows: the smooth cooperation between countries, the control for NGO's demonstration, the training and the best use of security personnel, finally the understanding of peoples and forming sympathy from them.

Countermeasures against Cyber terror in Korea (사이버테러의 현황과 대책에 관한 연구)

  • An, Chang-Hoon
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.211-241
    • /
    • 2002
  • Koreans are the most avid Internet surfers in the world according to Nielson/NetRatings(Reuters, August 2001) and most Internet connections are made through high-speed connections like Digital Subscriber Lines (DSLs). The result of such internet fervor is a nation that is fertile in both hackers and software companies(over 200 in the field of network security alone). However, by-product of Internet activity is cyber crime and the need to protect innocent users from the dangers of cyber criminals and cyber-terrorists be they are individuals or organized groups. Hence the Cyber Terror Response Team (CTRT) was organized in late 2000 with the mandate to fulfill that role. In these contexts, this study analyzes the actual conditions of cyber terror and suggests the countermeasures against cyber terror in Korea.

  • PDF