• 제목/요약/키워드: Security analysis

검색결과 6,610건 처리시간 0.045초

Fault Tree Analysis and Failure Mode Effects Analysis for Software Security Improvements in Mobile Banking Information Systems (모바일 뱅킹 정보시스템의 소프트웨어 보안성 개선을 위한 고장 트리 분석과 고장 유형 영향 분석)

  • Kim, So Young;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • 제18권11호
    • /
    • pp.1342-1350
    • /
    • 2015
  • Due to rapid development of mobile device technologies, the mobile banking through Internet has become a major service of banking information systems as a security-critical information systems. Recently, lots of mobile banking information systems which handle personal and transaction information have been exposed to security threats in vulnerable security control and management processes, mainly software systems. Therefore, in this paper, we propose a process model for software security improvements in mobile banking information system by application of fault tree analysis(FTA) and failure modes and effects analysis(FMEA) on the most important activities such as 'user authentication' and 'access control' and 'virus detection and control' processes which security control and management of mobile banking information systems are very weak.

Probabilistic Security Analysis in Composite Power System Reliability (복합전력계통 신뢰도평가에 있어서 확률론적 안전도연구)

  • Kim, H.;Cha, J.;Kim, J.O.;Kwon, S.
    • Proceedings of the KIEE Conference
    • /
    • 대한전기학회 2005년도 추계학술대회 논문집 전력기술부문
    • /
    • pp.46-48
    • /
    • 2005
  • This paper discusses a probabilistic method for power system security assessment. The security analysis relates to the ability of the electric power systems to survive sudden disturbances such as electric short circuits or unanticipated loss of system elements. It consists of both steady state and dynamic security analyses, which are not two separate issues but should be considered together. In steady state security analysis including voltage security analysis, the analysis checks that the system is operated within security limits by OPF (optimal power flow) after the transition to a new operating point. Until now, many utilities have difficulty in including dynamic aspects due to computational capabilities. On the other hand. dynamic security analysis is required to ensure that the transition may lead to an acceptable operating condition. Transient stability, which is the ability of power systems to maintain synchronism when subjected to a large disturbance. is a principal component in dynamic security analysis. Usually any loss of synchronism may cause additional outages and make the present steady state analysis of the post-contingency condition inadequate for unstable cases. This is the reason for the need of dynamic studies in power systems. Probabilistic criterion can be used to recognize the probabilistic nature of system components while considering system security. In this approach. we do not have to assign any predetermined margin of safety. A comprehensive conceptual framework for probabilistic static and dynamic assessment is presented in this paper. The simulation results of the Western System Coordinating Council (WSCC) system compare an analytical method with Monte-Carlo simulation (MCS).

  • PDF

A Study on the Development of Analysis Model for Maritime Security Management (해상보안관리 분석모델 개발에 관한 연구)

  • Jeong, Woo-Lee
    • Journal of Navigation and Port Research
    • /
    • 제36권1호
    • /
    • pp.9-14
    • /
    • 2012
  • Maritime security incidents by pirates and by terrorists increase, but maritime incidents investigation models are limited to figure out the maritime security incidents. This paper provides the analysis model for maritime security incidents. To develop this analysis model, this categorizes five threat factors, the ship, the cargo type, port system, human factor, information flow system, makes the risk assessment matrix to quantify the risk related to threat factors and classifies four priority categories of risk assessment matrix. Also, this model makes from the frameworks which include a variety of security initiatives implementing in stakeholder levels like international organizations, individual governments, shipping companies, and the ship. Therefore, this paper develops the Analysis for Maritime Security Management model based on various security initiatives responding to the stakeholder levels of maritime security management and top-bottom/bottom-up decision trees, and shows the validity through verifying the real maritime security incident of M/V Petro Ranger.

An Information Security Model for Digital Contents (디지털 콘텐츠의 정보보호 분석 모델)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • 제10권3호
    • /
    • pp.9-14
    • /
    • 2010
  • The network architecture and analysis model for evaluating the information security are presented to distribute the reliable and secure multimedia digital contents. Using the firewall and IDS, the function of the proposed model includes the security range, related data collection/analysis, level evaluation and strategy proposal. To develop efficient automatic analysis tool, the inter-distribution algorithm and network design based on the traffic analysis between web-server and user are needed. Furthermore, the efficient algorithm and design of DRM/PKI also should be presented before the development of the automatic information security model.

An Analysis of the Impact of ODA Projects on Food Security -Focusing on Terai Region, Nepal- (ODA 프로젝트를 통한 식량안보 개선 효과 분석 -네팔 떠라이 지역을 중심으로-)

  • Bae, Jooncheol;Kim, Taeeun;Ji, Seongtae
    • Journal of Korean Society of Rural Planning
    • /
    • 제30권3호
    • /
    • pp.37-53
    • /
    • 2024
  • The purpose of this study is to analyze the effectiveness of an agriculture and rural development ODA project in southern Nepal's Terai region to improve food security, and to suggest appropriate project approaches to improve food security. The subject of the analysis is the KOICA-funded 'Inclusive Rural Development project', and a framework for analyzing food security was established based on the FAO's four pillars of food security, and indicators were proposed to measure the food security of project farmers. The data for this study were obtained from a survey of project beneficiary farmers and their control group, and the effects of the project on food security were measured using a a t-test analysis, difference-in-difference analysis, propensity score matching-linear regression combined model (PSM-OLS) and a propensity score matching-difference-in-difference combined model(PSM-DID). The results showed that, in general, the ODA project treatment group had significant improvements in each of the four pillars of food security (food availability, access, utilization, and stability). In addition, cooperative membership had a positive impact on food security improvements, and there were also differences in outcomes among different ethnic groups in the Terai region. The implications of this study are that the Korean government's ODA policy should set aside the food security sector and incorporate food security indicators to contribute to the improvement of food security in ODA partner countries, and that agricultural and rural development ODA projects should include food security indicators as performance indicators in their pre-planning to contribute to securing food security for vulnerable groups as food insecurity is higher among vulnerable groups.

A Study on Security Performance of Registered Security Guards in the Government Buildings (정부청사 청원경찰의 보안성과에 관한 연구)

  • Chae, Jeong-Seok;Choi, Yeon-Jun
    • Korean Security Journal
    • /
    • 제62호
    • /
    • pp.295-320
    • /
    • 2020
  • The purpose of this study is to analyze the influence which affects security performance of registered security guards hired by government buildings via job engagement so that basic data can be provided to improve their security performance. To accommodate this study, a survey was conducted from November 26th to December 27th, 2019 through the cooperation of registered security guards working in government buildings in Seoul, Gwacheon, Daejeon, and Sejong. A total of 234 survey sheets were collected and 28 sheets out of them had missing data or incomplete data so a subsequent total of 206 survey sheets were used in this analysis. SPSS 23.0 was applied making use of the collected data for frequency and descriptive statistics analysis, trustworthiness analysis, exploratory factor analysis, and correlation analysis. By applying AMOS 23.0, a means to examine the structural relation between organization, job engagement, and security performance were able to be analyzed. The result of this study is as follows. First, it was found that organizational justice gives a meaningful positive (+) influence on job engagement for registered security guards. Second, it was found that job engagement for registered security guards gives them a meaningful positive(+) influence in their security performance. Third, it was found that organizational justice does not give any meaningful influence on security performance directly. Fourth, organizational justice does not give any meaningful influence on security performance directly but it gives meaningful positive(+) influence on security performance via job engagement as it takes the role of full mediation variable. Based on the results, in order to maximize security performance of registered security guards, this study recommends that government building administrators to try their best to propose to the National Assembly a proposition for Police Assigned for registered security guards Act to be legalized in order to improve the leveling system of registered security guards so that registered security guards can have more job engagement.

Understanding Security Knowledge and National Culture: A Comparative Investigation between Korea and the U.S

  • Kwak, Dong-Heon;Kizzier, Donna Mcalister;Zo, Hang-Jung;Jung, Eui-Sung
    • Asia pacific journal of information systems
    • /
    • 제21권3호
    • /
    • pp.51-69
    • /
    • 2011
  • Security has been considered one of the most critical issues for managing IT resources in many organizations. Despite a growing interest and extensive research on security at various levels, little research has focused on the comparison of security knowledge levels between different cultures. The current study investigates and compares the security knowledge level between Korea and the U.S. Based on the literature review of spyware, Hofstede's cultural dimensions, and security knowledge, this study identifies three constructs (i.e., security familiarity, spyware awareness, and spyware knowledge) to examine the difference of security knowledge levels between Korea and the U.S. Six hundred ninety-six respondents from Korea and the U.S. participated in the survey, and an in-depth analysis based on analysis of covariance (ANCOVA) was carried out. The results show that the levels of security familiarity, spyware awareness, and spyware knowledge are significantly lower in Korea than in the U.S., as expected. These findings present a significant association between national culture and security knowledge, and the degree of individualism (or collectivism) plays an especially critical role in the perception of security. A number of implications for academia and practitioners emerge. Limitations and future research directions are discussed in the conclusion.

Multi-Attribute Threat Index for Information Security : Simulation and AHP Approach (정보보호를 위한 다속성 위협지수 : 시뮬레이션과 AHP 접근방법)

  • Lee, Kang-Soo;Kim, Ki-Yoon;Na, Kwan-Sik
    • Journal of Information Technology Services
    • /
    • 제7권1호
    • /
    • pp.117-130
    • /
    • 2008
  • Multi-attribute risk assessments provide a useful framework for systematic quantitative risk assessment that the security manager can use to prioritize security requirements and threats. In the first step, the security managers identify the four significant outcome attributes(lost revenue, lost productivity, lost customer, and recovery cost). Next. the security manager estimates the frequency and severity(three points estimates for outcome attribute values) for each threat and rank the outcome attributes according to AHP(Analytic Hierarchy Process). Finally, we generate the threat index by using muiti-attribute function and make sensitivity analysis with simulation package(Crystal Ball). In this paper, we show how multi-attribute risk analysis techniques from the field of security risk management can be used by security managers to prioritize their organization's threats and their security requirements, eventually they can derive threat index. This threat index can help security managers to decide whether their security investment is consistent with the expected risks. In addition, sensitivity analysis allows the security manager to explore the estimates to understand how they affect the selection.

Advanced Information Security Management Evaluation System

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권6호
    • /
    • pp.1192-1213
    • /
    • 2011
  • Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.

Private Security comparative study on the legal status (민간경비원의 법적 지위에 관한 비교연구)

  • Seo, Jin Seok
    • Convergence Security Journal
    • /
    • 제14권1호
    • /
    • pp.43-50
    • /
    • 2014
  • Private security guards are not given special legal privileges to the general public, and holds the same legal status. However, the private security industry has been the expansion of business areas, but some legal rights to bring a limited time you can claim that. In this study, major countries such as Japan, the United States and comparative analysis of the legal status of the security guards and private security guards in Korea about the legal status of the current law on the guards private security law Korea by analyzing the legal status of private security guards to the issue of the legal status and thereby derive an alternative proposes a purpose.