• Title/Summary/Keyword: Security efficiency

Search Result 1,665, Processing Time 0.026 seconds

A survey on the relation between the employees' viewpoint with knowledge management and cultural intelligence among the employees working in Social Security Organization of Ardabil

  • Borjian, Sheyda;Alavi, Soheila
    • The Journal of Economics, Marketing and Management
    • /
    • v.5 no.2
    • /
    • pp.1-9
    • /
    • 2017
  • This study has reviewed the "A survey on the relation between the employees' viewpoint with knowledge management and cultural intelligence among the employees working in Social Security Organization of Ardabil". The present study is functional in terms of objective and the method is descriptive and survey. This has asked the others' ideas and viewpoints concerning a specific subject and has analyzed them. About the nature and the method used, the present research is of correlation research. The population applied in this research includes all employees working in Social Security Organization of Ardabil consisting of 400. The method used for sampling is simple random sampling. To collect the information in the first step of the research the library method has been used. In this research the data has been collected through standard questionnaires. Then, via descriptive and inferential statistics the research data has been characterized and regarding the spatial scaling of the measurement to test the hypothesis the, correlation analysis of Pearson has been used and also to specify the reliability of the questionnaire the Chronbach's Alpha has been taken in use and the SPSS software to analyze the data also. The findings resulted from the study showed that there is a significant relation between the factors concerning employees' efficiency with knowledge management and the cultural intelligence and all hypotheses was confirmed.

Applying a Quantitative Model on Information System Security Audit Evaluation for Improving Auditing Quality (정보시스템 감리품질향상을 위한 보안감리평가에의 정량화모델 적용 연구)

  • 김동수;김현수
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.45-64
    • /
    • 2004
  • Many researchers have proved that information systems auditing is a very effective tool for improving information systems quality. However, information system auditing in Korea still includes many subjective judgements. This study deals with applying a quantitative model to improve information system auditing quality on security domain. First of all, we have looked at previous researches on information systems audit, especially on security audit. Based on this survey, we have come up with solutions to improve the evaluation efficiency on security audit. We have merged the security audit guidelines of NCA and KISA, and developed a quantified evaluation scheme. We have proved the validity of this model by interviews with experts and by case studies.

  • PDF

An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model

  • Tan, Syh-Yuan;Chin, Ji-Jian;Heng, Swee-Huay;Goi, Bok-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.910-922
    • /
    • 2013
  • In 2008, Chin et al. proposed an efficient and provable secure identity-based identification scheme in the standard model. However, we discovered a subtle flaw in the security proof which renders the proof of security useless. While no weakness has been found in the scheme itself, a scheme that is desired would be one with an accompanying proof of security. In this paper, we provide a fix to the scheme to overcome the problem without affecting the efficiency as well as a new proof of security. In particular, we show that only one extra pre-computable pairing operation should be added into the commitment phase of the identification protocol to fix the proof of security under the same hard problems.

A Study for Efficiency of Database Encrypting and Searching Systems (데이터베이스 암호화 및 검색 시스템의 효율성에 관한 연구)

  • Lee Yu-Jeong;Park Hyun-A;Byun Keun-Duck;Lee Dong-Hoon
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.707-711
    • /
    • 2006
  • 암호화 문서 검색 시스템은 사용자의 비밀키를 이용하여 데이터베이스 서버에 저장되어 있는 암호화 문서를 키워드를 이용하여 검색하는 시스템이다. 이러한 시스템은 데이터베이스 서버 관리자조차도 사용자들에 의해 저장되고 검색되는 문서에 대한 어떠한 정보도 노출시키지 않는 장점이 있다. 즉, 암호화 문서 검색 시스템은 일반 사용자들이 자신의 정보가 손쉽게 노출되는 것을 원치 않는 사회적 변화에 발맞추어 앞으로 지속적으로 발전할 수 있는 연구 주제이다. 하지만, 지금까지 제안된 대부분의 기법들은 이론적인 안전성에만 치우친 나머지 현실적인 적용 가능성이 고려되지 않았다. 이에 본 연구에서는 기존에 제안된 대표적인 기법들을 현실 상황에 맞게 구현하여 검색 시스템의 효율성에 대해 판단한다. 더불어 해당 결과를 바탕으로 앞으로 암호화된 검색 시스템이 나아가야 할 방향을 제시한다.

  • PDF

A Study on the Diverse Activities for Coast Guard Services (해양경계활동의 다각화 방안에 관한 연구)

  • Park, Seong-Ryong;Jin, Seong-Ryong;Ju, Jong-Kwang;Lee, Eun-Bang
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2007.11a
    • /
    • pp.109-114
    • /
    • 2007
  • The changed environment on marine security and the security activities such as coast guard and sea patrol in civil domain are analyzed. In order to respond diverse threats and requirements of sea petrol, the system of civil patrolman and coast guard's auxiliary are discussed. The civil boats and aircraft and civilian's security activities make an important role to enhance the effectiveness and the efficiency of coast guard and patrol.

  • PDF

Cloud Computing in the Vulnerability Analysis for Personal Information Security (Cloud Computing의 개인 정보 보안을 위한 취약점 분석)

  • Sun, Jae-Hoon;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.77-82
    • /
    • 2010
  • Cloud computing is defined as numerous concepts by research institutions and scholars. However, due to the present business trend in the IT sector, emphasizing on cost and efficiency, cloud computing has been defined as a form of computing which can provide extendable mass storage components in the virtual environment. As a result, security issues have been arising due to the variety of cloud computing services provided by the industries. This paper aims to analyze the weaknesses such as security techniques and inquiries, and personal information protection required for various cloud computing services.

An Approach for Optimal Dispatch Scheduling Incorporating Transmission Security Constraints (송전계통 안전도 제약조건을 반영한 급전계획 알고리즘 개발에 관한 연구)

  • Chung, Koo-Hyung;Kim, Bal-Ho
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.12
    • /
    • pp.597-602
    • /
    • 2005
  • The introduction of competition in electricity market emphasizes the importance of sufficient transmission capacities to guarantee various electricity transactions. Therefore, when dispatch scheduling, transmission security constraints should be considered for the economic and stable electric power system operation. In this paper, we propose an optimal dispatch scheduling algorithm incorporating transmission security constraints. For solving these constraints, the dispatch scheduling problem is decomposed into a master problem to calculate a general optimal power flow (OPF) without transmission security constraints and several subproblems to inspect the feasibility of OPF solution under various transmission line contingencies. If a dispatch schedule given by the master problem violates transmission security constraints, then an additional constraint is imposed to the master problem. Through these iteration processes between the master problem and subproblems, an optimal dispatch schedule reflecting the post-contingency rescheduling is derived. Moreover, since interruptible loads can positively participate as generators in the competitive electricity market, we consider these interruptible loads active control variables. Numerical example demonstrates efficiency of the proposed algorithm.

Mobile Devices Technologies: Risks and Security

  • Alsaqour, Raed;Alharthi, Sultan;Aldehaimi, Khalid;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.249-254
    • /
    • 2021
  • Our society is depending on mobile devices that play a major role in our lives. Utilizing these devices is possible due to their speed power and efficiency in performing basic as well as sophisticated operations that can be found in traditional computers like desktop workstations. The challenge with using mobile devices is that organizations are concerned with the interference between personal and corporate use due to Bring Your Own Device (BYOD) trend. This paper highlights the importance of mobile devices in our daily tasks and the associated risks involved with using these devices. Several technologies and countermeasures are reviewed in this paper to secure the mobile devices from different attempts of attacks. It is important to mention that this paper focuses on technical measures rather than considering different aspects of security measures as recommended by the cybersecurity community.

A Study on the Security Technology of Real-time Biometric Data in IoT Environment

  • Shin, Yoon-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.85-90
    • /
    • 2016
  • In this paper, the biometric data is transmitted in real time from the IoT environment is runoff, forgery, alteration, prevention of the factors that can be generated from a denial-of-service in advance, and the security strategy for the biometric data to protect the biometric data secure from security threats offer. The convenience of living in our surroundings to life with the development of ubiquitous computing and smart devices are available in real-time. And is also increasing interest in the IOT. IOT environment is giving the convenience of life. However, security threats to privacy also are exposed for 24 hours. This paper examines the security threats to biological data to be transmitted in real time from IOT environment. The technology for such security requirements and security technology according to the analysis of the threat. And with respect to the biometric data transmitted in real time on the IoT environment proposes a security strategy to ensure the stability against security threats and described with respect to its efficiency.

The Implementation of Probabilistic Security Analysis in Composite Power System Reliability (복합전력계통 신뢰도평가의 확률론적 안전도 도입)

  • Cha, Jun-Min;Kwon, Sae-Hyuk;Kim, Hyung-Chul
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.5
    • /
    • pp.185-190
    • /
    • 2006
  • The security analysis relates to the ability of the electric systems to survive sudden disturbances such as electric short circuits or unanticipated loss of system elements. It is composed of both steady state and dynamic security analyses, which are not two separate issues but should be considered together. In steady state security analysis including voltage security analysis, the analysis checks that the system is operated within security limits by OPF (optimal power flow) after the transition of a new operating point. On the other hand, dynamic security analysis deals that the transition will lead to an acceptable operating condition. Transient stability, which is the ability of power systems to maintain synchronism when subjected to a large disturbance, is a principal component in dynamic security analysis. Usually any loss of synchronism will cause additional outages. They make the present steady state analysis of the post-contingency condition inadequate for unstable cases. This is the reason of the need for dynamics of systems. Probabilistic criterion can be used to recognize the probabilistic nature of system components and shows the possibility of system security. A comprehensive conceptual framework for probabilistic static and dynamic assessment is presented in this paper. The simulation results of the Western System Coordinating Council (WSCC) system compare an analytical method with Monte-Carlo simulation (MCS). Also, a case study of the extended IEEE Reliability Test System (RTS) shows the efficiency of this approach.