• Title/Summary/Keyword: Security major

Search Result 1,282, Processing Time 0.028 seconds

A study on the Relationships between Military field experience and Major satisfaction - On the focus of noncommissioned officer's department - (병영현장실습과 전공만족도와의 관계 연구 - 부사관과를 중심으로 -)

  • Lim, Gye Hwan
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.17-23
    • /
    • 2015
  • This study a Descriptive research to examine the relationships between Military field experience and Major satisfaction, On the focus of noncommissioned officer's department of College. The data was collected from 370 College students, April 6 to April 10, 2015. Descriptive statistics, frequency, t-test, ANOVA, scheffe test, and pearson correlation analysis were performed using SPSS/WIN 20.0 program. Results: In critical Military field experience, there were significants differences in Security-related education, training Major selection motiveage and Hope career field after graduation. And Major satisfaction has a positive relationships between Military field experience(r=.59, P<.001). Conclusion: To enhance problem process ability for noncommissioned officer's department of College, it is necessary to develop teaching program and curriculum.

Analysis of Efficiency of Major Information and Communication Infrastructure Analysis and Evaluation Methods Using DEA Model (DEA 모형을 이용한 주요정보통신기반시설 취약점 분석·평가의 효율성 분석)

  • Sun, Jong-wook;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.853-862
    • /
    • 2021
  • Today, disturbance and paralysis of information and communication infrastructure by electronic infringement of national infrastructure is emerging as a threat. Accordingly, the government regularly implements the vulnerability analysis and evaluation system of major information and communication infrastructure to protect the information system and control system of major infrastructure, and invests increased human and material resources every year to efficiently operate it. However, despite the government's efforts, as infringement accidents and attempts targeting national infrastructure continue to occur, the government's resource input to prepare the information protection foundation has little effect on the information protection activity result calculation, making the evaluation system not efficient. The question arises that it is not. Therefore, in this study, we use the DEA model to review the efficient operation of the vulnerability analysis and evaluation system for major information and communications infrastructure, and suggest improvement measures to enhance the level of information protection based on the analyzed results.

Cognitive Bias and Information Security Research: Research Trends and Opportunities

  • Park, Jongpil;Oh, Chang-Gyu
    • Asia pacific journal of information systems
    • /
    • v.26 no.2
    • /
    • pp.290-298
    • /
    • 2016
  • Human cognition and decision-making related to information systems (IS) is a major area of interest in IS research. Among these areas, cognitive bias rooted in behavioral economics is gaining considerable attention from researchers. In the present study, we identify the role of cognitive biases and discuss how they shape the information security behavior. We also seek research opportunities to provide directions and implications for future research.

Study on Security Considerations in the Cloud Computing (클라우드 컴퓨팅에서의 보안 고려사항에 관한 연구)

  • Park, Choon-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1408-1416
    • /
    • 2011
  • Cloud computing provides not only cost savings and efficiencies for computing resources, but the ability to expend and enhance services. However, cloud service users(enterprisers) are very concerned about the risks created by the characteristics of cloud computing. In this paper, we discuss major concerns about cloud computing environments including concerns regarding security. We also analyze the security concerns specifically, identify threats to cloud computing, and propose general countermeasures to reduce the security risks.

Mobile Devices Technologies: Risks and Security

  • Alsaqour, Raed;Alharthi, Sultan;Aldehaimi, Khalid;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.249-254
    • /
    • 2021
  • Our society is depending on mobile devices that play a major role in our lives. Utilizing these devices is possible due to their speed power and efficiency in performing basic as well as sophisticated operations that can be found in traditional computers like desktop workstations. The challenge with using mobile devices is that organizations are concerned with the interference between personal and corporate use due to Bring Your Own Device (BYOD) trend. This paper highlights the importance of mobile devices in our daily tasks and the associated risks involved with using these devices. Several technologies and countermeasures are reviewed in this paper to secure the mobile devices from different attempts of attacks. It is important to mention that this paper focuses on technical measures rather than considering different aspects of security measures as recommended by the cybersecurity community.

A Study on Scenario-based Web Application Security Education Method

  • Gilja So
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.149-159
    • /
    • 2023
  • Web application security education that can provide practical experience is needed to reduce damage caused by the recent increase in web application vulnerabilities and to strengthen security. In this paper, we proposed a scenario-based web application education method, applied the proposed method to classes, and analyzed the results. In order to increase the effectiveness of scenario-based education, a real-life practice environment to perform scenarios and instructions to be performed by learners are needed. As an example of the proposed method, instructions to be performed by learners from the viewpoint of the attacker and the victim were shown in a practice environment to teach XSS and SQL injection vulnerabilities. After applying the proposed method to the class for students majoring in cyber security, when the lecture evaluation results were analyzed, it was shown that the learner's interest, understanding, and major ability all improved.

A Survey of Cybersecurity Vulnerabilities in Healthcare Systems

  • Adwan Alownie Alanazi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.155-161
    • /
    • 2023
  • In the process of remarkable progress in the medical and technical field and activating the role of technology in health care services and applications, and since the safety of medical data and its protection from security violations plays a major role in assessing the security of health facilities and the safety of medical servers Thus, it is necessary to know the cyber vulnerabilities in health information systems and other related services to prevent and address them in addition to obtaining the best solutions and practices to reach a high level of cybersecurity against attackers, especially due to the digital transformation of health care systems and the rest of the dealings. This research is about what cyberattacks are and the purpose of them, in addition to the methods of penetration. Then challenges, solutions and some of the security issues will be discussed in general, and a special highlight will be given to obtaining a safe infrastructure to enjoy safe systems in return.

Perceptual Differences between Managers and Practitioners on Competencies of Information Security Consultants (정보보호컨설턴트 역량에 대한 관리자와 실무자의 인식차이)

  • Kim, Se-Yun;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.227-235
    • /
    • 2016
  • As various measures of law observance obligations such as mandatory obligation of privacy impact assessment (PIA) for public institutions and authorization of information security management system (ISMS) are put into practice, increase in demand for information security consulting and securement of information security consultants are emerging as a major issue. The purpose of this study is to empirically investigate what core competencies information security consultants should possess and how much they actually possess them. By analyzing the differences in perception between practitioners and managers on core competencies, this study understands difference of views between the two groups and suggests ideas for cultivation of information security consultants.

A Study on the Effect of Learning Activities and Feedback Seeking Behavior toward the End Users' Faithful Appropriation of Information Security System (조직내 최종사용자의 합목적적인 정보보호 시스템 사용 내재화와 학습, 피드백 추구 행동 연구)

  • Kim, Min Woong;Cheong, Ki Ju
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.117-146
    • /
    • 2016
  • Purpose The purpose of this paper is to examine factors and mechanism inducing end users' faithful appropriation of information security behavior through the information security system. This study is also trying to find out the role of Employees' adaptive activities like learning and feedback seeking behavior for the information security in organizations. Design/methodology/approach An empirical study was carried out with a sample of employees working in the financial service company. Employees(n = 268) completed a written questionnaire. Structural equation modeling was used to analyze the data. Findings Results indicated that employees' learning activities and feedback seeking behavior fully mediated the effect of major information security factors toward end users' faithfulness of appropriation of information security systems. In order to increase the level of employees information security behavior in accordance with security guideline, organizations should facilitate interactions that support the feedback seeking process between employees on information security awareness and behavior. Additionally, organizations may reinforce these behaviors by periodical training and adopting bounty hunter systems.

Why Security Awareness Education is not Effective? (정보보안 인식 교육의 효과에 대한 연구)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.27-37
    • /
    • 2014
  • While organizations are making a considerable effort to leverage formal and informal control mechanisms (e.g., policies, procedures, organizational culture) to improve security, their impact and effectiveness is under scrutiny as employees seldom comply with information security procedures. The best way to ensure the viability of a security policy is to make sure users understand it and accept necessary precautions. From an organization's perspective, a lack of security knowledge and awareness on the part of employees is a major problem. However, previous studies suggest that effect of security awareness education is inconsistent. Thus, this study is to find the answer why security awareness education is not effective. Conclusions and implications are discussed.