• Title/Summary/Keyword: Security measures

Search Result 1,108, Processing Time 0.032 seconds

Selection of Detection Measures for Malicious Codes using Naive Estimator (단순 추정량을 이용한 악성코드의 탐지척도 선정)

  • Mun, Gil-Jong;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.97-105
    • /
    • 2008
  • The various mutations of the malicious codes are fast generated on the network. Also the behaviors of them become intelligent and the damage becomes larger step by step. In this paper, we suggest the method to select the useful measures for the detection of the codes. The method has the advantage of shortening the detection time by using header data without payloads and uses connection data that are composed of TCP/IP packets, and much information of each connection makes use of the measures. A naive estimator is applied to the probability distribution that are calculated by the histogram estimator to select the specific measures among 80 measures for the useful detection. The useful measures are then selected by using relative entropy. This method solves the problem that is to misclassify the measure values. We present the usefulness of the proposed method through the result of the detection experiment using the detection patterns based on the selected measures.

A Study of the Analysis and Countermeasure about the Phishing Scam (피싱에 대한 분석 및 대응방안에 대한 연구)

  • Kang, Hyun Joong
    • Convergence Security Journal
    • /
    • v.14 no.5
    • /
    • pp.65-74
    • /
    • 2014
  • Phishing scans through wired telephones have been evolving into smissing and pharming. While we use wire or wireless telephones, text messages, e-mails, and online-banking conveniently, the ways of hacking and phishing attacks are getting developed and various. This paper investigates the various aspects of attacks depending on the kinds of phishing and suggests general prevention measures. In addition, the user-oriented practical preventive measures and government-driven long term measures are proposed in this paper. Technological developments, short or long term preventive measures proposed by the government, and continuous public relations could be solutions since in a short time, it could be difficult to eradicate phishing scams evolving continuously. Besides, the internet media as well as SNS are great helps in promoting the preventives against phishing and smissing. Finally this paper asserts that the newly developed service technology should be made carefully without security problems.

Analysis of C2C Internet Fraud and Its Counter Measures (인터넷 직거래 사기의 실태 및 보안대책)

  • Jung, Jinhyo;Lee, Chang-Moo
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.141-153
    • /
    • 2015
  • In recent days, internet appears to be a daily necessity, which leads to the increase of internet fraud. This study particularly focuses upon C2C internet fraud, while other researches on internet fraud seldom touch such a topic. The aim of this study is to grasp the stark reality of the soaring C2C online fraud, to categorize the type of the frauds, to identify the root causes of the fraud, and to suggest security measures to prevent the C2C online fraud.

Study on Security Measures of e-Gov with Dynamic ICT Ecosystem (동적인 ICT 생태계에 따른 전자정부 보안대책 연구)

  • Choung, Young-Chul;Bae, Yong-Guen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1249-1254
    • /
    • 2014
  • As ICT ecosystem changes, security-related threat on individuals and corporations has increased. With the recent sophistication of hacking strategy, hacking serves commerce and its scale becomes larger than ever. Accordingly, the analysis on cyber intrusion is required. As a number one electronic government around the world, the government's role for security solution for realization of safe electronic government. This manuscript analyzes cyber intrusion cases, speculates the government's measures and suggests political recommendation for the current phenomena.

On the Application of Public Search Measures to Detect and Obtain Information

  • Kozytska, Olena;Tsilmak, Olena;Protsenko, Olena;Yankovyi, Mykola;Lysenko, Аndrii;Shulzhenko, Assol
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.109-112
    • /
    • 2021
  • The article considers the state of legislation that regulates the use of public methods of obtaining information by authorized state bodies. The correlation of public investigative (search) actions with operative-search measures as concepts denoting the application of public methods of obtaining information has been studied. In addition, it argues the need for more detailed delineation and legislative regulation of public investigative (search) actions and operational and investigative measures at the legislative and departmental levels. The purpose of the article is to analyze certain provisions of the Law of Ukraine "On operational and investigative activities" to identify inconsistencies in the content of the text of the law in order to correct and prevent ambiguity in the theory and practice of law enforcement.

Abolition of restrictions and research on precondition for nominating drone photographing free area (규제혁파, 드론 촬영 자유구역 지정을 위한 선결조건 연구)

  • Seok, Geum-Chan;Park, Gye-Soo;Nam, Soung-Ho;Kim, Young-Ki
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.209-217
    • /
    • 2020
  • The background of the research is the following. With the prosperity of drone industry, the government has been actively promoting measures to nominate 'drone photographing free areas'. However, existing laws, and procedures are rather unclear with related environmental factors in discordance with one another. Hence, voices in need for establishing a clear precondition for nominating drone photography free area have been rising. The purpose of the research is to provide measures for the preconditions to establish photography free areas for convenient drone photographing. The research utilizes literary methods, conducting focus group interviews to coordinate with specialists who can participate and discuss so that they can provide improvement measures. The research renders improvement measures in different sectors including 2x items in aviation security law, 8x items in free area nomination and procedure, 4x items in infrastructure establishment and information management area. The expected effects are the following: by attaching drone photography with aviation security law, nominating photography free area can be linked up with the Ministry of Land Infrastructure and Technology. Secondly, by enlarging photography restricted area to upper mid-air, a three dimensional drone security will be possible. Thirdly, by providing a 'Yongin area standard model', free area nomination will become more easy. Future research will focus on enhancing aviation security law regarding drone photographing. In addition, the promotion to nominate free areas for 33x responsible areas in accordance with the National Intelligence service will be required.

Priority of the Government Policy to support Industrial Security - Focus on a companies' demand and efficiency of policy - (산업보안 지원 정책 결정의 우선 순위 - 기업 수요와 효율성을 중심으로 -)

  • Kim, Chang-Ho;Yu, Jai-Hwan
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.155-178
    • /
    • 2015
  • This study surveyed the subject of companies' industrial security on priorities of the government policy for the confidentiality of corporate and the necessity of expanding the government support for the industrial security. In determining the priority, we should consider all opinions of companies, individuals, societies, and governments that associated with the confidentiality. Especially in industrial security, companies are the most significant beneficiaries and consumers of security policy and it would be the basis for supporting on policy-making. As a result, we analyzed the 50 valid questionnaires collected from security personnel of Korean corporations and 'Enhance support for education and promotion of human resource (On/Off-Line)', 'Establish Security management and Security measures', and 'Enhance Security professionals status via qualifications/certifications' are shown as 1st, 2nd, 3rd priority of government policy to protect Corporate confidential information including its customer information. All respondents of the study says that the Government support for Industrial Security should be enlarged.

  • PDF

Materialize the Checklist through Type of Classification analysis for the Regulatory Compliance and Database Encryption, Access Control (데이터베이스 규제 준수, 암호화, 접근제어 유형 분류에 따른 체크리스트 구현)

  • Lee, Byoung-Yup;Park, Jun-Ho;Kim, Mi-Kyoung;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.61-68
    • /
    • 2011
  • Due to the rapid development of the Internet, many companies in a variety of applications to users open an unspecified number of the current business environment, security of personal information about recent issues are often mentioned in terms of its importance may be the company's top priority. The government recently on personal information strengthening measures on information communications network law enacted into law which is applicable to various industries. Companies to protect the personal information of various measures to comply with these regulations, and arrange your personal information for internal management to enhance security fast security solution has been introduced. The number of used data is stored in the DBMS in terms of compliance with these regulations at the same time effectively to ensure data security and encryption measures, access control, audit, each separated by an implementation of the solution and how it compares with the best Database security plan allows you to explore as a this paper's security checklist.

Decision Making for the Industrial Security Management Measures' Importance in Operation Level (운영 수준에서의 산업보안 관리대책 중요도 결정)

  • Chae, Jeong-Woo;Jeong, Jin-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.389-398
    • /
    • 2013
  • This study aims to support rational security investment decision making through prioritizing on operational level of management measures strategically, in carrying out industrial security activities. For this, AHP survey is conducted against industrial security professionals and analyzed. Thereafter, the importance and the priority of industrial security management measures are determined. As a result, in a comparison evaluation among the criteria, 'ICT service management' represents the highest weight (0.54). And the sub-criteria could be divided into three groups (Group I, II, III), depending on their importance. The sensitivity analysis results show that if the weight of the criterion, 'ICT systems/networks access control' is doubled, the sub-criteria, 'O/S access control', 'application access control', and 'wired/wireless network access control' are enter into top rank group. In case of the criterion, 'physical/environmental security' is doubled, the sub-criteria, 'protection zoning/access control' and 'disaster prevention on business equipment/counter-terrorism' are enter into the top rank group, 'securing utilities' is enter into the mid rank group.

Security Measures for Casino Facilities (카지노 시설경비 안전대책 방안)

  • Lee, Sang-Chul
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.243-272
    • /
    • 2005
  • All measures related to the safety of the casino facilities guarantee safety of facilities that are targets of security guards, protect lives and properties, minimize risks of artificial and natural disaster and crimes. In summary, plan for responding to safety and accidents should be developed not only for the casino facilities but also for the facilities of annexed buildings, and lives and properties of customers and employees. Determine areas in the casino facilities that are prone to accidents and set around-the-clock guard in the areas or maintain surveillance with CCTV and prevent accidents through continuous patrol. These are the most basic and the most important requirements in safety. In addition, casinos which prompt gambling are causing economic and psychological treats to families. To resolve these social issues, casinos have adopted limited entrance system. To support this system, new forms of machine security systems such as video automatic recognition system of fingerprint pattern recognition system should be adopted too. In addition, security guards in casino facilities need to instill themselves with a sense of ownership as well as a strong sense of mission to do the best for customer security and to protect the company assets and employees and manage accidents that could occur without notice. Security guards should do their best to enable manage accidents that could occur without notice. Security guards should do their best to enable tourists who are on the rise due to increase in advanced country-style tourism and leisurely activities to get the utmost satisfaction from the casinos, and as a leader of private security company, establish the foundation for security based on the characteristics of security in Korea.

  • PDF