• Title/Summary/Keyword: Security quantitative Analysis

Search Result 176, Processing Time 0.031 seconds

Development of the framework for quantitative cyber risk assessment in nuclear facilities

  • Kwang-Seop Son;Jae-Gu Song;Jung-Woon Lee
    • Nuclear Engineering and Technology
    • /
    • v.55 no.6
    • /
    • pp.2034-2046
    • /
    • 2023
  • Industrial control systems in nuclear facilities are facing increasing cyber threats due to the widespread use of information and communication equipment. To implement cyber security programs effectively through the RG 5.71, it is necessary to quantitatively assess cyber risks. However, this can be challenging due to limited historical data on threats and customized Critical Digital Assets (CDAs) in nuclear facilities. Previous works have focused on identifying data flows, the assets where the data is stored and processed, which means that the methods are heavily biased towards information security concerns. Additionally, in nuclear facilities, cyber threats need to be analyzed from a safety perspective. In this study, we use the system theoretic process analysis to identify system-level threat scenarios that could violate safety constraints. Instead of quantifying the likelihood of exploiting vulnerabilities, we quantify Security Control Measures (SCMs) against the identified threat scenarios. We classify the system and CDAs into four consequence-based classes, as presented in NEI 13-10, to analyze the adversary impact on CDAs. This allows for the ranking of identified threat scenarios according to the quantified SCMs. The proposed framework enables stakeholders to more effectively and accurately rank cyber risks, as well as establish security and response strategies.

Using Online IT-Industry Courses in Computer Sciences Specialists' Training

  • Yurchenko, Artem;Drushlyak, Marina;Sapozhnykov, Stanislav;Teplytska, Alina;Koroliova, Larysa;Semenikhina, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.97-104
    • /
    • 2021
  • The authors provide characteristics of the open educational platforms, classification and quantitative analysis regarding the availability of IT courses, teaching language, thematic directions on the following platforms: Coursera, EdX, Udemy, MIT Open Course Ware, OpenLearn, Intuit, Prometheus, UoPeople, Open Learning Initiative, Open University of Maidan (OUM). The quantitative analysis results are structured and visualized by tables and diagrams. The authors propose to use open educational resources (teaching, learning or research materials that are in the public domain or released with an intellectual property license that allows free use, adaptation, and distribution) for organization of independent work; for organization of distance or correspondence training; for professional development of teachers; for possibility and expediency of author's methods dissemination in the development of their own courses and promoting them on open platforms. Post-project activities are considered in comparing the courses content of one thematic direction, as well as studying the experience of their attending on different platforms.

Analysis of Loss Expectancy on Personal Information leakage using Quantitative Invest Decision Model (투자결정 모델을 활용한 개인정보유출의 기대손실 분석)

  • Kim, Jeong Yeon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.93-106
    • /
    • 2015
  • Providing trading partners with personal information to establish an e-commerce financial transaction is inevitable. Most e-commerce companies keep personal information and transaction data for user's convenience and develop additional services as their applications. However, keeping personal information increases the likelihood of identity theft causing direct or indirect damage while it may simplify repetitive financial transactions. This study introduces risk management methods based on quantitative and qualitative analysis including demand-supply curve model and Gordon & Loeb model to analyze the risks for security management. The empirical analysis with survey results from KISA (Korea Information Security Agency) shows that the root cause of different statistics of personal information leakage incidents according to core business of internet companies is the difference in their Loss Expectancy caused by them. Also we suggest disciplinary compensation and higher standard for personal information protection as a solution to prevent the variation of investment on it between individual companies.

Consistency issues in quantitative safety goals of nuclear power plants in Korea

  • Kim, Ji Suk;Kim, Man Cheol
    • Nuclear Engineering and Technology
    • /
    • v.51 no.7
    • /
    • pp.1758-1764
    • /
    • 2019
  • As the safety level of nuclear power plants (NPPs) relates to the safety of individuals, society, and the environment, it is important to establish NPP safety goals. In Korea, two quantitative health objectives and one large release frequency (LRF) criterion were formally set as quantitative safety goals for NPPs by the Nuclear Safety and Security Commission in 2016. The risks of prompt and cancer fatalities from NPPs should be less than 0.1% of the overall risk, and the frequency of nuclear accidents releasing more than 100 TBq of Cs-137 should not exceed 1E-06 per reactor year. This paper reviews the hierarchical structure of safety goals in Korea, its relationship with those of other countries, and the relationships among safety goals and subsidiary criteria like core damage frequency and large early release frequency. By analyzing the effect of the release of 100 TBq of Cs-137 via consequence analysis codes in eight different accident scenarios, it was shown that meeting the LRF criterion results in negligible prompt fatalities in the surrounding area. Hence, the LRF criterion dominates the safety goals for Korean NPPs. Safety goals must be consistent with national policy, international standards, and the goals of other counties.

Theoretical Analysis Of The Problem Of Leadership In Professional And Management Activities

  • Desiatnyk, Kateryna;Novakivska, Lyudmyla;Pryma, Viktoriia;Klochko, Larysa;Vdovina, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.192-198
    • /
    • 2022
  • The article is devoted to current problems of the concept leadership. The essence of the concept of "leadership" is considered and leadership theories. The authors of the article conducted a multifaceted analysis of leadership theories, analyzed the factors of their formation and identified their relationship. Also, the reasons for the difference and connection between leadership and leadership. Styles were presented leadership and their role in building effective leadership. To form the basis of effective leadership was compared to the main criteria inherent in this theories. The following research methods were used in the work: theoretical (analysis of regulatory documents and scientific literature on the problem under study, comparison, generalization, modeling), empirical (diagnostics of the level of formation of managerial competencies of students of the system, questioning, observation, peer review, comparative qualitative and quantitative analysis of diagnostic results the level of formation of managerial competencies).

Multi-Focus Image Fusion Using Transformation Techniques: A Comparative Analysis

  • Ali Alferaidi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.39-47
    • /
    • 2023
  • This study compares various transformation techniques for multifocus image fusion. Multi-focus image fusion is a procedure of merging multiple images captured at unalike focus distances to produce a single composite image with improved sharpness and clarity. In this research, the purpose is to compare different popular frequency domain approaches for multi-focus image fusion, such as Discrete Wavelet Transforms (DWT), Stationary Wavelet Transforms (SWT), DCT-based Laplacian Pyramid (DCT-LP), Discrete Cosine Harmonic Wavelet Transform (DC-HWT), and Dual-Tree Complex Wavelet Transform (DT-CWT). The objective is to increase the understanding of these transformation techniques and how they can be utilized in conjunction with one another. The analysis will evaluate the 10 most crucial parameters and highlight the unique features of each method. The results will help determine which transformation technique is the best for multi-focus image fusion applications. Based on the visual and statistical analysis, it is suggested that the DCT-LP is the most appropriate technique, but the results also provide valuable insights into choosing the right approach.

Firm's Market Value Trends after Information Security Management System(ISMS) Certification acquisition (정보보호 관리체계 인증 취득 후 기업가치의 변화에 관한 연구)

  • Jo, Jung-Gi;Choi, Sang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.237-247
    • /
    • 2016
  • This study analyzed quantitative effects of ISMS certification. To measure the company value change the stock data was used and the methodology of event study was also applied. Event study methodology is a method of analyzing the effects of information or public announcement about certain events on the stock market through abnormal return of stock price. First, ISMS certification was acquired followed by the measurement of abnormal excess return of company. Based on the increase or decrease of abnormal excess return, the group was classified. There are 3 types of groups("Increase", "Reduce", "Maintain"). Next, the cluster analysis was performed for each group. Cluster analysis or clustering is the task of grouping a set of objects in such a way that objects in the same group (called a cluster) are more similar (in some sense or another) to each other than to those in other groups(clusters). The purpose of this study is to have a quantitative measurement of performance of ISMS certification. So, the result of this study will be promoted a company's ISMS certification acquisition. And it would further be beneficial to your company's information security activities.

The Private Security Officer ' Actual Condition of First-Aid Education (민간경비원의 응급처치 교육에 대한 실태조사)

  • Kim, Hyun-Ho;Kang, Hyeon
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.275-290
    • /
    • 2017
  • Since the establishment of Security Business Act in 1976, the Korean private security industry has rapidly grown in the qualitative and quantitative aspects. In the circumstance, various roles of private security guards have been demanded. A private security guard as the first contactor of the users of multi-use facilities should first find an accident field situation and make a response when an accident occurs, and should give first aid as most as possible until emergency medical workers arrive. However, there is a lack of first-aid education for the private security guards who are responsible for the safety of facility users. Therefore, the purpose of this study is first to find how many times private security guards have job and first-aid education, and analyze how the education count influences their first-aid ability; secondly to analyze how private security guards' satisfaction with first-aid education influences their first-aid ability. To achieve the purpose, this researcher conducted a questionnaire survey on first-aid ability of the private security guards working in the metropolitan areas. For data analysis, Stata se/ 14.0ver was applied. For the analysis on validity and reliability, exploratory factor analysis was conducted and a Cronbach's a value was drawn. To find the actual conditions of first-aid education, frequency analysis, inter-group difference analysis, and multi-regression analysis were conducted. According to the data analysis, there were not enough times of job education and first-aid education for private security guards, and their satisfaction with first-aid education and first-aid ability were difference depending on the job and first-aid education counts. Also, their satisfaction with first-aid education partially influenced their first-aid ability.

  • PDF

Determinants of Improving the Financial Security of Retired Women in Malaysia

  • ZAINUDDIN, Halimatul Nadia;MOHAMAD, Nor Edi Azhar;RAJADURAI, R. Jegatheesan V.;SAPUAN, Noraina Mazuin;SANUSI, Nur Azura
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.6
    • /
    • pp.11-21
    • /
    • 2022
  • The perspectives on aging women's financial security during their retirement years are based on their behavior, planning, and decision-making processes during their working years. Elderly women are considered vulnerable and have a longer life expectancy, lower-income, and limited financial understanding compared to males; therefore, drastic steps need to be taken to improve their financial stability and quality of life. The current study sought to determine the most important contributors to retired women's financial health by measuring the value of four factors/variables: capability, opportunity, willingness, and biopsychosocial. This study used a mixed model approach, with qualitative analysis in the first phase involving a focus group discussion session, a pilot analysis, and quantitative analysis for phase two involving the distribution and collection of questionnaires completed by retired women. The surveys were distributed across Malaysia in five distinct zones and yielded 339 usable replies to support the theory. The outcomes of the Multiple Regression Analysis in Malaysia revealed that capability, opportunity, and biopsychosocial factors are significant predictors of retired women's financial security, whereas the willingness indicator lacked statistical significance.

A Study on the Influence of Mobile Information Security on Mobile Office Service Satisfaction and Continuous Use in the Enterprise BYOD Environment (기업의 BYOD 환경에서 정보보안이 모바일 오피스 서비스 만족과 지속적 사용에 미치는 영향에 관한 연구)

  • Park, Byoung-Woo;Jang, Seok-Eun;Lee, Eun-Kyoung;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.929-939
    • /
    • 2018
  • The mobile office, which was expected to be a key strategy for business operation through business innovation, was slow to spread from the BYOD environment to information security issues. This study analyzes mobile office information security and analyzes countermeasures against mobile information security threats to analyze the influence of information security factors on corporate satisfaction and continuous use of mobile office service. The results of the study were identified through the research model and hypothesis, quantitative empirical analysis based on the questionnaire and qualitative empirical analysis based on the expert interview. Through this study, practical implications and future directions for mobile office service satisfaction and continuous use are suggested.