• Title/Summary/Keyword: Security risk analysis method

Search Result 129, Processing Time 0.027 seconds

The Design for Risk Analysis Method of Data Asset (데이터 자산의 위험분석 방법론 설계)

  • 정윤정;김인중;이철원
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.633-636
    • /
    • 2002
  • 현대는 정보의 홍수라고 할 만큼 많은 정보들이 존재하는 정보화 사회로서 정보 경쟁력이 중요시되는 시대이다. 이에 발맞춰 이러한 정보를 운영하는 정보시스템의 안전성이 많은 조직에서 이슈가 되고, 자신의 조직의 정보 자산을 보호하기 위한 방법을 모색한다. 이러한 방법 중 가장 광범위하게 적용되는 방법이 조직의 자산에 대한 위험분석이다. 위험 분석은 조직에 내재되어 있는 위협, 취약성을 식별하고, 식별된 위협 및 취약성에 대하여 보호대책을 강구함으로써 안전한 정보시스템 운영을 가능케 한다. 그러나 아직까지 외국의 위험분석 방법론에도 데이터 자산의 위험분석 방법을 구체적으로 기술이 되어 있지 않기 때문에, 실제로 데이터 자산의 위험 분석은 굉장히 힘들다. 그러므로 본 논문은 업무 중심의 위험분석 방법론과 이 방법론의 프로세스를 따라 데이터 자산의 위험분석 수행방법을 제안한다.

  • PDF

From Security Requirements to a Security Risk Analysis Method (보안 요구사항 기반의 보안 위험도 분석 기법)

  • Dong-hyun Lee;Myoung-rak Lee;Hoh In
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.574-577
    • /
    • 2008
  • 실제 소프트웨어 개발에서 지속적으로 보안관련 문제들이 발생하고 있으므로 이를 해결하기 위하여 소프트웨어 개발 주기의 초기 단계인 요구사항 분석단계에서 보안 요구사항을 추출하는 것이 필요하다. 이는 요구사항 분석 단계에 대한 투자가 소프트웨어 개발의 성공률을 높일 수 있기 때문이다. 보안 요구사항을 추출하는 기법에 대해서는 여러 방면으로 연구가 시작되었으나, 보안 요구사항을 토대로 향후 소프트웨어 개발과정에서의 보안관련 위험도를 산정하여 보안 투자의 우선순위를 정하는 기법은 아직 연구되어 있지 않다. 그러므로 본 논문에서는 추출된 보안 요구사항을 가지고 소프트웨어 보안에 대한 위험도를 산정하여 투자 비용의 우선순위를 산정하는 절차에 대해 제안한다.

Using Support Vector Machine to Predict Political Affiliations on Twitter: Machine Learning approach

  • Muhammad Javed;Kiran Hanif;Arslan Ali Raza;Syeda Maryum Batool;Syed Muhammad Ali Haider
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.217-223
    • /
    • 2024
  • The current study aimed to evaluate the effectiveness of using Support Vector Machine (SVM) for political affiliation classification. The system was designed to analyze the political tweets collected from Twitter and classify them as positive, negative, and neutral. The performance analysis of the SVM classifier was based on the calculation of metrics such as accuracy, precision, recall, and f1-score. The results showed that the classifier had high accuracy and f1-score, indicating its effectiveness in classifying the political tweets. The implementation of SVM in this study is based on the principle of Structural Risk Minimization (SRM), which endeavors to identify the maximum margin hyperplane between two classes of data. The results indicate that SVM can be a reliable classification approach for the analysis of political affiliations, possessing the capability to accurately categorize both linear and non-linear information using linear, polynomial or radial basis kernels. This paper provides a comprehensive overview of using SVM for political affiliation analysis and highlights the importance of using accurate classification methods in the field of political analysis.

Method for Evaluating the Security Risk of Website (웹 사이트 보안 위험도 산정 기법)

  • Kim, Young-Gab;Lee, Jun-Sub;Cho, Sanghyun;Kim, Moon Jeong;Lee, Min-Soo;Kim, Sang-Rok;Kim, In Ho;Kim, Sung Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1119-1122
    • /
    • 2007
  • 최근 전자우편이나 해킹을 통한 피싱과 파밍 등 금융 사기가 많이 발생하고 있다. 이에 이러한 피해로부터 사용자의 경제적 손실 및 개인정보 보호를 위하여 웹 사이트 인증, 전자우편 인증 등의 연구가 진행되고 있다. 기존 인증 방법에서는 WBL (Website Black-List) DB를 사용하였는데, 피싱의 짧은 생명주기(life cycle)로 인해 WBL DB의 유효성은 떨어질 뿐만 아니라, 피싱 사건 발생 후 웹 사이트가 WBL DB에 등록되기 전까지는 확인 불가능하다는 단점을 가지고 있다. 이러한 문제점을 극복하기 위해 WWL (Website White-List) DB를 이용한 연구가 진행 중이지만 아직은 미비한 편이다. 이에 본 논문에서는 기존의 WBL DB와 WWL DB를 이용한 방법이 가지고 있는 한계점을 극복하기 위해 WWL DB 항목을 정의하고, 이를 이용하여 웹사이트 보안 위험도를 정량화할 수 있는 웹사이트 위험도 산정 기법을 제안한다.

A Method to Find the Core Node Engaged in Malware Propagation in the Malware Distribution Network Hidden in the Web (웹에 숨겨진 악성코드 배포 네트워크에서 악성코드 전파 핵심노드를 찾는 방안)

  • Kim Sung Jin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.3-10
    • /
    • 2023
  • In the malware distribution network existing on the web, there is a central node that plays a key role in distributing malware. If you find and block this node, you can effectively block the propagation of malware. In this study, a centrality search method applied with risk analysis in a complex network is proposed, and a method for finding a core node in a malware distribution network is introduced through this approach. In addition, there is a big difference between a benign network and a malicious network in terms of in-degree and out-degree, and also in terms of network layout. Through these characteristics, we can discriminate between malicious and benign networks.

Visualization of network traffic attack using time series radial axis and cylindrical coordinate system (시계열 방사축과 원통좌표계를 이용한 네트워크 트래픽 공격 시각화)

  • Chang, Beom-Hwan;Choi, Younsung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.17-22
    • /
    • 2019
  • Network attack analysis and visualization methods using network traffic session data detect network anomalies by visualizing the sender's and receiver's IP addresses and the relationship between them. The traffic flow is a critical feature in detecting anomalies, but simply visualizing the source and destination IP addresses symmetrically from up-down or left-right would become a problematic factor for the analysis. Also, there is a risk of losing timely security situation when designing a visualization interface without considering the temporal characteristics of time-series traffic sessions. In this paper, we propose a visualization interface and analysis method that visualizes time-series traffic data by using the radial axis, divide IP addresses into network and host portions which then projects on the cylindrical coordinate system that could effectively monitor network attacks. The proposed method has the advantage of intuitively recognizing network attacks and identifying attack activity over time.

Internet Apparel Shopping: Perception of Risk among South Korean Female College Students in the Apparel Major (한국 여대생의 인터넷을 통한 의류제품 구입시의 인지위험 - 의류학 전공자를 대상으로 -)

  • Ko, Seung-Bong;Salusso, Carol J.;Sprott, David E.;Hwang, Choon-Sup
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.31 no.6 s.165
    • /
    • pp.869-878
    • /
    • 2007
  • The purpose of this study was to investigate perception of risks among South Korean female college students within the process of purchasing apparel products through the Internet. The study was implemented by descriptive survey method using questionnaire and subjects consisted of 324 South Korean female college students. Findings of the study showed that the purchasing process particularly regarding delivery and security issues seemed to be a strong concern. On the other hand, unique selection such as apparel brands only available through the Internet was a strong appeal to 37.7% of subjects. Factor analysis profiled risk perception as: 1) Internet Shopping Selection Preference, 2) Delivery Problems and Lack of Security 3) Product Quality and Characteristics 4) Return Policy Difficulties and 5) Fair Prices. Discriminant analysis showed Factors 1, 2 and 3 were significant in helping to differentiate among Non-Purchasers, Fewer-purchasers and Many-Purchasers. Factor 1 and 3 helped differentiate among respondents relative to age range. Across all types of purchasers, offering unique selections of cutting edge fashions and improving risk perception relative to delivery and security concerns seemed important for gaining greater market share. Being able to delivery quality products and communicate product characteristics would be a powerful competitive edge to add to the incentive of convenience in shopping for apparel on the Internet.

Study on the Appropriate Use of Weapons by Private Security Guards: Focusing on Public Crowded Places (민간 경비원(보안요원)의 정당한 무기사용 방안 연구: 다중이용시설을 중심으로)

  • Hangil Oh;Kyewon Ahn;Ye ji Na
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.936-949
    • /
    • 2023
  • On August 3, 2023, a brutal incident of unprovoked violence, termed as "Abnormal motivated crime," occurred in a multi-use facility, where retail and transportation facilities converge, near Seohyeon Station. The assailant drove onto the sidewalk, hitting pedestrians, and then entered a department store where a knife rampage ensued, resulting in a total of 14 victims. In the aftermath of this incident, numerous murder threats were posted on social media, causing widespread anxiety among the public. This fear was further exacerbated by the emergence of a "Terrorless.01ab.net" service. Purpose: This research aims to explore necessary institutional improvements for private security personnel who protect customers and employees in multi-use facilities, to enable them to perform their duties more effectively. Method: To assess the risk of Abnormal motivated crime, a time series analysis using the ARIMA model was conducted to analyze the domestic trends of such crimes. Additionally, Result: the study presents suggestions for improvements in the domestic security service law and emergency manuals for multi-use facilities. Conclusion: This is informed by a legal analysis of the indemnity rights for weapon use by private security guards abroad and their operational authority beyond weapon usage.

A Proposal for Risk Evaluation Method of Slope Failure due to Rainfalls (강우 시 사면 붕괴 위험도 평가에 관한 제안)

  • Chae, Jong-Gil;Jung, Min-Su;Tori, Nobuyaki;Okimura, Takashi
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2008.10a
    • /
    • pp.893-903
    • /
    • 2008
  • A method for predicting surface failures which occur during heavy rainfall on mountain slopes is proposed by using the digital land form model that is obtained by reading altitude on a topographical map at 10m grid point space. A depth of a potential failure layer is assumed at each grid point. In the layer, an infiltrated water movement from cell to cell is modeled in the study (cell is a square of the grid). Infiltrated ground water levels which show the three dimensional effects of a topographical factor in an area can be hourly calculated at every cell by the model. The safety factor of every cell is also calculated every hour by the infinite slope stability analysis method with the obtained infiltrated ground water level. Failure potential delineation is defined here as the time when the safety factor becomes less than unity under the assumptions that effective rainfall is 20mm/h and continues 20 hours.

  • PDF

Risk identification, assessment and monitoring design of high cutting loess slope in heavy haul railway

  • Zhang, Qian;Gao, Yang;Zhang, Hai-xia;Xu, Fei;Li, Feng
    • Structural Monitoring and Maintenance
    • /
    • v.5 no.1
    • /
    • pp.67-78
    • /
    • 2018
  • The stability of cutting slope influences the safety of railway operation, and how to identify the stability of the slope quickly and determine the rational monitoring plan is a pressing problem at present. In this study, the attribute recognition model of risk assessment for high cutting slope stability in the heavy haul railway is established based on attribute mathematics theory, followed by the consequent monitoring scheme design. Firstly, based on comprehensive analysis on the risk factors of heavy haul railway loess slope, collapsibility, tectonic feature, slope shape, rainfall, vegetation conditions, train speed are selected as the indexes of the risk assessment, and the grading criteria of each index is established. Meanwhile, the weights of the assessment indexes are determined by AHP judgment matrix. Secondly, The attribute measurement functions are given to compute attribute measurement of single index and synthetic attribute, and the attribute recognition model was used to assess the risk of a typical heavy haul railway loess slope, Finally, according to the risk assessment results, the monitoring content and method of this loess slope were determined to avoid geological disasters and ensure the security of the railway infrastructure. This attribute identification- risk assessment- monitoring design mode could provide an effective way for the risk assessment and control of heavy haul railway in the loess plateau.