• Title/Summary/Keyword: Security technologies

Search Result 1,846, Processing Time 0.025 seconds

The Use of Innovative Distance Learning Technologies in the Training of Biology Students

  • Biletska, Halyna;Mironova, Nataliia;Kazanishena, Natalia;Skrypnyk, Serhii;Mashtakova, Nataliia;Mordovtseva, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.115-120
    • /
    • 2022
  • The main purpose of the study is to identify the key aspects of the use of innovative distance learning technologies in the training of biology students. Currently, there is a modernization, the evolution of the education system from a classical university to a virtual one, from lecture material teaching to computer educational programs, from a book library to a computer one, from multi-volume paper encyclopedias to modern search databases. During studies in higher education, distance learning ensures the delivery of information in an interactive mode through the use of information and communication technologies. The main disadvantage of distance learning is the emotional interaction of the teacher with students. It is necessary to increase the level of methodological developments for independent studies of students. The methodology includes a number of theoretical methods. Based on the results of the study, the main elements of the use of innovative distance learning technologies in the training of biology students were identified.

The Impact of Digital Technologies on Environmental Management in the Public Administration System of the Regions

  • Rudenko, Olha;Koltun, Victoriia;Shcherbak, Nataliya;Kononenko, Inna;Konoplia, Yaroslav
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.235-241
    • /
    • 2022
  • The main purpose of the article is to analyze the features of the impact of digital technologies on environmental management in the public administration system of the regions. The revival of the economy and its digitalization, which emerged after the first wave of the economic crisis, is already fraught with an aggravation of the ecological situation in the region. Of course, the conventional model of economic growth has by now exhausted its capabilities and can be characterized as environmentally unsustainable. Digital technologies bring changes that cannot be ignored. Based on the results of the study, key aspects of the impact of digital technologies on environmental management in the public administration system of the regions were identified.

Developing key Performance Indicators for Financial IT Security (금융IT 보안조직 역량강화를 위한 핵심성과지표(KPI) 도출에 관한 연구)

  • Jang, Sung Ok;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.125-142
    • /
    • 2013
  • As a reinforcing strategic-alignment of IT business, Financial Service becomes more rely on IT systems. It needs to continuous information security activities to provide a secure and reliable finance service. Performance measurement of information security activities can be useful for decision and management support. The purpose of this study is to derive CSF(Critical Success Factor) and KPI(Key Performance Indicator) based on K-ISMS, Financial IT Information Security Standards. Providing a rationale can be used to determine key performance indicators, which are utilized as basic data for establishing security policies for financial IT security competency.

Design and Implementation of Information Security System to Prevent Leakage of Drawing Information (설계정보 유출방지를 위한 정보보안시스템 설계 및 구현)

  • Chang, H.B.;Lee, H.S.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.11 no.5
    • /
    • pp.327-334
    • /
    • 2006
  • Recently, security incidents are growing rapidly in which internal employees let the drawing leak out to competitors or other countries. This type of security incidents has a characteristic that it occurs less frequently than other types of security incidents such as network or server security incident, but the damage is a lot more serious. The existing information security technologies to prevent internal information from being leaked out are only applicable to general documents(office documents, web pages and image files in which data are encrypted one by one). However, architectural drawings made up of collection of files with various formats(extensions) have problems with the process speed of en(de) cryption and accuracy, so the developments of security technologies by new methods are required. In this study, we design and develop a security technology based on work area with which users can protect the leakage of critical information in the kernel level while maintaining their work environment when they have to use sharing information that cannot be managed by the unit of file. As a result, we developed the "Virtual Secure Disk" which allows only authorized users and applications to have an access to drawings, and have verified its security by applying it to the actual company.

An Analysis of the Security Threats and Security Requirements for Electric Vehicle Charging Infrastructure (전기자동차 충전 인프라에서의 보안위협 및 보안요구사항 분석)

  • Kang, Seong-Ku;Seo, Jung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1027-1037
    • /
    • 2012
  • With response to the critical issue of global warming, Smart Grid system has been extensively investigated as next efficient power grid system. Domestically, Korean is trying to expand the usage of Electric Vehicles (EVs) and the charging infrastructure in order to replace the current transportation using fossil fuels holding 20% of overall CO2 emission. The EVs charging infrastructures are combined with IT technologies to build intelligent environments but have considerable number of cyber security issues because of its inherent nature of the technologies. This work not only provides logical architecture of EV charging infrastructures with security threats based on them but also analyses security requirements against security threats in order to overcome the adversarial activities to Smart Grid.

Theoretical Problems of Designing Pedagogical Technologies in Higher Education Institutions

  • Yakymenko, Svitlana;Sukholova, Marianna;Drahunova, Vira;Konokh, Anatolii;Levchenko, Nataliia;Bozhok, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.469-472
    • /
    • 2021
  • The article discusses theoretical and methodological issues of modern pedagogical technologies: the essence, structure, functions, principles, conditions for successful functioning in educational process of the university. The article reflects the results of the analysis of publications on the following grounds: 1) levels of presentation of scientific information (theoretical, theoretical and experimental, empirical); 2) signs and properties of educational technologies; 3) approaches to the choice of grounds for classifications of educational technologies; 4) the possibilities of educational technologies in the formation of the academic, communicative and professional competence of a specialist; 5) criteria for assessing the effectiveness of their application in university educational practice; 6) the readiness of university teachers to develop and implement educational technologies.

The Use of Digital Technologies for the Economic Development of the Region in the System Of Digitalization of Public Administration

  • Hennadii, Ferdman;Kryshtanovych, Myroslav;Kurnosenko, Larysa;Lisovskyi, Ihor;Koval, Oleg
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.81-86
    • /
    • 2022
  • Digital technologies in the regional sector of public administration are the basis for its reform and a potential example for the whole country on how to use the benefits of the "digital" world. The synergistic potential of social, mobile, "cloud" technologies, as well as data analysis technologies and the "Internet of Things" can collectively lead to transformational changes in public administration and in general, that is, make the use of digital technologies for the economic development of the region in the system of digitalization of public administration effective, reactive and valuable. Thus, the purpose of the study is to identify modern prospects and realities of the development of digital technologies for the economic development of the region in the system of digitalization of public administration. As a result of the study, the main mechanisms and systems of digital technologies for the economic development of the region in the system of digitalization of public administration were analyzed.

An Improved Histogram-Based Image Hash Method (Histogram-Based Image Hash 성능 개선 방법)

  • Kwon, Ha-Na;Kim, So-Young;Kim, Hyoung-Joong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.11a
    • /
    • pp.15-19
    • /
    • 2008
  • Image hash는 영상에서 유사성을 찾는 방법으로 사용될 수 있는 기술자(Descriptor)로 특징지을 수 있다. 많은 image hash 방법중에 Histogram-based image hash는 Histogram equalization을 제외한 보통 잡음 및 다양한 기하학적 변조를 주어도 같은 그림을 찾아내는데 강력한 기능을 수행한다. 본 논문에서는 Histogram-Based Hash를 생성함에 있어 서로 다른 3개의 bin의 관계를 이용하여 Hash를 생성하였다. 본 논문은 이를 통해 영상의 유사성을 찾아내는데 있어 원본영상에 대해 기하학적 변조뿐만 아니라 상대적으로 성능이 약했던 Histogram equalization을 이용한 변조에 대해서도 성능이 개선되었다. 또한 가우시안 필터링의 알파 값을 다르게 지정함으로 인하여 생성되는 두 히스토그램을 이용하여 기존의 방법보다 성능이 개선되었다.

  • PDF

Usage of System Restore Point in Digital Forensics (포렌식 관점에서의 시스템 복원지점 활용 방안)

  • Yun, Sun-Mi;Lee, Seok-Hee;Lee, Sang-Jin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.55-58
    • /
    • 2008
  • 디지털 증거분석 단계에서 조사관은 용의자 시스템을 통해 사건 날짜와 시간에 실행된 응용 프로그램이나 악성 프로그램의 설치 여부 등을 유추하여 관련 증거를 발견할 수 있다. 그러나 대부분의 범죄자는 혐의 부인을 위해 대상 시스템에서 특정 프로그램의 설치 및 사용 정보를 삭제하여 증거를 인멸한다. 이와 같이 디지털 포렌식 조사를 방해하는 기술이나 도구와 관련된 분야를 안티포렌식(Anti-Forensics)이라 한다. 사이버 범죄의 증가로 인해 디지털 포렌식 기술이 발전할수록 범죄의 흔적을 남기지 않기 위한 안티포렌식 기술 또한 발전하고 있다. 이러한 안티포렌식에 대응하기 위해, 본 논문에서는 프로그램 사용 또는 설치와 같은 흔적을 시스템에서 삭제한 경우 시스템 복원지점을 이용한 증거탐지 방법을 제시한다. 또한 실제 발생 가능한 상황을 예로 들어 설명하고 수사 시 유용하게 쓰일 수 있는 도구 개발에 대한 계획을 제시한다.

  • PDF

A Study on Car Door Open/Lock System Prventing Relay Attack (중계 공격 대응을 위한 차량 문 개폐 시스템에 대한 연구)

  • Min, Jungki;Choi, Wonbin;Kim, Seungjoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.174-177
    • /
    • 2018
  • 스마트폰 키 애플리케이션이 널리 사용되면서, 이에 대한 중계 공격의 위협도 증가하고 있다. 중계공격은 공격자가 차량과 키 애플리케이션 사이에서 오고가는 신호를 중계하여 허용 범위 밖의 통신을 시스템이 유요한 것으로 판단하게 하는 공격이다. 본 논문에서는 중계 공격을 막기 위해, 추가 지연시간을 탐지하여, 임계 지연 시간을 넘었을 경우 차량과 스마트키가 충분히 근접하지 않았다고 판단하여 차량 문 개폐 요청을 거부하는 시스템을 제안하였다. 또한 실제 환경에서의 유동성을 고려하여 임계 지연 시간을 지속적으로 업데이트하는 적응 임계 지연 시간(Adaptive Delay Threshold) 기술을 제시하였다. 그리고 실제 임베디드 기기를 이용해 시스템을 구현하여 시스템의 실효성을 검증하였다.