• 제목/요약/키워드: Sense of Security

Search Result 265, Processing Time 0.03 seconds

A Novel Hybrid Algorithm Based on Word and Method Ranking for Password Security

  • Berker Tasoluk;Zuhal Tanrikulu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.161-168
    • /
    • 2023
  • It is a common practice to use a password in order to restrict access to information, or in a general sense, to assets. Right selection of the password is necessary for protecting the assets more effectively. Password finding/cracking try outs are performed for deciding which level of protection do used or prospective passwords offer, and password cracking algorithms are generated. These algorithms are becoming more intelligent and succeed in finding more number of passwords in less tries and in a shorter duration. In this study, the performances of possible password finding algorithms are measured, and a hybrid algorithm based on the performances of different password cracking algorithms is generated, and it is demonstrated that the performance of the hybrid algorithm is superior to the base algorithms.

Priority Order of Decisional Factors and Conceptual Construct of Security Martial Arts' Spirit (경호무도 정신특성 요인의 상대적 중요도 평가)

  • Kim, Dong-Hyun
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.7-32
    • /
    • 2012
  • This study aimed to evaluate the relative status using Analytic Hierarchy Process(AHP) on the spiritual factors of the security martial arts for the guards to perform the best security service. There were 540 participants who were students majored in security martial arts, workers for security and specialists of practical and theoretical security martial arts for this study. The exploratory and confirmatory factor analysis were carried out using the selecting data through literature reviews in the level of the factor-extraction about the spiritual characteristics. The specialists' survey was conducted on the relative status among factors using the spiritual concept structure based on the studied above. Selected data was calculated with SPSS 18.0 for windows, AMOS 5.0, and Expert Choice 2000 software. The conclusion can be made through those process above. First, 4 general factors and 20 detailed factors were found as the result of the factor exploration related to the spiritual characteristics of the security martial arts. The result which was verified on Construction validity of searched factors had stable figures on every standard. In other words, the participants for survey on this study "Spiritual characteristic concepts of the security martial arts" can be evaluated it is valid. The general factors of security martial arts' spirit were conceptualized with Psychological spirit, ethical spirit, martial art spirit, practical spirit through the naming process on the general factors of the security martial arts' spiritual characteristic concepts. The detailed factors of security martial arts' spirit were concentration, self-confidence, self-management, immersion, self-esteem in psychological spirit and sacrifice, justice, royalty, peace, sense of duty in ethical spirit and courtesy, toughness, defense, balance of mind and body, bravery in martial arts and responsibility, cooperation, modesty, determination, professionalism in practical spirit of security martial arts. That is, the conceptualization of security martial arts' spirit was verified that it had validity. Second, the hierarchical model of the security martial arts was composed with 4 superordinate concepts and 20 subordinate concepts. As the result of evaluating relative status based on Spiritual characteristics-hierarchy model, the impotance was proven in order of ethical spirit(.482), martial art spirit(.248), practical spirit(.188), psychological spirit(.083). Also the importance related to spiritual characteristics of security martial arts on subordinate concepts was proven in order of sacrifice(.252), courtesy(.110), sense of duty(.108), responsibility(. 073), royalty(.053), toughness(.052), justice(.049), defense(.038), professionalism(.038), determination(.035), cooperation(.029), self-confidence (.026), bravery(.025), self-esteem(.024), balance of mind and body(.023), peace(.019), concentration(.014), modesty(.013), self-management(.011), flow (.007). To sum up, the spiritual factor related to ethics such as sacrifice, justice, royalty, peace, sense of duty was the most important for the security martial arts.

  • PDF

T-TIME: A Password Scheme Based on Touch Signal Generation Time Difference

  • Yang, Gi-Chul
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.8 no.2
    • /
    • pp.41-46
    • /
    • 2018
  • As evidenced through rapidly growing digital devices and information, digital authentication is becoming ever more critical, especially considering the complex and prevalent digital accounts we are using every day. Also, digital authentication is apt to consistent digital security application. In this sense, digital security quality and usability can be enhanced by developing a mechanism for efficient digital authentication. In this paper, a mechanism of efficient digital authentication called T-TIME is introduced in order to alleviate issues dealing with secure and user friendly authentication across ever- growing digital devices and information. Touch Signal generation time difference is utilized for T-TIME as a mediation mechanism that enhances the security quality by confusing others unlike other graphical password mechanisms which are using spatial information. Hence, digital authentication by using T-TIME can be a good way of enhancing security quality and usability.

Exploring the Effects of Attachment Security and Playfulness on Social Competence among 4-year-old Preschool Children (만 4세 유아의 애착 안정성과 놀이성이 사회적 능력에 미치는 영향)

  • Choi, Jin Young;Shin, Nana
    • Korean Journal of Childcare and Education
    • /
    • v.12 no.2
    • /
    • pp.219-238
    • /
    • 2016
  • The purposes of this study were to examine relations among attachment security, playfulness, and social competence during the preschool period and to investigate relative effects of attachment security and playfulness on preschoolers' social competence. A total of forty eight 4-year-old preschool children participated in the current study. Attachment security was assessed using the Attachment Q-sort during a two- or two and half hour home visit. Preschoolers' playfulness and social competence were evaluated by mothers. First, preschoolers' attachment security was significantly associated with their interpersonal adjustment. Preschoolers with secure attachment were rated by their mothers as having higher interpersonal adjustment. In addition, preschoolers' playfulness was significantly related to popularity/leadership and social participation. Second, when preschoolers' attachment security and playfulness were entered together to predict social competence, attachment security and sense of humor were significant predictors of preschoolers' interpersonal adjustment, and social and cognitive spontaneity significantly predicted popularity/leadership. With respect to social participation, preschoolers' physical spontaneity was a significant predictor. Findings of this study indicate that attachment security and playfulness tap into different aspects of social competence, suggesting that both are needed to be emphasized in the development of social competence during the preschool period.

An Empirical Approach to the Influence of IT Assets and Information Security Service on Information Security Quality and Satisfaction (IT자산과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구)

  • Gwon, Sun-Jae;Lee, Geon-Chang;Kim, Chang-Hyeon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.467-481
    • /
    • 2006
  • In the era of the Internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security qualty positively, leading to users' satisfaction eventually To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets and Information Security Service influence informations security quality positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets and Information Security Service helped great improve the information security quality and user satisfaction.

  • PDF

Security Control of Power Systems (전력계통의 신뢰도제어 -상정사고해석을 중심으로-)

  • 양흥석;박영문
    • 전기의세계
    • /
    • v.26 no.3
    • /
    • pp.84-91
    • /
    • 1977
  • A modified version of algorithm and computer program is proposed to improve the currently available contingency analysis methode for the security control of power system. The underlying principle is based upon the reasonable modification of the current methods suggested by Stagg, Tinny, Alsac, and Stott in consideration of speed, aceuracy, reliability and convergency characteristics. The algorithm and program are desirgned especially for On-Line operation, although Off-Line applications are readily available. Several case studies on the Koren Power Company's 48-bus, 91-line system have shown that the method proposed is efficiently powerful in a sense of practical applicability.

  • PDF

Secure Healthcare Management: Protecting Sensitive Information from Unauthorized Users

  • Ko, Hye-Kyeong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.82-89
    • /
    • 2021
  • Recently, applications are increasing the importance of security for published documents. This paper deals with data-publishing where the publishers must state sensitive information that they need to protect. If a document containing such sensitive information is accidentally posted, users can use common-sense reasoning to infer unauthorized information. In recent studied of peer-to-peer databases, studies on the security of data of various unique groups are conducted. In this paper, we propose a security framework that fundamentally blocks user inference about sensitive information that may be leaked by XML constraints and prevents sensitive information from leaking from general user. The proposed framework protects sensitive information disclosed through encryption technology. Moreover, the proposed framework is query view security without any three types of XML constraints. As a result of the experiment, the proposed framework has mathematically proved a way to prevent leakage of user information through data inference more than the existing method.

Cyber-attack group analysis method based on association of cyber-attack information

  • Son, Kyung-ho;Kim, Byung-ik;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.260-280
    • /
    • 2020
  • Cyber-attacks emerge in a more intelligent way, and various security technologies are applied to respond to such attacks. Still, more and more people agree that individual response to each intelligent infringement attack has a fundamental limit. Accordingly, the cyber threat intelligence analysis technology is drawing attention in analyzing the attacker group, interpreting the attack trend, and obtaining decision making information by collecting a large quantity of cyber-attack information and performing relation analysis. In this study, we proposed relation analysis factors and developed a system for establishing cyber threat intelligence, based on malicious code as a key means of cyber-attacks. As a result of collecting more than 36 million kinds of infringement information and conducting relation analysis, various implications that cannot be obtained by simple searches were derived. We expect actionable intelligence to be established in the true sense of the word if relation analysis logic is developed later.

Developmental Results of Generative Fathering and Attachment Security (생산적인 아버지노릇과 유아의 애착안정성의 발달적 결과 : 단기종단적 연구)

  • Yee, Young Hwan
    • Korean Journal of Child Studies
    • /
    • v.22 no.2
    • /
    • pp.65-76
    • /
    • 2001
  • This study investigated the prediction of fathering and child's attachment to father based on socio-emotional competence and father-child relationship. Fifty-five toddlers and their parents were assessed by the Generative Fathering Questionnaire (Yee et al., 1999) and the Attachment Security Q Set (Waters, 1987) when the children were 2 years old. After 12 months, the child's socio-emotional competence and father-child relationship were assessed by questionnaire. The child's socio-emotional competence was predicted by father's sense of responsibility for child rearing but not by father's involvement in child rearing. Attachment security partly predicted child's socio-emotional competence and father-child relationship. Among the sub-categories of father-child relationship, warmth and closeness of the relationship was related to child's socio-emotional competence.

  • PDF

A Study on the Partnership of the Japanese Police and Private Security (일본 경찰과 민간의 협력에 관한 연구)

  • Ahn, Hwang Kwon;Ahn, Chung Joon
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.61-70
    • /
    • 2012
  • The security law and security industry of Japan have a great impact on Korea. In a modern sense, there are little large disparities between the two nations in the history and development of private security. However, the way they look at private security is not the same in large part. In Japan, private security companies are highly regarded by Japanese people as organizations that guarantee their safety, owing to the efforts of private security companies themselves, the National Security Association and civic groups. Private security has especially been approved and supported since it was decided in the anticrime cabinet council in December, 2003, in line with the action plan for the realization of anticrime society to boost private security as an industry to ensure people's safety in daily routine life by curbing crimes that might pose a threat to peaceful life. Afterwards, there has been a dynamic collaboration between the Japanese police and private security in terms of education, crime prevention, disaster prevention/restoration and everyday life safety. As for Korea, the necessity of cooperation between private security and the police is increasingly stressed, and it's required to strengthen their partnership to ensure successful crime prevention in consideration of Japanese partnership cases. In Japan, the police, civic groups, the security association and security companies make every effort to satisfy Japanese people's safety needs in diverse ways and take disaster-prevention measures as well.