• 제목/요약/키워드: Sense of security

검색결과 260건 처리시간 0.022초

A Novel Hybrid Algorithm Based on Word and Method Ranking for Password Security

  • Berker Tasoluk;Zuhal Tanrikulu
    • International Journal of Computer Science & Network Security
    • /
    • 제23권3호
    • /
    • pp.161-168
    • /
    • 2023
  • It is a common practice to use a password in order to restrict access to information, or in a general sense, to assets. Right selection of the password is necessary for protecting the assets more effectively. Password finding/cracking try outs are performed for deciding which level of protection do used or prospective passwords offer, and password cracking algorithms are generated. These algorithms are becoming more intelligent and succeed in finding more number of passwords in less tries and in a shorter duration. In this study, the performances of possible password finding algorithms are measured, and a hybrid algorithm based on the performances of different password cracking algorithms is generated, and it is demonstrated that the performance of the hybrid algorithm is superior to the base algorithms.

경호무도 정신특성 요인의 상대적 중요도 평가 (Priority Order of Decisional Factors and Conceptual Construct of Security Martial Arts' Spirit)

  • 김동현
    • 시큐리티연구
    • /
    • 제32호
    • /
    • pp.7-32
    • /
    • 2012
  • 이 연구는 최상의 경호수행을 위해서 경호원이 갖추어야 할 경호무도의 정신요인에 대하여 분석적 계층화과정(AHP) 기법을 활용한 상대적 중요도를 평가하는 것에 목적이 있다. 연구 참여자는 경호학 전공자와 경호 관련 종사자, 그리고 경호이론 및 실기전문가 540명을 선정하였다. 정신특성에 대한 요인추출 단계에서는 문헌고찰을 통해서 수집된 자료를 활용하여 탐색 및 확인적 요인분석을 실시하였다. 이렇게 확인된 정신개념구조를 활용하여 요인 간 상대적 중요도를 전문가 설문을 통해 실시하였다. 통계처리는 SPSS 18.0 for windows와 AMOS 5.0 그리고 Expert Choice 2000을 활용하였다. 이러한 과정을 통해서 결론을 내리면 다음과 같다. 첫째, 경호무도 정신특성과 관련한 요인탐색 결과 4개의 일반요인과 20개 세부요인을 탐색할 수 있었다. 탐색된 요인의 구인타당성을 확인한 결과 모든 기준치에서 안정적인 값을 가지는 것으로 나타났다. 즉 경호무도의 정신특성 개념의 구인은 타당하다고 평가할 수 있다. 이러한 경호무도 정신개념의 일반 요인에 대한 명명화 과정을 통해서 심리관련, 사상관련, 무도관련, 실천관련 정신으로 구성하였고, 심리관련 정신 요인은 집중, 자신감, 자기관리, 몰입, 자부심(자존감)으로, 사상관련 정신 요인은 희생, 정의, 충성, 인류평화, 사명감으로, 무도관련 정신 요인은 예의, 강인, 호신, 심신일여, 용맹(기)으로, 실천관련 정신 요인은 책임, 협동, 겸손, 결단, 프로정신으로 구성하는 것이 타당하다는 결론에 도달했다. 둘째, 경호무도의 위계모형은 4개의 상위 개념과 20개의 하위개념으로 구성하였다. 이러한 경호무도 정신특성 위계모형을 토대로 상대적 중요를 평가한 결과 사상관련 정신(.482), 무도관련 정신(.248), 실천관련 정신(.188), 심리관련 정신(.083) 순으로 중요도가 판명되었다. 그리고 하위개념에 대한 경호무도의 정신특성에 대한 중요도는 희생(.252), 예의(.110), 사명감(.108), 책임(.073), 충성(.053), 강인성(.052), 정의(.049), 호신(.038), 프로정신(.038), 결단(.035), 협동(.029), 자신감(.026), 용맹(기)(.025), 자부심(자존감)(.024), 심신일여(.023), 인류평화(.019), 집중(.014), 겸손(.013), 자기관리(.011), 몰입(.007) 순으로 중요도가 판명되었다. 즉 경호무도는 희생, 정의, 충성, 인류평화, 사명감과 같은 사상관련 정신 요인이 가장 중요한 요인이라고 평가할 수 있다.

  • PDF

T-TIME: A Password Scheme Based on Touch Signal Generation Time Difference

  • Yang, Gi-Chul
    • 한국정보기술학회 영문논문지
    • /
    • 제8권2호
    • /
    • pp.41-46
    • /
    • 2018
  • As evidenced through rapidly growing digital devices and information, digital authentication is becoming ever more critical, especially considering the complex and prevalent digital accounts we are using every day. Also, digital authentication is apt to consistent digital security application. In this sense, digital security quality and usability can be enhanced by developing a mechanism for efficient digital authentication. In this paper, a mechanism of efficient digital authentication called T-TIME is introduced in order to alleviate issues dealing with secure and user friendly authentication across ever- growing digital devices and information. Touch Signal generation time difference is utilized for T-TIME as a mediation mechanism that enhances the security quality by confusing others unlike other graphical password mechanisms which are using spatial information. Hence, digital authentication by using T-TIME can be a good way of enhancing security quality and usability.

만 4세 유아의 애착 안정성과 놀이성이 사회적 능력에 미치는 영향 (Exploring the Effects of Attachment Security and Playfulness on Social Competence among 4-year-old Preschool Children)

  • 최진영;신나나
    • 한국보육지원학회지
    • /
    • 제12권2호
    • /
    • pp.219-238
    • /
    • 2016
  • The purposes of this study were to examine relations among attachment security, playfulness, and social competence during the preschool period and to investigate relative effects of attachment security and playfulness on preschoolers' social competence. A total of forty eight 4-year-old preschool children participated in the current study. Attachment security was assessed using the Attachment Q-sort during a two- or two and half hour home visit. Preschoolers' playfulness and social competence were evaluated by mothers. First, preschoolers' attachment security was significantly associated with their interpersonal adjustment. Preschoolers with secure attachment were rated by their mothers as having higher interpersonal adjustment. In addition, preschoolers' playfulness was significantly related to popularity/leadership and social participation. Second, when preschoolers' attachment security and playfulness were entered together to predict social competence, attachment security and sense of humor were significant predictors of preschoolers' interpersonal adjustment, and social and cognitive spontaneity significantly predicted popularity/leadership. With respect to social participation, preschoolers' physical spontaneity was a significant predictor. Findings of this study indicate that attachment security and playfulness tap into different aspects of social competence, suggesting that both are needed to be emphasized in the development of social competence during the preschool period.

IT자산과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구 (An Empirical Approach to the Influence of IT Assets and Information Security Service on Information Security Quality and Satisfaction)

  • 권순재;이건창;김창현
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2006년도 추계학술대회
    • /
    • pp.467-481
    • /
    • 2006
  • In the era of the Internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security qualty positively, leading to users' satisfaction eventually To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets and Information Security Service influence informations security quality positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets and Information Security Service helped great improve the information security quality and user satisfaction.

  • PDF

전력계통의 신뢰도제어 -상정사고해석을 중심으로- (Security Control of Power Systems)

  • 양흥석;박영문
    • 전기의세계
    • /
    • 제26권3호
    • /
    • pp.84-91
    • /
    • 1977
  • A modified version of algorithm and computer program is proposed to improve the currently available contingency analysis methode for the security control of power system. The underlying principle is based upon the reasonable modification of the current methods suggested by Stagg, Tinny, Alsac, and Stott in consideration of speed, aceuracy, reliability and convergency characteristics. The algorithm and program are desirgned especially for On-Line operation, although Off-Line applications are readily available. Several case studies on the Koren Power Company's 48-bus, 91-line system have shown that the method proposed is efficiently powerful in a sense of practical applicability.

  • PDF

Secure Healthcare Management: Protecting Sensitive Information from Unauthorized Users

  • Ko, Hye-Kyeong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권1호
    • /
    • pp.82-89
    • /
    • 2021
  • Recently, applications are increasing the importance of security for published documents. This paper deals with data-publishing where the publishers must state sensitive information that they need to protect. If a document containing such sensitive information is accidentally posted, users can use common-sense reasoning to infer unauthorized information. In recent studied of peer-to-peer databases, studies on the security of data of various unique groups are conducted. In this paper, we propose a security framework that fundamentally blocks user inference about sensitive information that may be leaked by XML constraints and prevents sensitive information from leaking from general user. The proposed framework protects sensitive information disclosed through encryption technology. Moreover, the proposed framework is query view security without any three types of XML constraints. As a result of the experiment, the proposed framework has mathematically proved a way to prevent leakage of user information through data inference more than the existing method.

Cyber-attack group analysis method based on association of cyber-attack information

  • Son, Kyung-ho;Kim, Byung-ik;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.260-280
    • /
    • 2020
  • Cyber-attacks emerge in a more intelligent way, and various security technologies are applied to respond to such attacks. Still, more and more people agree that individual response to each intelligent infringement attack has a fundamental limit. Accordingly, the cyber threat intelligence analysis technology is drawing attention in analyzing the attacker group, interpreting the attack trend, and obtaining decision making information by collecting a large quantity of cyber-attack information and performing relation analysis. In this study, we proposed relation analysis factors and developed a system for establishing cyber threat intelligence, based on malicious code as a key means of cyber-attacks. As a result of collecting more than 36 million kinds of infringement information and conducting relation analysis, various implications that cannot be obtained by simple searches were derived. We expect actionable intelligence to be established in the true sense of the word if relation analysis logic is developed later.

생산적인 아버지노릇과 유아의 애착안정성의 발달적 결과 : 단기종단적 연구 (Developmental Results of Generative Fathering and Attachment Security)

  • 이영환
    • 아동학회지
    • /
    • 제22권2호
    • /
    • pp.65-76
    • /
    • 2001
  • This study investigated the prediction of fathering and child's attachment to father based on socio-emotional competence and father-child relationship. Fifty-five toddlers and their parents were assessed by the Generative Fathering Questionnaire (Yee et al., 1999) and the Attachment Security Q Set (Waters, 1987) when the children were 2 years old. After 12 months, the child's socio-emotional competence and father-child relationship were assessed by questionnaire. The child's socio-emotional competence was predicted by father's sense of responsibility for child rearing but not by father's involvement in child rearing. Attachment security partly predicted child's socio-emotional competence and father-child relationship. Among the sub-categories of father-child relationship, warmth and closeness of the relationship was related to child's socio-emotional competence.

  • PDF

일본 경찰과 민간의 협력에 관한 연구 (A Study on the Partnership of the Japanese Police and Private Security)

  • 안황권;안정준
    • 융합보안논문지
    • /
    • 제12권5호
    • /
    • pp.61-70
    • /
    • 2012
  • 일본의 경비업법과 경비산업이 한국에 많은 영향을 미쳤다. 현대적 의미의 민간경비에 대한 역사와 발전과정은 양국간에 큰 차이가 없는데도 불구하고 실질적으로 민간경비에 대한 인식은 차이가 크다. 일본의 민간경비와 경찰의 협력은 교육, 범죄예방, 방재 및 복구, 생활안전 등의 면에서 활발하게 이뤄지고 있다. 한국에서도 민간경비와 경찰의 협력이 더욱 필요한 시점이다. 일본의 협력사례들을 참고하여 한국에서도 범죄예방을 위한 민간경비와 경찰의 협력을 강화해야 할 것이다. 일본의 경우 경찰과 시민단체 경비업협회 경비업자 등은 국민의 안전욕구를 적극적으로 충족시키기 위해 다양한 방범, 방재활동을 전개하고 있다.