• Title/Summary/Keyword: Threat

Search Result 2,870, Processing Time 0.03 seconds

The Azimuth Calculation Algorithm of Pulse-Doppler Radar for GVES (지상 기동 장비용 펄스 도플러 레이더의 방위각 계산 알고리즘)

  • Park, Gyu-Churl;Ha, Jong-Soo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.9
    • /
    • pp.947-954
    • /
    • 2010
  • The decision of threat target in the MWR(Missile Warning Radar) of GVES(Ground Vehicle Equipment System) such as MBT(Main Battle Tank) is very important. Threat decision is judged by angular rate and the accurate azimuth calculation for good threat decision is very important. The angular rate is dependent upon the direction of an approaching target. The target is classified into a threat or non-threat using a boundary condition of the angular rate. This paper presents the eighth azimuth calculation methods and compares the results.

Multi-Attribute Threat Index for Information Security : Simulation and AHP Approach (정보보호를 위한 다속성 위협지수 : 시뮬레이션과 AHP 접근방법)

  • Lee, Kang-Soo;Kim, Ki-Yoon;Na, Kwan-Sik
    • Journal of Information Technology Services
    • /
    • v.7 no.1
    • /
    • pp.117-130
    • /
    • 2008
  • Multi-attribute risk assessments provide a useful framework for systematic quantitative risk assessment that the security manager can use to prioritize security requirements and threats. In the first step, the security managers identify the four significant outcome attributes(lost revenue, lost productivity, lost customer, and recovery cost). Next. the security manager estimates the frequency and severity(three points estimates for outcome attribute values) for each threat and rank the outcome attributes according to AHP(Analytic Hierarchy Process). Finally, we generate the threat index by using muiti-attribute function and make sensitivity analysis with simulation package(Crystal Ball). In this paper, we show how multi-attribute risk analysis techniques from the field of security risk management can be used by security managers to prioritize their organization's threats and their security requirements, eventually they can derive threat index. This threat index can help security managers to decide whether their security investment is consistent with the expected risks. In addition, sensitivity analysis allows the security manager to explore the estimates to understand how they affect the selection.

Analysis of Threat Information Priorities for Effective Security Monitoring & Control (효과적인 보안관제를 위한 위협정보 우선순위 도출)

  • Kang, DaYeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.5
    • /
    • pp.69-77
    • /
    • 2021
  • This study aims to identify security-based threat information for an organization. This is because protecting the threat for IT systems plays an important role for an corporate's intangible assets. Security monitoring systems determine and consequently respond threats by analyzing them in a real time situation, focusing on events and logs generated by security protection programs. The security monitoring task derives priority by dividing threat information into reputation information and analysis information. Reputation information consisted of Hash, URL, IP, and Domain, while, analysis information consisted of E-mail, CMD-Line, CVE, and attack trend information. As a result, the priority of reputation information was relatively high, and it is meaningful to increase accuracy and responsiveness to the threat information.

Unified Psycholinguistic Framework: An Unobtrusive Psychological Analysis Approach Towards Insider Threat Prevention and Detection

  • Tan, Sang-Sang;Na, Jin-Cheon;Duraisamy, Santhiya
    • Journal of Information Science Theory and Practice
    • /
    • v.7 no.1
    • /
    • pp.52-71
    • /
    • 2019
  • An insider threat is a threat that comes from people within the organization being attacked. It can be described as a function of the motivation, opportunity, and capability of the insider. Compared to managing the dimensions of opportunity and capability, assessing one's motivation in committing malicious acts poses more challenges to organizations because it usually involves a more obtrusive process of psychological examination. The existing body of research in psycholinguistics suggests that automated text analysis of electronic communications can be an alternative for predicting and detecting insider threat through unobtrusive behavior monitoring. However, a major challenge in employing this approach is that it is difficult to minimize the risk of missing any potential threat while maintaining an acceptable false alarm rate. To deal with the trade-off between the risk of missed catches and the false alarm rate, we propose a unified psycholinguistic framework that consolidates multiple text analyzers to carry out sentiment analysis, emotion analysis, and topic modeling on electronic communications for unobtrusive psychological assessment. The user scenarios presented in this paper demonstrated how the trade-off issue can be attenuated with different text analyzers working collaboratively to provide more comprehensive summaries of users' psychological states.

Defense ICT Supply Chain Security Threat Response Plan (국방 ICT 공급에 대한 보안 위협 대응 방안)

  • Lee, Yong-Joon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.125-134
    • /
    • 2020
  • The potential security threat is increasing as the supply of ICT products to the defense sector increases with the development of information and communication technology. Attempts to neutralize, such as intelligence gathering and destruction, through attacks on the defense power support system and the intelligence system of the weapons system could pose a fatal threat.Therefore, security measures of supply chain shear system that take into account ICT product production and operation stage to maintenance stage are needed in defense field. In the paper, technical and administrative measures for responding to 12 ICT supply chain security threats at each stage of the defense ICT supply chain life cycle were presented.

The influence of threat perception and psychological reactance to cigarette warning labels on intention to quit smoking among smoking adolescents -with focus on industrial specialized high school students (특성화 고등학교 흡연 청소년의 담뱃갑 경고그림 위협인식, 심리적 저항이 금연의도에 미치는 영향)

  • Park, Suhyun;Park, Jiyoung
    • Journal of Korean Public Health Nursing
    • /
    • v.35 no.2
    • /
    • pp.283-296
    • /
    • 2021
  • Purpose: The aim of this study was to investigate the influence of threat perception and psychological reactance to graphic health warnings on cigarette packages on intention to quit smoking among smoking adolescents. Methods: The participants were 185 smoking adolescents attending two industrial specialized high schools, who had witnessed graphic health warnings on cigarette packages within the previous 30 days. Collected data were analyzed using descriptive statistics, the t-test, one-way analysis of variance, Pearson's correlation coefficients, and hierarchical multiple regression analysis using SPSS/WIN Ver. 25.0. Results: The results showed that participant threat perception (𝛽=.14, p=.037) after witnessing a cigarette warning message had a positive influence on intention to quit smoking. On the other hand, psychological reactance (𝛽=-.23, p=.001) showed a negative influence on intention to quit smoking. Conclusion: When designing and developing a message for smoking adolescents, customized messages are required to reflect teenagers' characteristics and raise threat perception and lower psychological reactance. In addition, we propose a future study be conducted to determine the influences of various psychological determinants, including self-efficacy and skills, on threat perception and psychological reactance to graphic health warnings on cigarette packages among smoking adolescents.

The Necessity of A Cognitive-scientific Analysis on A Security threat Act - The Foundation for A Establishment of The Scientific Preventive Social-security Countermeasure - (경호위해행위에 대한 인지과학적 분석의 필요성 고찰 - 과학적 예방적 사회안전 대책 수립을 위한 기초 -)

  • Kim, Doo-Hyun;Son, Ji-Young
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.33-51
    • /
    • 2008
  • According to dictionary, the meaning of protection is "guard and protect" that means protecting the Protectee's safety in case of sudden attack or various accident and Security means all protecting activity including Protectee and place where he is in or will be as comprehensively meaning of safe. As you see in the definition, Protection and security is the act to protect or will to protect from a security-threat act. A security-threat act can be discussed in the range of the concept of a criminal act in Criminal Law. A security-threat act is based on criminal act in Criminal Law, we are going to review such a security-threat act in a point of view in a sphere of learning in today's remarkable a brain-neuro science and cognitive science based on cognitive psychology, and to use an analysis on such a security-threat act to make a foundation for a establishment of the scientific preventive social security countermeasure. To do so, First of all we are going to review a security-threat act based on criminal act in Criminal Law in a point of protection police logic view. Next, we are going to introduce how cognitive science understand about act of man before we analyse a threat act as one of an act of man in cognitive science point of view. Finally, we are going to discuss the need of cognitive scientific analyse in order to establish the Scientific Preventive Social-security Countermeasure at the same time we are going to analyse a threat act in a cognitive scientific view.

  • PDF

The realistic threat and symbolic threat toward people with mental illness: The effect of contact and sense of community (정신장애인에 대한 실질적 위협감 및 상징적 위협감: 접촉경험 및 공동체의식과의 관계)

  • Seungah Ryu;Kyoungmi Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.25 no.2
    • /
    • pp.119-135
    • /
    • 2019
  • There have been many efforts to reduce prejudice and discrimination against people with mental illness in our community. Studies have shown that the threat to people with mental illness is a important factor. In this study, we focused on contact experience and sense of community that are believed to influence both realistic and symbolic threat We looked the differences in threat depending on the type of contact(family, friends/coworker, public places, no contact) with people with mental illness. Next, if there is contact experience, we questioned that the quality of the experience could influence the threats in all types of contact. Finally, could contact experience and sense of community affect the threats? The total of 465 respondents were surveyed in this study. The result showed that the realistic threat were not different depending on the types of contact, but that the symbolic threat were more higher people with no-contact experience than people with contact experience. The quality of experience had a significant effect on both threats, except in the case of the family contact on realistic threat. Lastly, sense of community was analyzed as a significant variable for both realistic and symbolic threats. Based on these results, we discussed the impact of contact and sense of community and implications of this study.

Deriving Usability Evaluation Criteria for Threat Modeling Tools (위협 모델링 도구의 사용성 평가기준 도출)

  • In-no Hwang;Young-seop Shin;Hyun-suk Cho;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.763-780
    • /
    • 2024
  • As the domestic and international landscape undergoes rapid changes, the importance of implementing security measures in response to the growing threats that businesses face is increasing. In this context, the need for Security by Design (SbD), integrating security from the early design stages, is becoming more pronounced, with threat modeling recognized as a fundamental tool of SbD. Particularly, to save costs and time by detecting and resolving security issues early, the application of the Shift Left strategy requires the involvement of personnel with limited security expertise, such as software developers, in threat modeling. Although various automated threat modeling tools have been released, their lack of user-friendliness for personnel lacking security expertise poses challenges in conducting threat modeling effectively. To address this, we conducted an analysis of research related to threat modeling tools and derived usability evaluation criteria based on the GQM(Goal-Question-Metric) approach. An expert survey was conducted to validate both the validity and objectivity of the derived criteria. We performed usability evaluations of three threat modeling tools (MS TMT, SPARTA, PyTM), and the evaluation results led to the conclusion that MS TMT exhibited superior usability compared to other tools. This study aims to contribute to the creation of an environment where personnel with limited security expertise can effectively conduct threat modeling by proposing usability evaluation criteria.

The Impact of Perceived IT Threat on Convergence Information System Performance (지각된 IT위협이 융합 정보시스템 성과에 미치는 영향)

  • Park, Hyeon-Ho;Nho, Hee-Ock;Kim, Yong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.3
    • /
    • pp.65-71
    • /
    • 2015
  • Based on Technology Threat Avoidance Theory, this study explains the process that the users cope with IT Threat and accomplish IS outcome. To empirically test the proposed model, data were collected through a survey of respondents who have the experience of using IS, and analyzed by using structural equations modelling. The result shows IT Threat had negative effects on Problem-Focused Coping and IS Appropriation. Also Problem-Focused Coping had significant effects on IS Appropriation and IS Appropriation had positive relation on IS Performance. In conclusion the study proposed that IT users improve Convergence Information System Performance by Problem-Focused Coping when they perceive IT Threat.