• Title/Summary/Keyword: Threat Factors

Search Result 351, Processing Time 0.026 seconds

The Best Model to Optimize Security Investments with Considering a Corelation of Response Techniques Against Each Threat (위협별 대응기술들의 상관관계를 고려한 보안 투자 모델링)

  • Kim, Min-Sik;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.39-44
    • /
    • 2009
  • To get legitimacy of a security investment, the analysis of ROI about the security investment is required. In this paper, we suggest a practical quantitative model with considering factors that do decision-making of optimized security investment difficult. This model makes use of the value of a residual risk to decide the best information security solution and considers a corelation of response techniques of the information security solution against each threat to do exact decision-making.

  • PDF

Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination

  • Chit-Jie Chew;Po-Yao Wang;Jung-San Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2529-2549
    • /
    • 2023
  • For effectively lowering down the risk of cyber threating, the zero-trust architecture (ZTA) has been gradually deployed to the fields of smart city, Internet of Things, and cloud computing. The main concept of ZTA is to maintain a distrustful attitude towards all devices, identities, and communication requests, which only offering the minimum access and validity. Unfortunately, adopting the most secure and complex multifactor authentication has brought enterprise and employee a troublesome and unfriendly burden. Thus, authors aim to incorporate machine learning technology to build an employee behavior analysis ZTA. The new framework is characterized by the ability of adjusting the difficulty of identity verification through the user behavioral patterns and the risk degree of the resource. In particular, three key factors, including one-time password, face feature, and authorization code, have been applied to design the adaptive multifactor continuous authentication system. Simulations have demonstrated that the new work can eliminate the necessity of maintaining a heavy authentication and ensure an employee-friendly experience.

An Analysis of Threat Factors for Strengthen Maritime Safety around Delphi/AHP-Based Launch Site and Flight Paths (Delphi/AHP 기반 발사장 주변 및 비행경로의 해상안전 강화를 위한 위협요인 분석)

  • Ahn-Tae Shin;Byung-Mun Park;Hun-Soo Byun
    • Korean Chemical Engineering Research
    • /
    • v.61 no.2
    • /
    • pp.208-216
    • /
    • 2023
  • In this study, using the Delphi method, 20 responses to 4 questions (need for launch safety control, top-priority considerations for ensuring public safety during launch, necessary improvements for securing maritime safety, and maritime safety threat factors) regarding launch vehicles and public safety were obtained from experts, and their importance was evaluated to analyze the factors that threaten the reinforcement of maritime safety around launch sites and flight paths when launching. According to the results of an analytic hierarchy process (AHP) analysis, the consistency ratio of the four questions was 4.8%, which is lower than CR ≤ 0.1(10%), and the consistency percentage of the lower measurement indicators was 3.9~5.7%. The derived importance and priority of maritime safety threat factors during launching were in the following order: Substantial human and physical damage in case of launch accidents(0.36), Prepare legal bases (e.g., penalty details) regarding maritime control(0.32), Secure the safety of personnel, equipment, and facilities in danger zone(0.31), Unauthorized entry of vessels in maritime control zones and non-compliance to restrictions(0.30). This article can serve as a reference for strengthening maritime safety in areas around launch sites and flight paths.

A Study on the Factors Affecting the Information Systems Security Effectiveness of Password (패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.

Analysis of Threat Factors of the Chinese Maritime Militia and the Prospect of Maritime Disputes between Korea and China (중국 해상 민병대의 위협요인 분석 및 한·중 해양 분쟁 전망)

  • Park, Byeung chan
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.83-113
    • /
    • 2022
  • Although China's maritime militia has not been well known despite its long history, it is recently emerging as a serious threat to maritime security, causing neighboring countries' security concerns due to the growing number of maritime disputes with China. In this regard, it is now time to clearly define the true nature of the Chinese maritime militia. A close look at the organization and roles of the Chinese maritime militia reveals that it is an organization that is systematically managed and operated by the Chinese government and the People's Liberation Army of China. Its role is to serve the purpose of "contributing to the protection and expansion of China's marine interests." In addition, the threat factors of the Chinese maritime militia were analyzed by examining the cases of maritime disputes between the Chinese maritime militia and neighboring countries. First, the Chinese maritime militia has implemented the "Gray Zone Strategy." Second, it is a systematic organization supported by the Chinese government and the People's Liberation Army. Third, it is a maritime power that cannot be ignored as the world's largest militia organization. Fourth, it has a strategic flexibility that enables the execution of the dual mission of working for a living such as commercial fishing and serving in the maritime militia. The threats of the Chinese maritime militia are not limited to Southeast Asian countries located in the South China Sea. This is also the case in Korea as the country cannot avoid maritime disputes with China such as the Ieodo issue and the boundary delimitation of the West Sea. Accordingly, this study was focused on presenting a predictable scenario and countermeasures based on the analysis through a scenario technique with respect to the two cases that are most likely to occur in Korea-China relations. Finally, beyond identifying the nature of the Chinese maritime militia, this study takes a further step to share considerations as to how the organization may operate and develop in the future and how we can cope with its moves.

  • PDF

Factors Influencing Multi-cultural Acceptance of Freshmen in Nursing Colleges (간호대학 신입생의 다문화수용성 영향요인)

  • Jung, Sun-Young
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.322-331
    • /
    • 2021
  • This study attempted to identify the multi-cultural acceptance level of freshmen in nursing colleges and to analyze the factors influencing it. For the research method, data were collected from 410 first-year nursing students at K University in W City through a questionnaire from March 1 to 28, 2021, and frequency, reliability analysis, t-test, ANOVA, correlation, and multiple regression were conducted using the open-source statistical package R. As a result of the study, the multi-cultural acceptance level of freshman in nursing colleges averaged 77.36 points, indicating that they have a slightly higher multi-cultural acceptance capacity, and as a result of analyzing the influence of multi-cultural acceptance related factors, Korean recognition requirements(𝛽=0.34, p<.001), perceived threat recognition for migrants (𝛽=0.29, p<.001), Experience in multi-cultural education(𝛽=0.14, p<.001), Recognition of the appropriate age for multi-cultural education (𝛽=0.20, p<.001) was statistically significant. According to results, it is necessary to develop and actively utilize regular curriculum and programs related to multi-culturalism for nursing students.

An APT Attack Scoring Method Using MITRE ATT&CK (MITRE ATT&CK을 이용한 APT 공격 스코어링 방법 연구)

  • Cho, Sungyoung;Park, Yongwoo;Lee, Kunho;Choi, Changhee;Shin, Chanho;Lee, Kyeongsik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.673-689
    • /
    • 2022
  • We propose an APT attack scoring method as a part of the process for detecting and responding to APT attacks. First, unlike previous work that considered inconsistent and subjective factors determined by cyber security experts in the process of scoring cyber attacks, we identify quantifiable factors from components of MITRE ATT&CK techniques and propose a method of quantifying each identified factor. Then, we propose a method of calculating the score of the unit attack technique from the quantified factors, and the score of the entire APT attack composed of one or more multiple attack techniques. We present the possibility of quantification to determine the threat level and urgency of cyber attacks by applying the proposed scoring method to the APT attack reports, which contains the hundreds of APT attack cases occurred worldwide. Using our work, it will be possible to determine whether actual cyber attacks have occurred in the process of detecting APT attacks, and respond to more urgent and important cyber attacks by estimating the priority of APT attacks.

A Study on Land-cover and Sedimentary Environment Changes Before and After the 2020 Flood in the Seomjin River Chimsil Wetland (섬진강침실습지의 2020년 홍수 전·후 토지피복 및 퇴적환경 변화 연구)

  • Lee, Ye-Seul;Lim, Jeong-Cheol;Jang, Dong-Ho
    • Journal of The Geomorphological Association of Korea
    • /
    • v.28 no.4
    • /
    • pp.15-30
    • /
    • 2021
  • This study analyzed the changes in land-cover and sedimentary environment before and after flooding through drone images and sediment analysis for the Seomjin River Chimsil Wetland. The results showed that the area of some land-covers such as sand bar, grass, and trees were continuously changed. The acidity level of the sediments in the Seomjin River Chimsil Wetland was weakened gradually by flooding and EC was also decreased. The levels of organic matter, effective phosphoric acid, and CEC, however, were fluctuating depending on branches, which seems to be the result of landization as new sedimentary environment was developed and vegetation was settled after the flood. Average mean size of river sediments was found to be fine sand, and it exhibited various particle size characteristics from granule to medium silt depending on the location. As the sedimentary environment changed due to the effects of floods and typhoons, the particles were granulated or grain refined depending on the position. In the Seomjin River Chimsil Wetland, there were factors that could interfere with geomorphic development and sedimentary environment, contamination sources in and around the wetland, and natural threat factors. Therefore, in this study, a conservation and management plan was proposed to remove these threat factors and to preserve the scarcity, naturalness, and dynamics of Seomjin River Chimsil Wetland.

A Study on Developing Low Altitude Multi-layer Air Defense System to Protect Megacities in the Korean Peninsula (한국형 메가시티 저고도 다중방공체계 구축 방안)

  • Sin, Ui-Cheol;Cho, Sang Keun;Park, Sung Jun;Sim, Jun Hak;Koo, Ja Hong;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.393-398
    • /
    • 2022
  • Megacities of the Repulic of Korea(ROK) will have increased by urbanization and the fourth industrial revolution. Mgacities are absolutely the opportunity factor to make human life enriched. Simultaneously, those are the challenge foctor considering the crucial conventional threat such as massive artillery and multiple rocket launcher from the North Korea. Israel that has faced the geopolitical situation of ROK developed the Multi-layer air defense system to offset the low altitude threat from the neighboring nations. As a result, Israel substantially removed plenty of Hamas' rockes and suicidal drones in 2021. Applying Israel's concept, North Korea's low altitude threat toward the ROK's megacities can effectively be eliminated. Furthermore, this Multi-layer air defense system can be a game-changer that gets rid of the low and high altitude threat from North Korea and neighboring nations with both hyperconnected sensor-C2-shooter and artificial intelligence. Through this approach, the ROK will be able to achieve the prosperity and prowth of nation at the center of Megacities concentrated on PMESII(Politics, Military, Economy, Society, Information, and Infrastructure) factors.

Effects of Exposure to Violence During Clinical Practicum, Self-esteem and Resilience on Depression among Nursing students (간호대학생의 임상실습 폭력피해경험, 자아존중감 및 회복탄력성이 우울에 미치는 영향)

  • Lee, Young-Eun;Jang, Yoo-Na
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.8
    • /
    • pp.646-657
    • /
    • 2018
  • Purpose: This study is to investigate factors affecting depression in nursing students. Methods: A survey was conducted with 216 nursing students in college at P city, D city, and K province. Data was collected from April 15 to May 21, 2018, and analyzed by descriptive statistics, t-test, one-way ANOVA and hierarchical regression with IBM SPSS Statistics 24.0. Results: There was a significant positive correlation between verbal violence and depression(r=.261, p<.001), between physical threat and depression(r=.291, p<.001). Also, Self-esteem had a significant positive correlation with resilience(r=.685, p<.001) and negative correlation with depression(r=-.590, p<.001). Moreover, resilience had a significant negative correlation with depression(r=-.612, p<.001). In the hierarchical analysis, factors affecting the nursing students' depression were resilience(${\beta}=-.337$, p<.001), self-esteem(${\beta}=-.279$, p<.001), physical threat(${\beta}=.177$, p=.001). The variable that had the highest impact on depression was resilience and the explanatory power of the regression model was 51.5%(F=17.965, p<.001). Conclusion: The findings of this study indicate that the major factors influencing nursing students depression are physical threat, self-esteem and resilience. Therefore, it suggests that an intervention program will be required to prevent violence during the clinical practice, enhances self-esteem and improves resilience in order to reduce depression of nursing students.