• 제목/요약/키워드: Threat Factors

검색결과 351건 처리시간 0.03초

소프트웨어 위협 요소의 내부적·외부적 요인 분석에 관한 연구 (A Study on the Analysis of Internal and External Factors of Software Threat Elements)

  • 이은서
    • 정보처리학회 논문지
    • /
    • 제13권6호
    • /
    • pp.278-283
    • /
    • 2024
  • 소프트웨어를 구현할 때 인간의 생명에 위협이 될 수 있는 부작용이 발생할 수 있습니다. 그러므로 소프트웨어가 안전에 미치는 영향을 측정하고 위협을 완화하고 예방하기 위한 대안을 만드는 것이 필요합니다. 위협 요소에 의한 영향도 측정을 위하여 소프트웨어 안전 진단을 수행하기 위한 구성요소가 필요하다. 본 논문은 소프트웨어의 위협 요인을 내부 요인과 외부 요인으로 분류하고 이러한 위협 요인의 영향을 정량적으로 시연하는 것을 목표로 합니다.

퍼지추론을 이용한 정량적 사이버 위협 수준 평가방안 연구 (A Study on the Quantitative Threat-Level Assessment Measure Using Fuzzy Inference)

  • 이광호;김종화;김지원;윤석준;김완주;정찬기
    • 융합보안논문지
    • /
    • 제18권2호
    • /
    • pp.19-24
    • /
    • 2018
  • 이 연구에서는 사이버 위협을 평가할 시 복합적인 요소들을 고려한 위협 수준의 정량적 평가방안을 제안하였다. 제안된 평가방안은 공격방법과 행위자, 위협유형에 따른 강도, 근접성의 4가지 사이버 위협 요소를 기반으로 퍼지이론을 사용하여 사이버 위협 수준을 정량화하였다. 본 연구를 통해 제시된 사이버 위협 수준 평가는 언어로 표현된 위협 정보를 정량화된 데이터로 제시해 조직이 위협의 수준을 정확하게 평가하고 판단할 수 있다.

  • PDF

폐경 후 여성의 낙상예방행위 예측모형 (A Predictive Model of Fall Prevention Behaviors in Postmenopausal Women)

  • 장현정;안숙희
    • 대한간호학회지
    • /
    • 제44권5호
    • /
    • pp.525-533
    • /
    • 2014
  • Purpose: This study was done to propose and test a predictive model that would explain and predict fall prevention behaviors in postmenopausal women. The health belief model was the theoretical basis to aid development of a nursing intervention fall prevention program. Methods: Data for 421 postmenopausal women were selected from an original data set using a survey design. The structural equation model was tested for 3 constructs: modifying factors, expectation factors, and threat factors. Expectation factors were measured as relative perceived benefit (perceived benefit minus perceived barrier), self-efficacy, and health motivation; threat factors, as perceived susceptibility (fear of falling) and perceived severity (avoiding activity for fear of falling); and modifying factors: level of education and knowledge about fall prevention. Data were analyzed using SPSS Windows and AMOS program. Results: Mean age was 55.7 years (range 45-64), and 19.7% had experienced a fall within the past year. Fall prevention behaviors were explained by expectation and threat factors indicating significant direct effects. Mediating effect of health beliefs was significant in the relationship between modifying factors and fall prevention behaviors. The proposed model explained 33% of the variance. Conclusion: Results indicate that fall prevention education should include knowledge, expectation, and threat factors based on health belief model.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • 제20권1호
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

핀테크(FinTech) 서비스의 정보보안 위협요인과 개인정보보호행위와의 구조적 관계에 관한 연구: 기술위협회피와 건강행동이론 관점에서 (The Structural Relationships among Information Security Threat Factors and Information Protection Behavior of the FinTech Services: Focus on Theoretical Perspectives of Technology Threat Avoidance and Health Protective Behaviors)

  • 배재권
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제26권3호
    • /
    • pp.313-337
    • /
    • 2017
  • Purpose Financial technology, also known as FinTech, is conceptually defined as a new type of financial service which is combined with information technology and other traditional financial services like payments, investments, financing, insurance, asset management and so on. Most of the studies on FinTech services have been conducted from the viewpoint of technical issues or legal and institutional studies, and few studies are conducted from the health belief perspectives and security behavior approaches. In this regard, this study suggest an extended information protection behavior model. Design/Methodology/Approach The Health Belief Model (HBM), the Protection Motivation Theory (PMT), and the Technology Threat Avoidance Theory (TTAT) were employed to identify constructs relevant to information protection behavior of FinTech services. A new extended information protection behavior model in which the influence factors of information protection behavior (i.e., perceived susceptibility, perceived severity, perceived benefits, perceived barriers, perceived self-efficacy, subjective norms) affect perceived threats and perceived responsiveness positively, leading to information protection behavior of FinTech users eventually. This study developed an extended information protection behavior model to explain the protection behavior intention in FinTech users and collected 272 survey responses from the mobile users who had experiences with such mobile payments and FinTech services. Findings The finding of this study suggests that the influence factors of information protection behavior affect perceived threats and perceived responsiveness positively, and information protection behavior of FinTech users as well.

지속적인 종합적 품질경영(TQM) 실행의 결정요인에 관한 연구 (An Empirical Study on Factors that determine on Success Factors of Total Quality Management Implementation)

  • 서창적;김재환
    • 품질경영학회지
    • /
    • 제27권3호
    • /
    • pp.1-16
    • /
    • 1999
  • According to the study of TQM implementations, the odds that an organization will successfully implement total quality management are two to one-against it. Based on the Brown's study, two thirds of all TQM implementations are dropped or fail altogether. However, organizations armed with knowledge of the factors that have the biggest impact on their success can take steps to influence or change those factors. In this paper, we studied on the degree of influence between those factors and successful start up and alignment factors. Based on extensive literature reviews those factors, threat, commitment, plan, progress and strategy are determined. Also we determine the successful start up and alignment factors. A framework of research including above factors is developed and tested statistically The Perceived data are collected from managers of quality departments of 141 Korean firms through survey. The results show that the rating of those factors which determine success of implementing TQM is progress, commitment, strategy and progress. But the factor of threat shows negative influence for the success of implementing TQM.

  • PDF

Doing More by Seeing Less: Gritty Applicants are Less Sensitive to Facial Threat Cues

  • Shin, Ji-eun;Lee, Hyeonju
    • 감성과학
    • /
    • 제25권1호
    • /
    • pp.21-28
    • /
    • 2022
  • People differ greatly in their capacity to persist in the face of challenges. Despite significant research, relatively little is known about cognitive factors that might be involved in perseverance. Building upon human threat-management mechanism, we predicted that perseverant people would be characterized by reduced sensitivity (i.e., longer detection latency) to threat cues. Our data from 5,898 job applicants showed that highly perseverant individuals required more time to correctly identify anger in faces, regardless of stimulus type (dynamic or static computer-morphed faces). Such individual differences were not observed in response to other facial expressions (happiness, sadness), and the effect was independent of gender, dispositional anxiety, or conscientiousness. Discussions were centered on the potential role of threat sensitivity in effortful pursuit of goals.

비밀문서유통을 위한 보안 요구사항 분석 (The Analysis of the security requirements for a circulation of the classified documents)

  • 이지영;박진섭;강성기
    • 안보군사학연구
    • /
    • 통권1호
    • /
    • pp.361-390
    • /
    • 2003
  • In this paper, we analyze the security requirement for a circulation of the classified documents. During the whole document process phases, including phases of drafting, sending/receiving messages, document approval, storing and saving, reading, examining, out-sending and canceling a document, we catch hold of accompanied threat factors and export every threat factors of security. We also propose an appropriate and correspondent approach for security in a well-prepared way. Last, we present the security guidelines for security architecture of the classified documents circulation.

  • PDF

퍼지이론 이용한 적 위협수준평가 모델개발 연구 (A Study on the Threat-Level Assessment Model Developmnet using Fuzzy Theory)

  • 장동학;홍윤기
    • 한국산학기술학회논문지
    • /
    • 제12권7호
    • /
    • pp.3245-3250
    • /
    • 2011
  • 이 연구는 지휘관의 위협평가시 의사결정을 도와주기 위한 모델을 제시하였다. 이를 위해 해양조건, 적 함정 제원, 전략환경 3가지 상위평가항목으로 위협요소를 설정하였다. 퍼지추론을 이용하여 각 상위항목별 위협수준을 산정한 후, 퍼지척도를 이용하여 상위평가항목별 중요도를 산정하였다. 마지막으로 상위평가항목의 위협수준을 종합하기 위해 choquet의 퍼지적분을 사용하였다.

사이버 위협 지표 간 중요도 비교 분석 연구 (Priority Assessment of Cyber Threat Indicators)

  • 이로운;권헌영
    • 정보보호학회논문지
    • /
    • 제31권5호
    • /
    • pp.951-958
    • /
    • 2021
  • 정보 자산에 대한 사이버 위협이 증가하면서 위협과 관련된 정보들을 빠르게 공유하는 것이 무엇보다 중요해졌다. 본 연구에서는 국내외 사이버 위협 정보의 공유 현황을 살펴보고 시장에서 공유되고 있는 위협 지표별 우선순위를 도출하여 위협 지표의 중요도를 평가하였다. 분석은 AHP 기법을 활용하였으며, 공격자 및 감염자 지표, 역할 지표, 악성 파일 지표, 기법 및 전파 지표의 네 가지 평가기준과 해당 기준별 세부항목에 대한 쌍대비교를 통해 이루어졌다. 분석 결과 상위 평가 기준 사이에서는 악성 파일 지표가 가장 중요한 것으로 확인되었으며, 각 기준별 세부 항목간 비교에 있어서는 공격자 및 감염자 지표의 경우 감염자 IP가, 역할 지표의 경우 C&C 정보가, 악성 파일 지표의 경우 악성코드 지표가, 기법 및 전파 지표의 경우 스미싱 관련 지표가 보다 중요한 요소로 확인되었다. 이와 같은 결과는 위협 정보에 대한 소비자의 선호도와 정보 제공자의 기여도를 판단하는 자료로서 정보 공유 활성화에 도움이 될 수 있을 것이다.