• Title/Summary/Keyword: Type Security

Search Result 1,222, Processing Time 0.034 seconds

A Study on the Effects of Information Security Policy Types and Information Security Stress on Information Security Behavior (정보보안 정책 유형과 보안 스트레스가 정보보안 행동에 미치는 영향에 대한 연구)

  • Lee Kwang Ho;Jung Chan gi
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.113-120
    • /
    • 2022
  • Despite the limitations of existing security policies due to technological development, companies are unable to actively respond to changes by maintaining a closed security policy. This study classified information security policy into three types: regulatory type policy, advisory type policy, and informative type policy. For each classified policy type, the effect on the information security policy compliance behavior of organizational members was investigated by applying the extended theory of planned behavior, and the moderating effect of information security stress was investigated. SmartPLS 2.0 and SPSS 21.0, which are structural equation modeling techniques, were used to analyze the relationship affecting each factor. As a result of the study, regulatory type, advisory type, and informative type security policies affected organizational members' information security policy compliance behavior, and security stress had an effect on information security compliance attitudes and subjective norms on information security, which are prerequisites for planned behavior theory. gave. This study suggests that various types of corporate information security policies can be applied and that security stress can affect information security behaviors of members.

Perception of Family Security and Satisfaction of Family Life : By the type of Self-Support of Newly Married Household (도시신혼기가계의 가정경제안정도인지와 가정생활만족도 -가정경제 자립유형을 중심으로-)

  • 임정빈
    • Journal of the Korean Home Economics Association
    • /
    • v.33 no.2
    • /
    • pp.1-18
    • /
    • 1995
  • The purpose of the study was to examine the type of self supporting economically, and the relation with the type of self-supporting, perception of family financial security and satisfaction of family life. The data was collected from newly married housewives and major findings are as follow: 1. The type of self-support was about 50% of subjectives, the housewives of this type relatively older, higher income, and they are lower in intimacy with husband's family, perception of financial security and satisfaction of family life. 2. The type of support was 30% of them, they are relatively older, higher educated, and higher income level. They are medium in intimacy with husband's family, and satisfaction of family life, but they percept financial security very highly 3. The type of dependence was relatively younger, very high educated. they are closed with husband's family, satisfied with family life, but not in perception of financial security.

  • PDF

Security Analysis on GFN with Secret S-box (비밀 S-box를 사용한 GFN에 대한 안전성 분석)

  • Lee, Yongseong;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.467-476
    • /
    • 2017
  • In this paper, we analyze Generalized Feistel Network(GFN) Type I, Type II, Type III that round function use SP update function, secret S-box and $k{\times}k$ MDS matirx. In this case an attacker has no advantage about S-box. For each type of GFN, we analyze and restore secret S-box in 9, 6, 6 round using the basis of integral cryptanalysis with chosen plaintext attack. Also we restore secret S-box in 16 round of GFN Type I with chosen ciphertext attack. In conclusion, we need $2^{2m}$ data complexity and ${\frac{2^{3m}}{32k}},{\frac{2^{3m}}{24k}},{\frac{2^{3m}}{36k}}$ time complexity to restore m bit secret S-box in GFN Type I, Type II, Type III.

Type Drive Analysis of Urban Water Security Factors

  • Gong, Li;Wang, Hong;Jin, Chunling;Lu, Lili;Ma, Menghan
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.784-794
    • /
    • 2020
  • In order to effectively evaluate the urban water security, the study investigates a novel system to assess factors that impact urban water security and builds an urban water poverty evaluation index system. Based on the contribution rates of Resource, Access, Capacity, Use, and Environment, the study adopts the Water Poverty Index (WPI) model to evaluate the water poverty levels of 14 cities in Gansu during 2011-2018 and uses the least variance method to evaluate water poverty space drive types. The case study results show that the water poverty space drive types of 14 cites fall into four categories. The first category is the dual factor dominant type driven by environment and resources, which includes Lanzhou, Qingyang, Jiuquan, and Jiayuguan. The second category is the three-factor dominant type driven by Access, Use, and Capability, which includes Longnan, Linxia, and Gannan. The third category is the four-factor dominant type driven by Resource, Access, Capability, and Environment, which includes Jinchang, Pingliang, Wuwei, Baiyin, and Zhangye. The fourth category is the five-factor dominant type, which includes Tianshui and Dingxi. The driven types impacting the urban water security factors reflected by the WPI and its model are clear and accurate. The divisions of the urban water security level supply a reliable theoretical and numerical basis for an urban water security early warning mechanism.

Influence of Mentoring Type and Mentoring Function on the Organizational Commitment among the Security Organization (시큐리티조직의 멘토링유형과 멘토링기능이 조직몰입에 미치는 영향)

  • Kim, Chan-Sun
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.21-29
    • /
    • 2011
  • This study is to investigate how security organizational mentoring type and mentoring function affects organizatio nal commitment. This study had selected security from 5 different security organizations of 2010 which are located i n capital area. Using judgment sampling method, 198 security were drawn for the final study. The survey used in th is study is composed of 37 questions. To practice frequency analysis, factorial analysis, reliability analysis and regre ssion, a program called SPSSWIN 18.0 was used. The value of Cronbach's ${\alpha}$, which shows the reliability of the stud y, appeared to be over .622. The result is: First, security organizational mentoring type affects mentoring function. T hat is, when a systematic mentoring is activated, friendship protecting function, career managing function and sociopsychological function are promoted. Second, security organizational mentoring type affects organizational commitmen t. That is, when a systematic mentoring is activated, organizational commitment is promoted. Third, security organiz ational mentoring function affects organizational commitment. That is, increased friendship protecting function, career managing function, socio-psychological function and role model function results in increased organizational commitment.

Prioritize Security Strategy based on Enterprise Type Classification Using Pair Comparison (쌍대비교를 활용한 기업 유형 분류에 따른 보안 전략 우선순위 결정)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.4
    • /
    • pp.97-105
    • /
    • 2016
  • As information system is getting higher and amount of information assets is increasing, skills of threatening subjects are more advanced, so that it threatens precious information assets of ours. The purpose of this study is to present a strategic direction for the types of companies seeking access to information security. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. Paired comparison method survey conducted by a group of information security experts to determine the priority and the relative importance of information security management elements. The factors used in the security response strategy are the combination of the information security international certification standard ISO 27001, domestic information protection management system certification K-ISMS, and personal information security management system certification PIMS. Paired comparison method was then used to determine strategy alternative priorities for each type. Paired comparisons were conducted to select the most applicable factors among the 12 strategic factors. Paired comparison method questionnaire was conducted through e-mail and direct questionnaire survey of 18 experts who were engaged in security related tasks such as security control, architect, security consulting. This study is based on the idea that it is important not to use a consistent approach for effective implementation of information security but to change security strategy alternatives according to the type of company. The results of this study are expected to help the decision makers to produce results that will serve as the basis for companies seeking access to information security first or companies seeking to establish new information security strategies.

Higher order DC for block ciphers with 2-block structure (2-블록 구조 블록 암호에 대한 고차 차분 공격)

  • 박상우
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.27-38
    • /
    • 1999
  • We study on the security for the block ciphers with 20block structure which have provable security against DC and LC on the view point of higher order DC, 2-block structures are classified three types according to the location of round function such as C(Center)-type R(Right)-type and L(Left)-type We prove that in the case of 4 rounds encryption function these three types provide the equal strength against higher order DC and that in the case of 5 or more rounds R-type is weaker than C-type and L-type.

Bit Security of keys obtained from Tripartite Authenticated Key Agreement Protocol of Type 4

  • Park, Young-Ju e;Lim, Geun-Cheol
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.620-624
    • /
    • 2003
  • In[5], the bit security of keys obtained from protocols based on pairings has been discussed. However it was not able to give bit security of tripartite authenticated key(TAK) agreement protocol of type 4. This paper shows the bit security of keys obtained from TAK-4 protocol.

  • PDF

Study on the Difference of Physical Fitness and Cardiovascular Risk Factors for the Security Guards' Working Type (경호원의 근무유형에 따른 체력과 심혈관질환 위험인자의 차이 연구)

  • Kim, Kyong-Tae;Park, Jun-Suk
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.31-49
    • /
    • 2011
  • The subjects consisted of 60 healthy men who absence of cardiopulmonary diseases, orthopedic diseases, and metabolic diseases. The difference of physical fitness, body composition, cardiovascular risk factors, and psychological characteristics for security guards' working type were examined using one-way ANOVA through SPSS 12.0 version and was treated for the post hoc test when the difference appeared significantly. According to the result, first, there were higher level for the physical fitness according to the security guards' position and it increases body composition and cardiovascular risk factors from higher position. Second, physical fitness level is higher, body composition and cardiovascular risk factors is lower in the security guards for the field service than the security guards on inside duty according to the security guards' working type. Third, it decreases body composition and cardiovascular risk level when the physical fitness level is getting increase for the security guards. In conclusion, it needs to have a physical activity with aerobic system for the security guards of leading members and inside service to decrease the overweight or obesity and cardiovascular risk level.

  • PDF

A Study on Assumptions for Operational Environment of OS Security Enhancement System

  • Kim, Tai-Hoon;Kim, Min-Chul;Baik, Nam-Kyun;Kim, Jae-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2093-2096
    • /
    • 2003
  • Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. Trusted operating systems have been developed since the early 1980s and began to receive National Security Agency (NSA) evaluation in 1984. The researches about trusted OS are proceeding over the world, and new product type using the loadable security kernel module (LSKM) or dynamic link library (DLL) is being developed. This paper proposes a special type of product using LSKM and specific conditions for operational environment should be assumed.

  • PDF