• Title/Summary/Keyword: covert information

Search Result 61, Processing Time 0.025 seconds

Effect of Covert Narcissism, Self-directed learning Ability, Academic Achievement on Self-leadership of Nursing students (간호대학생의 내현적 자기애, 자기주도학습능력, 학업성취도가 셀프리더십에 미치는 영향)

  • Kyoung Eun Lee;Eun Kyung Byun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.409-417
    • /
    • 2023
  • This study was attempted to confirm the effects of covert narcissism, self-directed learning ability, academic achievement on self-leadership in nursing students. This study targeted 247 nursing students in B and Y cities. Data analysis was analyzed by descriptive statistics, t-test, ANOVA, Pearson's correlation coefficient, and multiple regression analysis using the SPSS 22.0 program. The average self-leadership of the subjects was 3.14±0.62 points, and the difference in self-leadership according to general characteristics was significant in major satisfaction (F=11.111, p<.001). There was positive correlation between self-leadership and self-directed learning ability (r=.630, p<.001), academic achievement (r=.532, p<.001), and negative correlation between covert narcissism (r=-.206, p=.001). The factors influencing the subject's self-leadership were identified as covert narcissism (β=-.147, p=.031), self-directed learning ability (β=.468, p<.001) and academic achievement (β=.282, p<.001) and the explanatory power was 46.9%. Based on the results of the study, the necessary of developing an effective education program considering the self-leadership and related factors of nursing students was suggested.

Multilevel Security Management for Global Transactions

  • Jeong, Hyun-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.735-738
    • /
    • 2000
  • The most important issue in database security is correct concurrency control under the restrictive security policy. The goal of secure transaction management is to keep security and provide many concurrent users with the high availability of database. In this paper, we consider the security environment of multidatabase system with replicated data. The read-from relationship in the existed serializability is improper in security environment. So, we define new read-from relationship and propose new secure 1-copy quasi-seriailzability by utilizing this relationship and display some examples. This security environment requires both the existed local autonomy and the security autonomy as newly defined restriction. To solve covert channel problem is the most difficult issue in developing secure scheduling scheme. The proposed secure 1-copy quasi-serializability is very proper for global transactions in that this serializability not violates security autonomy and prevents covert channel between global transactions.

  • PDF

The host-based Intrusion Detection System with Audit Correlation (감사로그 상관관계를 통한 호스트기반의 침입탐지시스템)

  • 황현욱;김민수;노봉남
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.81-90
    • /
    • 2003
  • The presence of the intrusion is judged by intrusion detection system based on the audit log and the Performance of this system depends on how correctly and effectively it has been described about the intrusion pattern with audit log. In this paper, the relativity concerning intrusion is demonstrated among the information those are ‘System call, Network packet and Syslog’ and the related pattern of the state-transition-based method and those rule-based pattern is identified. By applying this correlation to them, the accuracy rate of detection was able to be improved. Especially, the availability of detection with correlation pattern through Covert Channel detection test has been substantiated.

Non-D-linked Wh-NPs in Korean and Japanese

  • Son, Gwang-Rak
    • Language and Information
    • /
    • v.8 no.2
    • /
    • pp.93-110
    • /
    • 2004
  • This paper discloses a striking similarity between Korean/Japanese wh-NPs and Italian QPs: both categories are disallowed from LD-movement out of weak islands. This leads us to a substantial claim that wh-phrases in the former languages possibly belong to a non-D-linked category, parallel to the Italian QPs. This claim is also supported by semantic evidence: that is, in-situ wh-NPs in these languages lack covert partitivity (Kyungnam University)

  • PDF

A Study on the Analysis of Covert Channel in Network Traffic (네트워크 트래픽의 은닉채널에 관한 연구)

  • 손태식;서정우;서정택;문종섭
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.751-753
    • /
    • 2003
  • 은닉채널에 관한 연구는 1980년대 이전부터 진행되어 왔으며 최근에는 멀티미디어 데이터에 대한 스테가노그래피에 대한 관심이 집중되고 있다. 하지만, 본 논문에서는 현재 스테가노그래피나 정보은닉에서 다루는 동영상 데이터에 대한 은닉채널이 아닌, 인터넷 환경의 근간을 이루는 TCP/IP 네트워크 트래픽에 존재하는 은닉채널에 대한 연구를 수행하였다. 먼저 은닉채널 개념 및 기존 연구동향을 분석하였으며 그 후 TCP/IP를 구성하는 각 프로토콜에 생성 가능한 은닉채널을 분석하여 향후 연구 방향을 제시하였다.

  • PDF

Developing an Embedded Method to Recognize Human Pilot Intentions In an Intelligent Cockpit Aids for the Pilot Decision Support System

  • Cha, U-Chang
    • Journal of the Ergonomics Society of Korea
    • /
    • v.17 no.3
    • /
    • pp.23-39
    • /
    • 1998
  • Several recent aircraft accidents occurred due to goal conflicts between human and machine actors. To facilitate the management of the cockpit activities considering these observations. a computational aid. the Agenda Manager (AM) has been developed for use in simulated cockpit environments. It is important to know pilot intentions performing cockpit operations accurately to improve AM performance. Without accurate knowledge of pilot goals or intentions, the information from AM may lead to the wrong direction to the pilot who is using the information. To provide a reliable flight simulation environment regarding goal conflicts. a pilot goal communication method (GCM) was developed to facilitate accurate recognition of pilot goals. Embedded within AM, the GCM was used to recognize pilot goals and to declare them to the AM. Two approaches to the recognition of pilots goals were considered: (1) The use of an Automatic Speech Recognition (ASR) system to recognize overtly or explicitly declared pilot goals. and (2) inference of covertly or implicitly declared pilot goals via the use of an intent inferencing mechanism. The integrated mode of these two methods could overcome the covert goal mis-understanding by use of overt GCM. And also could it overcome workload concern with overt mode by the use of covert GCM. Through simulated flight environment experimentation with real pilot subjects, the proposed GCM has demonstrated its capability to recognize pilot intentions with a certain degree of accuracy and to handle incorrectly declared goals. and was validated in terms of subjective workload and pilot flight control performance. The GCM communicating pilot goals were implemented within the AM to provide a rich environment for the study of human-machine interactions in the supervisory control of complex dynamic systems.

  • PDF

One-Snapshot Algorithm for Secure Transaction Management in Electronic Stock Trading Systems (전자 주식 매매 시스템에서의 보안 트랜잭션 관리를 위한 단일 스냅샷 알고리즘)

  • 김남규;문송천;손용락
    • Journal of KIISE:Databases
    • /
    • v.30 no.2
    • /
    • pp.209-224
    • /
    • 2003
  • Recent development of electronic commerce enables the use of Electronic Stock Trading Systems(ESTS) to be expanded. In ESTS, information with various sensitivity levels is shared by multiple users with mutually different clearance levels. Therefore, it is necessary to use Multilevel Secure Database Management Systems(MLS/DBMSs) in controlling concurrent execution among multiple transactions. In ESTS, not only analytical OLAP transactions, but also mission critical OLTP transactions are executed concurrently, which causes it difficult to adapt traditional secure transaction management schemes to ESTS environments. In this paper, we propose Secure One Snapshot(SOS) protocol that is devised for Secure Transaction Management in ESTS. By maintaining additional one snapshot as well as working database SOS blocks covert-channel efficiently, enables various real-time transaction management schemes to be adapted with ease, and reduces the length of waiting queue being managed to maintain freshness of data by utilizing the characteristics of less strict correctness criteria. In this paper, we introduce the process of SOS protocol with some examples, and then analyze correctness of devised protocol.

A Steganography-Based Covert Communication Method in Roblox Metaverse Environment (로블록스 메타버스 환경에서의스테가노그래피기반은닉통신기법)

  • Dokyung Yun;Youngho Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.45-50
    • /
    • 2023
  • Roblox, the world's No. 1 metaverse platform, has more than 3 billion subscription accounts and more than 150 millionmonthly active users (MAU). Despite such high interest in metaverse, existing studies on analyzing the risk of cyberattacks and security in the metaverse environment is insufficient. Therefore, in this paper, we propose a new steganography-basedcovert communication method in Roblox. In our proposed method, a secret message is hidden into an image by using a function provided in the Roblox Experience environment and then the image is automatically stored in the RobloxExperience participants' devices (PC or Smartphone) so that a malicious software can extract the hidden message fromthe image. By our experiments in the Roblox metaverse environment, we validated our proposed method works and thus want to inform our proposed method can be used in various cyberattacks and crimes such as the spread of secret commands, the establishment of a steganography botnet, and the mass distribution of malicious malware in metaverse platforms.

A Study on Detection of Covert Database System (은닉 데이터베이스 시스템 탐지 방안)

  • Lee, Keun-Gi;Lee, Seok-Hee;Lee, Sang-Jin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.197-200
    • /
    • 2008
  • 수사관이 사건 관련 조직의 데이터베이스 시스템을 조사할 때, 조직 내부의 많은 시스템을 수작업으로 조사하여 데이터베이스 시스템을 찾는 것은 비효율적이다. 게다가 용의자가 사건 은폐나 알리바이 조작을 목적으로 데이터베이스 시스템을 은닉하는 경우, 수사관이 시스템을 찾기 위해 더욱 많은 인력과 시간을 소비한다. 따라서 간단한 조사로부터 얻은 정보를 통해 어떤 시스템부터 조사해야 할지 결정해야 한다. 데이터베이스 시스템이 네트워크에 연결되어 있는 경우는 접속 오류 정보를 분석하여 데이터베이스 시스템 사용 유무 정보를 수집할 수 있고, 네트워크에 연결되어 있지 않은 경우는 데이터베이스 시스템 흔적 정보 분석을 통하여 데이터베이스로 예상되는 시스템을 찾아 낼 수 있다. 본 논문에서는 데이터베이스 시스템을 은닉하는 사례에 대해 논하고 네트워크상의 은닉된 데이터베이스 시스템을 탐지하는 기법에 대해 살펴보기로 한다.

  • PDF

PSMVL : A Concurrency Control Protocol for Real-Time Secure Database Systems

  • Park, Chan-jung;Park, Seog
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.5
    • /
    • pp.89-99
    • /
    • 1997
  • The application for real-time database systems must satisfy timing constraints. Typically the timing constraints are expressed in the form of deadlines which are represented by priorities to e used by schedulers. In any real-time applications, since the system maintains sensitive information to be shared by multiple users with different levels of security clearance, security is another important requirement. As more advanced database systems are being used in applications that need to support timeliness while managing sensitive information, protocols that satisfy both requirements need to be developed. In this appear, we proposed a new priority-driven secure multiversion locking (PSMVL) protocol for real-time secure database systems. The schedules produced by PSMVL are proven to e one-copy serializable. We have also shown tat the protocol eliminates covert channels and priority inversions. The details of the protocol, including the compatibility matrix and the version selection algorithms are presented. the results of the performance comparisons of our protocol with other protocols are described.

  • PDF