• 제목/요약/키워드: information Protection

검색결과 4,475건 처리시간 0.037초

The Effect of Security Awareness Training on the Use of Biometric Authentication: Focusing on the Protection Motivational Behaviors

  • Jung, Seungmin;Park, Joo Yeon
    • Journal of Information Technology Applications and Management
    • /
    • 제27권2호
    • /
    • pp.1-21
    • /
    • 2020
  • The purpose of this study is to investigate the behavioral factors affecting the security attitude and intention to use biometrics password based on the protection motivation theory. This study also investigates security awareness training to understand trust, privacy, and security vulnerability regarding biometric authentication password. This empirical analysis reveals security awareness training boosts the protection motivational factors that affect on the behavior and intention of using biometric authentication passwords. This study also indicates that biometric authentication passwords can be used when the overall belief in a biometric system is present. After all, security awareness training enhances the belief of biometric passwords and increase the motivation to protect security threats. The study will provide insights into protecting security vulnerability with security awareness training.

Data Transmission over Power Line with Lightning Protection Devices

  • Kim, Sungeon;Jeon, Taehyun
    • International journal of advanced smart convergence
    • /
    • 제2권1호
    • /
    • pp.27-29
    • /
    • 2013
  • This paper discusses comparative analysis of the effects of surge protection devices (SPD) upon the power line communication channels. The quality of the data transmission channel is measured based on the data rate for the various channel parameters which include channel length and application method of the lightning protection device. The performance measurements are also carried out for various lengths of the communication channel. Experiment results show that specific combination of SPDs applied in the network causes severe degradation of the channel quality which is associated with the combination of grade levels and channel lengths.

터보 부호의 오류 취약 비트 보완 알고리듬 (Protection Algorithm for Error Prone Bit Positions of Turbo Codes)

  • Wangrok Oh;Kyungwhoon Cheun;Kim, Jinwoo;Kyeongcheol Yang
    • 한국통신학회논문지
    • /
    • 제29권7A호
    • /
    • pp.775-780
    • /
    • 2004
  • In this paper, we propose a simple protection scheme for error prone bit positions of turbo codes using the error detection capability of the CRC, which is almost always employed in practical systems. The proposed scheme based on bit flipping with CRC offers flexibility on selecting the level of protection. Also, not having send additional parity bits or discarding useful bit positions, it offers the best error performance for a given level of protection.

비균등 오류정정기법의 연구 동향과 표준화 전망 (Unequal Error Protection: Survey and Standardization Prospect)

  • 박기현;남미영;박진수;송홍엽
    • 한국통신학회논문지
    • /
    • 제37C권11호
    • /
    • pp.1054-1063
    • /
    • 2012
  • 본 논문에서는 다계층 브로드캐스트 통신 환경에서 주목받는 비균등 오류정정기법(UEP)에 대하여 기본 이론을 설명하고 그 효과와 응용 분야를 소개한다. 또한 현재까지의 UEP 기술의 연구 동향을 표준 적용 현황과 관련 논문의 소개를 통해 조명하고, 이를 통해 표준화 전망을 비롯한 앞으로의 활용 방안을 제시한다.

Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives

  • Zhang, Junsong;He, Lei;Zhang, Qikun;Gan, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권11호
    • /
    • pp.5654-5673
    • /
    • 2016
  • Participatory sensing applications rely on recruiting appropriate participants to share their surrounding conditions with others, and have been widely used in many areas like environmental monitoring, health care, and traffic congestion monitoring, etc. In such applications, how to ensure the privacy of a participant is important, since incentive mechanisms are used to maintain their enthusiasm for sustainable participation by offering certain amount of reward. In this paper, we propose a pseudonym-based privacy protection scheme, that takes both privacy protection and user incentives into consideration. The proposed scheme uses the pseudonym mechanism and one-way hash function to achieve user incentives, while protecting their identity. We also show extensive analysis of the proposed scheme to demonstrate that it can meet the security and performance the requirement of a participatory sensing application.

현장실험을 통한 낙석방지울타리 설계기준 제시 연구 (Study for the Proposal of Design Specifications for Rockfall Protection Fences by Full Scale Tests)

  • 박혁진;구호본;이경미;김규한
    • 한국지반공학회:학술대회논문집
    • /
    • 한국지반공학회 2000년도 사면안정 학술발표회
    • /
    • pp.139-151
    • /
    • 2000
  • Rockfall protection fence is one of the most common rockfall protection measures in Korea. The fences have been constructed in almost every hazardous cutslopes along national highway in Korea. However, the capability and performance of the fence as rockfall protection system are seldom known since no field test which can provide information on the response and the behavior of fence was carried out. This is the first full scaled rockfall test in Korea. The objectives of the test are to provide the information on the behavior and the capability of fence and to propose the design specifications for the fence. In this test, four different systems have been selected and tested. For each test, the rockfall impact energy was analyzed and the response and behavior of the system were investigated.

  • PDF

엔드포인트 개인정보보호를 위한 복합적 상황인지 방식 (A Collaborative Approach to Situational Awareness for Endpoint Personal Data Protection)

  • 용승림;김상오
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2018년도 제58차 하계학술대회논문집 26권2호
    • /
    • pp.173-174
    • /
    • 2018
  • EU의 GDPR(General Data Protection Regulation) 발효로 인해 유럽국가의 개인 정보 데이터를 활용하는 다국적 기업들이 규정에 맞는 데이터 보호정책을 수립하고 보안 투자를 강화하고 있다. 그러나 대다수의 기업들은 해커 등에 의한 사이버 보안을 위해서는 천문학적인 투자를 하고 있지만 기업 내 많은 직원들에 의한 실수나 고의에 의한 개인 정보 유출 방지에 대해서는 대처를 하고 있지 않다. 본 논문에서는 디지털 포렌식 기반의 앤드 포인트 실시간 모니터링 및 인간 행위 분석을 통한 앤드 포인트 개인 정보 보호 기능을 제공하여 기존의 사이버 보안에 국한된 통합 보안 관제의 효율성을 높이는 방안을 제안한다.

  • PDF

사이버 방호기능 분석을 통한 지휘통제에 관한 연구 (A Study on Command and Control Through Cyber Protection Function Analysis)

  • 최세호;오행록;윤주범
    • 한국군사과학기술학회지
    • /
    • 제24권5호
    • /
    • pp.537-544
    • /
    • 2021
  • Cyber threats can bypass existing cyber-protection systems and are rapidly developing by exploiting new technologies such as artificial intelligence. In order to respond to such cyber threats, it is important to improve the ability to detect unknown cyber threats by correlating heterogeneous cyber protection systems. In this paper, to enhance cyber-attack response capabilities, we proposed command and control that enables rapid decision-making and response before the attack objectives are achieved, using Lockheed Martin's cyber kill chain and MITRE ATT&CK to analyze the purpose and intention of the attacker.

공격 트리를 이용한 다양성보호계통 사이버보안 위험 평가 (Cybersecurity Risk Assessment of a Diverse Protection System Using Attack Trees)

  • 정성민;김태경
    • 디지털산업정보학회논문지
    • /
    • 제19권3호
    • /
    • pp.25-38
    • /
    • 2023
  • Instrumentation and control systems measure and control various variables of nuclear facilities to operate nuclear power plants safely. A diverse protection system, a representative instrumentation and control system, generates a reactor trip and turbine trip signal by high pressure in a pressurizer and containment to satisfy the design requirements 10CFR50.62. Also, it generates an auxiliary feedwater actuation signal by low water levels in steam generators. Cybersecurity has become more critical as digital technology is gradually applied to solve problems such as performance degradation due to aging of analog equipment, increased maintenance costs, and product discontinuation. This paper analyzed possible cybersecurity threat scenarios in the diverse protection system using attack trees. Based on the analyzed cybersecurity threat scenario, we calculated the probability of attack occurrence and confirmed the cybersecurity risk in connection with the asset value.