• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.033 seconds

Comparison of key management systems across different industries (다양한 산업에서의 키 관리 시스템 비교 분석)

  • Woojoo Kwon;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.3
    • /
    • pp.55-61
    • /
    • 2024
  • As the digital environment becomes more complex and cyber attacks become more sophisticated, the importance of data protection is emerging. As various security threats such as data leakage, system intrusion, and authentication bypass increase, secure key management is emerging. Key Management System (KMS) manages the entire encryption key life cycle procedure and is used in various industries. There is a need for a key management system that considers requirements suitable for the environment of various industries including public and finance. The purpose of this paper is to derive the characteristics of the key management system for each industry by comparing and analyzing key management systems used in representative industries. As for the research method, information was collected through literature and technical document analysis and case analysis, and comparative analysis was conducted by industry sector. The results of this paper will be able to provide a practical guide when introducing or developing a key management system suitable for the industrial environment. The limitations are that the analyzed industrial field was insufficient and experimental verification was insufficient. Therefore, in future studies, we intend to conduct specific performance tests through experiments, including key management systems in various fields.

  • PDF

The Intention of Repurchase on e-Service Quality by Online Travel Agency Site (온라인 여행사 사이트 e-서비스품질이 지각된 가치, 만족도, 재구매의도에 미치는 영향)

  • Niu, Ling-Xiao;Lee, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.7
    • /
    • pp.61-70
    • /
    • 2018
  • Purpose - The purpose of this research is reflected on the rapid development of online tourism industries. The study was to establish the strategy for Korean tourism enterprises to develop tourist commodities suitable for Chinese tourists and attract them to visit Korea by the empirical analysis of the relation between repurchase intention of tourists and its premise variables (e-service quality, perceived value and satisfaction). Research design, data, and methodology - This research carried out a questionnaire survey on Chinese tourists who visited Korea with experience of using the online travel agency web sites. A total 398 answers were recovered, 41 of them were excluded due to the dishonest answers and 357 of them were finally analyzed. The data was analyzed with IBM SPSS AMOS 22.0. Results - The research results show that in the online travel agency web site e-service quality, convenience, interactivity, information validity, credibility had a positive impacts on perceived value and satisfaction. The perceived value of online travel agency website users has positive impart on satisfaction and repurchase intention. Satisfaction of online travel agency web site users have positive impacts on repurchase intention. But safety has no impact on perceived value while positive impacts on satisfaction was affected. Conclusions - First, in the online travel agency web site e-service quality, safety has no impact on perceived value while it was shown to have positive impacts on satisfaction because the users of online travel agency web sites believe that the protection of personal information, the defense of cracker and the safeguard of payment security are the basic premises of website operation. Although safety does not have impacts on perceived value, users benefits will suffer damage when hacker intrusion and other accidents occur so that online travel agency web sites should not ignore the security concerns. Second, credibility is a major concern for online travel agency web site users. At this time, it is necessary for the web site to establish a system to display both the commodity information and the using experience published on the user's SNS, thus improving the credibility of the website information.

A Study on the Traffic Patterns of Dangerous Goods Carriers in Busan North and Gamcheon Port (부산 북항·감천항의 위험화물운반선 통항패턴에 관한 연구)

  • Kim, Jong-Kwan;Kim, Se-Won;Lee, Yun-Sok
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.1
    • /
    • pp.9-16
    • /
    • 2017
  • As a preliminary study of enter or leaving traffic patterns of the Korea main port, port Management Information System (Port-MIS) data was used to check the volume of vessels entering and leaving the port of Busan, and three consecutive days from each seasons were selected for study. Selected 12-day General Information Center on Maritime Safety & Security (GICOMS) data was also used to analyze the traffic pattern in the main traffic lane of Busan port for dangerous goods carrier. Also, the distance between dangerous goods carriers and Oryukdo breakwater of east breakwater in the main traffic lane was analyzed. Collision probability was estimated using the cumulative probability distribution function of the normal distribution for the maritime traffic safety audit scheme based on the assumption that a ship's trajectory has a normal distribution for a section of the route. However, in case of entry or leaving thorough the Oryukdo breakwater and entry thorough the east breakwater, ship's sailing trajectories were revealed not to follow a normal distribution via regularity testing using a KS-test and SW-test. Especially in the north port, the tendency of the right side of the ship to pass was remarkable. It is desirable to develop a traffic model suitable for the characteristics of the port rather than to apply general traffic theories, and to apply this model to a maritime traffic safety diagnosis, so further research is needed.

Implementation of a Network Simulator for Cyber Attacks and Detections based on SSFNet (SSFNet 기반 사이버 공격 및 탐지를 위한 네트워크 시뮬레이터의 구현)

  • Shim, Jae-Hong;Jung, Hong-Ki;Lee, Cheol-Won;Choi, Kyung-Hee;Park, Seung-Kyu;Jung, Gi-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.457-467
    • /
    • 2002
  • In order to simulate cyber attacks and predict network behavior by attacks, we should represent attributes of network components in the simulation model, and should express characteristics of systems that carry out various cyber attacks and defend from these attacks. To simulate how network load may change under the cyber attacks, we extended SSF[9, 10] that is process-based event-oriented simulation system. We added a firewall class and a packet manipulator into the SSFNet that is a component of SSF. The firewall class, which is related to the security, is to simulate cyber attacks, and the packet manipulator is a set of functions to write attack programs for the simulation. The extended SSFNet enables to simulate a network with the security systems and provides advantages that make easy to port already exsiting attack programs and apply them to the simulation evironment. We made a vitual network model to verify operations of the added classes, and simulated a smurf attack that is a representative denial of sevive attack, and observed the network behavior under the smurf attack. The results showed that the firewall class and packet manipulator developed in this paper worked normaly.

Study on Police-led National Response against CBRN Terror by Strengthening the Standing Cooperation System of the Interagencies (다부처 상설 협력체계 구축을 통한 경찰주도 국가 화생방 테러대응 발전방안)

  • Cha, Jang-Hyeon;Kang, Taeho;Kim, Daesoo;Lee, Hochan
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.217-242
    • /
    • 2019
  • Nowadays, Terrorism has become bloodier. Unlike the past, the recent terrorism has been indiscriminate in the purpose of mass- killing. Given this aspect, the threat of a CBRN attack is the biggest one to modern society. Notably, the possibility of terrorist attacks in Korea by international terrorist groups such as ISIL is higher than ever in consideration of its allusion; crusades and the devil's allied forces. To overcome these circumstances, various measures have been taken for counter terrorism at the state level including anti-terrorist legislation. Under the anti-terrorist act, police have to lead relevant inter agencies when it comes to the CBRN terror. At first glance, current countermeasures would work well. However, in order to respond quickly, the standing cooperations system of related departments need to be set up. In this sense, this article proposed a coagulatory body that could not only consider institutional-oriented organizational restructuring and response but also integrate and operate functions of various specialized institutions. It also stressed that the council should move toward a consultative body of information gathering, distribution and working- level consultation. With this cooperation system, counter-terrorism agencies can respond rapidly, stop wasting their effort and assets by about 30%. Also, they could design the atypical aspect of terrorism into standardized.

Dementia Patient Wandering Behavior and Anomaly Detection Technique through Biometric Authentication and Location-based in a Private Blockchain Environment (프라이빗 블록체인 환경에서 생체인증과 위치기반을 통한 치매환자 배회행동 및 이상징후 탐지 기법)

  • Han, Young-Ae;Kang, Hyeok;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.119-125
    • /
    • 2022
  • With the recent increase in dementia patients due to aging, measures to prevent their wandering behavior and disappearance are urgently needed. To solve this problem, various authentication methods and location detection techniques have been introduced, but the security problem of personal authentication and a system that can check indoor and outdoor overall was lacking. In order to solve this problem, various authentication methods and location detection techniques have been introduced, but it was difficult to find a system that can check the security problem of personal authentication and indoor/outdoor overall. In this study, we intend to propose a system that can identify personal authentication, basic health status, and overall location indoors and outdoors by using wristband-type wearable devices in a private blockchain environment. In this system, personal authentication uses ECG, which is difficult to forge and highly personally identifiable, Bluetooth beacon that is easy to use with low power, non-contact and automatic transmission and reception indoors, and DGPS that corrects the pseudorange error of GPS satellites outdoors. It is intended to detect wandering behavior and abnormal signs by locating the patient. Through this, it is intended to contribute to the prompt response and prevention of disappearance in case of wandering behavior and abnormal symptoms of dementia patients living at home or in nursing homes.

SIEM System Performance Enhancement Mechanism Using Active Model Improvement Feedback Technology (능동형 모델 개선 피드백 기술을 활용한 보안관제 시스템 성능 개선 방안)

  • Shin, Youn-Sup;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.896-905
    • /
    • 2021
  • In the field of SIEM(Security information and event management), many studies try to use a feedback system to solve lack of completeness of training data and false positives of new attack events that occur in the actual operation. However, the current feedback system requires too much human inputs to improve the running model and even so, those feedback from inexperienced analysts can affect the model performance negatively. Therefore, we propose "active model improving feedback technology" to solve the shortage of security analyst manpower, increasing false positive rates and degrading model performance. First, we cluster similar predicted events during the operation, calculate feedback priorities for those clusters and select and provide representative events from those highly prioritized clusters using XAI (eXplainable AI)-based event visualization. Once these events are feedbacked, we exclude less analogous events and then propagate the feedback throughout the clusters. Finally, these events are incrementally trained by an existing model. To verify the effectiveness of our proposal, we compared three distinct scenarios using PKDD2007 and CSIC2012. As a result, our proposal confirmed a 30% higher performance in all indicators compared to that of the model with no feedback and the current feedback system.

The Trend of Aviation Terrorism in the 4th Industrial Revolution Period and the Development Direction for Domestic Counter Terrorism of Aviation (제4차 산업혁명 시대의 항공 테러리즘 양상 및 국내 항공테러 대응체계 발전방향)

  • Hwang, Ho-Won;Kim, Seung-Woo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.155-188
    • /
    • 2017
  • On the one hand, the 4th Industrial Revolution provides a positive opportunity to build a new civilization paradigm for mankind. However, on the other hand, due to the 4th Industrial Revolution, artificial intelligence such as 'Goggle Alpha Go' revolutionized and even the human ability was replaced with a 'Silicon Chip' as the opportunity to communicate decreases, the existence of human beings is weakened. And there is a growing concern that the number of violent crimes, such as psychopath, which hunts humans as games, will increase. Moreover, recent international terrorism is being developed in a form similar to 'Psychopathic Violent-Crime' that indiscriminately attacks innocent people. So, the probability that terrorist organizations abuse the positive effects provided by the Fourth Industrial Revolution as means of terrorism is increasing. Therefore, the paradigm of aviation terrorism is expected to change in a way that attacks airport facilities and users rather than aircraft. Because airport facilities are crowded, and psychopathic terrorists are easily accessible. From this point of view, our counter terrorism system of aviation has many weak points in various aspects such as: (1) limitations of counter-terrorism center (2) inefficient on-site command and control system (3) separated organization for aviation security consultation (4) dispersed information collection function in government (5) vulnerable to cyber attack (6) lack of international cooperation network for aviation terrorism. Consequently, it is necessary to improve the domestic counter terrorism system of aviation so as to preemptively respond to the international terrorism. This study propose the following measures to improve the aviation security system by (1) create 'Aviation Special Judicial Police' (2) revise the anti-terrorism law and aviation security law (3) Strengthening the ability respond to terrorism in cyberspace (4) building an international cooperation network for aviation terrorism.

  • PDF

A Comparative Study of the Security Prevention Strategies on Arson: Focused on the Behavioral Characteristics between Serial Arsonists and Simple Arsonists (방화범죄의 경비예방 전략에 관한 비교연구 - 연쇄방화범과 단순방화범의 행위적 특성을 중심으로 -)

  • You, Wan-Seok;Hwang, Sung-Hyun
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.139-162
    • /
    • 2011
  • The purpose of this study is to compare with the general and behavioral characteristics between simple and serial arsonists using the data derived from Scientific Crime Analysis System, Criminal Filing Search System, and Crime Information Management System. The analysis and findings reported here are derived from data extracted from 160 arsonists arrested by police officer. The independent variables included such socio-economic characteristic as arsonists' gender, age, occupation, education level, and previous criminal records of arsonists, and finally the general characteristics of the scene of fire settings. The dependent variable is whether or not serial fire setter. To achieve the purpose, the analysis of frequencies and cross-tab were conducted. According to frequence and cross-tab analysis, there are great differences of the general and behavior characteristics between two groups. In the comparison of simple and serial arsonists, serial arsonists are more likely to have previous criminal records, low socio-economic status, unmarried and no cohabitants than simple arsonists. furthermore, serial arsonists are more likely to use garbage papers for fire setting in the scene of the crime, to have mental or psychological problems, and to get involved in fire setting for the psychological pleasure than simple arsonists do. The present research has some obvious limitations. First, the analysis is based only on arsonists arrested by police officers. These may be considerable differences in arsonists arrested by police officers and fire setters not arrested by them. Additional research is needed to assess the extent to which these findings would apply to fire setters not arrested by police officer in Korea. Secondly, the data in this study are cross-sectional and simple cross-tab analysis are used. Potential limitation of cross-sectional data concerns the inability to specify the changes in measures as arsonists behavioral characteristics. Therefore, further studies need to use longitudinal data and more complicate statistical techniques such as correlation analysis, multiple regression analysis, or LISREL models to specify the casual relationships between dependent and independent variables for fire settings. Even if this study has some limitations, it is meaningful in which it first investigated the comparison of simple and serial arsonists focusing on the general and behavioral characteristics between two groups in Korea.

  • PDF

Opportunities for Agricultural Water Management Interventions in the Krishna Western Delta - A case from Andhra Pradesh, India

  • Kumar, K. Nirmal Ravi
    • Agribusiness and Information Management
    • /
    • v.9 no.1
    • /
    • pp.7-17
    • /
    • 2017
  • Agricultural water management has gained enormous attention in the developing world to alleviate poverty, reduce hunger and conserve ecosystems in small-scale production systems of resource-poor farmers. The story of food security in the $21^{st}$ century in India is likely t o be closely linked to the story of water security. Today, the water resource is under severe threat. The past experiences in India in general and in Andhra Pradesh in particular, indicated inappropriate management of irrigation has led to severe problems like excessive water depletion, reduction in water quality, water logging, salinization, marked reduction in the annual discharge of some of the rivers, lowering of ground water tables due to pumping at unsustainable rates, intrusion of salt water in some coastal areas etc. Considering the importance of irrigation water resource efficiency, Krishna Western Delta (KWD) of Andhra Pradesh was purposively selected for this in depth study, as the farming community in this area are severely affected due to severe soil salinity and water logging problems and hence, adoption of different water saving crop production technologies deserve special mention. It is quite disappointing that, canals, tube wells and filter points and other wells could not contribute much to the irrigated area in KWD. Due to less contribution from these sources, the net area irrigated also showed declining growth at a rate of -6.15 per cent. Regarding paddy production, both SRI and semi-dry cultivation technologies involves less irrigation cost (Rs. 2475.21/ha and Rs. 3248.15/ha respectively) when compared to transplanted technology (Rs. 4321.58/ha). The share of irrigation cost in Total Operational Cost (TOC) was highest for transplanted technology of paddy (11.06%) followed by semi-dry technology (10.85%) and SRI technology (6.21%). The increased yield and declined cost of cultivation of paddy in SRI and semi-dry production technologies respectively were mainly responsible for the low cost of production of paddy in SRI (Rs. 495.22/qtl) and semi-dry (Rs. 532.81/qtl) technologies over transplanted technology (Rs. 574.93/qtl). This clearly indicates that, by less water usage, paddy returns can be boosted by adopting SRI and semi-dry production technologies. Both the system-level and field-level interventions should be addressed to solve the issues/problems of water management. The enabling environment, institutional roles and functions and management instruments are posing favourable picture for executing the water management interventions in the State of Andhra Pradesh in general and in KWD in particular. This facilitates the farming community to harvest good crop per unit of water resource used in the production programme. To achieve better results, the Farmers' Organizations, Water Users Associations, Department of Irrigation etc., will have to aim at improving productivity per unit of water drop used and this must be supported through system-wide enhancement of water delivery systems and decision support tools to assist farmers in optimizing the allocation of limited water among crops, selection of crops based on farming situations, and adoption of appropriate alternative crops in drought years.