• Title/Summary/Keyword: security activity

Search Result 598, Processing Time 0.026 seconds

Information and Communication Technologies in the Main Types of Legal Activities

  • Kornev, Arkadiy;Lipen, Sergey;Zenin, Sergey;Tanimov, Oleg;Glazunov, Oleg
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.177-183
    • /
    • 2022
  • Thanks to the informatization of society, complex and high-tech devices are being introduced in all areas of human life, and the latest technologies are being actively improved in the modern, globalizing world. The article deals with the issues of using information and communication technologies in legal activities. It also covers the main types of such activities: law-making, law enforcement, and interpretive activity. Since there is an increase in the flow and accumulation of legal information, it is practically impossible to use traditional methods of working with legal information. The article considers and analyzes the role of information and communication technologies in modern legal activity. It is necessary to reveal the principles, concepts, conditions, and factors of their development and develop theoretical and practical recommendations for the use of such technologies in order to solve legal tasks. The authors of the article raise the issues of increasing the efficiency of legal activity, as well as the integration of information technologies into practical legal activity and their use for collecting, storing, searching, and issuing legal and reference information. Much attention is paid to the specific use of automated data banks and information retrieval systems in legal practice that ensure the accumulation, systematization, and effective search for legally important information. The development of such technologies leads to the creation of comfortable conditions for a lawyer in the course of their professional activity. Currently, legal activity cannot exist without telecommunication technologies, legal reference systems, and electronic programs. The authors believe that due to the use of the latest information technologies, the time for making legal decisions has significantly accelerated, the process of searching and systematizing evidence has been worked out, and it has become possible to quickly and efficiently find information on adopted laws and legal acts.

Convergence Performance Evaluation Model for Intrusion Protection System based on CC and ISO Standard (CC와 ISO 표준에 따른 침입방지시스템의 융합 성능평가 모델)

  • Lee, Ha-Yong;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.251-257
    • /
    • 2015
  • Intrusion protection system is a security system that stop abnormal traffics through automatic activity by finding out attack signatures in network. Unlike firewall or intrusion detection system that defends passively, it is a solution that stop the intrusion before intrusion warning. The security performance of intrusion protection system is influenced by security auditability, user data protection, security athentication, etc., and performance is influenced by detection time, throughput, attack prevention performance, etc. In this paper, we constructed a convergence performance evaluation model about software product evaluation to construct the model for security performance evaluation of intrusion protection system based on CC(Common Criteria : ISO/IEC 15408) and ISO international standard about software product evaluation.

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.

Differences in Perception of Information Security Knowledge and Skills Between Academia and Industry (정보보호 전문인력의 소요 지식 및 기술에 대한 산업체와 교육기관의 관점 비교)

  • Yoo, Hye-Won;Kim, Tae-Sung
    • Information Systems Review
    • /
    • v.11 no.2
    • /
    • pp.113-129
    • /
    • 2009
  • With increasing interest in information security, many studies have been conducted on cultivation and management of information security manpower. The widespread application of information security made the activity of information security professionals more diverse. Therefore, it is essential to analyze the knowledge and skills that are necessary for information security professionals to carry out their job and we also need to take these into considerations for the development and operation of education programs. In this study, for analyzing the perception gaps of information security knowledge and skills level between academia and industry, we have derived 58 knowledge and skills by conducting the literature review and Delphi method and we also conducted a survey of information security knowledge and skills requirements for information security professionals who are now working in industries and educational organizations. As a result, we analyze the perception gaps between two groups of information security professionals and suggest some guidelines for establishing the demand-based curriculum for training information security professionals.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

The effects of low-protein diets and protease supplementation on broiler chickens in a hot and humid tropical environment

  • Law, Fang Lin;Zulkifli, Idrus;Soleimani, Abdoreza Farjam;Liang, Juan Boo;Awad, Elmutaz Atta
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.31 no.8
    • /
    • pp.1291-1300
    • /
    • 2018
  • Objective: This experiment was conducted to investigate the effects of dietary crude protein (CP) level and exogenous protease supplementation on growth performance, serum metabolites, carcass traits, small intestinal morphology and endogenous protease activity in broiler chickens reared under a tropical climate. Methods: A total of 480 day-old male broiler chicks were randomly assigned to eight dietary treatments in a $4{\times}2$ factorial arrangement. The main effects were CP level (21.0%, 19.7%, 18.5%, or 17.2% from 1 to 21 days and 19.0%, 17.9%, 16.7%, or 15.6% from 22 to 35 days) and protease enzyme supplementation (0 ppm or 500 ppm). All experimental diets were fortified with synthetic feed-grade lysine, methionine, threonine and tryptophan to provide the minimum amino acid recommended levels for Cobb 500. Results: Reducing dietary CP linearly reduced (p<0.05) growth performance, serum albumin, total protein, and carcass traits and increased (p<0.05) serum triglycerides and abdominal fat. There was no consistent effect of reducing dietary CP on morphological parameters of the intestine and on the pancreatic and intestinal endogenous protease activity (p>0.05). Protease supplementation improved (p<0.05) feed conversion ratio, body weight gain, carcass yield and intestinal absorptive surface area. Conclusion: Protease supplementation, as measured by growth performance, intestinal morphology and carcass yield, may alleviate the detrimental effects of low protein diets in broiler chickens.

A System for Supporting The Cyber Security Control of I&C System (제어계측 시스템 환경에서의 사이버 보안 통제 지원 시스템)

  • Jung, Hyun-Mi;Kim, Seok-Hun;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.442-448
    • /
    • 2013
  • I&C (Instrumentation & Control) system is different from information system and the security design of the two systems are also different. The modeling activity is needed based on the security control guide in order to build I&C system security control. In this paper, the role and by the security control, we designed the relationship (that is, the relation schema) between the documents for 'The system for supporting the cyber security control of I&C system design' based on the security control guide. The designed schema plans 'The system for supporting the cyber security control of I&C system' for observing the security control guide, and is used as the database and content that supports its design and implementation. The process and system of the proposed schema is utilized and designed. The design of the schema and system is intensified in the design phase with the proposed mode and supporting the I&C system cyber security design.

THE SITUATION AND DEVELOPMENT OF SECURITY GUARD WORKS ON OUR COUNTRY (우리나라 경호업의 현황 및 발전방안)

  • Park, Ju-Hyeon
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.123-134
    • /
    • 1997
  • Our conuntry have come out to the phenomenon to the atrocity crimes, make into a intellecture crims and specialization with them due to various change to the expension of economy growth, drift of population to cities and sense of value is plunged in confution, Now that things have come to this day, since foundation of the security guard law it first begin, ten years, civilian securities guard law was include to the civil service securities law due to amendment fo the civility secuties law newly on Dec. 30, 1995. According to the amendment, the part of the public peace of peoples livelihood were slough of the visual angle in knowledge which function of the civilies security were only be in under the government dimension were put in order to be tointly according to the such state of affairs, should found the consider a counterplan fundamentally regarding to the what to doing efforts foster the civilities securitylaw and qualitalive elevation of presidential guards. To make a long story short by few words, the question resolves itself into the following five points. The first, peoples arrengements for the attitude fo public duty service with devotedly Sustaining publicity work activities for the thire divert of the understanding of civilian security guard. The secondly, Existing security traders and security association should to support to the civilian security works. The third, The government office concerned should strengthen the licensing system in order to improve the quality of existings in order to may establishment newly systems of license and technical institute of regarding to them. The fourth, Should be newly organixed the exclusive organization of personal protective works in the police buroau for the sustaining development of civirity guard works and soundness of the upbringing. The fifth, It is necessary to found the reserch institute for the study on oretical, scholarly, study for the technical reserch and enlargement of effeciveness And try to find a solution to the Universitys function and duty, activity plan, support plan to the Department of security specialist for the come forward in succession it under the national assistance. The finally, I am sure that the Korean security association could be transiormed into the organization which reliable and receive a love from the peoples when doing best utmost to do pursuit of the structure to be a securitys legalism, specialization and total security systems.

  • PDF

A Study on the Effectiveness of Secure Responses to Malicious E-mail (악성 이메일에 대한 안전한 대응의 효과성 연구)

  • Lee, Taewoo;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.2
    • /
    • pp.26-37
    • /
    • 2021
  • E-mail is one of the important tools for communicating with people in everyday life. With COVID-19 (Coronavirus) increasing non-face-to-face activity, security incidents through e-mail such as spam, phishing, and ransomware are increasing. E-mail security incidents are increasing as social engineering attack using human psychology rather than arising from technological weaknesses that e-mails have. Security incidents using human psychology can be prevented and defended by improving security awareness. This study empirically studies the analysis of changes in response to malicious e-mail due to improved security awareness through malicious e-mail simulations on executives and employees of domestic and foreign company. In this study, the factors of security training, top-down security management, and security issue sharing are found to be effective in safely responding to malicious e-mail. This study presents a new study by conducting empirical analysis of theoretical research on security awareness in relation to malicious e-mail responses, and results obtained from simulations in a practical setting may help security work.

The Economic Security System in the Conditions of the Powers Transformation

  • Arefieva, Olena;Tulchynska, Svitlana;Popelo, Olha;Arefiev, Serhii;Tkachenko, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.35-42
    • /
    • 2021
  • In the article, the authors investigate the economic security system in the conditions of the powers transformation. It is substantiated that economic security acts as a certain system that includes components and at the same time acts as a subsystem of the highest order. It is determined that the economic security system of regions acting as a system has its subsystems, which include: production, financial, environmental, innovation, investment and social subsystems. The parameters of the economic security system include relative economic independence, economic stability and self-development of economic systems, and it is proved that an important feature of economic security in addition to its systemic nature is multi-vector. It is substantiated that the monitoring of ensuring the economic security system of the development of economic systems of different levels in the conditions of the powers transformation should contain the analysis of social, economic and ecological development of regions; spheres of possible dangers of the development of regional economic systems; the nature of the threats; the degree of the possibility of threats; time perspective of economic development threats; possible consequences of losses for economic entities; the impact of threats to the object of the economic entities' activity; possible asymmetry of economic development of regional economic entities. Possible threats as a consequence of the powers transformation have been identified. A PEST analysis of the impact of factors of different nature on economic security and the development of regional economic systems in the powers transformation is carried out. A recurrent ratio is proposed for the economic security system in the conditions of the powers transformation.