• Title/Summary/Keyword: security enhance

Search Result 795, Processing Time 0.028 seconds

A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement

  • Park, Jun-Young;Huh, Eui-Nam
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.61-82
    • /
    • 2020
  • The security risk management used by some service providers is not appropriate for effective security enhancement. The reason is that the security risk management methods did not take into account the opinions of security experts, types of service, and security vulnerability-based risk assessment. Moreover, the security risk assessment method, which has a great influence on the risk treatment method in an information security risk assessment model, should be security risk assessment for fine-grained risk assessment, considering security vulnerability rather than security threat. Therefore, we proposed an improved information security risk management model and methods that consider vulnerability-based risk assessment and mitigation to enhance security controls considering limited security budget. Moreover, we can evaluate the security cost allocation strategies based on security vulnerability measurement that consider the security weight.

A Design of Access Control Method for Security Enhance based Smart Device (스마트 디바이스 기반의 보안성 강화를 위한 접근제어 기법 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Smart devices refer to various devices and control equipment such as health care devices, imaging devices, motor devices and wearable devices that use wireless network communication (e.g., Wi-fi, Bluetooth, LTE). Commercial services using such devices are found in a wide range of fields, including home networks, health care and medical services, entertainment and toys. Studies on smart devices have also been actively undertaken by academia and industry alike, as the penetration rate of smartphones grew and the technological progress made with the fourth industrial revolution bring about great convenience for users. While services offered through smart devices come with convenience, there is also various security threats that can lead to financial loss or even a loss of life in the case of terrorist attacks. As attacks that are committed through smart devices tend to pick up where attacks based on wireless internet left off, more research is needed on related security topics. As such, this paper seeks to design an access control method for reinforced security for smart devices. After registering and authenticating the smart device from the user's smart phone and service provider, a safe communication protocol is designed. Then to secure the integrity and confidentiality of the communication data, a management process such as for device renewal or cancellation is designed. Safety and security of the existing systems against attacks are also evaluated. In doing so, an improved efficiency by approximately 44% compared to the encryption processing speed of the existing system was verified.

Consideration of Cyber Security Vulnerability in Power IT (전력 IT Cyber Security 취약성 검토)

  • Kim, Hak-Man;Park, Jae-Se;Joung, Dong-Hyo
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.203-204
    • /
    • 2008
  • Power IT is very important infrastructure in the country. In general, Power IT is disclosed to cyber attacks. To enhance cyber security in Power IT area, first of all, vulnerability in the area should be defined. In this paper, we consider the cyber security vulnerability in Power IT and introduce the vulnerability. Also, we suggest the research areas for enhancing cyber security in Power IT.

  • PDF

A Study on the Marine Civil Guard Officer to Enhance the Quality of Maritime Security Services (해양경비 서비스 품질 개선을 위한 해양경비사 제도에 관한 연구)

  • Jin, Seong-Ryong;Lee, Eun-Bang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.19 no.1
    • /
    • pp.45-51
    • /
    • 2013
  • In order to facilitate the private maritime security system with high quality guard services, the status of private security companies and the security instructor system which has been operated in land side, are analyzed. Through screening the spectrums of private maritime security and analyzing the status of maritime security guard, the characteristics and expertise of maritime guard service, and it's system need are elicited. we propose the system of marine civil guard officer who will play a major role in private maritime security domain, and design the job requirements, the subjects of qualification test and the education program to enhance his professionalism and practicality. Moreover, the enactment of a provision on marine guard company in Marine guard law will be the platform to develop a private maritime security industry and to strengthen international competitiveness through supervising and piloting private guard service at sea by Korea coast guard.

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF

How to enhance the security and operation of Self Bag Drop systems (SBD(Self Bag Drop) Systems의 보안 및 운영 개선 방안에 대한 연구)

  • Kim, Ha-na;Kwon, Pilje;Lee, Kang-seok
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.26 no.3
    • /
    • pp.55-65
    • /
    • 2018
  • The SBD systems have made it possible that all boarding procedures are completed by passengers. With the SBD, air tickets can be issued and baggage can be consigned without the help of airline officers. This way, the SBD can improve the passenger circulation speed as well as decrease the time for passengers to wait for check-in, which is connected to the reduction of airlines' operaitonal costs. However, given that the SBD is a new technology, it has potentials to be used as a tool for air terrorism. This study purposes to determine methods to enhance the security and operation of SBD systems. With the aim, this paper investigated the existing literature on SBDs, self-check-in, airport security, air terrorism, risk management, aviation accidents, and information security. In order to compile real-time information about the SBD operations, twelve airports in North America, Europe, and Asia were analyzed based on existing studies on international SBD trends.

A New Model to Enhance Efficiency in Distributed Data Mining Using Mobile Agent

  • Bardab, Saeed Ngmaldin;Ahmed, Tarig Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.275-286
    • /
    • 2021
  • As a result of the vast amount of data that is geographically found in different locations. Distributed data mining (DDM) has taken a center stage in data mining. The use of mobile agents to enhance efficiency in DDM has gained the attention of industries, commerce and academia because it offers serious suggestions on how to solve inherent problems associated with DDM. In this paper, a novel DDM model has been proposed by using a mobile agent to enhance efficiency. The main idea behind the model is to use the Naive Bayes algorithm to give the mobile agent the ability to learn, compare, get and store the results on it from each server which has different datasets and we found that the accuracy increased roughly by 0.9% which is our main target.

Review Of Some Cryptographic Algorithms In Cloud Computing

  • Alharbi, Mawaddah Fouad;Aldosari, Fahd;Alharbi, Nawaf Fouad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.41-50
    • /
    • 2021
  • Cloud computing is one of the most expanding technologies nowadays; it offers many benefits that make it more cost-effective and more reliable in the business. This paper highlights the various benefits of cloud computing and discusses different cryptography algorithms being used to secure communications in cloud computing environments. Moreover, this thesis aims to propose some improvements to enhance the security and safety of cloud computing technologies.

A Study on the Enhancement of Maritime Security in Korea Maritime Jurisdiction

  • Lee Eun-Bang;Yun Jong-Hwui
    • Journal of Navigation and Port Research
    • /
    • v.29 no.7
    • /
    • pp.619-625
    • /
    • 2005
  • The security vulnerabilities in Korea maritime domain were mentioned and analysed with the static data of crimes relating to maritime security. The counterterrorism and initiatives to reduce the security risk and to minimize the damage are introduced and evaluated. The maritime security strategy and the near term initiatives to enhance the non-military security at Korean sea and ports are proposed in order to response maritime security threats economically, efficiently and safely.

Information Security and Organizational Performance: Empirical Study of Korean Securities Industry

  • Kong, Heekyung;Jung, Suhyun;Lee, Insung;Yeon, Seung-Jun
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.428-437
    • /
    • 2015
  • This study was conducted to analyze the effect of information security activities on organizational performance. With this in mind and with the aim of resolving transaction stability in the securities industry, using an organization's security activities as a tool for carrying out information security activities, the effect of security activities on organizational performance was analyzed. Under the assumption that the effectiveness of information security activities can be bolstered to enhance organizational performance, such effects were analyzed based on Herzberg's motivation theory, which is one of the motivation theories that may influence information protection activities. To measure the actual attributes of the theoretical model, an empirical survey of the securities industry was conducted. In this explorative study, the proposed model was verified using partial least squares as a structural equation model consisting of IT service, information security, information sharing, transaction stability, and organizational performance.