• 제목/요약/키워드: Security Review

검색결과 2,470건 처리시간 0.028초

안전한 전자금융거래를 위한 보안등급 기준마련 및 사례연구 (Establishing Security Level Standards and Case Studies for Safe Electronic Financial Transactions)

  • 장길영;김인석
    • 정보보호학회논문지
    • /
    • 제28권3호
    • /
    • pp.729-741
    • /
    • 2018
  • 2015년 6월 24일 금융위원회에서는 보안성심의를 전면 폐지하고, 자체 보안성심의로 보안 수준 점검 의무를 갈음한다고 하였다. 금융기관의 보안담당자는 안전한 전자금융거래를 위해 보안성 검토를 할 경우에 CIA 보안등급을 기반으로 보안성심의를 수행하고 있다. 그러나 최근 인터넷,모바일 전자금융거래의 보안성 검토는 좀 더 깊이가 필요한 경우, 별도의 프로세스를 점검하거나 신기술, 보안 관련 자료를 참고하여 보안성심의를 수행하고 있다. 본 논문은 CIA 기반의 보안등급에 인증과 개인정보보호 지표를 추가한 CIAAP 보안등급을 제안하며 특히, 전자금융거래의 보안성 검토를 진행할 때 본 CIAAP 보안등급을 참고하여 개인정보보호 영역의 검토가 누락되지 않고, 강화된 인증 관련 지표의 추가를 통한 보안성 검토가 필요함을 제안한다.

Identifying Strategies to Address Human Cybersecurity Behavior: A Review Study

  • Hakami, Mazen;Alshaikh, Moneer
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.299-309
    • /
    • 2022
  • Human factor represents a very challenging issue to organizations. Human factor is responsible for many cybersecurity incidents by noncompliance with the organization security policies. In this paper we conduct a comprehensive review of the literature to identify strategies to address human factor. Security awareness, training and education program is the main strategy to address human factor. Scholars have consistently argued that importance of security awareness to prevent incidents from human behavior.

A Systematic Review on Human Factors in Cybersecurity

  • Alghamdi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.282-290
    • /
    • 2022
  • A huge budget is spent on technological solutions to protect Information Systems from cyberattacks by organizations. However, it is not enough to invest alone in technology-based protection and to keep humans out of the cyber loop. Humans are considered the weakest link in cybersecurity chain and most of the time unaware that their actions and behaviors have consequences in cyber space. Therefore, humans' aspects cannot be neglected in cyber security field. In this work we carry out a systematic literature review to identify human factors in cybersecurity. A total of 27 papers were selected to be included in the review, which focuses on the human factors in cyber security. The results show that in total of 14 identified human factors, risk perception, lack of awareness, IT skills and gender are considered critical for organization as for as cyber security is concern. Our results presented a further step in understanding human factors that may cause issues for organizations in cyber space and focusing on the need of a customized and inclusive training and awareness programs.

Generative Adversarial Networks: A Literature Review

  • Cheng, Jieren;Yang, Yue;Tang, Xiangyan;Xiong, Naixue;Zhang, Yuan;Lei, Feifei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권12호
    • /
    • pp.4625-4647
    • /
    • 2020
  • The Generative Adversarial Networks, as one of the most creative deep learning models in recent years, has achieved great success in computer vision and natural language processing. It uses the game theory to generate the best sample in generator and discriminator. Recently, many deep learning models have been applied to the security field. Along with the idea of "generative" and "adversarial", researchers are trying to apply Generative Adversarial Networks to the security field. This paper presents the development of Generative Adversarial Networks. We review traditional generation models and typical Generative Adversarial Networks models, analyze the application of their models in natural language processing and computer vision. To emphasize that Generative Adversarial Networks models are feasible to be used in security, we separately review the contributions that their defenses in information security, cyber security and artificial intelligence security. Finally, drawing on the reviewed literature, we provide a broader outlook of this research direction.

공급 사슬 보안에 관한 국내외 문헌 조사 연구 (A literature review of Korean and International research on the supply chain security)

  • 양병학
    • 대한안전경영과학회지
    • /
    • 제13권3호
    • /
    • pp.87-96
    • /
    • 2011
  • This research is a literature survey on the Supply chain security. International organization and governments have build security regulations to improve the security in the shipment through supply chain. The researches on supply chain security were increasing during last 10 years. We were surveyed 53 research including Korean and international papers. ills study was classified by research subjects, security regulation, and research methods. Korean researches were focused to introducing and reviewing on the security regulation, but the researches on specific security reinforcement were very rare. International researches were concerned with the subject of the airport security scanning problem, transportation security problem, port selection problem.

해상 및 항공물류보안의 법규 및 정책에 관한 연구 (A study on the rules and policy of the maritime and aviation supply chain security)

  • 최병권
    • 무역상무연구
    • /
    • 제42권
    • /
    • pp.247-274
    • /
    • 2009
  • The supply chain security programs are designed to prevent terrorist attacks on world transit system, and to help protect the passengers and workers who use these systems on a daily basis. as evidenced by the train bombings in London and Madrid in recent years, the threats to America's transit systems are real. After 9 11 terrors in 2001, security problem is appearing to every nations and international organizations main pending issue than any problem and various countermeasure is prepared. Security is the major issue in international trade, with significant potential costs and economic impact. So, We need to ensure that supply chain security does not become a new non-tariffs barrier. The aim of this study is to examine the international maritime and aviation law on the supply chain security. Also I review the supply chain security in U.S. and other countries.

  • PDF

항공위협의 역사적 고찰과 항공보안 관리 연구 (Historical Review on Aviation Threats and Management of Aviation Security)

  • 안재형;강자영
    • 한국항공운항학회지
    • /
    • 제12권2호
    • /
    • pp.29-42
    • /
    • 2004
  • This paper performs a historical review on aviation threats through a statistical survey. The impact factor, as a criterion to measure the seriousness of the threats occurred, is introduced and evaluated based on annual totals of hijacking and fatalities against aircraft 1948 through 2004. Also, the paper suggests processes of evaluating the level of threats and key functions for an effective management of the aviation security.

  • PDF

한-EU 해상운송보안 제도 대응전략 비교연구 (South Korea and EU Practices for Maritime Transport and Port Security: A comparative Study on Attitude to respond)

  • 김시현;신건훈
    • 무역상무연구
    • /
    • 제68권
    • /
    • pp.23-42
    • /
    • 2015
  • According to the increasing attention to safety and security in maritime shipping, there are diverse security systems in international logistics activities. Although prior studies on maritime transport and port security reviewed security policy and practices in order to provide useful insights for strategic agenda, a few focused on attitude to respond it. Moreover, there are no prior study on a comparative study between continents. To tackle this, this paper compared confrontation attitude to maritime transport and port security between South Korea and European Union. Results identified that maritime shipping security incorporates container cargo security management, logistics security management, logistics security certificate system, and environmental impacts management caused by maritime shipping. Further, the comparison between two countries suggests that South Korea need to take more positive attitude to respond, such as investment in equipment and technologies for maritime shipping security, construction of comprehensive management system, political supports for logistics security, and training and education for safety and security. The results provide useful insights for strategic review of security systems in South Korea, and to help strategic agenda for future improvement.

  • PDF