DOI QR코드

DOI QR Code

Consideration of New Convergence Security Threats and Countermeasures in the Zero-Contact Era

비대면 시대의 신 융합보안 위협과 대응 방안에 대한 고찰

  • Yu, Dong-Hyun (R.O.K Army, Security Management Engineering, Graduate School, MyongJi University) ;
  • Kim, Yong-Uk (R.O.K Army, Security Management Engineering, Graduate School, MyongJi University) ;
  • Ha, Young-Jae (R.O.K Army, Security Management Engineering, Graduate School, MyongJi University) ;
  • Ryu, Yeon-Seung (Department of Security Management Engineering, MyongJi University)
  • 유동현 (명지대학교 보안경영공학과/육군) ;
  • 김용욱 (명지대학교 보안경영공학과/육군) ;
  • 하영재 (명지대학교 보안경영공학과/육군) ;
  • 류연승 (명지대학교 보안경영공학과)
  • Received : 2020.10.12
  • Accepted : 2021.01.20
  • Published : 2021.01.28

Abstract

Recently, new types of security crimes have been steadily occurring in Korea due to environmental changes such as the development of IT technology, and responding to these threats has become a key national task for the establishment of a safe society as well as individuals and businesses. Meanwhile, as the Zero-Contact Era has arrived since the COVID-19 Pandemics, a new convergence security threat that combines the characteristics of the Zero-Contact Era with the existing IT development is threatening our society. Research to prevent and correct these new levels of threats is continuously required in this study. Chapter 1 examined the causes of new convergence security threats and Chapter 2 discussed cybersecurity, fake news, remote voting·work and video security threats as five major threats.

최근 우리나라는 IT기술 발전 등의 환경 변화에 따라 새로운 유형의 보안 범죄가 꾸준히 발생하고 있으며, 이러한 위협에 대한 대응은 개인이나 기업뿐만 아니라 안전한 사회의 구축을 위해 국가 차원에서 수행되어야 할 핵심과제가 되었다. 한편 코로나19 팬데믹 이후 비대면 시대가 도래하면서 기존 IT발전에 따른 보안 위협과 비대면 시대의 특징이 결합된 신종 융합보안 위협이 우리 사회를 위협하고 있다. 이에 이러한 새로운 차원의 위협을 예방하고 교정하기 위한 연구가 지속 요구되고 있으며, 이를 위해 본 연구에서는 1장에서 신 융합보안 위협이 발생한 원인과 관련 선행연구를 살펴보고 2장에서는 비대면 시대에 주요 융합보안 위협 5가지로 사이버보안·가짜뉴스·원격투표·원격근무 및 영상보안 위협을 선정하여 유형별 특징에 대해 설명하였으며. 3장에서는 이에 대한 대응 방안의 논의와 정책적 함의를 고찰하였고, 4장에서는 결론과 함께 향후 연구방향을 제시하였다.

Keywords

References

  1. J. W. Seok & I. S. Oh. (2020). Political and Social Changes and Risk Management Since Corona19. Korean Security Journal, (64), 117-136. DOI: 10.36623/kssr.2020.64.5
  2. D. H. Lee & H. A. Kim. (2020). A Study on Security through Case Analysis of Corona19 Related Cyber Attacks. Korean Society of Information and Communication, 24(1), 548-550.
  3. H. G. Oh. (2020). Analysis of major social changes and information security issues after COVID-19. Communications of the Korean Institute of Information Scientists and Engineer, 38(9), 48-56.
  4. D. W. Kim & K. B. Lee. (2019). A Study on the Classifying the Type of Social Engineering Attacks, Korean Journal of Industrial Security, 9(2), 9-21. DOI: 10.33388/kais.2019.9.2.009
  5. M. S. Jung & H. B. Jang. (2020). The Case Study of Technology Leakage in Cyber-Physical Space, Korean Journal of Industrial Security, 10(2), 151-179. DOI: 10.33388/kais.2020.10.2.151
  6. H. J. Lim. (2020) The Impact of COVID-19 on Crime -Focused on 112 Report Data, Korean Security Journal, (Special), 233-254. DOI: 10.36623/kssr.2020.pandemic.233
  7. B. K. Koo. (2019. 10. 3). Deepfake detection technology, will you become a fake news troubleshooter?, The Hankyoreh, Retrieved from http://www.hani.co.kr/arti/science/future/911878.html
  8. T. H. Kim. (2020. 11. 19.). "850 new confirmed cases?"... Ask the police to investigate Fake News. Segye news. Retrieved from https://www.segye.com/newsView/20201119509842
  9. Korea Internet Security Agency. (2020. 6. 24). Security Guide for Introduction and Operation of Zero-Contact Work Environment[Guide and Manual]. Retrieved from https://www.boho.or.kr/data/guideView.do?bulletin_writing_sequence=35467
  10. H. J. Son. (2020. 11. 12). No saving of thermal imaging camera pictures..." Violation of regulations? I don't know." YTN. Retrieved from https://www.ytn.co.kr/_ln/0103_202011120543155750
  11. S. K. Bae. (2020) A Study on Criminal Regulations against Deepfake porn, Law Research Institute Center for International Area Studies Hankuk University of Foreign Studies, 43(3), 169-187. DOI: 10.17257/hufslr.2019.43.3.169
  12. J. Y. Jung & Y. H. Kim. (2020) South Korean Cyber Security Threats, Governance Measures, and Implications for SMEs, Korean Journal of Industrial Security, 10(1), 81-109. DOI: 10.33388/kais.2020.10.1.081
  13. N. R. Jang. (2018. 10. 2). How do foreign countries respond to fake news with hate speech?. The Hankyoreh,. Retrieved from http://www.hani.co.kr/arti/society/society_general/864204.html
  14. Smartgrid. (2020. 4. 14) 'How long will the stamp vote last? Will block-chain voting be the solution?[Online Blog]. Retrieved from https://bloodkorea.com/bl_news/1001769
  15. M. S. Kim. & B. R. Kang. (2015) Generalization of Zero-Knowledge Proof of Polynomial Equality, The Journal of the KICS, 40(5), 833-840. DOI: 10.7840/kics.2015.40.5.833