• Title/Summary/Keyword: 공격 기법

Search Result 2,008, Processing Time 0.023 seconds

A Trend Analysis of in the U.S. Cybersecurity Strategy and Implications for Korea (미국 사이버안보 전략의 경향 분석과 한국에의 함의)

  • Sunha Bae;Minkyung Song;Dong Hee Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.11-25
    • /
    • 2023
  • Since President Biden's inauguration, significant cyberattacks have occurred several times in the United States, and cybersecurity was emphasized as a national priority. The U.S. is advancing efforts to strengthen the cybersecurity both domestically and internationally, including with allies. In particular, the Biden administration announced the National Cybersecurity Strategy in March 2023. The National Cybersecurity Strategy is the top guideline of cybersecurity and is the foundation of other cybersecurity policies. And it includes public-privates as well as international policy directions, so it is expected to affect the international order. Meanwhile, In Korea, a new administration was launched in 2022, and the revision of the National Cybersecurity Strategy is necessary. In addition, cooperation between Korea and the U.S. has recently been strengthened, and cybersecurity is being treated as a key agenda in the cooperative relationship. In this paper, we examine the cyber security strategies of the Trump and Biden administration, and analyze how the strategies have changed, their characteristics and implications in qualitative and quantitative terms. And we derive the implications of these changes for Korea's cybersecurity policy.

Searching the Major Research Domains for Establishing the Korean Criminal Psychology (한국 범죄심리학의 학문적 정립을 위한 주요 연구영역의 탐색)

  • Si Up Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.11 no.2
    • /
    • pp.109-142
    • /
    • 2005
  • This study was conducted to suggest the research domains of Criminal Psychology, which is needed to improve the disciplinary identity of the Korean Criminal Psychology. Some major textbooks of Criminal Psychology, Forensic Psychology, Legal Psychology are written by korean and foreign psychologists. Major definitions and research domains of Criminal Psychology was compared and reviewed. For aggregating the criminal psychological researches were studied by korean psychologists, a total of 211 articles and papers, which was published by Korean Psychological Association, 5 Sub-psychological Associations, and Korean Law Psychological Association, were reviewed. Several the major research domains in Criminal Psychology was suggested as follows: General psychological theories, aggression·anger·morality, adolescent delinquency, mind and motivations of criminals, victims, investigation techniques, testimony, assessment·counseling·correction·rehabilitation of criminals, prediction and prevention of crime.

Identifying High Risk Group of Adolescent Status Delinquency and Factors Associated with the Group (청소년 지위비행의 위험군 탐색에 관한 연구)

  • Young Mi Park;Hye-Kyung Lee;Suyon Baek
    • Journal of the Korean Applied Science and Technology
    • /
    • v.39 no.6
    • /
    • pp.892-905
    • /
    • 2022
  • This study attempted to derive high-risk groups of adolescent status delinquency(ASD) and to identify related factors. This study was conducted with 1,979 adolescents enrolled in the first year of high school, data from the 7th year of the 4th grade panel of the Korean Children and Youth Panel Survey. Classification and regression tree analysis method was used. The ASD group was 264, which was 13.3% of the total. The high-risk group for ASD is that is male who has a low perception of positive parenting style. Positive parenting style was found to be the most important influencing factor in ASD, followed by gender, emotional problems, relationship with teacher, and achievement value. In order to prevent ASD, it is necessary to develop a parenting education program and an intervention program specialized for male adolescents. In addition, interventions that comprehensively deal with emotional problems such as depression and social withdrawal are required, going beyond the previous interventions that focused on aggression. In particular, it has been found that relationship with teachers is the most important influencing factor in the school environment. Through education on the causes and consequences of ASD and training on counseling techniques, the promotion of relationships with teachers will act as a protective factor to prevent ASD.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

Checksum Signals Identification in CAN Messages (CAN 통신 메시지 내의 Checksum Signal 식별 방법 연구)

  • Gyeongyeon Lee;Hyunghoon Kim;Dong Hoon Lee;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.747-761
    • /
    • 2024
  • Recently, modern vehicles have been controlled by Electronic Control Units (ECUs), by which the safety and convenience of drivers are highly improved. It is known that a luxury vehicle has more than 100 ECUs to electronically control its function. However, the modern vehicles are getting targeted by cyber attacks because of this computer-based automotive system. To address the cyber attacks, automotive manufacturers have been developing some methods for securing their vehicles, such as automotive Intrusion Detection System (IDS). This development is only allowed to the automotive manufacturers because they have databases for their in-vehicle network (i.e., DBC Format File) which are highly confidential. This confidentiality poses a significant challenge to external researchers who attempt to conduct automotive security researches. To handle this restricted information, in this paper, we propose a method to partially understand the DBC Format File by analyzing in-vehicle network traffics. Our method is designed to analyze Controller Area Network (CAN) traffics so that checksum signals are identified in CAN Frame Data Field. Also, our method creates a Lookup Set by which a checksum signal is correctly estimated for a given message. We validate our method with the publicly accessible dataset as well as one from a real vehicle.

Development of A Network loading model for Dynamic traffic Assignment (동적 통행배정모형을 위한 교통류 부하모형의 개발)

  • 임강원
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.3
    • /
    • pp.149-158
    • /
    • 2002
  • For the purpose of preciously describing real time traffic pattern in urban road network, dynamic network loading(DNL) models able to simulate traffic behavior are required. A number of different methods are available, including macroscopic, microscopic dynamic network models, as well as analytical model. Equivalency minimization problem and Variation inequality problem are the analytical models, which include explicit mathematical travel cost function for describing traffic behaviors on the network. While microscopic simulation models move vehicles according to behavioral car-following and cell-transmission. However, DNL models embedding such travel time function have some limitations ; analytical model has lacking of describing traffic characteristics such as relations between flow and speed, between speed and density Microscopic simulation models are the most detailed and realistic, but they are difficult to calibrate and may not be the most practical tools for large-scale networks. To cope with such problems, this paper develops a new DNL model appropriate for dynamic traffic assignment(DTA), The model is combined with vertical queue model representing vehicles as vertical queues at the end of links. In order to compare and to assess the model, we use a contrived example network. From the numerical results, we found that the DNL model presented in the paper were able to describe traffic characteristics with reasonable amount of computing time. The model also showed good relationship between travel time and traffic flow and expressed the feature of backward turn at near capacity.

Psychotherapy for Somatoform Disorder (신체형 장애의 정신치료)

  • Lee, Moo-Suk
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.4 no.2
    • /
    • pp.269-276
    • /
    • 1996
  • A theroretical study was made on the psychodynamism of somatoform disorder. Somatoform disorder is caused by a defense mechanism of somatization. Somatization is the tendency to react to stimuli(drives, defenses, and conflict between them) physically rather than psychically(Moore, 1990). Ford(1983) said it is a way of life, and Dunbar(1954) said it is the shift of psychic energy toward expression in somatic symptoms. As used by Max Shur(1955), somatization links symptom formation to the regression that may occur in response to acute and chronic conflict. In the neurotic individual psychic conflict often provokes regressive phenomena that may include somatic manifestations characteristic of an earlier developmental phase. Schur calls this resomatization. Pain is the most common example of a somatization reaction to conflict. The pain has an unconscious significance derived from childhood experiences. It is used to win love, to punish misdeeds, as well as a means to amend. Among all pains, chest pain has a special meaning. Generally speaking, 'I have pain in my chest' is about the same as 'I have pain in my mind'. The chest represent the mind, and the mind reminds us about the heart. So we have a high tendency to recognize mental pain as cardiac pain. Kellner(1990) said rage and hostility, especially repressed hostility, are important factors in somatization. In 'Psychoanalytic Observation on Cardiac Pain', psychoanalyst Bacon(1953) presented clinical cases of patients who complained of cardiac pain in a psychoanalytic session that spread from the left side of their chests down their left arms. The pain was from rage and fear which came after their desire to be loved was frustrated by the analyet. She said desires related to cardiac pain were dependency needs and aggressions. Empatic relationship and therapeutic alliances are indispensable to psychotherapy in somatoform disorder. The beginning of therapy is to discover a precipitating event from the time their symptoms have started and to help the patient understand a relation between the symptom and precipitating event. Its remedial process is to find and interpret a intrapsychic conflict shown through the symptoms of the patient. Three cases of somatoform disorder patients treated based on this therapeutic method were introduced. The firt patient, Mr. H, had been suffering from hysterical aphasia with repressed rage as ie psychodynamic cause. An interpretation related to the precipitating event was given by written communication, and he recovered from his aphasia after 3 days of the session. The second patient was a dentist in a cardiac neurosis with agitation and hypochondriasis, whose psychodynamism was caused by a fear that he might lose his father's love. His symptom was also interpreted in relation to the precipitating event. It showed the patient a child-within afraid of losing his father's love. His condition improved after getting a didactic interpretation which told him, to be master of himself, The third patient was a lady transferred from the deparment of internal medicine. She had a frequent and violent fit of chest pains, whose psychodynamic cause was separation anxiety and a rage due to the frustration of dependency needs. Her symptom vanished dramatically when she wore a holler EKG monitor and did not occur during monitoring. By this experience she found her symptom was a psychogenic one, and a therapeutic alliance was formed. later in reguar psychotherapy sessions, she was told the relaton between symptoms and precipitating events. Through this she understood that her separation anxiety was connected to the symptom and she became less terrifide when it occurred. Now she can travel abroad and take well part in social activities.

  • PDF

A Study on Responses of the Korean kidnapping Terror in overseas (한국인 해외인질납치테러 대응방안)

  • Jeong, Joon-Sik;Kim, Won-Ki
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.339-363
    • /
    • 2009
  • The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. No countries in the world have evaded being a target for terrorists today. As well as South Korea, the whole world must share attentions and responsibilities for fighting against the terrorism. Since the international terrorist groups have expanded their targets from Western countries to Koreans, civilian hostages are no longer other's affair; it became a serious threat to public. Increased Korean investment, trade, missionary, and travel overseas also expanded activity regions worldwide. It also result increased terrorist threats and possible abduction. The number of kidnapping crisis has increased since the terrorists use it as an effective method of sending a message. Piracy refers to a broad range of violent acts at sea, and has traditionally been regarded as common enemies. Piracy constitutes a great threat to the security of navigation as well as to the safety of vessels and crews. Lessons from hostage issues such as Korean hostage crisis in Somalia and Afghanistan show that it can cause criticism on moral issues if armed rescue missions fail or hostages are killed, so the governments and related corporations try to solve it by paying ransom. Terrorists and use these advantages in order to put a huge pressure on the governments. In this study we will look at essential characteristics and types of hostage abductions and recognition of national safety, lessons and solutions to previous Korean hostage cases in overseas. At the same time, it provides a guidelines of the direction in the fighting against terrorist groups and Piracy.

  • PDF