• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.025 seconds

A Study on the Effect of Mobile Social Network Game Characteristics in Service Recovery - Focused on Kakaotalk Platform Game (모바일 소셜 네트워크 게임 특성이 서비스 회복에 미치는 영향에 관한 연구 : 카카오톡 플랫폼 기반 게임을 중심으로)

  • Kang, Moon-Young;Chi, Yong-Shou;Han, Kyeong-Seok
    • Journal of Korea Game Society
    • /
    • v.15 no.1
    • /
    • pp.171-184
    • /
    • 2015
  • Looking at the existing game-related research, innumerable researches such as game acceptance, user satisfaction, continuance intention, wold-of-mouse intention have been carried out. However, there was no cases that applying the concept of service recovery in game researches. The purpose of this study is to evaluate the impact on the characteristic of the mobile social network game that based on domestic mobile social network game platform which focusing on KakaoTalk games on the service recovery. In addition, the study analyzed the characteristic factors of mobile social network game on the basis of Organizational Equity Theory and Innovation Diffusion Theory to identified the causal relationship between those factors and service recovery. As a result, except the independent variable-compatibility, all of the characteristics factors of mobile social network game showed direct or indirect effects on service recovery. The results of this study are expected as a reference for presenting a new business model, reducing risk factors and enriching the related research of the gaming industry.

Network based Anomaly Intrusion Detection using Bayesian Network Techniques (네트워크 서비스별 이상 탐지를 위한 베이지안 네트워크 기법의 정상 행위 프로파일링)

  • Cha ByungRae;Park KyoungWoo;Seo JaeHyun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2005
  • Recently, the rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. Immediately, by opposition function the Hacker's unlawful intrusion and threats rise for network environments as time goes on. Specially, the internet consists of Unix and TCP/IP had many vulnerability. the security techniques of authentication and access controls cannot adequate to solve security problem, thus IDS developed with 2nd defence line. In this paper, intrusion detection method using Bayesian Networks estimated probability values of behavior contexts based on Bayes theory. The contexts of behaviors or events represents Bayesian Networks of graphic types. We profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions. We had simulation using DARPA 2000 Intrusion Data.

  • PDF

Convergence Security Approach for Motor Vehicle Communication Network Hacking Attack Prevention: Focus on Bluetooth Cases (자동차 내부망 통신네트워크 해킹범죄예방을 위한 융합보안적 대응방안: Bluetooth 활용사례를 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.99-107
    • /
    • 2016
  • The purpose of this study is to analyse motor vehicle communication network hacking attacks and to provide its prevention. First, the definition of motor vehicle communication network was provided and types of in-vehicle communication network were discussed. Also, bluetooth hacking attack cases were analysed in order to illustrate dangers of hacking attacks. Based on the analysis, two preventive measures were provided. First, Motor Vehicle Safety Standard Law should be revised. Although the law provides the definition of electronic control system and its standards as well as manufacturing and maintenance for safe driving standards, the law does not have standards for electronic control system hacking prevention and defensive security programs or firmware. Second, to protect motor vehicle communication network, it is necessary to create new laws for motor vehicle communication network protection.

A Study on the Modeling Mechanism for Security Risk Analysis in Information Systems (정보시스템에 대한 보안위험분석을 위한 모델링 기법 연구)

  • Kim Injung;Lee Younggyo;Chung Yoonjung;Won Dongho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.989-998
    • /
    • 2005
  • Information systems are today becoming larger and mostly broadband-networked. This exposes them at a higher risk of intrusions and hacking than ever before. Of the technologies developed to meet information system security needs, risk analysis is currently one of the most actively researched areas. Meanwhile, due to the extreme diversity of assets and complexity of network structure, there is a limit to the level of accuracy which can be achieved by an analysis tool in the assessment of risk run by an information system. Also, the results of a risk assessment are most oftennot up-to-date due to the changing nature of security threats. By the time an evaluation and associated set of solutions are ready, the nature and level of vulnerabilities and threats have evolved and increased, making them obsolete. Accordingly, what is needed is a risk analysis tool capable of assessing threats and propagation of damage, at the same time as security solutions are being identified. To do that, the information system must be simplified, and intrusion data must be diagrammed using a modeling technique this paper, we propose a modeling technique information systems to enable security risk analysis, using SPICE and Petri-net, and conduct simulations of risk analysis on a number of case studies.

Comparative analysis on potential error-possibility and security vulnerability in software (소프트웨어의 잠재적 오류가능성 및 보안취약점 비교분석 연구)

  • Lee, Seoung-Min;Oh, Joon-Seok;Choi, Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.106-109
    • /
    • 2010
  • 컴퓨터의 대중화와 네트워크의 발달로 인해 우리 사회는 컴퓨터와 통신이 없이는 생각조차 할 수 없는 시대에 살고 있으며, 또한 많은 정보시스템들을 일상생활 속에서 접하고 살고 있다. 하지만 소프트웨어들의 보안 취약점으로 인해 개인뿐만 아니라 기업은 물론이고 국가에 이르기까지 그 위험성은 모두 열거할 수 없을 정도이며 그에 따른 정보보호의 중요성이 더욱 강조가 되고 있으며, 어느 시스템도 이러한 정보보호에서 자유로울 수 없다. 이러한 보안적 및 오류의 위험은 현재 개발되고 있는 소프트웨어 뿐만 아니라, 정상적으로 운영되고 있는 시스템도 예외가 될 수 없다. 이러한 보안취약점 및 오류의 위험은 소프트웨어 개발시 방어적 프로그램(Defensive Programming)을 포함하는 시큐어 코딩(Secure Coding)기법을 적용하여 보다 안정적인 프로그램을 개발 할 수 있다. 본 논문에서는 소프트웨어의 잠재적인 오류를 발생할 수 있는 요소와 보안 취약점으로 인하여 생길 수 있는 요소들을 살펴보고 실제 java로 개발되어 운영되고 있는 시스템들의 보안 취약점을 분석하였다.

  • PDF

Cyber Threat Military Response Strategy Using Information Security Risk Management (정보보안 위험관리를 활용한 사이버 위협 군사 대응 전략)

  • Jincheol Yoo
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.173-179
    • /
    • 2023
  • The 4th Industrial Revolution technology has emerged as a solution to build a hyper-connected, super-intelligent network-oriented operational environment, overcoming the obstacles of reducing troops and defense budgets facing the current military. However, the overall risk management, including the increase in complexity of the latest inform ation technology and the verification of the impact with the existing information system, is insufficient, leading to serious threats to system integrity and availability, or negatively affecting interoperability between systems. It can be inhibited. In this paper, we suggest cyber threat response strategies for our military to prepare for cyber threats by examining information security risk management in the United States in order to protect military information assets from cyber threats that may arise due to the advancement of information technology.

A Study on the Preparedness of Port State Control for the Enforcement of NIR (NIR의 도입에 따른 항만국통제 대응방안에 관한 소고)

  • Kim, Chu-Hyong
    • Journal of Navigation and Port Research
    • /
    • v.38 no.2
    • /
    • pp.141-146
    • /
    • 2014
  • NIR(New Inspection Regime, hereinafter NIR) relating to the PSC(Port State Contorl, hereinafter PSC) has implemented in Asia-Pacific region under Tokyo-MOU from last January 2014. The most noticable difference between NIR and existing TF(Target Factor, hereinafter TF) is to evaluate company performance and to conduct PSC with flexible inspection interval on the basis of Ship Risk Profile; High Risk Ship, Standard Risk Ship and Low Risk Ship. Particularly deficiencies related to ISM Code, more than 5 deficiencies and detention record have a serious effect on the evaluation of Ship Risk Profile. Therefore ship and company are requested to ensure proper implementation of Safety Management System for the changed PSC tendency. Also RO(Recognized Organization, hereinafter RO) and Administration respectively should take suitable actions different to previous measures, such as implementation of cooperation and support system between vessel and company, changing subject and object for avoiding Mannerism in SMS audit, strengthening supervision on RO by Administration and establishment of private-public Partnership network.

An Analysis on the Safety Accident Network and Risk Level of Construction Machine and Equipment (건설기계·장비의 안전재해 네트워크 및 위험도 분석)

  • Shin, Won-Sang;Son, Chang-Baek
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.34 no.5
    • /
    • pp.35-42
    • /
    • 2018
  • In order to seek out methods to reduce safety accidents caused by construction machinery and equipment, this study collects data about safety accidents and draws main risk factors by construction from the data, through SNA. It aimed to suggest safety management points to be used in future construction fields, by analyzing risk index of such factors. The finding can be summarized: First, Backhoe Bucket is the risk factor for crash accidents of average workers in earth works; boring machines-maintenance is the risk factor for fall accidents of construction machinery operators in foundation works; bending machine-reinforcing rod processing is the risk factor for jamming accidents of reinforcing rod engineers in frame works; and mobile crane-hook is the risk factor for crash accidents of average workers in lifting works. Second, works can be arranged in turn, according to the risk index: earth, lifting, frame and foundation works. Risk factors can be also arranged according to the risk index: Backhoe in earth works, pile drivers in foundation works, bending machines in frame works and mobile cranes in lifting works. This study has some limits, in that it only analyzed main machinery/equipment, among various kinds of them, for earth, foundation, frame and temporary works (lifting works) and used data collected over three years. Therefore, it is necessary to conduct an analysis using big data, by collecting additional data about a lot of machinery/equipment in future construction fields.

Investment Prioritization Method for Steep Slope Retaining Wall Considering the Disaster Risk and the Repair and Reinforcement Cost (재해위험도와 보수보강비용을 고려한 급경사지 옹벽의 투자 우선순위 결정방법 연구)

  • Choi, Jae-Soon;Shin, Yean-Ju;Baek, Woo-Hyun
    • Journal of the Korean Geotechnical Society
    • /
    • v.38 no.12
    • /
    • pp.79-89
    • /
    • 2022
  • Every summer in our country, an accident occurs, in which the retaining wall on a steep slope collapses due to torrential rain. According to the data on the results of steep slope risk assessment in 2019, over 780 retaining walls are below grade C; therefore, preparing for countermeasures is urgent. However, due to the limited budget for the repair and reinforcement of these retaining walls, it is necessary to discuss the investment prioritization. In this study, a prioritization method was proposed at the network and project levels along with the review of the revised criteria of disaster risk assessment in the steep slope retaining wall, and an application research in the network level was conducted for six retaining walls. Moreover, it is proposed that the priority index was determined by using the actual cost for repair and reinforcement in determination of the project level prioritization.

The impact of security and privacy risk on smart car safety and trust (보안과 프라이버시 위험이 스마트카 안전과 신뢰에 미치는 영향)

  • Soonbeom Kwon;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.9-19
    • /
    • 2023
  • Smart cars, which incorporate information and communication technologies (ICT) to improve driving safety and convenience for drivers, have recently emerged. However, the increasing risk of automotive cybersecurity due to the vulnerability of electronic control units (ECUs) and automotive networks, which are essential for realizing the autonomous driving functions of smart cars, is a major obstacle to the widespread adoption of smart cars. Although there have been only a few real-world cases of smart car hacking, drivers' concerns about the security of smart cars can have a negative impact on their proliferation. Therefore, it is important to understand the risk factors perceived by drivers and the trust in smart cars formed through them in order to promote the future diffusion of smart cars. This study examines the risk factors that affect the formation of trust in smart cars, focusing on security and privacy, and analyzes how these factors affect safety perceptions and trust in smart cars.