• Title/Summary/Keyword: 대테러 체계

Search Result 49, Processing Time 0.028 seconds

The Study on a Security Safeguard Plan for SCADA Infrastructure (SCADA 시설에 대한 보안강화 방안에 관한 연구)

  • Chung, Yoon-Jung
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.153-160
    • /
    • 2006
  • The control system is accomplishing very important role in our life currently as the national critical Infrastructure and large scale industry plant. We manage SCADA system to manage generally the control system interconnected with the information system. The operating system of SCADA is changing also to the well-known OS like Windows or UNIX for offer various convenience and facility to the user. We offered the reason why such change of the system makes so that it is exposed to cyber terror. In the traditional SCADA system is managed safely by an isolated network system physically. It is the trend to increase gradually though a cyber terror possibility is thinner on a control system than a information system but the cyber terror gives a nation or community wide damage influence of large scale if it happens. Therefore this paper presents a security safeguard plan about SCADA system and helps prepare systematic security strategy and enhance the security level implement.

  • PDF

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

Characteristics of Biological Agent and relavent case study (생물무기 특성과 사례연구)

  • Park, Minwoo;Kim, Hwami;Choi, Yeonhwa;Kim, Jusim
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.442-454
    • /
    • 2017
  • Biological weapon is manipulated and produced from microorganisms such as bacteria, virus, rickettsia, fungi etc. It is classified as one of the Weapons of Mass Destruction (WMD) along with chemical weapon and radiological weapon. Biological weapon has a number of operational advantages over the other WMDs including ease of development and production, low cost and possibility of covert dissemination. In this study we analyze the history of biological weapon's development and the existing biological threats. Then, we predict the social impact of biological attack based on the physical properties of biological agent and infection mechanisms. By analyzing the recognition, dispersion pattern of agents, characteristics of the diseases in the biological weapon related historical events such as Sverdlovsk anthrax accident, 2001 anthrax attack, we found out some of the facts that biological attack would not likely to be recognized rapidly, produce large number of the exposed, increase number of paients who suffed from severe respiratory illness. It would lead the public health and medical service providers to be struggled with hugh burden. Base on the facts that we found from this case study, we suggested the main capabilities of public health required to respond to bioterrorism event efficiently. Syndromic surveillance and other reporting system need to be operated effeciently so that any suspicious event should be detected promptly. the pathogen which suspected to be used should be identified through laboratory diagnostic system. It is critical for the public health agency to define potentially exposed population under close cooperation with law enforcement agencies. Lastly, massive prophylaxis should be provided rapidly to the people at need by operating human and material resources effeciently. If those capacities of public health are consistantly fortified we would be able to deal with threat of bioterrorism successfully.

Analysis on the Perception of the Cyber Dysfunction in the Intelligent Information Society According to the Introduction of the Bright Internet Trust Network (Bright Internet 신뢰네트워크 도입에 따른 지능정보사회의 사이버 역기능 해소에 대한 인식 분석)

  • Gyoo Gun Lim;Jae Ik Ahn
    • Information Systems Review
    • /
    • v.22 no.3
    • /
    • pp.99-118
    • /
    • 2020
  • At present, our society is developing into the intelligent information society in the wave of the 4th industrial revolution, and this change will have the positive effect of innovating all industry fields. However, due to the duality of technology, there will be positive and negative effects. With intelligence, threats to cyber dysfunction such as hacking, terrorism, privacy infringement, and illegal content distribution will become more serious. Until now, the security system of the Internet has been a proactive security system, but in recent years, a proposal for a trust network, a preventive security system, has been introduced. Therefore, this study aims to analyze the possibility of resolving cyber dysfunction of intelligent information society about Bright Internet, one of trust network technologies. This study defines the cyber dysfunction of the intelligent information society and analyzes the perceptions of changes in the cyber dysfunction of the intelligent information society on the introduction of the five principles of the Bright Internet. The change of cyber dysfunction severity of the intelligent information society due to the introduction of the trust network is analyzed to reflect the technical and social demands. This work will guide the structure of the trust network and the direction of practical technological introduction and its influence.

Development Trends of Small Unmanned Ground Vehicles in Technology Leading Countries (기술 선도국의 소형 무인 지상 차량 개발 동향)

  • Ryu, Jun-Yeol;Kim, Soo-Chan;Kim, Tae-Wan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.214-220
    • /
    • 2021
  • SUGVs (Small Unmanned Ground Vehicles) are being used to conduct dangerous missions, such as EOD (explosive ordinance disposal), counter-terrorism operations, fire extinguishing and fire-fighting reconnaissance, reconnaissance of disaster areas, and surveillance of contact areas. Technology leading countries, the United States, United Kingdom, France, Germany, and Israel, have developed and operated various SUGVs for use in the military and civilian fields. The developed system was upgraded further based on additional requirements associated with data collected during the actual operation. The development trends of technology leading countries are an important indicator for the future development of SUGVs. In this study, the development trends and missions of SUGVs operating in the technology leading countries were analyzed. Based on the development trends of SUGVs in these countries, this paper discusses the features and design characteristics needed for the development of SUGVs in future military and civilian domains.

Requirement anlaysis for the International and dmestic building egress design (국내.외 피난설계관련 사항 분석)

  • Lee, Chang-Wook;Lee, Kun-Su;Kim, Young-Min
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2012.04a
    • /
    • pp.30-33
    • /
    • 2012
  • 경제발전과 삶의 질 향상에 더불어 건축기술의 발전은 전 세계적으로 건축물의 고층화 대형화 용도의 복잡화 다양화를 가져오게 되었다. 하지만 미국의 WTC 테러 및 국내의 부산 해운대 우신골드스위트 화재처럼 대형 복합건축물의 화재는 인명 및 재산피해 뿐만 아니라 국민의 사회적 불안감을 증대시키고 국가 신뢰도를 실추시키는 원인이 된다. 따라서 건축설계 단계에서부터 재실자들의 안전한 피난을 위한 피난설계가 중시되어야 한다. 본 연구에서는 국내 피난관련 사항의 체계와 특징을 살펴보고, 선진국의 피난관련 사항과 비교 검토를 통해 문제점을 파악하여 국내 실정에 적합한 피난설계를 제안하고자 한다.

  • PDF

Technical Trends of Cyber Security with Big Data (빅데이터를 활용한 사이버 보안 기술 동향)

  • Kim, J.H.;Lim, S.H.;Kim, I.K.;Cho, H.S.;No, B.K.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.3
    • /
    • pp.19-29
    • /
    • 2013
  • 최근 외부 해킹으로 대량의 개인정보 유출, 대규모 시스템 장애 등 사고가 빈번히 발생하고 있다. 특히, 보안체계를 잘 갖추고 있던 조직들도 APT(Advanced Persistent Threat) 공격과 같이 지속적으로 특정 표적을 목표로 하는 공격 앞에 무력하게 당하는 사건들을 접하면서 많은 기업 및 조직들이 대응 방안 마련에 고심하고 있다. 본고에서는 사이버테러, 사이버전(戰), 핵티비즘 등의 공격방법으로 활용되고 있는 사이버 표적공격 위협에 대한 방어 기술로서 최근 관심을 받고 있는 빅데이터 처리 기술을 기반으로 다중소스 데이터 수집 분석을 통한 지능형 보안 기술에 대한 개념과 관련 기술 및 제품의 동향에 대하여 살펴본다.

  • PDF

Automatic Generation of Network Topology for Large Scale Internet Simulation (대규모 인터넷 시뮬레이션을 위한 네트워크 토폴로지 자동 생성 기법)

  • Ryu, Key-Won;Choi, Kyung-Hee;Park, Seung-Kyu;Jung, Gi-Hyun;Lee, Sang-Hun;Park, Eung-Ki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1187-1190
    • /
    • 2005
  • 인터넷 토폴로지 생성 기법에 대하여 많은 연구가 진행되고 있다. 이는 인터넷 토폴로지가 라우팅, 멀티캐스트, 프로토콜 등의 성능과 사이버 테러 공격에 대한 분석 및 방어체계와 밀접한 관계가 있기 때문이다. 토폴로지를 생성하는 GT-ITM[5], INET-3.0[6] 등은 Autonomous System (AS) 노드들로 이루어진 네트워크 토폴로지를 생성한다. 즉, 이들 도구들은 AS 가 노드인 토폴로지를 생성하며, AS 내의 네트워크에 대해서는 표현하지 않는다. 이에, 본 논문에서는 대규모 네트워크의 시뮬레이션을 위한 토폴로지를 구성하는 데 필요한 PoP (Presence of Point), ISP(Internet Service Provider) 등 하위 레벨의 토폴로지를 자동 생성함으로써 네트워크 토폴로지를 표현하는 방법을 제안한다. 본 연구에서 제안하는 방법은 서로 다른 특성을 가진 하부 서브넷을 가지고 있으며 hierarchy 를 반영한 토폴로지를 생성할 수 있다는 장점을 가지고 있다.

  • PDF

A Study on the Legal Character and System Improvement Methods of Enterprises Disaster Management Standards (기업 재난관리 표준의 법적성격과 제도개선 방안에 관한 연구)

  • Rhee, Sang-Soo;Cheung, Chong-Soo
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2017.11a
    • /
    • pp.329-330
    • /
    • 2017
  • 재난은 인류의 발전과 더불어 다양하게 발생되어왔다. 최근 21세기 들어 발생하는 재난은 그 현상이 더욱 다양하고 복잡하며 그 피해의 정도가 대규모로 진행되는 경우가 많아 졌다. 태풍, 집중호우, 강풍, 폭설, 지진, 황사 등의 자연재난은 지구온난화현상으로 국내뿐만 아니라 전 세계적으로 커다란 영향력을 미치고 있으며, 화재, 구축물의 붕괴, 지하철사고, 테러 및 감염병 등의 사회 재난도 더욱더 증가하고 있는 추세이다. 나아가 사스, 메르스, 지카 바이러스 및 대형 테러 등 전 세계적 차원의 사회 재난의 발생 또한 급증하고 있다. 이와 같이 현대사회에서 발생하는 재난는 개인이나 국가의 정책만으로 예방하고 관리할 수 없는 특성이 있다. 따라서, 자본주의 경제의 한축을 이루고 있는 기업의 재난을 관리하여 연속성을 확보하고 더나아가 리질리언스(Resilence)를 보장하기 위한 일환으로 2007년 7월 재해경감을 위한 기업의 자율 활동 지원에 관한 법률(이하, 기업재해경감법 이라함.)이 공포된 지 약 10여년이 경과하였다. 이는 법 제도화를 통하여 기업의 재해경감활동을 지원하기 취지에서 출발한 것 이다. 그 후 현재 까지 어느 정도의 발전이 있었지만 경과 년 수에 비해 아직 미흡한 실정이다. 이후 그 기업들이 좀 더 원활하게 재해경감활동을 위한 계획을 수립, 실행, 검토 및 유지하기 위한 지침으로서 기업재난관리표준을 2010년 4월 2일 제정하였고 이후 재해경감활동 수립계획을 제정하여 시행하기에 이르렀다. 또한, 기업재난관리표준은 제정된 이후 2013년 12월 9일 전면 개정작업을 통해 경영관리 프로세스 모델(Plan-Do-Check-Act)이 적용된 관리체계를 접목시키고 용어정의를 국제표준과 일치시켜 기업재해경감활동 상의 혼선을 방지하기 위한 노력을 하였다. 현 정부에서는 주무부처가 바뀌고 조직이 변화되어 행정안전부고시 제2017-1호(2017.07.26.일)로 개정되어 현재에 이르고 있다. 본 논문에서는 기업재난관리표준과 연관된 제반 법령 및 규정 등에 대한 법적성격 과 지위를 규명하고, 기업재난관리표준의 관련분야 적용 시 문제점 및 바람직한 제도개선 방향을 제시하고자 한다.

  • PDF

A Study on the Policy for Disaster Recovery of Company (기업의 재해복구 대책 방안에 대한 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.39-45
    • /
    • 2013
  • Recently, the rate of dependence on information system in company is increase through domestic and international trends with the cases of developed similar institutions. In this paper, we analysis current state of company that protect company information resources from disaster, rapid and systematic recovery and business continuity strategic planning. Especially, proposed model was designed. disaster emergency response capacity to enhance disaster preparedness simulation training for standardized measures were established and maintained. In addition, operational continuity, building on the methodology to meet the international standard methodology is presented.