• Title/Summary/Keyword: 데이터 유출방지

Search Result 140, Processing Time 0.025 seconds

Comparison of SIEM Solutions for Network Security (네트워크 보안을 위한 SIEM 솔루션 비교 분석)

  • Lee, Jong-Hwa;Bang, Jiwon;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.11-19
    • /
    • 2019
  • As technology develops, the latest security threats on the network applied to users are increasing. By attacking industrial or corporate systems with malicious purposes, hackers cause many social problems such as confidential information leakage, cyber terrorism, infringement of information assets, and financial damage. Due to the complex and diversified threats, the current security personnel alone are not enough to detect and analyze all threats. In particular, the Supervisory Control And Data Acquisition (SCADA) used in industrial infrastructures that collect, analyze, and return static data 24 hours a day, 265 days a year, is very vulnerable to real-time security threats. This paper introduces security information and event management (SIEM), a powerful integrated security management system that can monitor the state of the system in real time and detect security threats. Next, we compare SIEM solutions from various companies with the open source SIEM (OSSIM) from AlienVault, which is distributed as an open source, and present cases using the OSSIM and how to utilize it.

A Study on the Development of Technology Standards for the Batch Conversion of CI between Private and Personal Identity Proofing Organizations for Safe Mobile Electronic Notification Service (안전한 모바일 전자고지서비스를 위한 민간기관과 본인확인기관 간의 연계정보 일괄변환 기술기준 개발에 관한 연구)

  • Kim, JongBae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.559-569
    • /
    • 2022
  • Due to the spread of mobile devices, the use of mobile electronic notification services is increasing. For the mobile electronic notification service, the connecting information is required to identify the owner of the mobile device and the recipient of the notification. The connecting information is an online resident registration number, and safe management is essential. Therefore, in this paper, the processing flow, interconnecting standard, and management plan are proposed when a mobile electronic notification requesting agency requests the identity verification agency to convert the resident registration number of the recipient of the electronic notification to connecting information. In the proposed method, it is suggested that a safe mobile electronic notification service is possible by defining the process of collective conversion of connecting information between private organizations and personal identity proofing agency, information transmission and reception methods, and interworking standards.

A comparison of synthetic data approaches using utility and disclosure risk measures (유용성과 노출 위험성 지표를 이용한 재현자료 기법 비교 연구)

  • Seongbin An;Trang Doan;Juhee Lee;Jiwoo Kim;Yong Jae Kim;Yunji Kim;Changwon Yoon;Sungkyu Jung;Dongha Kim;Sunghoon Kwon;Hang J Kim;Jeongyoun Ahn;Cheolwoo Park
    • The Korean Journal of Applied Statistics
    • /
    • v.36 no.2
    • /
    • pp.141-166
    • /
    • 2023
  • This paper investigates synthetic data generation methods and their evaluation measures. There have been increasing demands for releasing various types of data to the public for different purposes. At the same time, there are also unavoidable concerns about leaking critical or sensitive information. Many synthetic data generation methods have been proposed over the years in order to address these concerns and implemented in some countries, including Korea. The current study aims to introduce and compare three representative synthetic data generation approaches: Sequential regression, nonparametric Bayesian multiple imputations, and deep generative models. Several evaluation metrics that measure the utility and disclosure risk of synthetic data are also reviewed. We provide empirical comparisons of the three synthetic data generation approaches with respect to various evaluation measures. The findings of this work will help practitioners to have a better understanding of the advantages and disadvantages of those synthetic data methods.

Assessment Module Formulation for the Trapped-Oil Recovery Operations from Sunken Vessels (침몰선 잔존유 회수작업 평가모듈 개발에 관한 연구)

  • Kang, Kwang-gu;Lee, Eun-bang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.1
    • /
    • pp.88-96
    • /
    • 2021
  • When oil tankers, large passenger ships and cargo ships sink under the sea owing to various maritime accidents, the residual cargo oil or fuel oil in the such vessels could pose direct risk to factor for the marine environment and it require safe and rapid removal. Although domestic and foreign salvage companies are adopting various recovery methods and technologies with customizations according to each site during recovery operations studies on reasonable assessment modules for the operation process are relatively insufficient. In this study, the data from trapped-oil recovery operations performed at different site conditions were collected and analyzed in order to designed an operation assessment module, define the operational process steps in terms of preparation, implementation and completion, and derive key factors for each detailed process. Subsequently, the module was designed in such a way as to construct performance indicators to assess these key factors. In order to exclude subjective opinions from the assessment as much as possible, the assessment each item was constructed with indicators based on data that could be evaluated quantitatively and its usefulness was verified by applying the module to the trapped-oil recovery operation cases. We expect this the method and the technology assessment module for the trapped-oil recovery operation on sunken vessels will help to verify the adequacy of the trapped-oil recovery such operation before or after. Furthermore, it is expected that the continuous accumulation of assessment data and feedback from past or future operation cases will contribute toward enhancing the overall safety, efficiency and field applicability of trapped-oil recovery operation.

Study on the Technical Security Factor for the Implementation of Secure DB System (안정적인 DB보안 시스템 구축을 위한 보안기술요소 분석에 관한 연구)

  • Yoon, Sun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.143-152
    • /
    • 2014
  • This paper introduces Database security to prevent the rapidly increasing issue of private information leakage. The Database security examined in the paper separates into DB access control area and DB encryption area which further leads the paper to analyze the factors of the two areas and suggest necessary elements for creating stable Database security. In addition, the paper examines previous DB security programs by areas and analyzes pros and cons from the tested result. The experiment indicated that while DB access control presents less degradation and reduced the need to modify the existing DBMS since the access control operates at the end point of the network, DB encryption presented strength in protecting the data from unauthorized access. On the other hand, DB access control is less useful in preventing the attack in advance which leaves the log to enable tracking afterward while DB encryption can only be operated by limited types of Database and causes degradation due to system load and shows higher percentage of failure when creating the system. This paper examines characteristics of Database security areas in order to be used as a reference for institutions or companies seeking stable Database security.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Mapping Inundation Area Using Analysis Result of SWMM (SWMM 분석결과를 이용한 내수침수지도 작성)

  • Lim, Ji On;Na, Seo Hyeon;Lee, Kyung Su
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.486-490
    • /
    • 2017
  • 도심지에서의 침수피해는 이상홍수 및 국지성 호우 시 우수관거 시설기준 미달, 펌프장 등 배수시설이 설치되지 않아 하천의 계획홍수위보다 제내지의 지반고가 낮은 저지대 지역에서 많이 발생하고 있다. 특히, 내수침수의 경우는 외수에 따른 범람보다는 국민의 재산과 인명피해에 직접적인 영향을 미치므로 침수피해 위험도가 높은 지역의 주민에게 그 지역의 침수빈도와 범위를 인지시키고 사전대응 능력을 향상시킬 필요가 있다. 따라서 연구의 목적으로 매년 피해가 발생한 이력이 있는 위험지구에 대해 전국단위 시군구별 침수피해 지도를 작성하여 침수심 산정과 피해액 예측할 수 있는 기초자료로 활용하고, 주민들의 신속한 대처를 통해 그들의 생명과 재산을 보호하여 재난 안전 국가 이미지 제고에 기여하고자 한다. 본 연구에서는 도심지 유출모형인 XP-SWMM을 활용하여 내수재해 위험요인에 대한 전국을 해석하는 것에 한계가 있어 풍수해저감종합계획에 수록된 XP-SWMM모의 분석 결과 값을 활용하고자 하였다. 기 수립된 전국 풍수해저감종합계획의 과거 피해 자료를 바탕으로 이상 집중호우나 태풍의 내습 시 풍수해 피해 발생 가능성이 제일 높은 지역을 연구범위 대상지역으로 선정하였다. 그 중 풍수해의 주요 원인으로서 태풍, 집중호우 및 해일로 인한 피해발생 빈도가 높은 지역이면서 하천재해 및 내수침수 피해가 많은 경기도 동두천시를 연구대상 지역으로 선정하였으며, 대상지 유역 현황과 지형정보 및 빈도별 침수심을 조사하였다. 수록된 내용에 따르면 경기도 동두천시는 우수관망의 밀도가 높은 4개 위험지구를 내수재해 발생가능성 지역으로 선정하여 10년, 20년, 30년, 50년, 100년, 200년 6개 빈도에 대해 XP-SWMM 모의를 실시하였다. 이와 같이 수록된 각 빈도에 대한 모의 결과 값을 GIS기술을 이용하여 디지털화 하고 부가적인 분석을 위한 GIS데이터화 하는 내삽법을 선정하여 침수면적 및 침수심을 산출하였다. 그러나 면적비교를 통해 모의 결과 값을 디지털화 하는 과정에서 많은 오차가 발생되는 것을 확인하였고, 이를 보완하기 위해 좌표보정 자동화 프로그램을 개발하여 이러한 문제점을 제거하여 신뢰도를 향상시켰다. 이렇게 계산된 연구 대상지역의 침수심과 침수면적을 활용하여 지도제작 표준 지침서 및 가이드라인을 제시하여 한국형 호우피해 지도제작 기술개발에 기여하고, 비구조적 대책으로서 이상홍수에 대한 위험도를 파악하여 지역별 도심침수 방지를 위한 대비체계를 구축하는 등 위험지역에 대한 사전분석 및 활용에 기초자료로 도움이 되고자 한다.

  • PDF

Classification of Trusted Boot Technology Components based on Hardware Dependency (하드웨어 종속/독립성에 따른 신뢰성 부팅 기술 구성 요소 분류)

  • Park, Keon-Ho;Kim, Sieun;Lee, Yangjae;Lee, SeongKee;Kang, Tae In;Kim, Hoon Kyu;Park, Ki-woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.44-56
    • /
    • 2018
  • Researches on military weapons are actively studied to improve national defense power of each country. The military weapon system is being used not only as a weapon but also as a reconnaissance and surveillance device for places where it is difficult for people to access. If such a weapon system becomes an object of attack, military data that is important to national security can be leaked. Furthermore, if a device is taken, it can be used as a terrorist tool to threaten its own country. So, security of military devices is necessarily required. In order to enhance the security of a weapon system such as drone, it is necessary to form a chain of trust(CoT) that gives trustworthiness to the overall process of the system from the power on until application is executed. In this paper, by analyzing the trusted computing-based boot technology, we derive trusted boot technology components and classify them based on hardware dependence/independence. We expect our classification of hardware dependence/independence to be applied to the trusted boot technology of our self-development ultraprecision weapon system to improve the defense capability in our military.

Performance Evaluation of Advance Warning System for Transporting Hazardous Materials (위험물 운송을 위한 조기경보시스뎀 성능평가)

  • Oh Sei-Chang;Cho Yong-Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.4 no.1 s.6
    • /
    • pp.15-29
    • /
    • 2005
  • Truck Shipment Safety Information, which is a part of the development of NERIS is divided into Optimal Route Guidance System and Emergency Response System. This research is for establishing an advance warning system, which aims for preventing damages(fire, explosion, gas-escape etc.) and detecting incidents that are able to happen during transporting hazardous materials in advance through monitoring the position of moving vehicles and the state of hazardous materials in real-time. This research is peformed to confirm the practical possibility of application of the advance warning system that monitors whether the hazardous materials transport vehicles move the allowed routes, finds the time and the location of incidents of the vehicles promptly and develops the emergency system that is able to respond to the incidents as well by using the technologies of CPS, CDMA and CIS with testing the ability of performance. As the results of the test, communication accuracies are 99$\%$ in freeway, 96$\%$ in arterial, 97$\%$ in hilly sections, 99$\%$ in normal sections, 96$\%$ in local sections, 99$\%$ in urban sections and 98$\%$ in tunnels. According to those results, the system has been recorded a high success rate of communication that enough to apply to the real site. However, the weak point appeared through the testing is that the system has a limitation of communication that is caused in the rural areas and certain areas where are fewer antennas that make communication possible between on-board unit and management server. Consequently, for the practical use of this system, it is essential to develop the exclusive en-board unit for the vehicles and find the method that supplements the receiving limitation of the GPS coordinates inside tunnels. Additionally, this system can be used to regulate illegal acts automatically such as illegal negligence of hazardous materials. And the system can be applied to the study about an application scheme as a guideline for transporting hazardous materials because there is no certain management system and act of toxic substances in Korea.

  • PDF

Application of Greenhouse Climate Management Model for Educational Simulation Design (교육용 시뮬레이션 설계를 위한 온실 환경 제어 모델의 활용)

  • Yoon, Seungri;Kim, Dongpil;Hwang, Inha;Kim, Jin Hyun;Shin, Minju;Bang, Ji Wong;Jeong, Ho Jeong
    • Journal of Bio-Environment Control
    • /
    • v.31 no.4
    • /
    • pp.485-496
    • /
    • 2022
  • Modern agriculture is being transformed into smart agriculture to maximize production efficiency along with changes in the 4th industrial revolution. However, rural areas in Korea are facing challenges of aging, low fertility, and population outflow, making it difficult to transition to smart agriculture. Among ICT technologies, simulation allows users to observe or experience the results of their choices through imitation or reproduction of reality. The combination of the three-dimension (3D) model and the greenhouse simulator enable a 3D experience by virtual greenhouse for fruits and vegetable cultivation. At the same time, it is possible to visualize the greenhouse under various cultivation or climate conditions. The objective of this study is to apply the greenhouse climate management model for simulation development that can visually see the state of the greenhouse environment under various micrometeorological properties. The numerical solution with the mathematical model provided a dynamic change in the greenhouse environment for a particular greenhouse design. Light intensity, crop transpiration, heating load, ventilation rate, the optimal amount of CO2 enrichment, and daily light integral were calculated with the simulation. The results of this study are being built so that users can be linked through a web page, and software will be designed to reflect the characteristics of cladding materials and greenhouses, cultivation types, and the condition of environmental control facilities for customized environmental control. In addition, environmental information obtained from external meteorological data, as well as recommended standards and set points for each growth stage based on experiments and research, will be provided as optimal environmental factors. This simulation can help growers, students, and researchers to understand the ICT technologies and the changes in the greenhouse microclimate according to the growing conditions.