• Title/Summary/Keyword: 민간보안산업

Search Result 72, Processing Time 0.025 seconds

Vulnerability Analysis of DHCP Exhaustion Attack in Drone Environment: Based on Open Source Tools Improvement Results (드론 환경에서의 DHCP 고갈 공격 취약점 분석: 도구 개선 결과를 기반으로)

  • Lee, Junkwon;Jeong, Jiin;Jung, Wontae;Lee, Kyungroul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.204-206
    • /
    • 2022
  • 드론과 관련된 기술의 발전으로 인하여, 다양한 민간 및 공공 산업에서 활용되는 실정이며, 이에 따라 드론 시장 역시 확대되면서 일반인들도 드론을 접하거나 활용하는 기회가 많아지고 있다. 특히, 일반인들이 접근하기 용이하고 사용하기 쉬운 WiFi 기반의 상용 드론이 생산되면서 수요 역시 증가하는 추세이다. 이와 같이, 드론이 많이 발전하는 긍정적인 측면과는 반대로, 드론에서 발생하는 다양한 취약점으로 인하여 보안 위협이 발생한다. 최근에는 WiFi 기반의 드론들을 대상으로 공개된 도구를 사용하여 DHCP 고갈 공격의 취약점을 분석하는 연구가 진행되었으며, 공격 결과로 실제 드론이 DHCP 고갈 공격으로 인하여 IP 주소를 할당받지 못하는 보안위협이 도출되었다. 하지만, 이 연구는 대표적인 DHCP 공격 도구인 DHCPig와 Yersinia를 활용하였으며, 이 도구들은 무선이 아닌 유선 네트워크를 기반으로 제작되었기 때문에, 드론 환경에 그대로 적용하기에는 한계점이 존재하며, 실제로 발생 가능한 취약점을 검증하지 못하는 한계점도 존재한다. 따라서 본 논문에서는 WiFi 기반 상용 드론을 대상으로 DHCP 고갈 공격의 취약점을 분석하기 위하여, 공개된 도구들의 문제점을 분석하고 개선함으로써, 드론 환경에서의 DHCP 고갈 공격의 가능성을 검증한다. 본 연구 결과는 DHCP를 제공하는 드론 환경의 안전성을 향상하기 위한 지표로 활용될 것으로 사료된다.

A Study and Analysis on Case Study of Security Evaluation Tool (보안성 평가 도구 사례 분석 연구)

  • Kim, Hyun-il;Park, Kyungyun;Seo, Changho;Moon, Daesung
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.347-356
    • /
    • 2019
  • Recently, the liberalization of industrial control systems has been accompanied by a major change in the structural paradigm of information systems in the public and public sectors, and potential cyber security problems in the future major infrastructure control systems that cannot respond to the level of security of existing information systems. To cope with this, a cyber security evaluation tool that can evaluate security vulnerability in three dimensions against various infrastructure control system environment is needed. However, a cyber security evaluation in the domestic environments does not have the concept of the current security status and satisfy settings of the infrastructure. Also, the most of items in that environments have had short-term inspection themselves which makes a limitation by a technical area. In order to overcome this problems, many researches are needed to apply CSET (Cyber Security Evaluation Tool) which is the US cyber security evaluation tool to the control environment of various domestic infrastructure. In this paper, first, we analyze methods to apply to the major domain through the analysis of various case studies on existing security assessement tools. Finally, we discuss future directions.

Current Trends in the U.S. Cybersecurity Laws (미국 사이버보안법의 최근 동향 - 「사이버보안 정보공유법」을 중심으로 하여 -)

  • Yang, Chun-Soo;Jee, Yu-Mi
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.155-192
    • /
    • 2018
  • As the 'hyper-connected society' has emerged through the 'Fourth Industrial Revolution, public interests as well as social dangers have increased. Above all, the risk of infringement of information, including confidential personal information, is dramatically increasing. As the hyper-connected society has been realized, even if only one of the internet devices is hacked, there would be a danger that the ripple effect of such a hacking spreads to the whole network. Therefore, the necessity and importance of information security, including cybersecurity, has been increasing. In other words, the stability of cyberspace and internet space is becoming more important. As a result, the Korean government is seeking to build a legal system related to information security, which would be able to cope with the information infringement problem in the hyper-connected society. However, it seems that the government is still struggling with the direction of building such a legal system. In this context, a comparative review examining the legal systems of advanced foreign countries will provide meaningful implications as to what kinds of legal policies we should devise and implement for information security. In particular, the U.S. legislative act that actively responds to the cybersecurity violations is worthy of reference. For this reason, this article systematically analyzes the current status of the U.S. cybersecurity laws. Especially, this article focuses on the "Cybersecurity Information Sharing Act of 2015"(hereinafter "CISA"), that was recently enacted by the U.S. congress. The CISA prescribes the systemic and detailed information-sharing between national and private entities. The CISA, that actively promotes information-sharing, is full of suggestions for us, in that information-sharing is an effective way to properly realize information security in today's hyper-connected society.

RFID/USN 서비스 시장 전망 및 적용 사례 분석

  • Im, Myeong-Hwan;Park, Yong-Jae
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.6
    • /
    • pp.3-12
    • /
    • 2008
  • 본 논문은 RFID/USN 서비스의 국내외 시장 전망 및 적용 사례를 분석하였으며, 향후 서비스를 확대 할 수 있는 방안을 제시하였다. 국내외 RFID/USN 서비스 시장 규모는 기기 시장보다 더 커질 것으로 전망되며, 국방/안보, 항공/항만, 도로/교통, 유통/물류, 산업/건설, 제조/공정, 식품/농수 축산, 의료/보건, 도서/출판, 교육/문화/엔터테인먼트, 보안/방범, 재난/재해/환경 등의 분야에서 다양하게 적용되고 있는 것으로 나타났다. RFID/USN 서비스를 확대하기 위해서는 공공 분야를 중심으로 한 대규모 선도 수요 창출이 선행되어야 하며, 모바일 RFID 등 신규 서비스의 창출 및 활성화를 위한 정책 대안이 마련되어야 한다. 그리고 RFID/USN 서비스의 시장 규모와 보급시기 등을 고려하여 우선적으로 적용해야 할 서비스의 발굴을 확대하고, RFID/USN 도입 성과를 가시화하여 민간의 수요를 촉발할 필요가 있다.

The Algorithm Design and Implementation of the Internet Statistics System using the Robot Agent (로봇에이전트를 이용한 인터넷 주요 통계산출 알고리즘 설계 및 구현)

  • Kim, Weon;Chin, Yong-Ohk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.6A
    • /
    • pp.989-997
    • /
    • 2001
  • 인터넷 시장규모 확대 및 이용환경의 급속한 변화로 인하여 인터넷 이용자에 관한 통계와 인터넷 환경에 관한 통계정보 요구는 증대되고 있다. 그러나 인터넷 환경에 관한 통계 정보 중에서 국내 호스트개수, 홈페이지 개수, 국제도메인의 국내 보유 개수 산출 등은 인터넷에 연결하는 이용기관의 보안 강화의 문제점과 전문 지능형 로봇에이전트 시스템의 부재 및 국제도메인 등록기관의 통계 비공개 등으로 국내에서 주기적으로 산출하는데 문제점이 부각되고 있다. 본 논문에서는 인터넷 관련 주요 통계정보의 정확한 산출·제시로 민간의 인터넷 산업에 대한 효과적인 투자 유도를 가능케 하기 위해서 인터넷 주요 통계 산출이 가능한 로봇에이전트 설계 기법을 제안하고 구현한다. 모듈은 로봇에이전트 프로세스 모듈, 통계산출 모듈, 관리 모듈 등으로 구성되었으며, 국내의 호스트 개수, 홈페이지 개수, .com 등 국제도메인의 국내 보유 개수 등을 정기적으로 산출되기 위한 알고리즘과 그 구현결과를 제시한다.

  • PDF

Finding Industries for Big Data Usage on the Basis of AHP (AHP 기반의 빅데이터 활용을 위한 산업 탐색)

  • Lee, Sang-Won;Kim, Sung-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.21-27
    • /
    • 2016
  • Big Data is gathering all the attention from every business community. Pervasive use of machine-to-machine (M2M) applications and mobile devices bring an explosion of data. By analyzing this data, the private and public sectors can benefit in the areas of cost reduction and productivity. The Korean government is actively pursuing Big Data initiatives to promote its usage. This paper aims to select industries which fit for the development of Big Data with a verification of the experts. The analytic hierarchy process (AHP) is applied to systematically derive the opinion of more than 50 professionals. Medical / welfare, transportation / warehousing, information and communications / information security, energy, the financial sector have been identified as promising industries. The results can be utilized in developing Big Data best practices thus contributing industrial development.

The Strategies for the Development of the Security Industry Utilzing Social Network Services (경호경비산업의 발전을 위한 사회연결망서비스 활용전략)

  • Kim, Doo-Han;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.7-30
    • /
    • 2016
  • This study found the strategies for activating the security industry to utilize social network services based on the platform business model. This research was utilized for in-depth interview and IPA analysis. And use it was to check the contents and strategic improvement projects that can actually materialize and direction of the strategy. First, run a priority need area is a private center of community policing related portal development and operation, universal social networking service(SNS) utilizing expanded, professional training, IT-based security content management and operation of IT infrastructure security guards and security professionals up educational content development, online security guards and security professionals-up refresher training program development. Second, the area over the inventory capabilities increase the effectiveness of the security guards was constructed open-type comprehensive public information system. Third, the area needed to be reviewed are the individual security industry experts workers operating information channels, dedicated customer service and expanding the event of a private security guard & security service providers up. Fourth, the effectiveness of the insufficient area are discuss system improvements, the sharing of community policing closed Cameras for proposals for the expanded utilization of social networking services, private development organizations Social Network Service(SNS).

  • PDF

A Study on the Establishment of desirable Model for Licensed Private Investigation Service System (공인탐정제도의 올바른 모델설정에 관한 연구)

  • Lee, Sang-Hun
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.249-270
    • /
    • 2009
  • There have been great demands for various private searches and collecting information activities. but in korea it is still banned to supply private investigation service and to use the term 'private investigation'. So establishment of desirable model for private investigation service system is essential factor in strategic approaching for privatization of policing. In most developed countries private investigation service system is generally permitted and various methods to solve the side effects of that are considered. It is necessary to revise more the Security Business Law to introduce private investigation service system so that the dispute on determining how to do and what to do. It looks like that police agrees with the introduction of the private investigation service system because this could be an option when it comes to the job that its members can take after retirement and because this system helpful their own work. Actually Korea government have tried to prepare the law enactment of the private investigation service system since 1999 but have been failed. This study focuses on implementing the suitable system for private investigation service in Korea, which includes the consideration of the logical validity of the introduction by comparing with other foreign private investigation service system. We should make research and effort to cope with such as a partial amendment about the problem and the side effect that can be happened in a beginning stage of system trial.

  • PDF

Policy Suggestions to Improve PSS(Presidential Security Service) Education Programs for Industry-Academy-Governmental Cooperations (${\cdot}$${\cdot}$관 협력강화를 위한 대통령경호실 교육프로그램 확대 방안)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.227-243
    • /
    • 2006
  • In modern society, private securities have developed their capabilities continuously. However, despite the fact that not only security industries have been considerably expanded in quantity, but also plenty of scholars published diverse papers relating to security problems, qualitative growths of private securities have not accomplished fully. Especially, securing the President would not be guaranteed only by PSS(Presidential Security Service). In order to secure the President successfully, it is necessary for all the social parts to strive to protect the President. In this respect, improving private securities, including academic fields, might be critical so as to succeed in securing the President. Without the supports from private securities, there might be lots of security problems in national context. Therefore, this study proposes several policy suggestions for the cooperation among PSS, private security industries and academic fields: (1) Providing a lot of practical knowledge from PSS to college students, (2) Personnel exchange between academic parts and PSS to promote the efficiency of securing the President, (3) Furnishing diverse information and knowledge about security to private securities, (4) Formulating security-searching standards, (5) Expanding educational institutions under PSS.

  • PDF

A Study on the Autonomy of the Autonomous Weapon Systems (자율 무기체계의 자율성에 대한 연구)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.101-111
    • /
    • 2018
  • The autonomous weapon systems are being developed with a global competition due to the 4th industrial revolution technologies such as artificial intelligence. This theses analyzes on the technologies related to the autonomy of the new weapons, the new changes in war fighting regime that will be brought by such autonomous weapons, the level of autonomy in a autonomous weapon system, and also the definition and functions of the autonomy. The advanced artificial intelligence for the civilian commercial sectors would be similar to the required military autonomous systems. The future war fighting regime would be the war with autonomous weapon systems without any human casualties. The level of autonomy in the future weapons would be fully autonomous without any human supervision or involvement in the decision making processes. The functions of the autonomous weapon would be to sense, to decide, and to act with a full autonomy in order to accomplish desired purposes.

  • PDF