• Title/Summary/Keyword: 보안산업

Search Result 1,659, Processing Time 0.025 seconds

Security Frameworks for Industrial Technology Leakage Prevention (산업기술 유출 방지를 위한 보안 프레임워크 연구)

  • YangKyu Lim;WonHyung Park;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.33-41
    • /
    • 2023
  • In recent years, advanced persistent threat (APT) attack organizations have exploited various vulnerabilities and attack techniques to target companies and institutions with national core technologies, distributing ransomware and demanding payment, stealing nationally important industrial secrets and distributing them on the black market (dark web), selling them to third countries, or using them to close the technology gap, requiring national-level security preparations. In this paper, we analyze the attack methods of attack organizations such as Kimsuky and Lazarus that caused industrial secrets leakage damage through APT attacks in Korea using the MITRE ATT&CK framework, and derive 26 cybersecurity-related administrative, physical, and technical security requirements that a company's security system should be equipped with. We also proposed a security framework and system configuration plan to utilize the security requirements in actual field. The security requirements presented in this paper provide practical methods and frameworks for security system developers and operators to utilize in security work to prevent leakage of corporate industrial secrets. In the future, it is necessary to analyze the advanced and intelligent attacks of various APT attack groups based on this paper and further research on related security measures.

A study on Improved Convergence Security Monitoring System model (융합보안관제시스템 개선에 관한 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.3-12
    • /
    • 2011
  • According to the NIS, damages due to leaking industrial technology are reaching tens of trillion won. The type of damages are classified according to insider leaks, joint research, and hacking, illegal technology leaks and collaborated camouflaged. But 80% of them turned out to be an insider leak about connecting with physical security. The convergence of IT and non IT is accelerating, and the boundaries between all area are crumbling. Information Security Industry has grown continuously focusing Private Information Security which is gradually expanding to Knowledge Information Security Industry, but Information Security Industry hereafter is concentrated with convergence of IT Security Technology and product, convergence of IT Security and Physical Security, and IT convergence Industry Security. In this paper, for preventing company information leaks, logical security and physical security both of them are managed at the same level. In particular, using convergence of physical security systems (access control systems, video security systems, and others) and IT integrated security control system, convergence security monitoring model is proposed that is the prevention of external attacks and insider leaks, blocked and how to maximize the synergy effect of the analysis.

A Exploratory Study on R&D Strategies Industrial Technology Security (산업기술 보호를 위한 기술적 보안의 탐색적 연구)

  • Kim, Kyung-Kyu;Choi, Seo Yun;Hur, Sunghye
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.120-125
    • /
    • 2009
  • To enhance international competitiveness through the protection of cutting-edge industrial technology, it is essential to establish the policy for strengthening ability to develop industrial security technology and raising international competitiveness. In this study we investigated and analysed not only the ecumenic trend but also the present condition, then we executed the deduction of the industrial security technology development program in a aspect of government and analysed the current status of the technical security technology for developing security technology and increasing leaks of the advanced industrial technology.

  • PDF

Activation of Culture and Content Industry and Necessity of Security Industry & Concert Hall Safety (문화콘텐츠 산업의 활성화와 공연장 안전 및 보안 산업의 필요성)

  • Choi, Jeong-Il;Jang, Ye-Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.55-63
    • /
    • 2016
  • The purpose of this study is that there viewing at the future development direction and awareness of the cultural contents industry targeting college students for the activation of the domestic cultural content industry. And we want to find the need of the security industry & Concert Hall Safety. Recent worldwide it has occurred 'Soft target' terror targeting unspecified civilian in the cultural space of theater and music venues, stadiums etc. But security and safety systems against terror in Korea are very deficient situation. US security market has increased sales significantly interest in increasing against crime and terrorism prevention and depending on the price cut and technology development. It is expected to require a security industry in a variety of applications to the cultural contents industry development about Korean pop music and theatrical performances, and internet and mobile games stc.

Development of Environmental Security Engineering Through Delphi Survey (델파이 조사를 통한 환경보안공학 개발)

  • Heon-Wook Lim
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.135-140
    • /
    • 2022
  • The purpose of this study is to develop security subjects that require engineering security knowledge. In particular, Engineering knowledge is required to perform security tasks such as smart factory security. However, although there are similar specialties such as mechanical security instructors, industrial security managers, and industrial security specialists(CPP), they are not based on engineering knowledge. Accordingly, Delphi analysis through expert interviews was used to derive a job analysis of security engineering. And I was able to sort out the necessary knowledge. Research Results 1-Line Security for Perimeter Security Architectural Structure, Architectural Dynamics, Including Septed, Control instrumentation including smart factory security for building security with 2-Line security, With 3-Line security, it was divided into ergonomics and mechanical expenses for indoor security. As a result of the survey, by age, those in their 30s showed the highest response with 75.8%, and by job, industrial security officers with 76.4%. This could be seen as a desire for a environmental security engineering certificate by practitioners in the industrial security field.

National Information Security Agenda and Policies (국가 정보보안 이슈 및 정책방안에 관한 연구)

  • Kim, Jung-Duk
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.105-111
    • /
    • 2012
  • This study is to propose national information security policies based on the policy framework, which has four components: government, industry/company, individual, and environments. According to the framework, the four policy agenda are derived: national information security governance scheme, information security industry competitiveness and corporate security level enhancement, eco-system for security professionals, and finally related laws & regulations modification and security culture movement. Specific issues and policies in each agenda are proposed.

각 군(軍)의 방위산업기술보호 인식 및 역량 제고를 위한 교육 방안

  • Son, Chang-gun;Ryu, Yeonseung
    • Review of KIISC
    • /
    • v.28 no.6
    • /
    • pp.63-69
    • /
    • 2018
  • 방위산업기술보호법의 대상기관인 각 군(軍)은 방위산업기술보호 인식 및 역량 제고를 위한 방위산업기술보호 교육이 필요하다. 방위산업기술 즉 기밀기술정보, 비기밀통제기술정보, 핵심기능(CPI)에 대한 보호조치 등 군(軍) 방위력개선사업 실무절차와 관련된 특징을 고려하여 전력소요제기~운용시험평가~후속양상 구매 배치에 이르는 전(全) 단계에 방위산업기술 보호 지침에 따라 보안조치가 이루어져야 한다. 이러한 보안조치는 교육을 통해 효과가 극대화 된다. 따라서 본 연구는 각 군(軍)의 방위산업기술 보호에 관한 교육의 발전방안을 제시하는데 주안을 두었다.

A study on the Establishment of an Integrated Cyber Security Framework in the Era of the 4th Industrial Revolution (4차 산업혁명 시대의 통합 사이버 보안 프레임워크 구축에 대한 연구)

  • Lee, Jin Yong;Yang, Sun Joo;Jang, Hyoung Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.251-254
    • /
    • 2021
  • 국가 4차 산업혁명의 성장 동력으로 데이터 경제가 주목받고 있으며, 현(現)산업계는 초연결, 초지능, 초융합 사회로 진보하고 있다. 이와 같은 환경에서는 산업군 간의 경계가 사라지고 전방위적인 상호 유기적인 복합 생태계를 구성하게 된다. 따라서 사이버 보안사고 발생 시 단순 데이터 탈취 정도에 국한되지 않고 안보, 생명, 국가 경제 등에 돌이킬 수 없는 손실을 끼칠 것으로 예상된다. 그러나 현재 사이버 보안의 각종 제도 및 법령 등은 중복·혼재되어 있거나 특정 산업군에 적용하기에는 일부 미흡한 요소도 존재한다. 본 논문에서는 이와 같은 문제점을 개선하고 전방위적인 보안거버넌스를 달성하기 위한 통합 사이버 보안 프레임워크 구축 방안을 제언한다.

방위산업 사이버 보안을 위한 방산 정보 공유·분석센터(ISAC) 설립 방안

  • Park, Heungsoon
    • Review of KIISC
    • /
    • v.28 no.6
    • /
    • pp.56-62
    • /
    • 2018
  • 미래 군사력은 첨단 무기체계가 병력 위주의 군 구조를 대체할 것임은 자명하다. 이를 증명하듯 최근 국내 방위산업은 무기체계의 고도화 첨단화로 급속하게 성장하고 있으며 해외 수출도 성공적으로 진행 중이다. 그러나 컴퓨터 해킹 등 사이버 공격에 의한 방산 정보나 방위산업기술의 유출은 방위산업의 성장을 저해시킬 뿐 아니라 국가 안보까지 심대한 영향을 미친다. 국방부는 방산업체 사이버 보안을 위해 2010년부터 보안관제를 실시하고 있으나, 지능형 지속 위협(APT) 공격과 같은 최근의 공격 양상에 대응하기 위해서는 위협 정보를 다각적으로 수집 분석하는 노력이 필수적이다. 미국을 중심으로 한 선진국은 정보공유 분석센터(ISAC) 등 정보공유체계 구축을 통해 주요 기반시설의 사이버 보안을 강화하고 있으며 국내에서도 금융, 통신 분야 등을 시작으로 최근에는 의료 분야로 점차 확대되고 있는 추세이다. 본 논문에서는 정보공유 분석센터 설립 사례와 국내 방산업체 보안관제 환경 분석을 통해 방산 정보공유 분석센터 설립 방안을 제안한다.

Development of evaluation criteria for selection of source code security vulnerability verification rules for industrial control systems (산업제어시스템의 소스코드 보안 취약점 검증 룰 선정을 위한 평가 기준 개발)

  • Kim, Eunbi;Choi, Yisoo;Han, Dongjoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.449-452
    • /
    • 2021
  • 산업제어시스템은 IT 기술의 발전에 따라 다양한 기기 환경과 네트워크를 적용해 진화하고 있다. 이러한 상황에서 사이버 보안의 위협은 가중되고 있으며, 이를 예방하는 방법의 하나로 산업제어시스템에 탑재되는 소프트웨어의 소스코드 개발 과정에서 보안 취약점을 예방하기 위해 소스코드 보안 룰을 적용하여 위반사항을 제거한다. 본 연구에서는 소스코드 보안 룰에서 적용 우선순위를 선정하기 위한 가이드를 개발한다.