• Title/Summary/Keyword: 사이버역량

Search Result 108, Processing Time 0.024 seconds

Proposals for GCI Indicators to Improve a National Cybersecurity Level (국가 사이버보안 수준 향상을 위한 GCI의 지표개선 방안)

  • Kim, Dae kyung;Lee, Ju hyeon;Kim, Ye young;Hyeon, Da eun;Oh, Heung-Ryong;Chin, Byoung moon;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.289-307
    • /
    • 2022
  • The Global Cybersecurity Index (GCI) developed by the International Telecommunication Union (ITU) is used to diagnose a country's cybersecurity development level and to strengthen its cybersecurity capabilities. This paper analyzes GCI and tries to suggest a way to strengthen its effectiveness. In addition, we analyze the GCI version 1~GCI version 4 evaluation index in advance, and examine the development plan through SWOT analysis. Through this, basic principles for GCI improvement and utilization will be established, and new indicators related to the GCI version 5 questionnaire will be discovered and suggested. This paper is expected to be used as basic data for GCI performance analysis and improvement plan. In addition, it is intended to contribute to enhance the effectiveness of GCI and the nation's cybersecurity capabilities by proposing more advanced proactive and reactive indicators to be applied to the future GCI evaluations. This paper is an improvement and development for the research result of [1].

사이버 안보 대응 역량 강화방안 연구

  • An, Yoo-Seong
    • Review of KIISC
    • /
    • v.24 no.6
    • /
    • pp.60-68
    • /
    • 2014
  • 최근 현실 공간에서의 물리적 공격(Hard Attack)이 가상공간을 통한 사회 공학적 공격 및 정보기반통신망 공격(Soft Attack)으로 변화하고 있다. 이에 따라 군사(방위산업) 및 국가 주요정책정보에 대해 정보통신망을 통한 각종 정보의 해킹등 전자정부 사회간접시설 및 공공서비스의 기능에 대한 침해가 빈발하고 있다. 사이버공간에서의 국가안전보장을 위한 활동은 사후방어보다는 사전예방이 중요하며, 이를 위해서는 사이버공격 징후의 포착과 종국적인 책임기관에 의한 통합적 대비가 필요하다. 이러한 업무를 효율적으로 수행하기 위해서는 대통령실을 정점으로 국가안전보장을 종국적으로 책임지는 기관이 국가 사이버위기의 예방 및 방어 전략을 체계적 통합적 관리할 수 있도록 입법적 대응방안을 마련하는 것이 매우 시급한 과제이다.

A Scheme of Training the MND Information Security Manpower (국방 정보보호 인력 양성 방안)

  • 박상서;최운호
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.69-81
    • /
    • 2001
  • As soon as possible, our military have to trainning the information security manpower for Cyber Warfare, it should be block the foreign infowarrior to go by way of other country from our system. An emergency, we can protect our military information system and this thesis provide checkpoint about how we consider about trainning the infowarrior for future war.

  • PDF

A Study on Developing Assessment indicators for Cyber Resilience (사이버 레질리언스 평가지표 개발에 관한 연구)

  • Kim, Sujin;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.137-144
    • /
    • 2017
  • Recently, cyber resilience has emerged as an important concept, recognizing that there is no perfect security. However, domestic researches on cyber resilience are insufficient. In this study, the 22 indicators for cyber resilience assessment were initially developed by the literature survey and discussions with security experts. The developed indicators are reviewed using the Focus Group Interview method in terms of materiality and feasibility of the indicators. This study derived meaningful and useful indicators for the assessment of cyber resilience, and it is expected to be used as a foundation for the future cyber resilience studies. In order to generalize and apply the results of this study in practice, it is necessary to carry out quantitative researches in the future.

A Study on establishing the Role of Intelligence Agency on Cybersecurity - Focusing on Revision or Enactment of Cybersecurity related Bill - (정보기관의 사이버안보 역할 정립에 관한 연구 -사이버안보관련 법안 제·개정안을 중심으로-)

  • Yoon, Oh Jun;Kim, So Jeong;Jeong, Jun Hyeon
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.45-52
    • /
    • 2018
  • As the era of the 4th Industrial Revolution has progressed and the information and communication technologies have developed dramatically, the cyber threats will gradually become more intelligent and sophisticated. Therefore, in order to take systematic and prompt action in case of an accident while preparing measures against the threat, the role of intelligence agency is important. However, Korea is having difficulty in responding to the threats due to the lack of support for the national cybersecurity bill or the amendment bill of the National Intelligence Service. In this paper, I examine the cybersecurity function of the intelligence agency, the recent debate trends, and implications for the role of intelligence agency in our current situation. And then I intend to suggest some measures such as concentration on information gathering and analysis, enhancement of cyber threat prediction and response capacity, and strengthening of legal basis as a way to establish the role of intelligence agency for reinforcement of cybersecurity performance system.

  • PDF

The Model to Implement the Cyber Security Policy and Strategy for Azerbaijan Information System (아제르바이잔 정보시스템에 대한 사이버보안 정책과 전략의 실행모델 구축)

  • Aliyeva, Leyla Mehdi;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.23-31
    • /
    • 2019
  • This study aims to build an AHP model that evaluates the priority of cyber security policies for the Azerbaijan information system. For this, 4 factors were constructed from components of ITU National Interest Model, whereas 5 alternatives were based on the best practices of the eight developed countries leading the cyber security field. Using the questionnaire, 24 security experts evaluated the strategic priority of such factors or alternatives. The analysis results using the AHP software showed that homeland defense and economic well-being were the dominant aspects of cyber security policy, whereas capacity building and infrastructure were the main concern of cyber security elements for Azerbaijan. This study presents the strategic priority of cyber security policies that can be adopted by Azerbaijan government. This study can contribute to developing the national cyber security guide of Azerbaijan.

Analyses of Impact on Business Performance of Information Security Companies: The Perspective of Mediating Effects of Organizational and Innovative Capabilities (정보보호 기업의 경영성과에 미치는 영향 분석: 조직 및 혁신 역량의 매개 효과의 관점에서)

  • Shin, HyunMin;Kim, Injai
    • Knowledge Management Research
    • /
    • v.22 no.4
    • /
    • pp.157-172
    • /
    • 2021
  • Information security companies were established in earnest from the mid-late 1990s to early 2000s, far shorter than other national key industries. Nevertheless, the information security industry has made rapid progress. It is expected that the proportion of the information security industry will increase rapidly with the development of advanced technology along with the 4th industrial revolution. As COVID-19, which occurred at the end of 2019, spreads around the world in 2020, non-face-to-face services and digital transformation are accelerating, and cyber threats to users are also increasing. However, there are limitations in responding to new Cyber Security threats due to the shortage of information protection manpower, insufficient security capabilities of domestic companies, and the narrow domestic information protection market. This study examines the external environmental factors of information security companies such as government information protection system operation, government influence, government support, partnership between information security companies, and internal environmental factors such as top management support, financial status, human resources, organizational capability, This study was conducted using empirical data to analyze whether it affects innovation capability and whether organizational capability and innovation capability affect financial and non-financial performance. The results of this study can be used as basic data to suggest policies and implications for information security, and to strengthen the competitiveness of the information security industry.

Design and Implementation of Cyber Range for Cyber Defense Exercise Based on Cyber Crisis Alert (사이버위기 경보 기반 사이버 방어 훈련장 설계 및 구축 연구)

  • Choi, Younghan;Jang, Insook;Whoang, Inteck;Kim, Taeghyoon;Hong, Soonjwa;Park, Insung;Yang, Jinsoek;Kwon, Yeongjae;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.805-821
    • /
    • 2020
  • Cyber defense exercise should require training on the latest cyber attacks and have a similar process to defense cyber attacks. In addition, it is also important to train on cyber resilience that can perform normal tasks or support equivalent tasks regardless of cyber attacks. In this paper, we proposed and developed a cyber range that can strengthen the elements of cyber resilience by performing cyber defense exercise in real time based on the cyber crisis alert issued when a cyber attack occurs in Korea. When BLUE, YELLOW, ORANGE, and RED warnings are issued according to the cyber crisis, our system performs proactive response, real time response, and post response according to the alarm. It can improve trainee's capability to respond to cyber threats by performing cyber defense exercise in a cyber crisis environment similar to the actual situation of Korea.

Research on System Architecture and Methodology based on MITRE ATT&CK for Experiment Analysis on Cyber Warfare Simulation

  • Ahn, Myung Kil;Lee, Jung-Ryun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.31-37
    • /
    • 2020
  • In this paper, we propose a system architecture and methodology based on cyber kill chain and MITRE ATT&CK for experiment analysis on cyber warfare simulation. Threat analysis is possible by applying various attacks that have actually occurred with continuous updates to reflect newly emerging attacks. In terms of cyber attack and defense, the current system(AS-IS) and the new system(TO-BE) are analyzed for effectiveness and quantitative results are presented. It can be used to establish proactive cyber COA(Course of Action) strategy, and also for strategic decision making. Through a case study, we presented the usability of the system architecture and methodology proposed in this paper. The proposed method will contribute to strengthening cyber warfare capabilities by increasing the level of technology for cyber warfare experiments.