• Title/Summary/Keyword: 사이버테러

Search Result 240, Processing Time 0.027 seconds

과학기술과 군사력

  • 한국과학기술단체총연합회
    • The Science & Technology
    • /
    • v.35 no.6 s.397
    • /
    • pp.47-76
    • /
    • 2002
  • [과학기술과 전쟁사] "과학기술력 있는 국가가 역사의 주인공"/ [로봇- 무인병기] 첨단로봇이 전략전술도 바꾼다/[항공우주전] 민간 피해 안주는 우주전 실현/[원자력-핵무기]핵무기 보유는 국가안보의 잣대/[정보화전] 빛의 속도로 전개되는 사이버테러/[해양전] '바다의 안보' 장악하는 이지스함/[생화학 무기] 생화학은 가난한 나라의 핵무기/[과학기술과 미래전쟁] 미래전쟁은 기계들의 전투

  • PDF

An analysis of Changes of International Terrorisms of IS (IS테러를 중심으로 한 국제테러의 변화양상 분석)

  • Oh, Seiyouen
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.3
    • /
    • pp.429-435
    • /
    • 2015
  • This study analyzes the changes of international terrorisms which are caused by IS through literature investigation, statistics and case analysis, and gives an understanding about recent trend of the terrorisms and aggressive method. Moreover, this study is for presenting a basic standard about an effective counterplan of the terrorisms. The results of this study are summarized as follows. First of all, there is a change of terrorism that homegrown terrorism grows into wolf-pack terrorism. Second, the terrorists show psychological terror by expanding their targets and using brutal and indiscriminate terrorism attacks. Third, the terrorists use networks of internet and SNS as a resource and as a tool for publicity activities of their groups. Forth, the terrorists have form of global organization through ties of other terrorists like middle-east or Africa.

A Study on the Counter-Measures for International Events through the Case Studies and Its Implications for Counter-Terrorism Policy (국제 행사에 대한 테러대응 사례분석과 정책적 함의)

  • Park, Dong-Kyun;Shin, Ik-Chu
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.161-179
    • /
    • 2007
  • The numerous definition of terrorism is viewed as the use of force or violence by individual or group that is directed toward civilian populations and intended to instill fear as a means of coercing individuals or groups to change their political or social positions. Recently, the paradigm of terror has been developed as new terrorism motivated by 9. 11 terror in 2001. In these contexts, this study analyzed the case study of recent counter-terrorism of international events and suggested the policy implications. This study is split into four chapters. Chapter I is the introduction part. Chapter II introduces the reader to new terrorism theory, and Chapter III deals with the case study of the international counter-terrorism policy around the world, Chapter IV deals with the policy implications of the case study. The greater the political, economical and social advantages opening large international ceremonies, the larger the probability of being targets for terrorists and criminals. As terrorism is one of the important issue, the security problems at international ceremonies in Korea, rising country as political essence in Asian-Pacific region, become very important. With experienced know-hows against terror and preparations for security, local and central governments must promote the private security companies filling up vacancies of police and official security system and develop international ceremonies, rising high valuable industries in 21st century, with diplomatic efforts. International major events is the largest event related events with politics, economy, culture, and such large-scale events should be a comprehensive counterplan in the light of safety check for the location of a hazard and safety check of facilities in and out, attendance on athlete and visitor and escort of VIPs.

  • PDF

A Study on Building a Cyber Attack Database using Open Source Intelligence (OSINT) (공개출처정보를 활용한 사이버공격 데이터베이스 구축방안 연구)

  • Shin, Kyuyong;Yoo, Jincheol;Han, Changhee;Kim, Kyoung Min;Kang, Sungrok;Moon, Minam;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.113-121
    • /
    • 2019
  • With the development of the Internet and Information Communication Technology, there has been an increase in the amount of Open Source Intelligence(OSINT). OSINT can be highly effective, if well refined and utilized. Recently, it has been assumed that almost 95% of all information comes from public sources and the utilization of open sources has sharply increased. The ISVG and START programs, for example, collect information about open sources related to terrorism or crime, effectively used to detect terrorists and prevent crime. The open source information related to the cyber attacks is, however, quite different from that in terrorism (or crime) in that it is difficult to clearly identify the attacker, the purpose of attack, and the range of damage. In addition, the data itself of cyber attacks is relatively unstructured. So, a totally new approach is required to establish and utilize an OSINT database for cyber attacks, which is proposed in this paper.

Security Problems in Aircraft Digital Network System and Cybersecurity Strategies (항공기 디지털 네트워크 시스템 보안 문제점과 사이버 대응 전략)

  • Lim, In-Kyu;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.6
    • /
    • pp.633-637
    • /
    • 2017
  • Cyber attacks on aircraft and aeronautical networks are not much different from cyber attacks commonly found in the ground industry. Air traffic management infrastructure is being transformed into a digital infrastructure to secure air traffic. A wide variety of communication environments, information and communications, navigation, surveillance and inflight entertainment systems are increasingly threatening the threat posed by cyber terrorism threats. The emergence of unmanned aircraft systems also poses an uncontrollable risk with cyber terrorism. We have analyzed cyber security standards and response strategies in developed countries by recognizing the vulnerability of cyber threats to aircraft systems and aviation infrastructure in next generation data network systems. We discussed comprehensive measures for cybersecurity policies to consider in the domestic aviation environment, and discussed the concept of security environment and quick response strategies.

새해 이렇게 달라진다

  • Korea Electronics Association
    • Journal of Korean Electronics
    • /
    • v.21 no.1
    • /
    • pp.44-47
    • /
    • 2001
  • 올해부터 사이버공간에서의 명예훼손, 음란물 유통, 스토킹, 해킹, 바이러스 유포 등 사이버테러에 대한 처벌이 강화된다. 또 과기부의 주요 사업 및 제도가 정부주도의 과학기술 혁신 시스템에서 민간주도의 장기 시장 창출 형 시스템으로 변모한다. 이와 함께 거래소나 코스닥시장에서 액면가나 공모가 이하로 거래되는 주식에 대해서도 거래 세를 내야 하는 등 국민생활과 관련된 세제들이 대거 바뀌게 된다. 산업ㆍ정보통신ㆍ과학기술ㆍ문화ㆍ금융ㆍ기업ㆍ환경 등 각 분야에서 새해부터 달라지는 제도 등을 알아본다.

  • PDF

The probable use of UAV(Unmanned Aerial Vehicle) in crime, cybercrime, and terrorism and responses (무인기 개발과 범죄, 사이버 범죄, 테러 활용 가능성과 대응방안)

  • Joh, Hyeon-Jin;Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.189-216
    • /
    • 2016
  • In March 2015, the North Korean UAVs (Unmanned Aerial Vehicles) were found and countries around the world have actively developed UAVs. UAVs or Drone have become commercialized and more civilians use UAVs for leisure. The positive possibilities of UAV use expand. However, there could be the negative sides of UAV use. The UAVs could be used for the purpose of various crime, cybercrime, and terrorism. For instance, hacking devices attached drone could be infiltrated into the sensitive networks to steal personal informations and public data. This could be a new dimension of cybercrime. As the number of internet users and cyberspace rapidly expands, problems of crimes could be worsened both quantitatively and qualitatively. By contrast, defensive measures against such threats are limited. Especially, the Korean society is vulnerable despite its well-advanced internet and computer network technology. This article investigates the current UAV types and its developments, discusses various possibilites of UAV-related crime, cybercrime, and terrorism, and proposes responses.

  • PDF

A Study on the Application of International Conventions to Respond to Cyber Threats in Civil Aviation (민간항공의 사이버위협 대응을 위한 국제협약 적용에 관한 연구)

  • Park, Man-Hui
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2023.11a
    • /
    • pp.41-42
    • /
    • 2023
  • 항공편과 승객의 흐름을 효율적으로 처리하기 위한 디지털 시스템에 대한 의존도 증가와 승객용 기내 와이파이 서비스 등으로 인해 민간항공의 사이버 보안 취약성은 매년 증가하고 있는데 비해 공항에 대한 무장 공격, 항공기에 폭발물 설치 및 납치와 같은 전통적인 테러에 맞춰 마련된 항공보안 관련 국제협약은 사이버 위협에 직접적으로 적용하기 어렵다는 문제를 갖고 있다. 본 연구는 민간항공에 대한 사이버 공격의 예방 및 기소와 관련된 국제협약의 적정성을 검토한 후, 사이버 위협 대응을 위한 기존 국제협약 체계, 잠재적 차이 해석 등을 중점적으로 분석하여 민간항공의 안전을 위협하는 불법방해행위로부터 중요정보 및 시스템을 보호하는 항공 사이버 보안 국제표준 마련 및 이행 촉진을 강조하고자 한다.

  • PDF

A Study on the Necessity of Establishing the National Cyber Security Act through a Comparative Legal Analysis (국내 관련 법과 비교 분석을 통한 국가사이버안보법안의 제정 필요성 연구)

  • Kim, Sung-Hyun;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.9-35
    • /
    • 2018
  • During the recent years, cyber attacks have been increasing both in the private sector and the government. Those include the DDOS cases in 2009, the Blue House cyber attack, bank hackings etc. Cyber threats are becoming increasingly serious. However, there is no basic law related to cyber security at present, and regulations related to cyber security are scattered in various domestic laws. This can lead to confusion in the application of the law and difficult to grasp the regulations related to cyber security. In order to overcome this situation, the bill on the prevention and countermeasures against cyber crisis was initiated in 2006, but it has been abrogated. Since then, it has been repeatedly proposed, but it has been abrogated repeatedly due to the overlapping of existing laws and concerns about infringement of personal information. The most recent initiative was the National Cyber Security Act, which was initiated by the government in January 2017. The act focuses on resolving the absence of a basic law related to cyber security, strengthening its responsiveness in the event of a cyber security crisis, and fostering security strength. Therefore, this study seeks to contribute to the establishment of National Cyber Security legislation as a basic law of cyber security by examining the necessity of National Cyber Security legislation through comparative legal analysis with existing domestic laws related to cyber security and suggesting policy implications.

A Study on Inspection Tools for Cyber Security on Nuclear Facilities (원자력시설의 사이버보안 검사를 위한 점검툴 활용에 관한 연구)

  • Byun, Ye-Eun;Kim, Hyun-Doo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.274-276
    • /
    • 2016
  • 2014년 12월, 한국수력원자력의 사이버테러, 이란의 원자력 농축시설을 대상으로 한 사이버공격 등 국내외에서 원자력시설을 대상으로 한 사이버공격이 발생하고 있다. 이에 따라, 사이버보안 중요성이 증가하면서 방사선 재해방지와 공공의 안전을 위한 효과적인 규제체계의 필요성이 증가하였다. 한국원자력통제기술원은 개정된 방사능방재법에 따라 2014년부터 사이버보안 정기검사를 수행하고 있으며, 정기검사에 활용할 취약점 점검툴을 통해 정기검사의 효과성 및 수행능력을 향상시키고자 한다.