• Title/Summary/Keyword: 사이버테러

Search Result 240, Processing Time 0.022 seconds

Analysis of US policy for Homeland Security (국토안보를 위한 미국의 대응 정책 분석 : 국토안보법을 중심으로)

  • 김현수;박상서
    • Convergence Security Journal
    • /
    • v.3 no.1
    • /
    • pp.39-50
    • /
    • 2003
  • Since the September 11, 2001, the United States has shift their national security policy for homeland from preventing or/and reducing foreign threats to ensuring domestic security. We learned from recent incident, 1.25 Internet Disaster, that it is urgent to establish cyber security policy for our nation. In this paper; therefore, I analyze the US homeland security policy, the Homeland Security Act of 2002 establishment, and cyber security-related part in this act.

  • PDF

Implications on Policy Changes of the National Infrastructure Protection Plan in the United States (미국 핵심기반보호정책의 변화 고찰을 통한 시사점)

  • Kim, Younhee;Jeong, Seul-Gi
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2022.10a
    • /
    • pp.423-424
    • /
    • 2022
  • 본 연구에서는 미국의 국가핵심기반보호제도의 변화에 대해 고찰하고 시사점을 도출한다. 이를 위해 9/11 테러 공격 이후 국가핵심기반보호계획(National Infrastructure Protection Plan)을 중심으로 관련 법률 및 제도와 조직변화를 추적하고 고찰하였고, 이들의 관계를 도식화하여 타임라인(timeline)분석을 실시하였다. 본 연구를 통해 국토안보대통령령-8호(HSPD-8), 대통령령-21호(PDD-21), 사이버보안과 핵심기반법(Cybersecurity & Infrastructure Act)등의 관련 법제 변화를 통해 총 3가지 버전의 NIPP이 있음을 확인할 수 있었으며, 2018년에 사이버보안과 주요인프라청(CISA)이 창설되어 국가핵심기반보호제도업무를 이곳으로 이관하여 운영되고 있음을 알 수 있었다. 또한 국가핵심기반을 보는 관점이 9/11 테러 공격 이후 주요 핵심기반 보호(Protection)에서 주요핵심기반의 복원력(Resilience)제고로 변화하고 있음을 도출하였다.

  • PDF

The Trend of Aviation Terrorism in the 4th Industrial Revolution Period and the Development Direction for Domestic Counter Terrorism of Aviation (제4차 산업혁명 시대의 항공 테러리즘 양상 및 국내 항공테러 대응체계 발전방향)

  • Hwang, Ho-Won;Kim, Seung-Woo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.155-188
    • /
    • 2017
  • On the one hand, the 4th Industrial Revolution provides a positive opportunity to build a new civilization paradigm for mankind. However, on the other hand, due to the 4th Industrial Revolution, artificial intelligence such as 'Goggle Alpha Go' revolutionized and even the human ability was replaced with a 'Silicon Chip' as the opportunity to communicate decreases, the existence of human beings is weakened. And there is a growing concern that the number of violent crimes, such as psychopath, which hunts humans as games, will increase. Moreover, recent international terrorism is being developed in a form similar to 'Psychopathic Violent-Crime' that indiscriminately attacks innocent people. So, the probability that terrorist organizations abuse the positive effects provided by the Fourth Industrial Revolution as means of terrorism is increasing. Therefore, the paradigm of aviation terrorism is expected to change in a way that attacks airport facilities and users rather than aircraft. Because airport facilities are crowded, and psychopathic terrorists are easily accessible. From this point of view, our counter terrorism system of aviation has many weak points in various aspects such as: (1) limitations of counter-terrorism center (2) inefficient on-site command and control system (3) separated organization for aviation security consultation (4) dispersed information collection function in government (5) vulnerable to cyber attack (6) lack of international cooperation network for aviation terrorism. Consequently, it is necessary to improve the domestic counter terrorism system of aviation so as to preemptively respond to the international terrorism. This study propose the following measures to improve the aviation security system by (1) create 'Aviation Special Judicial Police' (2) revise the anti-terrorism law and aviation security law (3) Strengthening the ability respond to terrorism in cyberspace (4) building an international cooperation network for aviation terrorism.

  • PDF

Establishment of Korea National Counter-terrorism System and Development Plan (국가대테러체제의 구축 및 발전방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.229-249
    • /
    • 2015
  • As the post-cold war era and globalization go on, national security problems which were not traditional national security problems such as terrorism, crime, environmental disasters, economic crises, cyber-terrorism, diseases, and energy problems threat humanity and nations and demands changes. Also, with the change, the concept of "big government" has emerged as the role of nation expanded. The modern society sees every country change from small government to big government in order to realize the establishment of welfare state. A comprehensive interpretation of security is needed in order to comprehensive protection of citizens beyond outside invasion such as crime, new disaster, terrorism. In Korea, incidents such as Cheonan-Ham, Yeonpeyong-Do, foot-and-mouth disease, Ddos terrorism, pirates hostages, mad cow disease, AI are happening and the humanitarian support for North Korea and the summit of South and North Korea are at a standstill. Also, National emergency management system, comprehensive emergency management center, countrol tower, national security system, cooperation with citizens, establishment of legal and institutional system are needed. The importance of this research is on the reestablishment of new national security and emergency management system according to the comparison between the national security and counter-terrorism system of Korea and that of the United States which is a leading country in this field. Also, the establishment of national emergency management act is needed as a statute for effective function as currently various laws and administrative organizations are dispersed.

  • PDF

Research on National Cybersecurity Policy Preparing for the Reunification of North Korea and South Korea (남북통일을 대비한 국가사이버안보 정책 연구)

  • Ham, Seung-hyeon;Park, Dae-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.358-361
    • /
    • 2016
  • The North and South Korea for the peaceful reunification of the Republic of Korea, to lead the transformation and reform, and to complement the policy making and negotiations, there is a need for cyber security policy to practice. This paper explores the definition and overseas cyber terrorism and cyber warfare correspondence, correspondence between the versions of the technology between versions. Analysis of cyber security activities in the North and South confrontation, and research the cyber security policy against the unification. In this study, we compared the unification to build and operate a secure cyberspace from cyber threats and cyber security policy suggestions for ways of rational and legal.

  • PDF

A Study on Economic Effects on Cyber Protection (사이버정보보호의 경제적 효과에 관한 연구 - 경제적 효과 추정방법론 수립을 중심으로 -)

  • Shin, Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.475-478
    • /
    • 2012
  • Cyberspace is becoming increasingly important. Incidentally, there exist possibilities of the industrial secrets leaked, cyber attacks, privacy protection problems. In addition, there are growing concern of cyber war between nations. Thus potential hazards in cyberspace and the extent of damage are getting bigger. Therefore, a systematic understanding of cyber damage and damage scale is very important and damage estimation method should be developed to establish solid cyber protection system. In this study, current and potential damage types are understood and damage scales are surveyed based on the analysis of existing studies and try to develop a reasonable methods to estimate economic effects of cyber protection.

  • PDF

Damage Prediction of Infomation and Communication Facilities for Prolonged Power Outage (장기간 정전사태에 대비한 기반시설-정보통신시설-에서의 피해예측)

  • Song, Chang Young;Cho, In Uh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.81-87
    • /
    • 2012
  • Critical infrastructures (energy, information technology and communications, banking, transportation, public government services, etc.) are now more vital to modern society. Citizens, businesses and governments all rely on an array of interlinked physical and information infrastructures to satisfy their needs and perform their daily operations. At the same time, these infrastructures are becoming increasingly interdependent, such that failure of one of them can often propagate and result in domino effects. Recent dramatic episodes, from 9/11 to the Madrid train bombings, the April 2010 ash cloud the power cuts in Korea in 2011, and the cyber-attacks have highlighted the need for a comprehensive, internationally coordinated policy for the protection of critical infrastructures. For the purposes of this report, we define critical infrastructure as infrastructure whose failure would result in substantial damage to society and/or the economy.

국내 정보통신기반보호법과 일본 사이버 보안 기본법에 대한 비교를 통한 고찰

  • Han, Do-Seok;Han, Deok-Ho;Youm, Heung-Youl
    • Review of KIISC
    • /
    • v.25 no.3
    • /
    • pp.44-51
    • /
    • 2015
  • 최근 발생한 3.20 사이버 테러나 6.25 사이버 공격은 우리나라의 주요정보통신시설을 목표로 하였으며, 공격방법은 점점 지능화되고 첨단화 되어가고 있다. 특히 한수원(한국수력원자력) 해킹 사건으로 기반시설에 대한 보안의 중요성은 점점 커지고 있다. 기반시설에 대한 해킹은 다른 전산망 해킹 및 바이러스 유포 등에 의한 피해보다 인명 피해와 경제적 손실이 크므로 더 큰 이슈가 되고 있다. 이러한 이유로 국내에서는 정보통신기반시설의 중요성을 알고 2001년부터 "정보통신기반 보호법"을 제정하여 중요성이 높은 시설을 주요정보통신기반시설로 지정하여 보호하고 있다. 또한 최근 일본에서는 국내의 "정보통신기반보호법"과 유사한 "사이버 보안 기본법"을 2014년 11월 6일에 채택하였다. 이에 따라 본 논문에서는 국내의 "정보통신기반 보호법"과 일본의 "사이버 보안 기본법"에 대하여 비교를 통해 고찰하고자 한다.

정책 기반의 정보보호 시스템 관리기술

  • 신영석;장종수
    • Review of KIISC
    • /
    • v.13 no.1
    • /
    • pp.13-21
    • /
    • 2003
  • 정보통신 기술의 발전과 인터넷의 사용자 증가로 인해 인터넷은 사회 각 분야에 다양하게 활용되고 있으나, 해킹 및 사이버테러에 대한 역기능이 증가되고 있는 실정이다. 최근 이를 위한 정보보호 시스템과 정보보호 관리기술이 연구 개발되고 있다. 본 고에서는 인터넷에 구축되어 있는 다양한 방화벽, 침입탐지 시스템 등의 정보보호 시스템을 효율적으로 관리하기 위해 인터넷에서 정책 기반의 정보보호 시스템에 대한 관리기술과 이들의 분산 시스템에서 보안정책의 정보공유 기술을 살펴본다.

인터넷전화의 해킹 공격과 방어 방안

  • Chun, Woo-Sung;Park, Dea-Woo
    • Review of KIISC
    • /
    • v.22 no.8
    • /
    • pp.26-30
    • /
    • 2012
  • 인터넷전화(VoIP)는 기존 인터넷망을 이용하여 통화내용을 전달한다. 따라서 일반적인 인터넷서비스가 가지고 있는 취약점을 동일하게 가지고 있다. 또한, 기존 유선전화(PSTN)와 달리 물리적인 접근 없이 원격에서 해킹을 통한 도청이 가능하며, 반국가 집단에 의한 사이버테러 감행 시 기관의 업무전산망과 전화망이 동시에 마비될 가능성이 있다. 본 논문에서는 인터넷전화 보안 위협 중에서 호 가로채기, 통화내용 도청, 서비스 오용에 대한 모의해킹을 한다. 또한 모의해킹 시나리오를 작성하고, 인터넷전화 시험센터에서 모의해킹을 통하여 발견된 취약점을 연구한다. 발견된 인터넷전화 취약점에 대한 공격방어 방안을 제시한다.