• Title/Summary/Keyword: 사이버 위험관리

Search Result 88, Processing Time 0.026 seconds

Design of Information Security Management for Industrial Control System (산업제어시스템을 위한 정보보호 관리체계 설계 방안 연구)

  • Jo, Young-Hyun;Lee, Eun-Kyoung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.311-314
    • /
    • 2016
  • 지난 5년간 대표적인 산업제어시스템(Industrial Control System)인 국내 원자력 발전소에 대한 해킹 시도는 총 1,843회로 사이버공격에 대한 위험은 날로 높아지고 있다. 이러한 공격은 사이버전, 테러, 사이버범죄자들에 의해 실행되고 있다. 이러한 위험을 통제하기 위해서는 산업제어시스템이 일반적인 IT시스템과 다른 운영체제, 네트워크 등 시스템 환경을 고려하여야 한다. 본 논문에서는 기존의 IT보안 대책과 산업제어시스템 보안 대책을 비교 분석하고, 국내외에서 발생하고 있는 산업제어시스템에 대한 공격 사례를 비교 분석하여 산업제어시스템 인프라에서 고려하고 통제해야 할 정보보호 요소들을 제언한다.

  • PDF

A Study on Risks of Big Data (빅데이터의 위험 요소에 대한 고찰)

  • Yoonsoo Cheon;Jaekyung Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.631-633
    • /
    • 2023
  • 본 논문에서는 빅데이터의 활용이 확산되는 현대 사회에서 빅데이터의 수집, 관리, 이용 등에서 나타날 수 있는 문제를 확인하고 그 문제에 대한 기존의 대응 방법과 보완점을 시사한다. 빅데이터의 위험성은 개인 정보유출, 디지털 디바이드, 편향성과 신뢰성, 의존성과 통제 가능성 등이 있다. 해당 문제는 빅데이터의 보편화가 가중될수록 큰 규모의 사회적 문제로 대두될 가능성이 높다. 이를 보완하기 위한 대응 방법을 크게 기술적 대응, 법적 대응, 사회적 대응으로 나누어 알아보고 각 부분의 취약점을 분석하여 개선의 방향을 제시한다.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

위험관리 측면에서의 제어시스템 보안 표준 동향

  • Park, So Hyeon;Lee, Yong Ju;Lee, Kyung Ho
    • Review of KIISC
    • /
    • v.25 no.5
    • /
    • pp.45-52
    • /
    • 2015
  • 최근 산업제어시스템에 대한 중요성이 강조되는 반면 사이버 보안 위협은 증가하고 있다. 전 세계적으로 제어시스템에 대한 보안 표준 개발에 집중하고 있으며 미국을 비롯한 나라에서는 산업제어시스템에 대한 표준 및 가이드라인을 공개하고 있다. 본 논문에서는 산업제어시스템에 대한 특징을 알아보고 관련 보안 표준 및 가이드라인을 분석하여 우리나라의 산업제어시스템을 보호하기 위해 나아가야 할 개선 방향에 대해 논하고자 한다.

Securing Safety in Collaborative Cyber-Physical Systems Through Fault Criticality Analysis (협업 사이버물리시스템의 결함 치명도 분석을 통한 안전성 확보)

  • Hussain, Manzoor;Ali, Nazakat;Hong, Jang-Eui
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.8
    • /
    • pp.287-300
    • /
    • 2021
  • Collaborative Cyber-Physical Systems (CCPS) are those systems that contain tightly coupled physical and cyber components, massively interconnected subsystems, and collaborate to achieve a common goal. The safety of a single Cyber-Physical System (CPS) can be achieved by following the safety standards such as ISO 26262 and IEC 61508 or by applying hazard analysis techniques. However, due to the complex, highly interconnected, heterogeneous, and collaborative nature of CCPS, a fault in one CPS's components can trigger many other faults in other collaborating CPSs. Therefore, a safety assurance technique based on fault criticality analysis would require to ensure safety in CCPS. This paper presents a Fault Criticality Matrix (FCM) implemented in our tool called CPSTracer, which contains several data such as identified fault, fault criticality, safety guard, etc. The proposed FCM is based on composite hazard analysis and content-based relationships among the hazard analysis artifacts, and ensures that the safety guard controls the identified faults at design time; thus, we can effectively manage and control the fault at the design phase to ensure the safe development of CPSs. To justify our approach, we introduce a case study on the Platooning system (a collaborative CPS). We perform the criticality analysis of the Platooning system using FCM in our developed tool. After the detailed fault criticality analysis, we investigate the results to check the appropriateness and effectiveness with two research questions. Also, by performing simulation for the Platooning, we showed that the rate of collision of the Platooning system without using FCM was quite high as compared to the rate of collisions of the system after analyzing the fault criticality using FCM.

A Study on the Security Management for Critical Key Infrastructure(SCADA) (중요핵심기반시설(SCADA)에 대한 보안 관리 연구)

  • Kim InJung;Chung YoonJung;Koh JaeYoung;Won Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8C
    • /
    • pp.838-848
    • /
    • 2005
  • Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management techniques. This paper attempts to propose such security management techniques, including information protection measures and troubleshooting, based on a risk analysis process concerning assets, threats/vulnerability, and hazards, and to examine the security management status of critical key infrastructure in the U.S. and Japan.

에너지 기업에 대한 정보보호 관리체계 발전방향

  • You, Young in;Jung, Su Yun;Lee, Kyung Ho
    • Review of KIISC
    • /
    • v.24 no.5
    • /
    • pp.51-58
    • /
    • 2014
  • 국내 IT 인프라 수준은 세계 최고임에도 불구하고 그에 미치지 못하는 정보보안체계로 많은 사이버 위협에 노출되어 있다. 이는 산업제어시스템 또한 점차 온라인상으로 제어되기 시작하면서, 국가 기반 시설인 에너지 기업에도 문제가 확대되고 있다. 산업제어시스템인 원자력 발전소 SCADA 시스템의 경우 최근 이란에서 스턱스넷 공격으로 인해 발전소 가동이 중단되는 사태가 발생하기도 하였다. 이러한 사이버 보안 위협 에 대응하기 위해 현재 도입된 정보보안체계는 다양한 분야별로 충분한 이해를 바탕으로 그 성격에 맞게 적용이 되어야 하지만 획일화 된 기준과 평가방식으로 비효율적인 결과를 만들고 있다. 이러한 문제를 인식하고 에너지 분야에 초점을 맞추어 그에 적합한 특화된 정보보호 관리체계를 수립하는 동시에 평가지수의 제도화 및 활성화를 제안하고자 한다. 이 제안을 통해 에너지기반 시설 위험을 방지하고 각종 위협에 대처능력이 향상 될 것을 기대한다.

Improving the Efficiency of Cybersecurity Risk Analysis Methods for Nuclear Power Plant Control Systems (원전 제어시스템 사이버보안 위험 분석방법의 효율성 개선)

  • Shin-woo Lee;Jung-hee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.537-552
    • /
    • 2024
  • Domestic nuclear power plants operate under the establishment of the "Information System Security Regulations" in accordance with the Nuclear Safety Act, introducing and implementing a cybersecurity system that encompasses organizational structure as well as technical, operational, and managerial security measures for assets. Despite attempts such as phased approaches and alternative measures for physical protection systems, the reduction in managed items has not been achieved, leading to an increased burden on security capabilities due to limited manpower at the site. In the main text, an analysis is conducted on Type A1 assets performing nuclear safety functions using Maintenance Rules (MR) and EPRI Technical Assessment Methodology (TAM) from both a maintenance perspective and considering device characteristics. Through this analysis, approaches to re-evaluate the impact of cyber intrusions on asset functionality are proposed.

A Study on Risk Analysis Methode Using Case-Based Reasoning (사례기반 추론을 이용한 위험분석방법 연구)

  • Lee, Hyeak-Ro;Ahn, Seong-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.135-141
    • /
    • 2008
  • The risk enlargement of cyber infringement and hacking is one of the latest hot issues. To solve the problem, the research for Security Risk Analysis, one of Information Security Technique, has been activating. However, the evaluation for Security Risk Analysis has many burdens; evaluation cost, long period of the performing time, participants’ working delay, countermeasure cost, Security Management cost, etc. In addition, pre-existing methods have only treated Analyzing Standard and Analyzing Method, even though their scale is so large that seems like a project. the Analyzing Method have no option but to include assessors’ projective opinion due to the mixture using that both qualitative and quantitative method are used for. Consequently, in this paper, we propose the Security Risk Analysis Methodology which manage the quantitative evaluation as a project and use Case-Based Reasoning Algorithm for define the period of the performing time and for select participants.

A Proposal of Risk Management Framework for Design as a Secure Power Control System (안전한 전력 제어시스템 설계를 위한 위험관리 프레임워크 제안)

  • Park, Jun Yong;Shin, Sumin;Song, Kyoung-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.425-433
    • /
    • 2016
  • In smart grid, enhancement of efficiency and interoperability of electric power system is achieved through the connection with outer network, and this induces that power grid system is threatened increasingly, becomes the main target of cyber terrorism, and is sincerely required to design the secure power system. Although SSDLC(Secure System Development Life Cycle) is used for risk management from the design phase, traditional development life cycle is somewhat limited for satisfaction of information security indicator of power control system. Despite that power control system should reflect control entities of information security considering its own characteristics, validation elements are insufficient to apply into real tasks based on existing compliance. To make design of diagnostic model and assessment process for power control system possible and to give a direction for information security and present related indicator, we propose the new risk management framework of power control system which is applied operational security controls and standard architecture presented by IEC 62351 TC 57 with enterprise risk management framework.