• Title/Summary/Keyword: 사이버 위험관리

Search Result 88, Processing Time 0.033 seconds

A Legislative Device for the University's Safety Management System in Terms of Crisis Management Perspective (위기관리관점에서 대학의 안전관리 법제 방안)

  • Bae, Dae-Shik
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.183-196
    • /
    • 2008
  • This research will mainly focus on security issues in a university campus and delve into the risk factors and its characteristics due to the extreme polarization growth, and ultimately conduct research on legislative issues regarding safety & security management. A university campus is a miniature of the society, concentrated with human resources, material resources and knowledge information resources. It is also a region in which various underlying risk factors threaten these resources. However, due to the insensibility of danger and carefree indolence, these risk factors have been ignoring, leaving university campus amidst a "dead zone." Currently, a systematic and synthetic measures not only for safety inside the laboratory but also for the new type of crimes such as cyber crimes and motiveless crime due to extreme polarization, stress, uneasiness about the future, increase of mental illnesses, and drug abuse are urgently required. Therefore, I would like to introduce a legislative program in a crisis management perspective that can prevent universities from danger and protect the resources which would ultimately create a new security system.

An Analysis of the Relative Importance of Security Level Check Items for Autonomous Vehicle Security Threat Response (자율주행차 보안 위협 대응을 위한 보안 수준 점검 항목의 상대적 중요도 분석)

  • Im, Dong Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.4
    • /
    • pp.145-156
    • /
    • 2022
  • To strengthen the security of autonomous vehicles, this study derived checklists through the analysis of the status of autonomous vehicle security. The analyzed statuses include autonomous vehicle characteristics, security threats, and domestic and foreign security standards. The derived checklists are then applied to the AHP(Analytic Hierarchy Process) model to find their relative importance. Relative importance was ranked as one of cyber security management system establishment and implementation, encryption, risk assessment, etc. The significance of this study is to reduce cyber security incidents that cause human casualties as well improve the level of security management of autonomous vehicles in related companies by deriving the autonomous vehicle security level checklists and demonstrating the model. If the inspection is performed considering the relative importance of the checklists, the security level can be identified early.

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

A Study on the Impact of ESG Performance on Firm Risk (ESG 성과가 기업위험에 미치는 영향에 관한 연구)

  • Jung-Hyuck Choy
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.19-26
    • /
    • 2023
  • The impact of environmental, social and governance (ESG) performance on investors' decision-making is growing. Investors' focus on the financial performance of firms in the past is expanding to the non-financial performance of the interests of stakeholders surrounding firms. Against this backdrop, this study conducted a panel regression analysis on firms evaluated by Korea Corporate Governance Service to analyze the impact of ESG performance, a firm's non-financial performance, on firm risk. According to the analysis, ESG performance has a negative (-) effect on all three firm risks (systematic risk, unsystematic risk, and total risk), indicating that the stakeholder theory and risk management theory are supported. The implications of this study are: First, ESG reduces not only unsystematic risk but also broad and indiscriminate systematic risk; Second, investors can reduce the risk of their investment portfolio by executing ESG investments; Third, companies can achieve stable financial performance even in adverse circumstances by utilizing the insurance function of ESG management; Lastly, the government can enhance the stability of the financial market while improving the financial soundness of firms through reasonable ESG-related regulations.

What is the role of big data in water-related disaster mitgiation? (물재해 예방에 있어서 빅데이터의 역할은 무엇인가?)

  • Kam, Jonghun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.81-81
    • /
    • 2020
  • 4차산업 혁명 이후, 빅 데이터는 사이버 공간을 통한 사회적 파장이 큰 사건들에 대한 대중의 정보 수집 패턴을 이해하는 데에 있어서 전에 경험하지 못한 급속한 발전을 이루어 왔다. 사이버 공간에서 이루어지는 대중들의 정보수집 활동을 모니터링하므로서 대중들사이에서 떠오르는 주제나 사건을 파악하기에 좋은 인덱스로 여러 사회 경제분야에 활용되어 왔다. 하지만, 수자원 관리 및 방재관점에서는 이런 빅데이터을 활용한 연구 사례는 찾아 보기 힘들다. 하지만, 이런 빅데이터를 가뭄기에 대중들이 어떻게 반응하였는지를 연구하는 데에 활용될 수 있다. 이 발표에서 발표자는 미국 2011-17년 캘리포니아 가뭄의 선례연구들을 통해 주 또는 국가 범위에서 구글 이용자들의 정보수집 활동을 기록한 구글트렌즈 데이터를 가뭄기동안 대중의 정보 수집량을 바탕으로 가뭄 위험 인지도를 정의하고 대중의 행동 양식을 이해하는 데에 어떻게 활용할 수 있는 지를 소개한다. 첫번째로, 최근 캘리포니아에서 발생한 다년간의 가뭄동안 그 주안의 주민들의 행동양식 분석 결과를 소개한다. 두번째로는 미국 49개의 주에서 지난 2004년부터 2018년동안의 지역적 가뭄에 대한 대중의 가뭄 위험인지도를 시공간적인 양식을 주성분분석기술을 통해 분석한 결과을 소개한다. 끝으로, 발표자는 지난 미국 선례 연구들에서 발표자가 제안한 기술이 어떻게 대한민국에서 홍수나 가뭄 방재에 적용할 수 있으며 앞으로 대한민국을 수재해에 준비된 나라로 만드는 데에 있어서 빅데이터의 역할을 제시하고자 한다.

  • PDF

A Study on the Supplementation of the Korea's National Information Security Manual from the Perspective of Cyber Supply Chain Security (사이버 공급망 보안 관점의 국가 정보보안 기본지침 개선방안 연구)

  • You, Young-in;Bae, Sunha;Kim, So Jeong;Kim, Dong Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.309-327
    • /
    • 2022
  • As ICT convergence is progressing in all industrial fields and creating the global ecosystem of the supply chain is accelerating, supply chain risk related with cyber area are also increasing. In particular. the supply chain of ICT products is very complex in terms of technical and environmental factors to be managed, so it is vert difficult to transparently manage the entire life cycle. Accordingly, the US, UK, and EU, etc. are conducting and establishing cyber supply chainsecurity-related research and policies for ICT product supply chains. Korea also has the plan to establish management system to secure the supply chain of major ICT equipment as a task in the basic plan of the national cybersecurity strategy announced in 2019, but there is no concrete policy yet. So, In this paper, we review the cyber supply chain security management system in the United States and present a supplementary way to the National Information Security Manual in Korea from the perspective of cyber supply chain security. It is expected that this will serve as a reference material for cyber supply chain measures that can be introduced in domestic information security field.

A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity (국방 사이버보안을 위한 RMF-CMMC 공통규정준수 메타모델 개발방안 연구)

  • Jae-yoon Hwang;Hyuk-jin Kwon
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.123-136
    • /
    • 2024
  • The U.S. Department of Defense, leading global cybersecurity policies, has two main cybersecurity frameworks: the Cybersecurity Maturity Model Certification (CMMC) for external defense industry certification, and the Risk Management Framework (RMF) for internal organizational security assessments. For Republic of Korea military, starting from 2026, the Korean version of RMF (K-RMF) will be fully implemented. Domestic defense industry companies participating in projects commissioned by the U.S. Department of Defense must obtain CMMC certification by October 2025. In this paper, a new standard compliance meta-model (R3C) development methodology that can simultaneously support CMMC and RMF security audit readiness tasks is introduced, along with the implementation results of a compliance solution based on the R3C meta-model. This research is based on practical experience with the U.S. Department of Defense's cybersecurity regulations gained during the joint project by the South Korean and U.S. defense ministries' joint chiefs of staff since 2022. The developed compliance solution functions are being utilized in joint South Korean-U.S. military exercises. The compliance solution developed through this research is expected to be available for sale in the private sector and is anticipated to be highly valuable for domestic defense industry companies that need immediate CMMC certification.

A Conceptual Design of Knowledge-based Real-time Cyber-threat Early Warning System (지식기반 실시간 사이버위협 조기 예.경보시스템)

  • Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.1-11
    • /
    • 2006
  • The exponential increase of malicious and criminal activities in cyber space is posing serious threat which could destabilize the foundation of modem information society. In particular, unexpected network paralysis or break-down created by the spread of malicious traffic could cause confusion and disorder in a nationwide scale, and unless effective countermeasures against such unexpected attacks are formulated in time, this could develop into a catastrophic condition. As a result, there has been vigorous effort and search to develop a functional state-level cyber-threat early-warning system however, the efforts have not yielded satisfying results or created plausible alternatives to date, due to the insufficiency of the existing system and technical difficulties. The existing cyber-threat forecasting and early-warning depend on the individual experience and ability of security manager whose decision is based on the limited security data collected from ESM (Enterprise Security Management) and TMS (Threat Management System). Consequently, this could result in a disastrous warning failure against a variety of unknown and unpredictable attacks. It is, therefore, the aim of this research to offer a conceptual design for "Knowledge-based Real-Time Cyber-Threat Early-Warning System" in order to counter increasinf threat of malicious and criminal activities in cyber suace, and promote further academic researches into developing a comprehensive real-time cyber-threat early-warning system to counter a variety of potential present and future cyber-attacks.

  • PDF

Proposal on the Improvement of Psychological Support System for Cyber Sexual Crime Investigators Based on Their Mental Health Survey (사이버성폭력수사관 정신건강 실태조사에 근거한 심리지원제도 개선 방향에 관한 연구)

  • Bora Kim;Sujin Lim
    • Knowledge Management Research
    • /
    • v.23 no.4
    • /
    • pp.43-67
    • /
    • 2022
  • One of the dark sides of the development of information and communication technology is the significant increase in cybercrime. In particular, investigators in charge of cyber sexual crime are repeatedly exposed to video data of illegal sexual violence; hence, they are at high risk of post-traumatic stress disorder (PTSD) and experiencing vicarious trauma. Notwithstanding, few studies have focused on these investigators' PTSD, and, to the best of our knowledge, no study has been conducted on the vicarious trauma of cyber sexual crime investigators. Therefore, this study identifies investigators' mental health status (trauma-related, especially) and examines their perception of the currently operating psychological support programs. Further, by reviewing the psychological support system of overseas institutions, we would suggest psychological support and policies necessary for domestic cyber sexual crime units to manage investigators' work stress and prevent mental illness under domestic circumstances.

Extension of Self-directed Self-management Ability through Online Community Activities (온라인 커뮤니티 활동을 통한 자기주도적 자기관리능력신장)

  • Choi, Si-Young;Hong, Ki-Cheon
    • 한국정보교육학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.587-594
    • /
    • 2004
  • 21세기는 지식 정보화 시대라고 말하며 정보 통신혁명은 모든 매체에서 인터넷을 연결시키면서 우리의 생활 및 사고에 대한 패러다임의 변화를 가져 왔다고 할 수 있다. 따라서 본 연구에서는 미래사회를 대비해야 할 우리 어린이들에게 정보화의 발전과 주5일제 수업으로 더욱 활발해진 개별학습 기회가 혹시나 의미 없는 시간소비를 통해 사이버 폭력 및 사이버범죄 등 정보화(인터넷)의 역기능에 노출 될 위험성이 있다고 볼 수 있다. 이에 정보통신 윤리교육을 강화하여 인터넷의 역기능을 차단하고 창의적이고 탐구적인 학습활동에 흥미를 가지고 적극적으로 참여 할 수 있도록 다음과 같이 운영한다. 첫째, 학생 중심의 자치적인 온라인 커뮤니티 활동을 통해 학생중심의 게시판을 개발 적용한 후 게시판별 분석자료를 통해 학생 이해 및 소질과 적성을 발굴 지도한다. 둘째, 분석자료 내용을 누가 기록하고 그 내용을 가공, 적용하여 또래집단의 원활한 교우관계 조성과 성장발달을 도모하고 여가시간을 효율적으로 활용하는 능력을 길러 궁극적으로 자아실현과 새로운 가치창조의 기호가 되도록 지도하는데 연구의 목적을 두고자 한다.

  • PDF