• Title/Summary/Keyword: 연구정보 보호

Search Result 5,877, Processing Time 0.042 seconds

Study on Method to Develop Case-based Security Threat Scenario for Cybersecurity Training in ICS Environment (ICS 환경에서의 사이버보안 훈련을 위한 사례 기반 보안 위협 시나리오 개발 방법론 연구)

  • GyuHyun Jeon;Kwangsoo Kim;Jaesik Kang;Seungwoon Lee;Jung Taek Seo
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.91-105
    • /
    • 2024
  • As the number of cases of applying IT systems to the existing isolated ICS (Industrial Control System) network environment continues to increase, security threats in the ICS environment have rapidly increased. Security threat scenarios help to design security strategies in cybersecurity training, including analysis, prediction, and response to cyberattacks. For successful cybersecurity training, research is needed to develop valid and reliable security threat scenarios for meaningful training. Therefore, this paper proposes a case-based security threat scenario development methodology for cybersecurity training in the ICS environment. To this end, we develop a methodology consisting of five steps based on analyzing actual cybersecurity incident cases targeting ICS. Threat techniques are standardized in the same form using objective data based on the MITER ATT&CK framework, and then a list of CVEs and CWEs corresponding to the threat technique is identified. Additionally, it analyzes and identifies vulnerable functions in programming used in CWE and ICS assets. Based on the data generated up to the previous stage, develop security threat scenarios for cybersecurity training for new ICS. As a result of verification through a comparative analysis between the proposed methodology and existing research confirmed that the proposed method was more effective than the existing method regarding scenario validity, appropriateness of evidence, and development of various scenarios.

  • PDF

Improvement Way for Mobile X-ray Examinations by Rule Revision about Safety Management of Diagnosis Radiation Occurrence System (진단용방사선발생장치의 안전관리에 관한 규칙 개정에 따른 이동형 방사선검사의 개선방안)

  • Choi, Jun-Gu;Kim, Gyeong-Su;Kim, Byeong-Gi;Ahn, Nam-Jun;Kim, Hyeong-Sun;Kim, Sang-Geon;Lim, Si-Eun
    • Journal of radiological science and technology
    • /
    • v.30 no.1
    • /
    • pp.53-59
    • /
    • 2007
  • A safety management rule of the diagnosis radiation system which opened a court 2006 February 10th was promulgated for safety of the radiation worker, patients and patients' family members. The purpose of this study is to minimize injury by radiation that can happen to patients and people around a sick ward when managing mobile X-ray system. This study analyzed sickroom environment of mobile X-ray examination and the statistical data of the Konkuk medical Information System(KIS) and the Picture Archiving Communication System(PACS). This study also investigated patient conditions, infection, relation information and related data, when the sickroom mobile X-ray examination is used. Through data analysis, many problems were expected such as restriction of space side, manpower and expense of business side, satisfaction degree decline of patient and protector of operation side. Therefore, we tried to restrict examination of multi bed sickroom, and to use treatment room in each ward to solve problem mentioned. As a result, the whole sickroom mobile X-ray examination rate decreased to near 50%, and mobile X-ray examination rate for inpatients decreased to more than 85%. This study shows that several attempts we did should be helpful for manpower, patients satisfaction and expenses. Also, they should protect patients in sickroom from unnecessary radiation exposure and could minimize inconvenience of patients and their family members from x-ray examination.

  • PDF

High-Speed Implementation and Efficient Memory Usage of Min-Entropy Estimation Algorithms in NIST SP 800-90B (NIST SP 800-90B의 최소 엔트로피 추정 알고리즘에 대한 고속 구현 및 효율적인 메모리 사용 기법)

  • Kim, Wontae;Yeom, Yongjin;Kang, Ju-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.25-39
    • /
    • 2018
  • NIST(National Institute of Standards and Technology) has recently published SP 800-90B second draft which is the document for evaluating security of entropy source, a key element of a cryptographic random number generator(RNG), and provided a tool implemented on Python code. In SP 800-90B, the security evaluation of the entropy sources is a process of estimating min-entropy by several estimators. The process of estimating min-entropy is divided into IID track and non-IID track. In IID track, the entropy sources are estimated only from MCV estimator. In non-IID Track, the entropy sources are estimated from 10 estimators including MCV estimator. The running time of the NIST's tool in non-IID track is approximately 20 minutes and the memory usage is over 5.5 GB. For evaluation agencies that have to perform repeatedly evaluations on various samples, and developers or researchers who have to perform experiments in various environments, it may be inconvenient to estimate entropy using the tool and depending on the environment, it may be impossible to execute. In this paper, we propose high-speed implementations and an efficient memory usage technique for min-entropy estimation algorithm of SP 800-90B. Our major achievements are the three improved speed and efficient memory usage reduction methods which are the method applying advantages of C++ code for improving speed of MultiMCW estimator, the method effectively reducing the memory and improving speed of MultiMMC by rebuilding the data storage structure, and the method improving the speed of LZ78Y by rebuilding the data structure. The tool applied our proposed methods is 14 times faster and saves 13 times more memory usage than NIST's tool.

Application of ECVAM as a Indicator for Monitoring National Environment in Korea (국토환경 모니터링 지표로서의 국토환경성평가지도 활용방안)

  • Kim, Eunyoung;Jeon, Seong-Woo;Song, Wonkyong;Kwak, Jaeryun;Lee, June
    • Journal of Environmental Policy
    • /
    • v.11 no.2
    • /
    • pp.3-16
    • /
    • 2012
  • Objectives of the Korean Environmental Conservation Value Assessment Map (ECVAM) is to evaluate environmental value used in comprehensive environmental information in order to encourage eco-friendly land use and management. The first research was conducted in 2001 to establish the evaluation items and the criteria of the ECVAM, and the first nationwide map was established in the period of 2003 to 2005. The maps are updated annually to reflect environmental changes of land. The evaluation items and the criteria have been modified based on feasibility studies to improve the accuracy of the maps. This study re-evaluated the ECVAMs from 2005 to 2010 with criteria used in current environment and analyzed the changes in the area of the maps in 6 years. This is also an investigation on the maps whether they are appropriate as an index for sustainable environmental monitoring. The result shows that the 1st grade level of the ECVAM area with the highest conservation value had been expanding since 2005. These changes were analyzed in terms of updating the 4th Forest Map (2008) produced once every 10 years, reflecting the new legal protected areas such as Baekdudaegan Protected Area(2010), and the environmental/ecological assessment items such as the National Ecological Network (2009). This mean the ECVAM are a monitoring index that integrates individual environmental indexes including the increase of forest age and diameter due to sustainable management of forest areas, and the change of conservation areas. Therefore, ECVAM can be used as a new index integrating national environmental indicators for monitoring changes of national environment and policy. In order to utilize the ECVAM, improving accuracy and reducing renewal cycle time of thematic maps are required.

  • PDF

A Comparative Study of Juvenile Black-faced Spoonbills Platalea Minor Home Range in Gujido and Chilsando Islets, South Korea (구지도, 칠산도 저어새 유조의 행동권 비교 연구)

  • Son, Seok-Jun;Kang, Jung-Hoon;Kwon, In-Ki;Kim, Dal-Ho;Lee, Ki-Sup;Yoo, Jeong-Chil
    • Korean Journal of Environment and Ecology
    • /
    • v.34 no.2
    • /
    • pp.99-105
    • /
    • 2020
  • Migratory birds use a variety of breeding and wintering sites, and it is particularly important to understand more information on breeding and feeding sites for the conservation and management of endangered species. Black-faced spoonbills (Platalea minor) are an international endangered species distributed in East Asia. The majority of black-faced spoonbills breed on uninhabited islets off the west coast of the Korean Peninsula during the breeding season, and they are distributed in East Asia such as Taiwan, Hong Kong, southern China, Japan, and Jeju island during the winter season. In this study, we used a wild animal location tracking system to analyze and compare home ranges of three black-faced spoonbills spending the post-fledging stage in Gujido islet in Incheon and Chilsando islet in Yeonggwang each in 2015. The tree black-faced spoonbills in Guji islet showed a home range in coastal areas in Hwanghaenam-do and Gangneung-gun. The home range size (mean±SD) was estimated to be 425.49±116.95 ㎢ using 100% MCP, 43.61±18.51 ㎢ using KDE 95%, and 7.46±3.68 ㎢using KDE 50%. The tree black-faced spoonbills in Chilsando islet showed a home range in the Baeksu tidal flat and the Buan Saemangeum area with a size of 99.38±55.29 ㎢ using 100% MCP, 19.87±6.05 ㎢ using KDE 95%, and 1.16±0.53 ㎢ using KDE 50%. The figured indicated that the tree black-faced spoonbills breeding in Gujido islet had a wider home range than those breeding in Chilsando islet. During the post-fledging stage, the home ranges of black-faced spoonbills were mostly breeding in mudflats. Therefore, it is necessary to minimize human intervention, such as the construction of roads and structures and the human access, to protect the habitats during the period.

A Study on Establishment of the Optimum Mountain Meteorological Observation Network System for Forest Fire Prevention (산불 방지를 위한 산악기상관측시스템 구축방안)

  • Lee, Si-Young;Chung, Il-Ung;Kim, Sang-Kook
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.8 no.1
    • /
    • pp.36-44
    • /
    • 2006
  • In this study, we constructed a forest fire danger map in the Yeongdong area of Gangwon-do and Northeastern area of Gyeongsangbuk-do using a forest fire rating model and geographical information system (GIS). We investigated the appropriate positions of the automatic weather station (AWS) and a comprehensive network solution (a system including measurement, communication and data processing) for the establishment of an optimum mountain meteorological observation network system (MMONS). Also, we suggested a possible plan for combining the MMONS with unmanned monitoring camera systems and wireless relay towers operated by local governments and the Korea Forest Service for prevention of forest fire.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

A Study of the Application of 'Digital Heritage ODA' - Focusing on the Myanmar cultural heritage management system - (디지털 문화유산 ODA 적용에 관한 시론적 연구 -미얀마 문화유산 관리시스템을 중심으로-)

  • Jeong, Seongmi
    • Korean Journal of Heritage: History & Science
    • /
    • v.53 no.4
    • /
    • pp.198-215
    • /
    • 2020
  • Official development assistance refers to assistance provided by governments and other public institutions in donor countries, aimed at promoting economic development and social welfare in developing countries. The purpose of this research is to examine the construction process of the "Myanmar Cultural Heritage Management System" that is underway as part of the ODA project to strengthen cultural and artistic capabilities and analyze the achievements and challenges of the Digital Cultural Heritage ODA. The digital cultural heritage management system is intended to achieve the permanent preservation and sustainable utilization of tangible and intangible cultural heritage materials. Cultural heritage can be stored in digital archives, newly approached using computer analysis technology, and information can be used in multiple dimensions. First, the Digital Cultural Heritage ODA was able to permanently preserve cultural heritage content that urgently needed digitalization by overcoming and documenting the "risk" associated with cultural heritage under threat of being extinguished, damaged, degraded, or distorted in Myanmar. Second, information on Myanmar's cultural heritage can be systematically managed and used in many ways through linkages between materials. Third, cultural maps can be implemented that are based on accurate geographical location information as to where cultural heritage is located or inherited. Various items of cultural heritage were collectively and intensively visualized to maximize utility and convenience for academic, policy, and practical purposes. Fourth, we were able to overcome the one-sided limitations of cultural ODA in relations between donor and recipient countries. Fifth, the capacity building program run by officials in charge of the beneficiary country, which could be the most important form of sustainable development in the cultural ODA, was operated together. Sixth, there is an implication that it is an ODA that can be relatively smooth and non-face-to-face in nature, without requiring the movement of manpower between countries during the current global pandemic. However, the following tasks remain to be solved through active discussion and deliberation in the future. First, the content of the data uploaded to the system should be verified. Second, to preserve digital cultural heritage, it must be protected from various threats. For example, it is necessary to train local experts to prepare for errors caused by computer viruses, stored data, or operating systems. Third, due to the nature of the rapidly changing environment of computer technology, measures should also be discussed to address the problems that tend to follow when new versions and programs are developed after the end of the ODA project, or when developers have not continued to manage their programs. Fourth, since the classification system criteria and decisions regarding whether the data will be disclosed or not are set according to Myanmar's political judgment, it is necessary to let the beneficiary country understand the ultimate purpose of the cultural ODA project.

A Basic Study on the Performance Improvement of Safety Certification Standards (안전인증기준 성능화에 대한 기반 연구)

  • Byeon, Jung-Hwan;Kim, Jung-Gon
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.3
    • /
    • pp.487-499
    • /
    • 2021
  • Purpose:The purpose of the paper is to review the problems of performance enhancement of safety certification standards and to suggest directions for improvement in order to rationalize safety certification standards for future industrial development and environmental changes. Method: The problems and limitations of the safety certification system are summarized through literature review and interview with manager, and the status of safety certification standards is classified into design standards, performance standards, and detailed standards, and the status analysis is performed. In addition, by synthesizing the results of the investigation and analysis, improvements are suggested to improve the performance of the safety certification standards. Result: Through the survey, the problems and limitations of safety certification could be grouped into six categories: government-led certification system operation, standardized certification standards, long time required to improve certification, poor certification standards preparation system, and lack of reflection of industry opinions. And, as a result of analyzing the certification standards by dividing them into performance and design standards, in the case of machinery, equipment, and protection devices, the design standards were high at 69.7% and 64.9%, whereas in the case of protective equipment, the performance standards were high at 61.1%. In order to improve the performance of safety certification standards centered on design standards, it is necessary to determine the possibility of performance enhancement of the certification standards and determine the feasibility of the inspection test method. In order to improve performance, it was reviewed that it was necessary to establish a systemic foundation and infrastructure, such as strengthening the Product Liability Act, systematizing market monitoring, etc., distributing certification test tasks, and participating in the preparation of certification standards by the private sector. Conclusion: Through this study, the problems and limitations of Korea's safety certification system were summarized and the necessity for performance improvement was reviewed. Performance improvement of safety certification standards is a matter that requires preparatory work, such as legislative revision and infrastructure construction, and requires mid-to-long-term promotion. In addition, rather than improving the overall safety certification standards, the performance requirements for each item subject to certification should be reviewed and promoted, and details should be specified through additional research.

A Study on Image Copyright Archive Model for Museums (미술관 이미지저작권 아카이브 모델 연구)

  • Nam, Hyun Woo;Jeong, Seong In
    • Korea Science and Art Forum
    • /
    • v.23
    • /
    • pp.111-122
    • /
    • 2016
  • The purpose of this multi-disciplinary convergent study is to establish Image Copyright Archive Model for Museums to protect image copyright and vitalize the use of images out of necessity of research and development on copyright services over the life cycle of art contents created by the museums and out of the necessity to vitalize distribution market of image copyright contents in creative industry and to formulate management system of copyright services. This study made various suggestions for enhancement of transparency and efficiency of art contents ecosystem through vitalization of use and recycling of image copyright materials by proposing standard system for calculation, distribution, settlement and monitoring of copyright royalty of 1,000 domestic museums, galleries and exhibit halls. First, this study proposed contents and structure design of image copyright archive model and, by proposing art contents distribution service platform for prototype simulation, execution simulation and model operation simulation, established art contents copyright royalty process model. As billing system and technological development for image contents are still in incipient stage, this study used the existing contents billing framework as basic model for the development of billing technology for distribution of museum collections and artworks and automatic division and calculation engine for copyright royalty. Ultimately, study suggested image copyright archive model which can be used by artists, curators and distributors. In business strategy, study suggested niche market penetration of museum image copyright archive model. In sales expansion strategy, study established a business model in which effective process of image transaction can be conducted in the form of B2B, B2G, B2C and C2B through flexible connection of museum archive system and controllable management of image copyright materials can be possible. This study is expected to minimize disputes between copyright holder of artwork images and their owners and enhance manageability of copyrighted artworks through prevention of such disputes and provision of information on distribution and utilization of art contents (of collections and new creations) owned by the museums. In addition, by providing a guideline for archives of collections of museums and new creations, this study is expected to increase registration of image copyright and to make various convergent businesses possible such as billing, division and settlement of copyright royalty for image copyright distribution service.