• Title/Summary/Keyword: 위협도

Search Result 5,101, Processing Time 0.03 seconds

A Study on the Application of International Conventions to Respond to Cyber Threats in Civil Aviation (민간항공의 사이버위협 대응을 위한 국제협약 적용에 관한 연구)

  • Park, Man-Hui
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2023.11a
    • /
    • pp.41-42
    • /
    • 2023
  • 항공편과 승객의 흐름을 효율적으로 처리하기 위한 디지털 시스템에 대한 의존도 증가와 승객용 기내 와이파이 서비스 등으로 인해 민간항공의 사이버 보안 취약성은 매년 증가하고 있는데 비해 공항에 대한 무장 공격, 항공기에 폭발물 설치 및 납치와 같은 전통적인 테러에 맞춰 마련된 항공보안 관련 국제협약은 사이버 위협에 직접적으로 적용하기 어렵다는 문제를 갖고 있다. 본 연구는 민간항공에 대한 사이버 공격의 예방 및 기소와 관련된 국제협약의 적정성을 검토한 후, 사이버 위협 대응을 위한 기존 국제협약 체계, 잠재적 차이 해석 등을 중점적으로 분석하여 민간항공의 안전을 위협하는 불법방해행위로부터 중요정보 및 시스템을 보호하는 항공 사이버 보안 국제표준 마련 및 이행 촉진을 강조하고자 한다.

  • PDF

The security requirements suggestion based on cloud computing security threats for server virtualization system (클라우드 컴퓨팅 보안 위협에 기반 한 서버 가상화 시스템 보안 요구 사항 제안)

  • Ma, Seung-Young;Ju, Jung-Ho;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.95-105
    • /
    • 2015
  • In this paper, we propose the security requirements for developing the security functions of server virtualization system. The security requirements are based on the security threats of server virtualization system, and we verified the validity by defending the security threats of server virtualization system. For inducting the security threats damaging server virtualization system from cloud computing security threats, we analyze and suggest the relations between security threats and security issue of server virtualization system.

Cyber threat intelligence sharing system (사이버 위협 인텔리전스 공유 체계 연구)

  • Yang, Jun-ho;Kim, Chan-jin;Kim, Mee-yeon;Kim, Ji-hye;Kim, Jong-hyun;Youm, Heung-youl
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.647-650
    • /
    • 2018
  • With the advent of advanced technologies in the real world, the cyber domain has become wider and cyber threats are increasing. A cyber threat intelligence sharing system is needed to more effectively defend and respond to such cyber threats. Through the definition of cyber threat information expression standard, it enables rapid sharing, consistent analysis, and automated interpretation of cyber threat information possessed by individual security control providers or organizations.

  • PDF

The study of comprehensive index development for flood risk assessment (홍수 위험도 평가를 위한 종합적 지수 개발에 관한 연구)

  • Kim, Daeho;Kim, Young-Oh;Jee, Hee Won;Kang, Tae-Ho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.395-395
    • /
    • 2019
  • 대한민국에서 홍수는 매해 여름 발생하는 자연재해로 인명, 재산, 사회 기반시설에 심각한 피해를 일으키고 있으며, 기후변화로 인해 홍수 사상이 과거와는 다른 형태이다. 이를 대비하기 위해서는 기후변화를 고려한 홍수 위험도(flood risk)를 평가를 통해 적절한 대비책을 수립하여야 한다. 이에 본 연구는 전국의 홍수위험도를 중권역 별로 평가하는 홍수위험지수(Flood Risk Index, FRI)를 새로이 개발하였다. FRI는 세 가지 세부 지표인 위협도, 노출도, 대응능력(Hazard, Exposure, Capacity)의 결합으로 산정된다. 위협도는 직접적인 홍수의 원인이 되는 기상학적 요인인 강수에 대한 정보이고, 노출도는 홍수로부터 피해를 입을 수 있는 인명 및 재산에 대한 요소이다. 대응능력은 자연 환경과 인간의 중장기 전략을 고려한 적응능력(adaptive capacity)과 홍수 발생 시 조치능력(coping capacity)으로 나눠져 평가된다. 즉 위협도와 노출도가 높을수록 홍수 위험도가 커지며, 대응능력이 뛰어날수록 홍수 위험도는 줄어든다. 인자들은 특정 유형의 위험도에만 초점이 맞춰지지 않고 다양한 방면을 포괄적으로 평가할 수 있도록 선정되었으며, 통계 기법을 활용해 FRI를 산정하였다. 크론바흐 알파 계수(Cronbach's ${\alpha}$)를 통해 FRI의 타당성을 진단하였으며, 홍수피해금액간의 스피어만(Spearman) 상관계수를 통해 FRI의 설명력을 검증해 신뢰도를 제고했다. 최종적으로 환경부로부터 제공받은 미래 기후 시나리오를 사용하여 FRI를 산출해 미래의 세 시점(2030년대, 2050년대, 2080년대)의 전국 홍수위험도 평가를 진행하였다.

  • PDF

Cyber Terror Threat Elimination Method Study for Safe Smart World (안전한 스마트월드를 위한 사이버 테러위협 제거 방안 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.107-113
    • /
    • 2021
  • Recently, large-scale research and efforts aimed at the smart world such as smart city, smart home, smart transportation, and smart care are continuing. As these smart worlds become more common, the expansion of connectivity with the Internet and the threat of cyber terrorism will be inevitable. Increasing the threat of cyber terrorism is increasing the likelihood of a massive disaster and safety accident. Therefore, in this paper, we examine smart worlds that are expanded in various forms and derive the security threat factors that smart worlds have. In addition, it is proposed to block the threat of terrorism from abroad if access from abroad is not required when constructing a smart world. Through this, we intend to present a method to eliminate cyber terror threats for the establishment and operation of a safe smart world.

On Physical Security Threat Breakdown Structure for Data Center Physical Security Level Up (데이터센터 물리 보안 수준 향상을 위한 물리보안 위협 분할도(PS-TBS)개발 연구)

  • Bae, Chun-sock;Goh, Sung-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.439-449
    • /
    • 2019
  • The development of information technology represented by ICBMA (IoT, Cloud, Big Data, Mobile, AI), is leading to a surge in data and a numerical and quantitative increase in data centers to accommodate it. As the data center is recognized as a social infrastructure, It is very important to identify physical security threats in advance in order to secure safety, such as responding to a terrorist attack. In this paper, we develop physical security threat breakdown structure (PS-TBS) for easy identification and classification of threats, and verify the feasibility and effectiveness of the PS-TBS through expert questionnaires. In addition, we intend to contribute to the improvement of physical security level by practical use in detailed definition on items of PS-TBS.

Research on the Implementation of Infrared Threat Surrogate for DIRCM Performance Analysis (지향성 적외선 방해장치 성능분석을 위한 위협체모사기 구축에 관한 연구)

  • Chun, Seung-Woo;Kim, Joy;Cho, Soo-Hyung;Kim, Jae-Hyup;Yu, Hyun-Geun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.97-106
    • /
    • 2015
  • In this paper, the development of infrared threat surrogate system is described and it can be used to verify the performance of DIRCM system. In this research, threat surrogates are manufactured using same F# and reflective optics used in 1st- and 2nd-Gen. real seeker so that the threat surrogate system can be used to develop code-based jamming techniques. Also the threat surrogate system can analyze the saturation jamming effect for image seeker using FPA detector. The result shows that 1st- and 2nd-generation threat surrogates have relatively precise tracking performance and jamming effect.

Aircraft Path Planning Considering Pop-up Threats Using Framed-Quadtree Wavefront Propagation and Navigation Function (Framed-Quadtree 파면전파 기법과 항법함수 기법을 이용한 항공기 위협회피 궤적 설계)

  • Kim, Pil-Jun;Choi, Jong-Uk;Kim, You-Dan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.10
    • /
    • pp.918-926
    • /
    • 2007
  • Military aircrafts usually operate at the area with lots of threats such as radars and surface-to-air missiles. Aircraft also faces with the unexpected or pop-up threats. Under this environment, a safe flight path should be generated to lead a mission successful. In this paper, a new path planning algorithm is proposed to provide less dangerous flight path efficiently. Of many path planning algorithms, a potential method is considered, because it has advantages of computation efficiency and smooth path generation. Trajectory generation under the condition of maximum range is studied so that the aircraft may reach the target area without refueling. The algorithm to cope with an unexpected situation is also proposed by adopting the concept of initial direction vector, additional force, and a new mapping function. The performance of the proposed algorithms is demonstrated for SEAD (Suppression of Enemy Air Defences) mission by numerical simulation.

A study on detection methodology of threat on cars from the viewpoint of IoT (IoT 관점에서의 차량 위협 탐지 방안)

  • Kwak, Byung Il;Han, Mi Ran;Kang, Ah Reum;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.411-421
    • /
    • 2015
  • These days, a conversion of the fast-advancing ICT (Information and Communications Technologies) and the IoT (Internet of Things) has been in progress. However, these conversion Technology could lead to many of the security threat existing in the ICT environment. The security threats of car in the IoT environment could cause the property damage and casualty. There are the inadequate preparations for the car security and the difficulty of detection for the security threats by itself. In this paper, we proposed the decision-making framework for the anomaly detection and found out what are the threats of car in the IoT environment. The discrimination of the factor, path and type of threats from the attack against the car should take priority over the self-inspection and the swift handling of the attack on control system.

A Study on the Domestic Model for Cyber Threat Information Sharing by Analyzing the Relevant Systems of Major Advacnced Countries (주요국의 사이버위협정보 공유체계 분석을 통한 국내 적용모델 연구)

  • Yoon, Oh Jun;Cho, Chang Seob;Park, Jeong Keun;Bae, Sun Ha;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.101-111
    • /
    • 2016
  • The recent cyber threats are becoming real threats to our lives. This gloomy situation from cyber threats necessarily demands the establishment of the cyber threat information sharing system between the public and private area. Key countries, like the US, Japan and the UK, are stabilizing the cyber threat information sharing systems by founding exclusive organizations for sharing information and setting up and implementing relevant measures. In this thesis, I would like to propose the model for cyber threat information sharing in order to cope efficiently with the ever-intensifying cyber threats. My model would include key elements for the efficient information sharing, such as the clear designation of main operator of information sharing system, the management of collaboration system between the public and private sector, the build-up of the integrated and automated system and the supplementation of legal system including the grant of privilege, and so on.