• Title/Summary/Keyword: 위협요소

Search Result 749, Processing Time 0.02 seconds

A Study on Smart EDR System Security Development (Smart EDR 시스템구축을 위한 보안전략과 발전방안)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.41-47
    • /
    • 2020
  • In the corporate information system environment, detecting and controlling suspicious behaviors occurring at the end point of the actual business application is the most important area to secure the organization's business environment. In order to accurately detect and block threats from inside and outside, it is necessary to be able to monitor all areas of all terminals in the organization and collect relevant information. In other words, in order to maintain a secure business environment of a corporate organization from the constant challenge of malicious code, everything that occurs in a business terminal such as a PC beyond detection and defense-based client security based on known patterns, signatures, policies, and rules that have been universalized in the past. The introduction of an EDR solution to enable identification and monitoring is now an essential element of security. In this study, we will look at the essential functions required for EDR solutions, and also study the design and development plans of smart EDR systems based on active and proactive detection of security threats.

IT Korea 성공을 위한 R&D방향

  • Kim, Heung-Nam
    • Information and Communications Magazine
    • /
    • v.28 no.1
    • /
    • pp.22-28
    • /
    • 2010
  • 외환위기 이후 IT는 우리 경제의 견인차로 인식되어 왔으나 2000년대 초두의 IT 버블 붕괴 이후 극심한 성장정체를 겪으면서 일부 학자 및 정책입안자를 중심으로 IT 역할에 대한 회의론적 시각이 제기되어 왔다. 그러나, 지난 2~3년간의 각종 경제지표를 볼 때, IT는 여전히 우리 경제에서 중요한 역할을 하고 있음을 확인할 수 있을 뿐만 아니라 미래사회에의 대응을 위해서도 IT에 대한 관심 제고가 무엇보다도 절실한 시점이라 하겠다. 특히, 스마트폰의 등장에 따라 스마트폰 환경에 최적화된 다양한 애플리케이션의 등장과 이를 이용한 모바일 서비스의 보급 확산으로 IT 기기 및 서비스 산업의 경쟁구조에 근본적인 변화가 발생하면서 IT 강국이라는 국가적 브랜드마저 위협받고 있는 시점이어서 더욱 그렇다. 스마트폰의 등장으로 국가경쟁력 결정 패턴이 노동과 자본 등 전통적인 생산요소에 기반한 개별 산업분야의 경쟁우위를 기초로 결정되던 형태에서 감성과 창의성 등 소프트 파워의 보유 정도에 따라 결정되는 형태로 전환되었다는 점에서 R&D전략에 있어서도 중요한 전환점을 맞고 있다고 보여진다. 또한, 산업사회와 정보사회에 이어 급격한 기술혁신에 따른 기술간 및 산업간 융합의 정도가 산업 전반의 경쟁구도에 영향을 미칠 것으로 대부분의 전문가들이 예견하고 있으나, 산업현장이나 기술분야에서 실제적으로 발생되는 융합의 양상은 그다지 신속하지 못한 것으로 나타나고 있다. 따라서, 기술간 및 산업간 융합촉진을 통한 전산업 경쟁력 제고를 위한 R&D 방향 모색이 필요한 시점이다. 이에 따라 본고에서는 스마트폰의 등장에 따른 IT산업의 경쟁구도 변화와 글로벌 기업들의 전략, 대응방향 등을 살펴보는 한편 IT의 전반적인 활용도 증가에 따라 더욱 가속화될 것으로 전망되는 기술간 및 산업간 융합시대에 대응한 IT R&D 방향을 살펴본다. 이는 궁극적으로 IT 강국이라는 국가적 브랜드 이미지의 고착화 전략인 동시에 IT 기반의 융합을 촉진시킴으로써 스마트한 IT Korea라는 국가적 미래비전을 달성해 나가기 위한 방향이 될 것이다.

A Design of Integrated Security Policies for Enabling Adaptive Security in Campus Environment (캠퍼스 환경에서 적응적인 정보보안을 위한 통합 보안정책의 설계)

  • Ko, Bong-Koo;Park, Jong-Seon;Chung, Seung-Jong;Cho, Gi-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.617-624
    • /
    • 2014
  • A campus network nowadays adapts the security policies in detail and even in variety, along with firewall based access control. Nevertheless, security threats, such as information hacking, intrusion and DoS, are not decreasing yet. This paper proposes an enabling method of discriminative security policies to enforce an adaptive security for security objects on basis of the security elements. The security level of a security devices is decided based on the mapping between the users and the objects. The proposed security policies could improve the security effect in terms of investment in creative campus environment, and aim to provide fast and stable services to users.

Theoretical analysis for determation of allowable free span of subsea pipeline (해저 배관의 허용 노출길이 산정에 대한 이론해석)

  • Jung Dong-Ho;Lee Yong-Doo;Park Han-Il
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.6 no.2
    • /
    • pp.54-62
    • /
    • 2003
  • The free span of a subsea pipeline due to seabed scouring can result in structural failure by severe ocean environmental loads and vortex induced vibrations. This Paper examines the safety of subsea pipelines with free spans under axial compressive load. The variation of allowable lengths of static and dynamic free spans is examined for generalized boundary conditions. The free span is modelled as a beam with an elastic foundations and the boundary condition is replaced by linear and rotational springs at each end. The static and dynamic free span curves are obtained with a function of non-dimensional parameters. A case study is carried out to introduce the application method of the curve. The results of this study can be usefully applied for the design of subsea pipelines with a free span.

  • PDF

Performance Analysis of Landing Point Designation Technique Based on Relative Distance to Hazard for Lunar Lander (달 착륙선의 위험 상대거리 기반 착륙지 선정기법 성능 분석)

  • Lee, Choong-Min;Park, Young-Bum;Park, Chan-Gook
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.44 no.1
    • /
    • pp.12-22
    • /
    • 2016
  • Lidar-based hazard avoidance landing system for lunar lander calculates hazard cost with respect to the desired local landing area in order to identify hazard and designate safe landing point where the cost is minimum basically using slope and roughness of the landing area. In this case, if the parameters are only considered, chosen landing target can be designated near hazard threatening the lander. In order to solve this problem and select optimal safe landing point, hazard cost based on relative distance to hazard should not be considered as well as cost based on terrain parameters. In this paper, the effect of hazard cost based on relative distance to hazard on safe landing performance was analyzed and it was confirmed that landing site designation with two relative distances to hazard results in the best safe landing performance by an experiment using three-dimensional depth camera.

A study on measures for disaster management that reflects the social and environmental characteristics of rural areas (농촌지역의 사회적·환경적 특성을 반영한 재난관리 대책 방안 연구)

  • Park, Miri;Lee, Young-Kune
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.511-518
    • /
    • 2017
  • In this study, a research on disaster countermeasures to strengthen the disaster management field of rural areas. The purpose of this study is to investigate the measures to cope with the disaster in order to enhance the rural disaster management capacity. For this purpose, social and environmental characteristics of the rural area were examined and the characteristics of rural disaster perspective were derived. As for social characteristics, we analyzed the direct and indirect damage of disaster through interviews with residents affected by disaster. In the case of environmental characteristics, the factors that threaten the safety in the rural area were extracted based on the geographical and geographical characteristics of the rural area and quantitative analysis of the difference of the disaster response infrastructure compared with the city was conducted. In addition, it is necessary to further study the priority of disaster prevention in order to apply the disaster prevention method to rural areas.

A Study of Traffic Accident Analysis Model on Highway in Accordance with the Accident Rate of Trucks (화물차사고 비율에 따른 고속도로 교통사고 분석모형에 대한 연구)

  • Yang, Sung-Ryong;Yoon, Byoung-jo;Ko, Eun-Hyeok
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.570-576
    • /
    • 2017
  • Trucks take up more portions than cars on highways. Due to this, road use relatively diminish and it serves locally as a threatening factor to nearby drivers. Baggage car accident has distinct characteristics so that it needs the application of different analysis opposed to ordinary accidents. Accident prediction model, one of accident analyses, is used to predict the numbers of accident in certain parts, establish traffic plans as well as accident prevention methods, and diagnose the danger of roads. Thus, this study aims to apply the accident rate of baggage car on highways and calculate the correction factor to be put in the accident prediction models. Accident data based on highway was collected and traffic amounts and accident documents between 2014 and 2016 were utilized. The author developed an accident prediction model based on numbers of annual accidents and set mean annual and daily traffic amounts. This study intends to identify the practical accident prediction model on highway and present an appropriate solution by comparing the prediction model in accords with the accident rate between baggage cars.

Implementation of Security Enforcement Engine for Active Nodes in Active Networks (액티브 네트워크 상에서 액티브 노드의 보안 강화를 위한 보안 엔진 구현)

  • Kim, Ok-Kyeung;Lim, Ji-Young;Na, Hyun-Jung;Na, Ga-Jin;Kim, Yeo-Jin;Chae, Ki-Joon;Kim, Dong-Young
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.413-422
    • /
    • 2003
  • An active network is a new generation network based on a software-intensive network architecture in which applications are able to inject new strategies or code into the infrastructure for their immediate needs. Therefore, the secure active node architecture is needed to give the capability defending an active node against threats that may be more dynamic and powerful than those in traditional networks. In this paper, a security enforcement engine is proposed to secure active networks. We implemented an operating engine with security, authentication and a authorization modules. Using this engine, it is possible that active networks are protected from threats of the malicious active node.

How to Cope with Ransomware in the Healthcare Industry (의료산업에서의 랜섬웨어 대응 방법)

  • Jeon, In-seok;Kim, Dong-won;Han, Keun-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.155-165
    • /
    • 2018
  • As medical healthcare industry is growing up rapidly these days, providing various new healthcare service is considered carefully. Health information is considered to be more important than financial information; therefore, protecting health information becomes a very significant task. Ransomware is now targeting industry groups that have high information value. Especially, ransomware has grown in various ways since entering maturity in 2017. Healthcare industry is highly vulnerable to ransomeware since most healthcare organizations are configured in closed network with lack of malware protection. Only meeting the security criteria is not the solution. In the case of a successful attack, restoration process must be prepared to minimize damages as soon as possible. Ransomware is growing rapidly and becoming more complex that protection must be improved much faster. Based on ISO 27799 and 27002 standard, we extract and present security measures against advanced ransomware to maintain and manage healthcare system more effectively.

Implementation of user authentication and access control system using x.509 v3 certificate in Home network system (홈 네트워크 시스템에서 x.509 v3 인증서를 이용한 사용자 인증 및 접근제어 시스템의 구현)

  • Lee, Kwang-Hyoung;Lee, Young-Gu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.920-925
    • /
    • 2010
  • A home network system is made up of home devices and wire and wireless network can not only be the subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. As a result, a variety of problems such as abuse of private life, and exposure and stealing of personal information arose. Therefore, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this dissertation designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.