• Title/Summary/Keyword: 위협요소

Search Result 746, Processing Time 0.03 seconds

A Study on the Software Supply Chain Security Policy for the Strengthening of Cybersecurity: Based on SBOM Policy Cases (사이버안보 강화를 위한 소프트웨어 공급망 보안 정책 연구: SBOM 정책 추진 사례를 중심으로)

  • Son, Hyo-Hyun;Kim, Dong-Hee;Kim, So-Jeong
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.9-20
    • /
    • 2022
  • Supply chain attacks target critical infrastructure, causing large amounts of damage and evolving into a threat to public safety and national security. Accordingly, when establishing cybersecurity strategies and policies, supply chain risk management is specified to enhance security, and the US Biden administration recently issued the Executive Order on Improving the Nation's Cybersecurity, SBOM was mentioned as part of the guidelines for strengthening software supply chain security. If the government mandates SBOM and uses it as a security verification tool for supply chains, it can be affected by the domestic procurement system in the future and can be referenced when establishing a security system for domestic supply chains according to the progress of policy implementation. Accordingly, in this paper, countries that are promoting the SBOM policy as a way to strengthen the security of the software supply chain were selected and analyzed with a focus on related cases. In addition, through comparison and analysis of foreign SBOM policy trends, methods for using domestic SBOM in terms of technology, policy, and law were considered. As the value of using SBOM as a supply chain integrity/transparency verification tool is expected in the future, it is necessary to continuously identify trends in the establishment of international standardization and policy development for SBOM and study the standard format.

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.

Control measures in Cyberspace in the light of Rimland theory (림랜드 이론으로 본 사이버공간 통제방안 (북한의 사이버전 사례연구를 중심으로))

  • Dong-hyun Kim;Soo-jin Lee;Wan-ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.11-16
    • /
    • 2022
  • Development of science technology make integrated CPS(Cyber-Physical System) appear. In CPS era, cyberspace and physical-space are hard to separate anymore, that is developing toward integrated CPS. The reality is not stopping, that is consistently changing and the concept of space is developing too. But several articles are considering for cyberspace and physical-space separately, and they are developing tailed alternative each case. The theorical approaching that is not considering reality is dwelled on past, and is dangerous from dropping down to floating cloud that is not considering progressed reality. This article is suggested to consider rimland theory to control measures in cyberspace. That is dedicated to integrated approaching from physical-space to cyberspace. And that is developing concreted controling measures in cyberspace. Especially, this article is suggested to policy alternative by analyzing north korea cyber warfare from rimland theory including human sources. Simplicity is the ultimate sophistication. This article make integrated approaching effects about cyberspace and physical-space to preparing in the CPS era.

A Study on the Strategic and Competitive Analysis of Public Libraries: Focusing on a Case of C Public Library (공공도서관의 전략경쟁분석에 관한 연구 - C도서관의 사례를 중심으로 -)

  • Noh, Dong-Jo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.17 no.2
    • /
    • pp.223-238
    • /
    • 2006
  • For a public library. which is a regional information service agency. to acquire high competitiveness, preparation for uncertainties of future through understanding its own internal strengths and weaknesses. and external opportunities and threats based on assessments regarding knowledge information environment and characteristics of regional community. current status of the library, etc. Therefore. in this study, through SWOT analysis. one of competitive strategy analysis methods, the status of competitive strategy of C library was analyzed. In order to carry out the study interview and survey were performed with professional librarians, then through final consultations from management consulting experts, a plan to strengthen competitiveness for C library was devised. Conclusions from this study were as below. In order to strengthen competitiveness of C library offering distinguished high quality services through active cooperations with external institutions, efforts to improve library's position and stand following being selected as a library to visit for 2006 World Library and Information Congress, and revitalization of library usage through providing user oriented differentiated services are needed.

Assessing the Habitat Potential of Eurasian Otter (Lutra lutra) in Cheonggye Stream Utilizing the Habitat Suitability Index (서식지 적합성 지수를 이용한 청계천 수달의 서식지 평가)

  • In-Yoo Kim;Kwang-Hun Choi;Dong-Wook W. Ko
    • Korean Journal of Environment and Ecology
    • /
    • v.37 no.2
    • /
    • pp.140-150
    • /
    • 2023
  • The Eurasian otter (Lutra lutra) is an apex predator of the riparian ecosystem. It is a keystone and an indicator species; consequently, its presence suggests a sustainable water environment. Otter is a keystone species as a predator at the top of the food web in the aquatic environment and an indicator species representing the health of the aquatic environment. Although Eurasian otters disappeared from the Han River urban water system because of anthropogenic activities like habitat destruction, poaching, and environmental pollution in the 1980s, the species were sighted in the Cheonggye Stream, Jungrang Stream, and Seongnae Stream, which are urban sections of the Han River, in 2016 and 2021. Therefore, it is pertinent to assess the habitat potential in the area for conservation and management measures to ensure its permanent presence. However, existing studies on otter habitats focused on natural rivers and reservoirs, and there is a limit to applying them to habitats artificially confined habitats in narrow spaces such as tributaries in urban areas of the Han River. This study selected the Cheonggye Stream, an artificially restored urban stream, to evaluate its potential as a habitat for Eurasian otters in urban water environments using the habitat suitability index (HSI). The HSI was calculated with selected environment attributes, such as the cover, food, and threat, that best describe the L. lutra habitat. According to the results, the confluence area of Seongbuk Stream and Cheonggye Stream and the confluence area of Cheonggye Stream and Jungnang Stream were suitable otter habitats, requiring appropriate conservation efforts. The HSI model suggests a valuable method to assess the habitat quality of Eurasian otters in urban water environments. The study is crucial as it can help rehabilitate the species' populations by identifying and managing potential Eurasian otter habitats in highly urbanized areas of the Han River basin and its tributaries.

River Embankment Stability against Hydraulic Piping Failure in Korea (우리나라 하천제방에 대한 내부침식 파괴 연구 : 사례연구)

  • Kwon, Kyo-Keun;Han, Sang-Hyun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1C
    • /
    • pp.33-42
    • /
    • 2006
  • Lots of river embankments or levees in Korea are quite so old and unknown the origin even. The river deposits, moreover, obtainable easily somewhere were used for materials of embankment without any technical considerations such as the influence soil properties and construction methods on embankment stability. It's natural that safety would be threatened if the water level rises due to flood or rainfall when it comes to abnormal weather conditions, especially. From this point of view, enlargement of embankment, irrigation works, etc. are in progress recently at the situation from a reinforcement work. However, taking influence of soil properties and construction methods on embankment stability into account against cracking or piping is still insufficient. Fragmentary design criteria or irrational construction methods are applied rather as the case may be. In this study, therefore, a way to estimate piping and cracking resistance (Sherard, 1953) has been introduced and reevaluated for practical use with an eye to material properties and its applicability to piping-experienced embankments was examined. Piping possibility was also examined in the present design criteria and compared. In view of the results achieved, it reflects that both yield piping possibility. But it's still necessary to complement how to judge and verify piping resistance of given soils with gradation curves by the representative curve, quantitatively and that piping resistance should consider compaction effects as well.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Geological Factor Analysis for Evaluating the Long-term Safety Performance of Natural Barriers in Deep Geological Repository System of High-level Radioactive Waste (지질학적 심지층 처분지 내 천연방벽의 고준위 방사성 폐기물 장기 처분 안전성 평가를 위한 지질학적 인자 분석)

  • Hyeongmok Lee;Jiho Jeong;Jaesung Park;Subi Lee;Suwan So;Jina Jeong
    • Economic and Environmental Geology
    • /
    • v.56 no.5
    • /
    • pp.533-545
    • /
    • 2023
  • In this study, an investigation was conducted on the features, events, and processes (FEP) that could impact the long-term safety of the natural barriers constituting high-level radioactive waste geological repositories. The FEP list was developed utilizing the IFEP list 3.0 provided by the Nuclear Energy Agency (NEA) as foundational data, supplemented by geological investigations and research findings from leading countries in this field. A total of 49 FEPs related to the performance of the natural barrier were identified. For each FEP, detailed definitions, classifications, impacts on long-term safety, significance in domestic conditions, and feasibility of quantification were provided. Moreover, based on the compiled FEP list, three scenarios that could affect the long-term safety of the disposal facility were developed. Geological factors affecting the performance of the natural barrier in each scenario were selected and their relationships were visualized. The constructed FEP list and the visualization of interrelated factors in various scenarios are anticipated to provide essential information for selecting and organizing factors that must be considered in the development of mathematical models for quantitatively evaluating the long-term safety of deep geological repositories. In addition, these findings could be effectively utilized in establishing criteria related to the key performance of natural barriers for the confirmation of repository sites.

Ecological Connectivity and Network Analysis of the Urban Center in a Metropolitan City (대도시 도심의 생태적 연결성 및 연결망 분석)

  • Jaegyu Cha
    • Journal of Environmental Impact Assessment
    • /
    • v.32 no.6
    • /
    • pp.503-515
    • /
    • 2023
  • The disconnection and fragmentation of ecological spaces that occur during the development process pose a significant threat to biodiversity. Urban center areas with high development pressure are particularly susceptible to low connectivity due to a scarcity of ecological space. This issue tends to be more pronounced in larger cities.To address this challenge, continuous efforts are needed to assess and improve the current state of ecological space connectivity at the level of individual projects and urban management. However, there is a lack of discussion regarding the analysis and improvement of ecological connectivity in metropolitan cities In line with this objective, this study evaluated the connectivity of ecological spaces in the city centers of Seoul, Busan, Daegu, Incheon, Gwangju, Daejeon, and Ulsan. The evaluation revealed that city centers exhibited lower connectivity of ecological spaces compared to their peripheries or the overall city. In addition, in the ecological network analysis that reflected regional characteristics, such as the species distribution model conducted on Daejeon, 510 optimal paths connecting forests of more than 1ha were derived. This study is significant as an example of deriving an ecological network based on regional characteristics, including quantitative figures necessary for establishing goals to improve urban ecological connectivity and biodiversity. It is anticipated that the results can be utilized to propose directions for enhancing ecological connectivity in environmental impact assessments or urban management and to establish an evaluation framework.

Application of Matrix-assisted Laser Desorption/Ionization Time-of-flight Mass Spectrometry (Matrix-assisted Laser Desorption/Ionization Time-of-flight Mass Spectrometry의 활용)

  • Pil Seung KWON
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.55 no.4
    • /
    • pp.244-252
    • /
    • 2023
  • The timeliness and accuracy of test results are crucial factors for clinicians to decide and promptly administer effective and targeted antimicrobial therapy, especially in life-threatening infections or when vital organs and functions, such as sight, are at risk. Further research is needed to refine and optimize matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS)-based assays to obtain accurate and reliable results in the shortest time possible. MALDI-TOF MS-based bacterial identification focuses primarily on techniques for isolating and purifying pathogens from clinical samples, the expansion of spectral libraries, and the upgrading of software. As technology advances, many MALDI-based microbial identification databases and systems have been licensed and put into clinical use. Nevertheless, it is still necessary to develop MALDI-TOF MS-based antimicrobial-resistance analysis for comprehensive clinical microbiology characterization. The important applications of MALDI-TOF MS in clinical research include specific application categories, common analytes, main methods, limitations, and solutions. In order to utilize clinical microbiology laboratories, it is essential to secure expertise through education and training of clinical laboratory scientists, and database construction and experience must be maximized. In the future, MALDI-TOF mass spectrometry is expected to be applied in various fields through the use of more powerful databases.