• Title/Summary/Keyword: 위협 분석

Search Result 2,336, Processing Time 0.027 seconds

North Korean Cyber Warfare Threat and South Korean Action (북한의 사이버전 위협분석과 대응방안 고찰)

  • Kim, Doo-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.1-10
    • /
    • 2014
  • In this study, I analyzed the increased threat of cyber warfare and the threat of reality about what is happening around the currently. And to prepare for it, I proposed the fact how main developed countries deal with cyber warfare. Also, I presented North Korea's cyber warfare threat which is equipped with world's top 3 cyber warfare performance and the way how their strategy influence to South Korea's national security. Moreever, I studied the existing North Korea's cyber warfare threat and the way how, how South Korea deal with it and prepare to against expected threat of cyber warfare in future.

The realistic threat and symbolic threat toward people with mental illness: The effect of contact and sense of community (정신장애인에 대한 실질적 위협감 및 상징적 위협감: 접촉경험 및 공동체의식과의 관계)

  • Seungah Ryu;Kyoungmi Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.25 no.2
    • /
    • pp.119-135
    • /
    • 2019
  • There have been many efforts to reduce prejudice and discrimination against people with mental illness in our community. Studies have shown that the threat to people with mental illness is a important factor. In this study, we focused on contact experience and sense of community that are believed to influence both realistic and symbolic threat We looked the differences in threat depending on the type of contact(family, friends/coworker, public places, no contact) with people with mental illness. Next, if there is contact experience, we questioned that the quality of the experience could influence the threats in all types of contact. Finally, could contact experience and sense of community affect the threats? The total of 465 respondents were surveyed in this study. The result showed that the realistic threat were not different depending on the types of contact, but that the symbolic threat were more higher people with no-contact experience than people with contact experience. The quality of experience had a significant effect on both threats, except in the case of the family contact on realistic threat. Lastly, sense of community was analyzed as a significant variable for both realistic and symbolic threats. Based on these results, we discussed the impact of contact and sense of community and implications of this study.

전자적 제어시스템 침해 위협에 따른 법적 대응방안

  • Lim, Jong-In;Jang, Gye-Hyun
    • Review of KIISC
    • /
    • v.20 no.4
    • /
    • pp.52-65
    • /
    • 2010
  • 최근 기존 폐쇄적 제어시스템 환경에서 네트워크를 통해 연결되는 개방형 제어시스템으로 변화하는 등 전자적 제어시스템의 정보통신기술에 대한 의존도가 더욱 심화되고 있다. 전자적 제어시스템은 효율성을 높이고 사회 전반의 편의성을 증진시켰으나, 정보통신기술의 취약성이 전이됨에 따라 안전하게 보호되어야할 제어시스템은 위협에 노출되고 있는 것이 현재 상황이다. 전자적 제어시스템 침해사고 발생 시 제어시스템의 특성 상 많은 피해 및 사회적 혼란을 초래할 수 있기 때문에, 국가 차원에서 법률적인 보호조치가 필요하다. 국내에서는 2001년 "정보통신기반 보호법"이 시행되어 국가정보통신기반시설에 대한 보호 및 사고 대응을 규정하고 있다. 본 논문에서는 실제 발생한 제어시스템 침해사고를 분석을 통해 전자적 제어시스템의 위협요인 및 이에 따른 대응방안을 모색한다. 또한 제어시스템 위협에 가장 선도적으로 대응하고 있는 미국의 법제 분석을 통해 전자적 제어시스템 침해 위협에 따른 법적 대응방안에 대하여 연구하고자 한다.

A Study on the Analysis and Classification of Cyber Threats Accor ding to the Characteristics of Computer Network of National·Public Organizations (국가·공공기관 전산망 특성에 따른 사이버 위협 분석 및 분류에 관한 연구)

  • Kim, Minsu;Park, Ki Tae;Kim, Jongmin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.197-208
    • /
    • 2020
  • Based on the network infrastructure advanced in the information knowledge society, the structure of computer net work is operated by establishing the composition of network in various forms that have secured the security. In case of computer network of national/public organizations, it is necessary to establish the technical and managerial securit y environment even considering the characteristics of each organization and connected organizations. For this, the im portance of basic researches for cyber training by analyzing the technical/managerial vulnerability and cyber threats based on the classification and map of cyber threats according to the characteristics of each organization is rising. T hus, this study aims to analyze each type of external/internal cyber threats to computer network of national/public o rganizations established based on the dualistic infrastructure network of internet and national information network, a nd also to present the cyber threat framework for drawing the elements of cyber security training, by drawing and analyzing the actual elements of cyber threats through the case-based scenario.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.

Derivation of Security Requirements for Cloud Managing Security Services System by Threat Modeling Analysis (위협 모델링 분석에 의한 클라우드 보안관제시스템 보안요구사항 도출)

  • Jang, Hwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.5
    • /
    • pp.145-154
    • /
    • 2021
  • Recently, the introduction of Cloud Managing Security Services System to respond to security threats in cloud computing environments is increasing. Accordingly, it is necessary to analyze the security requirements for the Cloud Managing Security Services System. However, the existing research has a problem that does not reflect the virtual environment of the cloud and the data flow of the Cloud Managing Security Services System in the process of deriving the requirements. To solve this problem, it is necessary to identify the information assets of the Cloud Managing Security Services System in the process of threat modeling analysis, visualize and display detailed components of the cloud virtual environment, and analyze the security threat by reflecting the data flow. Therefore, this paper intends to derive the security requirements of the Cloud Managing Security Services System through threat modeling analysis that is an improved existing research.

Analysis on Presidential Security Threat of Cyber Physical System by Cyber Attack Focusing Intelligent Building System (사이버물리시스템에 대한 사이버공격 경호위협 분석 - 지능형건물관리시스템을 중심으로 -)

  • Choi, Junesung;Lee, Sam Youl
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.669-672
    • /
    • 2020
  • In this paper, we analyzed the characteristics of cyber attacks and major threat scenarios that could occur around intelligent building management Systems(IBS) by cyber attack security threats against cyber physics systems. Generally determined that lowering the likelihood of aggression against predictable threats would be a more realistic approach to attack response. The countermeasures against this need to be applied to multi-layered defense systems, and three alternatives were proposed: preliminary cyber safety diagnosis for protection targets and the establishment of mobile security control systems.

A Study on the Improvement of the Domestic Terrorism Response System in Response to Increasing Terrorism Threats (테러위협 증가에 따른 국내 테러대응체계 개선방안)

  • Yu, Bi;Park, Joon-Suk
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2023.11a
    • /
    • pp.327-328
    • /
    • 2023
  • 본 논문은 테러 위협 증가에 따른 국내 테러대응체계 개선방안에 대해 국내·외 사례분석을 통하여 국내 상황에 맞는 국내 테러대응체계의 실질적인 개선방안을 제시하는데 그 목적이 있다. 국내·외 논문, 간행물 및 서적 등을 바탕으로 문헌 분석 연구를 진행하였으며, 연구와 관련한 자료와 사례 등은 대테러센터, 국가정보원, 대통령경호처, 외교부, 행정안전부, 여성가족부 등 각 부처의 자료와 인터넷 그리고 신문자료 등을 활용하여 분석하였다. 이를 통해 도출한 국내 테러대응체계의 문제점은 총 다섯 가지이다. 첫 째, 최신 글로벌 테러정세와 동떨어진 국내 테러방지법과 관련 법제도의 미비 둘 째, 복잡하고 산개된 대테러조직 개편의 필요, 셋 째, 비전통적 위협에 대한 대책 마련 시급, 넷 째, 다문화 사회 속 폭력적 극단주의 대응(CVE) 개발 및 시행 필요, 다섯 째, 대테러분야 전문성 미흡이 있으며, 이와 같은 문제점을 토대로 총 다섯 가지 개선방안을 제시하였다.

  • PDF

Type of Subjective Perception on the Fear Message - Q-methodological analysis on the latest Report of Korean Peninsula Situation - (위협적 메시지에 대한 주관적 인식 유형 - 최근 한반도 정세 관련 보도의 Q방법론적 분석 -)

  • Lee, Soonmo
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.2
    • /
    • pp.223-236
    • /
    • 2013
  • Related to the situation on the Korean Peninsula, by North Korea's threat of war the tension escalates and serious crisis continues. The purpose of this study is to evaluate the subjective perception which the residents of South Korea feel about North Korea's threat of war through a Q methodological analysis framework. In the result of the study, for the North Korea's threat of war the South Korean's recognition type is analyzed into four type such as 'non-reactive', 'fearreactive', 'psychological anxiety' and 'cynical ignorance type'. First, the No. 1 type 'non-reactive' does not empathize with North Korea's threat of war itself, and second type 'fear-reactive' have uneasy feeling like that 'What would happen as things go' and feel a sense of crisis about the North Korea's threat of war. The third type 'psychological anxiety' is type which feels that due to North Korea's threat of war inter-Korean relations is in the crisis. Finally the fourth type 'cynical ignorance' think that North Korea's threat of war is bluffing and also North Korea is like a shepherd boy. The reason to apply Q-methodology in this study is to make it possible to a more in-depth approach to subjective perception and threat of psychological meaning for the threatening message of study participants.

An Analysis of Security Threats and Vulnerabilities for Information Protection in Smartwork Environment (스마트워크 환경에서 정보보호를 위한 보안위협 및 취약점 분석)

  • Kim, Hee-Wan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2014.11a
    • /
    • pp.291-292
    • /
    • 2014
  • 본 연구에서는 스마트워크 환경에서 정보보호를 위하여 사용자와 서비스 제공자 입장에서 정보보호 요구사항을 분석하고, 정보보호 요구사항을 바탕으로 스마트워크 도입 및 운영 관점에서의 보안 위협 및 취약점을 분석하여 대안을 찾고자 한다.

  • PDF