• Title/Summary/Keyword: 위협 완화

Search Result 83, Processing Time 0.027 seconds

Study on Highly Reliable Drone System to Mitigate Denial of Service Attack in Terms of Scheduling (고신뢰 드론 시스템을 위한 스케줄링 측면에서의 서비스 거부 공격 완화 방안 연구)

  • Kwak, Ji-Won;Kang, Soo-Young;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.821-834
    • /
    • 2019
  • As cyber security threats increase, there is a growing demand for highly reliable systems. Common Criteria, an international standard for evaluating information security products, requires formal specification and verification of the system to ensure a high level of security, and more and more cases are being observed. In this paper, we propose highly reliable drone systems that ensure high level security level and trust. Based on the results, we use formal methods especially Z/EVES to improve the system model in terms of scheduling in the system kernel.

Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location (보안 위협위치에서 재사용 가능한 상태전이도를 이용한 보안요구사항 식별)

  • Seo Seong-Chae;You Jin-Ho;Kim Young-Dae;Kim Byung-Ki
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.67-74
    • /
    • 2006
  • The security requirements identification in the software development has received some attention recently. However, previous methods do not provide clear method and process of security requirements identification. We propose a process that software developers can build application specific security requirements from state transition diagrams at the security threat location. The proposed process consists of building model and identifying application specific security requirements. The state transition diagram is constructed through subprocesses i) the identification of security threat locations using security failure data based on the point that attackers exploit software vulnerabilities and attack system assets, ii) the construction of a state transition diagram which is usable to protect, mitigate, and remove vulnerabilities of security threat locations. The identification Process of application specific security requirements consist of i) the analysis of the functional requirements of the software, which are decomposed into a DFD(Data Flow Diagram; the identification of the security threat location; and the appliance of the corresponding state transition diagram into the security threat locations, ii) the construction of the application specific state transition diagram, iii) the construction of security requirements based on the rule of the identification of security requirements. The proposed method is helpful to identify the security requirements easily at an early phase of software development.

Combating Identity Threat of Machine: The effect of group-affirmation on humans' intellectual performance loss (기계의 정체성 위협에 대항하기: 집단 가치 확인이 인간의 지적 수행 저하에 미치는 효과)

  • Cha, Young-Jae;Baek, Sojung;Lee, Hyung-Suk;Bae, Jonghoon;Lee, Jongho;Lee, Sang-Hun;Kim, Gunhee;Jang, Dayk
    • Korean Journal of Cognitive Science
    • /
    • v.30 no.3
    • /
    • pp.157-174
    • /
    • 2019
  • Motivation of human individuals to perform on intellectual tasks can be hampered by identity threat from intellectual machines. A laboratory experiment examined whether individuals' performance loss on intellectual tasks appears under human identity threat. Additionally, by affirming alternative attributes of human identity, researchers checked whether group-affirmation alleviate the performance loss on intellectual tasks. This research predicted that under high social identity threat, individuals' performance loss on the intellectual tasks would be moderated by valuing alternative attributes of human identity. Experiment shows that when social identity threat is increased, human individuals affirmed alternative human attributes show higher performance on intellectual tasks than individuals non-affirmed. This effect of human-group level affirmation on performance loss did not appear in the condition of low social identity threat. Theoretical and practical implications were discussed.

A Study on National Security Policy Platforms by South Korea's Ruling Parties During General and Presidential Elections (17대·18대 대선과 18대·19대·20대 총선에 나타난 새누리당의 외교안보통일 공약 분석 : 북핵, 남북관계 그리고 한미동맹 공약을 중심으로)

  • Choi, Jong Kun
    • Korean Journal of Legislative Studies
    • /
    • v.22 no.2
    • /
    • pp.53-75
    • /
    • 2016
  • This article presents a descriptive analysis on national security policy platforms promoted by the ruling parties of South Korea during general and presidential elections. National security platforms made during the elections campaigns are a window that allows us to see how the ruling party perceives the threat environment, opportunity-structures, policy preferences and material capabilities faced by the state. South Korea presents a unique case since it faces constant military threats from North Korea and interacts with China and the United States. Therefore, the national security policy platforms, which are explicitly campaigned during the general and presidential elections, showcases the worldview of the ruling party. The study essentially focuses on three areas of the platforms - its threat perception on North Korea, the ROK-US alliance and the future vision for the Korean peninsula by covering two presidential elections and three general elections for the last 20 years.

DroidSecure: A Technique to Mitigate Privilege Escalation in Android Application (DroidSecure: 안드로이드 어플리케이션 권한 상승 완화를 위한 기술에 대한 연구)

  • Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.169-176
    • /
    • 2016
  • Android platform is designed to be user-friendly, yet sometimes its convenience introduces vulnerabilities that normal users cannot justify. In this paper, after making an overview of popular open source analysis tools for android applications, we point out the dangerous use of Permission Group in current Google Policy, and suggest a technique to mitigate the risks of privilege escalation that attackers are taking advantage of. By conducting the investigation of 21,064 malware samples, we conclude that the proposed technique is considered effective in detecting insecure application update, as well as giving users the heads-up in security awareness.

Music Therapy in Hospice Care (호스피스에서의 음악치료)

  • Moon, Ji-Young
    • Journal of Hospice and Palliative Care
    • /
    • v.10 no.2
    • /
    • pp.67-73
    • /
    • 2007
  • To make ones life meaningful is one of human's most valuable goal. Nevertheless, for cancer patients who are in the last phase of their lives obtaining this goal may be threatened by physical, psychological, and social difficulties. Music therapy ran be utilized to effectively fill in these physical, psychological, and social needs. In the form of a creative art, music therapy can be effective in easing the pain and tension as well as assisting the patient to discover meanings of life through psychological comfort. Further, music is itself a verbal/non-verbal communication tool and thus connects the patients with their families with understanding and sympathy. This study aims to examine the need and role of music therapy in hospice.

  • PDF

The Role and Collaboration Model of Human and Artificial Intelligence Considering Human Factor in Financial Security (금융 보안에서 휴먼팩터를 고려한 인간과 인공지능의 역할 및 협업 모델)

  • Lee, Bo-Ra;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1563-1583
    • /
    • 2018
  • With the deregulation of electronic finance, FinTech has been revitalized. The discussion on artificial intelligence is active in the financial industry. However, there is a problem of increasing security threats behind new technologies. Security vulnerabilities have increased because we are more connected than before, and the channels and entities of the financial industry have diversified. Although there are technical and policy discussions on security, the essence of all discussions is human. Fundamentals of finance are trust and security, and attention to human factors is important. This study presents the role of human and artificial intelligence for financial security, respectively. Furthermore, this derives a collaborative model in which human and artificial intelligence complement each other's limitations. To support this, it first discusses the development of finance and IT, AI, human factors, and financial security threats. This study suggests that the security threats will intensify in the era of new technology, but it can overcome them by using machinery and technology.

A Multi-Level Analysis of Influential Factors of Residents' Housing Instability in Korean Metropolitan Environments (대도시 거주자들의 주거불안정 영향요인에 관한 다층분석)

  • Lee, Minju
    • Journal of the Korean Regional Science Association
    • /
    • v.36 no.4
    • /
    • pp.57-67
    • /
    • 2020
  • This study aims to analyze influential factors of residents' housing instability in Korean large cities. The previous studies deal with low-income households' experiences with housing instability. However, this study empirically analyzed the impact of regional characteristics such as spatial openness and community characteristics on residents' housing instability. For this purpose, I analyzed various experiences as symptoms of residents' housing instability using data from the Ministry of Land, Infrastructure, and Transport's (MOLIT) Korean Housing survey through a multi-level logistic regression model. The study finds that regional factors as well as household characteristics influence their housing instability. This result implies that promoting spatial inclusivity alleviate residents' housing instability in metropolitan environments. In addition, this study calls for policy efforts such as a continuous supply of public rental housing and a greater variety of housing types to mitigate housing instability.

A Study on Injection Attacks and Defenses on Microsoft Windows (MS Windows에서 인젝션 공격 및 방어 기법 연구)

  • Seong, HoJun;Cho, ChangYeon;Lee, HoWoong;Cho, Seong-Je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.9-23
    • /
    • 2020
  • Microsoft's Windows system is widely used as an operating system for the desktops and enterprise servers of companies or organizations, and is a major target of cyber attacks. Microsoft provides various protection technologies and strives for defending the attacks through periodic security patches, however the threats such as DLL injection and process injection still exist. In this paper, we analyze 12 types of injection techniques in Microsoft Windows, and perform injection attack experiments on four application programs. Through the results of the experiments, we identify the risk of injection techniques, and verify the effectiveness of the mitigation technology for defending injection attacks provided by Microsoft. As a result of the experiments, we have found that the current applications are vulnerable to several injection techniques. Finally, we have presented the mitigation techniques for these injection attacks and analyzed their effectiveness.

사학연금 가입자의 수익비 분석

  • Ju, Hyo-Chan
    • Journal of Teachers' Pension
    • /
    • v.3
    • /
    • pp.309-344
    • /
    • 2018
  • 본 논문에서는 사학연금의 수급-부담 구조에 대한 실증자료를 제공할 목적으로 사학연금 가입연도 및 가입기간에 따른 수익비를 제시한다. 이에 따르면 전반적으로 가입시기가 늦어질수록 그리고 가입기간이 길어질수록 수익비는 감소하여 몇 차례의 사학연금법 개혁이 저부담·고급여 체계를 상당 부분 완화하였음을 알 수 있다. 더불어 저소득자의 수익비가 고소득자의 수익비에 비해 높아 2015년 개혁 시 도입된 소득재분배 효과를 확인할 수 있다. 하지만 현 제도 하에서도 사망률 감소에 따른 연금수급기간의 연장으로 수익비가 1보다 높은 것으로 나타나 연금재정에 큰 위협으로 파악된다. 다만 수익비는 그 계산에 있어 요구되는 여러 가지 가정에 따라 수치가 크게 달라질 수 있으므로 타공적연금과의 비교 시 이에 대한 각별한 유의가 필요하다. 또한 수익비는 수급-부담 구조를 나타내는 지표일 뿐 공적연금제도 본연의 기능인 노후소득보장 정도를 알려주기에는 한계가 있음에 유념해야 한다.