• Title/Summary/Keyword: 위협 인식

Search Result 464, Processing Time 0.025 seconds

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

A Study on Curriculum Model for Secure Access Service Edge in IoT Environment (사물인터넷 환경에서 보안 액세스 서비스 에지 교육과정 모델에 관한 연구)

  • Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.4
    • /
    • pp.65-70
    • /
    • 2024
  • In the Internet of Things environment, new security requirements are changing rapidly. In this rapid change, if a breach occurs due to a security threat, great damage will occur. The SASE (Secure Access Service Edge) environment is highly vulnerable to security threats, and if a breach occurs, serious damage will occur. In order to strengthen the security of the SASE environment, a specialized curriculum that covers the unique characteristics and problem solving of SASE is required. In this paper, we propose a curriculum model for responding to security incidents in the SASE environment. The proposed curriculum model is designed to cover various aspects of SASE security, including threat types, breach scenarios, and response procedures. The goal of this model is to increase security awareness and prepare professionals to effectively handle security incidents within a SASE framework.

텔레바이오인식기반 비대면 인증기술 표준화 동향

  • Kim, Jason;Lee, Sung Jae;Kim, Byoungsub;Lee, Sang-Woo
    • Review of KIISC
    • /
    • v.25 no.4
    • /
    • pp.43-50
    • /
    • 2015
  • 바이오인식기술은 사람의 지문 얼굴 홍채 정맥 등 신체적 특징(Physiological characteristics) 또는 음성 서명 자판 걸음걸이 등 행동적 특징(Behavioral characteristics)을 자동화된 IT 기술로 추출 저장하여 다양한 IT 기기로 개인의 신원을 확인하는 사용자 인증기술이다. 2001년 미국의 911 테러사건으로 인하여 전 세계 국제공항 항만 국경에서 지문 얼굴 홍채 등 바이오정보를 이용한 출입국심사가 보편화됨과 동시에 ISO/IEC JTC1 SC37(바이오인식) 국제표준화기구를 중심으로 표준화가 급속도로 진행되어 왔다. 최근 들어 스마트폰 테블릿 PC 등 모바일기기에 지문 얼굴 등 바이오정보를 탑재하여 다양한 모바일 응용서비스를 가능하게 해주는 모바일 바이오인식 응용기술이 전 세계적으로 개발 보급되고, 삼성전자 페이팔 중심으로 바이오인식기술을 이용한 모바일 지급결제솔루션에 대한 사실표준화협의체인 FIDO, ITU-T SG17 Q9(텔레바이오인식) 국제표준화기구를 중심으로 표준화가 진행되고 있다. 특히 이러한 모바일 바이오인식기술은 스마트폰을 통한 비대면 인증기술 수단으로서 핀테크의 중요한 요소기술로 작용될 전망이다. 한편, 위조지문 등 전통적인 바이오인식 기술의 위변조 위협으로 인한 우려도 증폭됨에 따라 스마트워치 등 웨어러블 디바이스에서 살아있는 사람의 심박수(심전도), 뇌파 등의 생체신호를 측정하여 스마트폰을 통하여 개인을 식별하는 차세대 바이오인식기술로 진화중에 있다. 본고에서는 바이오인식기술의 변천사와 함께 국내외 모바일 바이오인식기술 동향과 표준화 추진현황을 살펴보고, 지난 2015년 5월 29일 발족한 KISA "모바일 생체신호 인증기술 표준연구회"를 통하여 뇌파 심전도 등생체신호를 이용한 차세대 바이오인식 기술 및 표준화 계획을 수립하여 향후 바이오인식기반의 비대면 인증기술에 대한 추진전략을 모색하고자 한다.

A Study on National Security Policy Platforms by South Korea's Ruling Parties During General and Presidential Elections (17대·18대 대선과 18대·19대·20대 총선에 나타난 새누리당의 외교안보통일 공약 분석 : 북핵, 남북관계 그리고 한미동맹 공약을 중심으로)

  • Choi, Jong Kun
    • Korean Journal of Legislative Studies
    • /
    • v.22 no.2
    • /
    • pp.53-75
    • /
    • 2016
  • This article presents a descriptive analysis on national security policy platforms promoted by the ruling parties of South Korea during general and presidential elections. National security platforms made during the elections campaigns are a window that allows us to see how the ruling party perceives the threat environment, opportunity-structures, policy preferences and material capabilities faced by the state. South Korea presents a unique case since it faces constant military threats from North Korea and interacts with China and the United States. Therefore, the national security policy platforms, which are explicitly campaigned during the general and presidential elections, showcases the worldview of the ruling party. The study essentially focuses on three areas of the platforms - its threat perception on North Korea, the ROK-US alliance and the future vision for the Korean peninsula by covering two presidential elections and three general elections for the last 20 years.

A Research on the Analyzing Biometric Aviation Security System and Proposing Global Standardization to Improve Aviation Safety (항공안전 향상을 위한 생체인식 기반 항공보안시스템 도입 및 국제표준화 활성화 연구)

  • Cho, Sung-Hwan;Yoon, Han-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.637-647
    • /
    • 2020
  • Airports and civil aviation authorities have recently utilized and expanded the use of biometric technologies to respond proactively against the rapid changes in aviation terrorism due to scientific development. The Global Security Plan (GASeP) developed by the International Civil Aviation Organization (ICAO) is regarded as precondition for sustainable development of the global air transport industry. Thus GASeP has sought to improve aviation security system using biometic technologies. The purpose of this paper is to realize the equivalent access of aviation security system throughout the world with biometric technologies. First, this paper reviewed the current biometric-security system operated by the EU, USA and international society. Second, legal and institutional processes regarding personal biometric information were analyzed to suggest political implications. This paper concluded that ICAO should propose a global standardization and prepare guideline materials among its 193 member states to prevent aviation security breaches and to share related information on a real-time basis because time is required to utilize biometric technology to improve aviation safety and to develop global air transport.

A comparison of weight on SWOT factors of hidden champion between Korea and Germany (한독 히든챔피언 간의 SWOT요인 중요도 비교)

  • Lee, Sang Suk
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.11 no.6
    • /
    • pp.163-174
    • /
    • 2016
  • The object of this study identifies the weights of SWOT factors in hidden champion. And the other purpose of the study is to test the differences of weight between Korea hidden champion group and Germany theirs group. The survey research is employed for the hidden champion CEOs of two countries. This research is employed the AHP(Analytic Hierarchy Process) for the weight of SWOT factors in hidden champion based on an empirical survey done to 61 firms which are to be fostered as Korean type hidden champion and 40 firms which are to be fostered as Germany type hidden champion. And then the t-test assesses whether the weight means of two groups are statistically different from each other. The weights of SWOT factors of hidden champion have been identified. There are the differences of weight between Korea group and Germany group. The order of Korea group's weight is following by the strength (0.3062), the opportunities (0.2344), the threat (0.1804), and the weakness (0.1157). The order of Germany group's weight is following by the strength (0.2603), the opportunities (0.2286), the threat (0.1604), and the weakness (0.1432). The technology capability of strength, the lack of knowledge on overseas market of weakness and the market uncertainty of thereat have statistically differences between two groups. However, the sub-factors of opportunities statistically have no differences.

  • PDF

A Study on the Threat of North Korean Small Drones (북한 소형 드론 위협 사례에 대한 연구)

  • Kwang-Jae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.397-403
    • /
    • 2024
  • North Korea's rapidly advancing drone development and operational capabilities have become a significant threat to South Korea's security. The drone incursions by North Korea in 2014, 2017, and 2022 demonstrate the technological advancement and provocative potential of North Korean drones. This study aims to closely analyze the military threats posed by North Korean drones and seek effective countermeasures. The research examines the development level of North Korean drone technology, its military applications, the characteristics and patterns of recent drone incursions, the adequacy and limitations of South Korea's current response systems, and future countermeasures. For this purpose, domestic and international research literature and media reports were reviewed, and specific North Korean drone incursion cases were analyzed. The results indicate that North Korea's small drones possess technological features such as small size, low altitude, low-speed flight, long-duration flight, and reconnaissance equipment. These drones pose threats that can be utilized for reconnaissance, surveillance, surprise attacks, and terrorism. Additionally, South Korea's current response systems reveal limitations such as inadequate detection and identification capabilities, low interception success rates, lack of an integrated response system, and insufficient specialized personnel and equipment. Therefore, this study suggests various technical, policy, and international cooperative countermeasures, including the development of drone detection and identification technologies, the utilization of diverse drone neutralization technologies, the establishment of legal and institutional foundations, the construction of a cooperative framework among relevant agencies, and the strengthening of international cooperation. The study particularly emphasizes the importance of raising awareness of the North Korean drone threat across South Korean society and unifying national efforts to respond to these threats.

시민단체에서 바라본 에너지 상대개격 체계 조기개편의 필요성

  • Park, Yong-Sin
    • LP가스
    • /
    • s.91
    • /
    • pp.27-36
    • /
    • 2004
  • 2003년 2월 14일 한국 사회는 중요한 사회적 합의를 이루어냈었다. 그해 1월 11일에 구성된 '경유차 환경위원회'에서 총 8차계의 회의를 거쳐 최근 급증하고 있는 경유 다목적차(RV), 운행중인 화물트럭, 버스 등 경유차로 인한 대기오염이 국민의 건강을 크게 위협하고 있어 더 이상 방치할 수 없는 문제임을 깊이 인식하고, 경유차로 인한 대기오염을 근원적으로 줄여나간다는 원칙아래, 경유 승용차 배출허용기준 조정방안을 포함해서 몇 가지의 대기오염 저감 대책을 수립, 추진한다는 것이었다. 그 대책을 요약하면 다음과 같다.

  • PDF

인간의 감정 상태를 이용한 사회공학 기법 연구

  • Park, Jae-Hyeok;Lee, Jae-Woo
    • Review of KIISC
    • /
    • v.25 no.4
    • /
    • pp.57-62
    • /
    • 2015
  • 최근의 정보보호 관련 사고를 살펴보면 기업 내부자로 인한 개인정보의 유출과 같이 특별한 기술 없이 이루어지는 인간 중심의 정보보호가 이슈화되고 있다. 그만큼 점점 사회공학적인 위협이 증가하고 있는 추세이며, 그 위험성이 사회 전반적으로 인식되어가고 있다. 본 지를 통해 사회공학의 의미에 대해 되짚어보고, 사회공학 라이프 사이클과 최근의 사회공학 공격 기법에 대해 분석한다. 또한 일반적 사회공학 의미인 인간 상호 작용의 깊은 신뢰를 바탕으로 사람들을 속여서 보안 절차를 우회하는 등의 기존 개념에 더하여 유사한 사례를 바탕으로 인간의 대표적 감정 상태(두려움, 슬픔, 기쁨)를 이용한 사회공학 기법에 대해 논한다.

Security Issues in Social Network Service (소셜 네트워크 서비스 신뢰성 강화 기술동향)

  • Youn, T.Y.;Hong, D.W.
    • Electronics and Telecommunications Trends
    • /
    • v.26 no.4
    • /
    • pp.134-145
    • /
    • 2011
  • 서비스 제공자 중심에서 소비자 중심으로 지식정보의 생산 및 유통이 변화한 새로운 형태의 서비스인 소셜 네트워크 서비스가 다양한 모습으로 발전하고 있다. 특히, 스마트폰으로 대표되는 다양한 스마트 디바이스의 발전으로 소셜 네트워크 서비스의 발전은 더욱 활성화되었다. 이에 따라 관련 산업이 크게 발전하고 있으나 소비자가 스스로 정보를 생산 및 유통하는 과정에서 발생하는 다양한 보안 위협들에 대한 인식 및 대응 방법이 미비하여 새로운 문제점들을 야기하고 있다. 본 고에서는 소셜 네트워크 서비스에서 발생하는 다양한 보안 취약성들을 정리하고 이를 개선하기 위한 기술들에 대해 살펴본다.

  • PDF