• Title/Summary/Keyword: 정보자산보호

Search Result 259, Processing Time 0.03 seconds

Adaptive Multi-Layer Security Approach for Cyber Defense (사이버 방어를 위한 적응형 다중계층 보호체제)

  • Lee, Seong-kee;Kang, Tae-in
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.1-9
    • /
    • 2015
  • As attacks in cyber space become advanced and complex, monotonous defense approach of one-one matching manner between attack and defense may be limited to defend them. More efficient defense method is required. This paper proposes multi layers security scheme that can support to defend assets against diverse cyber attacks in systematical and adaptive. We model multi layers security scheme based on Defense Zone including several defense layers and also discuss essential technical elements necessary to realize multi layers security scheme such as cyber threats analysis and automated assignment of defense techniques. Also effects of multi layers security scheme and its applicability are explained. In future, for embodiment of multi layers security scheme, researches about detailed architecture design for Defense Zone, automated method to select the best defense technique against attack and modeling normal state of asset for attack detection are needed.

The Quantification of Flood Damage Using K-FRM (K-FRM을 이용한 홍수피해액 정량화)

  • Yeong Uk Yu;In Gyu Hwang;Yeon Jeong Seong;Young Hun Jung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.405-405
    • /
    • 2023
  • 최근 기후변화로 인한 극심한 홍수와 가뭄, 폭염 등 이상 기온 및 기후에 따른 피해가 급격히 증가하는 추세이다. 특히, 집중호우로 인해 도심지에서 발생한 홍수피해는 재산피해뿐만 아닌 수 많은 인명피해가 발생하고 있다. 국내에서는 수재해로부터 인명과 재산을 보호하기 위해 용수공급과 체계적인 치수 사업이 행한 바 있다. 이러한 치수 사업에서 경제성 분석은 사업 전·후 의 편익추정이 완벽히 검증되기 쉽지 않으며, 기존의 치수 계획은 유역 전반에 걸쳐 다양한 홍수 방어시설의 종합적인 고려 없이 제방 중심으로만 수립되어 홍수 발생 시 하천에 과도한 부담을 줄 뿐만 아니라, 사업의 경제성이 낮게 평가되고 있다. 이렇게 국내에서 행해진 하천설계기준에서 제안되었던 경제성 분석 방법은 여러 가지 문제점들을 내포하고 있으며 지속적인 홍수피해가 발생하였다. 이와 같은 문제점들을 개선하고자 개발된 K-FRM(Forean-Flood-Risk Model)은 능동형 하천정보 운영을 통한 다차원 하천관리체계 구축 및 활용을 위한 정량적 위험도 평가 툴로 위험지역에 노출된 자산의 정보(인벤토리), 평가기준, 손상함수, 계량화 원단위 등 홍수피해를 추정하는데 활용이 가능하며, 손실 또는 피해액으로 표현되는 재해손실은 경제적인 관점에서의 위험이며 금전적인 형태로 표현된다. 본 연구에서는 홍수피해액 정량화 모델인 K-FRM을 활용하여 굴포천 유역과 영강 유역을 대상으로 항목별 피해액 산정 후, 정량적 피해액 산정 방법인 EAD(Expected Annual Damage) 분석을 통해 홍수피해위험지도를 작성하여 표준유역별, 행정구역별 홍수피해액을 산정하는 것을 목적으로 한다.

  • PDF

Analysis of Domestic Patents Related to Usefulness of Native Plants in Korea (대한민국 자생식물 유용성 관련 국내 특허 분석)

  • Min Sung Lee;Yu Jin Oh;Bumhee Lee;Mijeong Choi;Chae Sun Na;Yeong Su Kim
    • Advanced Industrial SCIence
    • /
    • v.2 no.4
    • /
    • pp.36-43
    • /
    • 2023
  • Native plants thrive naturally in specific areas without human intervention, offering significant potential as genetic resources and biotechnological assets across multiple sectors. To harness this potential, our focus was on analyzing domestic patents related to native plants, investigating their uses, effectiveness, active components, and extraction methods. Using the Korea Forest Service's National Standard Plant List, we gathered data from 988 patents on native plants and 430 patents on the use of native plant seeds. This comprehensive patent analysis aimed to reveal research patterns, technology levels, and emerging trends. The goal is to identify research trends, current technology levels, and provide insights for future patent applications involving native plants.

Analysis of the Security Requirements of the Chatbot Service Implementation Model (챗봇서비스 구현 모델의 보안요구사항 분석)

  • Kyu-min Cho;Jae-il Lee;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.167-176
    • /
    • 2024
  • Chatbot services are used in various fields in connection with AI services. Security research on AI is also in its infancy, but research on practical security in the service implementation stage using it is more insufficient. This paper analyzes the security requirements for chatbot services linked to AI services. First, the paper analyzes the recently published papers and articles on AI security. A general implementation model is established by investigating chatbot services provided in the market. The implementation model includes five components including a chatbot management system and an AI engine Based on the established model, the protection assets and threats specialized in Chatbot services are summarized. Threats are organized around threats specialized in chatbot services through a survey of chatbot service managers in operation. Ten major threats were drawn. It derived the necessary security areas to cope with the organized threats and analyzed the necessary security requirements for each area. This will be used as a security evaluation criterion in the process of reviewing and improving the security level of chatbot service.

Considering Households' Occupation and Their View towards Forest Conservation (가구 생업과 그에 따른 삼림보호 인식에 관한 고찰)

  • Panta, Menaka;Kim, Kye-Hyun;Lee, Chol-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.3
    • /
    • pp.73-78
    • /
    • 2009
  • 100 households' survey was carried out in 2007 in Chitwan to foresee the people's livelihood and their insight into the forest conservation. This analysis revealed that households' was mainly survived with multiple livelihood categories where 98% citizens belong to food crops and 92% to livestock husbandry. The households' income shared by agriculture (crop and livestock), forest and remittance was 37% and 20% respectively. Results further showed that income distribution was somehow equal with Gini coefficient 0.25 than with the 0.37 of landholdings size. But, average per capita income of households was lower than the national standard with 33% of households below the poverty thresholds and 0.0945 poverty gap index. Similarly, 85% respondents assured for the current degraded status of forest and 83% of households for not participated in forest management activities due to low awareness in 82% households. These findings shows the forest assets could be unduly degraded in the past and forest availability which is extracting from the remaining forest is also decreasing in the area. Thus, tendency of forest dependency has been shifting to the small scale farming, other livelihood sources such as local business and services. This information could be useful in planning and decision-making process in searching of better alternative for the local livelihood as well as sustainable forest conservation strategy.

  • PDF

Conceptualization of Defense Industrial Security in Relation to National Security (국가 안보와 연계한 방위산업 보안 개념 정립)

  • Go, Hee-Jae;Lee, Yong-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.265-270
    • /
    • 2019
  • In order to protect the advancement of defense technology that has a tremendous e?ect on both the national security and the economy, the Republic of Korea established the Defense Technology Security Act in 2015. As the new enactment brought changes to the landscape of the defense industry and defense industrial security, a new examination of the concept of the defense industrial security has now become necessary. Even after taking into consideration the undisclosed nature of defense industrial security research, and the fact that only the limited number of firms participates in the subject matter, scientific studies related to the topic have not been active. However, with the new enactment of the Defense Technology Security Act, it is necessary to expand the scope of security and to redefine the concept of defense industrial security. In this paper, we analyzed the research works on related technology protection policies and our environment of the defense industry in order to conceptualize defense industrial security. The established concepts are expected to provide a systematic way to protect the confidential and defense technology.

Evaluation of the environmental and ecological value indicators for railway development area selection (철도개발지 선정을 위한 환경·생태적 가치 지표 평가)

  • Kim, Min-kyeong;Kim, Dong Yeob
    • Journal of Environmental Impact Assessment
    • /
    • v.26 no.2
    • /
    • pp.105-113
    • /
    • 2017
  • Recently mountain tourism has been promoted and introduction of railroads with utilizing mountain resources is being planned. With the government policies to increase the share of eco-friendly transportation on railroad, national double-tracking of single rail and improvement projects are on going. However, the eco-friendly railroad policy suggests the environmental impact assessment items only on air quality, water quality, geographical/geological features, fauna/flora, natural/environmental resources, noise/ vibration, and recreation/landscape. And for fauna/flora and natural/environmental resources, confirming the presence of environmental protection zone is enough to satisfy legal requirement. This study suggested to evaluate environmental/ecological values with quantitative data. Evaluation indices and evaluation items have been selected to provide the data. Each of the subject map and railroad network was overlapped. The study selected naturalness and diversity as major indicators and calculated weight values of the items under the indicators, which are to be usd for the selection of the sites for railway development. This assessment method could be applied to the environmentally friendly construction of railroads in the future.

Determinants of Investment or Speculative Grades (투자등급과 투기등급의 결정요인 분석)

  • Kim, Seokchin;Jung, Se Jin;Yim, Jeongdae
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.12 no.1
    • /
    • pp.133-144
    • /
    • 2017
  • This study investigates firm-specific financial variables that determine investment or speculative grades from the viewpoint of firms, which are one of the major stakeholders related to the credit rating. We employ an ordered probit model for our analysis with the sample data from 1999 to 2015 for listed firms in the Korean stock markets. For investment grades, operating margin, sales, market-to-book, dividend payment, capital expenditure ratio, and tangible asset ratio have a significantly positive impact on credit ratings. In the subsample for speculative grades, the coefficients of the dividend payment, retained earnings ratio, and capital expenditure ratio are significantly positive while short-term debt ratio and R&D expenditures have a significantly negative impact on credit ratings. For the analysis before and after 2009, when the Credit Information Use and Protection Act was strengthened after the global financial crisis, the coefficients of the capital expenditure ratio, cash ratio, and tangible asset ratio are significantly positive in the subsample for investment grades before 2009, but not significant after 2010. The coefficient of the long-term debt ratio is more significantly negative than that of the short-term debt ratio before 2009, for speculative grades, but short-term debt ratio has a more negative effect on ratings than long-term debt ratio after 2010. Surprisingly, the coefficient of the R&D expenditures is significantly negative in both investment and speculative grades since 2010. Our findings are inconsistent with the conjecture that the increase in R&D expenditures enhances the possibility of creating cash-flow by raising the investment growth opportunity, and thus affects positively the credit rating.

  • PDF

Game-bot detection based on Clustering of asset-varied location coordinates (자산변동 좌표 클러스터링 기반 게임봇 탐지)

  • Song, Hyun Min;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1131-1141
    • /
    • 2015
  • In this paper, we proposed a new approach of machine learning based method for detecting game-bots from normal players in MMORPG by inspecting the player's action log data especially in-game money increasing/decreasing event log data. DBSCAN (Density Based Spatial Clustering of Applications with Noise), an one of density based clustering algorithms, is used to extract the attributes of spatial characteristics of each players such as a number of clusters, a ratio of core points, member points and noise points. Most of all, even game-bot developers know principles of this detection system, they cannot avoid the system because moving a wide area to hunt the monster is very inefficient and unproductive. As the result, game-bots show definite differences from normal players in spatial characteristics such as very low ratio, less than 5%, of noise points while normal player's ratio of noise points is high. In experiments on real action log data of MMORPG, our game-bot detection system shows a good performance with high game-bot detection accuracy.

Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry (전력 SCADA 시스템의 사이버 보안 위험 평가를 위한 정량적 방법론에 관한 연구)

  • Kang, Dong-Joo;Lee, Jong-Joo;Lee, Young;Lee, Im-Sop;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.445-457
    • /
    • 2013
  • This paper is about the study to build a quantitative methodology to assess cyber threats and vulnerabilities on control systems. The SCADA system in power industry is one of the most representative and biggest control systems. The SCADA system was originally a local system but it has been extended to wide area as both ICT and power system technologies evolve. Smart Grid is a concept to integrate energy and IT systems, and therefore the existing cyber threats might be infectious to the power system in the integration process. Power system is operated on a real time basis and this could make the power system more vulnerable to the cyber threats. It is a unique characteristic of power systems different from ICT systems. For example, availability is the most critical factor while confidentiality is the one from the CIA triad of IT security. In this context, it is needed to reflect the different characteristics to assess cyber security risks in power systems. Generally, the risk(R) is defined as the multiplication of threat(T), vulnerability(V), and asset(A). This formula is also used for the quantification of the risk, and a conceptual methodology is proposed for the objective in this study.