• Title/Summary/Keyword: 테러유형

Search Result 51, Processing Time 0.02 seconds

Procedures of Coping with Each Type of Infringement using Live Forensic Technology (활성 포렌식 기술을 활용한 피해 유형별 침해사고 대응 절차 연구)

  • Yoon, Ju Hee;Kim, Mi Sun;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.69-78
    • /
    • 2016
  • As the development as the IT society accelerates, the frequency of terrorism from malignant codes and other cyber crimes is increasing. Malignant codes show various forms of attack according to the intentions of the attacker, and leaves behind digital evidences, not analog evidences when damages occur. Digital forensic, the procedure of collecting and analyzing digital evidence is one of the main factors that must be carried out when damages from malignant codes arise. However, there are the difficulties of not being able to preserve the integrity and authenticity in the procedure of coping witht infringements, which must be maintained in the digital forensic procedure. To complement such problems, this paper suggests the method of applying forensic by identifying the malignant code infringement incidents according to the type of damages.

A Method to Develop Security System through the Analysis on Dangerous Case (위해사례분석을 통한 경호제도의 발전방안)

  • Yu, Hyung-Chang;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.161-187
    • /
    • 2008
  • The purpose of this study is to suggest a development method of current Korean security system by analyzing the problems shown in the performance of security work in relation to the terrorism, which is enlarging in the word, from various aspects. In order to perform the study, the researcher considered the basic theory concerned to current Korean law concerned to security, principle and methodology of security, terror and new terrorism. The researcher performed the study by selecting qualitative case study focused on Park Geun-Hye case. Through the study, the methods to develop Korean security system are as follows. First, from the legal aspect, it is necessary to establish the law concerned to terrorism prevention and important person security. Moreover, it is necessary to search for the development of private security by revising Security Industry Act, which is a legal ground of private security. Second, it is necessary to improve and reinforce education & training program, which is not still divided in detail from the aspect of private security cultivation. Moreover, it is necessary to activate personal protection work and enlarge market through Security Industry Act and make an effort to change social recognition over security, which is devaluated in the society. From the viewpoint, national license about private security shall be adopted. The department of president security, which is a representative of official security, shall transfer the advanced technology to private security organization. Third, from the aspect of operation, the operation of security based on SCE principle, human shield principle, the nearest person's protection principle, body extension principle, linear protection principle and evacuation priority principle is required. Therefore, the priority shall be given to preventive security and thorough security plan shall be made for the operation.

  • PDF

Study On Identifying Cyber Attack Classification Through The Analysis of Cyber Attack Intention (사이버공격 의도분석을 통한 공격유형 분류에 관한 연구 - 사이버공격의 정치·경제적 피해분석을 중심으로 -)

  • Park, Sang-min;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.103-113
    • /
    • 2017
  • Cyber attacks can be classified by type of cyber war, terrorism and crime etc., depending on the purpose and intent. Those are mobilized the various means and tactics which are like hacking, DDoS, propaganda. The damage caused by cyber attacks can be calculated by a variety of categories. We may identify cyber attackers to pursue trace-back based facts including digital forensics etc. However, recent cyber attacks are trying to induce confusion and deception through the manipulation of digital information or even conceal the attack. Therefore, we need to do the harm-based analysis. In this paper, we analyze the damage caused during cyber attacks from economic and political point of view and by inferring the attack intent could classify types of cyber attacks.

Limiting user process method based on PAM against DoS attacks (DoS 공격에 대비한 PAM 기반 사용자 프로세스 제한 기법)

  • Lee, Jae-Ung;Jung, Sung-Jae;Bae, Yu-Mi;Jang, Rae-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.309-312
    • /
    • 2016
  • Considering that interkorean relations got worse and worse recently, cyber terror of North Korea has seriously become a possibility. Therefore, DoS(Denial of Service), a typical way of cyber terror, is becoming a big issue. Consequently, people are growing more and more interested in information security. Internal DoS attacks, out of a variety of ways of Dos attacks, include disks and memories and shortages of process resources. PAM(Pluggable Authentication Module) is one of the ways of preventing internal DoS attacks in Linux system. This paper provides with a method to internally respond to dos attacks and efficiently prevent shortages of resources by utilizing PAM.

  • PDF

A Study on the Disaster Scenario Based Evacuation Planning of Super High-Rise Buildings (초고층 건축물의 재난시나리오 기반 피난계획수립)

  • Choi, Doo Chan;Kim, Hak Kyung;Sim, Hae In
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2015.11a
    • /
    • pp.345-346
    • /
    • 2015
  • 본 논문에서는 재난상황발생 시 신속하고 효율적인 재난대응에 실패하면 다수의 인명피해를 야기할 수 있는 초고층 건축물의 재난시나리오 기반 피난계획수립에 대한 연구과정을 제시하고 발전방향을 제안하였다. 초고층 건축물의 피난계획수립을 위해서 초고층 건축물에서 발생 가능한 재난시나리오를 자연재난, 인적재난, 전쟁 또는 테러재난, 건물시설관계재난인 4가지 유형으로 분류하고 이를 프로토콜화하여 건축물의 피난관리시설과 자원을 고려한 피난계획을 작성하고 이를 피난시뮬레이션을 통해서 검토하고 보완하는 연구를 진행하여 최종적으로 효율적인 피난계획서를 수립하였다.

  • PDF

The Countermeasure for Threat of Cyber Terror in Sociological Perspective (사회적 이슈 관점에서 바라 본 사이버 테러 유형에 대한 위험 대응방안)

  • Choi, Heesik;Kim, Hyunkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.59-67
    • /
    • 2017
  • In recent years, cyber terror that break into major institution's information system and destroy and paralyzed important information occurs frequently. Some countries do dangerous acts such as train hackers and order hackers to hack important industrial confidential documents which are core of national competitiveness to reduce the competitiveness of the country and cause social confusion. In this thesis, it will study problems of cyber terror to help people to use Internet in web environment that safe from cyber terror and to avoid the risk from cyber terror such as malware and DDos. This thesis is organized as following. In second chapter, it will look thorough the research that are related to cyber terror. In third chapter, it will study attack types of cyber terror. In fourth chapter, to defend from cyber violence, it will suggest safe solution. In fifth chapter, it will end with conclusion. Finally, to prevent urgent incidents like North Korean Cyber-attack, every Internet user must indicate their recognition on Internet security and it is significant to make a quick response treatment to create the safe online environment.

A Study on the Integrated Account Management Model (위험기반 통합계정관리모델에 관한 연구)

  • Kang, Yong-Suk;Choi, Kook-Hyun;Shin, Yong-Tae;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.947-950
    • /
    • 2014
  • The recent APT attacks including cyber terror are caused by a high level of malicious codes and hacking techniques. This implies that essentially, advanced security management is required, from the perspective of 5A. The changes of IT environment are represented by Mobile, Cloud and BYOD. In this situation, the security model needs to be changed, too into the Airport model which emphasizes prevention, and connection, security and integration of functions from the existing Castle model. This study suggested an application method of the risk-based Airport model to the cyber security environment.

  • PDF

The Possibility and Limit of Risk Management through Technological Fix: A Case Study into the Platform Screen Door (PSD) (기술적 해결을 통한 위험관리의 가능성과 한계: 지하철 스크린도어를 중심으로)

  • Kang, Yun-Jae
    • Journal of Science and Technology Studies
    • /
    • v.10 no.2
    • /
    • pp.77-105
    • /
    • 2010
  • This essay aims to look into the possibility and limit of a technological fix with the PSD (platform screen door), which was proposed as the solution of subway risk problems. Subway risk problems may be classified into five categories-on-rail accidents, in-station accidents, platform accidents, spatial risks in underground, and risks due to a crime or terror-, and the platform accidents, which happens at the interface between the rail and the station, is the most serious and prominent. The PSD is considered as an effective technical means to prevent platform accidents. However, there remains a possibility of aggravating unexpected and invisible risks. When a fire breaks out in platforms, especially at exchange stations during the rush hour, the PSD can become a "wall of outcrying", since it may act as the "safety shutter" which killed many people in the 2003 Daegu subway disaster. This is why we need to look into the limit of a technological fix with the PSD.

  • PDF

A Study on the Present Condition and Countermeasure Plan for the Disaster Protection in Public Library of Korea (한국 공공도서관의 재난대비 실태와 대응방안 연구)

  • Kim, Po-Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.4
    • /
    • pp.85-110
    • /
    • 2006
  • Recently, there have been a number of news reports on natural disasters, like earthquakes. typhoons, floods and tsunami, all over the world. Korea does not seem to be safe from such disasters or terror threats. As places with high numbers of visitors. libraries need to take preventive measures to be prepared for such disasters and threats. This paper analyzes the current status of emergency measures adopted by 75 public libraries in Seoul. Daejeon and Jeonbuk in Korea. For each library surveyed. the causes of and ways to recover from disasters were reviewed and detailed analyses were carried out in low areas: Implementation of preventive measures disaster management and equipment, status of human resources and assignment of people to disaster recovery, safety courses offered to library users and training methods. In addition, each area was analyzed in regard to possible solutions and ideas for improvement, as well as suggestions to upgrade disaster recovery systems in the future.

A Study on Establishing Disaster Management Plan for Central Administration Office (중앙행정기관 재난관리계획 수립에 관한 연구)

  • Kim, Mu-Jun;Kim, Kye-Hyun;Kwon, Moon-Jin
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.3
    • /
    • pp.61-69
    • /
    • 2010
  • Disasters have been diversifying and the scale of disaster has been increasing worldwide due to the global warming and urbanization. Consequently, it is essential to establish the systematic disaster management because the scale of damages has been rapidly increasing. Nowadays, the importance of the standardized disaster management have been realized internationally due to the 9.11 terror and Tsunami. Also, the activities of research and development to utilize and establish the disaster management standards have been increasing. This study mainly focused on generating an efficient operating manual to support the systematic disaster management of the central administration office based on disaster management standard in South Korea. Firstly, the activities and status of disaster management performed by the central administration office were investigated. Accordingly, libraries of work, functions, organizations, references and behavior for disaster management were designed. Then, a method to make the efficient operation manual based on the constructed libraries was presented to maximize the efficiency of disaster management. This emergency operation manual could support the systematic disaster management by defining the work, function, references and the codes of conduct. Thus, central administration office would be able to define methods and procedures from preparation to recovery through the utilization of the operation manual.