• Title/Summary/Keyword: 통합위협관리시스템

Search Result 73, Processing Time 0.024 seconds

Development of Web-based Flood Prevention Information system (Web 기반 홍수방재정보시스템 개발)

  • Yeo, Woon-Ki;Seo, Young-Min;Jang, Kyung-Soo;Jee, Hong-Kee;Lee, Soon-Tak
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.795-799
    • /
    • 2007
  • 최근 정보통신산업이 급속도로 발전함에 따라 Internet을 이용하여 각종 정보를 쉽게 얻을 수 있게 되어 수자원 분야에도 정보의 공유와 자료의 통합이 활발히 이루어지고 있다. 또한 재해정보를 효율적이고 직관적으로 표현하기 위해서 방재업무에 GIS를 도입하고 있다. Internet을 통한 손쉬운 정보의 취득은 효율적인 재해관리에 매우 중요하며, 자료의 효율적인 관리와 표현을 위한 GIS기법 또한 필수적이다. 따라서 본 연구에서는 Internet과 GIS를 결합하여 보다 많은 사람들이 신속하고 정확한 재해정보를 얻을 수 있게 하며, 방재 업무에 활용토록 하여 재해에 의한 주민들의 생명의 위협과 재산피해를 줄이도록 하는데 그 목적이 있다. 효과적인 재해관리를 위해서는 계획과 관련된 정보, 재해발생 이력, 대상지역의 각종 정보가 통합되어 실시간으로 전달될 필요가 있다. 또한 이러한 정보들을 빠른시간내에 이해하고 분석하여 대책을 수립하고 시행해야한다. Internet GIS는 비상상황에 대비한 계획과 대처 그리고 복구사업에 있어 가장 정확하고 신속한 정보를 제공해 줄 수 있다. 즉, Internet GIS는 방대한 양의 정보를 효과적이고 지능적으로 분석이 가능하며, 이해하기 쉬운 그래픽 기반의 자료를 보여주므로 방재업무에 큰 도움을 줄 수 있다. Internet GIS를 방재정보 시스템에 이용할 경우 에 있어 장점, 약점, 기회, 위기에 대한 SWOT분석을 실시하였다. Internet이라는 환경의 장점을 그대로 이어받아 비용면에서 효과적이며 적용범위와 사용자층도 넓어지게 된다. 또한 누구나 간편하게 이용할 수 있어 협력체계 또한 쉽게 구축할 수 있으며 빠른 정보의 교환이 가능하다. 하지만, 인터넷에 의존한다는 점에 있어 서버가 자연재해에 노출될 경우 시스템 자체가 제 기능을 할 수 없으며 여러명이 동시에 서버에 접속을 하기 때문에 컴퓨터에 부하가 많이 걸리는 모델링이나 복잡한 분석은 실시하기 어려우며, 대용량 데이터를 전송할 수 있는 대역폭이 확보 되어야 한다. 또한, Internet 환경으로 개발을 해야되기 때문에 데스크탑용 GIS에 비해 개발속도가 느리며 개발 초기비용이 많이 들게 된다. 하지만, 네트워크 기술의 발달과 모바일과의 연계 등으로 이러한 약점을 극복할 수 있을 것으로 판단된다. 따라서 본 논문에서는 인터넷 GIS를 이용하여 홍수재해 정보를 검색, 처리, 분석, 예경보할 수 있는 홍수방재정보 시스템을 구축토록 하였다.

  • PDF

Comprehensive Computer Forensics based on Event Correlation with Extended Evidence Scope (확장된 증거수집 및 사건연관분석을 기반으로 한 컴퓨터 포렌식)

  • Jung, Il-Ok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.66-70
    • /
    • 2008
  • 진화되고 위협적인 사이버공격 및 피해가 증가함에 따라 기업이나 기관의 정보보호에 대한 책임도 증가하게 되었다. 이에 종합적인 컴퓨터 범죄 재현과 정확한 침입경로 및 피해규모, 정보의 신뢰성을 파악하기 위한 컴퓨터 포렌식에 대한 연구가 활발해 지고 있다. 이에 대부분의 기업이나 조직에서 이기종의 보안장비에서 발생하는 다량의 경보와 이벤트를 효과적으로 수집, 통합하고 상호연관분석 할 수 있는 통합보안관리시스템(ESM)을 도입하여 운영하고 있으나 많은 경보발생으로 인해 적절한 판단이나 분석 및 효율적인 대응이 이루어지고 있지 않다. 이에 본 논문에서는 수집되는 증거의 범위를 재 정의하고, 이벤트 상관분석을 통해 발생된 침해경보에 대해 경보검증을 적용하여 경보의 오탐율을 감소시켰으며, 검증된 경보에 대해서 신속히 분석 및 대응이 이루어지는 포렌식 모델을 제안한다. 이를 통해 오탐율 감소는 물론 신속하고 신뢰성 있는 탐지 및 침해 분석이 가능하다.

  • PDF

e-Business Security Framework and applied to Architecture (e-Business Security 프레임웍과 적용 방안)

  • 홍승필;김명철;김재현;김민형
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.87-97
    • /
    • 2002
  • Many firms are utilizing the Internet and various information technologies to effectively manage their business operations with a goal of gaining a competitive advantage in the rapidly changing business environments. Today, the business is characterized as digital economy where information freely flows and business processes are improved with the use of information technologies. Internet technology is playing a key role in transforming the organization and creating new business models. It has become the infrastructure of choice for electronic commerce because it provides process efficiency, cost reduction, and open standards that can easily be adopted by different organizations. Here, the vast amount of data and information slow among the related parties and security issues are very critical matter of research interests by academicians and practitioners. In this research, we address the importance of security framework in managing the data shared among the related parties in the e-business and suggest the security architecture for effectively supporting the needs of e-business in an organization. This research provides valuable contributions both in academics and industry in terms of how security framework and architecture should be set in order to provide the necessary e-business.

  • PDF

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

The Threats to DNS Service and the Trend in DNS Security Technology (DNS 서비스 보안 문제점과 대응 기술 현황)

  • Han, Young-Ju;Kim, Dong-Soo;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1977-1980
    • /
    • 2003
  • DNS는 인터넷 주소 자원 관리의 핵심으로 다양한 인터넷 서비스의 근간이 되는 중요한 자원이다. 인터넷의 급속한 발전과 함께 사이버 공격의 다양하고 지능적인 발전으로 인해 DNS에 대한 위협이 날로 증가하고 있다. 이에 본 논문에서는 현재 DNS의 보안 문제점을 살펴보고 이러한 보안 문제점을 해결할 수 있는 보안 기술로써 DNS 프로토콜 보안 기술과 DNS 서비스 보안 기술에 대해 논의한다. DNS 서비스 보안은 DNS 프로토콜 보안과 네트워크 전반에 걸쳐 이루어지는 통합보안 관리 시스템과의 상호 연계를 통해 극대화 될 수 있다.

  • PDF

Artificial Intelligence-based Security Control Construction and Countermeasures (인공지능기반 보안관제 구축 및 대응 방안)

  • Hong, Jun-Hyeok;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.531-540
    • /
    • 2021
  • As cyber attacks and crimes increase exponentially and hacking attacks become more intelligent and advanced, hacking attack methods and routes are evolving unpredictably and in real time. In order to reinforce the enemy's responsiveness, this study aims to propose a method for developing an artificial intelligence-based security control platform by building a next-generation security system using artificial intelligence to respond by self-learning, monitoring abnormal signs and blocking attacks.The artificial intelligence-based security control platform should be developed as the basis for data collection, data analysis, next-generation security system operation, and security system management. Big data base and control system, data collection step through external threat information, data analysis step of pre-processing and formalizing the collected data to perform positive/false detection and abnormal behavior analysis through deep learning-based algorithm, and analyzed data Through the operation of a security system of prevention, control, response, analysis, and organic circulation structure, the next generation security system to increase the scope and speed of handling new threats and to reinforce the identification of normal and abnormal behaviors, and management of the security threat response system, Harmful IP management, detection policy management, security business legal system management. Through this, we are trying to find a way to comprehensively analyze vast amounts of data and to respond preemptively in a short time.

Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment (U-Health환경에서 안전한 개인정보 관리를 위한 통합 인증스키마 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3865-3871
    • /
    • 2014
  • The U-health service provides medical services with patients anytime or anywhere and is defined as the service that combines information and communication technology with health and medical service. However, it causes some troubles, such as the disclosure of patients' medical information or data spills (personal information extrusion). Moreover, it has the weak point of the security threats associated with data based on existing wire-wireless systems because it conducts data transmission and reception through the network. Therefore, this paper suggests a safe personal information management system by designing integrated certification schema that will help compensate for the weaknesses of the U-health service. In the proposal, the protocols for user information, certification between medical institution and users, data communication encryption & decryption, and user information disuse were designed by applying the ID-Based Encryption, and analyzed such existing systems and PKI Based-based communication process, securely and safely.

Security Management by Zone Combination in Active Networks (액티브 네트워크에서의 연합을 통한 보안 관리)

  • 장범환;김동수;권윤주;남택용;정태명
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.82-96
    • /
    • 2003
  • The Internet has evolved into the global computer network due to the openness of its protocol, but such evolution brings about new risks and threats. To protect computer networks safely, it is the best way that preventing an attacher from intruding beforehand. However, to provision against all attacks causes the degradation of network performance as well as to prevent unknown attacks is very hard. Secure Combination, the framework which establishes a mutual collaboration and cooperation between the trusted zones, could protect systems from the potential attacks. This frameworks can predict attacks by exchanging security information and cooperating with each zone. It is a dynamic and powerful security architecture that rapidly enables updating security policy and deploying response modules.

Development Plan of Facility Importance, Risk, and Damage Estimation Inventory Construction for Assisting Disaster Response Decision-Making (재난대응 의사결정 지원을 위한 시설물 중요도·위험도·피해액 산정 인벤토리 구축 방안 연구)

  • CHOI, Soo-Young;GANG, Su-Myung;JO, Yun-Won;OH, Eun-Ho;PARK, Jae-Woo;KIM, Gil-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.1
    • /
    • pp.167-179
    • /
    • 2016
  • The safety of SOC facilities is constantly under threat by the globally increasing abnormal climate. Responding to disasters requires prompt decision-making such as suggesting evacuation paths. For doing so, spatio-temporal information with convergence of disaster information and SOC facility information must be utilized. Such information is being collected separately by the government or related organizations, but not collectively. The collective control of the separately collected disaster information and the generation of SOC facility safety and damage information are required for prompt disaster response. Also, as disaster information requires spatio-temporal convergence in its nature, the construction of an inventory that integrates related information and assists disaster response decision-making is required. A plan to construct a facility importance, risk, and damage estimation inventory for assisting prompt disaster response decision-making is suggested in this study. Through this study, the disaster and SOC facility-related data, which are being managed separately, can be collected and standardized. The integrated information required for the estimation of facility importance, risk, and damage can be provided. The suggested system is expected to be used as a decision-making tool for proactive disaster response.

A Study on Cybersecurity Risk Assessment in Maritime Sector (해상분야 사이버보안 위험도 분석)

  • Yoo, Yun-Ja;Park, Han-Seon;Park, Hye-Ri;Park, Sang-Won
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.11a
    • /
    • pp.134-136
    • /
    • 2019
  • The International Maritime Organization (IMO) issued 2017 Guidelines on maritime cyber risk management. In accordance with IMO's maritime cyber risk management guidelines, each flag State is required to comply with the Safety Management System (SMS) of the International Safety Management Code (ISM) that the cyber risks should be integrated and managed before the first annual audit following January 1, 2021. In this paper, to identify cyber security management targets and risk factors in the maritime sector and to conduct vulnerability analysis, we catagorized the cyber security sector in management, technical and physical sector in maritime sector based on the industry guidelines and international standards proposed by IMO. In addition, the Risk Matrix was used to conduct a qualitative risk assessment according to risk factors by cyber security sector.

  • PDF