• Title/Summary/Keyword: 협력대응기반

Search Result 201, Processing Time 0.027 seconds

Korea's Response for International Regulations on the Internet Electronic Commerce (인터넷 전자상거래의 국제규범화에 따른 주요 과제별 대응방안)

  • Kim, Hee-Chul
    • International Commerce and Information Review
    • /
    • v.1 no.1
    • /
    • pp.107-130
    • /
    • 1999
  • 21세기 정보화시대를 몇 개월 앞두고 전자상거래가 급팽창함에 따라, 인터넷 전자상거래는 이제 선택의 문제가 아니라, 기업이나 국가의 경쟁력 확보 및 생존을 위한 필수적인 전략으로 인식되고 있다. 최근 선진국들을 비롯하여 OECD 등 국제기구에서 인터넷 전자상거래에 관한 국제적 논의와 규범화 작업이 진행되고 있다. 그러므로 우리 나라도 이러한 인터넷 전자상거래시대에 대비한 국제경쟁력을 확보 하기 위해 정부와 민간의 협력을 기반으로 한 범국가적 대용방안의 수립이 필요한 시점에 와 있다. 이러한 상황하에서, 본 연구는 인터넷 전자상거래의 영향과 현황을 파악한 후, 이에 대한 국제규범화 동향과 주요 과제를 분석하여 우리 나라의 대응방안을 제시하고자 한다.

  • PDF

침입 감내, 대응 및 방지를 위한 시스템 보안기술 개발

  • Noh, Bong-Nam;Lee, Hyung-Hyo
    • Review of KIISC
    • /
    • v.19 no.2
    • /
    • pp.11-15
    • /
    • 2009
  • 시스템보안연구센터는 침입감내, 대응 및 방지에 필요한 시스템보안분야의 원천기술을 개발하고 정보보호업체와 함께 해당 기술을 상용화하는 것을 목표로 연구개발을 진행해 왔다. 산학일체형 연구교육모델을 정립하고 실천하여 우수한 정보보호인력을 양성함으로써 정보보호분야 IT고급인력양성이라는 교육적 목표와 함께 시스템보안분야 원천기술 확보 및 제품개발에 기여하는 산업적 효과를 얻고자 노력해 왔다. 참여교수와 대학원생, 정보보호 산업체 인력들의 8년 간 연구개발노력으로 시스템분야 보안제품 상용화와 기술이전, 연구논문발표와 특허 등록, 우수인력 배출 등 여러 지표에서 당초 목표 이상의 실적을 달성하였으며, 향후 지금까지 구축된 시스템보안분야 기술개발능력과 산학협력 네트워크를 기반으로 우리나라가 지식정보보안산업 강국으로 자리잡는데 지속적으로 기여할 것으로 기대된다.

사이버 위협 인텔리전스 환경에서의 종합분석 전략

  • Lee, Seulgi;Kim, Dongwook;Kim, Byeongjae;Lee, Taewoo;Han, Sangwon;Lee, JaeKwang
    • Review of KIISC
    • /
    • v.31 no.5
    • /
    • pp.33-38
    • /
    • 2021
  • 한국인터넷진흥원 종합분석팀은 사이버 위협 인텔리전스(CTI)를 통해 주요 침해사고를 추적하여 분석하고 이에 대한 대응방안을 마련, 공유하는 역할을 수행하고 있다. 구체적으로는 외부 협력채널 혹은 기존 사고에서 사용된 악성도구의 흔적을 기반으로 악성 인프라를 탐지하고, 이에 대한 공격자의 전략을 상세히 분석, 정리한 보고서를 발간하여 기업의 보안 수준을 제고하려 노력하고 있다. 본고에서는 사이버 위협 인텔리전스 측면에서 변화한 종합분석의 관점 및 역할을 소개하고, 고도화되어가는 침해사고를 대응하기 위한 향후 전략을 제안한다.

Cooperation Strategy in the Business Ecosystem and Its Healthiness: Case of Win - Win Growth of Samsung Electronics and Partnering Companies (기업생태계 상생전략과 기업건강성효과: 삼성전자와 협력업체의 상생경영사례를 중심으로)

  • Sung, Changyong;Kim, Ki-Chan;In, Sungyong
    • The Journal of Small Business Innovation
    • /
    • v.19 no.4
    • /
    • pp.19-39
    • /
    • 2016
  • With increasing adoption of smart products and complexity, companies have shifted their strategies from stand alone and competitive strategies to business ecosystem oriented and cooperative strategies. The win-win growth of business refers to corporate efforts undertaken by companies to pursue the healthiness of business between conglomerates and partnering companies such as suppliers for mutual prosperity and a long-term corporate soundness based on their business ecosystem and cooperative strategies. This study is designed to validate a theoretical proposition that the win-win growth strategy of Samsung Electronics and cooperative efforts among companies can create a healthy business ecosystem, based on results of case studies and surveys. In this study, a level of global market access of small and mid-sized companies is adopted as the key achievement index. The foreign market entry is considered as one of vulnerabilities in the ecosystem of small and mid-sized enterprises (SMEs). For SMEs, the global market access based on the research and development (R&D) has become the critical component in the process of transforming them into global small giants. The results of case studies and surveys are analyzed mainly based on a model of a virtuous cycle of Creativity, Opportunity, Productivity, and Proactivity (the COPP model) that features the characteristics of the healthiness of a business ecosystem. In the COPP model, a virtuous circle of profits made by the first three factors and Proactivity, which is the manifestation of entrepreneurship that proactively invests and reacts to the changing business environment of the future, enhances the healthiness of a given business ecosystem. With the application of the COPP model, this study finds major achievements of the win-win growth of Samsung Electronics as follows. First, Opportunity plays a role as a parameter in the relations of Creativity, Productivity, and creating profits. Namely, as companies export more (with more Opportunity), they are more likely to link their R&D efforts to Productivity and profitability. However, companies that do not export tend to fail to link their R&D investment to profitability. Second, this study finds that companies with huge investment on R&D for the future, which is the result of Proactivity, tend to hold a large number of patents (Creativity). And companies with significant numbers of patents tend to be large exporters as well (Opportunity), and companies with a large amount of exports tend to record high profitability (Productivity and profitability), and thus forms the virtuous cycle of the COPP model. In addition, to access global markets for sustainable growth, SMEs need to build and strengthen their competitiveness. This study concludes that companies with a high level of proactivity to invest for the future can create a virtuous circle of Creativity, Opportunity, Productivity, and Proactivity, thereby providing a strategic implication that SMEs should invest time and resources in forming such a virtuous cycle which is a sure way for the SMEs to grow into global small giants.

  • PDF

A Study on the Threat of North Korean Small Drones (북한 소형 드론 위협 사례에 대한 연구)

  • Kwang-Jae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.397-403
    • /
    • 2024
  • North Korea's rapidly advancing drone development and operational capabilities have become a significant threat to South Korea's security. The drone incursions by North Korea in 2014, 2017, and 2022 demonstrate the technological advancement and provocative potential of North Korean drones. This study aims to closely analyze the military threats posed by North Korean drones and seek effective countermeasures. The research examines the development level of North Korean drone technology, its military applications, the characteristics and patterns of recent drone incursions, the adequacy and limitations of South Korea's current response systems, and future countermeasures. For this purpose, domestic and international research literature and media reports were reviewed, and specific North Korean drone incursion cases were analyzed. The results indicate that North Korea's small drones possess technological features such as small size, low altitude, low-speed flight, long-duration flight, and reconnaissance equipment. These drones pose threats that can be utilized for reconnaissance, surveillance, surprise attacks, and terrorism. Additionally, South Korea's current response systems reveal limitations such as inadequate detection and identification capabilities, low interception success rates, lack of an integrated response system, and insufficient specialized personnel and equipment. Therefore, this study suggests various technical, policy, and international cooperative countermeasures, including the development of drone detection and identification technologies, the utilization of diverse drone neutralization technologies, the establishment of legal and institutional foundations, the construction of a cooperative framework among relevant agencies, and the strengthening of international cooperation. The study particularly emphasizes the importance of raising awareness of the North Korean drone threat across South Korean society and unifying national efforts to respond to these threats.

A Study on Structuring of Information Sharing Platforms Based on Risk Communication Theory (위험커뮤니케이션 이론에 기반을 둔 정보공유 플랫폼 구조화 연구)

  • Yoo, Ji-Yeon;Park, Hyang-Mi
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.59-72
    • /
    • 2019
  • In this day and age physical and cyber boundaries have converged due to the development of new technologies, such as the Internet of Things (IoT) and the Cyber Physical System (CPS). As the relationship between physical system and cyber technology strengthens, more diverse and complex forms of risk emerge. As a result, it is becoming difficult for single organization or government to fully handle this situation alone and cooperation based on information sharing and the strengthening of active defense systems are needed. Shifting to a system in which information suitable for various entities can be shared and automatically responded to is also necessary. Therefore, this study tries to find improvements for the current system of threat information collecting and sharing that can actively and practically maintain cyber defense posture, focusing particularly on the structuring of information sharing platforms. To achieve our objective, we use a risk communication theory from the safety field and propose a new platform by combining an action-oriented security process model.

DDoS Attack Response Framework using Mobile Code (DDoS 공격 대응 프레임워크 설계 및 구현)

  • Lee, Young-seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.3
    • /
    • pp.31-38
    • /
    • 2010
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

  • PDF

Establishment of digital twin based water resources management platform (디지털 트윈 물관리 플랫폼 구축 및 고도화)

  • Cho, Wan Hee;Chae, Byung Soo;Kwon, Moon Hyuck;Kim, Jin Gon;Kim, Ki Chul
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.115-115
    • /
    • 2022
  • 2020년 역대 최장의 기간을 기록한 장마는 8월초 기록적인 폭우와 홍수로 이어지면서 전국 곳곳에 많은 인명과 재산피해 등 커다란 상처를 남겼다. 최근의 재해 발생 및 특성을 살펴보면 수자원 시설물의 운영·관리 기준의 한계를 벗어난 극단적 기후 현상의 규모와 발생빈도가 급격하게 증가하는 추세가 나타나고 있다. 이처럼 기후위기의 영향으로 집중호우, 극한가뭄 등의 발생빈도와 그 강도가 급증하는 상황에서 실제상황을 보다 신속, 정확하게 모니터링하고 예측하여 물관련 재해를 예방하고 대처하는 것은 무엇보다 시급한 과제라 할 수 있다. 또한 세계 각국은 코로나19로 인한 패러다임의 변화에 대응하고 경제위기 극복을 위해 산업 전반에 걸쳐 디지털 전환을 가속화 하고 있다. 정부도 코로나19로 촉발된 위기 극복을 위해 한국판 뉴딜의 대표과제로 디지털 트윈 사업을 추진하고 있다. K-water는 정부의 디지털 전환 정책에 발맞추어 기후위기에 따른 물관리의 복잡성, 불확실성에 대응하고 효율성과 신뢰도를 제고하기 위해 섬진강유역을 대상으로 디지털 트윈 물관리 플랫폼 구축을 추진하였다. 본 플랫폼은 유역내 기상·수문 관측자료를 실시간으로 모니터링하고 홍수, 가뭄, 수질, 댐안전 등 다양한 이슈를 사전에 시뮬레이션하여 결과를 3차원 지형에 표출하고 이에 대한 피드백을 통해 최적의 의사결정을 지원하는 체계로 구성되어 있다. K-water는 물관리 디지털 전환을 위하여 섬진강유역 구축을 기반으로 5대강 유역을 대상으로 플랫폼 구축을 확대할 예정이며, 댐하류·지류 합류부 등 재해 취약지역까지 아우르는 종합적인 물관리 의사결정의 One-System 플랫폼 구축을 확대할 예정이다. 이를 통해 유역 전체의 수문상황을 실시간으로 파악 및 신속하게 대응하고, 정확성이 향상된 의사결정으로 보다 효율적이고 안전한 물관리 기반을 마련하고자 한다. 또한 본 플랫폼에 기반한 디지털 물관리 기술 선도로 새로운 물산업 생태계를 조성하고, 민간기업과의 핵심기술 공동개발 등 기술협력을 통해 디지털 물산업 기술 경쟁력 확보에도 기여하고자 한다.

  • PDF

A study on the Private Investigator usage for Cyber Crime (사이버범죄의 효과적인 대응을 위한 민간조사제도의 도입방안)

  • Shin, Hyun-Joo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.63-86
    • /
    • 2016
  • The object of this study is to propose a study on the Private Investigator usage for Cyber Crime. The latest trend of cyber crime is being evolve in sophisticated and complex way over the global, like internet fraud, cyber gambling, hacking and etc. Hence national investigative authority mobilize high specialized skills and method of criminal investigation by each nation. But it is hard to respond in rapid and effective way because of propoor, distribution of group and insufficient of related legal system. Already in other countries, not considerable amount of services are given to private investigators in detection and tracking part which is inefficient by nation. So it has significantly meaningful to compensate the defect and study about private investigator usage as companion of cooperation policing for effectively respond to cyber-crime. The way to effectively deal with the cyber-crime is reevaluate meaning of partnership policing and need of private investigator usage. Also it is to analyze the main issue about introduction of a system and suggest the effective way of introduction. First, legislation of private investigator usage which is based upon partnership policing should be made up. Moreover, to establish the range of private investigator's business and enhance the reliability, it is to propose introduction of leading professional global certificate and license system with sufficient education and test. We are expecting introduction of private investigator usage can improve efficiency of investigation and promote effective countermeasures of cyber-crime.

  • PDF

A Study on the System Improvement for Efficient Management of Large-scale Complex Disaster (대형복합재난의 효율적 관리를 위한 제도개선방안 연구)

  • Kim, Taehoon;Youn, Junhee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.5
    • /
    • pp.176-183
    • /
    • 2018
  • Climate change, rapid urbanization, and population concentration have led to a higher frequency and magnitude of disasters in the world. Recently, the occurrence of large-scale complex disasters, which are caused by a combination of natural disasters, man-made disasters, and social disasters, is increasing. In Korea, there are many case studies of damage prediction and response technology development for individual natural disasters, such as earthquakes, floods, and typhoons. On the other hand, the system basis for the efficient response and management of large-scale complex disasters is insufficient. Therefore, this study examined the representative cases of natural, social disasters, and related cases of domestic disaster response management systems. In addition, this paper proposes ways to improve the legal system for complex disaster management policies and establish a cooperation system between the ministries for an efficient response.