• 제목/요약/키워드: Comprehensive Security

검색결과 441건 처리시간 0.026초

Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems

  • Woo, Pil Sung;Kim, Balho H.;Hur, Don
    • Journal of Electrical Engineering and Technology
    • /
    • 제10권3호
    • /
    • pp.888-894
    • /
    • 2015
  • This paper presents a unified model based assessment framework to quantify threats and vulnerabilities associated with control systems, especially in the SCADA (Supervisory Control and Data Acquisition) system. In the past, this system was primarily utilized as an isolated facility on a local basis, and then it started to be integrated with wide-area networks as the communication technology would make rapid progress. The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. However, an up-to-date power system often requires the real-time operations, which clearly implies that the cyber security would turn out to be a complicated but also crucial issue for the power system. In short, the purpose of this paper is to streamline a comprehensive approach to prioritizing cyber security risks which are expressed by the combination of threats, vulnerabilities, and values in the SCADA components.

A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET

  • Xu, Guoai;Liu, Boya;Xu, Guosheng;Zuo, Peiliang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권9호
    • /
    • pp.3104-3123
    • /
    • 2022
  • The development of Vehicular Ad hoc Network (VANET) has greatly improved the efficiency and safety of social transportation, and the routing strategy for VANET has also received high attention from both academia and industry. However, studies on dynamic matching of routing policies with the message types of VANET are in short supply, which affects the operational efficiency and security of VANET to a certain extent. This paper studies the message types in VANET and fully considers the urgency and reliability requirements of message forwarding under various types. Based on the diversified types of messages to be transmitted, and taking the diversified message forwarding strategies suitable for VANET scenarios as behavioral candidates, an adaptive routing method for the VANET message types based on reinforcement learning (RL) is proposed. The key parameters of the method, such as state, action and reward, are reasonably designed. Simulation and analysis show that the proposed method could converge quickly, and the comprehensive performance of the proposed method is obviously better than the comparison methods in terms of timeliness and reliability.

제도적 측면에서 살펴본 도시농업의 현황과 과제 (The Current Status of the Korean Urban Farming Researched from an Institutional Perspective and Tasks for the Future)

  • 박진욱;안계복
    • 농촌계획
    • /
    • 제19권3호
    • /
    • pp.61-73
    • /
    • 2013
  • This study presents the methods to improve the urban farming in Korea by analysing the current circumstances of urban farming in Korea. Specifically, the legal system in association with urban farming, current status of the act on the urban farming, the present situation of the Korean urban farming, and the comprehensive plans for urban farming have been analysed in order to grasp the present situations and seek for solutions. Based on these, the research provides effective supporting methods for sustainable urban farming in Korea. As a result, the essentials to improved urban farming can be summarized with two factors; securing more space for urban farming and improving the supporting system for the urban farmers. Enthusiastic attitudes of local governments, security of budget, and cooperation with the citizens are vital to expand the urban farming in addition to the institutional and systematic urban farming improving methods mentioned above.

대구 도심의 주거환경만족도와 거주의향 분석 (Analysis of Residential Environment Satisfaction and Residential Preference in Daegu Downtown)

  • 송흥수;임준홍;김한수
    • 한국주거학회논문집
    • /
    • 제26권5호
    • /
    • pp.133-141
    • /
    • 2015
  • As an empirical study on Daegu Downtown showing decentralization phenomenon, the purpose of this study is, based on the residential satisfaction research targeting the Downtown residents, to analyze the residential environment satisfaction and residential preference. Considering the parameters of measurement, we used the Ordered Logit Model and Logistic Regression. The results are as follows: First, the comprehensive residential environment satisfaction is relatively lower than that in 2008 and the residential preference in Downtown is similar to that of the past. Second, among the 7 factors that constitute the Downtown residential environment, the house, the landscape, and the security have a relatively large influence on the comprehensive residential environment satisfaction. Third, the residential environment factors which affect those who are hoping continuous Downtown residence are the safety, the house and the complex.

Generative Linguistic Steganography: A Comprehensive Review

  • Xiang, Lingyun;Wang, Rong;Yang, Zhongliang;Liu, Yuling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권3호
    • /
    • pp.986-1005
    • /
    • 2022
  • Text steganography is one of the most imminent and promising research interests in the information security field. With the unprecedented success of the neural network and natural language processing (NLP), the last years have seen a surge of research on generative linguistic steganography (GLS). This paper provides a thorough and comprehensive review to summarize the existing key contributions, and creates a novel taxonomy for GLS according to NLP techniques and steganographic encoding algorithm, then summarizes the characteristics of generative linguistic steganographic methods properly to analyze the relationship and difference between each type of them. Meanwhile, this paper also comprehensively introduces and analyzes several evaluation metrics to evaluate the performance of GLS from diverse perspective. Finally, this paper concludes the future research work, which is more conducive to the follow-up research and innovation of researchers.

해외 주요국의 디지털 통상 정책 및 무역 협정 규범 동향 (Trends in Digital Trade Policies and Trade Rules in Major Overseas Countries)

  • 김지은
    • 전자통신동향분석
    • /
    • 제37권5호
    • /
    • pp.1-10
    • /
    • 2022
  • Digital trade rules are crucial in supporting the digital economy as the rules effectively reduce unnecessary trade barriers. This study introduces various approaches that major countries take regarding digital trade policies and rules. Comprehensive and Progressive Agreement for Trans-Pacific Partnership has introduced comprehensive rules on e-commerce, including binding articles on the free flow of information, location of computing facilities, and source code. More recent e-commerce provisions or digital trade agreements cover wider range of issues, from cyber security, artificial intelligence, and data innovation to electronic invoicing and payments. Multilateral negotiations on digital trade rules, including the World Trade Organization E-commerce Joint Statement Initiatives and Indo-Pacific Economic Framework, are in progress. Thus, countries involved are expected to respond to new digital trade issues with long-term strategies considering domestic policy objectives.

A Study on the Consultation for Technology Leakage Victim Using NLP

  • KANG, In-Seok;LIM, Heon-Wook
    • 산경연구논집
    • /
    • 제11권2호
    • /
    • pp.33-39
    • /
    • 2020
  • Purpose: The purpose of this study is that victims of technology leaks and people concerned about leaks complain of stress over security concerns. However, there are no psychological treatments among the government's comprehensive plans to prevent technology leaks. Therefore, the government intends to present education methods using the NLP (Neuro Linguistic Program), a collective counseling technique, to heal the psychological injury of the victims. Psychological counseling methods include cognitive behavioral therapy, psychoanalytic behavioral therapy, humanism therapy, art therapy, and other psychological therapies. Among them, NLP (Neuro Linguistic Programming) method was used. NLP has three concepts: neuron, language, and programming, and is used as a general method for group counseling. Research design, data and methodology: In relation to composition, Chapter 1 explained the purpose and necessity of the study, Chapter 2 explained the types of psychological counseling and NLPs to help understand the study, introduced the prior study related to the development of collective counseling programs through NLP, and Chapter 3 developed a security psychological counseling education program. In addition, FGI(Focus Group Interview) was conducted for professionals. Results: Corporate counseling considered most in this study should satisfy client, counselor and manager differently from individual counseling. For this purpose, the result was composed of 11 times. In order to derive personal problems for clients, they consisted of finding, loving, expressing, and emancipating self. And, It solved the leakage anxiety to suggest a professional solution for the counselor. In addition, this course helps them become familiar with counseling techniques for becoming a good security administrator. Lastly, it was configured to leave the result for the manager to suggest the organizational development method through this training. The implication of this study is to derive psychological counseling methods for security officers. Most companies in the field of security counseling complain about technology leakage stress. There is currently no psychotherapy support project under the policy. And It was developed because it can expect sales improvement from security consultation. Conclusions: In conclusion, the results were organized to be left to the manager so that he could suggest how to develop the organization through this time.

IT 보안 서비스 품질의 측정 방법에 관한 연구 : 정량 지표의 사용 가능성 (A Study on Measurements of IT Security Service Quality : Feasibility of Quantitative Measures)

  • 경지훈;김종수
    • 산업경영시스템학회지
    • /
    • 제38권4호
    • /
    • pp.30-38
    • /
    • 2015
  • IT security service provides customers with the capability of protecting the networked information asset and infrastructures, and the scope of security service is expanding from a technology-intensive task to a comprehensive protection system for IT environment. To improve the quality of this service, a research model which help assess the quality is required. Several research models have been proposed and used in various service areas, but few cases are found for IT security service. In this work, a research model for the IT security quality has been proposed, based on research models such as SERVQUAL and E-S-QUAL. With the proposed model, factors which affect the service quality and the best quality measure have been identified. And the feasibility of using quantitative measures for quality has been examined. For analysis, structural equation modeling and various statistical methods such as principal component analysis were used. The result shows that satisfaction is the most significant measure affected by the proposed quality factors. Two quality factors, fulfillment and empathy, are the main determinants of the service quality. This leads to a strategy of quality improvement based on factors of emotion and perception, not of technology. The quantitative measures are considered as promising alternative measures, when combined with other measures. In order to design reliable quantitative measures, more work should be done on target processing time and users' expectation. It is hoped that work of this research will provide efficient tools and methods to improve the quality of IT security service and help future research works for other IT service areas.

내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구 (Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats)

  • 이재용;김인석
    • 한국전자거래학회지
    • /
    • 제23권4호
    • /
    • pp.153-169
    • /
    • 2018
  • 기존의 전자금융 이상거래 분석 및 탐지기술은 전자금융 업무시스템으로부터 발생된 대량의 전자금융 거래로그를 빅데이터 기반의 저장 공간으로 수집하고, 기존 고객의 거래패턴 프로 파일링 및 다양한 사고거래를 분석한 탐지룰을 이용하여 비정상적인 이상거래를 실시간 또는 준 실시간으로 탐지하고 있다. 하지만, 정작 피해금액 규모 및 사회적 파급효과가 큰 금융회사 내부자의 전자금융 부정접속 시도 및 내부 통제환경의 우회를 통한 전자금융 이용자의 중요정보 탈취와 같은 적극적인 분석은 제대로 이루어지지 못하고 있다. 이에 본 논문에서는 금융회사의 전자금융 보안프로그램에 대한 관리 실태를 분석하고, 관리상 취약점을 악용한 내부자의 보안통제 우회사고 가능성 도출한다. 또한, 이를 효율적으로 대응하기 위하여 기존 전자금융 이상거래탐지시스템에 더불어 내부자 위협모니터링과 연계한 포괄적인 전자금융 보안관리 환경을 제시하고자 한다.

주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구 (A Study on the Application of Cybersecurity by Design of Critical Infrastructure)

  • 유지연
    • 문화기술의 융합
    • /
    • 제7권1호
    • /
    • pp.674-681
    • /
    • 2021
  • 주요기반시설(critical infrastructure)을 대상으로 하는 사이버 공격이 증가하고 있다. 주요기반시설은 국가의 핵심 인프라이며 기반시설 간 상호의존성이 높은 특성을 가지고 있어서 일반적으로 사용되는 사이버 보안으로는 충분히 보호하기 어렵다. 특히 주요기반시설의 물리적 위험과 논리적 위험의 구분이 모호해지고 있어서 전체를 포괄하는 관점의 위험 관리가 이루어져야 한다. 이에 주요기반시설을 보다 적극적으로 보호하기 위한 방안으로 주요국에서는 보안내재화(SbD, security by design)를 적용하기 시작하였으며 보다 확대된 개념의 사전예방적보안(CSbD, cybersecurity by design)이 고려되고 있다. 이러한 사전예방적보안(CSbD)은 소프트웨어(SW) 안전 설계와 관리의 안정성 확보뿐만 아니라 물리적인 정치 및 기기(HW) 안전성과 사전 예방·차단 조치, 그리고 사이버회복탄력성(cyber resilience)까지 포함하는 포괄적인 보안 체계를 의미한다. 이에 본 연구는 미국과 싱가포르, 그리고 유럽에서 선도적으로 추진되고 있는 주요기반시설의 보안내재화(SbD) 방안들을 비교분석하고 주요기반시설에 대한 최적의 보안내재화(SbD) 적용 방안을 제시하고자 한다.