• Title/Summary/Keyword: Control System Security

Search Result 1,725, Processing Time 0.025 seconds

A Study on Improvement of Inspection Items for Activation of the Information Security Pre-inspection (정보보호 사전점검 활성화를 위한 점검항목 개선 연구)

  • Choi, Ju Young;Kim, JinHyung;Park, Jung-Sub;Park, Choon Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.933-940
    • /
    • 2015
  • IT environments such as IoT, SNS, BigData, Cloud computing are changing rapidly. These technologies add new technologies to some of existing technologies and increase the complexity of Information System. Accordingly, they require enhancing the security function for new IT services. Information Security Pre-inspection aims to assure stability and reliability for user and supplier of new IT services by proposing development stage which considers security from design phase. Existing 'Information Security Pre-inspection' (22 domains, 74 control items, 129 detail items) consist of 6 stage (Requirements Definition, Design, Training, Implementation, Test, Sustain). Pilot tests were executed for one of IT development companies to verify its effectiveness. Consequently, for some inspection items, some improvement requirements and reconstitution needs appeared. This paper conducts a study on activation of 'Information Security Pre-inspection' which aims to construct prevention system for new information system. As a result, an improved 'Information Security Pre-inspection' is suggested. This has 16 domains, 54 inspection items, 76 detail items which include some improvement requirements and reconstitution needs.

A Research on the Exposure Status of Cybersecurity Risk of Process Control System and Its Counterplan (공정제어시스템의 사이버보안 위험 노출 현황 및 대응방안 연구)

  • Kim, Youngse;Park, Jinhyung;Kim, Sangki;Kim, Byungjick;Lee, Joonwon;Park, Kyoshik
    • Korean Chemical Engineering Research
    • /
    • v.60 no.4
    • /
    • pp.492-498
    • /
    • 2022
  • Process control systems used in most domestic petrochemical corporates today are based on the Windows platforms. As technology leans toward opened environment, the exposure risk of control systems is increasing. However, not many companies are preparing for various cyberattacks due to lack of awareness and misunderstanding of cyber intrusion. This study investigated the extent of how much exposed the petrochemical process control system is to security threats and suggested practical measures to reduce OT cybersecurity vulnerabilities. To identify the cyber threat status of process control systems, vulnerabilities of the Windows platform, a principal cyber threat factor, have been analyzed. For research, three major DCS providers in Korea and the discontinuation of Windows platform of 635 control systems were investigated. It was confirmed that 78% of the survey subjects were still operating in the discontinued windows platforms, and those process control systems were operated in a state vulnerable to cyber intrusions. In order to actively cope with these cyber threats, legal regulations such as designation of critical infrastructure for major petrochemical facilities which is implemented in advanced countries such as the United States are needed. Additionally, it is necessary to take the initiative in eradicating security threats to the process control systems by aggressively introducing security solutions provided from existing DCS suppliers. This paper was submitted to Professor Ko JaeWook's retirement anniversary issue.

A Safety Verification of the Modified BLP Model using PVS (PVS를 이용한 수정된 BLP 모델의 안전성 검증)

  • Koo Ha-Sung;Park Tae-Kue;Song Ho-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1435-1442
    • /
    • 2006
  • The ideal method of safety evaluation is to verify results of execution against all possible operations within operating system, but it is impossible. However, the formal method can theoretically prove the safety on actual logic of operating system. Therefore we explain the contents of the art of the safety verification of security kernel, and make a comparative study of various standardized formal verification tools. And then we assigned PVS(Prototype Verification system) of SRI(Stanford Research Institute) to verify the safety of a modified BLP(Bell & LaPadula) model, the core access control model of multi-lavel based security kernel. Finally, we describe formal specification of the revised BLP model using the PVS, and evaluate the safety of the model by inspecting the specification of the PVS.

Performance Analysis of Security Management model for Unity Control (통합관제 보안관리모델의 성능분석)

  • 서정은;윤병민;허창우;김윤호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.908-911
    • /
    • 2003
  • In this study, the security system (Firewall and IDS) was installed in high speed information network and analyzed for a change in the speed of data transfer and the possibility of invasion. The selection of appropriate system, efficient detection and protection and surveillance method were suggested and analyzed. In order to do experiments, an experimental model was comprized to analyze the parameters that was affected by the detection and protection system in network. This will give a standard how much we can pull up the security system maintaining the network speed.

  • PDF

On the Security Enhancement of the OTAR Protocol and Cryptosystems (무선 키 갱신 프로토콜 OTAR의 암호 시스템 개선 방안)

  • Lee HoonJae;Lee SangGon;Park Jongwook;Yoon JangHong
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.31-43
    • /
    • 2005
  • OTAR system is a highly authentic key management system that has functions with access control. data integrity and data confidentiality, In this paper, we analyze the existing TIA/EIA Over-The-Air-Rekeying key managements protocol. focused to symmetric ciphers. It can be used to understand the technical trend on technologies about TIA/EIA OTAR standardization. This results can be used to evaluate security properties of a remote rekeying, The proposed system contains a highly reliable system synchronization.

  • PDF

A Study on the Optimal Load Shedding Considering Alleviation of the Line Overload (선로과부하해소를 고려한 최적부하간단에 관한 연구)

  • 송길영;이희영
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.36 no.6
    • /
    • pp.381-389
    • /
    • 1987
  • This paper presents a method for optimal load shedding in preserving a system security following abnormal condition as well as a sudden major supply outage. The method takes account of static characteristic of generators control and voltage and system frequency characteristic of loads. The optimization problem is solved by a gradient technique to get the maximal effect by the least quantity of load shedding considering line overloads as well as voltage disturbances and system frequency. The method is illustrated on a 8-bus system. It has been found that the use of the proposed algorithm for model systems alleviate the line overload more efficiently than the former method. It is believed that this method will be useful in security studies and operational planning.

  • PDF

Design of Model of Evidence System using the Single Cryptology and Network IP Tracking (1회용 암호와 네트워크 IP Tracking을 이용한 인증시스템의 설계)

  • Chae, Byeung-Soo;Tcha, Hong-Jun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.2 no.2
    • /
    • pp.87-95
    • /
    • 2009
  • This research attempted to build up a system of security and identification for storage devices in a communication network. This identification Network System will configure security of information encoded and any computer data-medium by control of the access right of the user.

  • PDF

Privacy Analysis and Comparison of Pandemic Contact Tracing Apps

  • Piao, Yanji;Cui, Dongyue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4145-4162
    • /
    • 2021
  • During the period of epidemic prevention and control, contact tracing systems are developed in many countries, to stop or slow down the progression of COVID-19 contamination. However, the privacy issues involved in the use of contact tracing apps have also attracted people's attention. First, we divide contact tracing techniques into two types: Bluetooth Low Energy (BLE) based and Global Positioning System (GPS) based techniques. In order to clear understand the system structure and its elements, we create data flow diagram (DFD) of each types. Second, we analyze the possible privacy threats contained in various types of contact tracing apps by applying LINDDUN, which is a threat modeling technique for personal information protection. Third, we make a comparison and analysis of various contact tracing techniques from privacy point of view. These studies can facilitate improve tracing and security performance to contact tracing apps through comparisons between different types.

Modeling in System Engineering: Conceptual Time Representation

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.153-164
    • /
    • 2021
  • The increasing importance of such fields as embedded systems, pervasive computing, and hybrid systems control is increasing attention to the time-dependent aspects of system modeling. In this paper, we focus on modeling conceptual time. Conceptual time is time represented in conceptual modeling, where the notion of time does not always play a major role. Time modeling in computing is far from exhibiting a unified and comprehensive framework, and is often handled in an ad hoc manner. This paper contributes to the establishment of a broader understanding of time in conceptual modeling based on a software and system engineering model denoted thinging machine (TM). TM modeling is founded on a one-category ontology called a thimac (thing/machine) that is used to elaborate the design and analysis of ontological presumptions. The issue under study is a sample of abstract modeling domains as exemplified by time. The goal is to provide better understanding of the TM model by supplementing it with a conceptualization of time aspects. The results reveal new characteristics of time and related notions such as space, events, and system behavior.

State Regulation of the Hotel and Restaurant Complex in the System of Development of Tourism and the National Economy

  • Poltavska, Oksana;Lashchyk, Iryna;Nikitchina, Tetiana;Borutska, Yuliia;Smolinska, Natalia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.236-240
    • /
    • 2022
  • The main purpose of the study is to analyze the key aspects of state regulation of the hotel and restaurant complex in the system of tourism development and the national economy. The effectiveness of the regulation of the hotel and restaurant complex in the system of development of tourism and the national economy largely depends on the presence of an effective central executive body that would take care of the problems of the development of the industry, the quality and perfection of legal support, a strategic view of programming the development of the industry within the state and regions, as well as administrative mechanisms of public administration, which fully ensure control over the activities of economic entities and the quality of the services they provide. Based on the results of the study, key aspects of state regulation of the hotel and restaurant complex in the system of tourism development and the national economy were identified.