• 제목/요약/키워드: Critical digital asset

검색결과 11건 처리시간 0.02초

원자력시설의 필수디지털자산에 대한 기술적 보안조치항목에 대한 연구 (A Study on the Implementation of Technical Security Control for Critical Digital Asset of Nuclear Facilities)

  • 최윤혁;이상진
    • 정보보호학회논문지
    • /
    • 제29권4호
    • /
    • pp.877-884
    • /
    • 2019
  • 기술발전에 따라 원자력시설에 사용되는 장비가 아날로그 시스템에서 디지털 시스템으로 변경되는 추세이다. 컴퓨터와 디지털시스템의 비율이 증가함에 따라 원자력시설은 사이버 위협에 노출되었다. 그 결과 사이버보안에 대한 관심이 높아지고 사이버 공격으로부터 시스템을 보호해야 한다는 인식의 변화가 생겼다. 국내 규제기관에서 발행한 KINAC/RS-015는 필수디지털자산에 대해 101가지 사이버보안 통제항목을 제시하였지만 디지털자산의 특성을 고려하지 않은 일반적인 항목이다. 모든 사이버보안 통제항목을 필수디지털자산에 적용하는 것은 많은 작업량과 효율성을 떨어뜨린다. 본 논문에서는 필수디지털자산의 특성을 파악하고 적절한 보안조치항목을 제시함으로써 효과적인 사이버 보안 통제항목 적용을 제안한다.

특허가치평가 요소에 관한 연구 (A Study On Valuation Factors of Patent)

  • 김영기;박성택;이승준
    • 디지털융복합연구
    • /
    • 제7권2호
    • /
    • pp.63-70
    • /
    • 2009
  • It is well known that in the knowledge-based economy a firm's intellectual property including patent is crucial for its competitive advantage. In industrial economy, tangible assets such as land and equipment have been of critical importance for a firm's competitiveness. However, as the paradigm shift to the knowledge-base economy is being accelerated, intangible assets such as intellectual property are considered to be more influential for a firm to be competitive. The valuation of intangible asset is as necessary as that of tangible asset. In particular, reasonably accurate valuation of patent which represents a firm's technological competitiveness seems to be of great importance since (1) it is essential for a firm's patent strategy development, (2) it can activate the technology market, and (3) it is necessary to evaluate a patent's technological contribution when multiple patents are used to develop and commercialize an innovative product. Unlike that of tangible asset, the valuation of intangible asset is very difficult. In order to figure out a value of patent it is necessary to use a number of appropriate valuation factors. In this paper, we surveyed various valuation factors presented by previous researches and several technology valuation organizations to find a set of common valuation factors considered to be of more importance.

  • PDF

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants

  • Park, Jong Woo;Lee, Seung Jun
    • Nuclear Engineering and Technology
    • /
    • 제51권1호
    • /
    • pp.138-145
    • /
    • 2019
  • With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious consequences by initiating dangerous events or rendering important safety systems unavailable. Since a cyber-attack is conducted intentionally, numerous possible cases should be considered for developing a cyber security system, such as the attack paths, methods, and potential target systems. Therefore, prior to developing a risk-informed cyber security strategy, the importance of cyber-attacks and significant critical digital assets (CDAs) should be analyzed. In this work, an importance analysis method for cyber-attacks on an NPP was proposed using the probabilistic safety assessment (PSA) method. To develop an importance analysis framework for cyber-attacks, possible cyber-attacks were identified with failure modes, and a PSA model for cyber-attacks was developed. For case studies, the quantitative evaluations of cyber-attack scenarios were performed using the proposed method. By using quantitative importance of cyber-attacks and identifying significant CDAs that must be defended against cyber-attacks, it is possible to develop an efficient and reliable defense strategy against cyber-attacks on NPPs.

공격 트리를 이용한 다양성보호계통 사이버보안 위험 평가 (Cybersecurity Risk Assessment of a Diverse Protection System Using Attack Trees)

  • 정성민;김태경
    • 디지털산업정보학회논문지
    • /
    • 제19권3호
    • /
    • pp.25-38
    • /
    • 2023
  • Instrumentation and control systems measure and control various variables of nuclear facilities to operate nuclear power plants safely. A diverse protection system, a representative instrumentation and control system, generates a reactor trip and turbine trip signal by high pressure in a pressurizer and containment to satisfy the design requirements 10CFR50.62. Also, it generates an auxiliary feedwater actuation signal by low water levels in steam generators. Cybersecurity has become more critical as digital technology is gradually applied to solve problems such as performance degradation due to aging of analog equipment, increased maintenance costs, and product discontinuation. This paper analyzed possible cybersecurity threat scenarios in the diverse protection system using attack trees. Based on the analyzed cybersecurity threat scenario, we calculated the probability of attack occurrence and confirmed the cybersecurity risk in connection with the asset value.

원전 제어시스템 사이버보안 위험 분석방법의 효율성 개선 (Improving the Efficiency of Cybersecurity Risk Analysis Methods for Nuclear Power Plant Control Systems)

  • 이신우;이중희
    • 정보보호학회논문지
    • /
    • 제34권3호
    • /
    • pp.537-552
    • /
    • 2024
  • 국내 원전은 방사능방재법에 의거하여 '정보시스템 보안규정'이 수립됨과 함께 조직구성부터 자산의 기술적/운영적/관리적 보안조치에 이르는 사이버보안 체계를 도입하여 운영하고 있다. 단계별 접근법, 물리적방호체계의 대안조치 등이 시도되고 있지만, 관리대상의 감소는 이루어지지 않기 때문에 현장의 한정된 인력으로 운영하기엔 보안 역량의 부담이 가중되고 있다. 본문에서는 원전 안전기능을 수행하는 A1 유형 자산에 대해 정비규정(MR, Maintenance Rule), EPRI 기술적 평가 방법론(TAM, Technical Assessment Methodology)를 활용하여 정비적인 측면과 기기 특성에 대한 측면으로 분석하였다. 이를 통해 사이버침해로 인한 자산기능의 영향을 재분석하는 방안을 제시한다.

메이커 문화를 둘러싼 담론적 지형 메이커 운동(maker movement)에 대한 비판적 담론 분석 (The Discursive Topography in Maker Culture A Critical Discourse Analysis of 'Maker Movement')

  • 최혁규
    • 한국언론정보학보
    • /
    • 제82권
    • /
    • pp.73-103
    • /
    • 2017
  • 이 연구는 메이커 운동과 관련된 단행본, 정책 보고서, 기사 및 칼럼 등을 비판적 담론 분석의 관점에서 살펴보며 메이커 문화를 둘러싼 담론적 지형과 사회적 실천을 분석한다. 정부 주도의 메이커 운동은 제작 문화를 경제 위기를 극복할 수 있는 '창조 경제'의 원동력으로 의미화하고, 디지털 제조업의 창업을 정책적으로 진흥하고 있다. 서울시의 경우, 정부 주도의 경제주의적 메이커 운동을 비판하면서, 기술을 통해 사회 문제를 해결하고자 하는 '디지털 사회 혁신'으로 메이커 운동을 제도화한다. 문화 예술계에서는 메이커를 장인 노동이나 손노동과 같은 '창조적 장인'으로 간주한다. 또한 지배적인 기술 구조에 대한 대항으로서 '비판적 제작 활동'을 구축하고자 하는 저항의 움직임도 있다. 하지만 지배적 담론이 현실적인 차원에 미치는 권력 효과와, 대항적 담론 투쟁으로 인한 지배 구조의 균열을 섣불리 확신할 수 없다. 현재 진행 중인 메이커 운동은 지배적인 권력 구조와 접합되어 제작 문화를 사회적 경제적 가치로 이끌어 내고자 하는 담론 전략과, 이에 대한 문화적 기술 정치적 가능성을 중시하는 대안적인, 혹은 대항적인 의미화 실천이 경합하는 갈등과 투쟁의 장이다.

  • PDF

Prospect Analysis for Utilization of Virtual Assets using Blockchain Technology

  • Jeongkyu Hong
    • Journal of information and communication convergence engineering
    • /
    • 제22권1호
    • /
    • pp.64-69
    • /
    • 2024
  • Blockchain is a decentralized network in which data blocks are linked. Through a decentralized peer-to-peer network, users can create shared databases, resulting in a trustworthy and aggregated database known as a blockchain that enhances reliability and security. The distributed nature of the blockchain enables data to be stored on multiple nodes, eliminating the need for a central server or platform. This disintermediation significantly reduces the transaction and administrative costs. The blockchain is particularly valuable in applications where reliability and stability are critical because it establishes an open database that ensures data integrity, making it virtually impossible to tamper with or falsify data. This study explores the diverse applications of the blockchain technology in virtual assets, such as cryptocurrency, decentralized finance, central bank digital currency, nonfungible tokens, and metaverses. In addition, it analyzes the potential prospects and developments driven by these innovative technologies.

블록체인 NFT 문화예술콘텐츠의 현황과 과제 (Prospects & Issues of NFT Art Contents in Blockchain Technology)

  • 김종국
    • Journal of Information Technology Applications and Management
    • /
    • 제30권1호
    • /
    • pp.115-126
    • /
    • 2023
  • In various fields such as art, design, music, film, sports, games, and fashion, NFTs (Non-Fungible Tokens) are creating new economic value through trading platforms dedicated to NFT art and content. In this article, I analyze the current state of blockchain technology and NFT art content in the context of an expanding market for blockchain-based NFT art content in the metaverse. I also propose several tasks based on the economic and industrial logic of technological innovation. The first task proposed is to integrate cultural arts on blockchain, metaverse, and NFT platforms through digital innovation, instead of separating or distinguishing between creative production and consumption. Before the COVID-19 pandemic, there was a clear separation between creators and consumers. However, with the rise of Web 3.0 platforms, any user can now create and own their own content. Therefore, it is important to promote a collaborative and integrated approach to cultural arts production and consumption in the blockchain and metaverse ecosystem. The second task proposed is to align the legal framework with blockchain-based technological innovation. The enactment and revision of relevant laws should focus on promoting the development of the NFT trading platform ecosystem, rather than merely regulating it for user protection. As blockchain-based technology continues to evolve, it is important that legal systems adapt to support and promote innovation in the space. This shift in focus can help create a more conducive environment for the growth of blockchain-based NFT platforms. The third task proposed is to integrate education on digital arts, including metaverse and NFT art contents, into the current curriculum. This education should focus on convergence and consilience, rather than merely mixing together humanities, technology, and arts. By integrating digital arts education into the curriculum, students can gain a more comprehensive understanding of the potential of blockchain-based technologies and NFT art. This article examines the digital technological innovation such as blockchain, metaverse, and NFT from an economic and industrial point of view. As a limitation of this research, the critical mind such as philosophical thinking or social criticism on technological innovation is left as a future task.

인터넷 저작권 침해 보호에 관한 연구 -저작권 침해에 대한 처벌 및 윤리의식을 중심으로- (The Study of Online Piracy Protection -Focusing on Punishment and Moral Obligation-)

  • 박주연
    • 디지털융복합연구
    • /
    • 제11권1호
    • /
    • pp.145-151
    • /
    • 2013
  • 최근 인터넷의 사용이 일반화되면서 온라인상의 저작물을 무분별하게 다운받거나 재사용하는 사례가 증가하면서 온라인 저작물 침해에 대한 보호정책이 시급해졌다. 본 논문에서는 온라인 저작권 침해에 대한 보호책으로 강화되고 있는 법적규제 및 처벌과 저작물 침해에 대한 윤리의식 고취가 온라인 사용자의 행동과 의도에 어떠한 영향을 미치는지 실증연구를 통해 분석한다. 본 논문의 목적은 온라인 침해에 대한 합리적인 해결책을 제시하고, 온라인 침해와 올바른 사용에 대한 도덕적, 윤리적인 학습과 제도의 중요성을 부각시키고자 한다. 이 연구의 결과는 처벌과 윤리의식 모두 사용자의 저작권 침해행위에 영향을 미치며, 특히 사용자의 윤리의식이 저작물 침해행위에 더 큰 영향을 미치는 것으로 나타났다.

A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Lee, Cheol-Kwon;Kwon, Kee-Choon;Lee, Dong-Young
    • Nuclear Engineering and Technology
    • /
    • 제44권8호
    • /
    • pp.919-928
    • /
    • 2012
  • The applications of computers and communication system and network technologies in nuclear power plants have expanded recently. This application of digital technologies to the instrumentation and control systems of nuclear power plants brings with it the cyber security concerns similar to other critical infrastructures. Cyber security risk assessments for digital instrumentation and control systems have become more crucial in the development of new systems and in the operation of existing systems. Although the instrumentation and control systems of nuclear power plants are similar to industrial control systems, the former have specifications that differ from the latter in terms of architecture and function, in order to satisfy nuclear safety requirements, which need different methods for the application of cyber security risk assessment. In this paper, the characteristics of nuclear power plant instrumentation and control systems are described, and the considerations needed when conducting cyber security risk assessments in accordance with the lifecycle process of instrumentation and control systems are discussed. For cyber security risk assessments of instrumentation and control systems, the activities and considerations necessary for assessments during the system design phase or component design and equipment supply phase are presented in the following 6 steps: 1) System Identification and Cyber Security Modeling, 2) Asset and Impact Analysis, 3) Threat Analysis, 4) Vulnerability Analysis, 5) Security Control Design, and 6) Penetration test. The results from an application of the method to a digital reactor protection system are described.