• Title/Summary/Keyword: Cyber Incident

Search Result 44, Processing Time 0.022 seconds

A Study on the Establishment of Cybercrime Business Model(CBM) through a Systematic Literature Review (체계적 문헌 연구를 통한 사이버범죄 비즈니스 모델(CBM) 구축)

  • Park, Ji-Yong;Lee, Heesang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.6
    • /
    • pp.646-661
    • /
    • 2020
  • Technological innovations and fast-growing new internet businesses are changing the paradigm of traditional business management, having various impacts on society. The development of internet technology is also increasing the adverse effects on technological innovation, and in particular, cybercrime related to computers continues to increase with each technological innovation. The purpose of this study is to construct a cybercrime business model (CBM) by using the business model canvas (BMC) theory for cybercrime in order to reduce cybercrime, and this model is applied and analyzed based on types of Korean cybercrimes. For this study, a systematic literature review was conducted to determine the components of cybercrime, and 60 relevant documents were classified through a keyword-based literature search. Besides, qualitative research in the classified literature has led to the derivation of cybercrime into 18 sub-blocks and nine building blocks. This study applies BMC theory to this derivation of cybercrime and builds the CBM through proper redefinition. Lastly, the developed CBM could be applied to cybercrime in Korea to help cyber incident-response staff understand cybercrimes analytically. This study contributes to the development of a new analysis framework that can reduce cybercrime.

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.

Comparison of Response Systems and Education Courses against HNS Spill Incidents between Land and Sea in Korea (국내 HNS 사고 대응체계 및 교육과정에 관한 육상과 해상의 비교)

  • Kim, Kwang-Soo;Gang, Jin Hee;Lee, Moonjin
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.6
    • /
    • pp.662-671
    • /
    • 2015
  • As the type of Hazardous and Noxious Substances(HNS) becomes various and the transport volume of HNS increases, HNS spill incidents occur frequently on land and the sea. In view of various damages to human lives and properties by HNS spills, it is necessary to educate and train professional personnel in preparation for and response to potential HNS spills. This study shows the current state of response systems and education courses against HNS spill incidents on land and the sea to compare those with each other between land and sea in Korea. Incident command system on land are basically similar to that at sea, but leading authority which is responsible for combating HNS spills at sea is changeable depending on the location of HNS spill, as it were, Korea Coast Guard(KCG) is responsible for urgent response to HNS spill at sea, while municipalities are responsible for the response to HNS drifted ashore. Education courses for HNS responders on land are established at National Fire Service Academy(NFSA), National Institute of Chemical Safety(NICS), etc., and are diverse. Education and training courses for HNS responder at sea are established at Korea Coast Guard Academy(KCGA) and Marine Environment Research & Training Institute(MERTI), and are comparatively simple. Education courses for dangerous cargo handlers who work in port where land is linked to the sea are established at Korea Maritime Dangerous Goods Inspection & Research Institute(KOMDI), Korea Port Training Institute(KPTI) and Korea Institute of Maritime and Fisheries Technology(KIMFT). Through the comparison of education courses for HNS responders between land and sea, some recommendations such as extension of education targets, division of an existing integrated HNS course into two courses composed of operational level and manager level with respective refresh course, on-line cyber course and joint inter-educational institute course in cooperation with other relevant institutes are proposed for the improvement in education courses of KCG and KOEM(Korea Marine Environment Management Corporation) to educate and train professionals for combating HNS spills at sea in Korea.