• Title/Summary/Keyword: Cyber Operations

Search Result 115, Processing Time 0.027 seconds

Ransomware Threat Countermeasures for the Defense Information System: In terms of Information Security Risk Management (국방정보시스템에서의 랜섬웨어 위협 대응방안: 정보보안 위험관리 관점에서)

  • Yoo, Jincheol;Moon, Sangwoo;Kim, Jong-hwa
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.75-80
    • /
    • 2020
  • Damage caused by ransomware has continued to increase since last year, but cyber operations are managed without any separate classification of ransomware types in the military's guidelines for carrying out cyber operations. However, unlike other malware, ransomware is a threat that could paralyze all defense operations in one moment, and the military should reevaluate ransomware and take countermeasures. Accordingly, this paper aims to analyze the assets, vulnerabilities, and threats related to defense information service based on information security risk management, and propose alternatives to ensure continuity of defense work from ransomware threats.

Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems

  • Woo, Pil Sung;Kim, Balho H.;Hur, Don
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.888-894
    • /
    • 2015
  • This paper presents a unified model based assessment framework to quantify threats and vulnerabilities associated with control systems, especially in the SCADA (Supervisory Control and Data Acquisition) system. In the past, this system was primarily utilized as an isolated facility on a local basis, and then it started to be integrated with wide-area networks as the communication technology would make rapid progress. The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. However, an up-to-date power system often requires the real-time operations, which clearly implies that the cyber security would turn out to be a complicated but also crucial issue for the power system. In short, the purpose of this paper is to streamline a comprehensive approach to prioritizing cyber security risks which are expressed by the combination of threats, vulnerabilities, and values in the SCADA components.

Thinking multiculturality in the age of hybrid threats: Converging cyber and physical security in Akkuyu nuclear power plant

  • Bicakci, A. Salih;Evren, Ayhan Gucuyener
    • Nuclear Engineering and Technology
    • /
    • v.54 no.7
    • /
    • pp.2467-2474
    • /
    • 2022
  • Nuclear Power Plants (NPPs) are the most protected facilities among all critical infrastructures (CIs). In addition to physical security, cyber security becomes a significant concern for NPPs since swift digitalization and overreliance on computer-based systems in the facility operations transformed NPPs into targets for cyber/physical attacks. Despite technical competencies, humans are still the central component of a resilient NPP to develop an effective nuclear security culture. Turkey is one of the newcomers in the nuclear energy industry, and Turkish Akkuyu NPP has a unique model owned by an international consortium. Since Turkey has limited experience in nuclear energy industry, specific multinational and multicultural characteristics of Turkish Akkuyu NPP also requires further research in terms of the Facility's prospective nuclear security. Yet, the link between "national cultures" and "nuclear security" is underestimated in nuclear security studies. By relying on Hofstede's national culture framework, our research aims to address this gap and explore possible implications of cross-national cultural differences on nuclear security. To cope with security challenges in the age of hybrid threats, we propose a security management model which addresses the need for cyber-physical security integration to cultivate a robust nuclear security culture in a multicultural working environment.

A Study on the Necessity of Cybersecurity Legislation and Policies in Response to the Use of EFB by Flight Crew (운항승무원 전자비행정보장치(EFB) 사용에 따른 사이버보안 법률 및 정책 필요성 연구)

  • Minho Kang;Sanghoon Jeon;Howon Hwang
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.4
    • /
    • pp.72-81
    • /
    • 2023
  • The use of EFB (Electronic Flight Bag) has expanded, providing convenience to flight crews by minimizing paper usage within aircraft and offering the latest information, operability, and convenience related to aircraft operations. EFBs provide flight-sensitive information such as aircraft performance calculations, airport diagrams, routes, and approach procedures. For these information, EFBs connect to the cyber environment through Wi-Fi or self-contained data communication, allowing access to cloud-based systems for information updates, with administrators uploading the latest information for retrieval. However, in contrast to the evolving aviation technology, there is currently no legislation or security policy in place to maintain the security of EFBs, leaving them exposed to potential cyber threats. Therefore, improvements such as revising relevant laws to address potential cyber threats targeting EFBs and establishing and implementing EFB management systems are necessary. This paper aims to present the necessity for amending laws related to EFB security in response to cyber threats and suggests methods for enhancement.

Future Cyber Information Warfare (사이버 정보전 준비 해야)

  • 오제상
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.31-35
    • /
    • 2001
  • Currently if we are to make a thought to depend on our fast developing information technology, a future war is necessarily to be made a situation of a cyber information warfare. A attacker in the cyber information warfare is able to make attack a military or a civil information and communication system, especially if a attack of a hacker, a virus or a electromagnetic pulse bomb at a military C4ISR system is able to make a confusion or a interruption in military operations, they are available to attack as a real time with non restrictions of physical distance, time, weather and space. While a expenditure of carrying out the cyber information warfares is the lowest expenditure, a effect of carrying out the cyber information warfares is the greatest effect in side of a interruption of information, a confusion, a terror, a pillage and crime of the people. This paper is to introduce "weapons of cyber information warfares", "offence capability of cyber information warfares about several nations" and to propose "a cyber information warfare organization" or the future knowledge warfare. the future knowledge warfare.

  • PDF

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

A Semi-Automated Image Character Design System (반자동 영상 캐릭터 설계 시스템)

  • Ahn Jae-Min;Yoo Hun-Woo;Jang Dong-Sik
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.1093-1096
    • /
    • 2002
  • In this paper, a new semi-automated cyber character generating method is presented. Local edge detection tools extract face contour from graphic image files. Some graphic manipulation process detailed touch to obtain neat face contour. This method shortens the making process dramatically while maintaining the good quality similar to real face image. Some of the processed images are illustrated for clear explanation.

  • PDF

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

  • Gawand, Hemangi Laxman;Bhattacharjee, A.K.;Roy, Kallol
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.484-494
    • /
    • 2017
  • In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF

Goal-Based Knowledge Agent Approach for Ubiquitous Healthcare Services (유비퀴터스 헬스케어서비스를 위한 목표기반 지식에이젼트 접근법)

  • Kim, Ji-Hong;Ha, Byung-Hyun;Kang, Suk-Ho;Lee, Woo-Key;Kim, Cheol-Yeong;Heo, Won-Chang
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.05a
    • /
    • pp.287-293
    • /
    • 2005
  • Ubiquitous Computing has introduced one of the most innovative international research contributions on the design and evaluation of new generations of handheld and mobile information appliances. New devices are being invented and existing devices are being improved with smaller size and increased mobility. These changes of computing paradigm are enabling the enterprises' legacy services to be automated and value-added all the more. We suggest a service framework and algorithms of provisioning healthcare services in a ubiquitous computing environment. We construct domain ontology that is related to diabetes and minimum common sense ontology for service composition. The results of this research enable integration and interconnection of devices, applications, and functions of enterprises within the healthcare services.

  • PDF