• 제목/요약/키워드: Cyber Power

검색결과 249건 처리시간 0.024초

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

  • Gawand, Hemangi Laxman;Bhattacharjee, A.K.;Roy, Kallol
    • Nuclear Engineering and Technology
    • /
    • 제49권3호
    • /
    • pp.484-494
    • /
    • 2017
  • In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

원자력발전소의 디지털계측제어시스템의 사이버보안을 위한 디지털 자산분석 방법 (Digital Asset Analysis Methodology against Cyber Threat to Instrumentation and Control System in Nuclear Power Plants)

  • 구인수;김관웅;홍석붕;박근옥;박재윤
    • 한국전자통신학회논문지
    • /
    • 제6권6호
    • /
    • pp.839-847
    • /
    • 2011
  • 원자력발전소의 계측제어계통은 제어, 감시기능을 수행하여 안전운전을 위한 두뇌 역할을 하는 핵심적인 분야이다. 최근 계측제어계통은 마이크로프로세서기반의 디지털 기술을 받아들여 디지털화되었다. 그러나 계측제어계통의 디지털시스템은 아날로그 기반 시스템에 비해 사이버위협에 매우 취약하여, 사이버공격에 의해 발전소 안전에 부정적인 영향을 받을 수 있다. 따라서 사이버침해에 대응할 수 있는 사이버 보안 대책이 계측제어계통에 요구된다. 사이버 보안성이 우수한 계통 설계를 위해서는 계측제어계통을 구성하는 자산에 대한 효과적인 자산분석이 요구된다. 본 연구에서는 원자로 계측제어설계의 사이버보안 적합성을 분석하기 위한 전 단계로 계측제어계통의 디지털 자산을 분석하기 위한 방법론을 제안한다. 제안된 디지털자산 분석 방법은 자산식별, 식별된 자산에 대한 평가방법으로 구성된다. 제안된 자산분석방법은 원자력발전소 계측제어계통의 사이버보안을 위한 자산분석에 응용하였다.

전력 SCADA 시스템의 사이버 보안 위험 평가를 위한 정량적 방법론에 관한 연구 (Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry)

  • 강동주;이종주;이영;이임섭;김휘강
    • 정보보호학회논문지
    • /
    • 제23권3호
    • /
    • pp.445-457
    • /
    • 2013
  • 본 논문은 제어시스템에서 사이버 위협과 취약성을 평가하기 위한 정량적 모델링에 관한 연구이다. SCADA(supervisory control and data acquisition) 시스템은 대표적인 제어시스템이고 전력계통에서 가장 큰 규모를 형성하고 있다. SCADA 시스템은 초기에는 지역적으로 고립된 시스템이었으나 통신 및 제어기술이 발전하면서 광역으로 확대되어 왔다. 스마트그리드는 에너지 시스템과 IT 시스템을 통합하는 것이며, 이러한 통합의 과정에서 IT 시스템 상에서 존재하던 위협이 제어시스템으로 옮겨오게 된다. 전력시스템은 실시간 특성이 강하게 요구되며, 이는 전력시스템의 사이버 위협을 IT 시스템에 비해 보다 복잡하고 치명적으로 만드는 요인이 된다. 예를 들어, 기밀성이 IT시스템에서 가장 중요한 요소인데 반해 가용성은 제어시스템에서 가장 중요한 고려 사안이다. 이러한 맥락에서, 보다 체계적인 방식으로 전력시스템의 사이버 위험을 평가하는 과정이 요구된다. 일반적인 관점에서 위험이란, 위협, 취약성, 자산의 곱으로 산출되며 본 연구는 전력시스템 구성요소 별로 위험을 정량적으로 분석할 수 있는 프레임워크를 제안한다.

사이버대학교의 핵심역량에 관한 연구 : 오프라인 기반 대학에 대한 소비자 지각을 중심으로 (A Study of Cyber University Core Competence: The Consumer's Perception about Off-line Base University)

  • 임양환;권순홍
    • 디지털산업정보학회논문지
    • /
    • 제4권4호
    • /
    • pp.127-138
    • /
    • 2008
  • To study about core capability which becomes the kernel of sustainable competitive advantage (SCA) in cyber university which confronts competition-deepening circumstance, the value and importance of brand and educational services of cyber universities which stand on the basis of offline university were examined. Moreover, core capability based on the importance of cyber university service was searched, and its strategic course were suggested. Within research processes, competition environment of cyber university was forecasted, and importance to build up its core capability was examined. Moreover, conjoint analysis was carried out for three offline cyber universities. As a result of survey analysis, effectiveness of cyber university brand showed greater influence than other characteristics in terms of the influence which affects consumer preference for cyber university. Therefore, to overcome weaknesses of brand asset in low brand power cyber university, establishment of strong core capability which reflects consumer preference is needed to carry out differentiation strategy or concentration strategy, and it is necessary to consider the introduction of new competitiveness structure.

북한의 사이버공격과 대응방안에 관한 연구 (A Study on North Korea's Cyber Attacks and Countermeasures)

  • 정민경;임종인;권헌영
    • 한국IT서비스학회지
    • /
    • 제15권1호
    • /
    • pp.67-79
    • /
    • 2016
  • This study aims to present the necessary elements that should be part of South Korea's National Defense Strategy against the recent North Korean cyber-attacks. The elements proposed in this study also reflect the recent trend of cyber-attack incidents that are happening in the Unites States and other countries and have been classified into the three levels of cyber incidents: cyberwarfare, cyberterrorism and cybercrime. As such, the elements proposed are presented in accordance with this classification system. In order to properly take into account the recent trend of cyber-attacks perpetrated by North Korea, this paper analyzed the characteristics of recent North Korean cyber-attacks as well as the countermeasures and responses of South Korea. Moreover, by making use of case studies of cyber-attack incidents by foreign nations that threaten national security, the response measures at a national level can be deduced and applied as in this study. Thus, the authors of this study hope that the newly proposed elements here within will help to strengthen the level of Korea's cyber security against foreign attacks, specifically that of North Korea such as the KHNP hacking incidents and so on. It is hoped that further damage such as leakage of confidential information, invasion of privacy and physical intimidation can be mitigated.

Application of STPA-SafeSec for a cyber-attack impact analysis of NPPs with a condensate water system test-bed

  • Shin, Jinsoo;Choi, Jong-Gyun;Lee, Jung-Woon;Lee, Cheol-Kwon;Song, Jae-Gu;Son, Jun-Young
    • Nuclear Engineering and Technology
    • /
    • 제53권10호
    • /
    • pp.3319-3326
    • /
    • 2021
  • As a form of industrial control systems (ICS), nuclear instrumentation and control (I&C) systems have been digitalized increasingly. This has raised in turn cyber security concerns. Cyber security for ICS is important because cyber-attacks against ICS can cause not only equipment damage and loss of production but also personal and public safety hazards unlike in general IT environments. Numerous risk analyses have been carried out to enhance the safety of ICS and recently, many studies related to the cyber security of ICS are being conducted. Many existing risk analyses and cyber security studies have considered safety and cyber security separately. However, both safety and cyber security perspectives should be considered when analyzing risks for complex and critical ICS facilities such as nuclear power plants (NPPs). In this paper, the STPA-SafeSec methodology is selected to consider both safety and security perspectives when performing a risk analysis for NPPs in order to assess impacts on the safety by cyber-attacks against the digital I&C systems. The STPA-SafeSec methodology was applied to a test-bed system that simulates a condensate water (CD) system in an NPP. The process of the application up to the development of mitigation strategies is described in detail.

사이버공격에 대비한 심층방호 특성을 만족하는 단방향 광통신 구조 설계 (Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack)

  • 정광일;이준구;박근옥
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제2권12호
    • /
    • pp.561-568
    • /
    • 2013
  • 원전 계측제어계통의 제어기기에 대한 사이버공격은 원자로 정지 또는 방사선 누출 등의 심각한 재앙을 유발할 가능성이 있다. 그러므로 원전 규제기관 및 산업표준의 요건에 따라 심층방호 특성을 고려한 사이버보안 대책설계가 원전 계측제어계통 설계에 요구된다. 본 논문에서는 사이버공격에 대한 원전 계측제어계통의 심층방호 대처 설계시 필수적으로 요구되는 단방향통신 구조를 구현하기 위한 설계방법을 제안한다. 제안한 단방향 통신 구조 구현방법은 통신보드 내에 구현되었다. 단방향 통신을 지원하는 통신보드는 시험을 통하여 심층방호 설계에 필요한 단방향 통신 구조를 제공하며, 사이버공격에 강인한 특성을 갖는 것으로 분석되었다. 이러한 사이버공격에 대비한 심층방호 대처 설계 및 단방향 통신을 지원하는 통신구조는 일체형원자로(SMART) 계측제어계통 설계에 적용되었다.

Interactive Art that informs the seriousness of cyber verbal violence - 'Blame'

  • Eom, Taein;Lim, Chan
    • International Journal of Advanced Culture Technology
    • /
    • 제8권1호
    • /
    • pp.188-198
    • /
    • 2020
  • In the cyber space represented by Sns, the problem of cyber verbal violence, which sends slander messages such as abusive messages through chats, bulletin boards, malicious comments, and messages, is getting worse. Leveraging the power of cyberspace's anonymity, people can't hesitate to say what they can't say in the real world. In extreme cases, cyber verbal violence can lead to the death of a person. This paper focuses on the creation of media content that helps to inform and prevent the seriousness of cyber verbal violence prevalent on the Internet through interactive art. The nature of Interact art goes beyond the work and the audience to the people in the relationship between the work and the participants, allowing participants to directly and indirectly feel the seriousness of cyber verbal viol.

배송을 포함한 쇼핑몰 구축 상점입점마법사에 관한 연구 (A Study on the Wizard Development to Automate the Construction of Shopping Mall with Distribution)

  • 최윤정;이창호
    • 대한안전경영과학회지
    • /
    • 제3권3호
    • /
    • pp.165-174
    • /
    • 2001
  • Internet is a global network and it produces many terminologies involved in Electronic Commerce. Among many terms people very much talked about Cyber Shopping Mall. Under situation customers and sellers paid attention to Cyber Shopping Mall which is beyond time and space. This study deals with two subjects to enlarge the competitive power of Mall & Malls which is integration of multiple Cyber Shopping Mall. First subject is constructing the Automated Mall Wizard which is efficiently and effectively building Cyber Shopping Mall Site. And second subject is to differentiate from other shopping malls. Automated Mall Wizard is composed of three stages which are decomposed into several descriptive steps. And descriptive steps takes form of independent module, so it is considered to maximize Cyber Shopping Mall differentiation. Additional functions are making the goods category, related goods to be simultaneously ordered, price comparison with other sites within the Mall & Malls, best seller goods, store advertisement, substitutive goods, and mileage policy. As a result of that, we can respect SuperMall is better than other Mall & Mall as to diversity and flexibility of constructed Cyber Shopping Mall.

  • PDF