• Title/Summary/Keyword: Cyber Safety

Search Result 274, Processing Time 0.029 seconds

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

Checksum Signals Identification in CAN Messages (CAN 통신 메시지 내의 Checksum Signal 식별 방법 연구)

  • Gyeongyeon Lee;Hyunghoon Kim;Dong Hoon Lee;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.747-761
    • /
    • 2024
  • Recently, modern vehicles have been controlled by Electronic Control Units (ECUs), by which the safety and convenience of drivers are highly improved. It is known that a luxury vehicle has more than 100 ECUs to electronically control its function. However, the modern vehicles are getting targeted by cyber attacks because of this computer-based automotive system. To address the cyber attacks, automotive manufacturers have been developing some methods for securing their vehicles, such as automotive Intrusion Detection System (IDS). This development is only allowed to the automotive manufacturers because they have databases for their in-vehicle network (i.e., DBC Format File) which are highly confidential. This confidentiality poses a significant challenge to external researchers who attempt to conduct automotive security researches. To handle this restricted information, in this paper, we propose a method to partially understand the DBC Format File by analyzing in-vehicle network traffics. Our method is designed to analyze Controller Area Network (CAN) traffics so that checksum signals are identified in CAN Frame Data Field. Also, our method creates a Lookup Set by which a checksum signal is correctly estimated for a given message. We validate our method with the publicly accessible dataset as well as one from a real vehicle.

A Study On the Effects of Recognition Structure Change of Organization According to the BCMS Introduction in Smart Industry (Focused on Manufacturing Industries of Automobile Parts) (스마트 기업의 BCMS 도입이 조직 인식구조 변화에 미친 영향에 관한 연구 (자동차 부품 제조업 중심으로))

  • Cho, Ki Hoon;Kim, Dong Heon;Jang, Ho Jin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.11 no.2
    • /
    • pp.9-15
    • /
    • 2018
  • From natural disasters such as floods, heavy rains, and strong winds and social disasters such as 911 U.S. terrorism and cyber attacks that could have a fatal impact on corporate continuity, it is necessary to introduce and implement a Business Continuity Management System (BCMS) within a firm to maintain continuity of business and to change the organizational structure for an emergency state in order to operate and manage it systematically and efficiently. therefore, this study analyzed and verified the impact of introducing a Business Continuity Management System (BCMS) on the change in the recognition structure of an organization in four categories, including personal recognition, organizational culture, organizational structure, and organizational strategy, in order to analyse the impact and effect of introducing a Business Continuity Management System (BCMS) on the change in the recognition structure of each category. through this study, we believe that the introduction of a Business Continuity Management System (BCMS) within a firm could effectively change the organization's perception of an emergency state and help it maintain its continuity as well as improve its value.

Research on Basic Concept Design for Digital Twin Ship Platform (디지털트윈 선박 플랫폼 설계를 위한 연구)

  • Yoon, Kyoungkuk;Kim, Jongsu;Jeon, Hyeonmin;Lim, Changkeun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.6
    • /
    • pp.1086-1091
    • /
    • 2022
  • The International Maritime Organization is establishing international agreements on maritime safety and security to prepare for the introduction of autonomous ships. In Korea, the industry is focusing on autonomous navigation system technology development, and to reduce accidents involving coastal ships, research on autonomous ship technology application plans for coastal ships is in progress. Interest in autonomously operated ships is increasing worldwide, and maritime demonstrations for verification of developed technologies are being pursued. In this study, a basic investigation was conducted on the design of a demonstration ship and an onshore platform (remote support center) using digital twin technology for application to coastal ships. To apply digital twin technology, an 8-m small battery-powered electric propulsion ship was selected as the target. The basic design of the twin-integrated platform was developed. The ship navigation and operation data were stored on a server system, and remote-control commands of the electric propulsion ship was achieved through communication between the ship and the onshore platform. Ship performance management, operation and operation optimization, and predictive control are possible using this digital twin technology. This safe and economical digital twin technology is applicable to ships responding to crisis scenarios.

Technical and Managerial Requirements for Privacy Protection Using Face Detection and Recognition in CCTV Systems (영상감시 시스템에서의 얼굴 영상 정보보호를 위한 기술적·관리적 요구사항)

  • Shin, Yong-Nyuo;Chun, Myung Geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.97-106
    • /
    • 2014
  • CCTV(Closed Circuit television) is one of the widely used physical security technologies and video acquisition device installed at specific point with various purposes. Recently, as the CCTV capabilities improve, facial recognition from the information collected from CCTV video is under development. However, in case these technologies are exploited, concerns on major privacy infringement are high. Especially, a computer connected to a particular space images taken by the camera in real time over the Internet has emerged to show information services. In the privacy law, safety measures which is related with biometric template are notified. Accordingly, in this paper, for the protection of privacy video information in the video surveillance system, the technical and managerial requirements for video information security are suggested.

How to Combine Secure Software Development Lifecycle into Common Criteria (CC에서의 소프트웨어 개발보안 활용에 대한 연구)

  • Park, Jinseok;Kang, Heesoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.171-182
    • /
    • 2014
  • Common Criteria is a scheme that minimize IT products's vulnerabilities in accordance with the evaluation assurance level. SSDLC(Secure Software Development Lifecycle) is a methodology that reduce the weakness that can be used to generate vulnerabilities of software development life cycle. However, Common Criteria does not consider certificated IT products's vulnerabilities after certificated it. So, it can make a problem the safety and reliability of IT products. In addition, the developer and the evaluator have the burden of duplicating evaluations of IT products that introduce into the government business due to satisfy both Common Criteria and SSDLC. Thus, we researched the relationship among the Common Criteria, the static code analysis tools, and the SSDLC. And then, we proposed how to combine SSDLC into Common Criteria.

A Study on a Prevention Method for Personal Information Exposure (개인정보 노출을 예방하는 방법에 관한 연구)

  • Lee, Ki-Sung;Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.71-77
    • /
    • 2012
  • Along with the development of Internet services such as Social Network Service (SNS) and blog Service, the privacy is very important in these services. But personal data is not safety from exposure to internet service. If personal data is leak out, the privacy is disclosed to hacker or illegal person and the personal information can be used in a cyber crime as phishing attacks. Therefore, the model and method that protects to disclose privacy is requested in SNS and blog services. The model must evaluate degree of exposure to protect privacy and the method protects personal information from Internet services. This paper proposes a model to evaluate risk for privacy with property of personal data and exposure level of internet service such as bulletin board. Also, we show a method using degree of risk to evaluate with a proposed model at bulletin board.

Performance Comparison of Wave Information Retrieval Algorithms Based on 3D Image Analysis Using VTS Sensor (VTS 센서를 이용한 3D영상 분석에 기초한 파랑 정보 추출 알고리즘 성능 비교)

  • Ryu, Joong-seon;Lim, Dong-hee;Kim, Jin-soo;Lee, Byung-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.519-526
    • /
    • 2016
  • As marine accidents happen frequently, it is required to establish a marine traffic monitoring system, which is designed to improve the safety and efficiency of navigation in VTS (Vessel Traffic Service). For this aim, recently, X-band marine radar is used for extracting the sea surface information and, it is necessary to retrieve wave information correctly and provide for the safe and efficient movement of vessel traffic within the VTS area. In this paper, three different current estimation algorithms including the classical least-squares (LS) fitting, a modified iterative least-square fitting routine and a normalized scalar product of variable current velocities are compared with buoy data and then, the iterative least-square method is modified to estimate wave information by improving the initial current velocity. Through several simulations with radar signals, it is shown that the proposed method is effective in retrieving the wave information compared to the conventional methods.

A Study on Automatic Transmission System of Disasters Alarm by Using Wire and Wireless Communication Network - Using by 16bit Microprocessor(Intel 80c196kc) Controller - (유무선통신망을 이용한 재해감지 자동송출시스템에 관한 연구 - 16bit 마이크로프로세서(Intel 80c196kc) 적용 및 응용 -)

  • Kwak, Dong-Kurl;Choi, Shin-Hyeong;Jung, Do-Young
    • Fire Science and Engineering
    • /
    • v.20 no.1 s.61
    • /
    • pp.23-27
    • /
    • 2006
  • With the development of the today's advanced industry civilization, We are always inhering a safety frigidity about disasters of various kinds when and where we may happen. The fires and disasters to be enlarged day by day are reported everyday through the mass communication. Therefore, a prevention countermeasure about the every kind fire and disaster is above all important along the social and the days requirement. As a kind of such countermeasure, this paper is proposed about automatic transmission system of disasters alarm by using wire and wireless communication network. The automatic transmission system prevents the unexpected fire or disaster from a sudden occurrence at the house, industrial field or at the place without the human. The proposed system has the characteristic of high precision and high response speed comparing with conventional system. Also, as the proposed system is small size and lightweight, the users have economic advantage and simply install the system.

A Key Exchange Protocol based on the Steganography with the QR code (스테가노그라피 기법이 적용된 QR코드 이미지 기반의 키 교환 프로토콜)

  • Lee, Gil-Je;Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.173-179
    • /
    • 2013
  • The traditional key exchange protocols are transmitted by using the cryptographic. However, these protocols are compromised by the attacker. To solve this problem, this paper proposes a key exchange protocol based on the steganography with the QR code. The steganography technique embed secret information to the images, documents, videos, and MP3 files and transmit to the others. The attacker can't know that the transmission data is the secret data. Therefore, the sender transmits efficiently and safely the secret data to the others. In additional, the cover image is using the QR code image to insert the secret key. If attackers scan the QR code, then they just read the information or connect URL. They can not be recognized that the QR code image is hiding the secret key. The experiments compare the QR code image with the well-known image about the distortion and the safety.