• 제목/요약/키워드: Cyber Security

검색결과 1,572건 처리시간 0.029초

프레임워크 기반 스마트시티 사이버 보안 메트릭스 (Framework Based Smart City Cyber Security Matrix)

  • 김성민;정혜선;이용우
    • 한국산업융합학회 논문집
    • /
    • 제23권2_2호
    • /
    • pp.333-341
    • /
    • 2020
  • In this paper, we introduce a smart city-cyber-security-grid-matrix methodology, as a result of research on overall cyber security of smart cities. The identified cyber security risks that threaten smart cities and smart-city-cyber-security-threat list are presented. The smart-city-cyber-security-requirements necessary to secure the smart city cyber security with the developed smart city-cyber-security-grid-matrix are given in this paper. We show how the developed smart city-cyber-security-grid-matrix methodology can be applied to real world. For it, we interlocked the developed smart city-cyber-security-grid-matrix methodology with the cyber-security-framework of the National Institute of Standards and Technology, and developed a framework-based smart city-cyber-security-grid-matrix. Using it, it is easy and comfortable to check the level of cyber security of the target smart ciy at a glace, and the construction and operation of the smart city security system is systematized.

인적 및 직무특성과 보안교육 이수율 및 사이버테러 대응과의 연관성 분석 (Association Analysis on The Completion Rate of Security education and Cyber Terror Response According to Personal and Job characteristics)

  • 신현조;이경복;박태형
    • 디지털산업정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.97-107
    • /
    • 2014
  • The development of ICT has led positive aspects such as popularization of Internet. It, on the other hand, is causing a negative aspect, Cyber Terror. Although the causes for recent and continuous increase of cyber security incidents are various such as lack of technical and institutional security measure, the main cause which threatens the cyber security is the users' lack of awareness and attitude. The purpose of this study is the positive analysis of how the personal and job characteristics influence the cyber security training participation rate and the response ability to cyber terror response training with a sample case of K-corporation employees. In this paper, the relationship among career, gender, department, whether he/she is a cyber security specialist, whether he/she is a regular employee), "ratio of cyber security training courses during recent three years", "ratio that he/she has opened the malicious email in cyber terror response training during recent three years", "response index of virus active-x installation (higher index means poorer response)" is closely examined. Moreover, based on the examination result, the practical and political implications regarding K-corporation's cyber security courses and cyber terror response training are studied.

코로나19 관련 사이버 공격 및 대응현황 분석 (An Analysis of Cyber Attacks and Response Cases Related to COVID-19)

  • 이용필;이동근
    • 한국IT서비스학회지
    • /
    • 제20권5호
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

국내 관련 법과 비교 분석을 통한 국가사이버안보법안의 제정 필요성 연구 (A Study on the Necessity of Establishing the National Cyber Security Act through a Comparative Legal Analysis)

  • 김성현;이창무
    • 시큐리티연구
    • /
    • 제54호
    • /
    • pp.9-35
    • /
    • 2018
  • 제 4차 산업혁명이 도래하고 있는 오늘날, 사이버공격은 초국가적인 형태로 민간과 공공 구분 없이 동시다발적으로 일어나고 있으며, 지난 2009년의 DDOS 사건을 포함하여 청와대, 언론, 금융기관 전산 시스템 마비 등 사이버 위협은 갈수록 심각성을 더하고 있다. 그러나 현재 우리나라는 사이버안보와 관련된 기본법이 존재하지 않고, 국내의 여러 법률에 관련 내용이 산재되어 있는 형편이다. 이는 사이버안보와 관련된 내용의 법 적용 및 판단 근거에 혼선을 초래할 수 있다. 이러한 상황을 극복하기 위해 2006년 '사이버위기 예방 및 대응에 관한 법률안'이 발의되었지만 폐기되었고, 이후 꾸준히 발의되었지만 기존 법률과의 중복문제 및 개인정보침해우려 등으로 번번이 통과가 무산되었다. 가장 최근 발의안은 '국가사이버안보법안'으로 2017년 1월 정부가 발의하였다. 이 법안은 사이버안보와 관련된 기본법의 부재를 해결하고, 사이버안보위기시의 대응 능력 강화 및 안보력 함양 등을 주요 내용으로 하고 있다. 따라서 본 연구는 '국가사이버안보법안'을 사이버안보와 관련된 국내의 기존법과 비교 분석을 통해 그 필요성을 고찰하고, 개선점을 제언함으로써 사이버안보 기본법으로서의 '국가사이버안보법안'의 올바른 제정에 기여하고자 한다.

사이버보안 교육훈련 전문 인력의 역량에 관한 연구 (A Study on the Capability of Cyber Security Education and Training Professional Personnel)

  • 엄정호
    • 디지털산업정보학회논문지
    • /
    • 제15권1호
    • /
    • pp.43-51
    • /
    • 2019
  • This research proposed the necessary capability of cyber security professional personnel for cyber security education and training. Cyber security professional personnel were required specialized capability because the curriculum of cyber security education and training is structured around practice and training. Based on the knowledge, skills, and attitudes of professors, we derive candidate capabilities and index through the results of precedent research. As a result, we derived capability such the candidate capability group as teaching qualification, expert knowledge, practical ability, lecture ability, and research ability, and detailed capability index was derived accordingly. Finally, based on the questionnaire results of the professors related to the information security, it was determined that the capability required for the cyber security education and training professional personnel were expert knowledge, practical ability, and lecture ability. Among the capabilities, executive ability means that they have to fulfil abundant executive experience due to the high proportion of practical training due to the characteristics of cyber security education and training.

사이버위기 경보 기반 사이버 방어 훈련장 설계 및 구축 연구 (Design and Implementation of Cyber Range for Cyber Defense Exercise Based on Cyber Crisis Alert)

  • 최영한;장인숙;황인택;김태균;홍순좌;박인성;양진석;권영재;강정민
    • 정보보호학회논문지
    • /
    • 제30권5호
    • /
    • pp.805-821
    • /
    • 2020
  • 사이버 방어 훈련은 최신 사이버공격을 고려한 훈련을 수행해야 할 뿐만 아니라 사이버공격 대응 과정이 실전과 유사해야 그 효과가 크다고 할 수 있다. 또한 최근에는 사이버공격에 관계없이 정상업무를 수행하거나 그에 준하는 업무를 지원할 수 있는 사이버 회복력에 대한 훈련 역시 중요하다. 이에 본 논문에서는 국내에서 사이버공격 발생 시 발령되는 사이버위기 경보를 기반으로 실시간 사이버훈련을 수행함으로 사이버 회복력의 요소들을 강화시킬 수 있는 사이버 방어 훈련장을 제안한다. 사이버위기 경보 수준에 따라 관심·주의·경계·심각 경보 발령 시, 사이버 방어 훈련장은 해당 경보에 따라, 보안 요소를 점검하는 예방보안, 실시간으로 사이버공격 방어를 수행하는 실시간대응, 피해 시스템의 사고조사를 수행하는 사후대응 훈련을 수행할 수 있는 환경을 지원한다. 본 논문에서 제안하는 사이버 방어 훈련장은 사이버위기 환경에서 국내 실정에 맞는 사이버 방어 훈련을 수행함으로써 훈련생들이 사이버위협에 대한 실질적인 대응 역량을 제고 할 수 있다.

NICE 기반 사이버보안 교육커리큘럼 개선 연구 (Enhancing Education Curriculum of Cyber Security Based on NICE)

  • 박원형;안성진
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제6권7호
    • /
    • pp.321-328
    • /
    • 2017
  • 사이버 위협이 고도화되고 지능화되어짐에 따라 사이버 침해사고로 인한 피해사례가 급격하게 증가하고 있다. 이로 인해 사이버보안 전문인력의 중요성을 인식하여 다수의 사이버 보안관련 교육 프로그램이 운영되고 있지만 사이버보안 인력 현황 및 직무에 기반한 사이버보안 교육연구가 이루어지 않아서 교육 수요자 및 공급자가 목표한 교육과정이 제공되지 않고 있다. 이에 따라 본 연구에서는 사이버보안 인력 및 지식체계를 정의하고 이를 반영한 새로운 사이버보안 교육 커리큘럼을 개발하였다. 본 연구에서 개발한 교육 커리큘럼은 기존 교육 커리큘럼에서 강조하고 있는 방어와 관련된 교육내용만으로 구성하는 것이 아니라, 공격분야의 교육내용을 추가하여 전문적이고 균형적인 사이버보안 인력양성을 위한 교육 커리큘럼을 개발 및 개선하였다.

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권5호
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.

차세대 사이버 보안 동향 (The Trends of Next Generation Cyber Security)

  • Lee, Daesung
    • 한국정보통신학회논문지
    • /
    • 제23권11호
    • /
    • pp.1478-1481
    • /
    • 2019
  • As core technologies(IoT, 5G, Cloud, Bigdata, AI etc) leading the Fourth Industrial Revolution promote smart convergence across the national socio-economic infrastructure, the threat of new forms of cyber attacks is increasing and the possibility of massive damage is also increasing. Reflecting this trend, cyber security is expanding from simple information protection to CPS(Cyber Physical System) protection that combines safety and security that implements hyper-connectivity and ultra-reliability. This study introduces the recent evolution of cyber attacks and looks at the next generation cyber security technologies based on the conceptual changes of cyber security technologies such as SOAR(Security Orchestration, Automation and Response) and Zero Trust.

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.24-45
    • /
    • 2012
  • In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.