• Title/Summary/Keyword: Cyber Trend

Search Result 161, Processing Time 0.028 seconds

The Present State of Domestic Alert Systems for Cyber Threats (사이버 위협에 대한 국내 경보 체계 현황)

  • 이도훈;백승현;오형근;이진석
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.251-257
    • /
    • 2004
  • Todays, the more information technologies(IT) like internet is developed, the more main facilities of individuals and social organizations get deeply involved in IT. Also, the trend of cyber threats such as internet worms and viruses is moving from local pc attacks to IT infrastructure attacks by exploiting inherent vulnerabilities of IT. Social organizations has a limit to response these attacks individually, and so the systematic coordinate center for social organizations is necessary. To analyze and share cyber threat information is performed prior to the construction of the coordinate center. In this paper, we survey domestic alert systems for cyber threats of related organizations and companies, and then classify them into two categories by the range of threat assessment: global alert systems for global If infrastructure and individual alert systems for each threat. Next, we identify problems of domestic alert systems and suggest approaches to resolve them.

  • PDF

CPS(Cyber Physical System) & Research Opportunities for MIS (CPS(Cyber Physical System)와 MIS의 연구기회 탐색)

  • Choi, Moo-Jin;Park, Jong-Pil
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.63-85
    • /
    • 2017
  • Purpose Recently, much attention in building smart factory has dramatically increased with an emergence of the Industry 4.0. As we noted a connectivity gap between main concerns of MIS and the automated manufacturing systems such as POP and MES, it is recommended that CPS (Cyber-Physical System) can be an important building block for the smart factory and enrich the depth of MIS knowledge. Therefore, first, this study attempted to identify the connectivity gap between the traditional field of MIS (ERP, SCM, CRM, etc.) and the automated manufacturing systems, and then recommended CPS as a technical bridge to fill the gap. Secondly, we studied concepts and research trend of CPS that is believed to be a virtual mechanism to manage manufacturing systems in an integrated manner. Finally, we suggested research and educational opportunities in MIS based on the CPS perspectives. Design/methodology/approach Since this paper introduced relatively new idea of CPS originally discussed in the field of engineering, traditional MIS research method such as survey and experiment may not fit well. Therefore this research collected technical cases through literature survey in engineering fields, video clips from Youtube, and field references from various ICT Exhibitions and Conventions. Then we analyzed and reorganized them to highlight the necessity of CPS and draw some insight to share with MIS academia. Findings This paper introduced CPS to bridge the connectivity gap between the traditional MIS and automated manufacturing system (smart factory), a concern far away from the MIS academia. Further, this paper suggested future research subjects of MIS such as developing software to share big production data and systems to support manufacturing decisions, and innovating MIS curricula including smart and intelligent manufacturing technology within the context of traditional enterprise systems.

The Study on a Security Safeguard Plan for SCADA Infrastructure (SCADA 시설에 대한 보안강화 방안에 관한 연구)

  • Chung, Yoon-Jung
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.153-160
    • /
    • 2006
  • The control system is accomplishing very important role in our life currently as the national critical Infrastructure and large scale industry plant. We manage SCADA system to manage generally the control system interconnected with the information system. The operating system of SCADA is changing also to the well-known OS like Windows or UNIX for offer various convenience and facility to the user. We offered the reason why such change of the system makes so that it is exposed to cyber terror. In the traditional SCADA system is managed safely by an isolated network system physically. It is the trend to increase gradually though a cyber terror possibility is thinner on a control system than a information system but the cyber terror gives a nation or community wide damage influence of large scale if it happens. Therefore this paper presents a security safeguard plan about SCADA system and helps prepare systematic security strategy and enhance the security level implement.

  • PDF

Reexamination of the Cyber Insult Crime For securing the Internet Ethics (인터넷윤리 확보를 위한 사이버모욕죄의 재검토)

  • Kim, Jae-Nam;Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.6
    • /
    • pp.111-120
    • /
    • 2013
  • Recently, in the cyberspace, the posts that have only insults and abuses without the fact are getting spread rapidly as a trend, it makes the damage to people also, and the social concerns have been raised about its phenomenon. Meanwhile, because of the insulting actions that performed in cyberspace, the results of infringement of personal rights conditions getting difficult to repair. Also, it is difficult to find who the person who acts as a perpetrator is. So, it is hard to report a crime or sued for damages, also, it is really difficult to deal with a criminal contempt. Also, cause of a lot of deficient areas, the Cyber Insult Crime act is need and strengthened penalties or Mitigation about the crime subject to victim's complaint are need. However, give the criminal penalties to criminal is sufficient. So, to construct a new special criminal law, it is not advisable. Thus, governed by the Criminal Code Section 311 is preferably.

A Study on the Interrelationship between DISC Personality Types and Cyber Security Threats : Focusing on the Spear Phishing Attacks (DISC 성격 유형과 사이버 보안 위협간의 상호 연관성에 관한 연구 : 스피어피싱 공격 사례를 중심으로)

  • Kim, Mookjung;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.215-223
    • /
    • 2019
  • The recent trend of cyber attack threat is mainly APT (Advanced Persistent Threat) attack. This attack is a combination of hacking techniques to try to steal important information assets of a corporation or individual, and social engineering hacking techniques aimed at human psychological factors. Spear phishing attacks, one of the most commonly used APT hacking techniques, are known to be easy to use and powerful hacking techniques, with more than 90% of the attacks being a key component of APT hacking attacks. The existing research for cyber security threat defense is mainly focused on the technical and policy aspects. However, in order to preemptively respond to intelligent hacking attacks, it is necessary to study different aspects from the viewpoint of social engineering. In this study, we analyze the correlation between human personality type (DISC) and cyber security threats, focusing on spear phishing attacks, and present countermeasures against security threats from a new perspective breaking existing frameworks.

Deep Learning-Based Automation Cyber Attack Convergence Trend Analysis Mechanism for Deep Learning-Based Security Vulnerability Analysis (사이버공격 융합 동향 분석을 위한 딥러닝 기반 보안 취약점 분석 자동화 메커니즘)

  • Kim, Jinsu;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.99-107
    • /
    • 2022
  • In the current technological society, where various technologies are converged into one and being transformed into new technologies, new cyber attacks are being made just as they keep pace with the changes in society. In particular, due to the convergence of various attacks into one, it is difficult to protect the system with only the existing security system. A lot of information is being generated to respond to such cyber attacks. However, recklessly generated vulnerability information can induce confusion by providing unnecessary information to administrators. Therefore, this paper proposes a mechanism to assist in the analysis of emerging cyberattack convergence technologies by providing differentiated vulnerability information to managers by learning documents using deep learning-based language learning models, extracting vulnerability information and classifying them according to the MITRE ATT&CK framework.

A Study on the Improvement of Cybersecurity Training System in Nuclear Facilities (원자력 시설 사이버보안 훈련체계 개선 방안 연구)

  • Kim, Hyun-hee;Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.187-188
    • /
    • 2022
  • As information processing technology develops with the trend of the times, the possibility of cyber threats to nuclear facilities is increasing. In the 2000s, there was a growing perception that cyberattacks on nuclear facilities were needed, and in fact, a cybersecurity regulatory system for nuclear power plants began to be established to prepare for cyberattacks. In Korea, in order to prepare for cyber threats, in 2013 and 2014, the Act on Protection and Radiation Disaster Prevention, Enforcement Decree, and Enforcement Rules of Nuclear Facilities, etc., and notices related to the Radioactive Disaster Prevention Act were revised. In 2015, domestic nuclear operators prepared information system security regulations for each facility in accordance with the revised laws and received approval from the Nuclear Safety Commission for implementation of information system security regulations divided into seven stages. In 2019, a special inspection for step-by-step implementation was completed, and since 2019, the cybersecurity system of operators has been continuously inspected through regular inspections. In this paper, we present some measures to build improved training to suit the steadily revised inspection of the nuclear facility cybersecurity system to counter cyber threats to the ever-evolving nuclear facilities.

  • PDF

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

Efficient Hangul Word Processor (HWP) Malware Detection Using Semi-Supervised Learning with Augmented Data Utility Valuation (효율적인 HWP 악성코드 탐지를 위한 데이터 유용성 검증 및 확보 기반 준지도학습 기법)

  • JinHyuk Son;Gihyuk Ko;Ho-Mook Cho;Young-Kuk Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.71-82
    • /
    • 2024
  • With the advancement of information and communication technology (ICT), the use of electronic document types such as PDF, MS Office, and HWP files has increased. Such trend has led the cyber attackers increasingly try to spread malicious documents through e-mails and messengers. To counter such attacks, AI-based methodologies have been actively employed in order to detect malicious document files. The main challenge in detecting malicious HWP(Hangul Word Processor) files is the lack of quality dataset due to its usage is limited in Korea, compared to PDF and MS-Office files that are highly being utilized worldwide. To address this limitation, data augmentation have been proposed to diversify training data by transforming existing dataset, but as the usefulness of the augmented data is not evaluated, augmented data could end up harming model's performance. In this paper, we propose an effective semi-supervised learning technique in detecting malicious HWP document files, which improves overall AI model performance via quantifying the utility of augmented data and filtering out useless training data.

Application of Cyber Physical System (CPS) for Risk Management of a CO2 Storage Site (이산화탄소 저장부지 위해성 관리를 위한 가상물리시스템 적용성 평가)

  • Jeong, Jina;Park, Eungyu;Jun, Seong-Chun;Kim, Hyun-Jun;Yun, Seong-Taek
    • Economic and Environmental Geology
    • /
    • v.50 no.5
    • /
    • pp.363-373
    • /
    • 2017
  • In the present study, adaptability of cyber-physical system (CPS) for risk management of $CO_2$ storage site is examined and the subagging regression (SBR) method is proposed as a key component of the cyber-twin to estimate the risk due to potential $CO_2$ leakage. For these purposes, $CO_2$ concentration data monitored from a controlled $CO_2$ release field experiment is employed to validate the potentialities of the SBR method. From the validation study, it is found that the SBR method has robust estimation capability by showing minimal influence from anomalous measurements, and makes stable and sound predictions for the forthcoming $CO_2$ concentration trend. In addition, the method is found to be well suited as a tool of operational risk assessment based on real-time monitoring data due to the computational efficiency. The overall results suggest that the SBR method has potential to be an important component comprising the cyber twin of CPS for risk management of $CO_2$ storage site.