• Title/Summary/Keyword: External Threats

Search Result 141, Processing Time 0.026 seconds

A Study on ICS/SCADA System Web Vulnerability (제어시스템의 웹 취약점에 대한 현황과 연구)

  • Kim, Hee-Hyun;Yoo, Jinho
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.15-27
    • /
    • 2019
  • In the past, the control system was a closed network that was not connected to the external network. However, in recent years, many cases have been opened to the outside for the convenience of management. Are connected to the Internet, and the number of operating control systems is increasing. As a result, it is obvious that hackers are able to make various attack attempts targeting the control system due to external open, and they are exposed to various security threats and are targeted for attack. Industrial control systems that are open to the outside have most of the remote management ports for web services or remote management, and the expansion of web services through web programs inherits the common web vulnerability as the control system is no exception. In this study, we classify and compare existing web vulnerability items in order to derive the most commonly tried web hacking attacks against control system from the attacker's point of view. I tried to confirm.

Self Re-Encryption Protocol (SREP) providing Strong Privacy for Low-Cost RFID System (저가형 RFID 시스템에 강한 프라이버시를 제공하는 자체 재암호화 프로토콜)

  • Park Jeong-Su;Choi Eun-Young;Lee Su-Mi;Lee Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.3-12
    • /
    • 2006
  • RFID (Radio Frequency Identification) system is expected to play a critical role providing widespread services in the ubiquitous period. However, widespread use of RFID tags may create new threats to the privacy of individuals such as information leakage and traceability. It is difficult to solve the privacy problems because a tag has the limited computing power that is not the adequate resource to support the general encryption. Although the scheme of [2] protects the consumer privacy using an external agent, a tag should compute exponential operation needed high cost. We propose Self Re-Encryption Protocol (SREP) which provides song privacy without assisting of any external agent. Our SREP is well suitable to low-cost RFID system since it only needs multiplication and exclusive-or operation.

The Analysis on the Recyclability of Shenlong Automobile Company in China using SWOT Technique

  • Zhao, Wei;Jung, Heonyong
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.146-155
    • /
    • 2022
  • The purpose of this study is to investigate the recyclability of Shenlong in China using SWOT. The main analysis results are as follows. First, provided that the company's current capacity utilization rate is seriously insufficient, reducing staff is one among the effective ways. Second, Shenlong should open a web store to cater to young people's online shopping behavior, and further expand the brand visibility using national mainstream media and online shopping platforms like Taobao and JingDong to market Dongfeng Peugeot and Dongfeng Citroen on the whole network. Third, under the premise of maintaining the present best-selling models, Shenlong should appropriately reduce the amount of models, adjust the assembly capacity ratio of every model and every displacement in real time per the newest market trends, increase the agility of auto companies' production, and timely meet the wants of domestic consumers. Fourth, dual-brand coordination and channel integration are very necessary, and also the profitability and profitability of dealers are going to be further improved, thereby increasing sales. Fifth, target building new energy leading products of Shenlong, strive to attain the forefront of the industry within the sales of recent energy vehicles within 5 years, and gradually expand new energy vehicle products from passenger vehicles to passenger vehicles and commercial vehicles. Finally, the marketing field of Shenlong Automobile should achieve "three major changes", that is, change from a goal-driven type to a demand-driven type, cancel the bundling of outlet invoicing goals and delivery incentive tiers; start from basic capabilities, and set pragmatic and challenging goals; focus Channels, to realize following the activation of outlets, and single store sales increase.

Comparative Analysis of Information Security Textbooks for Chinese Elementary and Secondary Students (중국의 초·중등학생 대상 정보보호 교재 비교 고찰)

  • Eunsun Choi;Namje Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.183-192
    • /
    • 2023
  • Digital transformation is taking place rapidly around the world. As the development of digital technology becomes very fast, more information is expected to be digitized. Therefore, the possibility of cyber threats is increasing in transmitting and storing sensitive information such as personal and financial information online. In this paper, we compared and analyzed information security textbooks for elementary and secondary school students in China, where the recent development of artificial intelligence and digital transformation are rapidly occurring. After we collected related textbooks, textbooks suitable for analysis were selected. Then, we analyzed the external and internal systems of the textbooks separately. As a result of the external system analysis, all the textbook covers were properly produced, but the quality difference was significant among textbooks. In the case of textbooks for elementary school students, the excellence of layout and content placement was noticed. On the other hand, due to the internal system analysis, various contents were not included evenly when looking at the learning contents based on the "information society responsibility" learning goals presented in China. Through this paper, we hope to provide implications for information security-related education and textbook development research.

Ultrasensitive Crack-based Mechanosensor Inspired by Spider's Sensory Organ (거미의 감각기관을 모사한 초민감 균열기반 진동압력센서)

  • Suyoun Oh;Tae-il Kim
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.31 no.1
    • /
    • pp.1-6
    • /
    • 2024
  • Spiders detect even tiny vibrations through their vibrational sensory organs. Leveraging their exceptional vibration sensing abilities, they can detect vibrations caused by prey or predators to plan attacks or perceive threats, utilizing them for survival. This paper introduces a nanoscale crack-based sensor mimicking the spider's sensory organ. Inspired by the slit sensory organ used by spiders to detect vibrations, the sensor with the cracks detects vibrations and pressure with high sensitivity. By controlling the depth of these cracks, they developed a sensor capable of detecting external mechanical signals with remarkable sensitivity. This sensor achieves a gauge factor of 16,000 at 2% strain with an applied tensile stress of 10 N. With high signal-to-noise ratio, it accurately recognizes desired vibrations, as confirmed through various evaluations of external force and biological signals (speech pattern, heart rate, etc.). This underscores the potential of utilizing biomimetic technology for the development of new sensors and their application across diverse industrial fields.

On the Study of National Security and Corresponding Strategies gainst Inside Enemies - A Case Study of German Unification Process - (국가안보와 내부의 적 대응방안 연구 -독일 통일과정 사례를 중심으로-)

  • Kim, Gyu Nam
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.11-18
    • /
    • 2013
  • What is national security? National security is reduced for state national security. At present, national security threats can be divided into main enemies and potential ones and main enemies are separated inside and external ones. Arnold Toynbee said, "The destruction of the state is starting not from outside but from inside". This means we must be aware of inside enemies. How much do we know of the internal enemies who are trying to divide the people and overthrow the state? This paper focuses on corresponding strategies to depend our democratic state against inside enemies who penetrate all sectors of society and fabricate rumors, incite violence, and even try to overthrow our legitimate state with the base on the lessons of past West Germany case.

Developing Strategies to Improve Operational Test and Evaluation of Weapon System in the Age of the Fourth Industrial Revolution (4차 산업혁명 시대에 적합한 무기체계 운용시험평가 개선전략 도출)

  • Lee, Kangkyong;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.6
    • /
    • pp.591-601
    • /
    • 2020
  • After North Korea's sixth nuclear test, the operational environment on the Korean Peninsula has fundamentally changed, and the South Korean military faces various security challenges, including a reduction in military service resources and shorter military service periods. In particular, the South Korean military is seeking a new paradigm in military construction amid changes in the defense acquisition environment linked to the push for defense reform 2.0 and the utilization of the fourth industrial revolution. Therefore, this study considered strategies for improving the operational test and evaluation of weapons systems suitable for changes in the defense acquisition environment to effectively prepare for existing military threats and future warfare patterns. For this purpose, external environment analysis and internal capabilities were diagnosed using PEST Analysis and SPRO Analysis, and improvement strategies were derived through SWOT analysis.

Vital Area Identification of Nuclear Facilities by using PSA (PSA기법을 이용한 원자력시설의 핵심구역 파악)

  • Lee, Yoon-Hwan;Jung, Woo-Sik;Hwang, Mee-Jeong;Yang, Joon-Eon
    • Journal of the Korean Society of Safety
    • /
    • v.24 no.5
    • /
    • pp.63-68
    • /
    • 2009
  • The urgent VAI method development is required since "The Act of Physical Protection and Radiological Emergency that is established in 2003" requires an evaluation of physical threats in nuclear facilities and an establishment of physical protection in Korea. The VAI methodology is developed to (1) make a sabotage model by reusing existing fire/flooding/pipe break PSA models, (2) calculate MCSs and TEPSs, (3) select the most cost-effective TEPS among many TEPSs, (4) determine the compartments in a selected TEPS as vital areas, and (5) provide protection measures to the vital areas. The developed VAI methodology contains four steps, (1) collecting the internal level 1 PSA model and information, (2) developing the fire/flood/pipe rupture model based on level 1 PSA model, (3) integrating the fire/flood/pipe rupture model into the sabotage model by JSTAR, and (4) calculating MCSs and TEPS. The VAT process is performed through the VIPEX that was developed in KAERI. This methodology serves as a guide to develop a sabotage model by using existing internal and external PSA models. When this methodology is used to identify the vital areas, it provides the most cost-effective method to save the VAI and physical protection costs.

PROPOSAL FOR DUAL PRESSURIZED LIGHT WATER REACTOR UNIT PRODUCING 2000 MWE

  • Kang, Kyoung-Min;Noh, Sang-Woo;Suh, Kune-Yull
    • Nuclear Engineering and Technology
    • /
    • v.41 no.8
    • /
    • pp.1005-1014
    • /
    • 2009
  • The Dual Unit Optimizer 2000 MWe (DUO2000) is put forward as a new design concept for large power nuclear plants to cope with economic and safety challenges facing the $21^{st}$ century green and sustainable energy industry. DUO2000 is home to two nuclear steam supply systems (NSSSs) of the Optimized Power Reactor 1000 MWe (OPR1000)-like pressurized water reactor (PWR) in single containment so as to double the capacity of the plant. The idea behind DUO may as well be extended to combining any number of NSSSs of PWRs or pressurized heavy water reactors (PHWRs), or even boiling water reactors (BWRs). Once proven in water reactors, the technology may even be expanded to gas cooled, liquid metal cooled, and molten salt cooled reactors. With its in-vessel retention external reactor vessel cooling (IVR-ERVC) as severe accident management strategy, DUO can not only put the single most querulous PWR safety issue to an end, but also pave the way to very promising large power capacity while dispensing with the huge redesigning cost for Generation III+ nuclear systems. Five prototypes are presented for the DUO2000, and their respective advantages and drawbacks are considered. The strengths include, but are not necessarily limited to, reducing the cost of construction by decreasing the number of containment buildings from two to one, minimizing the cost of NSSS and control systems by sharing between the dual units, and lessening the maintenance cost by uniting the NSSS, just to name the few. The latent threats are discussed as well.

A Study of an Anomalous Event Detection using White-List on Control Networks (제어망에서 화이트 리스트 기법을 이용한 이상 징후 탐지에 관한 연구)

  • Lee, DongHwi;Choi, KyongHo
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.77-84
    • /
    • 2012
  • The control network has been operated in a closed. But it changes to open to external for business convenience and cooperation with several organizations. As the way of connecting with user extends, the risk of control network gets high. Thus, in this paper, proposed the technique of an anomalous event detection using white-list for control network security and minimizing the cyber threats. The proposed method can be collected and cataloged of only normal data from traffic of internal network, control network and field devices. Through way to check the this situation, we can separate normal and abnormal behavior.