• Title/Summary/Keyword: Information Security Committee

Search Result 55, Processing Time 0.029 seconds

A Study on the Improvement Model for Invigorating Cyber Threat Information Sharing (사이버위협정보 공유 활성화를 위한 관리적·기술적 개선모델 연구)

  • Yoon, Oh Jun;Cho, Chang Seob;Park, Jeong Keun;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.25-34
    • /
    • 2016
  • This paper shall suggest the improvement model for invigorating cyber threat information sharing from the national level, which includes, inter alia, a comprehensive solutions such as the legislation of a guideline for information sharing, the establishment of so-called National Center for Information Sharing, the construction and management of a integrated information system, the development of techniques for automatizing all the processes for gathering, analyzing and delivering cyber threat information, and the constitution of a private and public joint committee for sharing information, so much so that it intends to prevent cyber security threat to occur in advance or to refrain damage from being proliferated even after the occurrence of incidents.

리스크 기반 신조선 사이버 설계보안 접근 방식

  • Park Kaemyoung;Lim JeoungKyu
    • Review of KIISC
    • /
    • v.33 no.6
    • /
    • pp.51-54
    • /
    • 2023
  • 국제해사기구(IMO)는 2017년 해사안전위원회(Maritime Safety Committee, MSC)에서 안전관리시스템으로의 해상 사이버 리스크 관리 결의하였다. 또한 국제선급협회(IACS)는 선박 사이버 사고가 인명, 재산 및 환경에 심각한 영향을 미칠 수 있음을 인식하여, 사이버 이슈를 체계적으로 논의하기 위한 사이버시스템 패널을 2016년 신설하였다. IACS 는 2022년 4월, 신조선 사이버보안 통합 요구사항(UR E26) 및 기자재 시스템 사이버보안 통합 요구사항(UR E27)을 배포하였다. 이 규정은 2024년 건조 계약을 체결한 신조선에 강제 적용될 예정이다. 본 논문에서는 신조선에 대한 리스크 기반 사이버 설계보안 접근 방식을 제안한다.

Health Analysis of Kim Jung-Il National Defense Committee Chairman Using Face Image Processing (안면 영상처리를 통한 김정일 국방위원장의 건강 상태 분석)

  • Lee, Se-Hwan;Kim, Bong-Hyun;Ka, Min-Kyoung;Cho, Dong-Uk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2873-2878
    • /
    • 2009
  • Since Germany was unified in 1990, Korea became the only country that has the division in the world. This division has various bad effects on Korea's status with not reliable security, forfeited national impression, loss of tourism income and so on. Kim Jung-Il national defense committee chairman is the current dictator of North Korea which is a socialist state. Even if he is getting old, his successor is not proclaimed. In this situation, his sudden aggravation of health can cause seriously bad effects on diplomatic relations especially with South Korea. Therefore, the health information about Kim Jung-Il national defense committee chairman will be very important information. In order to deal this problem, we propose the method of extracting the Kim Jung-Il national defense committee chairman's health from his pictures which are recently open to the public by employing the diagnosis Ocular Inspection used in Oriental medicine. n order to get an accurate result, revising the Kim Jung-Il national defense committee chairman's pictures, which are not taken in a controled equal situation, is necessary. Therefore we employed the color analysis process with color revising and color differential comparing process without color revising. With these processes, we can make diagnosis of his diabetes and complications.

A Study on Developing Framework for Measuring of Security Risk Appetite (보안 위험성향 측정을 위한 프레임워크 개발에 관한 연구)

  • Gim, Gisam;Park, Jinsang;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.141-148
    • /
    • 2019
  • The advancement of digital technology accelerates intelligence, convergence, and demands better change beyond traditional methods in all aspects of business models and technologies, infrastructure, processes, and platforms. Risk management is becoming more important because of various security risks, depending on the changing business environment and aligned to business goals is emerging from the existing information asset based risk management. For business aligned risk management, it is essential to understand the risk appetite for achieving business goals, which provides a basis for decision-making in subsequent risk management processes. In this paper, we propose a framework for analyzing the risk management framework, pre - existing risk analysis, and protection motivation theory that influences decisions on security risk management. To examine the practical feasibility of the developed risk appetite framework, we reviewed the applicability and significance of the proposed risk appetite framework through an advisory committee composed of security risk management specialists.

Analyses of Security Consideration and Vulnerability based on Internet of Things (사물인터넷 기반의 시스템을 위한 보안 취약성 및 고려사항 분석)

  • Jang, Chang-hwan;Jo, Sung-ho;Lee, Jin-hyup;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.491-494
    • /
    • 2017
  • Recently, IoT has been supported by ICT technology with a variety of ICT powers. In May 2014, Information and Communication Strategy Committee announced the 'Basic plan for Internet of Things'. Also on Febuary 24 this SAME year, KISA(Korea Internet&Security Agency) provides many projects related to IoT, such as announcement of 'K-Global Project' for start-up and venture support related to IoT and ICT companies. In contrast to the various services of Internet of Things, when a connection is made between object-to-object or person-to-object wired and wireless networks, security threats have occurred in the process of communication. We analyzed these kinds of security threats related to Internet of things, and gave a consideration for requirement.

  • PDF

Job Analysis on Port Security Operation using a DACUM Method (데이컴 기법을 활용한 항만안전운영에 관한 직무분석)

  • Park, Doojin;Kim, Hyunduk
    • Journal of Korea Port Economic Association
    • /
    • v.28 no.3
    • /
    • pp.151-165
    • /
    • 2012
  • This study is to develop a job model through job analysis on port security operation using a DACUM Method. Total 8 duties and 59 tasks are drawn through job analysis on port security operation. DACUM committee evaluated the degree of importance, difficulty and frequency of execution by each work with ABC rankings. In dosing so, job analysis model on port security operation by completing a DACUM research chart including job, duty and task in the field of port security operation is concluded. Such a Job model development could be used as a basic data and information for developing a short and long-run education programme in the field of port security operation.

Secure Subgroup and Group Communication Service for TETRA System (TETRA 시스템을 위한 안전한 소그룹과 그룹통신 서비스)

  • 이수연;정진욱
    • Convergence Security Journal
    • /
    • v.3 no.1
    • /
    • pp.31-37
    • /
    • 2003
  • This paper proposed a model supporting secure mechanism both group communication service and subgroup communication service of TETRA system that the standard developed by the technical committee Radio Equipment and Systems(RES) of the European Telecommunications Standards Institute(ETSI) provides a pure digital information technology for the transmission of speech and data. In each scheme, members in a subgroup maintains its subgroup key, which is not distributed, but computed by each member in the subgroup only with his own secret information and public values and secure subgroup members in a same subgroup can communication securely each other by using their subgroup key. Also, all members in group can share securely a group key. In communication services of TETRA system, this model supports mechanism for both group and subgroup communication are simultaneously needed.

  • PDF

A Study on the Planning of Civil Defense Shelter and Design 2 - Focused on Planning and Design of Defense Shelter the U.S. - (민방위 대피시설 계획 및 설계 방안에 관한 연구 2 - 미국의 대피시설 계획 및 설계를 중심으로 -)

  • Park, Namkwun;Kwon, Taeil;Kim, Twehwan
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.3
    • /
    • pp.442-451
    • /
    • 2014
  • Over 20,000 defense shelters are currently designated and operated in Korea. However, only few sheltershave the capacity to defend against CBR attack or terror from North Korea. Furthermore, as public defense shelters are only equipped with air-raid shelters, it is urgent to establish standard for CBR attack.This study focuses on shelter-in-place(SIP), a kind of CBR shelter in the U.S., and aims to draw up construction plan and planning of Korean defenses helter.

Simulator Design and Performance Analysis of BADA Distributed Consensus Algorithm (BADA 분산합의 알고리즘 시뮬레이터 설계 및 성능 분석)

  • Kim, Young Chang;Kim, Kiyoung;Oh, Jintae;Kim, Do Gyun;Choi, Jin Young
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.168-177
    • /
    • 2020
  • In recent years, importance of blockchain systems has been grown after success of bitcoin. Distributed consensus algorithm is used to achieve an agreement, which means the same information is recorded in all nodes participating in blockchain network. Various algorithms were suggested to resolve blockchain trilemma, which refers conflict between decentralization, scalability, security. An algorithm based on Byzantine Agreement among Decentralized Agents (BADA) were designed for the same manner, and it used limited committee that enables an efficient consensus among considerable number of nodes. In addition, election of committee based on Proof-of-Nonce guarantees decentralization and security. In spite of such prominence, application of BADA in actual blockchain system requires further researches about performance and essential features affecting on the performance. However, performance assessment committed in real systems takes a long time and costs a great deal of budget. Based on this motivation, we designed and implemented a simulator for measuring performance of BADA. Specifically, we defined a simulation framework including three components named simulator Command Line Interface, transaction generator, BADA nodes. Furthermore, we carried out response surface analysis for revealing latent relationship between performance measure and design parameters. By using obtained response surface models, we could find an optimal configuration of design parameters for achieving a given desirable performance level.

A Security Architecture of the inter-VTS System for shore side collaboration of e-Navigation (안전한 e-Navigation을 위한 해상교통관제 시스템의 정보교환 보안구조 설계)

  • Lee, Byung-Gil;Han, Jong-Wook;Cho, Hyun-Suk;Park, Nam-Je
    • Journal of Navigation and Port Research
    • /
    • v.36 no.1
    • /
    • pp.1-7
    • /
    • 2012
  • A concept of the "e-Navigation" was introduced in 2005 and implementation strategies are under way by IMO/IALA in the maritime safety area. Specially VTS is an important maritime traffic monitoring and aids to navigation system which is aims to improve safety, navigation efficiency and protect the marine environment. The demand of the inter-VTS networking has been increased and standardization is underway for realization of shore side collaboration for maritime safety in IALA. But there may be security problems in the inter-VTS networks if they have not proper security mechanism. The hacking of realtime ship position and sensitive maritime surveillance information caused a critical accident of vessel, human life and environment by terrorist. This paper aims to design of a secure inter-VTS network structure and related security protocol for secure sharing of sensitive maritime data.