• Title/Summary/Keyword: Integrated Threat Information

Search Result 51, Processing Time 0.027 seconds

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.

Design and Verification of the Integrated Log Analysis System for Enterprise Information Security (기업정보 유출 방지를 위한 통합 로그분석 시스템 설계 및 검증)

  • Lee, Jae-Yong;Kang, Soo-Yong
    • Journal of Digital Contents Society
    • /
    • v.9 no.3
    • /
    • pp.491-498
    • /
    • 2008
  • The leakage of sensitive information by an insider within the organization becomes a serious threat nowadays. Sometimes, these insider threats are more harmful to an organization than external attack. Companies cannot afford to continue ignoring the potential of insider attacks. The purpose of this study is to design an integrated log analysis system that can detect various types of information leakages. The system uses threat rules generated through risk analysis, and monitors every aspect of the online activities of authorized insider. Not only should system have the ability to identify abnormal behavior, they should also be able to predict and even help to prevent potential risk. The system is composed of three modules, which are log collector, log analyzer and report generator.

  • PDF

A Study on Spam Protection Technolgy for Secure VoIP Service in Broadband convergence Network Environment (BcN 환경에서 안전한 VoIP 서비스를 위한 스팸대응 기술 연구)

  • Sung, Kyung;Kim, Seok-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.670-676
    • /
    • 2008
  • There is a difficult plane letting a security threat to occur in Internet networks as VoIP service uses technology-based the Internet is inherent, and you protect without adjustment of the existing security solution or changes with real-time service characteristics. It is a voice to single networks The occurrence security threat that it is possible is inherent in IP networks that effort and cost to protect a data network only are complicated relatively as provide service integrated data. This paper about various response way fields to be able to prevent analysis regarding definition regarding VoIP spam and VoIP spam technology and VoIP spam.

The Exploratory Study on Security Threats and Vulnerabilities for Mobile Office Environment (모바일오피스 환경에서의 보안위협 및 취약점에 대한 탐색적 연구)

  • Choi, Young-Jin;Ra, Jong-Hei;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.175-185
    • /
    • 2014
  • This study is based on the information security management system, the threat from mobile office, mobile office configuration item type, vulnerability analysis and control at the level of the current possibilities for technology to its purpose. To perform exploratory study for mobile Office to target the new technology, we were used the integrated research methods such as the documentary survey, expert FGI and real user's survey. To identify the main risk areas of mobile office services, we develop the mobile service layer model that separated the place, terminal, network, server according to service deliverly system. Finally, the result of survey for threats and vulnerabilities showed that the control of the terminal of user is a significant.

Mithun (Bos frontalis): the neglected cattle species and their significance to ethnic communities in the Eastern Himalaya - A review

  • Dorji, Tashi;Wangdi, Jigme;Shaoliang, Yi;Chettri, Nakul;Wangchuk, Kesang
    • Animal Bioscience
    • /
    • v.34 no.11
    • /
    • pp.1727-1738
    • /
    • 2021
  • Objective: This review consolidates the available information on the socio-economic and ecological significance of Mithun in the lives of ethnic communities in the Eastern Himalaya. Methods: Standard guidelines were followed for the review and data collection was carried out at three stages; literature search, literature screening, and literature review and analysis. Results: Records indicate a long association of Mithun with the ethnic groups. Mithun serves as a symbol of pride and local currency for barter trade in the ethnic society. Its utilities range from being used as a bride price to settling legal disputes. Several cultural festivals and local ceremonies are celebrated around this bovine. Due to its semi-wild nature, this animal also has an ecological role to conserve broad leaf sub-tropical forests. However, it remains neglected and has not received policy attention, leading to a stagnated growth. The institutions for Mithun research and development are also weak. Furthermore, the species is under threat from new diseases and habitat alteration triggered by climate change. Conclusion: Founded on the current state of knowledge, there is a need for institutional development, strengthening institutional linkages, and promoting regional cooperation among Mithun rearing countries for further research and development of this unique cattle.

Improvement of Logistics Service in Electronic Commerce (전자상거래에서의 물류서비스 개선방안)

  • Lee, Seung-Hui
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.05a
    • /
    • pp.525-544
    • /
    • 2004
  • The Purpose of this study is to examine logistics characteristics related to electronic commerce and to suggest improvement of logistics Service in electronic commerce. This paper concerns the logistics functions which are essential for completing a commerce process even under the EC environment and provides ways to improve the logistics performance. Electronic commerce have introduced two scenes; dramatic change of the existing distribution surroundings and noticeable achievement of the economic advance and social efficiency. But, in the same scene, electronic commerce can be a threat to business condition, especially logistics management. It suggests that for activation of EC it is necessary to strengthen the strategic alliances, introduce GPS and use the third party logistics positively to prepare for the settlements of traffic problems, support the introduction of integrated logistics service and logistics information system.

  • PDF

Effects of Relational and Mandatory Influence Strategies on Sales Representatives and Headquarter Trust (관계적과 강제적 영향전략이 본사 신뢰에 미치는 영향 : 영업사원 신뢰의 매개역할)

  • Lee, Chang-Ju;Lee, Phil-Soo;Lee, Yong-Ki
    • Journal of Distribution Science
    • /
    • v.14 no.6
    • /
    • pp.53-63
    • /
    • 2016
  • Purpose - This study examines the effects of the influence strategies on sales representative and headquarter trust, and investigates how sales representative trust plays a mediating role in the relationship between influence strategies and headquarter trust. For these purposes, a structural model which consists of several constructs was developed. In this model, influence strategies that consist of relational influence strategies (information exchange, recommend, promise) and mandatory influence strategies (legal plea, request, threat) were proposed to affect the sales representative trust and in turn, increase the headquarter trust. Thus, this study proposed that sale representative trust plays a core mediating role in the relationship between relational and mandatory influence strategies and headquarter trust in B2B food materials distribution context. Research design, data, and methodology - For these purposes, the authors collected the data from 208 B2B specialized complex agents. We used the 2,200 B2B specialized complex agents which trade with CJ, Ottogi, and Daesang firms and supply food materials to restaurant, school cafeteria, supermarket and traditional market as a sample frame. Once we identified 330 B2B specialized complex agent owners, CEOs, and/or Directors who had agreed to participate in this study, we dropped off a questionnaire at each B2B specialized complex agent and explained the purpose of this study. The survey was conducted from October 1, 2015 to December 15, 2015. A total of 230 questionnaires were collected. Of these collected questionnaires, 28 questionnaires excluded since they had not been fully completed. The data were analyzed using frequency test, reliability test, measurement model analysis, and structural equation modeling with SPSS and SmartPLS 2. Results - First, information exchange, recommendation, and promise of relational influence strategies had positive effects on sales representative trust. The threat of mandatory influence strategies had a negative effect on sales representative trust, but legal plea and request did not have a significant effect on sales representative trust. Second, information exchange and recommendation of relational influence strategies had positive effects on headquarter trust, but promise did not. Also, legal plea, request, and threat of mandatory influence strategies did not have a significant effect on headquarter trust. Third, this findings show that sales representative trust plays a partial mediator between information exchange and headquarter trust, and threat and headquarter trust, and a full mediator between promise and headquarter trust, and recommendation and headquarter trust. Conclusions - The aim of this study was to examine the effects how diverse dimensions of relational and mandatory influence strategies relate to sales representative trust and headquarter trust. To do so, we integrated the influence strategies and the trust transfer theory to hypothesize that various influence strategies increase sales representative and headquarter trust. The findings of this study suggest that headquarter firms should establish and enforce proper influence strategies guidelines to make clear what proper actions sales representatives should implement in relationship with B2B specialized complex agents. Also, relational and mandatory influence strategies must be regarded as a long-term and ongoing strategy that eventually build a long-term orientation with B2B specialized complex agents and guarantee a company's sustainable growth and success.

Research on Core Technology for Information Security Based on Artificial Intelligence (인공지능 기반 정보보호핵심원천기술 연구)

  • Sang-Jun Lee;MIN KYUNG IL;Nam Sang Do;LIM JOON SUNG;Keunhee Han;Hyun Wook Han
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.99-108
    • /
    • 2021
  • Recently, unexpected and more advanced cyber medical treat attacks are on the rise. However, in responding to various patterns of cyber medical threat attack, rule-based security methodologies such as physical blocking and replacement of medical devices have the limitations such as lack of the man-power and high cost. As a way to solve the problems, the medical community is also paying attention to artificial intelligence technology that enables security threat detection and prediction by self-learning the past abnormal behaviors. In this study, there has collecting and learning the medical information data from integrated Medical-Information-Systems of the medical center and introduce the research methodology which is to develop the AI-based Net-Working Behavior Adaptive Information data. By doing this study, we will introduce all technological matters of rule-based security programs and discuss strategies to activate artificial intelligence technology in the medical information business with the various restrictions.

A Implement of Integrated Management Systems for User Fraud Protection and Malware Infection Prevention (악성코드 감염방지 및 사용자 부정행위 방지를 위한 통합 관리 시스템 구현)

  • Min, So-Yeon;Cho, Eun-Sook;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8908-8914
    • /
    • 2015
  • The Internet continues to grow and develop, but there are going to generate a variety of Internet attacks that exploit it. In the initial Internet environment, the attackers maliciously exploited Internet environments for ostentations and hobbies. but these days many malicious attempts purpose the financial gain so systematic and sophisticated attacks that are associated with various crimes are occurred. The structures, such as viruses and worms were present in the form of one source multi-target before. but recently, APT(Advanced Persistent Threat, intelligent continuous attacks) in the form of multi-source single target is dealing massive damage. The performance evaluation analyzed whether to generate audit data and detect integrity infringement, and false positives for normal traffic, process detecting and blocking functions, and Agent policy capabilities with respect to the application availability.

A Case Study on Expert System Framework for Supporting Army Tactical C4I System (육군 전술C4I체계 지원을 위한 전문가시스템 프레임워크 구축 사례 연구)

  • Kwon, Moon Taek
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.4
    • /
    • pp.127-136
    • /
    • 2006
  • This paper describes the result of a case study for developing an expert system framework in order to support Korean Army tactical C4I system. Korean Army had developed an expert system, STAFS(Situation & Threat Assessment Fusion Expert System), for supporting field intelligence analysis activities which has been implemented through traditional manual process inside the division level combat briefing room. STAFS, however, has serious limitations for supporting combat commander's decision making processes because of its limited capabilities, since the system had been developed for supporting only intelligence analysis function rather than for integrated combat decision making processes inside the combat briefing room. Thus, this paper proposed an integrated expert system framework for supporting the commander's decision making by addressing various activities implemented in the briefing room.

  • PDF