• Title/Summary/Keyword: Integrated Threat Information

Search Result 51, Processing Time 0.028 seconds

An Investigation Study to Reduce Security Threat in the Internet of Things Environment (IoT 환경에서 보안위협을 최소화하기 위한 방안 연구)

  • Shin, Seung-Soo;Chae, Gyoo-Soo;Lee, Tae-Hyun
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.31-36
    • /
    • 2015
  • Recently, the necessity of Internet of Things in conjunction between devices is increasing. However, there are increasing security threats while applying various communication technologies in the Internet of Things. In this paper, we propose a security countermeasures to minimize damage to the security of a variety of security technologies used in the Internet of Things in order to improve the efficiency of the Internet of Things. The proposed method defined the environment to minimize security damage between home devices such as TV, washing machine, refrigerator, boiler and medical devices such as Analyzers, blood glucose meters, blood pressure monitors that are used in daily life. In addition, a variety of technologies(Zigbee, Wi-Fi, NFC, RFID, etc.) that are used in the Internet of Things may be under integrated management.

  • PDF

Layered Authoring of Cyber Warfare Training Scenario (계층적 사이버전 훈련 시나리오 저작)

  • Song, Uihyeon;Kim, Donghwa;Ahn, Myung Kil
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.191-199
    • /
    • 2020
  • Cyber warfare training is a key factor for boosting cyber warfare competence. In general, cyber warfare training is conducted by scenarios, and the effects of training can be enhanced by including various elements in the scenarios that can improve the quality of training. In this paper, we introduce the training information, network map, traffic generation policy, threat/defense behavior identified as elements to be included in training scenarios, and propose a method of authoring training scenarios by layering and combining them. We also propose a database design for integrated management of each scenario layer. The layered training scenario authoring method has the advantage of increasing convenience of authoring by reusing existing layers and extending training scenarios based on various combinations between the layers.

A Study on Analysis and Countermeasure of Security threat in NFC (NFC 서비스 보안 위협 분석 및 대응방안 연구)

  • Kim, Hyung-Uk;Kim, Hyung-joo;Kang, Jung-ho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.183-191
    • /
    • 2016
  • Most recent trend reveals broader state of provision of NFC service as NFC technology was applied on smartphones which has become core communication tools by providing integrated services such as payment, medical, and personal authentication. Moreover, with integration of original service and NFC technology, new service providers now can handle personal information of original service or can handle other personal information with transition of previous service provider to NFC service provider. Considering current state of security industry along with NFC technology and service, we would like to analyze current stage of security threats and plan the counter strategies to create NFC service structure.

Development Plan of Facility Importance, Risk, and Damage Estimation Inventory Construction for Assisting Disaster Response Decision-Making (재난대응 의사결정 지원을 위한 시설물 중요도·위험도·피해액 산정 인벤토리 구축 방안 연구)

  • CHOI, Soo-Young;GANG, Su-Myung;JO, Yun-Won;OH, Eun-Ho;PARK, Jae-Woo;KIM, Gil-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.1
    • /
    • pp.167-179
    • /
    • 2016
  • The safety of SOC facilities is constantly under threat by the globally increasing abnormal climate. Responding to disasters requires prompt decision-making such as suggesting evacuation paths. For doing so, spatio-temporal information with convergence of disaster information and SOC facility information must be utilized. Such information is being collected separately by the government or related organizations, but not collectively. The collective control of the separately collected disaster information and the generation of SOC facility safety and damage information are required for prompt disaster response. Also, as disaster information requires spatio-temporal convergence in its nature, the construction of an inventory that integrates related information and assists disaster response decision-making is required. A plan to construct a facility importance, risk, and damage estimation inventory for assisting prompt disaster response decision-making is suggested in this study. Through this study, the disaster and SOC facility-related data, which are being managed separately, can be collected and standardized. The integrated information required for the estimation of facility importance, risk, and damage can be provided. The suggested system is expected to be used as a decision-making tool for proactive disaster response.

A Method and Application of Vulnerability Analysis for Combat Systems Considering Threats and Defense Ability : Focused on PKM Model (위협의 특성과 장갑의 방호 성능을 고려한 전투 시스템의 취약성 분석 방법 및 활용 : 고속정 모델을 대상으로)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Kang, Ji-Won;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1623-1631
    • /
    • 2016
  • There are many researches which analyze vulnerability for combat systems, have been progressing, and apply the analyzed result to reflect on design phase. Recently, there have been requirements for integrating the previous module based researches which conducted independently. In this paper, we propose an integrated vulnerability analysis method for the combat system considering characteristics of threats and protection performance of armors through an analysis of the advanced research. In addition, by applying the proposed method improves the existing hit probability analysis program and we are verified based on scenarios for improving survivability of PKM (Petrol Killer Medium) for vulnerability analysis confirmed the results. The proposed method improves reliability of vulnerability analysis by considering threats and defense ability. Also it able to satisfied with the integration requirements. Furthermore, we became buildup for the development of applied system and the method and integrated vulnerability analysis method for combat systems.

A computer Hardware Selection Strategy for Information Systems Development : A Case of T Coil Service Center (정보시스템 구축시 컴퓨터 하드웨어의 선정전략 - T 철강회사의 시스템 선정 사례 -)

  • Yu, Sang-Jin;Jang, Yeong-Taek
    • Asia pacific journal of information systems
    • /
    • v.3 no.2
    • /
    • pp.3-54
    • /
    • 1993
  • Recently, executives learned of the strategic impact that information systems (IS) and information technology (IT) could provide to their organizations. In other words, through IS/IT companies could squelch competition, secure suppliers, obtain customer loyalty, reduce the threat of new entrants, and identify new opportunities. Because of these potential benefits, organizations are investing ever-increasing amount of organizational resources in IS/IT to make their organizations as information-based ones. Information-based organizations depend largely upon computer hardwares and softwares for their ongoing operations and management. Thus, organizations must manage their information resources, especially hardwares and softwares very effectively to remain competitive. Information resource management (IRI) is a program of activities directed at making effective use of information technology within an organization. These activities cover from corporate IS/IT planning to application system development, implementation, and maintenance. In more detail, IRV activities include planning for and acquiring computer hardwares and communication equipments, planning for, selection, and management of software development projects, and re-engineering business processes as IS/IT are integrated into organizational management. Among these activities, planning for and acquisition of computer hardwares, and planning for and management of software projects are the most critical ones since these activities require enormous amount of such important corporate resources as money, people, and time. Furthermore, corporate's eventual success largely depends upon whether corporate's policy on IS/IT is effective one or not. Numerous approaches and concepts to specific IRM activities have been proposed. However, many organizations have experienced various problems in the process of applying these approaches to their IRM activities mainly because existing methodologies and guidelines are too general to adapt to each firm's unigue situation. Also, these approaches are having its own strengths and weaknesses. Thus, people in charge of organization's IRM policy should come up with effective guidelines to maintain his position very long. In this study, we reviewed some existing approaches for planning, evaluation, and acquisition of computer hardware. Then, real experiences from Taechang Steel Co., Ltd. located in Taegu, which is one of the largest Coil Service Centers in Korea, are discussed. The major purposes of the study are : (1) to discuss the tradeoffs of existing approaches on hardware evaluation and acquisition, (2) to provide a real experience of a company to facilitate the application of theoretical concepts to the real environment.

  • PDF

Research of Small Fixed-Wing Swarm UAS (소형 고정익 무인기 군집비행 기술 연구)

  • Myung, Hyunsam;Jeong, Junho;Kim, Dowan;Seo, Nansol;Kim, Yongbin;Lee, Jaemoon;Lim, Heungsik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.12
    • /
    • pp.971-980
    • /
    • 2021
  • Recently popularized drone technologies have revealed that low-cost small unmanned aerial vehicles(UAVs) can be a significant threat to prevailing power by operating in group or in swarms. Researchers in many countries have tried to utilize integrated swarm unmanned aerial system(SUAS) in the battlefield. Agency for Defense Development also identified four core technologies in developing SUAS: swarm control, swarm network, swarm information, and swarm collaboration, and the authors started researches on swarm control and network technologies in order to be able to operate vehicle platforms as the first stage. This paper introduces design and integration of SUAS consisting of small fixed-wing UAVs, swarm control and network algorithms, a ground control system, and a launcher, with which swarm control and network technologies have been verified by flight tests. 19 fixed-wing UAVs succeeded in swarm flight in the final flight test for the first time as a domestic research.

Managing the Reverse Extrapolation Model of Radar Threats Based Upon an Incremental Machine Learning Technique (점진적 기계학습 기반의 레이더 위협체 역추정 모델 생성 및 갱신)

  • Kim, Chulpyo;Noh, Sanguk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.29-39
    • /
    • 2017
  • Various electronic warfare situations drive the need to develop an integrated electronic warfare simulator that can perform electronic warfare modeling and simulation on radar threats. In this paper, we analyze the components of a simulation system to reversely model the radar threats that emit electromagnetic signals based on the parameters of the electronic information, and propose a method to gradually maintain the reverse extrapolation model of RF threats. In the experiment, we will evaluate the effectiveness of the incremental model update and also assess the integration method of reverse extrapolation models. The individual model of RF threats are constructed by using decision tree, naive Bayesian classifier, artificial neural network, and clustering algorithms through Euclidean distance and cosine similarity measurement, respectively. Experimental results show that the accuracy of reverse extrapolation models improves, while the size of the threat sample increases. In addition, we use voting, weighted voting, and the Dempster-Shafer algorithm to integrate the results of the five different models of RF threats. As a result, the final decision of reverse extrapolation through the Dempster-Shafer algorithm shows the best performance in its accuracy.

Illegal Issuing Practices of Switched Bill of Lading and Precautions against their Potential Risks (스위치선하증권의 불법적 발행 관행에 따른 위험과 그 대책)

  • Park, Sae-Woon
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.389-409
    • /
    • 2012
  • The Switched Bill of Lading(SBL) has been in frequent use in recent years as intermediary trade increases with the growing number of companies' overseas subsidiaries. Its frequent use, though, has brought about disputes regarding its illegal issue. Although there are several legal cases regarding this, studies on this issue are hard to find. Therefore, this study tries to provide countermeasures and precautions against unlawful issues of SBL through examining the legal cases resulting from illegal issuing practices of SBL. When the Switched Bill of Lading is issued, the shipper, consignee, port of loading and unloading, and shipping date of the original bill of lading are usually changed. Statements which may put the shipper at a disadvantageous position may also be deleted and/or the bill of lading may be either divided or integrated when it is issued. However, if the carrier issues the SBL 1)without withdrawing original BL, 2)indicating the shipping date, port of loading and port of discharge falsely, or 3)deleting the statements which may give him disadvantages, it may be regarded as an illegal issue. These unlawful issues of SBL may pose a huge threat to the shipper, banks and the parties relating to the trade. That is, the shipper may take a substantial loss when the goods can be delivered to a third party by SBL without his collecting the proceeds. The issuing bank and the negotiating bank may also have their security rights to the goods hampered by the illegal and improper issue of SBL. In most cases, the carrier has no choice but to issue the SBL without collecting the original BL for fear of hurting the relationship with the intermediary traders. This practice of issuing more than two sets of BL may pose a potential risk to the carrier.

  • PDF

A Study on the Response Plan through the Analysis of North Korea's Drones Terrorism at Critical National Facilities - Focusing on Improvement of Laws and Systems - (국가중요시설에 대한 북한의 드론테러 위협 분석을 통한 대응방안 연구 - 법적·제도적 개선을 중심으로 -)

  • Choong soo Ha
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.395-410
    • /
    • 2023
  • Purpose: The purpose of this study was to analyze the current state of drone terrorism response at such critical national facilities and derive improvements, especially to identify problems in laws and systems to effectively utilize the anti-drone system and present directions for improvement. Method: A qualitative research method was used for this study by analyzing a variety of issues not discussed in existing research papers and policy documents through in-depth interviews with subject matter experts. In-depth interviews were conducted based on 12 semi-structured interviews by selecting 16 experts in the field of anti-drone and terrorism in Korea. The interview contents were recorded with the prior consent of the study participants, transcribed back to the Korean file, and problems and improvement measures were derived through coding. For this, the threats and types were analyzed based on the cases of drone terrorism occurring abroad and measures to establish anti-drone system were researched from the perspective of laws and systems by evaluating the possibility of drone terrorism in the Republic of Korea. Result: As a result of the study, improvements to some of the problems that need to be preceded in order to effectively respond to drone terrorism at critical national facilities in the Republic of Korea, have been identified. First, terminologies related to critical national facilities and drone terrorism should be clearly defined and reflected in the Integrated Defense Act and the Terrorism Prevention Act. Second, the current concept of protection of critical national facilities should evolve from the current ground-oriented protection to a three-dimensional protection concept that considers air threats and the Integrated Defense Act should reflect a plan to effectively install the anti-drone system that can materialize the concept. Third, a special law against flying over critical national facilities should be enacted. To this end, legislation should be enacted to expand designated facilities subject to flight restrictions while minimizing the range of no fly zone, but the law should be revised so that the two wings of "drone industry development" and "protection of critical national facilities" can develop in a balanced manner. Fourth, illegal flight response system and related systems should be improved and reestablished. For example, it is necessary to prepare a unified manual for general matters, but thorough preparation should be made by customizing it according to the characteristics of each facility, expanding professional manpower, and enhancing response training. Conclusion: The focus of this study is to present directions for policy and technology development to establish an anti-drone system that can effectively respond to drone terrorism and illegal drones at critical national facilities going forward.