• 제목/요약/키워드: Major information and communication infrastructure

검색결과 69건 처리시간 0.024초

DEA 모형을 이용한 주요정보통신기반시설 취약점 분석·평가의 효율성 분석 (Analysis of Efficiency of Major Information and Communication Infrastructure Analysis and Evaluation Methods Using DEA Model)

  • 선종욱;이경호
    • 정보보호학회논문지
    • /
    • 제31권4호
    • /
    • pp.853-862
    • /
    • 2021
  • 오늘날 국가 기반시설의 전자적 침해 행위에 의한 정보통신 인프라의 교란 및 마비가 위협 요소로 대두되고 있다. 이에 정부는 주요 기반시설의 정보시스템 및 제어시스템을 보호하기 위해 주요정보통신기반시설 취약점 분석·평가제도를 정기적으로 시행하고 있으며 이를 효율적으로 운영하기 위해 매년 늘어난 인적·물적 자원을 투자하고 있다. 그러나 이러한 정부의 노력에도 불구하고 국가 기반시설을 대상으로 한 침해사고가 지속해서 발생함에 따라 정보보호 기반마련을 위한 정부의 자원 투입이 정보보호 활동 결과 산출에 미치는 영향도가 떨어져 평가체계가 효율적이지 못하다는 의문이 제기되고 있다. 따라서 본 연구에서는 주요정보통신기반시설 취약점 분석·평가 제도의 효율적 운용여부를 DEA 모형을 이용해 검토하고, 분석된 결과를 바탕으로 정보보호 수준 제고를 위한 개선방안을 제안하도록 한다.

주요 정보통신 기반시설 취약점 분석 및 평가절차 모델 개선 연구 (An Advanced Model for Week Point Analysis and Evaluation on Important Information Communication Infrastructures)

  • 최웅규
    • 한국방재안전학회논문집
    • /
    • 제5권2호
    • /
    • pp.43-48
    • /
    • 2012
  • 주요 정보통신 기반시설의 중요성이 대두되면서 국내에서는 2001년부터 정보통신 기반보호법을 제정하여 주요 통신장비가 집중된 시설 및 정보통신 서비스 전국감시 시설, 국가 행정 운영 및 관리 시설 등을 지정하여 관리하고 있다. 이러한 주요 정보통신 기반시설에 대하여 해당 관리기관은 주요 정보통신 기반시설에 대한 취약점 분석 평가를 실시하고 있으며, 자체 수행이 불가능한 경우 외부 전문기관에 의뢰하여 진행하고 있다. 본 연구에서는 적절한 주요 정보통신 기반시설 취약점 분석 평가가 이루어 질 수 있도록 개선된 취약점 분석 평가 모델을 제시하였고, 주요 정보통신 기반시설에 이를 적용함으로써 검증 하였다. 관계기관은 본 연구를 활용하여 기관에 적합한 취약점 분석 평가를 수행 할 수 있을 것이다.

A STUDY OF DISTRIBUTED DENIAL OF SERVICE ATTACK ON GOVERNMENT INFRASTRUCTURE

  • Kim, Suk-Jin;Jeong, Gisung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권2호
    • /
    • pp.55-65
    • /
    • 2016
  • Distributed Denial of service attack is one of the major threats nowadays especially to the government infrastructure that give huge impact to the reputation and interrupt the services and resource. Our survey start with brief introduction about DDoS attacks, we illustrate the trends and incident happened at government from various countries. We then provide an extensive literature review on the existing research about implication, types of attacks and initiative to defence against the DDoS attacks. Our discussion aims to identify the trends in DDoS attacks, in depth impact of DDoS attacks to government infrastructure, classification of attacks and techniques against the attacks. And we will use for a fire fight safety and management.

인프라-차량단말간 통신기술을 위한 WiBro 기술 분석 및 연구 (A study and analysis of WiBro for infrastructure-vehicle communication technology)

  • 임일권;최상욱;김영혁;최정단;이재광
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2009년도 추계학술대회
    • /
    • pp.120-123
    • /
    • 2009
  • WiBro는 2006년 6월 상용화 서비스를 시작으로, 60km/h의 속도에도 3Mbps의 속도를 제공하는 모바일 인터넷 서비스로써 현재 서울 및 수도권 그리고 각 지방 주요도시에서 서비스 중이다. 본 논문에서는 V2I(Vehicle-To-Infrastructure)통신이라 불리는 차량-인프라간 통신에서 무인차량제어통신을 위해 현재 상용화된 무선통신기술에 대해 분석하고 WiBro 기술을 제안한다. V2I 통신환경 구축을 위해 각 WiBro 단말기를 2대의 노트북에 장착하여 차량을 운행하였으며, 각 기지국을 중심으로 커버리지, 전송률, 지연율, 손실률과 주차장 환경에서의 전송률을 테스트 하였다.

  • PDF

Analysis of Information Security Issues and Classification through Metaverse Infringement Cases

  • Mi-Na, Shim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권1호
    • /
    • pp.13-22
    • /
    • 2023
  • In the age of Web 3.0, the metaverse is emerging as a new innovative element to replace the Internet. Leading major ICT companies, it is striving to become a metaverse platform or infrastructure-oriented company. Along with the expansion of the VR and AR market, governments of each country are investing large budgets in this field. However, security concerns about metaverse are also growing. In addition to potential damage to infrastructure, platform and services, personal information leakage and privacy damage are expected to increase further. In this study, we investigated and closely analyzed cases of infringement on the infrastructure, platform, and service of Metaverse. We have clearly identified the current state of metaverse security and the characteristics of the risks of greatest concern. The research procedure is composed of a method of determining the metaverse security area for case analysis first and deriving the type of threat by area through the type of infringement. In particular, the results were mapped into Domain, Case, and Threat, and the implications of the results were analyzed. Through these results, researchers want to contribute to finding the right direction of research by clearly understanding the latest metaverse security status.

Security Measures by Diagnosing Vulnerabilities in Web Applications

  • Kim, Hee Wan
    • International journal of advanced smart convergence
    • /
    • 제10권4호
    • /
    • pp.22-29
    • /
    • 2021
  • For web application vulnerability diagnosis, from the development stage to the operation stage, it is possible to stably operate the web only when there is a policy that is commonly applied to each task through diagnosis of vulnerabilities, removal of vulnerabilities, and rapid recovery from web page damage. KISA presents 28 evaluation items for technical vulnerability analysis of major information and communication infrastructure. In this paper, we diagnose the vulnerabilities in the automobile goods shopping mall website and suggest security measures according to the vulnerabilities. As a result of diagnosing 28 items, major vulnerabilities were found in three items: cross-site scripting, cross-site request tampering, and insufficient session expiration. Cookie values were exposed on the bulletin board, and personal information was exposed in the parameter values related to passwords when personal information was edited. Also, since the session end time is not set, it was confirmed that session reuse is always possible. By suggesting security measures according to these vulnerabilities, the discovered security threats were eliminated, and it was possible to prevent breaches in web applications and secure the stability of web services.

고해상도 영상을 이용한 농업용수 수혜면적 및 용배수로 추출 기법 개발 (Development of Extraction Technique for Irrigated Area and Canal Network Using High Resolution Images)

  • 윤동현;남원호;이희진;전민기;이상일;김한중
    • 한국농공학회논문집
    • /
    • 제63권4호
    • /
    • pp.23-32
    • /
    • 2021
  • For agricultural water management, it is essential to establish the digital infrastructure data such as agricultural watershed, irrigated area and canal network in rural areas. Approximately 70,000 irrigation facilities in agricultural watershed, including reservoirs, pumping and draining stations, weirs, and tube wells have been installed in South Korea to enable the efficient management of agricultural water. The total length of irrigation and drainage canal network, important components of agricultural water supply, is 184,000 km. Major problem faced by irrigation facilities management is that these facilities are spread over an irrigated area at a low density and are difficult to access. In addition, the management of irrigation facilities suffers from missing or errors of spatial information and acquisition of limited range of data through direct survey. Therefore, it is necessary to establish and redefine accurate identification of irrigated areas and canal network using up-to-date high resolution images. In this study, previous existing data such as RIMS (Rural Infrastructure Management System), smart farm map, and land cover map were used to redefine irrigated area and canal network based on appropriate image data using satellite imagery, aerial imagery, and drone imagery. The results of the building the digital infrastructure in rural areas are expected to be utilized for efficient water allocation and planning, such as identifying areas of water shortage and monitoring spatiotemporal distribution of water supply by irrigated areas and irrigation canal network.

지역 정보 인프라와 기업 경쟁력 강화 방안 (Regional Information Infrastructure and Competitiveness)

  • 김유일;조영복;방호열;장활식;서문식;신종국
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제8권1호
    • /
    • pp.149-176
    • /
    • 1999
  • Regional information infrastructure(RII) plays an increasingly important role in determining the competitiveness of companies operating within the region. The purposes of this research are (1) to identify the types of RII demanded by the companies operating within Pusan and KyungNam areas in Republic of Korea, (2) to explain the levels of RII demand using variables including organizational environment, organizational strategy, and the importance of information systems for the organization, and (3) to examine whether the types of RII demand are different depending on the competition strategies that companies are pursuing. The most important type of RII that region companies demand is information systems personnel having knowledge in systems control, systems planning, communication network, database administration, and system construction. In addition, demanded are TSDN, satellite communication network, and shareable software and hardware. The levels of RII demand are different depending on the importance of information systems(IS) roles for the businesses. The more important IS role is for a company, the more sharable computing equipments and facilities are demanded. The importance of IS role is affected by the organizational environment and organizational strategy. The levels of RII demand are different also depending on the competitive advantages that companies are pursuing. Companies focusing on achieving short-term and direct benefits using information technology tend to have higher demands on sharable computing equipments and facilities as well as on information communication services. This research is explorative in nature One major limitation of this research, therefore, is that the plausibility of the postulated hypotheses was not examined simultaneously. This research is meaningful in that it first attempted to measure the demands of regional companies for RII.

  • PDF

공공기관 연구시설장비 효율성 향상을 위한 온라인 일정계획 시스템 개발 (Developing an On-line Scheduling System for Increasing Effectiveness of Public Research Facility)

  • 이채윤;김기홍;신승준
    • 대한안전경영과학회지
    • /
    • 제19권1호
    • /
    • pp.181-189
    • /
    • 2017
  • The systematic management of technology infrastructure increasingly becomes critical as it represents the driving power for creating competitive advantage of nations and enterprises. In this sense, public facility and equipment, which is one major asset of technology infrastructure, should be managed effectively, systematically and efficiently to increase its overall equipment effectiveness. However, the manual and off-line communication was the unique way to communicate between the suppliers who provide facilities in the public sector and the customers who utilize the facilities in the industrial sector. This communication way caused invisibility of available usage time and increase of idle time, thereby decreasing the equipment effectiveness. This paper presents an web-based scheduling system that enables real-time collaboration and information sharing for increasing the equipment effectiveness. The designed system performs scheduling, facility management, order management and customer relationship management in an on-line platform, and carries out the processing and storing of relevant information in an integrated database. The paper includes a development approach to identify business process models and standardized system models by using object-modeling technique. The deliverable of the present work will contribute to increasing the equipment effectiveness by enhancing visibility, transparency and predictability by means of the integration with a legacy Enterprise Resource Planning.

이동 임시무선망에서의 키 관리 기법에 관한 연구 (On the Study of Key Management in Mobile Ad Hoc Networks)

  • 김시관;신윤식;임은기
    • 한국산업정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.90-98
    • /
    • 2004
  • 이동성을 가진 다수의 노드들에 의해 자율적으로 구성되는 이동 임시무선망(Mobile Ad Hoc Network)은 홈 네트워크, 센서 네트워크, 개인망 등 다양한 응용 분야로의 적용이 활발히 이루어지고 있다. 이동 임시무선망은 네트워크 토폴로지, 전송 대역폭 및 전송 거리상의 제약성, 에너지 사용에 있어서의 제약성, 무선망 고유의 보안성 취약 등의 여러 문제점을 극복하기 위하여 다양한 연구가 진행되고 있는데 특히 무선망이라는 속성 때문에 보안에 취약한 문제점을 안고 있다. 본 논문에서는 이동 임시 무선망에서 이동 노드들간에 보안성을 강화하기 위해 키들을 관리하는 기법을 제안한다. 임시 무선망에서 키를 분배하는 기법 중 완전 분배형 인증기법이 널리 적용되고 있다. 기존의 연구는 임의의 노드를 중심으로 한 개의 홉 거리에 있는 노드들에 대해서만 키 분배를 하는 기법을 채택하였지만 임의의 노드를 기준으로 주변에 특정 개수 이하의 노드가 활동 중인 경우에도 키 관리를 원활히 할 수 있는 기법을 제안하고 기존의 기법보다 우수함을 시뮬레이션을 통해 증명한다.

  • PDF