• Title/Summary/Keyword: OT 프레임워크

Search Result 4, Processing Time 0.026 seconds

Opportunity Tree and Algorithm design to schedule management (일정관리를 위한 Opportunity Tree 및 알고리즘 설계)

  • Lee, Eun-Se;Lee, Sang-Ho
    • The KIPS Transactions:PartD
    • /
    • v.12D no.7 s.103
    • /
    • pp.965-978
    • /
    • 2005
  • There are many defects that cause the schedule and qualify problems during software development. This paper designs the opportunity tree framer work that removes and manages the schedule and quality problems as well. For the similar projects, we can estimate defects and prepare to solve them by using domain expert knowledge and the opportunity tree framework which can greatly improve the software process. This research provides solution of schedule defect problem and detection of defect and its causes that happen on software development.

MITRE ATT&CK 프레임워크 기반 에너지분야 기반시설 보안 모니터링 방안

  • Choi, Seungoh;Kim, HyoungChun
    • Review of KIISC
    • /
    • v.30 no.5
    • /
    • pp.13-23
    • /
    • 2020
  • 주요 국가기반시설에 도입되어 운영 중인 산업제어시스템은 4차 산업혁명에 따른 디지털 전환으로 지능화됨에 따라 IT환경의 보안위협이 OT환경으로 상속되면서 제어시스템 보안위협 및 공격 양상도 복잡해지고 있다. 실제로 에너지분야 기반시설을 대상으로 한 Stuxnet, Conficker, BlackEnergy3 등 제어시스템 사이버 위협 및 사고 사례가 지속적으로 보고되고 있으나, 제어시스템을 대상으로 하는 사이버공격 대응을 위한 보안가시성 확보는 제대로 이루어지지 않고 있으며, 이를 위해서는 기존 IT 환경과는 다른 제어시스템의 특성이 반영된 보안 모니터링이 요구된다. 본 논문에서는 제어시스템 보안위협 지식 데이터베이스인 MITRE ATT&CK 프레임워크를 기반으로 제어시스템에 적합한 보안 모니터링을 수행하기 위한 요소들을 식별하고 방안을 제시한다.

A Study on the Security Framework for IoT Services based on Cloud and Fog Computing (클라우드와 포그 컴퓨팅 기반 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1928-1939
    • /
    • 2017
  • Fog computing is another paradigm of the cloud computing, which extends the ubiquitous services to applications on many connected devices in the IoT (Internet of Things). In general, if we access a lot of IoT devices with existing cloud, we waste a huge amount of bandwidth and work efficiency becomes low. So we apply the paradigm called fog between IoT devices and cloud. The network architecture based on cloud and fog computing discloses the security and privacy issues according to mixed paradigm. There are so many security issues in many aspects. Moreover many IoT devices are connected at fog and they generate much data, therefore light and efficient security mechanism is needed. For example, with inappropriate encryption or authentication algorithm, it causes a huge bandwidth loss. In this paper, we consider issues related with data encryption and authentication mechanism in the network architecture for cloud and fog-based M2M (Machine to Machine) IoT services. This includes trusted encryption and authentication algorithm, and key generation method. The contribution of this paper is to provide efficient security mechanisms for the proposed service architecture. We implemented the envisaged conceptual security check mechanisms and verified their performance.

A Study for Process Improvement by State Analysis of Risk Items (위험요소의 상태분석에 의한 프로세스 개선에 관한 연구)

  • Lee, Eun-Ser
    • The KIPS Transactions:PartD
    • /
    • v.15D no.4
    • /
    • pp.523-530
    • /
    • 2008
  • There are many defects that cause the process improvement of lifecycle problems during software development. This paper propose the management method of risk items that removes and manages the lifecycle problems as well. For the similar projects, we can estimate defects and prepare to solve them by using domain expert knowledge and the state analysis of defect items, which can greatly improve the software process. This research provides solution of management of risk items problem and detection of defect transition and its prevention and causes that happen on software development. Also, In this paper propose to making quantity of degree and transition phase.