• Title/Summary/Keyword: Port security

Search Result 312, Processing Time 0.029 seconds

A Study on Cybersecurity Risk Assessment in Maritime Sector (해상분야 사이버보안 위험도 분석)

  • Yoo, Yun-Ja;Park, Han-Seon;Park, Hye-Ri;Park, Sang-Won
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.11a
    • /
    • pp.134-136
    • /
    • 2019
  • The International Maritime Organization (IMO) issued 2017 Guidelines on maritime cyber risk management. In accordance with IMO's maritime cyber risk management guidelines, each flag State is required to comply with the Safety Management System (SMS) of the International Safety Management Code (ISM) that the cyber risks should be integrated and managed before the first annual audit following January 1, 2021. In this paper, to identify cyber security management targets and risk factors in the maritime sector and to conduct vulnerability analysis, we catagorized the cyber security sector in management, technical and physical sector in maritime sector based on the industry guidelines and international standards proposed by IMO. In addition, the Risk Matrix was used to conduct a qualitative risk assessment according to risk factors by cyber security sector.

  • PDF

Design of Intrusion Responsible System For Enterprise Security Management (통합보안 관리를 위한 침입대응 시스템 설계)

  • Lee, Chang-Woo;Sohn, Woo-Yong;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.51-56
    • /
    • 2005
  • Service operating management to keep stable and effective environment according as user increase and network environment of the Internet become complex gradually and requirements of offered service and user become various is felt constraint gradually. To solve this problem, invasion confrontation system through proposed this log analysis can be consisted as search of log file that is XML's advantage storing log file by XML form is easy and fast, and can have advantage log files of system analyze unification and manages according to structure anger of data. Also, created log file by Internet Protocol Address sort by do log and by Port number sort do log, invasion type sort log file and comparative analysis created in other invasion feeler system because change sort to various form such as do log by do logarithm, feeler time possible.

  • PDF

A Study on the role of port operation organizations for the development of a region port (지역항만 발전을 위한 항만운영기관의 역할에 관한 연구)

  • Kwon, Se-Min;Pak, Ji-Yeong;Jung, Hyun-Jae;Wang, Ying;Yeo, Gi-Tae
    • Journal of Navigation and Port Research
    • /
    • v.35 no.5
    • /
    • pp.439-444
    • /
    • 2011
  • This study is aimed to extract the key role of port operation organizations for the development of region ports and identify the operating efficiency priorities of three ports such as Busan, Incheon and UIsan port operated by PA(port authority). The Factor Analysis(FA) and Fuzzy Method were used as the analysis methodes. As an important role of port authority and regional maritime affairs & port office, thirteen sub-evaluation factors and four top-level evaluation factors were selected using the FA. Among the top-level evaluation factors i.e. 'port security, information management', service for regional society and customers', 'port marketing' and 'customer attraction', the most important factor was identified as 'port marketing'. The total port efficiency was evaluated using these factors and Fuzzy Method. As a result, Busan ranked 1st, followed by Incheon and Ulsan.

A Method for Detection and Classification of Normal Server Activities and Attacks Composed of Similar Connection Patterns (종단간의 유사 연결 패턴을 갖는 정상 서버 활동과 공격의 구분 및 탐지 방법)

  • Chang, Beom-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1315-1324
    • /
    • 2012
  • Security visualization is a form of the data visualization techniques in the field of network security by using security-related events so that it is quickly and easily to understand network traffic flow and security situation. In particular, the security visualization that detects the abnormal situation of network visualizing connections between two endpoints is a novel approach to detect unknown attack patterns and to reduce monitoring overhead in packets monitoring technique. However, the session-based visualization doesn't notice a difference between normal traffic and attacks that they are composed of similar connection pattern. Therefore, in this paper, we propose an efficient session-based visualization method for analyzing and detecting between normal server activities and attacks by using the IP address splitting and port attributes analysis. The proposed method can actually be used to detect and analyze the network security with the existing security tools because there is no dependence on other security monitoring methods. And also, it is helpful for network administrator to rapidly analyze the security status of managed network.

A Study on the Establishment of Specific Traffic Safety Areas at Pyeongtaek Port (평택항 교통안전특정해역 설정에 관한 연구)

  • Yoo, Sang-Lok;Kim, Deug-Bong;Jeong, Jae-Yong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.6
    • /
    • pp.660-670
    • /
    • 2016
  • This study expresses the necessity of recognizing Pyeongtaek Port as a specific traffic safety area to ensure the safety of the vessels that navigate there using quantitative data. The number of foggy days, pilotage distance, the number of large vessels and the number of fishing vessels that traveled between Pyeongtaek Port and 6 ports chosen as comparative study objects were compared and analyzed. The results showed that Pyeongtaek Port was more frequently affected by restricted visibility. With these perverse conditions, Pyeongtaek Port has a longer pilotage distance than Busan, Busan Newport, Ulsan or Pohang Ports by as much as 3.5-6 times. Especially from May to July, when fisheries were most functional, large vessels were required to navigate in an opposite direction to avoid 35 fishing vessels that were observed, creating an increased possibility for collisions among vessels. Therefore, the navigational safety of Pyeongtaek Port should be further secured by defining the approaching waters as specific traffic safety areas, giving large vessels legal priority over fishing vessels.

Debug Port Protection Mechanism for Secure Embedded Devices

  • Park, Keun-Young;Yoo, Sang-Guun;Kim, Ju-Ho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.2
    • /
    • pp.240-253
    • /
    • 2012
  • In this paper we propose a protection mechanism for the debug port. While debug ports are useful tools for embedded device development and maintenance, they can also become potential attack tools for device hacking in case their usage is permitted to hackers with malicious intentions. The proposed approach prevents illicit use of debug ports by controlling access through user authentication, where the device generates and issues authentication token only to the server-authenticated users. An authentication token includes user access information which represents the user's permitted level of access and the maximum number of authentications allowed using the token. The device authenticates the user with the token and grants limited access based on the user's access level. The proposed approach improves the degree of overall security by removing the need to expose the device's secret key. Availability is also enhanced by not requiring server connection after the initial token generation and further by supporting flexible token transfer among predefined device groups. Low implementation cost is another benefit of the proposed approach, enabling it to be adopted to a wide range of environments in demand of debug port protection.

A Slow Portscan Attack Detection and Countermove Mechanism based on Fuzzy Logic (퍼지 로직을 이용한 느린 포트스캔 공격 탐지 및 대응 기법)

  • Kim, Jae-Kwang;Yoon, Kwang-Ho;Lee, Seung-Hoon;Jung, Je-Hee;Lee, Jee-Hyong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.5
    • /
    • pp.679-684
    • /
    • 2008
  • The slow port scan attack detection is the one of the important topics in the network security. We suggest an abnormal traffic control framework to detect slow port scan attacks using fuzzy rules. The abnormal traffic control framework acts as an intrusion prevention system to suspicious network traffic. It manages traffic with a stepwise policy: first decreasing network bandwidth and then discarding traffic. In this paper, we show that our abnormal traffic control framework effectively detects slow port scan attacks traffic using fuzzy rules and a stepwise policy.

An Empirical Study on e-Logistics of Port & Logistics industry (항만물류산업의 e-Logistics 실증연구)

  • 조소희;허윤수;남기찬
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.04a
    • /
    • pp.365-370
    • /
    • 2004
  • At the present, e-commerce takes the place of existing transaction form in structure in the world trade by advancement of Information Technology and diffusion of Internet. There is no exceptions of this tendency even in industry of maritime and logistics. So, global shipping lines and logistics companies try to construct the e-Business network system for increasing their competitiveness in an are of cyber. However, in Korea, most of companies prefer "final handshake" as the traditional way of transaction to "e-commerce", because they bear a distrust in mind about the outflow of transaction information and security of settlement. So, number of companies using e-commerce is very small, and this situation causes the limited factor for activating the transaction structure of it. The rate of using e-commerce in logistics industry is lower than other industries, even more higher effectiveness is expected when they use it. Especially, it is very necessary not only e-commerce but also e-Logistics which can serve information of freight cost on cargo flow, operation cost and schedule, and tracing information of cargo. Increasing the necessity of e-Logistics, this study research the rate rf using e-Logistics focused on maritime and logistics companies, and analyze the transaction form among members of these industries for improving them. In detail, this paper examine the drivers for activating e-Logistics, and present the effective factors for a successful development of these industries.

  • PDF

Organizational Change Readiness, Service Innovation, and Corporate Image in Improving Competitiveness: A Case Study in Indonesia

  • HUTAPEA, John Gunung;NIMRAN, Umar;IQBAL, Mohammad;HIDAYAT, Kadarisman
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.3
    • /
    • pp.683-693
    • /
    • 2021
  • Shipping has become an important sector in supporting social, economic, government, defense, security, cultural and other sectors to unite separate islands and broad seas. Thus, ports automatically become an important facility in Indonesia. The purpose of this research is to test and explain the effect of Organizational readiness for change, Service Innovation, and Corporate Image on Perceived opportunity and challenge. The research model with inferential analysis uses Structural Equation Modeling (SEM) analysis with the WarpPLS approach, expected to answer the statements of problem and be able to test the desired hypothesis. The model development in this research was based on the background, statements of problem, conceptual framework and research hypotheses. The model referred to is "Complete and Comprehensive Port." Its development was carried out through studying and synthesizing various sources. The most important source is the results of literature review in the form of theoretical developments and research results, then continued with compilation. The use of Organizational Change Readiness, Service Innovation, and Corporate Image in improving Port Competitiveness is seen as one of the novelties of this research, specifically the use of the Organizational Change Readiness variable which is often used in high-flexibility companies but now used in port companies as well.

A Study on the Derivation of Port Safety Risk Factors Using by Topic Modeling (토픽모델링을 활용한 항만안전 위험요인 도출에 관한 연구)

  • Lee Jeong-Min;Kim Yul-Seong
    • Journal of Korea Port Economic Association
    • /
    • v.39 no.2
    • /
    • pp.59-76
    • /
    • 2023
  • In this study, we tried to find out port safety from various perspectives through news data that can be easily accessed by the general public and domestic academic journal data that reflects the insights of port researchers. Non-negative Matrix Factorization(NMF) based topic modeling was conducted using Python to derive the main topics for each data, and then semantic analysis was conducted for each topic. The news data mainly derived natural and environmental factors among port safety risk factors, and the academic journal data derived security factors, mechanical factors, human factors, environmental factors, and natural factors. Through this, the need for strategies to strengthen the safety of domestic ports, such as strengthening the resilience of port safety, improve safety awareness to broaden the public's view of port safety, and conduct research to develop the port industry environment into a safe and specialized mature port. As a result, this study identified the main factors to be improved and provided basic data to develop into a mature port with a port safety culture.