• Title/Summary/Keyword: Security Assessment

Search Result 720, Processing Time 0.024 seconds

A Study on Automatic Security Diagnostic Evaluation System for Security Assurance (보안 안전성을 위한 자동화 보안진단평가 시스템에 관한 연구)

  • Eom, Jung Ho;Park, Seon Ho;Chung, Tai M.
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.109-116
    • /
    • 2009
  • In the paper, we designed an automatic security diagnostic evaluation System(SeDES) based on a security diagnostic evaluation model(SeDEM) for an organization's security assurance. The SeDEM evaluates a security level of an organization quantitatively by a security evaluation formula which is composed of security variables and security index as applying the statistical CAEL model for evaluate risk level of banks. The SeDES has a good expandability as changing security variables according to an organization scale, characteristics and so on. And it also has a excellent usage because it inputs only numeric data got from statistical technique to security index. We can understand more a security level correctly than the existent risk assessment system because it is possible to assess quantitatively with an security grade as well as score. analysis.

Needs and considerrations of corporate security assessment (Focusing on financial companies) (기업 보안평가 공시제도의 필요성 및 구현방안 (금융회사 중심으로))

  • Kim, Bo;Lim, Jong-In
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.273-279
    • /
    • 2014
  • Recently, it was occurred in the nation's largest Information spill about 140 million cases of credit card customers' personal and credit information. As such, it was rapidly to increase in consumer complaints about the privacy of personal information in accordance with outflow of financial companies increased accident. But it is still not clear precaution. Therefore, in financial customer position, it is possible to confirm and determine in advance whether or not superior to the security company. In addition, It is time to be required institutional device that can be a real effort to equip a good security company. This report is considered a model of "Disclosure of corporate security assessment " of these devices institutional study. And We study in realistic and objective stance about why do we need this policy.

A Study on Developing Assessment indicators for Cyber Resilience (사이버 레질리언스 평가지표 개발에 관한 연구)

  • Kim, Sujin;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.137-144
    • /
    • 2017
  • Recently, cyber resilience has emerged as an important concept, recognizing that there is no perfect security. However, domestic researches on cyber resilience are insufficient. In this study, the 22 indicators for cyber resilience assessment were initially developed by the literature survey and discussions with security experts. The developed indicators are reviewed using the Focus Group Interview method in terms of materiality and feasibility of the indicators. This study derived meaningful and useful indicators for the assessment of cyber resilience, and it is expected to be used as a foundation for the future cyber resilience studies. In order to generalize and apply the results of this study in practice, it is necessary to carry out quantitative researches in the future.

A Empirical Study on the Patch Impact Assessment Method for Industrial Control Network Security Compliance (산업제어망 보안 컴플라이언스를 위한 패치 영향성 평가 방안에 관한 실증 연구)

  • Choi, Inji
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1141-1149
    • /
    • 2020
  • Most of the industrial control network is an independent closed network, which is operated for a long time after installation, and thus the OS is not updated, so security threats increase and security vulnerabilities exist. The zero-day attack defense must be applied with the latest patch, but in a large-scale industrial network, it requires a higher level of real-time and non-disruptive operation due to the direct handling of physical devices, so a step-by-step approach is required to apply it to a live system. In order to solve this problem, utility-specific patch impact assessment is required for reliable patch application. In this paper, we propose a method to test and safely install the patch using the regression analysis technique and show the proven results. As a patch impact evaluation methodology, the maximum allowance for determining the safety of a patch was derived by classifying test types based on system-specific functions, performance, and behavior before and after applying the patch. Finally, we report the results of case studies applied directly to industrial control networks, the OS patch has been updated while ensuring 99.99% availability.

A Study on the Cyber Attack Severity Assessment Methodology (사이버공격 심각도 평가방법론 연구)

  • Bae, Sunha;You, Young-in;KIM, SoJeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1291-1307
    • /
    • 2021
  • State-sponsored cyberattacks have increased significantly and threaten national security in recent years. State-sponsored cyberattacks are often more sophisticated and destructive that attacks by individuals and private groups because of the concentration of manpower and resources. So major countries including the United States and the United Kingdom, as well as international organizations such as the EU and OECD, are recommending proportional response measures against cyberattacks. The Republic of Korea(ROK) is also trying to change its will to secure cyberattack deterrence and prepare active response through the 「National Cybersecurity Strategy 2019」. However, the ROK is not equipped with an adequate methodology to assess the severity of cyberattacks nor measures for proportional response to such attacks. In this paper, we propose a Cyber Attack Severity Assessment(CASA) methodology that can assess the scale and impact of damage to prepare external response threshold for cyberattacks at the government-level and to enable proportional responses when responding.

Automated Assessment Of The Air Situation During The Preparation And Conduct Of Combat Operations Using A Decision Support System Based On Fuzzy Networks Of Target Installations

  • Volkov, Andriy;Bazilo, Serhii;Tokar, Oleksandr;Horbachov, Kostiantyn;Lutsyshyn, Andrii;Zaitsev, Ihor;Iasechko, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.184-188
    • /
    • 2022
  • The article considers the improved method and model of automated air situation assessment using a decision support system based on fuzzy networks of target installations. The advanced method of automated assessment of the air situation using the decision support system is based on the methodology of reflexive control of the first rank. With this approach, the process of assessing the air situation in the framework of the formulated task can be reduced to determining the purpose, probabilistic nature of actions and capabilities of the air target. The use of a homogeneous functional network for the formal presentation of air situation assessment processes will formally describe the process of determining classes of events during air situation assessment and the process of determining quantitative and qualitative characteristics of recognized air situation situations. To formalize the patterns of manifestation of the values of quantitative and symbolic information, it is proposed to use the mathematical apparatus of fuzzy sets.

Probabilistic Security Analysis in Composite Power System Reliability (복합전력계통 신뢰도평가에 있어서 확률론적 안전도연구)

  • Kim, H.;Cha, J.;Kim, J.O.;Kwon, S.
    • Proceedings of the KIEE Conference
    • /
    • 2005.11b
    • /
    • pp.46-48
    • /
    • 2005
  • This paper discusses a probabilistic method for power system security assessment. The security analysis relates to the ability of the electric power systems to survive sudden disturbances such as electric short circuits or unanticipated loss of system elements. It consists of both steady state and dynamic security analyses, which are not two separate issues but should be considered together. In steady state security analysis including voltage security analysis, the analysis checks that the system is operated within security limits by OPF (optimal power flow) after the transition to a new operating point. Until now, many utilities have difficulty in including dynamic aspects due to computational capabilities. On the other hand. dynamic security analysis is required to ensure that the transition may lead to an acceptable operating condition. Transient stability, which is the ability of power systems to maintain synchronism when subjected to a large disturbance. is a principal component in dynamic security analysis. Usually any loss of synchronism may cause additional outages and make the present steady state analysis of the post-contingency condition inadequate for unstable cases. This is the reason for the need of dynamic studies in power systems. Probabilistic criterion can be used to recognize the probabilistic nature of system components while considering system security. In this approach. we do not have to assign any predetermined margin of safety. A comprehensive conceptual framework for probabilistic static and dynamic assessment is presented in this paper. The simulation results of the Western System Coordinating Council (WSCC) system compare an analytical method with Monte-Carlo simulation (MCS).

  • PDF

A Study on Cybersecurity Risk Assessment in Maritime Sector (해상분야 사이버보안 위험도 분석)

  • Yoo, Yun-Ja;Park, Han-Seon;Park, Hye-Ri;Park, Sang-Won
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.11a
    • /
    • pp.134-136
    • /
    • 2019
  • The International Maritime Organization (IMO) issued 2017 Guidelines on maritime cyber risk management. In accordance with IMO's maritime cyber risk management guidelines, each flag State is required to comply with the Safety Management System (SMS) of the International Safety Management Code (ISM) that the cyber risks should be integrated and managed before the first annual audit following January 1, 2021. In this paper, to identify cyber security management targets and risk factors in the maritime sector and to conduct vulnerability analysis, we catagorized the cyber security sector in management, technical and physical sector in maritime sector based on the industry guidelines and international standards proposed by IMO. In addition, the Risk Matrix was used to conduct a qualitative risk assessment according to risk factors by cyber security sector.

  • PDF

A Study on Driver's Perception over the Change of the Headlamp's Illuminance : 3. Driver's psychological property (전조등 조도변동에 대한 운전자의 인식연구 : 3. 운전자의 심리적 특성)

  • Kim, Hyun-Ji;Kim, Hyun-Jin;Kim, Gi-Hoon;Kim, Hoon;An, Ok-Hee
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2006.05a
    • /
    • pp.120-124
    • /
    • 2006
  • In this study, psychological assessment was carried out to investigate the driver's psychological characteristics by the change of the headlight. The participants were 20 men and 20 women in their 20s and thirty-two different conditions in combinations of waveform of light, voltage, and alteration time were used. The questionnaire for the assessment was evaluated by 8 subjective items and 5-point SD criteria of 19 pair's adjective. The results were as follows. 1. The assessment results from SD method indicated 3 factors by factor analysis, and it was shown that A waveform had significances in a sense of security and impetus and B waveform had a significance in a sense of security The levels of the limitations for the voltage change were 12V in the factor of a sense of security and 11V in the factor of a sense of impetus for A waveform, 12.6V in the factor of a sense of security for B waveform. 2. The results of the subjective assessment showed that the limitation of A waveform's brightness change was 12V. Moreover, the limitations of voltage changes were 12.6V for B waveform brightness change, 12V for discomfort, 12.6V for darkness. And the limitation of C waveform's brightness change was 12V.

  • PDF

The Development Plan of Voltage Security On-Line Monitoring System (전압안전성 온라인 감시시스템의 개발방안)

  • Jeon, D.H.;Kweon, S.G.;An, G.W.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.1173-1175
    • /
    • 1998
  • This paper presented the development plan of voltage security on-line monitoring system (VSECOMs). VSECOMs consists of voltage security monitoring system and data management system. VSECOMs has the function of bus voltage watch. voltage stability analysis, and voltage security assessment. EMS data on-line acquisition, PSS/E file conversion, and overall data management. VSECOMs is designed with client/server structure. We will seek stable operation of KEPCO's power system by installation of VSECOMs in EMS of KEPCO.

  • PDF