• Title/Summary/Keyword: Security Considerations

Search Result 162, Processing Time 0.02 seconds

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

A Study on the Improvement of Security Enhancement for ZTNA (보안성 강화를 위한 ZTNA운영 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.21-26
    • /
    • 2024
  • The security model in the previous network environment has a vulnerability in which resource access control for trusted users is not properly achieved using the Perimeter model based on trust. The Zero Trust is an absolute principle to assume that the users and devices accessing internal data have nothing to trust. Applying the Zero Trust principle is very successful in reducing the attack surface of an organization, and by using the Zero Trust, it is possible to minimize damage when an attack occurs by limiting the intrusion to one small area through segmentation. ZTNA is a major technology that enables organizations to implement Zero Trust security, and similar to Software Defined Boundary (SDP), ZTNA hides most of its infrastructure and services, establishing one-to-one encrypted connections between devices and the resources they need. In this study, we review the functions and requirements that become the principles of the ZTNA architecture, and also study the security requirements and additional considerations according to the construction and operation of the ZTNA solution.

Analysis of Data Isolation Methods for Secure Web Site Development in a Multi-Tenancy Environment (멀티테넌시 환경에서 안전한 웹 사이트 개발을 위한 데이터격리 방법 분석)

  • Jeom Goo Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.35-42
    • /
    • 2024
  • Multi-tenancy architecture plays a crucial role in cloud-based services and applications, and data isolation within such environments has emerged as a significant security challenge. This paper investigates various data isolation methods including schema-based isolation, logical isolation, and physical isolation, and compares their respective advantages and disadvantages. It evaluates the practical application and effectiveness of these data isolation methods, proposing security considerations and selection criteria for data isolation in the development of multi-tenant websites. This paper offers important guidance for developers, architects, and system administrators aiming to enhance data security in multi-tenancy environments. It suggests a foundational framework for the design and implementation of efficient and secure multi-tenant websites. Additionally, it provides insights into how the choice of data isolation methods impacts system performance, scalability, maintenance ease, and overall security, exploring ways to improve the security and stability of multi-tenant systems.

Short-Term Generation Scheduling Considering Transmission Line Capacity Limits (선로용량한계를 고려한 단기 발전계획)

  • 김준현;송현선;유인근
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.35 no.12
    • /
    • pp.594-602
    • /
    • 1986
  • This paper proposes an effective algorithm for short-term generation scheduling for the purpose of economic and secure operation of thermal power systems. Especially, in the procedure of solution by Dynamic Programming, Linear Programming is introduced to promote the possibility of optimal solution and the security of power systems, and evaluation of security function is improved by the application of seven step approximation of normal distribution. Several necessary considerations, that is, time dependent start-up and constant down cost of generating units, demand and spinning reserve constraints, minimum up and sown time constraints, the number of possible start-up of a generating unit in a d and the number of generating units which can be started up at the same time at the same bus, are also incoporated to elevate the usability and flexibility of the algorithm. Finally, the effectiveness of the proposed algorithm has been demonstrated by applying to the 6-gen. 21-bus model power system.

  • PDF

An Analysis of InfoSec Implementation Status in the Public Information System Projects for the Institutionalization of InfoSec Pre-Assessment (정보보호 사전평가 제도 개발을 위한 국내외 관련 제도검토 및 정보화사업에서의 정보보호 현황분석)

  • Kim, Jung-Duk;Hong, Kih-Yang
    • Journal of Digital Convergence
    • /
    • v.1 no.1
    • /
    • pp.69-91
    • /
    • 2003
  • The purpose of this paper is to provide several considerations to be taken into account when institutionalizing the information security(Infosec) pre-assessment. Infosec pre-assessment is a necessary process to embed the security requirements into the information systems at the early stages in their development, resulting in more cost-effective infosec. In order to provide some institutional issues, domestic infosec assessment schemes and U.S. Infosec certification and accreditation schemes are reviewed. Also, the current status of infosec implementation in the public information systems projects is analyzed. Based on the analyses, the seven suggestions are proposed in developing and performing the infosec pre-assessment scheme.

  • PDF

Handover Protocol for Mobility Support in Ubiquitous Sensor Network (USN에서의 이동성을 위한 핸드오버 인증 프로토콜)

  • Bruce, Ndibanje;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.203-206
    • /
    • 2012
  • The System of communication with wireless devices is experiencing a huge growth. While traditional communication paradigms deal with fixed networks, mobility raises a new set of questions, techniques, and solutions. In order to realize service mobility, there is a need of protocol that can support mobility while nodes are communicating without any disruption of their connection status. This paper proposes a handover authentication protocol for mobility support. Careful considerations must be taken in priority to security issues since many unreliable public and private resources; both networks and devices are involved. The protocol is based on public key cryptography with Diffie-Hellman algorithm which provides security against both leakage-resilience of private keys on untrustworthy devices and forward secrecy.

  • PDF

Analyses and considerations for security requirement of PKI for user experience data (사용자 경험 데이터를 위한 PKI의 보안 요구 사항 분석 및 고찰)

  • Im, Hyungjin;Lee, Deok Gyu;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.409-411
    • /
    • 2015
  • 최근 사물인터넷에 대한 발전이 빠르게 이루어짐에 따라서 인터넷 상의 보안 이슈 또한 증가하고 있다. 이에 따라 데이터를 안전하고 은밀하게 통신하기 위한 공개키 기반 구조 (public-Key Infrastructure: PKI) 기술이 발전하고 있다. PKI는 신뢰할 수 있는 기관에서 개인이나 기관을 식별할 수 있는 인증서를 저장하고 있으며 이를 활용할 수 있도록 돕는 디렉토리 서비스를 제공한다. 특히 기존의 PKI 구조에는 사용자의 경험이 담겨있는 패스워드 기반으로 개인키를 암호화 하고 있다. 이는 사용자 인증과 데이터 암호화와 같은 강력한 보안 서비스를 제공하고 있지만 이 또한 취약점을 내포하고 있다. 본 논문에서는 공개키 기반 구조의 핵심 요소에 대해 논의하며 보안 취약점을 분석한다. 이를 통해 안전한 사물인터넷 환경을 위한 연구 방향을 제시한다.

Security Technology Trends to Prevent Medical Device Hacking and Ransomware (커넥티드 의료기기 해킹 및 랜섬웨어 대응기술 동향)

  • Kwon, H.C.;Chung, B.H.;Moon, D.S.;Kim, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.5
    • /
    • pp.21-31
    • /
    • 2021
  • Ransomware attacks, such as Conti, Ryuk, Petya, and Sodinokibi, that target medical institutions are increasing rapidly. In 2020, in the United States., ransomware attacks affected over 600 separate clinics, hospitals, and organizations, and more than 18 million patient records. The cost of these attacks is estimated to be almost $21 billion USD. The first death associated with a ransomware attack was reported in 2020 by the University Hospital of Düesseldorf in Germany. In the case of medical institutions, as introduced in the Medjack report issued by TrapX Labs, in many cases, attackers target medical devices that are relatively insecure and then penetrate deep into more critical network infrastructure, such as EMR servers. This paper introduces security vulnerabilities of hospital medical devices, considerations for ransomware response by medical institutions, and related technology trends.

Underwater Acoustic Mavlink Communication for Swarming AUVS

  • Muller, Yukiko;Oshiro, Shiho;Motohara, Takuma;Kinjo, Atsushi;Suzuki, Taisaku;Wada, Tomohisa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.277-283
    • /
    • 2021
  • The objective of this project is to conduct an underwater survey. The primary goal is to develop a device that can achieve the desired output under test conditions. For this reason, certain practical considerations must be taken into account, and the implementation is then developed to be carried out to obtain stable performance with the available hardware based on that experiment. The experiment was performed via BlueROV2 (Remotely Operated Vehicle) using RaspberryPi and softwares such as QGC (QGroundControl) and ArduPilot. This paper explains the work, the results with the collected data and how we implemented the work is presented in the end. The intention of this experiment is to connect two PCs using RaspberryPi with MAVLink communication using a Commercial-Off-The-Shelf device.

Development Considerations of Natural Disaster Command System for Public Officers through Analysis of Disaster Response Activities at On-Scene (풍수해 현장대응업무 분석을 통한 재난현장 일반직 공무원 대응편제 개발시 고려사항 연구)

  • We, Kum Sook;Jeong, An Young
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.1
    • /
    • pp.47-53
    • /
    • 2013
  • Standard Incident Command System in Korea is that Incident Command System for Emergency Rescue Operation, which is commanded only by Fire Fighting Agencies. However, in the event of a disaster such as the flood, storm, or landslide disaster, there are many disaster response activities performed by the General Public Officers at the disaster on-scene. Yet, there isn't an Natural Disaster Command System for the General Public Officers in Korea. Thus, we have studied the response activities needed cooperation among agencies and proposed some considerations of the Natural Disaster Command System for General Public Officers. The system will be useful to response and recover disaster rapidly, seamlessly, and cooperatively among General Public Officers and the related agencies.