• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.026 seconds

Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry (전력 SCADA 시스템의 사이버 보안 위험 평가를 위한 정량적 방법론에 관한 연구)

  • Kang, Dong-Joo;Lee, Jong-Joo;Lee, Young;Lee, Im-Sop;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.445-457
    • /
    • 2013
  • This paper is about the study to build a quantitative methodology to assess cyber threats and vulnerabilities on control systems. The SCADA system in power industry is one of the most representative and biggest control systems. The SCADA system was originally a local system but it has been extended to wide area as both ICT and power system technologies evolve. Smart Grid is a concept to integrate energy and IT systems, and therefore the existing cyber threats might be infectious to the power system in the integration process. Power system is operated on a real time basis and this could make the power system more vulnerable to the cyber threats. It is a unique characteristic of power systems different from ICT systems. For example, availability is the most critical factor while confidentiality is the one from the CIA triad of IT security. In this context, it is needed to reflect the different characteristics to assess cyber security risks in power systems. Generally, the risk(R) is defined as the multiplication of threat(T), vulnerability(V), and asset(A). This formula is also used for the quantification of the risk, and a conceptual methodology is proposed for the objective in this study.

A Study on the Enterprise Application Framework for Developing Efficient RFID Applications (효율적인 RFID 애플리케이션 개발을 위한 엔터프라이즈 애플리케이션 프레임워크에 관한 연구)

  • An, Kyu-Hee;Yang, Seok-Hwan;Chung, Mok-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.2
    • /
    • pp.269-280
    • /
    • 2008
  • The information flow through RFID techniques such as, standardized EPC and EPCglobal network suggests new change in the method of cooperating and sharing information in the supply chain. Common function should be prepared for communication, security techniques, and business processes based on the EPCglobal standard to introduce efficient RFID techniques. And the standard architecture which can deal with the RFID environment flexibly is quite necessary. Therefore, this paper suggests Enterprise Application Framework (EAF) for developing efficient and secure RFID applications. EAF offers essential services to develop RFID enterprise systems : a communication environment which uses various standard communication protocols, a security function based on PKI, and abstract business services for flexible introduction of RFID businesses. It simplifies the RFID business integration, minimizes the development complexity, and thus EAF is expected to reduce the cost of RFID application development. EAF guarantees constructing secure RFID applications due to PKI-based security mechanism.

  • PDF

Construction of Multi-agent-based Distributed Framework for Application Services of u-Hospital Information Systems (u-병원 정보 시스템의 응용 서비스를 위한 멀티에이전트 기반 분산 프레임워크 구축)

  • Jeong, Chang-Won;Shin, Chang-Sun;Joo, Su-Chong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.861-865
    • /
    • 2009
  • As the hospital environment has been increasingly changed into a ubiquitous environment, the application services for the hospital environment are also faced with new requirements. In particular, the emergence of various mobile devices and the introduction of a wireless sensor network technology have accelerated the realization of the u-healthcare. The multi-agent paradigm has been introduced for satisfying both the integration of information and the various application scenarios established from various environments. This paper describes the software structure and u-applications for u-hospital information system based on ubiquitous environments. And it suggested the construction of a multi agent based distributed framework for supporting u-hospital information system. The suggested framework includes the JADE and distributed object group framework. And it implemented u-application services for supporting doctors and nurses, which provides the patient's health information and ward environment information. Especially, it is using a dynamic security mechanism on the security situation, which has not been emphasized in existing researches, and this paper shows the results for each user through the GUI.

Mobility Management Scheme based on User Mobility QoS and Security-Effective Network in Heterogeneous Mobile Networks (이종의 모바일 네트워크에서 사용자 이동성 QoS와 보안효과적인 네트워크 기반의 이동성관리 기법)

  • Lee, Hyeungwoo;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.87-97
    • /
    • 2015
  • To support the efficient mobility MIPv6v, FMIPv6, HMIPv6 and host-based mobility management protocols have been developed. AAAC (Authentication, Authorization, Accounting and Charging) system is applied in this paper analyzed the the existing IPv6 PMIPv6, FPMIPv6 network security effective and IPv6 MMP (Mobile Management Protocol) Features and performance analysis is performed. And IPv6 MMP seamless transfer performance in terms of packet loss probability, will be analyzed. That can be efficiently used as a method for the integration of QoS and mobility so that you can manage and control the resources presented QoSB usage. Results of evaluation results showed a better overall fast handover structure of mobility management techniques. PMIPv6 and FPMIPv6 in many respects the most efficient structure that can be specifically, a fast handover of the structure of the network-based mobility management scheme showed the best results.

A Study on Security Capability of IDPS (침입 탐지 및 차단 시스템의 보안능력에 관한 연구)

  • Woo, Sung-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.9-15
    • /
    • 2012
  • With the rise of internet and e-commerce, this is more applicable now than ever. People rely on computer networks to provide them with news, stock prices, e-mail and online shopping. People's credit card details, medical records and other personal information are stored on computer systems. Many companies have a web presence as an essential part of their business. The research community uses computer systems to undertake research and to disseminate findings. The integrity and availability of all these systems have to be protected against a number of threats. Amateur hackers, rival corporations, terrorists and even foreign governments have the motive and capability to carry out sophisticated attacks against computer systems. Therefore, the field of information and communication security has become vitally important to the safety and economic well being of society as a whole. This paper provides an overview of IDS and IPS, their functions, detection and analysis techniques. It also presents comparison of security capability and characteristics of IDPS techniques. This will make basis of IDPS(Intrusion Detection and Protection System) technology integration for a broad-based IDPS solutions

A Study on Analysis and Countermeasure of Security threat in NFC (NFC 서비스 보안 위협 분석 및 대응방안 연구)

  • Kim, Hyung-Uk;Kim, Hyung-joo;Kang, Jung-ho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.183-191
    • /
    • 2016
  • Most recent trend reveals broader state of provision of NFC service as NFC technology was applied on smartphones which has become core communication tools by providing integrated services such as payment, medical, and personal authentication. Moreover, with integration of original service and NFC technology, new service providers now can handle personal information of original service or can handle other personal information with transition of previous service provider to NFC service provider. Considering current state of security industry along with NFC technology and service, we would like to analyze current stage of security threats and plan the counter strategies to create NFC service structure.

C-Engineering Based Industry 4.0 Innovation Networks Sustainable Development

  • Omelyanenko, Vitaliy;Braslavska, Oksana;Biloshkurska, Nataliia;Biloshkurskyi, Mykola;Kliasen, Natalia;Omelyanenko, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.267-274
    • /
    • 2021
  • The article deals with problems of innovation development on a network basis, which require effective mechanisms of innovation communications. In research the organizational aspects of ICT infrastructure development for innovation networks sustainable development based on cooperative marketing principles is considered. The proposed research idea is based on the idea that ICT implementation is based not only on the operational approach for innovation management as a factor of efficiency of internal communications, but also on knowledge economy and post-industrial economy trends. Therefore, the purpose of study is to develop an ICT model of innovation infrastructure to improve its effectiveness (strategic character) and efficiency (operative character) through increasing the efficiency of network communication interactions. Creation of information space and communication tools to support innovation network sustainable development and cooperation activities in research is proposed to be solved with the help of specialized ICT platform. It is shown, that ICT platform of innovation cooperation innovation network is important tool for common work of participants. ICT platform is considered as an integrated information system designed to automate business processes related to the sustainable development of innovation network, segment management and integration with HEI information systems and industrial cooperation. The main factors that determine the need to use a special ICT platform for innovation network cooperation were considered. The main issues of concurrent engineering (C-technology) application in high-technology industries and innovation cooperation for integrated product development were studied.

An Aggregate Detection of Event Correlation using Fuzzy Control (퍼지제어를 이용한 관련성 통합탐지)

  • 김용민
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.135-144
    • /
    • 2003
  • An intrusion detection system shows different result over overall detection area according to its detection characteristics of inner detection algorithms or techniques. To expand detection areas, we requires an integrated detection which can be archived both by deploying a few detection systems which detect different detection areas and by combining their results. In addition to expand detection areas, we need to decrease the workload of security managers by false alarms and improve the correctness by minimizing false alerts which happen during the process of integration. In this paper, a method for aggregation detection use fuzzy inference to integrate a vague detection results which imply the characteristics of detection systems. Their analyzed detection characteristics are expressed as fuzzy membership functions and fuzzy rule bases which are applied through the process of fuzzy control. And, it integrate a vague decision results and minimize the number of false alerts by reflecting the characteristics of detection systems. Also it does minimize inference objects by applying thresholds decided through several experiments.

A Functional Matrix Approach to Pedagogical Enrichment of the Dispositional Core of Future Specialists' Experience of Social Interaction

  • Kovalenko, E.V.;Gubarenko, I.V.;Kovalenko, V.I.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.255-259
    • /
    • 2022
  • The new social reality emerging amid the global rise of communication links and integration processes acutely emphasizes the problems of communication in large and small social systems. The method of their communication becomes one of the keys to ensuring global security. It has become the mission of humanitarian education to prepare the younger generations for life in a changing world with no image of the future and increasing uncertainty. In psychological and pedagogical research, there is a growing scientific interest in the problems of interaction of the individual with the social environment. The mental trace of a person's practice in society shapes the experience of social interaction, which constitutes simultaneously the source, tool, and condition for the emergence and development of personality. The study outlines the methodological foundations for the study of individual experiences of social interaction. A hypothesis about the productivity of the functional matrix method is tested. Materials for the training of specialists in the humanities include interdisciplinary approaches to the study and transformation of the experience of social interaction and systematic methodology for the study of complex objects. Fundamental to the study is the systematic-dialectical method, and the matrix method is employed as the instrumental-technological method. The paper presents the results of a multidisciplinary overview of scientific literature concerning the essential characteristics and functions of social interaction and the respective experience. The overview points to the fragmented nature of scientific understanding of the elements of experience outside its integrity and systemic properties. Based on the formula "personality interacts with the social environment", the study presents an algorithm for the application of a systematic methodology for the study of complex objects, which made it possible to identify the system parameters of experience at three levels of cognition and develop the reference structural and functional matrices for the didactic system of its pedagogical enrichment.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF