• Title/Summary/Keyword: Security accident

Search Result 366, Processing Time 0.028 seconds

User Authentication Risk and Countermeasure in Intelligent Vehicles (지능형 자동차의 사용자 인증에 대한 위협 및 대응 기법)

  • Kim, Seung-Hwan;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.7-11
    • /
    • 2012
  • Intellgent Vehles network capabilities can cause a lots of security issues such as data hacking, privacy violation, location tracking and so on. Some possibilities which raise a breakdown or accident by hacking vehicle operation data are on the increase. In this paper, we propose a security module which has user authentication and encryption functionalities and can be used for vehicle network system.

Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network (스마트 팩토리 망에서 DPI와 자기 유사도 기술 기반의 OPC-UA 프로토콜 게이트웨이 융합 보안 기술)

  • Shim, Jae-Yoon;Lee, June-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1305-1311
    • /
    • 2016
  • The smart factory, a combination of ICT technology to the entire production process of a product, means can you intelligent factory is to achieve such reduction and process improvement of the production cost. To implement the smart factory, inevitably must have an internal equipment connections to the external network, this is by equipment which is operated by the existing closure network is exposed to the outside network, the security vulnerability so that gender is increased. In order to solve this problem, it is possible to apply security solutions that are used in normal environments. However, it is impossible to have just completely blocking security threats that can occur in a smart factory network. Further, considering the economic damage that can occur during security breach accident, which cannot be not a serious problem. Therefore, in this paper, a look to know the security measures that can be applied to smart factory, to introduce the main fusion security technology necessary to smart factory dedicated security gateway.

A study of the ISCS(Information Security Check Service) on performance measurement model and analysis method (정보보호 안전진단 성과관리 측정 모델 및 성과 분석 방안 연구)

  • Jang, Sang-Soo;Shin, Seung-Ho;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.127-146
    • /
    • 2010
  • This report has continuously improved in Information Security Level of Information Communication Service Companies which are applicable to Information Security Safety Inspection System. Also, it presents a decided methodology after verified propriety and considered the pre-research or expropriation by being developed the way of Information Security Safety Result Measurement. Management territory weighted value was established and it was given according to the point of view and the strategy target and the and outcome index to consider overall to a measurement item. Accordingly, an outome to the Information Security Check Service is analyzed by this paper and measurement model and oucome analysis methodology are shown with this, and gives help to analyze an outcome. Also it make sure the the substantial information security check service will be accomplished, prevent a maintenance accident beforehand and improve an enterprise outcome independently by institutional system performance securement and enterprise.g corporate performance.

A Security Module for Vehicle Network Communication (차량 네트워크 통신용 보안 모듈)

  • Kwon, Byeong-Heon;Park, Jin-Sung
    • Journal of Digital Contents Society
    • /
    • v.8 no.3
    • /
    • pp.371-376
    • /
    • 2007
  • Many modules such as controller, sensor, telematics terminal, navigation, audio and video are connected each other via vehicle network (CAN, MOST, etc). Futhermore, users can have ITS or internet services in moving by connecting to wireless mobile network. These network capabilities can cause a lots of security issues such as data hacking, privacy violation, location tracking and so on. Some possibilities which raise a breakdown or accident by hacking vehicle operation data (sensor, control data) are on the increase. In this paper, we propose a security module which has encryption functionalities and can be used for vehicle network system such as CAN, MOST, etc. This security module can provide conventional encryption algorithms and digital signature processing functionality such as DES, 3-DES, SEED, ECC, and RSA.

  • PDF

Cyber attack taxonomy for digital environment in nuclear power plants

  • Kim, Seungmin;Heo, Gyunyoung;Zio, Enrico;Shin, Jinsoo;Song, Jae-gu
    • Nuclear Engineering and Technology
    • /
    • v.52 no.5
    • /
    • pp.995-1001
    • /
    • 2020
  • With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead to an accident involving the release of radioactive materials cyber-attacks. However, cyber security research on industrial control systems (ICSs) and supervisory control and data acquisition (SCADA) systems is relatively inadequate compared to information technology (IT) and further it is difficult to study cyber-attack taxonomy for NPPs considering the characteristics of ICSs. The advanced research of cyber-attack taxonomy does not reflect the architectural and inherent characteristics of NPPs and lacks a systematic countermeasure strategy. Therefore, it is necessary to more systematically check the consistency of operators and regulators related to cyber security, as in regulatory guide 5.71 (RG.5.71) and regulatory standard 015 (RS.015). For this reason, this paper attempts to suggest a template for cyber-attack taxonomy based on the characteristics of NPPs and exemplifies a specific cyber-attack case in the template. In addition, this paper proposes a systematic countermeasure strategy by matching the countermeasure with critical digital assets (CDAs). The cyber-attack cases investigated using the proposed cyber-attack taxonomy can be used as data for evaluation and validation of cyber security conformance for digital devices to be applied, and as effective prevention and mitigation for cyber-attacks of NPPs.

Analysis on Knowledge and Skills for Information Security Professionals (정보보호 분야 직무별 필요 지식 및 기술 분석)

  • Jun, Hyo-Jung;Yoo, Hye-Won;Kim, Tae-Sung
    • Information Systems Review
    • /
    • v.10 no.2
    • /
    • pp.253-267
    • /
    • 2008
  • As the importance of information security becomes a major concern, there has been growing effort to educate information security professionals. This study aims to analyze the level of required knowledge and skills for four information security skills groups: strategy and planning; research and development; system management and operation; and accident control. For this study, we selected 55 critical knowledge and skills for information security professionals by literature review and Delphi method, and we conducted a survey of information security knowledge and skills requirements for information security professionals to perform their jobs. As a result, we analyzed the current status of the information security professionals' knowledge and skills level and suggested some guidelines for establishing the demand-based curriculum for training information security professionals.

A security study for Control Network: Security Threat Using Control Protocol (제어 네트워크의 프로토콜을 이용한 보안 위협 연구)

  • Choi, DongJun;Lee, JaeWoo
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.99-108
    • /
    • 2020
  • Unlike a general IT environment, an industrial control system is an environment where stability and continuity are more important than security. In the event of a security accident in the industrial control system, physical motion can be controlled, so physical damage can occur and physical damage can even result in personal injury. Cyber attacks on industrial control systems are not simply cyber damage, but terrorism. However, the security of industrial control systems has not been strengthened yet, and many vulnerabilities are actually occurring. This paper shows that the PLC can be remotely controlled by analyzing the connection process and packets for the PLC protocol used in the industrial control system and bypassing the security mechanism existing in the protocol. Through this, we intend to raise the security awareness of the industrial control system.

Numerical Simulation of the Flood Event Induced Temporally and Spatially Concentrated Rainfall - On August 17, 2017, the Flood Event of Cheonggyecheon (시공간적으로 편중된 강우에 의한 홍수사상 수치모의 - 2017년 8월 17일 청계천 홍수사상을 대상으로)

  • Ahn, Jeonghwan;Jeong, Changsam
    • Journal of Korean Society of Disaster and Security
    • /
    • v.11 no.2
    • /
    • pp.45-52
    • /
    • 2018
  • This study identifies the cause of the accident and presents a new concept for safe urban stream management by numerical simulating the flood event of Cheonggyecheon on August 17, 2017, using rain data measured through a dense weather observation network. In order to simulate water retention in the CSO channel listed as one of the causes of the accident, a reliable urban runoff model(XP-SWMM) was used which can simulate various channel conditions. Rainfall data measured through SK Techx using SK Telecom's cell phone station was used as rain data to simulate the event. The results of numerical simulations show that rainfall measured through AWSs of Korea Meteorological Administration did not cause an accident, but a similar accident occurred under conditions of rainfall measured in SK Techx, which could be estimated more similar to actual phenomena due to high spatial density. This means that the low spatial density rainfall data of AWSs cannot predict the actual phenomenon occurring in Cheonggyecheon and safe river management needs high spatial density weather stations. Also, the results of numerical simulation show that the residual water in the CSO channel directly contributed to the accident.

A Review on Smart Two Wheeler Helmet with Safety System Using Internet of Things

  • Ilanchezhian, P;Shanmugaraja, P;Thangaraj, K;Aldo Stalin, JL;Vasanthi, S
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.11-16
    • /
    • 2021
  • At the present time, the number of accidents has enlarged speedily and in country like India per day there are about 204 accidents occurred. Accidents of two-wheeler compose a foremost segment of every accident and it can be true for the reason that two-wheelers like bikes not able to produce as many as security measurements normally incorporated in cars, truks and bus etc. General main rootcost of the two-wheeler accidents happen only when people community not remember to wearing a device helmet and during the driving time feels like sleep condition, alcohol disbursement, many of the drivers doesn't know heavy vehicles like Loory and buses approaching into very closer to their two wheelers, contravention of two wheelers in traffic rules and regulations. Let's overcome the above situations; our important objective is to develop an intelligent system device that can successfully facilitate in avoidance of every kind of problems. Suppose any of the above stated situations occurs, at that moment how system device identify and represents the commanders and community, and finally the stated situation be able to taken care of straight away without any further delay. A smart intelligent helmet system is a defending head covering used by rider for making bike riding safer than earlier. This is finished by incorporating sophisticated features like detecting the usage of helmet by the rider, connected Bluetooth module in helmet. In order to maintain the temperature inside the helmet device we need to include CPU fan module inside the device. RF based helmet prevents road accidents and identify whether people community is not using a component helmet or used. Main responsibility of the system is to detect accidents by vibration sensors, accelerometers and also with the help of modules global positioning system and global system for mobile commnicaiton module. A wireless communication device used to discover the accident area site location and likewise notifying the two-wheeler drived people's relatives and short message text information passed to the positioned hospitals.

A Study on the Improvement of Security Vulnerabilities in Intelligent Transport Systems (지능형교통시스템의 보안취약점 개선방안에 관한 연구)

  • Jo, Pyoung Hyun;Lim, Jong In;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.531-543
    • /
    • 2013
  • The destruction and prejudice of major infrastructure such as energy, broadcast, communication and transportation could result in a threat to individual rights and liberties, as well as social and economic losses. If a traffic signal control facilities have been violated, the lives of the citizens discomfort as well as causing social disruption such as traffic accident. Because the control system is operating as a closed network and you think it is safe, the information protection system has not been built or security patches and anti-virus updates do not work properly. So, cyber attacks by security vulnerabilities are exposed. Therefore, there is a need to identify the characteristics of the system, and develop appropriate countermeasures in order to prevent cyber attacks and prejudices incidents. This paper examines the vulnerabilities of Intelligent Transport Systems and proposes the improvement of security vulnerabilities.