• Title/Summary/Keyword: Security incident

Search Result 189, Processing Time 0.022 seconds

A study on the Safety Monitoring Theory and Application for the Human Security (인간보호를 위한 안전모니터링 이론과 적용에 관한 연구)

  • Lee, Tae Shik;Seo, Jung Pyo;Seok, Geum Cheol;Cho, Won Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.29-36
    • /
    • 2012
  • This paper focused on the new theory and algorithm improving the citizen's safety which they experience to change from the developing country to the developed country, and analyzed the gained and applicate results, and show the theories and application's evidence for the incident prevention of citizen's life and house. The Safety Monitoring Theory for human security, show the six theories for which they are analyzed and reduced the accident's death, as is the priority of the disaster prevention activity, its decision, continuous minimization of the accident's death number, the environment security, the personal security, the community security. This study is applied to educate and exercise the disaster prevention and safety management's program which applied the seven step's model of the safety monitoring, show on continuously improvement effects through the case study of the personal's and team's monitoring during five years.

Correlation Analysis in Information Security Checklist Based on Knowledge Network (지식 네트워크에 근거한 정보보호 점검기준 관계분석)

  • Jin, Chang Young;Kim, Ae Chan;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.2
    • /
    • pp.109-124
    • /
    • 2014
  • As the emerged importance and awareness for information security, It is being implemented by each industrial sector to protect information assets. In this paper, we analyze the information security checklists or security ratings criteria to derive similarity and difference in context which used to knowledge network analysis method. The analyzed results of all checklists (ISMS, PIMS, 'FSS', 'FISS', 'G') are as follows : First, It is common factors that the protection of information systems and information assets, incident response, operations management. Second, It deals with relatively important factors that IT management, the adequacy of audit activities in the financial IT sector including common factors. Third, the criteria of ISMS contains the majority of the contents among PIMS, 'FSS', 'FISS'and 'G'.

Awareness of Personal Information Protection for Service Users among Small and Mid-Sized Security Companies (중.소민간경비업체의 서비스 이용자 개인정보보호에 관한 인식)

  • Kim, Il Gon;Choi, Kee Nam
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.3-12
    • /
    • 2014
  • The government was fully aware of the gravity of a recent massive leak of personal information of credit card users. Meanwhile, the government just took a light disciplinary action by imposing a fine, but it showed its intention to strengthen the regulations by taking the severest disciplinary action. The tightened regulations against personal information leak will be applied to the private security industry without exception to protect individual people's property and lives if such an incident occurs in that industry that deals with a wide variety of personal information such as CCTV data or privacy information all the time. The purpose of this study was to examine the state of the protection and management of personal information for service users among private security firms in an effort to suggest some reform measures. The findings of the study were as follows: First, administrators or managers who are involved with personal information protection should make a full-fledged effort to gather information. Second, counseling or related programs should be provided for small and mid-sized security firms to guarantee thorough personal information protection. Third, Korea Security Association should improve the educational system related to personal information protection to resolve problems with this education currently provided for managers and employees of these companies.

A Design of Information Security Education training Databank System for Preventing Computer Security incident (침해사고 예방을 위한 정보보안 교육훈련 문제은행 시스템)

  • Mo, Eun-Su;Lee, Jae-Pil;Lee, Jae-Gwang;Lee, Jun-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.277-280
    • /
    • 2015
  • Smishing, Phishing personal privacy caused by Incident accidents such as Phishing information security has become a hot topic. Such incidents have privacy in personal information management occurs due to a lack of user awareness. This paper is based on the existing structure of the XML Tag question bank used a different Key-Value Structure-based JSON. JSON is an advantage that does not depend on the language in the text-based interchange format. The proposed system is divided into information security sector High, Middle and Low grade. and Provides service to the user through the free space and the smart device and the PC to the constraints of time. The use of open source Apache Load Balancing technology for reliable service. It also handles the user's web page without any training sessions Require server verification result of the training(training server). The result is sent to the training server using jQuery Ajax. and The resulting data are stored in the database based on the user ID. Also to be used as a training statistical indicators. In this paper, we design a level training system to enhance the user's information security awareness.

  • PDF

A Study on the Revision of the Notification Form and Procedures of Marine Incident (준해양사고 통보서식 및 절차 개정에 관한 연구)

  • Kang, Suk-Young
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.1
    • /
    • pp.39-46
    • /
    • 2020
  • Accident prevention is more important than follow-up, which is based on Heinrich's law. The marine incident system is a very meaningful system that can prevent similar accidents, and was introduced in 2010 in Korea in accordance with the enforcement of the Code for the Investigation of Marine Casualties and Incidents (CI Code). Based on the CI Code, ship owners or ship operators are required to notify the Central Chief Inspector using the designated notification form in the event of a marine incident, but the number of voluntary notifications is still small. In this regard, this study intends to provide a direction for improvement by conducting an in-depth analysis focusing on the lack of notification procedures and forms of the marine incident system. To this end, we analyzed related regulations, cases of excellent overseas shipping countries such as the United Kingdom and Singapore, cases of similar domestic transportation systems such as aviation and railways, and marine incident notification procedures and forms of leading shipping companies. Major improvements in the notification process include the transition of the marine incidents to voluntary reporting, the expansion of the reporting subjects, and the identification of the security of the informer's identity. The main contents of the notification form revision include the use of the term "reporting" instead of "notification," the content of the identity guarantee in the notification form, and the increase in statistical value through the expansion of optional entries.

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

A Stable Evidence Collection Procedure of a Volatile Data in Research (휘발성 증거자료의 무결한 증거확보 절차에 관한 연구)

  • Kim, Yong-Ho;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.13-19
    • /
    • 2006
  • I would like to explain a method how to get important data from a volatile data securely, when we are not available to use network in computer system by incident. The main idea is that the first investigator who collects a volatile data by applying scripts built in USB media should be in crime scene at the time. In according to volatile data, he generates hash value, and gets witness signature. After that, he analyses the volatile data with authentication in forensics system.

  • PDF

Abnormal Crowd Behavior Detection Using Heuristic Search and Motion Awareness

  • Usman, Imran;Albesher, Abdulaziz A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.131-139
    • /
    • 2021
  • In current time, anomaly detection is the primary concern of the administrative authorities. Suspicious activity identification is shifting from a human operator to a machine-assisted monitoring in order to assist the human operator and react to an unexpected incident quickly. These automatic surveillance systems face many challenges due to the intrinsic complex characteristics of video sequences and foreground human motion patterns. In this paper, we propose a novel approach to detect anomalous human activity using a hybrid approach of statistical model and Genetic Programming. The feature-set of local motion patterns is generated by a statistical model from the video data in an unsupervised way. This features set is inserted to an enhanced Genetic Programming based classifier to classify normal and abnormal patterns. The experiments are performed using publicly available benchmark datasets under different real-life scenarios. Results show that the proposed methodology is capable to detect and locate the anomalous activity in the real time. The accuracy of the proposed scheme exceeds those of the existing state of the art in term of anomalous activity detection.

A research on cyber kill chain and TTP by APT attack case study (APT 공격 사례 분석을 통한 사이버 킬체인과 TTP에 대한 연구)

  • Yoon, Youngin;Kim, Jonghwa;Lee, Jaeyeon;Yu, Sukdea;Lee, Sangjin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.91-101
    • /
    • 2020
  • We analyzed APT attack cases that occurred overseas in the past using a cyber kill chain model and a TTP model. As a result of the analysis, we found that the cyber kill chain model is effective in figuring out the overall outline, but is not suitable for establishing a specific defense strategy, however, TTP model is suitable to have a practical defense system. Based on these analysis results, it is suggested that defense technology development which is based on TTP model to build defense-in-depth system for preparing cyber attacks.

Strategic Approaches and the Role of Naval Forces to Counter Increasing Maritime Threats (해양안보 위협 확산에 따른 한국 해군의 역할 확대방안)

  • Park, Chang-Kwoun
    • Strategy21
    • /
    • s.31
    • /
    • pp.220-250
    • /
    • 2013
  • South Korean national security strategy should be developed to effectively handle and counter increasing maritime threats and challenges. There are three major maritime threats South Korea faces today; maritime disputes on the EEZ boundary and Dokdo islet issues, North Korean threats, and international maritime security. Maritime disputes in the region are getting intensified and turned into a military confrontation after 2010. Now regional countries confront each other with military and police forces and use economic leverage to coerce the others. They are very eager to create advantageous de facto situations to legitimize their territorial claims. North Korean threat is also increasing in the sea as we witnessed in the Cheonan incident and Yeonpyoung shelling in 2010. North Korea resorts to local provocations and nuclear threats to coerce South Korea in which it may enjoy asymmetric advantages. The NLL area of the west sea would be a main hot spot that North Korea may continue to make a local provocation. Also, South Korean national economy is heavily dependent upon foreign trade and national strategic resources such as oil are all imported. Without an assurance on the safety of sea routes, these economic activities cannot be maintained and expanded. This paper argues that South Korea should make national maritime strategy and enhance the strength of naval forces. As a middle power, its national security strategy needs to consider all the threats and challenges not only from North Korea but also to maritime security. This is not a matter of choice but a mandate for national survival and prosperity. This paper discusses the importance of maritime security, changing characteristics of maritime threats and challenges, regional maritime disputes and its threat to South Korea's security, and South Korea's future security strategy and ways to enhance the role of naval forces. Our national maritime strategy needs to show middle and long term policy directions on how we will protect our maritime interests. Especially, it is important to build proper naval might to carry out all the roles and missions required to the military.

  • PDF