• Title/Summary/Keyword: Security incident

Search Result 189, Processing Time 0.022 seconds

Analysis of Cyber Incident Artifact Data Enrichment Mechanism for SIEM (SIEM 기반 사이버 침해사고 대응을 위한 데이터 보완 메커니즘 비교 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • As various services are linked to IoT(Internet of Things) and portable communication terminals, cyber attacks that exploit security vulnerabilities of the devices are rapidly increasing. In particular, cyber attacks targeting heterogeneous devices in large-scale network environments through advanced persistent threat (APT) attacks are on the rise. Therefore, in order to improve the effectiveness of the response system in the event of a breach, it is necessary to apply a data enrichment mechanism for the collected artifact data to improve threat analysis and detection performance. Therefore, in this study, by analyzing the data supplementation common elements performed in the existing incident management framework for the artifacts collected for the analysis of intrusion accidents, characteristic elements applicable to the actual system were derived, and based on this, an improved accident analysis framework The prototype structure was presented and the suitability of the derived data supplementary extension elements was verified. Through this, it is expected to improve the detection performance when analyzing cyber incidents targeting artifacts collected from heterogeneous devices.

The Correspondence Competence of Information Accident by Firms Experienced in Confidential Information Leak (기밀정보 유출 경험을 가진 기업들의 정보사고 대응역량 강화에 관한 연구)

  • Jung, Byoungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.2
    • /
    • pp.73-86
    • /
    • 2016
  • The purpose of this study is to examine a security investment for firms experienced in confidential information leak. Information security is an apparatus for protection of secret information. The competence of information security is a competitiveness to avoid information leakage in changing business environment. The type of information security is divided into administrative security, technical security and physical security. It is necessary to improve the incident correspondence competence through information security investment of the three types. Therefore, the investment of information security is to enhance information-asset protection of firms. To reinforce accident response competence, an organization discussed an establishment, security technology development, expand investment and legal system of the security system. I have studied empirically targeting the only information leak of firms. This data is a technical security competence and technology leakage situation of firms happened in 2010. During recovery of the DDos virus damage on countries, company and individual, the collected data signify a reality of information security. The data also identify a security competence of firms worrying information security management. According to the study, the continuous investment of information security has a high competence of accident correspondence. In addition, the most of security accidents showed a copy and stealing of paper and computer files. Firm on appropriate security investment is an accident correspondence competence higher than no security investment regardless of a large, small and medium-sized, and venture firm. Furthermore, the rational security investment should choose the three security type consideration for firm size.

Design and Implementation of Patch Management System for Improving System Security (시스템 보안성 향상을 위한 패치관리시스템 설계 및 구현)

  • 서정택;윤주범;최대식;박응기;박춘식
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.43-51
    • /
    • 2004
  • Operating systems and application programs have security vulnerabilities derived from the software development process. Recently, incident cases related with the abuses of these vulnerabilities are increasing and the damages caused by them are becoming very important security issues all over the nations. Patch management is one of the most important processes to fix vulnerabilities of softwares and to ensure a security of systems. Since an institute or a company has distributed hierarchical and heterogeneous systems, it is not easy to update patches promptly. In this paper, we propose patch management framework to safely distribute and install the patches on Windows, Linux, and Solaris client systems. Besides, we considered extensibility and hierarchical structure for our patch management framework to support large scaled network environment.

  • PDF

Developing Information Security Management Model for SMEs: An Empirical Study (중소기업 정보보호관리 모델의 개발: 실증 연구)

  • Lee, Jung-Woo;Park, Jun-Gi;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.15 no.1
    • /
    • pp.115-133
    • /
    • 2005
  • This study is to develop an information security management model(ISMM) for small and medium sized enterprises(SMEs). Based on extensive literature review, a five-pillar twelve-component reference ISMM is developed. The five pillars of SME's information security are: centralized decision making, ease of management, flexibility, agility and expandability. Twelve components are: scope & organization, security policy, resource assessment, risk assessment, implementation planning, control development, awareness training, monitoring, change management, auditing, maintenance and accident management. Subsequent survey designed and administered to expose experts' perception on the importance of these twelve components revealed that five out of tweleve components require relatively immediate attention than others, especially in SME's context. These five components are: scope and organization, resource assessment, auditing, change management, and incident management. Other seven components are policy, risk assessment, implementation planning, control development, awareness training, monitoring, and maintenance. It seems that resource limitation of SMEs directs their attention to ISMM activities that may not require a lot of resources. On the basis of these findings, a three-phase approach is developed and proposed here as an SME ISMM. Three phases are (1) foundation and promotion, (2) management and expansion, and (3) maturity. Implications of the model are discussed and suggestions are made for further research.

A Study on the improvement for response manual of chemical terror incident using the service design analysis (서비스디자인 접근법을 활용한 화학테러현장 대응매뉴얼의 개선방안 연구)

  • Ham, Seung Hee;Park, Namkwun;Lee, Jun
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.325-333
    • /
    • 2018
  • Purpose: There have been terrorist attacks all over the world, causing massive damage. In Korea, there are few cases of terrorist damage, but the lack of the on-site response experience lead to constraints on the opportunity to verify capabilities against terrorism. Therefore, in this study, the chemical terrorism on-site countermeasures is considered as a concept of service, it was possible to draw up improvement alternatives for each element by reviewing at once the interactions between the concerned organizations and citizens in the field and the utilization of the equipment and facilities in the invisible area. Results: It had been evaluated the service process of the counterpart manager from the viewpoint of the victim citizen, who is the beneficiary of the final security service. It has found out the waiting point(W.P) between the victim's civilian incident management, and the element of failure(F.P). Conclusion: In this way, comparing chemical terror incident response manuals belonged to each related organization by fusion of service design approach and scenario technique, It is expected that it will be able to find out more specific problems and to find improvement alternatives.

Development of CC Based Security Risk Analysis Tool (CC(Common Criteria) 기반 보안위험분석 도구 개발)

  • Kim In-Jung;Chung Yoon-Jung;Koh Jae-Young;Won Dong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.31-38
    • /
    • 2006
  • The importance of the Security Risk Analysis has emerged as security breaches and information leaks has occurred in the companies and organization: threats toward information system and its vulnerabilities has grown up as the dependence on the information-communication systems goes higher as a result of technological advances in IT industry, A Risk Analysis Tool helps to mitigate overall risk of an organization by analysing and evaluating critical information systems and providing security measures against threats to systems and its vulnerabilities as a means to identify the inherent dangers and prevent security intrusion incident, This paper defines risk analysis process by introducing Common Criteria Scheme and suggest a risk analysis tool that can be easily implemented by an information security manager.

  • PDF

Design and Implementation of File Access Control Module Based on Multi-Operating System (멀티 운영체제 기반의 파일 접근 제어 모듈 설계 및 구현)

  • Soh, Woo-Young
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.123-131
    • /
    • 2007
  • Recently, various threat and security incident are occurred for unspecified individuals, and this problem increases as the rapid of information sharing through Internet. The using of Information Security System such as IDS, Firewall, VPN etc. makes this problem minimal. However, professional knowledge or skill is needed in that case, normal user can't operate the Information Security System. This paper designs and implements File Access Control Module(FACM) to use easily for normal user against malicious threats and attacks. The FACM can exclude from malicious threats and attacks based on operation system rather than detection of threats and attacks. The FACM is working not only Windows System but also Linux System, and the FACM has effect on access control, integrity and non-repudiation for a file with an access control over files on the each OS that are used by multi-user.

  • PDF

Implementation of Autonomous Intrusion Analysis Agent(AIAA) and Tool for using Intruder Retrace (인터넷 해킹피해 시스템자동분석에이젼트(AIAA) 및 침입자 역추적 지원도구 구현)

  • Im, Chae-Ho;Won, Yu-Heon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3410-3419
    • /
    • 1999
  • Autonomous Intrusion Analysis Agent(AIAA) is Incident Response Team staff's tool that scans, analyses, reports and alerts the traces of intrusion based on system logs and intruder's backdoors inside compromised system by IR staff after security incident is reported to the IR team. AIAA is intelligent to recognize to check out who is intruder from all the user accounts and to report the suspected candidates to the master control system in IR team. IR staff who controls AIAA with master system can pick up an intruder from the candidates reported by AIAA agent and review all related summary reports and details including source host's mane, finger information, all illegal behavior and so on. AIAA is moved to compromised system by the staff to investigate the signature of intrusion along the trace of victim hosts and it is also operated in secret mode to detect the further intrusion. AIAA is alive in all victim systems until the incident is closed and IR staff can control AIAA operation and dialogue with AIAA agent in Web interface.

  • PDF

Construction and Operation of Security Incident Response in Domestic Computer Networks (국내 전산망 침해사고 대응체계 구축과 운영)

  • Lee, Hyun-Woo;Jung, Yoon-Jong;Shin, Hoon;Im, Hwi-Sung;Choi, Woon-Ho;Im, Chae-Ho
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.85-95
    • /
    • 1996
  • 인터넷을 중심으로 글로벌네트워크화 되고 있는 국내 전산망에서는 국내외 해킹 등에 의한 전산망 보안 침해사고가 매우 우려될 뿐 아니라 빈번히 발생되고 있다. 하지만 이에 대한 대책과 기술이 제대로 이루어지지 않고 있으며, 해외의 전문 침해사고대응에 비해 매우 열악한 상태에 있으므로 침해사고의 예방, 사고시 분석 및 확산 방지 및 방지책 개발과 이의 상호 정보 공유 방법을 제시하고 운영하고자 한다.

  • PDF

Legislation, Co-ordination Centre and Database System to Respond Security Incidents at Sea

  • Deyi, Gao
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.08a
    • /
    • pp.155-159
    • /
    • 2004
  • The International Ship and Port Facility Security (ISPS) Code has come into force on July 7$^{th}$ 2004. It would therefore be prudent that all parties' concerned put in place, methodically, systematically and as soon as possible, all the necessary infrastructure needed to give effect to all the decisions of the Conference. But the ISPS Code doesn't have the details during implementation. For example, how to legislate, administrate\ulcorner How are the data relating to security incident saved\ulcorner So, the author will lay emphasis to expatiate on three aspects in this thesis on the basis of the fact of anti-terrorism at sea.

  • PDF