• Title/Summary/Keyword: Supply Chain Attack

Search Result 15, Processing Time 0.02 seconds

A study on DDoS Attack, Detecting and Defence in ubiquitous system (유비쿼터스환경에서의 DDoS의 공격과 탐지, 방어시스템에 관한 연구)

  • Jung, Chang-Duk;Cha, Joo-Won;Hwang, Sun-Il
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.544-548
    • /
    • 2009
  • The underlying success of logistics depends on the flow of data and information for effective management. Over the last 30 years, we have seen the power of microprocessors double about every 18months. This continuing trend means that computers will become considerably smaller, cheaper, and more abundant; indeed, they are becoming ubiquitous and are even finding their way into everyday objects, resulting in the creation of smart things. In the long term, ubiquitous technologies will take on great economic significance. Industrial products will become smart because of their integrated information processing capacity, or take on an electronic identity that can be queried remotely, or be equipped with sensors for detecting their environment, enabling the development of innovative products and totally new services. The global marketplace runs on logistics, security, speed, agility and flexibility..In this paper we report that pairing these traditional logistics functions with RFID technology can be a huge value-driver for companies. This winning combination yields increased logistics management effectiveness and more efficient visibility into the supply chain management.

  • PDF

A Study on the Trade-Economic Effects and Utilization of AEO Mutual Recognition Agreements

  • LEE, Chul-Hun;HUH, Moo-Yul
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.2
    • /
    • pp.25-31
    • /
    • 2020
  • Purpose: The AEO (Authorized Economic Operator) program, created in 2001 in the United States due to 9.11 terrorist's attack, fundamentally changed the trade environment. Korea, which introduced AEO program in 2009, has become one of the world's top countries in the program by ranking 6th in the number of AEO certified companies and the world's No. 1 in MRA (Mutual Recognition Agreement) conclusions. In this paper, we examined what trade-economic and non-economic effects the AEO program and its MRA have in Korea. Research design, data and methodology: In this study we developed a model to verify the impact between utilization of AEO and trade-economic effects of the AEO and its MRA. After analyzing the validity and reliability of the model through Structural Equation Model we conducted a survey to request AEO companies to respond their experience on the effects of AEO program and MRA. As a result, 196 responses were received from 176 AEO companies and utilized in the analysis. Results: With regard to economic effects, the AEO program and the MRA have not been directly linked to financial performance, such as increased sales, increased export and import volumes, reduced management costs, and increased operating profit margins. However, it was analyzed that the positive effects of supply chain management were evident, such as strengthening self-security, monitoring and evaluating risks regularly, strengthening cooperation with trading companies, enhancing cargo tracking capabilities, and reducing the time required for export and import. Conclusions: When it comes to the trade-economic effects of AEO program and its MRA, AEO companies did not satisfy with direct effects, such as increased sales and volume of imports and exports, reduced logistics costs. However, non-economic effects, such as reduced time in customs clearance, freight tracking capability, enhanced security in supply chain are still appears to be big for them. In a rapidly changing trade environment the AEO and MRA are still useful. Therefore the government needs to encourage non-AEO companies to join the AEO program, expand MRA conclusion with AEO adopted countries especially developing ones and help AEO companies make good use of AEO and MRA.

A Study on the Implications and Trends of Logistics Security Assurance Programs for International Trade Facilitation (국제물류보안 인증제도 동향 및 시사점에 관한 연구)

  • Ko, Hyun-Jeung
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.2
    • /
    • pp.333-354
    • /
    • 2011
  • After the terrorist attack of 9/11 on the USA, the security concern to global trade has been raised. In particular, the USA has actively promoted a series of initiatives and rules such as CSI, 24 hour rule, C-TPAT, and so on in the area of logistics activities, which aimed to better protect the country against the potential terrorist threats. While implementing such schemes called as a multi-layed logistics security strategy, a large number of countries trading with USA are facing with the issues of additional time and costs for inspecting cargos in their logistics facilities. As a result, most countries all over the world have sought a way to minimize the impacts from such strategy. The Korea also is preparing the several security programs operated by various ministries, which are aiming to not only improve the efficiency of trade flows but also to ensure supply chain security. However, many companies are expressing the inefficiency of operating such programs. Thus, this paper analyzed several global supply chain security programs currently adopted by international organizations(ISO, WCO, and IMO) and major countries(USA, EU, and Singapore) and suggested a guideline for developing the national logistics security system.

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

A Study on Material Transportation Capability Analysis Method in NK using Scenario-based Simulation (시나리오 기반 시뮬레이션을 활용한 북한지역 반격 시 물자수송 능력 분석방법 연구)

  • Choi, Byung Kwon;Jeong, Suk Jae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.279-288
    • /
    • 2017
  • The Material Transportation Capability Analysis Method in North Korea includes adversary's activities such as destruction of bridge which is one kind of choke points in the road network and surprise attack against resupply march unit. Also, the amount of damage on choke points in the road network and repair time depending on repair unit commitment must be reflected. In this study, a scenario encompassing plausible resupply transportation circumstances while counterattacking into NK will be established. Then, based on such scenario, a simulation model will be established and the result of simulation will be compared to the results of numeric example which has been used in the ROK Army. We demonstrate, through a certain Corps operation area, that the Scenario-based Simulation Model results predict the performance of resupply operation very well. Therefore, it makes sustainment planners and commanders do activities which is suitable for battlefield and should be used in the real situation. It is also a stochastic model.