• Title/Summary/Keyword: Threat Assessment

Search Result 187, Processing Time 0.023 seconds

Study on Strengthening the Maritime Sector Cybersecurity (해상 사이버보안 강화방안 연구)

  • Yoo, Yun-Ja;Park, Han-Seon;Park, Hye-Ri
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.238-239
    • /
    • 2019
  • Cyber attacks can be caused by all equipment that perform communication functions, and the link between ship and land due to the development of communication technology means that the ship sector as well as the land sector can be easily exposed to cyber threat vulnerability. In this paper, we analyze cyber threat trend changes to identify cyber security vulnerabilities in the maritime sector and propose measures to enhance cyber security through other industry case studies.

  • PDF

STRIDE-based threat modeling and DREAD evaluation for the distributed control system in the oil refinery

  • Kyoung Ho Kim;Kyounggon Kim;Huy Kang Kim
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.991-1003
    • /
    • 2022
  • Industrial control systems (ICSs) used to be operated in closed networks, that is, separated physically from the Internet and corporate networks, and independent protocols were used for each manufacturer. Thus, their operation was relatively safe from cyberattacks. However, with advances in recent technologies, such as big data and internet of things, companies have been trying to use data generated from the ICS environment to improve production yield and minimize process downtime. Thus, ICSs are being connected to the internet or corporate networks. These changes have increased the frequency of attacks on ICSs. Despite this increased cybersecurity risk, research on ICS security remains insufficient. In this paper, we analyze threats in detail using STRIDE threat analysis modeling and DREAD evaluation for distributed control systems, a type of ICSs, based on our work experience as cybersecurity specialists at a refinery. Furthermore, we verify the validity of threats identified using STRIDE through case studies of major ICS cybersecurity incidents: Stuxnet, BlackEnergy 3, and Triton. Finally, we present countermeasures and strategies to improve risk assessment of identified threats.

Improvement of the EIA for Land Reclamation Projects in the Coastal Areas of Korea (해양매립사업 환경영향평가의 개선방안)

  • Jang, Ju-Hyoung;Eom, Ki-Hyuk;Kwon, Kee-Young;Hong, Sok-Jin;Park, Jae-Hyeon;Kim, Gui-Young
    • Journal of Environmental Science International
    • /
    • v.16 no.7
    • /
    • pp.847-853
    • /
    • 2007
  • In Korean coastal areas, land reclamations are main development projects that should be based on environmental impact assessment(EIA), because those human interventions can change coastlines, damage tidal flats, and pollute adjacent areas to threat seafood safety and devaluate overall ecosystem service value. Existing procedures of the EIA for land reclamation projects were diagnosed and evaluated to enhance them. Problems were identified in the designation of survey areas, the consistency in survey sites and periods, the standardization of survey methods and reports, the confidence of survey results and the verification of predictions. Lack of integration was noticeable and could be improved by synthesizing different assessments from topography geography, marine physics, marine chemistry and marine biology. We suggest that successful precautionary marine environment management requires readjusting the cost of EIA, recruiting experts in marine environment, constructing database and establishing specialized assessment system.

Structural robustness of RC frame buildings under threat-independent damage scenarios

  • Ventura, Antonio;De Biagi, Valerio;Chiaia, Bernardino
    • Structural Engineering and Mechanics
    • /
    • v.65 no.6
    • /
    • pp.689-698
    • /
    • 2018
  • This study focuses on a novel procedure for the robustness assessment of reinforced concrete (RC) framed structures under threat-independent damage scenarios. The procedure is derived from coupled dynamic and non-linear static analyses. Two robustness indicators are defined and the method is applied to two RC frame buildings. The first building was designed for gravity load and earthquake resistance in accordance with Eurocode 8. The second was designed according to the tie force (TF) method, one of the design quantitative procedures for enhancing resistance to progressive collapse. In addition, in order to demonstrate the suitability and applicability of the TF method, the structural robustness and resistance to progressive collapse of the two designs is compared.

Cybersecurity Risk Assessment of a Diverse Protection System Using Attack Trees (공격 트리를 이용한 다양성보호계통 사이버보안 위험 평가)

  • Jung Sungmin;Kim Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.25-38
    • /
    • 2023
  • Instrumentation and control systems measure and control various variables of nuclear facilities to operate nuclear power plants safely. A diverse protection system, a representative instrumentation and control system, generates a reactor trip and turbine trip signal by high pressure in a pressurizer and containment to satisfy the design requirements 10CFR50.62. Also, it generates an auxiliary feedwater actuation signal by low water levels in steam generators. Cybersecurity has become more critical as digital technology is gradually applied to solve problems such as performance degradation due to aging of analog equipment, increased maintenance costs, and product discontinuation. This paper analyzed possible cybersecurity threat scenarios in the diverse protection system using attack trees. Based on the analyzed cybersecurity threat scenario, we calculated the probability of attack occurrence and confirmed the cybersecurity risk in connection with the asset value.

Assessment of Development and Opertation for Maritime Leisure in Mokpo Port using SWOT&AHP (목포항 요트산업 개발과 운영 주체 선정)

  • Jang, Woon-Jae;Keum, Jong-Soo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.29 no.1
    • /
    • pp.451-456
    • /
    • 2005
  • This paper proposes an evaluation model to assessment of development and operation for maritime leisure in Mokpo Port.. The proposed model is combination of SWOT(Strength, Weakness, Opportunity, Threat) and AHP(Analytic Hierarchy Process) to evaluate development and operation for maritime leisure. The evaluation hierarchical structure is structured by ISM(Interpretive structural modeling) and composed of five level. At the third level, It combine SWOT into the assessment system. Strength and Weakness are internal factors. Opportunities and threats are external factors. There are economic and maritime leisure development in the model. There are three development and operation investment as Third-Sector, company, local organization. According to the results, the participants perceive prefer to strength and opportunity and found that the priority for the development and operation for maritime leisure of Third-Sector.

  • PDF

Assessment of Development and Operation for Maritime Leisure In Mokpo Port using SWOT&AHP (SWOT&AHP을 이용한 목포항 요트산업 개발과 운영 주체 평가)

  • Jang Woon-Jae;Park Sung-Hyun;Keum Jong-Soo
    • Journal of Navigation and Port Research
    • /
    • v.29 no.8 s.104
    • /
    • pp.715-721
    • /
    • 2005
  • This paper proposes an evaluation model to assessment of development and operation for maritime leisure in Mokpo Port.. The proposed model is combination of SWOT(Strength, Weakness, Opportunity, Threat} and AHP(Analytic Hierarchy Process) to evaluate development and operation for maritime leisure. The evaluation hierarchical structure is structured by ISM(interpretive structural modeling} and composed of five level. At the third level, It combine SWOT into the assessment system Strength and Weakness are internal factors. Opportunities and threats are external factors. There are economic and maritime leisure development in the model. There are three development and operation investment as Third-Sector, company, local organization. According to the results, the participants perceive prefer to strength and opportunity and found that the priority for the development and operation for maritime leisure of Third-Sector.

Proposed RASS Security Assessment Model to Improve Enterprise Security (기업 보안 향상을 위한 RASS 보안 평가 모델 제안)

  • Kim, Ju-won;Kim, Jong-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.635-637
    • /
    • 2021
  • Cybersecurity assessment is the process of assessing the risk level of a system through threat and vulnerability analysis to take appropriate security measures. Accurate security evaluation models are needed to prepare for the recent increase in cyberattacks and the ever-developing intelligent security threats. Therefore, we present a risk assessment model through a matrix-based security assessment model analysis that scores by assigning weights across security equipment, intervals, and vulnerabilities. The factors necessary for cybersecurity evaluation can be simplified and evaluated according to the corporate environment. It is expected that the evaluation will be more appropriate for the enterprise environment through evaluation by security equipment, which will help the cyber security evaluation research in the future.

  • PDF

East Asian Security in the Multipolar World Order: A Review on the Security Threat Assessment of the Korean Peninsula Amid the Restructuring of International Order (다극체제와 동아시아 안보: 국제질서 재편에 따른 한반도 안보 위협 논의의 재고찰)

  • Lee, Sungwon
    • Analyses & Alternatives
    • /
    • v.6 no.2
    • /
    • pp.37-78
    • /
    • 2022
  • The U.S.-led international order, sustained by overwhelming national power since the end of the Cold War, is gradually being restructured from a unipolar international system to a bipolar international system or a multipolar international system, coupled with the weakening of U.S. global leadership and the rise of regional powers. Geopolitically, discussions have been constantly raised about the security instability that the reshaping of the international order will bring about, given that East Asia is a region where the national interests of the United States and regional powers sharply overlap and conflict. This study aims to critically analyze whether security discussions in Korea are based on appropriate crisis assessment and evaluation. This paper points out that the security crisis theory emerging in Korea tends to arise due to threat exaggeration and emphasizes the need for objective evaluation and conceptualization of the nature and the level of threats that the restructured international order can pose to regional security. Based on the analysis of changes in conflict patterns (frequency and intensity), occurring in East Asia during the periods divided into a bipolar system (1950-1990), a unipolar system (1991-2008), and a multipolar system (2009-current), this study shows that East Asia has not been as vulnerable to power politics as other regions. This investigation emphasizes that the complexity of Korea's diplomatic and security burden, which are aggravated by the reorganization of the international order, do not necessarily have to be interpreted as a grave security threat. This is because escalating unnecessary security issues could reduce the diplomatic strategic space of the Republic of Korea.

Risk Assessment of Tall Buildings in Korea by comparative study of Modified RVS and IRVS system (수정 RVS와 IRVS시스템의 비교분석을 통한 국내 고층건물 테러위험도 평가)

  • Yu, Young-Su;Yoon, Sung-Won;Ju, Young-Kyu
    • Journal of Korean Association for Spatial Structures
    • /
    • v.12 no.4
    • /
    • pp.91-98
    • /
    • 2012
  • As the occurrence rate of terror and hazard is increasing throughout the world, GSA, DoD, and FEMA are proceeding a study about mitigating the damage of terror. Korea is no more a safe place from the terrorist's threat, so we need to make measures against them. In this study we developed modified RVS System by revising some items to adjust the system to the domestic condition and conducted a risk assessment on several tall buildings in Korea. By using IRVS system which is developed by DHS, we also carried out the risk assessment. Comparing the results between RVS with IRVS, we performed terror risk evaluation of tall buildings. Through risk assessment of several tall buildings, we analyzed key factors of each scenarios and suggested the mean value of each items, so we would like to help the counter-terrorism in the design phase.