• Title/Summary/Keyword: Threat Evaluation

Search Result 226, Processing Time 0.022 seconds

A Study on Exploring Factors Influencing Military Security Level (Based on the Theory of Planned Behavior, Deterrence and Protection Motivation) (군(軍) 보안수준에 미치는 영향요인 탐색에 관한 연구 (계획 행동이론, 억제이론, 보호 동기 이론을 중심으로))

  • Jong-Hyoun Kim;Sang-Jun Ahn
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, as the environment of the 4th industrial revolution has arrived, the opening, sharing and convergence of data are actively being achieved in any organization. However, the opening and sharing of data inevitably leads to security vulnerability and there is ambivalence that is a threat that can affect the existence of an organization operated in the 4th industrial revolution environment. Especially security issues in the organization of the military can be a threat to the state, not the military itself, so it is always necessary to maintain a high level of security discipline. In this paper, 14 variables were selected through structural equation model applying theory of planned behavior, deterrence and protection motivation to find out the security level development measures by extracting factors that can affect security level. As a result, the theory of planned behavior that the security knowledge embodied through the usual security regulation education and evaluation affects the behavior was adopted, and the theory of deterrence and protection motivation showed the significance of the rejection level. In addition, it was confirmed that the variables that have the greatest impact on the military security level through the measured values of the three-year security audit were commanders and mental security. In conclusion, in order to improve the security level, it is suggested that security education, definite reward and punishment, and security system upgrading should be firmly established and mental security posture should be secured.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

A Study on Proposing the Harbor and Fishery Design Criteria for the Channel Width based on External Factors (외력에 따른 항로 폭 설정을 위한 항만 및 어항 설계기준에 관한 연구)

  • Dae-Han Lee;Yu-Min Kwon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.2
    • /
    • pp.184-193
    • /
    • 2024
  • Harbor and Fishery Design Criteria defines that ship routing should be designed to ensure safe ship navigation and easy maneuvering. The design of the channel width is one of the critical conditions in routeing of ships. For the criteria of the channel width, qualitative evaluation criteria are used in South Korea, whereas quantitative evaluation criteria are used in other countries. Environmental factors, such as winds, tidal currents, and waves directly or indirectly affect ship resistance when sailing. Depending on their strength the environmental factors may pose a threat to the safe navigation of ships. Thus, vessel traffic control was regulated in South Korea according to the Beaufort scale. In order to design the channel width to reflect the environmental factors closely related to the safe navigation of ships, quantitative evaluation criteria reflected with environmental factors were presented in other countries, however, these external factors were not considered in South Korea. This study analyzed the relationship between the channel width actually used by ships and environmental factors by using the trajectories of ships entering and leaving Mokpo Port. This study also suggested the required channel width according to tidal currents and compared it with the channel width design criteria of other countries.

An Efficient Estimation of Place Brand Image Power Based on Text Mining Technology (텍스트마이닝 기반의 효율적인 장소 브랜드 이미지 강도 측정 방법)

  • Choi, Sukjae;Jeon, Jongshik;Subrata, Biswas;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.113-129
    • /
    • 2015
  • Location branding is a very important income making activity, by giving special meanings to a specific location while producing identity and communal value which are based around the understanding of a place's location branding concept methodology. Many other areas, such as marketing, architecture, and city construction, exert an influence creating an impressive brand image. A place brand which shows great recognition to both native people of S. Korea and foreigners creates significant economic effects. There has been research on creating a strategically and detailed place brand image, and the representative research has been carried out by Anholt who surveyed two million people from 50 different countries. However, the investigation, including survey research, required a great deal of effort from the workforce and required significant expense. As a result, there is a need to make more affordable, objective and effective research methods. The purpose of this paper is to find a way to measure the intensity of the image of the brand objective and at a low cost through text mining purposes. The proposed method extracts the keyword and the factors constructing the location brand image from the related web documents. In this way, we can measure the brand image intensity of the specific location. The performance of the proposed methodology was verified through comparison with Anholt's 50 city image consistency index ranking around the world. Four methods are applied to the test. First, RNADOM method artificially ranks the cities included in the experiment. HUMAN method firstly makes a questionnaire and selects 9 volunteers who are well acquainted with brand management and at the same time cities to evaluate. Then they are requested to rank the cities and compared with the Anholt's evaluation results. TM method applies the proposed method to evaluate the cities with all evaluation criteria. TM-LEARN, which is the extended method of TM, selects significant evaluation items from the items in every criterion. Then the method evaluates the cities with all selected evaluation criteria. RMSE is used to as a metric to compare the evaluation results. Experimental results suggested by this paper's methodology are as follows: Firstly, compared to the evaluation method that targets ordinary people, this method appeared to be more accurate. Secondly, compared to the traditional survey method, the time and the cost are much less because in this research we used automated means. Thirdly, this proposed methodology is very timely because it can be evaluated from time to time. Fourthly, compared to Anholt's method which evaluated only for an already specified city, this proposed methodology is applicable to any location. Finally, this proposed methodology has a relatively high objectivity because our research was conducted based on open source data. As a result, our city image evaluation text mining approach has found validity in terms of accuracy, cost-effectiveness, timeliness, scalability, and reliability. The proposed method provides managers with clear guidelines regarding brand management in public and private sectors. As public sectors such as local officers, the proposed method could be used to formulate strategies and enhance the image of their places in an efficient manner. Rather than conducting heavy questionnaires, the local officers could monitor the current place image very shortly a priori, than may make decisions to go over the formal place image test only if the evaluation results from the proposed method are not ordinary no matter what the results indicate opportunity or threat to the place. Moreover, with co-using the morphological analysis, extracting meaningful facets of place brand from text, sentiment analysis and more with the proposed method, marketing strategy planners or civil engineering professionals may obtain deeper and more abundant insights for better place rand images. In the future, a prototype system will be implemented to show the feasibility of the idea proposed in this paper.

A Design of Authentication Method for Secure Communication based on Wearable Device (웨어러블 디바이스 기반의 안전한 통신을 위한 인증기법 설계)

  • Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.

Evaluation and Verification of Barley Genotypes with Known Genes for Resistance to Barley yellow mosaic virus and Barley mild mosaic virus Under Field Conditions in South Korea

  • Kim, Hong-Sik;Baek, Seong-Bum;Kim, Dea-Wook;Hwang, Jong-Jin;Kim, Si-Ju
    • The Plant Pathology Journal
    • /
    • v.27 no.4
    • /
    • pp.324-332
    • /
    • 2011
  • Soil-borne barley yellow mosaic disease caused by Barley yellow mosaic virus (BaYMV) or Barley mild mosaic virus (BaMMV) gives a serious threat to the winter barley cultivated in the southern regions in Korea. It is important to develop resistant varieties for stable and high-yield production. The objectives of this study were to evaluate 22 genotypes of exotic barley germplasms carrying the resistance genes rym1 through rym12, with the exception of rym10, and to determine the genes that confer resistance to BaYMV or BaMMV in Korea. Using the traditional visual scoring of symptoms at 4 locations over 3 years, average disease rate values differed (P < 0.001) among the genotypes. ELISA test revealed the presence of both BaYMV and BaMMV in all of the field sites but Jinju and significantly different rates of infection among genotypes and years. Barley genotypes differed in how virus quantities and pathogen-induced symptoms were correlated, especially in response to BaYMV. Disease incidence was affected by the climatic conditions present during the early growing stage before overwintering. A Chinese landrace, 'Mokusekko 3', carrying rym1 and rym5 was comparatively resistant at all locations studied. The barley genotypes carrying either rym6 or rym9 were susceptible to the viral strains. The genotypes carrying rym5 were resistant in Jinju and Milyang but susceptible in Iksan and Naju. The resistance genes rym2 and rym3 were effective in local strains and would be potent contributors to disease resistance.

A study on the survey and reduction of indoor asbestos concentration (실내의 석면농도 실태 조사 및 저감에 관한 연구)

  • Seo, Byong-Won;Lee, Ju-Hwa;Park, Jihoon;Kang, Seon-Hong
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.28 no.3
    • /
    • pp.325-337
    • /
    • 2014
  • The research on the actual condition of indoor asbestos concentration in Korea has not been thoroughly accomplished up to now. In this research the ratio of asbestos-containing buildings and indoor asbestos concentration was studied. This investigation was conducted in 2012 and 2013 and buildings were categorized based on region, building type by use, existing space(ground or basement), and construction year, respectively. Also the indoor asbestos concentration change was monitored to evaluation the efficiencies of two types of asbestos-concentration abatement devices. As a result, the ratio of asbestos-containing buildings in Seoul was largely decreased. The ratio of asbestos-containing buildings was higher in hospitals and schools regionally and in ground buildings than in basement. The average indoor asbestos concentrations were 0.0011, 0.0008 piece/cc in 2012 and 2013 investigation, respectively. Those values were much lower than standards(0.01 piece/cc), therefore the threat of indoor asbestos concentration might be negligible. In asbestos-concentration abatement experiments, the circulation velocity of ventilator were changed 2-6.7 m/sec. With 6.7 m/sec of velocity of ventilator, the concentration of indoor asbestos was fluctuated and maximum value was 2.4 piece/cc. With 4.5 and 2 m/sec of velocities of ventilator, the maximum concentration of indoor asbestos was fluctuated and maximum value was 0.9 piece/cc. This indicated that the concentration of indoor asbestos was decreased partly due to the free drop of asbestos. From these results, the proper velocity of ventilator seems to be between 4.7 and 6.5m/sec under this circumstance and further research is required. These research results may be used to guideline of asbestos management policy.

A Study on Quantitative Method of Certificate for Information Security Education Course in the Private Sector (민간부문 정보보호 교육과정의 정량적 인증방법에 관한 연구)

  • Kim, Joo-hee;Cho, Sung-woo;Yoo, Dong-young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.551-558
    • /
    • 2016
  • The recent convergence in ICT industry has created new businesses as well as other opportunities. However, it entails new convergence threat accompanied by security risks. Even though there are security professionals who are dealing with the situation, there is not enough human resource in risk management. Moreover, the amount of research that studies quality of education and training security personnel is not sufficient. This paper explores the curriculum of information security education in the private sector and reasons out fifteen standard curriculums in four professional fields categorized by job classification. In addition, it provides a weighted score table based on the evaluation indicator for the effective security education certificates in the private sector.

Study on Usable Security of Facebook (Facebook의 Usable Security에 관한 연구)

  • Kim, Chung-han;Park, Min-su;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.285-296
    • /
    • 2016
  • Recently, as the widespread use of Facebook through a smartphone or tablet PC, it has increased the threat that contains the malicious code to post a social attacks and comments that use personal information that has been published of Facebook. To solve these problems, Facebook is, by providing a security function, but would like to address these threats, in setting the security function, the security function of the user's convenience is not considered a properly there is a problem that is not in use. Thus, in this paper, on the basis of the information obtained via the cogTool, on Facebook security features, the user experience by presenting a method that can be quantitatively measured by this, the user convenience It classifies about Facebook security features to decrease.

Fault Tolerant Cache for Soft Error (소프트에러 결함 허용 캐쉬)

  • Lee, Jong-Ho;Cho, Jun-Dong;Pyo, Jung-Yul;Park, Gi-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.1
    • /
    • pp.128-136
    • /
    • 2008
  • In this paper, we propose a new cache structure for effective error correction of soft error. We added check bit and SEEB(soft error evaluation block) to evaluate the status of cache line. The SEEB stores result of parity check into the two-bit shit register and set the check bit to '1' when parity check fails twice in the same cache line. In this case the line where parity check fails twice is treated as a vulnerable to soft error. When the data is filled into the cache, the new replacement algorithm is suggested that it can only use the valid block determined by SEEB. This structure prohibits the vulnerable line from being used and contributes to efficient use of cache by the reuse of line where parity check fails only once can be reused. We tried to minimize the side effect of the proposed cache and the experimental results, using SPEC2000 benchmark, showed 3% degradation in hit rate, 15% timing overhead because of parity logic and 2.7% area overhead. But it can be considered as trivial for SEEB because almost tolerant design inevitably adopt this parity method even if there are some overhead. And if only parity logic is used then it can have $5%{\sim}10%$ advantage than ECC logic. By using this proposed cache, the system will be protected from the threat of soft error in cache and the hit rate can be maintained to the level without soft error in the cache.