• Title/Summary/Keyword: Threat Evaluation

Search Result 229, Processing Time 0.02 seconds

A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment (SDP 환경에서 SVDD 기반 이상행위 탐지 기술을 이용한 디바이스 유효성 검증 방안)

  • Lee, Heewoong;Hong, Dowon;Nam, Kihyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1181-1191
    • /
    • 2021
  • The pandemic has rapidly developed a non-face-to-face environment. However, the sudden transition to a non-face-to-face environment has led to new security issues in various areas. One of the new security issues is the security threat of insiders, and the zero trust security model is drawing attention again as a technology to defend against it.. Software Defined Perimeter (SDP) technology consists of various security factors, of which device validation is a technology that can realize zerotrust by monitoring insider usage behavior. But the current SDP specification does not provide a technology that can perform device validation.. Therefore, this paper proposes a device validation technology using SVDD-based abnormal behavior detection technology through user behavior monitoring in an SDP environment and presents a way to perform the device validation technology in the SDP environment by conducting performance evaluation.

A study on Performance Evaluation for Network Architecture using Quantum Key Distribution Technology (양자암호기반의 통신망 구축 및 성능시험 검증연구)

  • Lee, Wonhyuk;Seok, Woojin;Park, Chanjin;Kwon, Woochang;Sohn, Ilkwon;Kim, Seunghae;Park, Byoungyoen
    • KNOM Review
    • /
    • v.22 no.2
    • /
    • pp.39-47
    • /
    • 2019
  • There are several big data-driven advanced research activities such as meteorological climate information, high energy physics, astronomy research, satellite information data, and genomic research data on KREONET. Since the performance degradation occurs in the environment with the existing network security equipment, methods for preventing the performance degradation on the high-performance research-only network and for high-speed research collaboration are being studied. In addition, the recent issue of quantum computers has been a threat to security using the existing encryption system. In this paper, we construct quantum cryptography-based communication network through environment construction and high-performance transmission test that build physical security through quantum cryptography-based communication network in end-to-end high-speed research network. The purpose of this study is to analyze the effect on network performance when performing physical encryption and to use it as basic data for constructing high-performance research collaboration network.

Evaluation of Loop Mediated Isothermal Amplification Based Methods for the Detection of African Swine Fever Virus from Food Waste

  • Siwon Lee;Junhwa Kwon;Su Hyang Kim;Jin-Ho Kim;Jaewon Jung;Kyung-Jin Lee;Ji-Yeon Park;Taek-Kyun Choi;Jun-Gu Kang;Tae Uk Han
    • Biomedical Science Letters
    • /
    • v.28 no.4
    • /
    • pp.334-339
    • /
    • 2022
  • African swine fever virus (ASFV) is a highly contagious and lethal pathogen that poses a threat to the global pork industry. The World Organization for Animal Health (WOAH) has placed strict surveillance measures for ASFV. The possibility of long-term survival of ASFV in raw meat or undercooked pork has been reported. Accordingly, the problem of secondary infection in food waste from households or waste disposal facilities has emerged, raising the need for ASFV monitoring of food waste. However, most of the previously reported ASFV gene detection methods are focused on clinical monitoring of pigs. There are very few cases in which their application in waste has been verified. Since ASFV diagnosis requires rapid monitoring and immediate action, loop-mediated isothermal amplification (LAMP) may be suitable, but this requires conformity assessment for LAMP to be used as a diagnostic technique. In this study, six LAMP methods were evaluated, and two methods (kit and manual) were recommended for use in diagnosing ASFV in food waste.

SWOT Analysis for Infrastructure of Hydrogen Energy Industry in Korea (국내 수소에너지 산업인프라 구축을 위한 SWOT 분석)

  • Kim, Chae-Bogk
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.5
    • /
    • pp.337-345
    • /
    • 2016
  • There is an increasing attention on the sustainable energy in the world as the problem of fossil energy exhaustion and environmental issues appear. This paper addresses technologies and industries related to hydrogen energy in the literature, and develops strategy for the preparation of hydrogen energy infrastructure in Korea by extracting several factors suitable for SWOT analysis after reviewing literature. Research articles and reports about the practical application of hydrogen energy in the literature were investigated and seventy evaluation factors were extracted. Then, survey to eliminate the unsuitability problems of duplication, disproportion and objectivity was performed by scholars and experts in research institutes. Finally, sixteen factors consisting of 4 strength factors, 4 weakness factors, 5 opportunity factors and 4 threat factors were determined as the strategic factors for the infrastructure of hydrogen energy industry.

A Study on Operational Element Identification and Integrated Time Series Analysis for Cyber Battlefield Recognition (사이버 전장인식을 위한 작전상태 요소 식별 및 통합 시계열 분석 연구)

  • Son-yong Kim;Koo-hyung Kwon;Hyun-jin Lee;Jae-yeon Lee;Jang-hyuk Kauh;Haeng-rok Oh
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.65-73
    • /
    • 2022
  • Since cyber operations are performed in a virtual cyber battlefield, the measurement indicators that can evaluate and visualize the current state of the cyber environment in a consistent form are required for the commander to effectively support the decision-making of cyber operations. In this paper, we propose a method to define various evaluation indicators that can be collected on the cyber battlefield, normalized them, and evaluate the cyber status in a consistent form. The proposed cyber battlefield status element consists of cyber asset-related indicators, target network-related indicators, and cyber threat-related indicators. Each indicator has 6 sub-indicators and can be used by assigning weights according to the commander's interests. The overall status of the cyber battlefield can be easily recognized because the measured indicators are visualized in time series on a single screen. Therefore, the proposed method can be used for the situational awareness required to effectively conduct cyber warfare.

Evaluation of Sustainable Plastic Management Strategy of Korean Consumer Goods Companies (국내 소비재 기업의 지속 가능한 플라스틱 경영 전략 평가를 위한 지표 개발)

  • Suho Han;Seongku Kwon;Junhee Park;Jeongki Lee;Jay Hyuk Rhee;Yongjun Sung;Sung Yeon Hwang;Yong Sik Ok
    • Journal of Environmental Science International
    • /
    • v.32 no.11
    • /
    • pp.745-756
    • /
    • 2023
  • Growing stringent global regulations in Korea poses a threat to corporate sustainability. Companies must respond strategically to navigate these regulations and avoid greenwashing. Objective of this research was to analyze how Korean companies are responding to the global trend of reducing plastic use and propose improved management strategies. Seven indicators were developed to assess companies' post-plastic strategies and applied to analyze the sustainability reports of Amore Pacific and LG Household & HealthCare. These indicators included, 1) disclosure of plastic raw materials used by weight or volume, 2) disclosure of recycled plastic raw materials used by weight or volume, 3) disclosure of waste recycling, reuse amounts, and disposal using waste treatment method 4) strategies to reduce environmental impact of plastics, 5) plastic packaging, reduce, recycle, reuse, and composting (in the real environment), 6) plastic management roadmap for the circular economy, and 7) education for sustainable plastic management. Based on the review of considered companies, we propose in-listed sustainable plastics management strategies: disclosing the ratio of plastic raw materials and recycled raw materials for all products, considering recycling rate throughout the product value chain, and not only for the production phase, reviewing carbon dioxide emissions based on life cycle assessment rather than reducing plastic consumption, studying the biodegradability of biodegradable plastics in natural environment such as soil, considering the consumer's perspective.

Selection of Mitigation Scenarios Based on Prediction of the Dispersion Impact of Ecosystem-Disturbing Plant Species on Ecosystems (생태계교란식물의 확산 영향 예측에 따른 저감대책 시나리오 선정)

  • Lee, Sang-Wook;Kim, Yoon-Ji;Chung, Hye-In;Lee, Ji-Yeon;Yoo, Young-Jae;Lee, Gwan-Gyu;Sung, Hyun-Chan;Jeon, Seong-Woo
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.27 no.4
    • /
    • pp.15-27
    • /
    • 2024
  • Ecosystem-disturbing plant species pose a significant threat to native ecosystems due to their high reproductive capacity, making it essential to monitor their distribution and develop effective mitigation strategies. Consequently, it is crucial to enhance the evaluation of the impacts of these species in environmental impact assessments by incorporating scientific evidence alongside qualitative assessments. This study introduces a dispersal model into the species distribution model to simulate the potential spread of ecosystem-disturbing plant species, reflecting their ecological characteristics. Additionally, we developed mitigation scenarios and quantitatively calculated reduction rates to propose effective mitigation strategies. The species distribution model showed a reliable AUC (Area Under the Curve) of at least 0.890. The dispersal model's results were also credible, with 31 out of 34 validation coordinates falling within the predicted spread range. Simulating the impact of the spread of ecosystem-disturbing plant species over the next five years revealed that one project site had potential habitats for Ambrosia artemisiifolia, necessitating robust mitigation measures such as seed removal. Another project site, with potential habitats for Symphyotrichum pilosum, indicated that physical removal methods within the site were effective due to the species' relatively short dispersal distance. These findings can serve as fundamental data for project executors and reviewers in evaluating the impact of the spread of ecosystem-disturbing plant species during the planning stages of projects.

Review on Prior Evaluation for Terrorism Risk of High-rise Buildings (초고층건축물의 테러 위험도 사전평가에 관한 연구)

  • Seong, Bin;Lee, Yoon-Ho
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.293-316
    • /
    • 2013
  • Today's high-rise buildings are increasing concern about the safety and evacuation of people related to the fire and threat from outside. Terrorism breaking out in high-rise buildings, a symbol of the national economy results in a number of casualties, economic loss, social fear and damage to national status. That's why high-rise building has also emerged as a target of major terrorist attacks, compared to other types of buildings. We have 54 high-rise buildings in 15 regions over the country. The Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government have offered the guidelines to prevent terrorist attacks toward high-rise buildings. Since the 9/11 terrorist attacks, the U.S. Federal Emergency Management Agency (FEMA) has developed and taken advantage of the Risk Management Manual Series. According to this manual, pre-assessment is conducted for the prevention of terrorism and particularly in FEMA 455, risk of the surrounding areas, vulnerability, possibility from terrorist attacks are checked. After the check, experts classify the risk of terrorist attacks toward the high-rise buildings and according to the risk classification, architects, security experts and structure engineers can carry out terrorism prevention program for high-rise buildings. The U.K. NaCTSO has also offered the terrorism prevention guidelines. Therefore, the Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government should make more concrete guidelines for high-rise buildings such as what U.S. FEMA and U.K. NaCTSO implement, including prior evaluation technique for terrorism risk.

  • PDF

A computer Hardware Selection Strategy for Information Systems Development : A Case of T Coil Service Center (정보시스템 구축시 컴퓨터 하드웨어의 선정전략 - T 철강회사의 시스템 선정 사례 -)

  • Yu, Sang-Jin;Jang, Yeong-Taek
    • Asia pacific journal of information systems
    • /
    • v.3 no.2
    • /
    • pp.3-54
    • /
    • 1993
  • Recently, executives learned of the strategic impact that information systems (IS) and information technology (IT) could provide to their organizations. In other words, through IS/IT companies could squelch competition, secure suppliers, obtain customer loyalty, reduce the threat of new entrants, and identify new opportunities. Because of these potential benefits, organizations are investing ever-increasing amount of organizational resources in IS/IT to make their organizations as information-based ones. Information-based organizations depend largely upon computer hardwares and softwares for their ongoing operations and management. Thus, organizations must manage their information resources, especially hardwares and softwares very effectively to remain competitive. Information resource management (IRI) is a program of activities directed at making effective use of information technology within an organization. These activities cover from corporate IS/IT planning to application system development, implementation, and maintenance. In more detail, IRV activities include planning for and acquiring computer hardwares and communication equipments, planning for, selection, and management of software development projects, and re-engineering business processes as IS/IT are integrated into organizational management. Among these activities, planning for and acquisition of computer hardwares, and planning for and management of software projects are the most critical ones since these activities require enormous amount of such important corporate resources as money, people, and time. Furthermore, corporate's eventual success largely depends upon whether corporate's policy on IS/IT is effective one or not. Numerous approaches and concepts to specific IRM activities have been proposed. However, many organizations have experienced various problems in the process of applying these approaches to their IRM activities mainly because existing methodologies and guidelines are too general to adapt to each firm's unigue situation. Also, these approaches are having its own strengths and weaknesses. Thus, people in charge of organization's IRM policy should come up with effective guidelines to maintain his position very long. In this study, we reviewed some existing approaches for planning, evaluation, and acquisition of computer hardware. Then, real experiences from Taechang Steel Co., Ltd. located in Taegu, which is one of the largest Coil Service Centers in Korea, are discussed. The major purposes of the study are : (1) to discuss the tradeoffs of existing approaches on hardware evaluation and acquisition, (2) to provide a real experience of a company to facilitate the application of theoretical concepts to the real environment.

  • PDF

The Evaluation for Web Mining and Analytics Service from the View of Personal Information Protection and Privacy (개인정보보호 관점에서의 웹 트래픽 수집 및 분석 서비스에 대한 타당성 연구)

  • Kang, Daniel;Shim, Mi-Na;Bang, Je-Wan;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.121-134
    • /
    • 2009
  • Consumer-centric marketing business is surely one of the most successful emerging business but it poses a threat to personal privacy. Between the service provider and the user there are many contrary issues to each other. The enterprise asserts that to abuse the privacy data which is anonymous there is not a problem. The individual only will not be able to willingly submit the problem which is latent. Web traffic analysis technology itself doesn't create issues, but this technology when used on data of personal nature might cause concerns. The most criticized ethical issue involving web traffic analysis is the invasion of privacy. So we need to inspect how many and what kind of personal informations being used and if there is any illegal treatment of personal information. In this paper, we inspect the operation of consumer-centric marketing tools such as web log analysis solutions and data gathering services with web browser toolbar. Also we inspect Microsoft explorer-based toolbar application which records and analyzes personal web browsing pattern through reverse engineering technology. Finally, this identified and explored security and privacy requirement issues to develop more reliable solutions. This study is very important for the balanced development with personal privacy protection and web traffic analysis industry.