• 제목/요약/키워드: Threat Protect

검색결과 167건 처리시간 0.028초

The Necessity of A Cognitive-scientific Analysis on A Security threat Act - The Foundation for A Establishment of The Scientific Preventive Social-security Countermeasure - (경호위해행위에 대한 인지과학적 분석의 필요성 고찰 - 과학적 예방적 사회안전 대책 수립을 위한 기초 -)

  • Kim, Doo-Hyun;Son, Ji-Young
    • Korean Security Journal
    • /
    • 제17호
    • /
    • pp.33-51
    • /
    • 2008
  • According to dictionary, the meaning of protection is "guard and protect" that means protecting the Protectee's safety in case of sudden attack or various accident and Security means all protecting activity including Protectee and place where he is in or will be as comprehensively meaning of safe. As you see in the definition, Protection and security is the act to protect or will to protect from a security-threat act. A security-threat act can be discussed in the range of the concept of a criminal act in Criminal Law. A security-threat act is based on criminal act in Criminal Law, we are going to review such a security-threat act in a point of view in a sphere of learning in today's remarkable a brain-neuro science and cognitive science based on cognitive psychology, and to use an analysis on such a security-threat act to make a foundation for a establishment of the scientific preventive social security countermeasure. To do so, First of all we are going to review a security-threat act based on criminal act in Criminal Law in a point of protection police logic view. Next, we are going to introduce how cognitive science understand about act of man before we analyse a threat act as one of an act of man in cognitive science point of view. Finally, we are going to discuss the need of cognitive scientific analyse in order to establish the Scientific Preventive Social-security Countermeasure at the same time we are going to analyse a threat act in a cognitive scientific view.

  • PDF

Business Process Reengineering of an Information Exchange Management System for a Nationwide Cyber Threat Intelligence

  • Pramadi, Yogha Restu;Rosmansyah, Yousep;Kim, Myonghee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • 제20권2호
    • /
    • pp.279-288
    • /
    • 2017
  • Nowadays, nations cyber security capabilities play an important role in a nation's defense. Security-critical infrastructures such as national defenses, public services, and financial services are now exposed to Advanced Persistent Threats (APT) and their resistance to such attacks effects the nations stability. Currently Cyber Threat Intelligence (CTI) is widely used by organizations to mitigate and deter APT for its ability to proactively protect their assets by using evidence-based knowledge. The evidence-based knowledge information can be exchanged among organizations and used by the receiving party to strengthen their cyber security management. This paper will discuss on the business process reengineering of the CTI information exchange management for a nationwide scaled control and governance by the government to better protect their national information security assets.

An APT Malicious Traffic Detection Method with Considering of Trust Model (신뢰모형을 고려한 APT 악성 트래픽 탐지 기법)

  • Yun, Kyung-mi;Cho, Gi-hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.937-939
    • /
    • 2014
  • Recently, an intelligent APT(Advanced Persistent Threat) attack which aims to a special target is getting to be greatly increased. It is very hard to protect with existing intrusion detection methods because of the difficulties to protect the initial intrusion of malicious code. In this paper, we analyze out-bound traffics to prevent call-back step after malicious code intrusion, and propose an APT malicious traffic detection method with considering of trust. The proposed method is expected to provide a basement to improve the detection rate in comparing with that of existing detection methods.

  • PDF

Application of Threat Modeling for Security Risk Analysis in Smart Home Service Environment (스마트홈 서비스 환경에서의 보안 위험 분석을 위한 위협 모델링 적용 방안)

  • Lee, Yun-Hwan;Park, Sang-Gun
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • 제66권2호
    • /
    • pp.76-81
    • /
    • 2017
  • In this paper, the risk analysis of smart home services was implemented by applying threat modeling. Identified possible threats for safe deployment of smart home services and identified threats through the STRIDE model. Through the creation of the Attack Tree, the attackable risk was analyzed and the risk was measured by applying the DREAD model. The derived results can be used to protect assets and mitigate risk by preventing security vulnerabilities from compromising and identifying threats from adversely affecting services. In addition, the modeled result of the derived threat can be utilized as a basis for performing the security check of the smart home service.

Using Machine Learning Techniques for Accurate Attack Detection in Intrusion Detection Systems using Cyber Threat Intelligence Feeds

  • Ehtsham Irshad;Abdul Basit Siddiqui
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.179-191
    • /
    • 2024
  • With the advancement of modern technology, cyber-attacks are always rising. Specialized defense systems are needed to protect organizations against these threats. Malicious behavior in the network is discovered using security tools like intrusion detection systems (IDS), firewall, antimalware systems, security information and event management (SIEM). It aids in defending businesses from attacks. Delivering advance threat feeds for precise attack detection in intrusion detection systems is the role of cyber-threat intelligence (CTI) in the study is being presented. In this proposed work CTI feeds are utilized in the detection of assaults accurately in intrusion detection system. The ultimate objective is to identify the attacker behind the attack. Several data sets had been analyzed for attack detection. With the proposed study the ability to identify network attacks has improved by using machine learning algorithms. The proposed model provides 98% accuracy, 97% precision, and 96% recall respectively.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • 제20권1호
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

A Study on Spam Protection Technolgy for Secure VoIP Service in Broadband convergence Network Environment (BcN 환경에서 안전한 VoIP 서비스를 위한 스팸대응 기술 연구)

  • Sung, Kyung;Kim, Seok-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제12권4호
    • /
    • pp.670-676
    • /
    • 2008
  • There is a difficult plane letting a security threat to occur in Internet networks as VoIP service uses technology-based the Internet is inherent, and you protect without adjustment of the existing security solution or changes with real-time service characteristics. It is a voice to single networks The occurrence security threat that it is possible is inherent in IP networks that effort and cost to protect a data network only are complicated relatively as provide service integrated data. This paper about various response way fields to be able to prevent analysis regarding definition regarding VoIP spam and VoIP spam technology and VoIP spam.

A Study on Complex Threat Emulation for Situation Awareness of ASE System (생존체계 위협조우 상황인지를 위한 복합/다중 위협상황 Emulation 연구)

  • Lee, Moon-Seok;Lee, Jung-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제14권10호
    • /
    • pp.2180-2186
    • /
    • 2010
  • As the substantial increase in battlefield density, multiple and complex weapon systems, Ensuring the Survivability of the platform has been emphasized. Most of platforms have equipped with ASE (Aircraft Survivability Equipment) system in order to protect the platform and operator against at modernized hostile weapon. ASE system enhance the survivability of the platform through providing accurate situation awareness information by detecting and countermeasuring hostile threats. One of Key factor of the AE system performance is handling multiple and complex threats. In this study, it describes the fact that the performance of ASE system with proposed threat integration algorithm is verified in the developed threat emulation system and also, suggests system verification method before deployment by dealing with complex threat situation.

The Effect of Violent Experience on Burnout among Some Dental Hygienists

  • Jeon, Eun-Jeong;Han, Mi Ah;Park, Jong;Choi, Seong Woo
    • Journal of dental hygiene science
    • /
    • 제17권5호
    • /
    • pp.413-422
    • /
    • 2017
  • This study investigated the effect of violent experience on burnout among some dental hygienists. The study subjects were 242 dental hygienists working at dental clinics. Data were collected by self-administered questionnaire including information such as demographics, work-related characteristics, working environment, experience of violence, and burnout. The violence was classified as verbal violence, physical threat, or physical violence committed by dentists, patients, or caregivers. Descriptive analysis, t-test, ANOVA, correlation, and multiple linear regression analysis were performed to examine the factors associated with burnout. The levels of verbal violence, physical threat, and physical violence by dentists were $0.53{\pm}1.26$, $1.12{\pm}2.70$, and $0.04{\pm}0.42$, respectively. The levels of verbal violence, physical threat, and physical violence by patients and caregivers were $1.50{\pm}1.89$, $1.41{\pm}2.24$, and $0.24{\pm}1.38$, respectively. The score of burnout was $3.13{\pm}0.43$. Total violence, verbal violence, and physical violence by dentists were positively correlated with burnout. Total violence, verbal violence, and physical threat by patients and caregivers were positively correlated with burnout. In multiple linear regression analysis, the level of physical violence by dentists was positively associated with burnout of dental hygienists (${\beta}=0.95$, p=0.032). The levels of total physical violence (${\beta}=0.28$, p=0.002), verbal violence (${\beta}=0.15$, p<0.001), and physical threat (${\beta}=0.19$, p=0.009) by the patients or caregivers were positively associated with burnout of dental hygienists. This study examined the association between violence and burnout among dental hygienists. The level of violence showed positive correlation with burnout. Environment improvement to protect employees from violence and for management of employees who experienced workplace violence are needed to reduce the burnout.