• Title/Summary/Keyword: Threat Scenario

Search Result 43, Processing Time 0.023 seconds

Supercomputer security requirements by Advanced Persistent Threat(APT) scenario analysis (지능형 지속 위협(APT) 시나리오 분석에 의한 슈퍼컴퓨터 보안 요구 사항)

  • Jang, Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.109-112
    • /
    • 2021
  • 매년 슈퍼컴퓨터를 표적으로 공격이 증가하고 있고, 공격의 방식은 날로 진화하고 있다. 슈퍼컴퓨터를 대상으로 하는 공격에 대응하기 위해 기존의 연구는 공격 특성을 분석하여 맞춤형 대책을 제시하거나 분석을 통해 보안 요구사항을 도출하였다. 하지만 연구과정에서 APT life cycle 관점이 반영되지 않으면, 지능형 지속 위협인 APT를 인지 및 대응하기 어려운 문제점이 있다. 이러한 문제점을 해결하기 위해, 본 논문은 APT 시나리오 기반의 위협 모델링 분석을 통해 슈퍼컴퓨터 보안 요구사항을 도출 한다.

A Study on Development of Civil Defense CBR Virtual Training Simulation Scenario (민방위 화생방 가상훈련 시뮬레이션 시나리오 개발 연구)

  • Jung, Tae-Ho;Jang, Jae-Soon;Park, Sang-Hyun
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.3
    • /
    • pp.175-183
    • /
    • 2014
  • In spite of international efforts to control nuclear weapons and chemical, biological, and radiological (CBR) weapons, North Korea obtains and sells CBR weapons illegally. As a result, the worldwide threat of CBR weapons is increasing. Unfortunately, civil defense education and training for CBR weapons have not been adopted for real situations because of the long period of absence of an actual combat. In this study, virtual training scenarios that are applied to the simulation were made in 5 steps to cope with CBR situations. These scenarios are expected to have three effects. First, trainings can be improved with experience and education. Second, the problems and health hazards of CBR weapons and supplies can be solved with CBR virtual training simulation experience. Finally, corresponding effects can be recognized and predicted in real situations through roles and mission procedures of simulation scenario.

Analysis of Threat Factors of the Chinese Maritime Militia and the Prospect of Maritime Disputes between Korea and China (중국 해상 민병대의 위협요인 분석 및 한·중 해양 분쟁 전망)

  • Park, Byeung chan
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.83-113
    • /
    • 2022
  • Although China's maritime militia has not been well known despite its long history, it is recently emerging as a serious threat to maritime security, causing neighboring countries' security concerns due to the growing number of maritime disputes with China. In this regard, it is now time to clearly define the true nature of the Chinese maritime militia. A close look at the organization and roles of the Chinese maritime militia reveals that it is an organization that is systematically managed and operated by the Chinese government and the People's Liberation Army of China. Its role is to serve the purpose of "contributing to the protection and expansion of China's marine interests." In addition, the threat factors of the Chinese maritime militia were analyzed by examining the cases of maritime disputes between the Chinese maritime militia and neighboring countries. First, the Chinese maritime militia has implemented the "Gray Zone Strategy." Second, it is a systematic organization supported by the Chinese government and the People's Liberation Army. Third, it is a maritime power that cannot be ignored as the world's largest militia organization. Fourth, it has a strategic flexibility that enables the execution of the dual mission of working for a living such as commercial fishing and serving in the maritime militia. The threats of the Chinese maritime militia are not limited to Southeast Asian countries located in the South China Sea. This is also the case in Korea as the country cannot avoid maritime disputes with China such as the Ieodo issue and the boundary delimitation of the West Sea. Accordingly, this study was focused on presenting a predictable scenario and countermeasures based on the analysis through a scenario technique with respect to the two cases that are most likely to occur in Korea-China relations. Finally, beyond identifying the nature of the Chinese maritime militia, this study takes a further step to share considerations as to how the organization may operate and develop in the future and how we can cope with its moves.

  • PDF

Layered Authoring of Cyber Warfare Training Scenario (계층적 사이버전 훈련 시나리오 저작)

  • Song, Uihyeon;Kim, Donghwa;Ahn, Myung Kil
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.191-199
    • /
    • 2020
  • Cyber warfare training is a key factor for boosting cyber warfare competence. In general, cyber warfare training is conducted by scenarios, and the effects of training can be enhanced by including various elements in the scenarios that can improve the quality of training. In this paper, we introduce the training information, network map, traffic generation policy, threat/defense behavior identified as elements to be included in training scenarios, and propose a method of authoring training scenarios by layering and combining them. We also propose a database design for integrated management of each scenario layer. The layered training scenario authoring method has the advantage of increasing convenience of authoring by reusing existing layers and extending training scenarios based on various combinations between the layers.

Analysis on the Risk of Explosive Terror in Domestic Buildings (국내 건물의 폭발물 테러 위험도 요인 분석)

  • Song, Jin-Young;Yoon, Sung-Won
    • Journal of Korean Association for Spatial Structures
    • /
    • v.12 no.2
    • /
    • pp.73-80
    • /
    • 2012
  • According to the global status of terroristic acts occurred from 2002 to 2010, 10,431(nearly 52.2%) of 19,946 cases have happened by bomb blasts, and 10,431(nearly 52.2%) of weapons used for terrorism were explosive substances Therefore, this study analyzed the terrorism risks of buildings according to height through FEMA 455 - rapid visual screening. As a result, the higher the building is, the higher the terror risk gets. It shows that total risk increases proportionally to buildings's height. In case of buildings over 100 meter high, the total risk is most affected by threat items. According to the risk of explosion associated with the scenario analysis, buildings over 100 meter high have high risks of Internal-Explosive.

A Study on the Analysis and Classification of Cyber Threats Accor ding to the Characteristics of Computer Network of National·Public Organizations (국가·공공기관 전산망 특성에 따른 사이버 위협 분석 및 분류에 관한 연구)

  • Kim, Minsu;Park, Ki Tae;Kim, Jongmin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.197-208
    • /
    • 2020
  • Based on the network infrastructure advanced in the information knowledge society, the structure of computer net work is operated by establishing the composition of network in various forms that have secured the security. In case of computer network of national/public organizations, it is necessary to establish the technical and managerial securit y environment even considering the characteristics of each organization and connected organizations. For this, the im portance of basic researches for cyber training by analyzing the technical/managerial vulnerability and cyber threats based on the classification and map of cyber threats according to the characteristics of each organization is rising. T hus, this study aims to analyze each type of external/internal cyber threats to computer network of national/public o rganizations established based on the dualistic infrastructure network of internet and national information network, a nd also to present the cyber threat framework for drawing the elements of cyber security training, by drawing and analyzing the actual elements of cyber threats through the case-based scenario.

Risk Assessment of Arsenic-Contaminated Groundwater in Multiple Scenarios in a Rural Area of Gyeongnam Province, Korea (경남 농촌 지역 비소 오염 지하수의 시나리오별 위해성 평가)

  • Oh, Serim;Lee, Jin-Yong;Moon, Sang-Ho;Jang, Jiwook;Jeong, Eunju
    • The Journal of Engineering Geology
    • /
    • v.32 no.4
    • /
    • pp.437-448
    • /
    • 2022
  • This work aims to assess the threat to human health of hazardous materials in groundwater that is used domestically and for drinking. Two distinct sub-assessments are considered: cancer and non-cancer risk. The studied groundwater is in an agricultural area of Gyeongnam Province, Korea, and is contaminated by arsenic at a mean level of 16.27 ㎍/L, far greater than the WHO guideline (10 ㎍/L for drinking water). We collected groundwater data from the National Groundwater Information Center (gims.go.kr) and assessed the risk to human health following the methodology of the United States Environmental Protection Agency. We considered three exposure scenarios: domestic use (scenario 1) and drinking use with different doses (scenarios 2 and 3). Scenario 1 had a median hazard quotient (HQ) of 0.77 and a cancer risk (CR) of 0.013. Scenario 2 had a median HQ of 0.08 and a CR of 3.69 × 10-5, and the values for scenario 3 were 0.11 and 4.82 × 10-5, respectively. Scenario 1 is likely the most hazardous to human health. Further study of the origin of arsenic in groundwater in the study area is required, as are remedial measures to mitigate its health effects.

A Study on the Advancement of the Contingency Plan upon Prediction of Toxicity Damage Considering Seasonal Characteristics (계절 특성을 고려한 독성 피해예측에 따른 위기대응 고도화에 관한 연구)

  • Hwang, Man Uk;Hwang, Yong Woo;Lee, Ik Mo;Min, Dal Ki
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.2
    • /
    • pp.23-32
    • /
    • 2016
  • Today the issue of deterioration of industrial complexes that are located close to life space of residents has been raised as a cause of threats to the safety of local communities. In this study, in order to improve the current risk analysis and scope of community notification, simulated threat zones were comparatively analyzed by utilizing the threat zones of alternative accident scenarios and modes of seasonal weather, and the area with a high probability of damage upon the leakage of toxic substances was predicted by examining wind directions observed at each time slot for each season. In addition, limit evacuation time and minimum separation distance to minimize casualties were suggested, and a proposal to enable more reasonable safety measures for on-site workers and nearby residents made by reviewing the risk management plan currently utilized for emergency response.

Attack Scenarios and Countermeasures using CoAP in IoT Environment (IoT기기에서 SSDP 증폭 공격을 이용한 공격기법 및 대응 방안)

  • Oh, Ju-Hye;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • DDoS attack has been continuously utilized that caused the excessively large amount of traffic that network bandwidth or server was unable to deal with paralyzing the service. Most of the people regard NTP as the biggest cause of DDoS. However, according to recently executed DDoS attack, there have been many SSDP attack in the use of amplified technique. According to characteristics of SSDP, there is no connection for making a forgery of source IP address and amplified resources feasible. Therefore, it is frequently used for attack. Especially, as it is mostly used as a protocol for causing DDoS attack on IoT devices that constitute smart home including a wireless router, media server, webcam, smart TV, and network printer. Hereupon, it is anticipated for servers of attacks to gradually increase. This might cause a serious threat to major information of human lives, major government bodies, and company system as well as on IoT devices. This study is intended to identify DDoS attack techniques in the use of weakness of SSDP protocol occurring in IoT devices and attacking scenario and counter-measures on them.

The Strategical Scenario Analysis for the Efficient Management of Resource in Open Access (공유자원의 효율적 경영을 위한 전략적 시나리오분석)

  • Choi, Jong-Du
    • The Journal of Fisheries Business Administration
    • /
    • v.42 no.3
    • /
    • pp.31-39
    • /
    • 2011
  • This paper attempts to extend such analysis to the rather more difficult problem of optimal management of transnational fish stocks jointly owned by two countries. Transboundary fish such as Mackerel creates an incentive to harvest fish before a competitor does and leads to over-exploitation. This tendency is especially poignant for transnational stocks since, in the absence of an enforceable, international agreement, there is little or no reason for either government or the fishing industry to promote resource conservation and economic efficiency. In the current paper I examine a game theoretic setting in which cooperative management can provide more benefits than noncooperative management. A dynamic model of Mackerel fishery is combined with Nash's theory of two countries cooperative games. A characteristic function game approach is applied to describe the sharing of the surplus benefits from cooperation and noncooperation. A bioeconomic model was used to compare the economic yield of the optimal strategies for two countries, under joint maximization of net benefits in joint ocean. The results suggest as follows. First, the threat points represent the net benefits for two countries in absence of cooperation. The net benefits to Korea and China in threat points are 2,000 billion won(${\pi}^0_{KO}$) and 1,130 billion won(${\pi}^0_{CH}$). Total benefits are 3,130 billion won. Second, if two countries cooperate one with another, they reach the solution payoffs such as Pareto efficient. The net benefits to Korea and China in Pareto efficient are 2,785 billion won(${\pi}^0_{KO}$) and 1,605 billion won(${\pi}^0_{CH}$) or total benefits of 4,390 billion won : a gain of 1,260 billion won. Third, the different price effects under the two scenarios show that total benefit rise as price increases.