• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.022 seconds

Proxy Based Application Digital Signature Validation System (프락시 기반 애플리케이션 전자서명 검증 시스템)

  • Kwon, Sangwan;Kim, Donguk;Lee, Kyoungwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.743-751
    • /
    • 2017
  • As smart phones are becoming popular, an operating system is being used at wearable devices, home appliances and smart TVs. A user is able to use various applications on devices with operating system, but there is an increased threat of hacker. Thus, the technology for detecting the forgery of applications is becoming more important on operating system. To detect the forgery of the application, a digital signature technology is used on the filed of application digital signature. According to W3C recommendation, the signing process of application digital signature must be performed at least twice, and the applications which are signed by the application digital signature have to be validated for all signature files when the application is installed in the operating system. Hence, the performance of the application digital signature validation system is closely related to the installer performance on the operating system. Existing validation system has performance degradation due to redundancy of integrity verification among application components. This research was conducted to improve the performance of the application digital signature validation system. The proposal of validation system which is applied proxy system shows a performance improvement compared to the existing verification system.

Review for the Enactment of Anti-Terrorism Law in China: Comparing it to those in the USA, Britain and Germany (중국의 반(反)테러리즘법 제정을 위한 검토: 미국.영국.독일과 비교하여)

  • Lee, Dae Sung;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.45-55
    • /
    • 2014
  • China has vast land, variety of people, religions and cultures. China has faced terrorism threat from the struggles of people, religions and resources. The 11thStanding Committee of the National People's Congress of China decided to strengthen the anti-terrorism action on October 29, 2011. This study compared, analyzed and estimated the counter-terrorism laws of the USA, Britain and Germany thinking about the China's anti-terrorism decision. The counter-terrorism laws of the USA, Britain and Germany are largely composed of previous prevention of terror and oppression of it later. They enacted the laws both for people and property. They also rearranged the power and role of governmental institutes on counter-terrorism. The contents of the counter-terrorism laws are specific, detailed and systematic. But the anti-terrorism law of China has restriction on the power and roles for previous prevention and oppression of terrorism, handling of people and property. This study reviewed the foreign countries' counter-terrorism laws and the way to connect the regulations on terrorism crimes of the revised Chinese criminal law and the anti-terrorism decision, when they enact the anti-terrorism laws in China in the future.

A Study on Automatic Classification Technique of Malware Packing Type (악성코드 패킹유형 자동분류 기술 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1119-1127
    • /
    • 2018
  • Most of the cyber attacks are caused by malicious codes. The damage caused by cyber attacks are gradually expanded to IoT and CPS, which is not limited to cyberspace but a serious threat to real life. Accordingly, various malicious code analysis techniques have been appeared. Dynamic analysis have been widely used to easily identify the resulting malicious behavior, but are struggling with an increase in Anti-VM malware that is not working in VM environment detection. On the other hand, static analysis has difficulties in analysis due to various packing techniques. In this paper, we proposed malware classification techniques regardless of known packers or unknown packers through the proposed model. To do this, we designed a model of supervised learning and unsupervised learning for the features that can be used in the PE structure, and conducted the results verification through 98,000 samples. It is expected that accurate analysis will be possible through customized analysis technology for each class.

Method's to introduce ROKN Nuclear Propulsion Submarines (한국형 원자력 추진 잠수함 도입방안)

  • Jang, Jun-Seop
    • Strategy21
    • /
    • s.42
    • /
    • pp.5-52
    • /
    • 2017
  • Debates about introducing nuclear submarines have been a main issue in Korea. The highest officials and the government has started to think seriously about the issue. Yet there were no certain decision to this issue or any agreements with US but it is still necessary to review about introducing nuclear submarines, the technologies and about the business. The reason for such issues are the highest officials of Korea to build nuclear submarine, nK's nuclear development and SLBM launching. ROKN's nuclear submarine's necessity will be to attack(capacity to revenge), defend(anti-SSBN Operation) and to respond against neighboring nation's threat(Russia, Japan, China). Among these nations, US, Russia (Soviet Union), Britain, France had built their submarines in a short term of time due to their industrial foundation regarding with nuclear propulsion submarines. However China and India have started their business without their industrial foundation prepared and took a long time to build their submarines. Current technology level of Korea have reached almost up to US, Russia, Britain and France when they first built their nuclear propulsion submarines since we have almost completed the business for the Changbogo-I,II and almost up to complete building the Changbogo-III which Korea have self designed/developed. Furthermore Korea have reached the level where we can self design large nuclear reactors and the integrated SMART reactor which we can call ourselves a nation with worldwide technologies. If introducing the nuclear submarine to the Korea gets decided, first of all we would have to review the technological problems and also introduce the foreign technologies when needed. The methods for the introduction will be developments after loans from the foreign, productions with technological cooperations, and individual production. The most significant thing will be that changes are continuous and new instances are keep showing up so that it is important to only have a simple reference to a current instances and have a review on every methods with many possibilities. Also developing all of the technologies for the nuclear propulsion submarines may be not possible and give financial damages so there may be a need to partially introduce foreign technologies. For the introduction of nuclear propulsion submarines, there must be a resolution of the international regulations together with the international/domestics resistances and the technological problems to work out for. Also there may be problem for the requirement fees to solve for and other tough problems to solve for. However nuclear submarines are powerful weapon system to risk everything above. This is an international/domestically a serious agenda. Therefore rather than having debates based on false facts, there must be a need to have an investigations and debates regarding the nation's benefits and national security.

Designing the Maritime Strategy of the Middle-Power Korea: The Maritime Access Strategy (중견국 한국의 해양전략 디자인 : 해양접근전략(Maritime Access Strategy))

  • Ban, Kiljoo
    • Strategy21
    • /
    • s.45
    • /
    • pp.116-147
    • /
    • 2019
  • Despite the fact that South Korea, one of peninsula countries, has been already a middle power in an international arena, it still tends to get stuck in continental-driven inertia and be reluctant to become a consolidated maritime power. In its efforts to deal with the parable of South Korea, designing a tailored-made strategy needs to be initiated in detail. Its design is centered around two variables: classification of waters and prestige. First of all, the domain of waters confronted to South Korea ranges from the greatest threat to scattered national interest. Second, South Korea is prestigiously regarded as the middle power which is equipped with the capability to see beyond its sovereign waters. The Maritime Access Strategy(MAS) can be more clearly explained by three-axis factors: ends, ways, and means. Ends need to be oriented to achieving three types of classified objectives-Deterrence, Engagement around the world to maximize remotely-scattered interest and Check of neighboring countries' seapower expansion, called DEC. Ways is mainly driven by the closer access to three different types of waters: waters of security, check, and interest. The active access and closer approach to the domain of waters need to be maintained with a high degree of willingness and capability. Means is attainable by guiding naval forces to be armed with multiple platforms and functionally-balanced assets. These platforms and assets will allow the naval forces to attain and maintain cost effective means, leading to making MAS feasible. This strategy allows the middle-power Korea to make the best of its maritime assets at various seas, contributing to international stability as well as national security and interest.

Study on Police-led National Response against CBRN Terror by Strengthening the Standing Cooperation System of the Interagencies (다부처 상설 협력체계 구축을 통한 경찰주도 국가 화생방 테러대응 발전방안)

  • Cha, Jang-Hyeon;Kang, Taeho;Kim, Daesoo;Lee, Hochan
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.217-242
    • /
    • 2019
  • Nowadays, Terrorism has become bloodier. Unlike the past, the recent terrorism has been indiscriminate in the purpose of mass- killing. Given this aspect, the threat of a CBRN attack is the biggest one to modern society. Notably, the possibility of terrorist attacks in Korea by international terrorist groups such as ISIL is higher than ever in consideration of its allusion; crusades and the devil's allied forces. To overcome these circumstances, various measures have been taken for counter terrorism at the state level including anti-terrorist legislation. Under the anti-terrorist act, police have to lead relevant inter agencies when it comes to the CBRN terror. At first glance, current countermeasures would work well. However, in order to respond quickly, the standing cooperations system of related departments need to be set up. In this sense, this article proposed a coagulatory body that could not only consider institutional-oriented organizational restructuring and response but also integrate and operate functions of various specialized institutions. It also stressed that the council should move toward a consultative body of information gathering, distribution and working- level consultation. With this cooperation system, counter-terrorism agencies can respond rapidly, stop wasting their effort and assets by about 30%. Also, they could design the atypical aspect of terrorism into standardized.

Visualization of Malwares for Classification Through Deep Learning (딥러닝 기술을 활용한 멀웨어 분류를 위한 이미지화 기법)

  • Kim, Hyeonggyeom;Han, Seokmin;Lee, Suchul;Lee, Jun-Rak
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.67-75
    • /
    • 2018
  • According to Symantec's Internet Security Threat Report(2018), Internet security threats such as Cryptojackings, Ransomwares, and Mobile malwares are rapidly increasing and diversifying. It means that detection of malwares requires not only the detection accuracy but also versatility. In the past, malware detection technology focused on qualitative performance due to the problems such as encryption and obfuscation. However, nowadays, considering the diversity of malware, versatility is required in detecting various malwares. Additionally the optimization is required in terms of computing power for detecting malware. In this paper, we present Stream Order(SO)-CNN and Incremental Coordinate(IC)-CNN, which are malware detection schemes using CNN(Convolutional Neural Network) that effectively detect intelligent and diversified malwares. The proposed methods visualize each malware binary file onto a fixed sized image. The visualized malware binaries are learned through GoogLeNet to form a deep learning model. Our model detects and classifies malwares. The proposed method reveals better performance than the conventional method.

A Study on the Establishment of Anti-Drone Concept and Effective Response System (안티드론 개념 정립 및 효과적인 대응체계 수립에 관한 연구)

  • Lee, Donghyuk;Kang, Wook
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.9-31
    • /
    • 2019
  • Due to the development of technology and popularization of drone, the so-called "dirty drone" that exploits drones for crimes and terrorism has become a social problem, and it is time to seriously consider the "revenge of drones." Indeed, the cases of threats posed by drones are expanding not only to threats to ground facilities, but also to aviation safety threats, more recently to large-scale events, demonstrations and crimes targeting specific personnel, and terrorism. This research clearly defined the concept of anti-drone when it emerged as a new type of social safety threat as it was abused in crime and terrorism, while response to it was not enough yet. Through this process, it was intended to present an effective anti-drones system. We analyzed the major controversial elements of anti-drone, and defined them as "comprehensive response activities at the legal, institutional and technical levels performed by law enforcement agencies, related technology and industrial entities in a way that prevents, detects, and blocks acts that violate public well-being and order, such as crimes and terrorism caused by the drones." To effectively respond to dirty drones, the authority of law enforcement agencies and the enactment of relevant laws were proposed. In the future, a comprehensive and systematic follow-up study of the anti system should be conducted.

A study on overcoming the prospect of North Korea's fourth-generation war threats : Focusing on the Homeland Defense Reservists (북한의 제4세대전쟁 위협전망과 극복방안 연구: 향토예비군 운용 개선을 중심으로)

  • Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.3-13
    • /
    • 2016
  • We take it for granted that strong sides defeat weaker counterparts, while predicting the outcome of the battles. But in modern war, we can find plenty of evidence that weak sides won against the strong. This phenomenon can be understood logically by the fourth-generation war theory. the North Korean does not give up its unification strategy, which is unification by force, even though its inferior power. It is continuing various political, social and military levels of provocations toward both the international community and South Korea. Recently, North Korea did nuclear test, launched ICBM test, provoked the DMZ, and expecting to continue the provocations of the fourth-generation war level. We have to understand the nature of North Korea's fourth-generation war threats and provocations that it is focusing on. Based on this, have a new understanding of the value of the Homeland Defense Reservists as fundamental measures as the fourth-generation war threat and supplement related systems. We can firmly refuse the balance of power and power shift of the Korean Peninsula through improved Homeland Defense Reservists. As the expected North Korea's the fourth-generation war threats, our Homeland Defense Reservists is a firm will of conduct war, and political-social-economic-military means, it is possible to display as the best alternative.

A Study on the Measurement Method of Personal Information Protection Investment Performance (개인정보보호투자의 성과측정방안에 관한 연구)

  • Kim, Young-Il;Lee, Jae-Hoon
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.99-106
    • /
    • 2013
  • Personal information protection has become one of the most impending business issues because leakage of personal information can cause tremendous financial losses and image degradation. Consequently, personal information protection initiatives have been recognized widely in business. To invigorate personal information protection investments, performance measurement method such as cost benefits analysis or qualitative analyses are needed, which have not been studied enough in the previous studies. This study proposes a performance measurement model which can include quantitative and qualitative analyses in the context of personal information protection investments. A comparative analysis has been performed on security investment and IT investment performance measurements, which leads to choose the WiBe method (developed by the German Interior Ministry), considering the privacy characteristics and the method's applicability. In particular, the quantitative effect measured how proactive threat assessment based on the way according to the nature of the businesses and organizations of privacy and possible investment decisions. This study proposes the 16 performance indicators, which turn out to be meaningful in terms of their materiality and feasibility by conducting focus group interviews of 25 experts on personal information protection.