• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.024 seconds

VANET에서의 보안 위협 및 대처 방안

  • Na, Jin-Han;Park, Young-Ho;Moon, Sang-Jae
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2009.05a
    • /
    • pp.13-19
    • /
    • 2009
  • VANET 환경에서는 차량간 잘못된 정보의 전송이 교통 혼잡 뿐 아니라 치명적인 사고를 일으킬 수 있으므로 VANET 환경에서의 응용들이 안전하고 신뢰성 있게 제공하기 위해서는 보안성 확보가 필수적으로 요구된다. 본 논문에서는 VANET에서 안전성을 제공하기 위하여 VANET에서의 보안 위협 및 공격 유형을 분석하고 대처방안을 제시하며 제공되는 대표적인 인증 프로토콜 방식을 분석한다.

  • PDF

Analyse of Trade-off for Implementing RFID Tag to Enhance Security (보안성 향상을 위한 RFID 태그 구현시의 Trade off 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.754-756
    • /
    • 2011
  • Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach the security risk analysis is process from the perspective of the RFID tag life cycle, identify the tag usage processes, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and then mitigate the risks.

  • PDF

Computer Database Security and Oracle Security Implementation (Data Base 보안과 Oracle 보안 구현)

  • Noh, SiChoon;Park, SangMin;Cho, SungBaek;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.7-18
    • /
    • 2003
  • Under database system environment, to accomplish database security is to ascertain the security threats and to choose the policy and mechanism of treating them. This study suggests the type and character of security threat and general method of prevention and cutting off the threats. Also, this study suggests the method of realization of Oracle security and additionally shows the method of Oracle security framework implemention. As an example, the verification method of Oracle security implementions are shown.

  • PDF

A Study on Security Requirements Specification in an Object-Oriented Development Environment (객체지향 개발환경에서의 보안 요구사항명세에 관한 연구)

  • Kim, Gi-Han;Chae, Soo-Young;Choi, Myeong-Ryeol;Park, Sang-Seo
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.67-73
    • /
    • 2005
  • Security requirements must be defined well to reduce software vulnerabilities in requirement specification phase. In this paper, we show how to specify security requirements in structured manner for object-oriented development methodology. Our method specifies security requirements through four phases: defining security objectives, identifying the threat, construct attack tree, and specifying security function. This method would help developers to specify security requirements and functions which software have to possess clearly and systematically.

  • PDF

A Study on the Countermeasure of the Security Threats for Coastal Passenger Ships (연안여객선의 보안위협 대응방안에 관한 연구)

  • Ju, Jong-Kwang;Lee, Eun-Kang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.3
    • /
    • pp.199-206
    • /
    • 2007
  • In analyzing the security threats and their management system and making questions on security awareness to the concerned parties in the field of coastal passenger ship, we draw its security vulnerability and the features of security threats. The countermeasures and security system are proposed in order to response the diverse security threats and to set up the security culture of coastal passenger ship.

  • PDF

Research Trends Analysis of Information Security using Text Mining (텍스트마이닝을 이용한 정보보호 연구동향 분석)

  • Kim, Taekyung;Kim, Changsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.19-25
    • /
    • 2018
  • With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.

Edge Security System for Factory Automation Devices (생산자동화설비의 종단보안 시스템 구조)

  • Hwang, Ho-Young;Kim, Seung-Cheon;Ro, Kwang-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.251-258
    • /
    • 2012
  • The conventional network security solutions for manufacturing or factory automation devices are concentrated on protecting the internal networks from the attacks of external networks. Recently, however, so called Day-zero attacks are increased; the threat from internal devices such as notebooks, USB devices are as critical as attacks from external networks. Thus a new security solution is needed to protect manufacturing devices from both external and internal threat. To this purpose, we propose an edge-security system to provide cost effective, integrated, and simple end-point security solution specialized for automated manufacturing devices, which may avoid the shortcomings of NAC.

Strategic Approaches and the Role of Naval Forces to Counter Increasing Maritime Threats (해양안보 위협 확산에 따른 한국 해군의 역할 확대방안)

  • Park, Chang-Kwoun
    • Strategy21
    • /
    • s.31
    • /
    • pp.220-250
    • /
    • 2013
  • South Korean national security strategy should be developed to effectively handle and counter increasing maritime threats and challenges. There are three major maritime threats South Korea faces today; maritime disputes on the EEZ boundary and Dokdo islet issues, North Korean threats, and international maritime security. Maritime disputes in the region are getting intensified and turned into a military confrontation after 2010. Now regional countries confront each other with military and police forces and use economic leverage to coerce the others. They are very eager to create advantageous de facto situations to legitimize their territorial claims. North Korean threat is also increasing in the sea as we witnessed in the Cheonan incident and Yeonpyoung shelling in 2010. North Korea resorts to local provocations and nuclear threats to coerce South Korea in which it may enjoy asymmetric advantages. The NLL area of the west sea would be a main hot spot that North Korea may continue to make a local provocation. Also, South Korean national economy is heavily dependent upon foreign trade and national strategic resources such as oil are all imported. Without an assurance on the safety of sea routes, these economic activities cannot be maintained and expanded. This paper argues that South Korea should make national maritime strategy and enhance the strength of naval forces. As a middle power, its national security strategy needs to consider all the threats and challenges not only from North Korea but also to maritime security. This is not a matter of choice but a mandate for national survival and prosperity. This paper discusses the importance of maritime security, changing characteristics of maritime threats and challenges, regional maritime disputes and its threat to South Korea's security, and South Korea's future security strategy and ways to enhance the role of naval forces. Our national maritime strategy needs to show middle and long term policy directions on how we will protect our maritime interests. Especially, it is important to build proper naval might to carry out all the roles and missions required to the military.

  • PDF

An Offensive Change of Japan's Defense Strategy and Strategic Implication to the South Korea Navy: Focusing on the Japan's Amphibious Rapid Deployment Brigade Creation (일본 방위전략의 공세적 변화가 한국 해군에 주는 전략적 함의 - 일본 '수륙기동단(水陸機動團)' 창설에 대한 분석을 중심으로 -)

  • Jung, Gwang-Ho
    • Strategy21
    • /
    • s.42
    • /
    • pp.83-113
    • /
    • 2017
  • After defeat in World War II, Japan's Peace Constitution committed the country to forego the acquisition of offensive military capabilities. However, in the midst of the post-cold war period, Japan began to change its security posture in line with the so-called 'normal state theory', which called for a more robust defense posture and expanded security activities. The second Abe administration promoted these security policies by issuing a National Security Strategy as well as a new National Defense Program Outline(NDPO) in 2013 and by establishing new security institutions such as the National Security Council. The Abe administration also adopted the new concept of a 'Unified Mobile Defense Force' in the 2013 which replaced the 'Dynamic Defense Force' as a new criteria for the Self-Defense Force's acquisition of military capabilities. In this new concept of military capabilities, the Ground Self-Defense Force is planning to replace existing divisions with mobile divisions and to form 'Amphibious Rapid Deployment Bridge' for the first time in 2018, which has long been taboo in Japan. Japan has experience a Marine Corps in the past. Likewise, an offensive changes in the military strategy can change the spectrum of strategy and 'Amphibious Rapid Deployment Bridge' plays a big role in this. Furthermore, Japan is increasing the Coast Guard's budget and capabilities in preparation for contingencies around the Senkaku islands (called the Diaoyu in Chinese). The South Korea navy should utilize Japan's changing security posture to deter immediate threat such as North Korea's military provocations and potential enemy threat such as China, Japan, Russia.

A Study on Threat Analysis of PC Security and Countermeasures in Financial Sector (금융권 PC보안 위협 분석 및 대응방안에 관한 연구)

  • Han, Kyung-Hee;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.283-290
    • /
    • 2015
  • As society has evolved to the knowledge and information society, the importance of internal information of the company has increased gradually. Especially in financial institutions which must maintain the trust of customers, the disclosure of inside information is a big problem beyond the a company's business information disclosure level to break down sales-based businesses because it contains personal or financial transaction information. Recently, since massive outflow of internal information are occurring in several enterprises, many companies including financial companies have been working a lot in order to prevent the leakage of customer information. This paper describes the internal information leakage incidents occurred in the finance companies, the PC security vulnerabilities exists despite the main security system and internal information leakage prevention and suggests countermeasures against increasing cyber infringement threats.