• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.026 seconds

Cyber Security Considerations and Countermeasures for UAM Air Traffic Management Infrastructure (UAM 항공교통관리 인프라의 사이버보안 고려사항 및 대응방안)

  • Kyungwook Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.6
    • /
    • pp.17-29
    • /
    • 2023
  • In this paper, we aim to propose cyber security considerations and countermeasures for infrastructure and services in the UAM(Urban Air Mobility) Air Traffic Management field, which is one of the key elements of the UAM market that has not yet bloomed. Air traffic management is an important factor for safe navigation and social acceptance of UAM. In order to realize air traffic management, infrastructure and services based on solid network connectivity must be established. And for industries where connectivity is the core component, it can become an infiltration route for cyber threats. Therefore, cyber security is essential for the infrastructure and services. In detail, we will look into the definition of the existing air traffic management field and the cyber threats. In addition, we intend to identify cyber security threat scenarios that may occur in the newly designed UAM air traffic management infrastructure. Moreover, in order to study the cyber security countermeasures of the UAM air traffic management infrastructure, there will be analysis of the UAM operation concept. As a result, countermeasures applicable to the infrastructure and service fields will be suggested by referring to the cyber security frameworks.

Study on Consideration of Artificial Rain Technology in Aspect of National Security (국가안보측면으로서의 인공강우기술 고찰)

  • Choi, Kee-Nam;Lee, Sun-Je
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.99-106
    • /
    • 2012
  • March 11, 2010, in Japan located over East Sea of Korea, due to the strong earthquake tsunami, Fukushima Nuclear Power Plant was ceased and exploded resulting in leaking radioactive substances. Even though it was an accident happened in a nation, leaked radioactive substances were spread across the world moving along ocean currents and air current. Our nation also had terror and confusion about radioactive rain after the accident, and even though a year has been passed by after the accident, the problem on the radioactive contamination isn't solved. So to speak, nuclear accident of neighboring country is a threat to our nation but not only Japan but also Chinese ocean across the West Sea has nuclear power plants. Beside threat of nuclear accident of neighboring countries, North Korea in military confrontation is the world 3rd country holding chemical and biological weapons and can spray the biological weapons to South Korea at any time like Yeonpyeong-do bombard provocation in November, 2010. The study is the strategy confronting such threats and grafted artificial rain technology which is weather control technology. Since radioactive substances on radioactive accidents and North Korean biological weapons can differ in the density by the weather condition, only artificial rain technology can remove the threat perfectly but it is worth to try as the method to reduce damage and in the aspect of psychology. To use the artificial rain technology in the aspect of national security to acquire the public safety, research institutes such ADD should fulfill active and symbolic technology research development.

The Integrated Cyber SRM(Security Risk Monitoring) System Based on the Patterns of Cyber Security Charts

  • Lee, Gang-Soo;Jung, Hyun Mi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.99-107
    • /
    • 2019
  • The "Risk management" and "Security monitoring" activities for cyber security are deeply correlated in that they prepare for future security threats and minimize security incidents. In addition, it is effective to apply a pattern model that visually demonstrates to an administrator the threat to that information asset in both the risk management and the security system areas. Validated pattern models have long-standing "control chart" models in the traditional quality control sector, but lack the use of information systems in cyber risk management and security systems. In this paper, a cyber Security Risk Monitoring (SRM) system that integrates risk management and a security system was designed. The SRM presents a strategy for applying 'security control' using the pattern of 'control charts'. The security measures were integrated with the existing set of standardized security measures, ISMS, NIST SP 800-53 and CC. Using this information, we analyzed the warning trends of the cyber crisis in Korea for four years from 2014 to 2018 and this enables us to establish more flexible security measures in the future.

A Study on Efficient Encryption for Message Communication between Devices (기기 간 메시지 부분 암호화 연구)

  • Lee, Yang-Ho;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.19-26
    • /
    • 2014
  • The advent of smart phones brought adverse effect between devices recently. For example, adverse effects of info-communication with advent of computer. Also, hacking threat aiming cyber space that is getting more advanced is spreading in terms of range and danger, so that it reaches the level that the nation has to concern. In this circumstance, crimes involving info-technology is now problem in society. As internet technology advances, it enlarges the range of hacker's threat to not only smart phones, but ships, aircrafts, buildings, and cars. It could be seen as social threat of between human and human, between machine and machine, and between human and machine. This study discuss these problems.

Threat Issues of Intelligent Transport System in the V2X Convergence Service Envrionment (V2X 융합서비스 환경에서 지능형차량시스템의 위협 이슈)

  • Hong, Jin-Keun
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.5
    • /
    • pp.33-38
    • /
    • 2015
  • In a V2X convergence service environment, the principal service among infotainment services and driver management services must be supported centering on critical information of the driver, maintenance manager, customer, and anonymous user. Many software applications have considered solutions to be satisfied the specific requirements of driving care programs, and plans. This paper describes data flow diagram of a secure clinic system for driving car diagnosis, which is included in clinic configuration, clinic, clinic page, membership, clinic request processing, driver profile data, clinic membership data, and clinic authentication in the V2X convergence service environment. It is reviewed focusing on security threat issue of ITS diagnostic system such as spoofing, tampering, repudiation, disclosure, denial of service, and privilege out of STRIDE model.

A Study on Policy for cost estimate of Security Sustainable Service in Information Security Solutions (정보보안솔루션 보안성 지속 서비스 대가 산정 정책 연구)

  • Jo, Yeon-ho;Lee, Yong-pil;Lim, Jong-in;Lee, Kyoung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.905-914
    • /
    • 2015
  • Once information security solution is implemented, it requires many services other than just general user management, such as malicious code analysis and security updated for consistent security against external threats or attacks, analysis of threat and attack, effectivity management of obtained security assurance, and advisory activities of security technical professionals. However, even if information security solutions provide those extra services, they are not properly treated in real market. Thus, for the security sustainable services, this study analyzes the service status of domestic information security, and suggest policy measure of price which could reflected the characteristics of information security solutions.

A Study on ICT Security Change and CPS Security System in the 4th Industry Age (4차 산업 시대의 ICT 보안 변화와 CPS 보안 시스템에 관한 연구)

  • Joo, Heon-Sik
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.293-300
    • /
    • 2018
  • This study explored the security of Industry 4.0 such as security trends and security threats in Industry 4.0, and security system in Industry 4.0. The threat elements in Industry 4.0 are changing from ICT to IoT and to CPS security, so security paradigm and security System should change accordingly. In particular, environmental and administrative security are more important to solve CPS security. The fourth industry-age security should change to customized security for individual systems, suggesting that the security technology that combines hardware and software in product production design should change from the beginning of development. The security system of the fourth industry proposes design and implementation as a CPS security system as a security system that can accommodate various devices and platforms from a security system in a single system such as a network to an individual system.

The Trend and Implications of the Publication of China's Defense and Security White Papers (중국의 국방·안보백서 발간의 추이와 함의)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.3 no.1
    • /
    • pp.39-76
    • /
    • 2019
  • This paper is to analyze the trend and implications of the publication of China's defense and security white papers. To this end the paper is composed of 5 chapters titled instruction; publication details and composition of China's defense and security white paper; the gist of the white paper on national defense and security during the Chinese president Xi Jinping era; the implications of Chinese white paper on national defense and security during the Chinese president Xi Jinping era; and conclusion. The Chinese Ministry of National Defense had published seven books every two years since 1998 to 2010. In 1995, the ministry published a white paper titled 'China's arms control and disarmament' for the first time. In 2013, it published a white paper titled 'The Diversified Employment of China's Armed Forces' and 'China's Military Strategy' in 2015. All have the common characteristic of being a propaganda policy reflecting China's strategic calculations. It seems that China has began to publish defense white papers in a proactive manner, due to the following factors: (1)pressure on China to demand military transparency from neighboring countries such as the United States; (2)the erosion of the 'China threat.' and (3)confidence in the achievement of China's military modernization. The 'active defensive strategy' and the 'strong defense strategy' of Si Jinping are implied in the words "China's dream is a dream of a powerful country and dream of a strong nation is essential to construct a strong nation." His these strategies have raised security concerns for neighboring countries. We need to maintain and reinforce strong ROK-US security cooperation, and hedging strategies to harmoniously promote ROK-China economic cooperation.

Study on security framework for cyber-hacking control facilities (제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구)

  • Lee, Sang-Do;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.285-296
    • /
    • 2018
  • Among many hacking attempts carried out in the past few years, the cyber-attacks that could have caused a national-level disaster were the attacks against nuclear facilities including nuclear power plants. The most typical one was the Stuxnet attack against Iranian nuclear facility and the cyber threat targeting one of the facilities operated by Korea Hydro and Nuclear Power Co., Ltd (Republic of Korea; ROK). Although the latter was just a threat, it made many Korean people anxious while the former showed that the operation of nuclear plant can be actually stopped by direct cyber-attacks. After these incidents, the possibility of cyber-attacks against industrial control systems has become a reality and the security for these systems has been tightened based on the idea that the operations by network-isolated systems are no longer safe from the cyber terrorism. The ROK government has established a realistic control systems defense concept and in the US, the relevant authorities have set up several security frameworks to prepare for the threats. This paper presented various cyber security attack cases and their scenarios against control systems, along with the analysis of countermeasures for them. Though this task, we attempt to identify the items that need to be considered when designing a domestic security framework to improve security and secure stability.

A Study on the Partnership of the Japanese Police and Private Security (일본 경찰과 민간의 협력에 관한 연구)

  • Ahn, Hwang Kwon;Ahn, Chung Joon
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.61-70
    • /
    • 2012
  • The security law and security industry of Japan have a great impact on Korea. In a modern sense, there are little large disparities between the two nations in the history and development of private security. However, the way they look at private security is not the same in large part. In Japan, private security companies are highly regarded by Japanese people as organizations that guarantee their safety, owing to the efforts of private security companies themselves, the National Security Association and civic groups. Private security has especially been approved and supported since it was decided in the anticrime cabinet council in December, 2003, in line with the action plan for the realization of anticrime society to boost private security as an industry to ensure people's safety in daily routine life by curbing crimes that might pose a threat to peaceful life. Afterwards, there has been a dynamic collaboration between the Japanese police and private security in terms of education, crime prevention, disaster prevention/restoration and everyday life safety. As for Korea, the necessity of cooperation between private security and the police is increasingly stressed, and it's required to strengthen their partnership to ensure successful crime prevention in consideration of Japanese partnership cases. In Japan, the police, civic groups, the security association and security companies make every effort to satisfy Japanese people's safety needs in diverse ways and take disaster-prevention measures as well.