• 제목/요약/키워드: Threat Security

Search Result 1,066, Processing Time 0.025 seconds

A Study on Offensive and Security Method about Smart Meter in Smart Grid (Smart Grid에서 사용되는 Smart Meter에 대한 공격 및 보안 방법 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.111-113
    • /
    • 2011
  • 우리나라에서도 2010년 1월 25일 지식경제부의 "Smart Grid 로드맵" 확정으로 Smart Grid 사업이 진행 중이다. 그러나 정보통신 환경에서 발생하고 있는 다양한 공격에 대한 보안위협이 Smart Meter에서도 발생하고 있다. 따라서 본 논문에서는 Smart Grid에 사용되는 Smart Meter 공격을 분석하고 Smart Meter 방어 방안을 제시한다.

  • PDF

Security Threat Analyses of Electronic Signature Service by Mobile Device (모바일 디바이스를 이용한 전자서명 서비스의 보안 위협 분석)

  • Lee, Dongbum;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.635-636
    • /
    • 2009
  • 공개키 암호 시스템을 이용하는 공인인증서는 IT 기술의 발달과 함께 e-Banking, e-Commerce, e-Finance 등 다양한 분야에서 사용자 인증을 제공하는 수단으로 사용되고 있다. 그러나 최근에 다양한 해킹툴과 사용자 PC의 취약점을 이용하여 PC에 저장된 공인인증서가 유출되는 사고가 발생하면서 전자금융에 대한 안전성을 위협받고 있다. 따라서 본 논문에서는 기존에 공인인증서를 하드디스크에 저장하여 발생하였던 문제점을 해결하고자 모바일 디바이스를 이용하여 전자서명을 수행하는 MobiSign의 공인인증서 이동방식 및 전자서명 방식을 분석한다. 또한 모바일 환경에서 악성코드에 의해서 발생할 수 있는 MobiSign 서비스의 보안 위협을 분석한다.

Sabotage of Intruder Alarm System Loop

  • Karel Burda
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.23-31
    • /
    • 2023
  • This article discusses the sabotage of loops of intruder alarm systems. Although loop alarm systems are now gradually being replaced by digital alarm systems, they are still significantly present in practice. This paper describes two experimentally verified techniques for sabotaging balanced loops. The first technique is based on the jump replacement of the balancing resistor by a fake resistor. The second technique is based on inserting a series-parallel combination of two rheostats into the loop. By alternately changing the resistance of these rheostats, a state is reached where the balancing resistor is shorted by the parallel rheostat and replaced by the series rheostat. Sabotage devices for both attacks are technically simple and inexpensive, so they can be made and used by an amateur. Owners of loop alarm systems should become find out about this threat.

A Method for Deriving a Security Threat Response System in Smart Factory Area and Layer (스마트팩토리 영역 및 계층별 보안위협 대응체계 도출 기법)

  • In-Su Jung;Deuk-Hun Kim;Jin Kwak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.187-189
    • /
    • 2023
  • IoT(Internet of Things), 빅데이터, AI(Artificial Intelligence), 클라우드와 같은 ICT(Information and Communications Technology) 기술이 발전함에 따라 ICT와 제조기술이 융합된 스마트팩토리가 발전하고 있다. 이는 2개의 영역과 5개의 계층으로 구성되어 기타 환경들과 상이한 구조를 가지고 있으며, 각 영역·계층별 발생 가능한 보안위협도 상이하다. 또한, 각 영역과 계층이 연결됨에 따라 발생 가능한 보안위협이 증가하고 있으며, 이에 대한 효율적인 대응을 위하여 스마트팩토리 영역·계층별 환경을 고려한 대응체계 마련이 필요한 실정이다. 따라서, 본 논문에서는 스마트팩토리 영역·계층별 발생 가능한 보안위협을 분석하고, 이에 대응하기 위한 대응체계 도출 기법을 제안한다.

Secure and Resilient Framework for Internet of Medical Things (IoMT) with an Effective Cybersecurity Risk Management

  • Latifah Khalid Alabdulwahhab;Shaik Shakeel Ahamad
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.73-78
    • /
    • 2024
  • COVID-19 pandemic outbreak increased the use of Internet of Medical Things (IoMT), but the existing IoMT solutions are not free from attacks. This paper proposes a secure and resilient framework for IoMT, it computes the risk using Risk Impact Parameters (RIP) and Risk is also calculated based upon the Threat Events in the Internet of Medical Things (IoMT). UICC (Universal Integrated Circuit Card) and TPM (Trusted Platform Module) are used to ensure security in IoMT. PILAR Risk Management Tool is used to perform qualitative and quantitative risk analysis. It is designed to support the risk management process along long periods, providing incremental analysis as the safeguards improve.

Comparison of Users' Perception of Information Security Elements on Computer Virus Between Large and Small-and-Medium Companies (대기업과 중소기업 간의 정보보안 요소에 대한 사용자의 인지 비교: 컴퓨터 바이러스를 중심으로)

  • Kim, Jong-Ki;Jeon, Jin-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.79-92
    • /
    • 2006
  • Computer virus is one of the most common information security problems in the information age. This study investigates the difference of users' perception of security elements between large companies and small-and-medium companies on the subject of computer virus. Based on t-test, no significant difference is found in users' perception on security threat and security risk While users satisfy with the level of security policy, there is a significant difference on the level of security policy recognition between the two sizes of companies. Moreover, there are significant differences on information assets, security vulnerability and security effectiveness, which implies difference in the users' perception on importance of assets, exposure to threats and computer virus prevention efforts between large and small-and-medium companies.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

Real-time Abnormal Behavior Detection System based on Fast Data (패스트 데이터 기반 실시간 비정상 행위 탐지 시스템)

  • Lee, Myungcheol;Moon, Daesung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1027-1041
    • /
    • 2015
  • Recently, there are rapidly increasing cases of APT (Advanced Persistent Threat) attacks such as Verizon(2010), Nonghyup(2011), SK Communications(2011), and 3.20 Cyber Terror(2013), which cause leak of confidential information and tremendous damage to valuable assets without being noticed. Several anomaly detection technologies were studied to defend the APT attacks, mostly focusing on detection of obvious anomalies based on known malicious codes' signature. However, they are limited in detecting APT attacks and suffering from high false-negative detection accuracy because APT attacks consistently use zero-day vulnerabilities and have long latent period. Detecting APT attacks requires long-term analysis of data from a diverse set of sources collected over the long time, real-time analysis of the ingested data, and correlation analysis of individual attacks. However, traditional security systems lack sophisticated analytic capabilities, compute power, and agility. In this paper, we propose a Fast Data based real-time abnormal behavior detection system to overcome the traditional systems' real-time processing and analysis limitation.

Design of a Bounded-wave EMP Simulator Antenna (Bounded-wave EMP Simulator 안테나의 설계)

  • Sun, Da-Young;Choi, Hak-Keun;Lim, Seong-Bin;Jang, Jae-Woong;Kim, Tae-Yoon;Choi, Geun-Kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.87-93
    • /
    • 2011
  • A threat of the EMP(Electromagnetic Pulse) is recently increasing, so the development of electromagnetic security technology against the EMP is needed. However, the state of the domestic electromagnetic security technology against the EMP is lower level than the foreign. In this paper, the bounded-wave EMP simulator antenna for the development of electromagnetic security technology against a threat of the EMP is designed. The structure of the designed antenna is from a sort of the basic form of the bounded-wave EMP simulator such as a parallel-plate simulator for testing EMP immunity performance within the EUT(Equipment Under Test). The design processes of the designed simulator is including wave launcher, transmission line and termination taper. In the working volume of the designed antenna, the test object within 30 cm is forming predominant TEM field, so it is confirmed that the designed EMP simulator antenna can be used as the EMP simulator.

Development of a Risk Assessment Program for Chemical Terrorism (화학적 테러에 대한 위험성 평가 프로그램 개발)

  • Lee, Younghee;Kim, Eunyong;Kim, Jinkyung;Moon, Il
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.1
    • /
    • pp.63-67
    • /
    • 2008
  • This study focuses on assessing the security ri sk or the terrorism in chemical process industries. This research modifies conventional method for assessing the terrorism risk. The risk assessment method is developed and it is implemented as software to analyze the possibility of terrorism and sabotage. This program includes five steps; asset characterization, threat assessment, vulnerability analysis, risk assessment and new countermeasures. It is a systematic, risk based approach in which risk is a function of the severity of consequences of an undesired event, the likelihood of adversary attack, and the likelihood of adversary success in causing the undesired event. The reliability of the program is verified using a dock zone case. The case dock zone includes a storage farm, a manufacturing plant, an electrical supply utility, a hydrotreater unit, many containers, and administration buildings. This study represents chemical terrorism response technology, the prevention plan, and new countermeasure to mitigate by using risk assessment methods in the chemical industry and public sector. This study suggests an effective approach to the chemical terrorism response management.

  • PDF