• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.032 seconds

A Case Study on the Threat of Small Drone and the Development of Counter-Drone System (소형드론 위협 사례와 대드론체계 발전방향)

  • Kang-Il Seo;Ki-Won Kim;Jong-Hoon Kim;Sang-Keun Cho;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.327-332
    • /
    • 2023
  • On December 26, 2022, North Korea's drone provocation resumed for the first time in eight years. The threat covered not only the Seoul metropolitan area but also the no-fly zone for the presidential office's security, and the South Korean military's response to it is not appropriate, which is a major controversy. In the midst of this, problems caused by the prohibition of small drones' flight and illegal intrusion into restricted areas are increasing in Korea, and the threat is becoming a reality, such as being used for terrorist attacks abroad. In this paper, the concept of "Counter-Drone" and related technologies were considered for these drone threats, and implications were derived through domestic and overseas small drone threats, and the direction of development of the Counter-Drone system was presented. North Korea's drone threat is expected to be more diversified, massified, and advanced, resulting in bolder attacks and provocations. Therefore, the South Korean military should push for early powering of the integrated control system and the conter drone system, joint and military cooperation in response to the threat of small drones, and the ability to carry out joint operations between South Korea and the U.S.

An Analysis of Security Threat and Network Attack in IPv6 (IPv6 환경의 보안 위협 및 공격 분석)

  • Jung, B.H.;Lim, J.D.;Kim, Y.H.;Kim, K.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.22 no.1 s.103
    • /
    • pp.37-50
    • /
    • 2007
  • 차세대 인터넷 표준인 IPv6가 제정되고 보급되기 시작하면서 IPv6에서의 보안이 중요한 이슈로 등장하고 있다. IPv6는 기존의 IPv4와 달리 IPsec을 기본적으로 지원하여 보안성이 강화될 것으로 예상하고 있으나 IPv6 환경으로의 전환, IPv6 프로토콜 스펙의 변경 등의 요인으로 인하여 보안에 대한 필요성이 증대되고 있다. 본 고에서는 IPv6환경의 보안위협 및 공격들을 분석하고 침입탐지/차단 기술의 관점에서 이러한 보안문제를 해결하기 위한 방법을 기술한다.

Unified Threat Management System Security Evaluation Model (통합보안관리 시스템 보안성 평가모델)

  • Kang, Sang-Won;Jeon, In-Oh;Yang, Hae-Sool
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.578-581
    • /
    • 2009
  • 본 논문에서는 통합보안관리 시스템에 대해서 주요 기능을 분석하고 시장동향을 조사하였으며, 기존의 소프트웨어 품질 평가 기술 및 표준화에 관한 연구를 추진하고, 통합보안관리 시스템의 보안성 품질 평가 모델을 개발하였다. 본 연구를 통하여 도출된 통합보안관리 시스템의 보안성 품질 평가 모델을 통하여 통합보안관리 시스템의 품질을 향상시키는데 중요한 역할을 할 것으로 본다.

  • PDF

IT와 OT의 연계 증가에 따른 보안 취약점 개선 방안

  • Han, Eun Hye
    • Review of KIISC
    • /
    • v.30 no.5
    • /
    • pp.55-60
    • /
    • 2020
  • 본 논문에서는 일반적으로 외부와 격리된 환경이라고 생각하는 발전소, 공장과 같은 OT(Operational Technology) 환경에서 IT(Information Technology) 환경과 커넥션이 많아짐에 따라 각종 악성코드, 해커, Threat Actor 등으로 인해 취약해 질 수밖에 없는 보안환경과 이에 대한 대응 방안을 소개하고자 한다. 본고에서는 최근 있었던 OT 관련사고 사례와 OT의 구성 항목에 대한 정의, IT와 차별되는 OT의 특징, 그리고 대응 방안으로써 보안 아키텍처, 가시성 확보, 관리 및 거버넌스에 대해 살펴보았다.

The Design of OT Threat Detection Architecture using Network Fingerprinting (네트워크 핑거프린팅을 이용한 OT 위협탐지 구조 설계)

  • Kim, Minsoo;Yu, Young-Rok;Choi, Kyongho;Jeon, Deokjo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.205-208
    • /
    • 2021
  • 4차 산업혁명 시대에는 사이버 시스템과 물리 시스템이 연결된다. ICS(산업제어시스템)에서는 기존의 위협 외에 IT 환경에서 발생할 수 있는 보안 위협에 직면하게 된다. 따라서 OT와 IT가 결합되는 환경에서의 위협에 대한 대응 기술이 필요하다. 본 논문에서는 OT/IT 네트워크에서의 핑거프린팅을 추출하고 이를 기반으로 OT 위협을 탐지하는 구조를 설계한다. 이를 통하여 ICS에서의 보안 위협에 대응하고자 한다.

Supercomputer security requirements by Advanced Persistent Threat(APT) scenario analysis (지능형 지속 위협(APT) 시나리오 분석에 의한 슈퍼컴퓨터 보안 요구 사항)

  • Jang, Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.109-112
    • /
    • 2021
  • 매년 슈퍼컴퓨터를 표적으로 공격이 증가하고 있고, 공격의 방식은 날로 진화하고 있다. 슈퍼컴퓨터를 대상으로 하는 공격에 대응하기 위해 기존의 연구는 공격 특성을 분석하여 맞춤형 대책을 제시하거나 분석을 통해 보안 요구사항을 도출하였다. 하지만 연구과정에서 APT life cycle 관점이 반영되지 않으면, 지능형 지속 위협인 APT를 인지 및 대응하기 어려운 문제점이 있다. 이러한 문제점을 해결하기 위해, 본 논문은 APT 시나리오 기반의 위협 모델링 분석을 통해 슈퍼컴퓨터 보안 요구사항을 도출 한다.

A Study on Measures of Air Terrorism: Focused on Security (항공테러 대응에 관한 소고: 경비를 중심으로)

  • Kwon, Jeonghoon
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.1
    • /
    • pp.10-17
    • /
    • 2012
  • The purpose of this study is to make people acknowledge the danger of the air terror and provide measures to prevent a recurrence of the accident and find required security. Also, the air terror is categorized into aircraft and airport and take steps to come up with preventive measures against the air terror by finding a countermeasure and precaution. The following steps should be checked to take precautionary measures against the air terror. major security crackdown and the need for a further security check should be conducted to prevent terrorists from boarding the aircraft, security around the airport needs to be tightened up by training the airport workers and promoting emergency situations, airport sheriffs and armed guards should be on patrol for the safety of the cabin, new measures of efficient security for in and around the airport and its facilities should be set up to tighten up security of baggage.

A Measures to Converge Manage an Efficient Information Security Management System for Information Security Experts Manpower (정보보호 인력양성을 위한 효율적인 정보보호관리체계의 융합 관리 방안)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.81-86
    • /
    • 2014
  • The development in IT technology has brought about various services that are on offer based on a new service model. But such new services have increased security risks. The government is operating a program to foster experts in information security to protect assets from the threat of such risks, too. Society's awareness on the importance of information security has also grown, leading to various courses to train such personnel, including membership clubs for the fostering of such specialists. This study seeks to suggest a method that efficiently manages the convergence of running a curriculum on ISMS(information security management systems) and a club that focuses on information protection. Such converged information security courses are expected to contribute to a safer IT-based society.

Design and Implementation of App Control System for Improving the Security of the Mobile Application (모바일 애플리케이션의 보안성 향상을 위한 App 제어 시스템 설계 및 구현)

  • Lee, Yu-Jun;Jang, Young-Hwan;Park, Seok-Cheon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.2
    • /
    • pp.243-250
    • /
    • 2016
  • Recently, with the rise of the mobile device, from mobile devices the user who owns the security, speed up the implementation of the guarantee management environment as businesses and individual equipment for the effcient management of the existing system, but the introduction of the MDM MDM App management features administrators to register the App until you can't prvent the security threat. Therefore, this paper addresses these issues in order to improve the security of your application for the control system. The proposed system is a function of the MDM authentication technology to design analysis, and system architecture to help prevent information disclosure within the design and implementation of Mobile-based application control system. Implementation of the control system to assess the security of the international common criteria security evaluation complete the test scenarios on the basis of the test items. An average of 40% of the test results to verify the results of this enhanced security.

A Study on Security Analysis and Security Design for IPv6 Transition Mechanisms (IPv6 전환 기술의 보안 위협 분석 및 보안 설계에 대한 연구)

  • Choi, In-Seok;Kim, Young-Han;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.689-697
    • /
    • 2005
  • The IETF has created the v6ops Working Group to assist IPv6 transition and propose technical solutions to achieve it. But it's quite problem which security consideration for a stage of IPv4/IPv6 transition and co-existence. There are new security problem threat that it caused by the characteristics of heterogeneity. In this paper, we describe IPv6 transition mechanisms and analyze security problem for IPv6 transition mechanism. also we propose security consideration and new security mechanism. We analyzed DoS and DRDoS in 6to4 environment and presented a address sanity check as a solution. We also showed an attack of address exhaustion in address allocation server. To solve this problem, we proposed challenge-response mechanism in DSTM.