• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.033 seconds

China's Maritime Strategy (중국의 해양전략)

  • Lee, Won-Bong
    • The Journal of Information Technology
    • /
    • v.12 no.1
    • /
    • pp.35-56
    • /
    • 2009
  • After Chinese reforms and market opening, China actively started working on ways to attach importance to the ocean and it's maritime strategy has been developed and carried out by external and internal factors. We can take two things as external factors attributed to China's marine strategy. The first one is maritime environment change in the East Asian region and the second one is the strategic importance of Taiwanese Straits and the South China Sea. And we can take about national strategy, security strategy, and change of foreign policy as internal factors. China recognizes the ocean as a major step to achieve a goal of national development. The main goal of China's marine strategy in the 21st century is to secure marine transportation and marine resources and to make peaceful maritime environment in the ocean to keep up with their economic development by opening itself to the world. China has strengthened their defense abilities to act against threat of national security by modernizing sea forces and increased national power by building up the marine power. It is expected that China will continue to seek more aggressive maritime strategy on matters of national security as well as pour heir efforts into making economic development and obtaining energy resources. This will also be one factor making new dynamics between countries in and around the East Asian region.

  • PDF

A study on operation efficacy and security improvement through structural modification of CCTV network for bansong water purification plant (반송정수장 CCTV망의 구조개선을 통한 운영효율화 및 보안성 개선사례에 관한 연구)

  • Park, Yeunchul;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.32 no.2
    • /
    • pp.193-200
    • /
    • 2018
  • Owing to the development in information and communications technologies have improved the technology for high-speed transmission of massive data, which has changed closed-circuit television (CCTV) video transmission technology. In particular, digitization of the CCTV video format and streaming technology has made it possible to minimize transmission loss and integrate video transmission and camera control(pan/tilt). It has also become possible to provide additional services like remote emergency warning broadcasting with just Internet Protocol (IP). However, because of the structural problems of IP, these changes have also brought about the threat of hacking of CCTV monitoring systems. In this study, we propose a methode to optimize network management by examining cases of enhancement of operational efficiency and security by improving the structure of CCTV monitoring network.

Digital Forensic Model Suitable for Cloud Environment (클라우드 환경에 적합한 디지털 포렌식 수사 모델)

  • Lee, Gymin;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.15-20
    • /
    • 2017
  • Cloud computing is a service that to use IT resources (software, storage, server, network) through various equipment in an Internet-enabled environment. Due to convenience, efficiency, and cost reduction, the utilization rate has increased recently. However, Cloud providers have become targets for attack Also, Abuse of cloud service is considered as the top security threat. The existing digital forensic procedures are suitable for investigations on individual terminals. In this paper, we propose a new investigation model by analyzing the vulnerable points that occur when you investigate the cloud environment with the existing digital forensic investigation procedure. The proposed investigation model adds a way to obtain account information, and can apply public cloud and private cloud together. Cloud services are also easily accessible and are likely to destroy digital evidence. Therefore, the investigation model was reinforced by adding an account access blocking step.

Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique (사회공학기법을 이용한 피싱 공격 분석 및 대응기술)

  • Lee, Dong-Hwi;Choi, Kyong-Ho;Lee, Dong-Chun;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.171-177
    • /
    • 2006
  • The hacking aspect of recent times is changing, the phishing attack which uses a social engineering technique is becoming the threat which is serious in Information Security. It cheats the user and it acquires a password or financial information of the individual and organization. The phishing attack uses the home page which is fabrication and E-mail and acquires personal information which is sensitive and financial information. This study proposes the establishment of National Fishing Response Center, complement of relation legal system Critical intelligence distribution channel of individual and enterprise.

  • PDF

Secure Group Key Agreement for IoT Environment (사물인터넷(IoT) 환경을 위한 안전한 그룹 키 관리 기법)

  • Lee, Su-Yeon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.121-127
    • /
    • 2016
  • Recently, the popularity of smart devices such as Wi-Fi and LTE has increased the use ratio of wireless dramatically. On the other hand, the use ratio of wired internet is decreasing. The IoT(Internet of Things) is not only for people but also for communication between people and things, and communication between things and things by connecting to a wireless without choosing a place. Along with the rapid spread of the IoT there is a growing concern about the threat of IoT security. In this paper, the proposed scheme is a efficiency group key agreement in IoT environment that guarantees secure communication among light-weight devices. The proposed scheme securely be able to communication with the group devices who share a group key, generated by own secret value and the public value. Such property is suitable to the environment which are required a local area and a group.

Legal Issues in Application of the ISPS Code under Marine Cargo Insurance (해상적하보험에서 국제선박 및 항만시설 보안규칙의 적용상 법률적 쟁점)

  • Lee, Won-Jeong;Yoo, Byung-Ryong
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.3
    • /
    • pp.307-316
    • /
    • 2014
  • In view of the increased threat arising terrorism, the International Maritime Organization(IMO) adopted the International Ship and Port Facility Security Code (ISPS Code) which attached to the SOLAS Convention. The ISPS Code requires a comprehensive set of measures to enhance the security of ships and port facilities. For example, a shipowner must obtain the International Ship Security Certificate(ISSC). If the carrying vessel has not ISSC, the ship may be detained by the contracting governments. The Joint Cargo Committee(JCC) in London adopted the Cargo ISPS Endorsement, in which the assured who knowingly ships the cargoes on a non-ISPS Code compliant vessel will have no cover. However, where there is no the Cargo ISPS Endorsement in a Marine Cargo Insurance Policy and the cargo is carried by a non-ISPS Code certified vessel, the legal problem is whether or not it would constitute a breach of an implied warranty of seaworthiness and/or an implied warranty of legality. The purpose of this article is to analyze the potential legal issue on the relations between non-ISPS Code compliant vessel and two implied warranties under Marine Insurance Act(1906) in U.K.

Risk Analysis on Vulnerabilities and Threats for Domestic P2P Service Environments (국내 P2P 서비스 환경 하에서의 보안 취약점 및 위협 요소 분석)

  • Shin, Weon;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1447-1454
    • /
    • 2012
  • Recently P2P is the most popular network service on Internet and is applied various areas such as streaming, file sharing and software distribution, but there are many security threats depending on vulnerabilities by P2P network environments. Conceptually P2P network is a overlay network based on Internet, and it has security concerns of itself as well as those of Internet environments. In this paper, we analyze the vulnerabilities and threats for domestic P2P services through various experiments and describe their risk analysis. We expect that this work contributes to new domestic P2P services in consideration of service qualities and security vulnerabilities.

A Study for PKI Based Home Network System Authentication and Access Control Protocol (PKI 기반 홈 네트워크 시스템 인증 및 접근제어 프로토콜에 관한 연구)

  • Lee, Young-Gu;Kim, Jung-Jae;Kim, Hyun-Chul;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.592-598
    • /
    • 2010
  • A home network system is made up of subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. So, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this paper designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

Prevention of Terrorism Threat and Role of Security Intelligence in New Terrorism (테러리즘 위협 예방과 경호정보의 역할)

  • Baek, Jong Kap;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.1 no.1
    • /
    • pp.43-71
    • /
    • 2005
  • Terrorism is the use of violence, especially murder and bombing, in order to achieve political aim or to force a government to do something. Nowadays, instrument of mass destruction are smaller, cheaper, and more readily available. Cellular phones were used as timers in the attacks in Madrid last March. Hijacking an airplane is relatively inexpensive. Finally, the information revolution provides inexpensive means of communication and organization that allow groups once restricted to local and national police jurisdictions to become global. Al Qaeda is said to have established a network in fifty or more countries. These technological and ideological trends increased both the lethality and the difficulty of managing terrorism. Because of the unprecedented scale of Al Qaeda's attacks, the focus is properly on Islamic extremists. But it would be a mistake to limit our concern solely to Islamic terrorists, for that would ignore the way that technology is putting into the hands of deviant groups and individuals' destructive capabilities that were once limited primarily to governments and armies.

  • PDF

Information security risk: Application of the conjoint analysis (정보 보안 위험: 컨조인트 분석 활용 사례 연구)

  • Pak, Ro-Jin;Lee, Dong-Hoon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.2
    • /
    • pp.207-215
    • /
    • 2011
  • This Risk analysis on information related assets is conducted primarily according to the standards the Korea Information and Telecommunications Technology Association (TTA) or the International Organization for Standardization (ISO). The process is made of asset analysis, threat analysis, vulnerability analysis, and response plan analysis. The risk for information related assets belongs to the operational risks suggested by BIS (Bank for International Settlements) and the information related losses can be estimated in terms of BIS' suggestion. In this paper it is proposed that how to apply the method proposed by BIS to estimate the loss of information assets.