• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.03 seconds

Quantum Circuit Implementation of the LED Block Cipher with Compact Qubit (최적의 큐빗수를 만족하는 LED 블록암호에 대한 양자 회로 구현)

  • Min-ho Song;Kyung-bae Jang;Gyeong-ju Song;Won-woong Kim;Hwa-Jeong Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.383-389
    • /
    • 2023
  • The development of quantum computers and the emergence of quantum algorithms such as Shor's algorithm and Grover's algorithm pose a significant threat to the security of existing cipher systems. Quantum algorithms can efficiently perform mathematical operations that take a long time on traditional computers. This characteristic can significantly reduce the time it takes to break modern cipher systems that rely on mathematical problems. To prepare for quantum attacks based on these algorithms, existing ciphers must be implemented as quantum circuits. Many ciphers have already been implemented as quantum circuits, analyzing quantum resources required for attacks and verifying the quantum strength of the cipher. In this paper, we present quantum circuits for LED lightweight block ciphers and explain each function of quantum circuits. Thereafter, the resources for the LED quantum circuit are estimated and evaluated by comparing them with other lightweight block ciphers.

The Mitigation of Information Security Role Stress: The Role of Information Security Policy Goal Setting and Regulatory Focus (정보보안 업무 스트레스의 완화: 정보보안 정책 목표 설정 및 조절초점의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1177-1188
    • /
    • 2023
  • Socially, organizations are required to maintain strict management of their information resources and invest in the adoption of information security (IS) technologies and policies. However, the ongoing threat of information exposure by employees persists within the organization. This study aims to identify the role stress that employees may experience due to strict IS policies and propose methods for reducing its negative impact. Specifically, our study suggests a mechanism for mitigating role stress by incorporating factors related to IS policy goal setting and work regulatory focus. We conducted a survey among workers in the financial industry, where IS policies are rigorously enforced, and tested our research hypotheses using a sample of 309 participants. The results indicate that increasing the difficulty and specificity of IS policy goals reduces role stress (conflict and ambiguity) and positively influences employees' intention to comply with IS policies. Furthermore, individual work promotion focus moderated the relationship between role stress and IS compliance intention. These findings have important implications for organizations seeking to strengthen their IS compliance among employees and inform the development of effective IS strategies.

A Study on Vulnerability for Isolation Guarantee in Container-based Virtualization (컨테이너 기반 가상화에서 격리성 보장을 위한 취약성 고찰)

  • Dayun Yum;Dongcheon Shin
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.23-32
    • /
    • 2023
  • Container-based virtualization has attracted many attentions as an alternative to virtual machine technology because it can be used more lightly by sharing the host operating system instead of individual guest operating systems. However, this advantage may owe some vulnerabilities. In particular, excessive resource use of some containers can affect other containers, which is known as the noisy neighbor problem, so that the important property of isolation may not be guaranteed. The noisy neighbor problem can threat the availability of containers, so we need to consider the noisy neighbor problem as a security problem. In this paper, we investigate vulnerabilities on guarantee of isolation incurred by the noisy neighbor problem in container-based virtualization. For this we first analyze the structure of container-based virtualization environments. Then we present vulnerabilities in 3 functional layers and general directions for solutions with limitations.

The lesson From Korean War (한국전쟁의 교훈과 대비 -병력수(兵力數) 및 부대수(部隊數)를 중심으로-)

  • Yoon, Il-Young
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.49-168
    • /
    • 2010
  • Just before the Korean War, the total number of the North Korean troops was 198,380, while that of the ROK(Republic of Korea) army troops 105,752. That is, the total number of the ROK army troops at that time was 53.3% of the total number of the North Korean army. As of December 2008, the total number of the North Korean troops is estimated to be 1,190,000, while that of the ROK troops is 655,000, so the ROK army maintains 55.04% of the total number of the North Korean troops. If the ROK army continues to reduce its troops according to [Military Reform Plan 2020], the total number of its troops will be 517,000 m 2020. If North Korea maintains the current status(l,190,000 troops), the number of the ROK troops will be 43.4% of the North Korean army. In terms of units, just before the Korean War, the number of the ROK army divisions and regiments was 80% and 44.8% of North Korean army. As of December 2008, North Korea maintains 86 divisions and 69 regiments. Compared to the North Korean army, the ROK army maintains 46 Divisions (53.4% of North Korean army) and 15 regiments (21.3% of North Korean army). If the ROK army continue to reduce the military units according to [Military Reform Plan 2020], the number of ROK army divisions will be 28(13 Active Division, 4 Mobilization Divisions and 11 Local Reserve Divisions), while that of the North Korean army will be 86 in 2020. In that case, the number of divisions of the ROK army will be 32.5% of North Korean army. During the Korean war, North Korea suddenly invaded the Republic of Korea and occupied its capital 3 days after the war began. At that time, the ROK army maintained 80% of army divisions, compared to the North Korean army. The lesson to be learned from this is that, if the ROK army is forced to disperse its divisions because of the simultaneous invasion of North Korea and attack of guerrillas in home front areas, the Republic of Korea can be in a serious military danger, even though it maintains 80% of military divisions of North Korea. If the ROK army promotes the plans in [Military Reform Plan 2020], the number of military units of the ROK army will be 32.5% of that of the North Korean army. This ratio is 2.4 times lower than that of the time when the Korean war began, and in this case, 90% of total military power should be placed in the DMZ area. If 90% of military power is placed in the DMZ area, few troops will be left for the defense of home front. In addition, if the ROK army continues to reduce the troops, it can allow North Korea to have asymmetrical superiority in military force and it will eventually exert negative influence on the stability and peace of the Korean peninsular. On the other hand, it should be reminded that, during the Korean War, the Republic of Korea was attacked by North Korea, though it kept 53.3% of troops, compared to North Korea. It should also be reminded that, as of 2008, the ROK army is defending its territory with the troops 55.04% of North Korea. Moreover, the national defense is assisted by 25,120 troops of the US Forces in Korea. In case the total number of the ROK troops falls below 43.4% of the North Korean army, it may cause social unrest about the national security and may lead North Korea's misjudgement. Besides, according to Lanchester strategy, the party with weaker military power (60% compared to the party with stronger military power) has the 4.1% of winning possibility. Therefore, if we consider the fact that the total number of the ROK army troops is 55.04% of that of the North Korean army, the winning possibility of the ROK army is not higher than 4.1%. If the total number of ROK troops is reduced to 43.4% of that of North Korea, the winning possibility will be lower and the military operations will be in critically difficult situation. [Military Reform Plan 2020] rums at the reduction of troops and units of the ground forces under the policy of 'select few'. However, the problem is that the financial support to achieve this goal is not secured. Therefore, the promotion of [Military Reform Plan 2020] may cause the weakening of military defence power in 2020. Some advanced countries such as Japan, UK, Germany, and France have promoted the policy of 'select few'. However, what is to be noted is that the national security situation of those countries is much different from that of Korea. With the collapse of the Soviet Unions and European communist countries, the military threat of those European advanced countries has almost disappeared. In addition, the threats those advanced countries are facing are not wars in national level, but terrorism in international level. To cope with the threats like terrorism, large scaled army trops would not be necessary. So those advanced European countries can promote the policy of 'select few'. In line with this, those European countries put their focuses on the development of military sections that deal with non-military operations and protection from unspecified enemies. That is, those countries are promoting the policy of 'select few', because they found that the policy is suitable for their national security environment. Moreover, since they are pursuing common interest under the European Union(EU) and they can form an allied force under NATO, it is natural that they are pursing the 'select few' policy. At present, NATO maintains the larger number of troops(2,446,000) than Russia(l,027,000) to prepare for the potential threat of Russia. The situation of japan is also much different from that of Korea. As a country composed of islands, its prime military focus is put on the maritime defense. Accordingly, the development of ground force is given secondary focus. The japanese government promotes the policy to develop technology-concentrated small size navy and air-forces, instead of maintaining large-scaled ground force. In addition, because of the 'Peace Constitution' that was enacted just after the end of World War II, japan cannot maintain troops more than 240,000. With the limited number of troops (240,000), japan has no choice but to promote the policy of 'select few'. However, the situation of Korea is much different from the situations of those countries. The Republic of Korea is facing the threat of the North Korean Army that aims at keeping a large-scale military force. In addition, the countries surrounding Korea are also super powers containing strong military forces. Therefore, to cope with the actual threat of present and unspecified threat of future, the importance of maintaining a carefully calculated large-scale military force cannot be denied. Furthermore, when considering the fact that Korea is in a peninsular, the Republic of Korea must take it into consideration the tradition of continental countries' to maintain large-scale military powers. Since the Korean War, the ROK army has developed the technology-force combined military system, maintaining proper number of troops and units and pursuing 'select few' policy at the same time. This has been promoted with the consideration of military situation in the Koran peninsular and the cooperation of ROK-US combined forces. This kind of unique military system that cannot be found in other countries can be said to be an insightful one for the preparation for the actual threat of North Korea and the conflicts between continental countries and maritime countries. In addition, this kind of technology-force combined military system has enabled us to keep peace in Korea. Therefore, it would be desirable to maintain this technology-force combined military system until the reunification of the Korean peninsular. Furthermore, it is to be pointed out that blindly following the 'select few' policy of advanced countries is not a good option, because it is ignoring the military strategic situation of the Korean peninsular. If the Republic of Korea pursues the reduction of troops and units radically without consideration of the threat of North Korea and surrounding countries, it could be a significant strategic mistake. In addition, the ROK army should keep an eye on the fact the European advanced countries and Japan that are not facing direct military threats are spending more defense expenditures than Korea. If the ROK army reduces military power without proper alternatives, it would exert a negative effect on the stable economic development of Korea and peaceful reunification of the Korean peninsular. Therefore, the desirable option would be to focus on the development of quality of forces, maintaining proper size and number of troops and units under the technology-force combined military system. The tableau above shows that the advanced countries like the UK, Germany, Italy, and Austria spend more defense expenditure per person than the Republic of Korea, although they do not face actual military threats, and that they keep achieving better economic progress than the countries that spend less defense expenditure. Therefore, it would be necessary to adopt the merits of the defense systems of those advanced countries. As we have examined, it would be desirable to maintain the current size and number of troops and units, to promote 'select few' policy with increased defense expenditure, and to strengthen the technology-force combined military system. On the basis of firm national security, the Republic of Korea can develop efficient policies for reunification and prosperity, and jump into the status of advanced countries. Therefore, the plans to reduce troops and units in [Military Reform Plan 2020] should be reexamined. If it is difficult for the ROK army to maintain its size of 655,000 troops because of low birth rate, the plans to establish the prompt mobilization force or to adopt drafting system should be considered for the maintenance of proper number of troops and units. From now on, the Republic of Korean government should develop plans to keep peace as well as to prepare unexpected changes in the Korean peninsular. For the achievement of these missions, some options can be considered. The first one is to maintain the same size of military troops and units as North Korea. The second one is to maintain the same level of military power as North Korea in terms of military force index. The third one is to maintain the same level of military power as North Korea, with the combination of the prompt mobilization force and the troops in active service under the system of technology-force combined military system. At present, it would be not possible for the ROK army to maintain such a large-size military force as North Korea (1,190,000 troops and 86 units). So it would be rational to maintain almost the same level of military force as North Korea with the combination of the troops on the active list and the prompt mobilization forces. In other words, with the combination of the troops in active service (60%) and the prompt mobilization force (40%), the ROK army should develop the strategies to harmonize technology and forces. The Korean government should also be prepared for the strategic flexibility of USFK, the possibility of American policy change about the location of foreign army, radical unexpected changes in North Korea, the emergence of potential threat, surrounding countries' demand for Korean force for the maintenance of regional stability, and demand for international cooperation against terrorism. For this, it is necessary to develop new approaches toward the proper number and size of troops and units. For instance, to prepare for radical unexpected political or military changes in North Korea, the Republic of Korea should have plans to protect a large number of refugees, to control arms and people, to maintain social security, and to keep orders in North Korea. From the experiences of other countries, it is estimated that 115,000 to 230,000 troops, plus ten thousands of police are required to stabilize the North Korean society, in the case radical unexpected military or political change happens in North Korea. In addition, if the Republic of Korea should perform the release of hostages, control of mass destruction weapons, and suppress the internal wars in North Korea, it should send 460,000 troops to North Korea. Moreover, if the Republic of Korea wants to stop the attack of North Korea and flow of refugees in DMZ area, at least 600,000 troops would be required. In sum, even if the ROK army maintains 600,000 troops, it may need additional 460,000 troops to prepare for unexpected radical changes in North Korea. For this, it is necessary to establish the prompt mobilization force whose size and number are almost the same as the troops in active service. In case the ROK army keeps 650,000 troops, the proper number of the prompt mobilization force would be 460,000 to 500,000.

  • PDF

Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD (효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석)

  • Lee, Min Choul;Kim, Jeongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.271-282
    • /
    • 2015
  • In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.

Attack Scenarios and Countermeasures using CoAP in IoT Environment (IoT기기에서 SSDP 증폭 공격을 이용한 공격기법 및 대응 방안)

  • Oh, Ju-Hye;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • DDoS attack has been continuously utilized that caused the excessively large amount of traffic that network bandwidth or server was unable to deal with paralyzing the service. Most of the people regard NTP as the biggest cause of DDoS. However, according to recently executed DDoS attack, there have been many SSDP attack in the use of amplified technique. According to characteristics of SSDP, there is no connection for making a forgery of source IP address and amplified resources feasible. Therefore, it is frequently used for attack. Especially, as it is mostly used as a protocol for causing DDoS attack on IoT devices that constitute smart home including a wireless router, media server, webcam, smart TV, and network printer. Hereupon, it is anticipated for servers of attacks to gradually increase. This might cause a serious threat to major information of human lives, major government bodies, and company system as well as on IoT devices. This study is intended to identify DDoS attack techniques in the use of weakness of SSDP protocol occurring in IoT devices and attacking scenario and counter-measures on them.

The New Challenges for the Republic of Korea Navy and the Development of Maritime Task Flotilla's Force Development (한국해군의 새로운 도전과 기동전단의 발전 방향)

  • Kim, Duk-ki
    • Strategy21
    • /
    • s.39
    • /
    • pp.163-197
    • /
    • 2016
  • The completion of Jeju Naval Base on February 2016 made the Republic of Korea Navy(ROKN) review the size and role of the Maritime Task Flotilla(MTF). The new strategic environment for the 12st century and the new challenges require the Navy to counter North Korea's provocations and prevent potential enemy's threat. The Navy is also required to take part in the variety of international roles and missions commensurated with Korea's global status to maximize the national interest. Despite these changes, Korea's military construction concept is still unable to break away from the old paradigm of the North Korean threat largely centered. In order to develop the current MTF into the Task Group with the construction of Jeju Naval Base, the Navy must newly not only establish new force development plan and fleet management concepts but also go to persuade and convince policy decision makers. To this end, the following efforts should be promoted. First, the ROK Navy steps up efforts in order to share with the Task Group's vision and strategy. The Navy should also provide the size and structure as well as the missions and roles of the Task Group to react to new maritime security environment. Second, the Navy analyse the MTF's ability and what is required and necessary to perform its duty. After that, it must set out the direction of the Task Group's force development. Third, the current missions and roles of the MTF should be re-established to respond various threats. Finally, accommodating of new technology to the MTF should intensify its strengths. The ROK Navy has a mixed force structure consisting of three fixed- base fleets and a MTF. The fixed base fleet has a passive force to defend and protect its own sea areas, but the MTF should actively not only counter North Korea's threats, including ballistic missiles, but also fight potential threats and takes international missions as a primary task force. However, the MTF has a limited capability to accomplish given missions and long-range operations, and thus, the ROK Navy is strongly required to construct the Task Group.

Integrity proof Method research in Mobile Forensic (모바일 포렌식 에서의 무결성 입증방안 연구)

  • Kim, Ki-Hwan;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.37-46
    • /
    • 2007
  • Lately, is trend that diffusion of Mobile information appliance that do various function by development of IT technology is increasing much. There is function that do more convenient and efficient life and business using portable phone that is Daepyo?? of Mobile information appliance, but dysfunction that is utilized by Beopjoe of pointed end engineering data leakage, individual's privacy infringement, threat and threat etc. relationship means to use Mobile Phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage Point is lacking about crime who use this portable phone. It is known that this digital Forensic field is Mobile Forensic. Is purposeful to verify actually about acquisition way of digital evidence that can happen in this treatise through portable phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

Interpretation of the ROK-U.S. Alliance and PSI (한미동맹과 대량무기 확산방지구상에 대한 해석)

  • Kim, Joo-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.1102-1112
    • /
    • 2012
  • The policy of the United States is a Korean Peninsula free of all nuclear weapons. The United States government was considering the possibility of military action to eliminate the North Korean nuclear threat. Talk of military action peaked from mid-1993 through mid-1994. Such an attack might have led directly to a Korean war. At that time the nuclear crisis solutioned by North Korea-United States negotiation and ROK-United States alliance. PSI's purpose is to prevent or at least inhibit the spread of weapons of mass destruction, their delivery systems, and related materials to and from states and non-state actors whose possession would be a serious threat to global or regional security. The most controversial activity of PSI is interdiction. North Korea has expressed grave concern over the initiative, stating that it has a sovereign right to develop, deploy, and export weapons, and that it would view any interdiction of its ships as a declaration of war. If South Korea is to execute interdiction North Korean ships expect tensions to increase dramatically on the peninsula with North Korea doing something quite provacative in response. South Korea cannot help approaching PSI with great caution, since it has to consider the ROK-United States alliance, and inter-Korean relations.

Analysis of the Flight Trajectory Characteristics of North Korea SLBM (북한 SLBM의 비행특성 해석)

  • Lee, Kyoung-Haing;Seo, Hyeong-Pil;Kwon, Yong-Soo;Kim, Jiwon
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.9-16
    • /
    • 2015
  • This research focuses on analysis of the flight trajectory characteristics of SLBM (Submarine Launched Ballistic Missile) of North Korea. Recently, North Korea tested launching of SLBM which is threatening international security. Also it is known that North Korea had possessed the technologies about SLBM since they disassembled submarines out of commission of the former Soviet Union. If the development of the SLBM of North Korea is completed, it should be affected as asymmetric threat to South Korea. Therefore, for active respondence to these threat, it is essential to analyze the SLBM systematically. In this point of view, this work made a SLBM flight model and simulated. In addition, we controled flight trajectories according to adjusting loft angle and described their characteristics. The sea-based ballistic missile defense system is required for an effective response to the flight trajectory of the SLBM from mid-course to terminal phase.