• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.024 seconds

Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

  • Yoon, Tae-Young
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.29-58
    • /
    • 2011
  • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

  • PDF

"Liability of Air Carriers for Injuries Resulting from International Aviation Terrorism" (국제항공(國際航空)테러리즘으로 인한 여객손해(旅客損害)에 대한 운송인(運送人)의 책임(責任))

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.47-85
    • /
    • 1989
  • The Fundamental purpose of the Warsaw Convention was to establish uniform rules applicable to international air transportation. The emphasis on the benefits of uniformity was considered important in the beginning and continues to be important to the present. If the desire for uniformity is indeed the mortar which holds the Warsaw system together then it should be possible to agree on a worldwide liability limit. This liability limit would not be so unreasonable, that it would be impossible for nations to adhere to it. It would preclude any national supplemental compensation plan or Montreal Agreement type of requirement in any jurisdiction. The differentiation of liability limits by national requirement seems to be what is occurring. There is a plethora of mandated limits and Montreal Agreement type 'voluntary' limits. It is becoming difficult to find more than a few major States where an unmodified Warsaw Convention or Hague Protocol limitation is still in effect. If this is the real world in the 1980's, then let the treaty so reflect it. Upon reviewing the Warsaw Convention, its history and the several attempts to amend it, strengths become apparent. Hijackings of international flights have given rise to a number of lawsuits by passengers to recover damages for injuries suffered. This comment is concerned with the liability of an airline for injuries to its passengers resulting from aviation terrorism. In addition, analysis is focused on current airline security measures, particularly the pre-boarding screening system, and the duty of air carriers to prevent weapons from penetrating that system. An airline has a duty to exercise a high degree of care to protect its passengers from the threat of aviation terrorism. This duty would seemingly require the airline to exercise a high degree of care to prevent any passenger from smuggling a weapon or explosive device aboard its aircraft. In the case an unarmed hijacker who boards having no instrument in his possession with which to promote the hoax, a plaintiff-passenger would be hard-pressed to show that the airline was negligent in screening the hijacker prior to boarding. In light of the airline's duty to exercise a high degree of care to provide for the safety of all the passengers on board, an acquiescene to a hijacker's demands on the part of the air carrier could constitute a breach of duty only when it is clearly shown that the carrier's employees knew or plainly should have known that the hijacker was unarmed. A finding of willful misconduct on the part of an air carrier, which is a prerequisite to imposing unlimited liability, remains a question to be determined by a jury using the definition or standard of willful misconduct prevailing in the jurisdiction of the forum court. Through the willful misconduct provision of the Warsaw Convention, air carrier face the possibility of unlimited liability for failure to implement proper preventive precautions against terrorist. Courts, therefore, should broadly construe the willful misconduct provision of the Warsaw Convention in order to find unlimited liability for passenger injuries whenever air carrier security precautions are lacking. In this way, the courts can help ensure air carrier safety and prevention against terrorist attack. Air carriers, therefore, would have an incentive to increase, impose and maintain security precautions designed to thwart such potential terrorist attacks as in the case of Korean Air Lines Flight No.858 incident having a tremendous impact on the civil aviation community. The crash of a commercial airliner, with the attending tragic loss of life and massive destruction of property, always gives rise to shock and indignation. The general opinion is that the legal system could be sufficient, provided that the political will is there to use and apply it effectively. All agreed that the main responsibility for security has to be borne by the governments. I would like to remind all passengers that every discovery of the human spirit may be used for opposite ends; thus, aircraft can be used for air travel but also as targets of terrorism. A state that supports aviation terrorism is responsible for violation of International Aviation Law. Generally speaking, terrorism is a violation of international law. It violates the soverign rights of the states, and the human rights of the individuals. I think that aviation terrorism as becoming an ever more serious issue, has to be solved by internationally agreed and closely co-ordinated measures. We have to contribute more to the creation of a general consensus amongst all states about the need to combat the threat of aviation terrorism.

  • PDF

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment (스마트 홈 환경에서 AKI기반 검증 시스템을 활용한 인증관리 및 통신 기법에 관한 연구)

  • Jin, Byung Wook;Park, Jung Oh;Jun, Moon Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • With the development of IOT technology and the expansion of ICT services recently, a variety of home network services have been advanced based on wired and wireless high speed telecommunication. Domestic and global companies have been studying on the innovative technology for the users using IOT based technology and the environment for the smart home services has been gradually developed. The users live their lives with more convenience due to the expansions and developments of smart phones. However, the threatening on the security of the smart home network had occurred by various attacks with the connection to the smart environment telecommunication, lack of applications on low powered and light weight telecommunication, and the problems of security guideline. In addition, the solutions are required for the new and variant attacking cases such as data forgery and alteration of the device for disguising approach with ill will. In this article, the safe communication protocol was designed using certification management technique based on AKI which supplemented the weakness of PKI, the existing certification system in the smart environment. Utilizing the signature technique based on ECDSA, the efficiency on the communication performance was improved, and the security and the safety were analyzed on the security threat under the smart home environment.

Review on Prior Evaluation for Terrorism Risk of High-rise Buildings (초고층건축물의 테러 위험도 사전평가에 관한 연구)

  • Seong, Bin;Lee, Yoon-Ho
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.293-316
    • /
    • 2013
  • Today's high-rise buildings are increasing concern about the safety and evacuation of people related to the fire and threat from outside. Terrorism breaking out in high-rise buildings, a symbol of the national economy results in a number of casualties, economic loss, social fear and damage to national status. That's why high-rise building has also emerged as a target of major terrorist attacks, compared to other types of buildings. We have 54 high-rise buildings in 15 regions over the country. The Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government have offered the guidelines to prevent terrorist attacks toward high-rise buildings. Since the 9/11 terrorist attacks, the U.S. Federal Emergency Management Agency (FEMA) has developed and taken advantage of the Risk Management Manual Series. According to this manual, pre-assessment is conducted for the prevention of terrorism and particularly in FEMA 455, risk of the surrounding areas, vulnerability, possibility from terrorist attacks are checked. After the check, experts classify the risk of terrorist attacks toward the high-rise buildings and according to the risk classification, architects, security experts and structure engineers can carry out terrorism prevention program for high-rise buildings. The U.K. NaCTSO has also offered the terrorism prevention guidelines. Therefore, the Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government should make more concrete guidelines for high-rise buildings such as what U.S. FEMA and U.K. NaCTSO implement, including prior evaluation technique for terrorism risk.

  • PDF

A Practical Feature Extraction for Improving Accuracy and Speed of IDS Alerts Classification Models Based on Machine Learning (기계학습 기반 IDS 보안이벤트 분류 모델의 정확도 및 신속도 향상을 위한 실용적 feature 추출 연구)

  • Shin, Iksoo;Song, Jungsuk;Choi, Jangwon;Kwon, Taewoong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.385-395
    • /
    • 2018
  • With the development of Internet, cyber attack has become a major threat. To detect cyber attacks, intrusion detection system(IDS) has been widely deployed. But IDS has a critical weakness which is that it generates a large number of false alarms. One of the promising techniques that reduce the false alarms in real time is machine learning. However, there are problems that must be solved to use machine learning. So, many machine learning approaches have been applied to this field. But so far, researchers have not focused on features. Despite the features of IDS alerts are important for performance of model, the approach to feature is ignored. In this paper, we propose new feature set which can improve the performance of model and can be extracted from a single alarm. New features are motivated from security analyst's know-how. We trained and tested the proposed model applied new feature set with real IDS alerts. Experimental results indicate the proposed model can achieve better accuracy and false positive rate than SVM model with ordinary features.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

A Study on The Law and System of The Private Body Guard in Korea (한국(韓國) 민간신변보호(民間身邊保護)의 발전(發展)을 위한 법규(法規) 및 제도(制度)에 관한 고찰(考察))

  • Lee, Han-Ick
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.283-319
    • /
    • 1997
  • Our society witnesses the rapid progress in the areas of politics, economy, society and culture in the process of national modernization since 1960s, which in turn as a reverse function gets to contract a societic pathology, totally lowering the security level of citizens' lives owing to various violent crimes like hostage commotions and murders with rifles and deadly weapons. what is the main reason for that? That may be partly because the chief police force concentrates on the current situation resulting in the vacuum of the public peace. However, the main reason is that the police fall short of man-power and equipments even if the whole police power were put to use in preventing and quelling the crimes. That is true not only of Korea but also of the advanced countries like the U.S.A., England and Japan. We realize that these advanced countries have higher level of security in every individual's life and property than Korea because their progress of the private guard systems can fill in a vacuum of the shortage of the police power, Therefore, we should without delay internationalize our private guard systems expecting the widely opening of the guard service markets in the age of Uruguay Round. To do this, we need to change our ideas for fostering the policy of the private guard from passive defense ideas into positive aggressive ones. Our police should urgently set up a plan to pursue the orientation of vision that we should dispatch our private guards overseas before foreign guards rush into our markets. Accordingly it goes without saying that the private guard group should distinguish their services from the public services initiating their own theory and strategy of private guard services and also readjust themselves between the public duties and the private services with the study of minimizing the reverse function of the private guard systems. The history criminal justice has always shown that the criminal system progressed at the initiative of the civil factor in case its demand and supply do not make both ends meet. Nevertheless, in the process the power of the government never weakens, rather it is built up in general. In conclusion, the necessity of the build-up of the private guard services must duly be acknowledged by the police as well as by the business which has its unique sphere within the criminal justice instead of as the suplemtary services of the simple the police power on the long-term basis. The purpose of the private guard services can be largely classified into the two categories; first it means the function to prevent the crimes against the citizens and secondly to enhance the national interest as an increasing mammoth business with a worldly competition capacity. The police has an absolute responsibility that they should protect the modem public in general from feeling the crisis of the personal threat, tension, anxiety and nervousness. In short, if we develop the complete private guard system to guarantee the societic atmosphere for all citizens, keep the public peace, and protect all citizens' lives and properties, we will sure enjoy a beautiful land, a wholesome society and a happy life in goodharmony of law and order.

  • PDF

Evil-Twin Detection Scheme Using SVM with Multi-Factors (다중 요소를 가지는 SVM을 이용한 이블 트윈 탐지 방법)

  • Kang, SungBae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.334-348
    • /
    • 2015
  • Widespread use of smart devices accompanies increase of use of access point (AP), which enables the connection to the wireless network. If the appropriate security is not served when a user tries to connect the wireless network through an AP, various security problems can arise due to the rogue APs. In this paper, we are going to examine the threat by evil-twin, which is a kind of rogue APs. Most of recent researches for detecting rogue APs utilize the measured time difference, such as round trip time (RTT), between the evil-twin and authorized APs. These methods, however, suffer from the low detection rate in the network congestion. Due to these reasons, in this paper, we suggest a new factor, packet inter-arrival time (PIAT), in order to detect evil-twins. By using both RTT and PIAT as the learning factors for the support vector machine (SVM), we determine the non-linear metric to classify evil-twins and authorized APs. As a result, we can detect evil-twins with the probability of up to 96.5% and at least 89.75% even when the network is congested.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.