• Title/Summary/Keyword: Vulnerability Information Management

Search Result 305, Processing Time 0.03 seconds

The Design and Implementation for Practical Risk Analysis Method & Modules (실용적인 위험분석 방법론 설계와 모듈 구현)

  • 정윤정;김인중;이철원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1081-1089
    • /
    • 2002
  • In these days many Organizations recognize risk of information asset by rapid change of information system environments, and need suitable management for that. Also many organization which operate important information-communication infrastructure take interest in threat, vulnerability and risk analysis of important asset by enforcement of Act on protection of information and communication infrastructure. But, it is most that methodology and tools that analyze risk for organization's information asset are developed in abroad up to now, domestic research of this field is insufficient stage. An research of this field is necessary in domestic because it can't reflect domestic actuality by depending on most foreign methodology or a tool. In this paper we proposed design and implementation for the risk analysis methodology, a prototype and important modules that considers the user convenience. We expect that the result of this paper will for step improvement of domestic risk analysis methodology and tool development.

A Study on the Improvement of Disaster and Safety Management for Local Cultural Heritages (지방문화재 재난안전관리 개선방안에 관한 연구)

  • Kim, Twe-Hwan;Kim, Jung-Gon;Been, Ju-Hee
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.3
    • /
    • pp.358-366
    • /
    • 2019
  • Purpose: This paper aims to clarify the problems and to examine the improvement methods by investigating the management condition of local-designated cultural property of which management is relatively poor in comparison with state-designated cultural heritage. Method: In order to grasp the management situation of the local-designated cultural heritage, a research on cultural heritage management situation and problems will be carried out with 35 cultual heritages in Goryeong-gun. Also, the improvement methods about the property type vulnerability on the basis of interview with cultual property managers, fire-fighting officers and civil servants, etc. Results: Local cultural heritages were investigated to be very vulnerable to the fire of wooden buildings, the theft of movable cultural heritages, and the effects of wind and water damage. It is because cultural heritages are scattered over wide areas fundamentally. As the result, it has difficulty in the patrols of police officers and fire fighters, and in the situation that it lacks disaster monitoring and CCTV for countermeasures to replace them, electronic security including fire hydrant, sensors, etc and fire extinguishing facilities and so on. It is difficult for local governments managing local-designated cultural heritages to enhance their management systems directly due to their lack of budget and manpower. Conclusion: In order to strengthen disaster and safety management system for the cultural heritages designated by local governments, they have to clarify disaster countermeasure task of fire fighting, police, and cultural heritage managers prepare their manuals, and systematize them through disaster drill mainly in local autonomous governments. Also, so as to establish a surveillance system every day, they have to enhance the community for local cultural heritage manage consisting of local volunteer fire departments, local voluntary disaster prevention organizations, volunteers, etc.

Secure Distributed Data Management Architecture for Consumer Protection of Smart Grid (스마트 그리드의 소비자 보호를 위한 안전한 분산 데이터 관리 구조)

  • Park, Nam-Je;Song, You-Jin;Park, Kwang-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.57-67
    • /
    • 2010
  • Smart grid technology can expand energy efficiency into the home by monitoring consumer energy usage in real time and communicating with household devices that respond to demands to shut off during periods of non-use, allowing individual consumers to control their electricity usage more effectively. But, the information collected on a smart grid will form a library of personal information, the mishandling of which could be highly invasive of consumer privacy. There will be major concerns if consumer-focused principles of transparency and control are not treated as essential design principles from beginning to end. In this paper, using. All-Or-Nothing Transform encryption mode for providing smart grid security, we propose efficient distributed data Management based on XOR operation. The contribution of this paper is to provide a secure algorithm that manages efficiently distributed data in the field of private data in smart grid environment.

A Study on Security Risk according to the activation of Bio-Authentication Technology (바이오 인증 기술의 활성화에 따른 보안 위험성에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.57-63
    • /
    • 2016
  • In recent years, there is growing interest in 'Fin-tech' in the domestic and international financial sector. And a variety of services in such a situation has emerged. To ensure the safety of from hacking attacks, many new technologies have been developed. These leading technology is the Bio-authentication method that you consider applying to the financial sector. Bio authentication is using biometric information. Also it is known that can cope the threat of fabrication and modifying attacks with shared and stored. However, Recently, When you look at hacking incidents of biometric data(560 million cases) in the United States Office of Personnel Management and advent of the fingerprints counterfeit technology, We can be known that should be reconsidered about the safety of bio-certification. Especially, it should be provided with a response measures for the problem of embezzlement that biometric information already been leaked. Thereby In this paper, by investigating biometric technologies and practices applied and of the vulnerability factor in many industries, it expected to be utilized in the prepared threats countermeasures in accordance with the application of the biometric authentication technology in a future.

Application and assessment of ecosystem health index for sustainable conservation and use of border areas (접경지역의 지속가능한 보전과 이용을 위한 생태계 건강성 지수 적용 및 평가)

  • Kim, Jung-In;Ko, Ha-Jung;Kwon, Hyuk-Soo
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.26 no.6
    • /
    • pp.117-133
    • /
    • 2023
  • This study assessed the ecological health of border areas using the ecological health index and suggested Indicators for maintaining and promoting ecological values. We analyzed the change trends, pressures, and resilience of ecosystems and services in border areas, and identified their current status and sustainability. The main findings were: (1) ecological assets and ecosystem services in border areas could be compared through ecosystem health assessment; (2) it can be used to set priorities for management and conservation by identifying the relative importance and vulnerability of ecosystems and ecosystem services in each border area; and (3) the index presented in this study can be judged to have explanatory power for the characteristics of border areas and ecosystem health when compared to previous studies. Limitations of this study include the lack of literature and statistical data at the local government level and the resulting limited application of evaluation methods, which limited direct regional comparisons. To overcome the research limitations, further studies are needed, such as establishing ecological information in border areas, mapping and assessment of ecosystem services, and developing and applying assessments that reflect the opinions and participation of various stakeholders. This study was the first attempt to assess the health of ecosystems and ecosystem services in border areas and provided an important baseline for future changes in border areas. In the future, it will be helpful in national and local government policies and ecological assetecosystem management by supplementing insufficient information and presenting clear goals.

Windows 7 Operating System Event based Visual Incident Analysis System (윈도우즈 7 운영체제 이벤트에 대한 시각적 침해사고 분석 시스템)

  • Lee, Hyung-Woo
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.223-232
    • /
    • 2012
  • Recently, the leakage of personal information and privacy piracy increase. The victimized case of the malicious object rapidlies increase. Most of users use the windows operating system. Recently, the Windows 7 operating system was announced. Therefore, we need to study for the intrusion response technique at the next generation operate system circumstances. The accident response technique developed till now was mostly implemented around the Windows XP or the Windows Vista. However, a new vulnerability problem will be happen in the breach process of reaction as the Windows 7 operating system is announced. In the windows operating system, the system incident event needs to be efficiently analyzed. For this, the event information generated in a system needs to be visually analyzed around the time information or the security threat weight information. Therefore, in this research, we analyzed visually about the system event information generated in the Windows 7 operating system. And the system analyzing the system incident through the visual event information analysis process was designed and implemented. In case of using the system developed in this study the more efficient accident analysis is expected to be possible.

Encryption/Decryption and Enterprise Security Management of Stock Trading Packets (증권거래 패킷의 암복호화와 통합보안관제 분석)

  • Oh, Won-Gyeom;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.227-230
    • /
    • 2013
  • Financial transactions using a mobile terminal and the Internet is activated, it is a stock exchange enabled using mobile devices and the Internet. Koscom in charge of IT operations of securities transaction-related in (securities ISAC), to analyze the vulnerability of information security related to securities transactions, which corresponds to running the integrated security control system. Online stock trading is a subject to the Personal Information Protection Act, electronic systems of related, has been designated as the main information and communication infrastructure to, damage financial carelessness of the user, such as by hacking is expected to are. As a result, research on the key vulnerabilities of information security fields related to securities business cancer decoding of the Securities and Exchange packet, through the analysis of security events and integrated security control is needed.

  • PDF

A Comparative Study of on-site Action Manual for People with Disaster Vulnerability (재난취약자의 현장조치 행동매뉴얼 비교연구 - 한국과 일본의 장애인 대상으로)

  • Kim, Soodong;Lee, Sahong;Choi, Kilhyun;Cheung, Chongsoo
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.2
    • /
    • pp.155-162
    • /
    • 2017
  • This study has some issues about the elderly, the disabled, and the vulnerable groups whose economic ability is low even if the disaster or disaster situation is not a big problem for the people. we should emphasize the necessity of disaster preparedness action manual considering the characteristics of disaster vulnerable classes and taking serious risks to them even in the same situation. We also want to conduct research only for people with disabilities who are choosing the same definition of the world among the vulnerable groups. I would like to provide a basis for developing a site action manual for people with disabilities by comparing the cases of Korea and Japan. Therefore, through the cases of Japan and Korea, it is possible to maintain the independence of everyday life during disasters, the communication function in disasters, the method of moving information and mobile information, the function of recognizing emergency response, Action Emphasize the urgency of developing action manuals. From this domestic situation, we will conclude the discussion on the disaster safety and action manual for the disabled.

A Study on the Optimization Methods of Security Risk Analysis and Management (경비위험 분석 및 관리의 최적화 방안에 관한 연구)

  • Lee, Doo-Suck
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.189-213
    • /
    • 2005
  • Risk management should be controlled systematically by effectively evaluating and suggesting countermeasures against the various risks which are followed by the change of the society and environment. These days, enterprise risk management became a new trend in the field. The first step in risk analysis is to recognize the risk factors, that is to verify the vulnerabilities of loss in the security facilities. The second step is to consider the probability of loss in assessing the risk factors. And the third step is to evaluate the criticality of loss. The security manager will determine the assessment grades and then the risk levels of each risk factor, on the basis of the result of risk analysis which includes the assessment of vulnerability, the provability of loss and the criticality. It is of great importance to put the result of risk analysis in mathematical statement for a scientific approach to risk management. Using the risk levels gained from the risk analysis, the security manager can develop a comprehensive and supplementary security plan. In planning the risk management measures to prepare against and minimize the loss, insurance is one of the best loss-prevention programs. However, insurance in and of itself is no longer able to meet the security challenges faced by major corporations. The security manager have to consider the cost-effectiveness, to suggest the productive risk management alternatives by using the security files which contains every information about the security matters. Also he/she have to reinforce the company regulations on security and safety, and to execute education repeatedly on security and risk management. Risk management makes the most efficient before-the-loss arrangement for and after-the-loss continuation of a business. So it is very much important to suggest a best cost-effective and realistic alternatives for optimizing risk management above all, and this function should by maintained and developed continuously and repeatedly.

  • PDF

Alternative Positioning, Navigation, and Timing Applicable to Domestic PBN Implementation (국내 PBN 이행을 위한 대안 항법 적용 방안)

  • Kim, Mu-Geun;Kang, Ja-Young;Chang, Jae-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.1
    • /
    • pp.37-44
    • /
    • 2016
  • Republic of Korea has established its performance-based navigation (PBN) implementation plan in 2010 for ensuring a smooth transition to PBN operations and relevant new flight procedures are being developed in accordance with the roadmap. Various Navigation aids (NAVAIDs) like global navigation satellite systems (GNSS), distance measuring equipment (DME), VHF omnidirectional range (VOR), inertial navigation system (INS) are used to support PBN procedures. Among them, GNSS would play a central role in PBN implementation. However, vulnerability of satellite navigation signals to artificial and natural interferences has been discovered and various alternative positioning, navigation and timing (APNT) technologies are under development in many countries. In this paper, we study whether continuous PBN operations can be achievable without GNSS signals. As a result, it shows that some of the domestic airports require the construction of APNT in the approach area.