• Title/Summary/Keyword: cyber infrastructure

Search Result 217, Processing Time 0.022 seconds

Are There Any Solutions for the Cybersecurity Education Gap in the Public Sector? (공공부문의 사이버보안 교육격차 해소를 위한 탐색적 연구)

  • Lee, Song-ha;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.973-985
    • /
    • 2021
  • South Korea has been guaranteed the efficiency and the convenience of administrative work based on long-term experience and well-established ICT infrastructure. Vice versa, South Korea is always exposed to various scale cyber-attacks. It is an important element of national competitiveness to secure cybersecurity resilience and response in the public sector. For this, the well-trained cybersecurity professionals' retention and support for their capacity development through retraining are critical. As the Special Act on Balanced National Development, most public agencies moved to provincial areas, but the provincial areas are not ready for this, thus the workforce can't get enough retaining courses. We study to analyze whether there is a gap in cybersecurity educational opportunities or needs in the public sector depending on regions, institution type, and personal traits. This paper aims to suggest solutions for the cybersecurity education gap in the public sector based on the empirical analysis results.

Reference Model for the Service of Smart City Platform through Case Study (사례 연구를 통한 스마트 시티 플랫폼의 서비스를 위한 참조 모델)

  • Kim, Young Soo;Mun, Hyung-Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.241-247
    • /
    • 2021
  • As a way to solve the side effects of urban development, a smart city with information and communication technology converges in the city is being built. For this, a smart city platform should support the development and integration of smart city services. Therefore, the underlying technology and the functional and non-functional requirements that the smart platform must support were analyzed. As a result of this, we classified the Internet of Things, cloud computing, big data and cyber-physical systems into four categories as the underlying technologies supported by the smart city platform, and derived the functional and non-functional requirements that can be implemented and the reference model of the smart city platform. The reference model of the smart city platform is used for decision-making on investment in infrastructure technology and the development scope of services according to functional or non-functional requirements to solve specific city problems for city managers. It provides platform developers with guidelines to identify and determine the functional and non-functional requirements and implementation technologies of software platforms for building smart cities.

Evaluation Criteria for Korean Smart Grid based on K-ISMS (K-ISMS 기반의 한국형 스마트 그리드 정보보호 관리체계 평가 기준 제안)

  • Kim, Kichul;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1375-1391
    • /
    • 2012
  • Smart grid is a next-generation intelligent power grid that applying ICT to power grid to maximize the energy efficiency ratio. Recently, technologies and standards for smart grid are being developed around the world. Information security which is an essential part of smart grid development has to be managed continuously. Information security management system certification for organizational risk management has been implemented in Korea. Although preparation for information security management system certification which is applicable to smart grid is considered, there are no specific methods. This paper is to propose core and added evaluation criteria for Korean smart grid based on K-ISMS through comparative analysis between ISMS operated in Korea and smart grid information security management system developed in the United States. Added evaluation criteria enable smart grid related business that certified existing ISMS to minimize redundant and unnecessary certification assessment work.

Cybersecurity of The Defense Information System network connected IoT Sensors (IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구)

  • Han, Hyun-Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.802-808
    • /
    • 2020
  • The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.

A Study on the Framework of Integrated Vulnerability Analysis of Domestic Nuclear Facilities (국내 원자력 시설 통합 취약점 분석 프레임워크 연구)

  • Mi-Joo Shin;Seong-su Yoon;Ieck-chae Euom
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.11-17
    • /
    • 2022
  • Cyber attacks on national infrastructure, including large-scale power outages in Ukraine, have continued in recent years. As a result, ICS-CERT vulnerabilities have doubled compared to last year, and vulnerabilities to industrial control systems are increasing day by day. Most control system operators develop vulnerability countermeasures based on the vulnerability information sources provided by ICS-CERT in the United States. However, it is not applicable to the security of domestic control systems because it does not provide weaknesses in Korean manufacturers' products. Therefore, this study presents a vulnerability analysis framework that integrates CVE, CWE, CAPE, and CPE information related to the vulnerability based on ICS-CERT information (1843 cases). It also identifies assets of nuclear facilities by using CPE information and analyzes vulnerabilities using CVE and ICS-CERT. In the past, only 8% of ICS-CERT's vulnerability information was searched for information on any domestic nuclear facility during vulnerability analysis, but more than 70% of the vulnerability information could be searched using the proposed methodology.

Designing Bigdata Platform for Multi-Source Maritime Information

  • Junsang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.111-119
    • /
    • 2024
  • In this paper, we propose a big data platform that can collect information from various sources collected at ocean. Currently operating ocean-related big data platforms are focused on storing and sharing created data, and each data provider is responsible for data collection and preprocessing. There are high costs and inefficiencies in collecting and integrating data in a marine environment using communication networks that are poor compared to those on land, making it difficult to implement related infrastructure. In particular, in fields that require real-time data collection and analysis, such as weather information, radar and sensor data, a number of issues must be considered compared to land-based systems, such as data security, characteristics of organizations and ships, and data collection costs, in addition to communication network issues. First, this paper defines these problems and presents solutions. In order to design a big data platform that reflects this, we first propose a data source, hierarchical MEC, and data flow structure, and then present an overall platform structure that integrates them all.

An Analysis of Infrastructure and Provision of Forest Welfare Service in Nursing Homes for the Elderly (노인요양시설의 산림복지서비스 인프라 및 제공 실태)

  • Lee, Insook;Kim, Sungjae;Bang, Kyung-Sook;Yi, Yunjeong;Kim, Miju;Moon, Hyojeong;Yeon, Poung Sik;Ha, Ei-Yan;Chin, Young Ran
    • The Journal of the Korean Institute of Forest Recreation
    • /
    • v.22 no.4
    • /
    • pp.59-69
    • /
    • 2018
  • This is a cross-sectional study that suggests ways to activate forest welfare services (FWS) by investigating the infrastructure, service status, and perception on FWS in Korea. In August 2016, a structured email survey was conducted in nation widely. The respondents were mostly directors and general secretary (75.0%). The considerable number (16.3%) of nursing homes (NH) use some floors of the complex buildings that would be difficult to have FWS infrastructure and about 30% of those without forests near the facilities. The directors of NH recognize that FWS has positive effects on the elderly. However, FWS is not an requisite of the longterm care insurance benefit, and so costly and effort-intensive that FWS has not been activated so far. In order to activate FWS in NHs, it is necessary to develop and disseminate the guidelines on FWS that anyone can easily followed. In addition, when the National Health Insurance Corporation evaluates NHs, they should evaluate not only whether there is a wandering or walking space, but also whether it has forest healing factors such as forests. It is also necessary to create a barrier-free environment both inside and outside of NHs, increasing accessibility to the toilet in gardens, paving a passage for wheelchairs and lifts in forests near NHs. Through these efforts, it is expected that FWS will be activated to provide physical, mental rest and comfort, appropriate cognitive stimulation to the NH residents at the end of life.

Estimation of Strength Parameter of Soil-NSS Mixture by Triaxial Compression Test (삼축압축시험을 이용한 NSS 혼합토의 강도정수 평가)

  • Oh, Sewook;Lee, Gilho;Kwon, Hyekkee;Kwon, Youngcheul
    • Journal of the Korean GEO-environmental Society
    • /
    • v.14 no.11
    • /
    • pp.65-71
    • /
    • 2013
  • Despite of the various merits of soil pavement, it has not been widely adapted because portland cement was conventionally used as soil stabilizer to improve the mechanical properties such strength parameters. Recently, natural soil stabilizer(NSS) were developed and virtually adopted to several case of soil pavement construction under control of heavy metal pollution compared to cement-used cases. However, the application of natural soil stabilizer is not settled yet, and empirical design have been widely adopted. In this study, therefore, the strength parameter of soil-NSS mixture was estimated by some triaxial compression tests, CU-test. From the tests, the relationship between curing period and strength parameter such as internal friction and effective cohesion was examined. As a result, effective cohesion of dredged clay and granite soil increased as curing time is increased. However, internal friction is almost same result in all soil type used in this study.

Identifying Regional Tourism Resources Using Webometric Network Analysis: A case of Suseong-gu in Daegu, South Korea (웹보메트릭스를 활용한 지역관광자원 발굴 및 네트워크 분석: 대구 수성구를 중심으로)

  • Song, Hwa Young;Zhu, Yu Peng;Kim, Ji Eun;Oh, Jung Hyun;Park, Han Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.475-486
    • /
    • 2020
  • The purpose of present study is to identify the regional tourism resources using Webometric network analysis. The study focuses on Suseong area in Daegu metropolitan city. Various kinds of web-based data, for example, hit counts, online news, and public comments, were used to discover hot places and people's responses. The research question is, 'First, what is the optimum level of the search engine for suseong? Second, what is the online appearance of tourist resources in suseong? Which region is the center of tourism with high levels of emergence? Third, what are the main contents of news articles and comments related to the Suseong pond?'. The results show that the search engine optimization level in Suseong is lower than that in other areas in Daegu. In other words, tourism information and contents regarding Suseong are not highly visible on cyber space. Importantly, Suseong pond had the highest online presence. A close analysis of both online news and users' comments on Suseong pond, however, revealed the biggest concern as calling for improving public accessibility to tourism infrastructure. The findings are expected to contribute to policy development and service operation related to tourism resources in Suseong.

A Efficient Network Security Management Model in Industrial Control System Environments (산업제어시스템 환경에서 효과적인 네트워크 보안 관리 모델)

  • Kim, Il-Yong;Lim, Hee-Teag;Ji, Dae-Bum;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.664-673
    • /
    • 2018
  • The industrial control system (ICS) has operated as a closed network in the past, but it has recently been linked to information and communications services and has been causing damage due to cyber attacks. As a countermeasure, the Information Communication Infrastructure Protection Act was enacted, but it cannot be applied to various real control environments because there is only a one-way policy-from a control network to a business network. In addition, IEC62443 defines an industrial control system reference model as an international standard, and suggests an area security model using a firewall. However, there is a limit to linking an industrial control network, operating as a closed network, to an external network only through a firewall. In this paper, we analyze the security model and research trends of the industrial control system at home and abroad, and propose an industrial control system security model that can be applied to the actual interworking environments of various domestic industrial control networks. Also, we analyze the security of firewalls, industrial firewalls, network connection equipment, and one-way transmission systems. Through a domestic case and policy comparison, it is confirmed that security is improved. In the era of the fourth industrial revolution, the proposed security model can be applied to security management measures for various industrial control fields, such as smart factories, smart cars, and smart plants.