• Title/Summary/Keyword: cyber risk

Search Result 247, Processing Time 0.023 seconds

A Study on the Earthquake Safety Assessment of Energy Storage Facilities According to Climate Change (기후변화에 따른 에너지 저장시설 지진 안전성평가에 관한 연구)

  • Ham, Eun-Gu;Lee, Sung-Il
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.2
    • /
    • pp.226-235
    • /
    • 2021
  • Purpose: The risk assessment for earthquakes was conducted in accordance with the current design standard (KBC2016) for the Coalescer facility, which is a major facility of energy storage facilities. Method: The risk assessment for earthquakes was conducted in accordance with the current design standard (KBC2016) for the Coalescer facility, which is a major facility of energy storage facilities. Result: In this study, by statically loading earthquake loads and evaluating the level of collapse prevention of special-class structures, facility managers can easily recognize and evaluate the risk level, and this analysis result can be applied to future facility risk management. Earthquake analysis was performed so that. Conclusion: As a result of analyzing the Coalescer facility according to the current design standard KBC2016, the stress ratio of the main supporting members was found to be up to 4.7%. Therefore, the members supporting Coalescer were interpreted as being safe against earthquakes with a reproducibility period of 2400 years that may occur in Korea.

A Study on the Integrated Account Management Model (위험기반 통합계정관리모델에 관한 연구)

  • Kang, Yong-Suk;Choi, Kook-Hyun;Shin, Yong-Tae;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.947-950
    • /
    • 2014
  • The recent APT attacks including cyber terror are caused by a high level of malicious codes and hacking techniques. This implies that essentially, advanced security management is required, from the perspective of 5A. The changes of IT environment are represented by Mobile, Cloud and BYOD. In this situation, the security model needs to be changed, too into the Airport model which emphasizes prevention, and connection, security and integration of functions from the existing Castle model. This study suggested an application method of the risk-based Airport model to the cyber security environment.

  • PDF

Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey

  • Montes, F.;Bermejo, J.;Sanchez, L.E.;Bermejo, J.R.;Sicilia, J.A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1119-1139
    • /
    • 2021
  • Among the scientific literature, it has not been possible to find a consensus on the definition of the limits or properties that allow differentiating or grouping the cyber-physical systems (CPS) and the Internet of Things (IoT). Despite this controversy the papers reviewed agree that both have become crucial elements not only for industry but also for society in general. The impact of a malware attack affecting one of these systems may suppose a risk for the industrial processes involved and perhaps also for society in general if the system affected is a critical infrastructure. This article reviews the state of the art of the application of machine learning in the automation of malware detection in cyberphysical systems, evaluating the most representative articles in this field and summarizing the results obtained, the most common malware attacks in this type of systems, the most promising algorithms for malware detection in cyberphysical systems and the future lines of research in this field with the greatest potential for the coming years.

An Analysis Measure for Cybersecurity linked Threat against Diverse Protection Systems (다양성보호계통 사이버보안 연계 위협 분석 방안)

  • Jung, Sungmin;Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.1
    • /
    • pp.35-44
    • /
    • 2021
  • With the development of information technology, the cybersecurity threat continues as digital-related technologies are applied to the instrumentation and control system of nuclear power plants. The malfunction of the instrumentation and control system can cause economic damage due to shutdown, and furthermore, it can lead to national disasters such as radioactive emissions, so countering cybersecurity threats is an important issue. In general, the study of cybersecurity in instrumentation and control systems is concentrated on safety systems, and diverse protection systems perform protection and reactor shutdown functions, leading to reactor shutdown or, in the worst case, non-stop situations. To accurately analyze cyber threats in the diverse protection system, its linked facilities should be analyzed together. Risk analysis should be conducted by analyzing the potential impact of inter-facility cyberattacks on related facilities and the impact of cybersecurity on each configuration module of the diverse protection system. In this paper, we analyze the linkage of the diverse protection system and discuss the cybersecurity linkage threat by analyzing the availability of equipment, the cyber threat impact of the linked equipment, and the configuration module's cybersecurity vulnerability.

Analysis on The Characteristics of Occupancy Prediction and The Fire Hazard in Narrow Dwelling Space (협소 거주공간 재실자 특성 및 화재위험성 분석)

  • Lee, Changwoo;Oh, Seungju;Yoo, Juyoul;Kim, Jinsung;Cho, Ahra;Cho, Yongsun
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.4
    • /
    • pp.342-349
    • /
    • 2016
  • The objectives of this study is analysis of the characteristics of fire risk and survey of narrow dwelling space(the Karaoke, Gosiwon etc). The narrow dwelling space has special structure characteristics; the narrow and the complex escape rote. Gosiwon have very separate and exclusive space room, so have the problem a suppression of fire. Furthermore almost Karaokes located in basement have a complex and limitary escape rote. Therefore we should research and development the exploration equipment that search a source of the fire and a emergency rescuer in the scene of the fire.

An Architecture of a Dynamic Cyber Attack Tree: Attributes Approach (능동적인 사이버 공격 트리 설계: 애트리뷰트 접근)

  • Eom, Jung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.67-74
    • /
    • 2011
  • In this paper, we presented a dynamic cyber attack tree which can describe an attack scenario flexibly for an active cyber attack model could be detected complex and transformed attack method. An attack tree provides a formal and methodical route of describing the security safeguard on varying attacks against network system. The existent attack tree can describe attack scenario as using vertex, edge and composition. But an attack tree has the limitations to express complex and new attack due to the restriction of attack tree's attributes. We solved the limitations of the existent attack tree as adding an threat occurrence probability and 2 components of composition in the attributes. Firstly, we improved the flexibility to describe complex and transformed attack method, and reduced the ambiguity of attack sequence, as reinforcing composition. And we can identify the risk level of attack at each attack phase from child node to parent node as adding an threat occurrence probability.

Integrated Ship Cybersecurity Management as a Part of Maritime Safety and Security System

  • Melnyk, Oleksiy;Onyshchenko, Svitlana;Pavlova, Nataliia;Kravchenko, Oleksandra;Borovyk, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.135-140
    • /
    • 2022
  • Scientific and technological progress is also fundamental to the evolving merchant shipping industry, both in terms of the size and speed of modern ships and in the level of their technical capabilities. While the freight performance of ships is growing, the number of crew on board is steadily decreasing, as more work processes are being automated through the implementation of information technologies, including ship management systems. Although there have been repeated appeals from international maritime organizations to focus on building effective maritime security defenses against cyber attacks, the problems have remained unresolved. Owners of shipping companies do not disclose information about cyberattack attempts or incidents against them due to fear of commercial losses or consequences, such as loss of image, customer and insurance claims, and investigations by independent international organizations and government agencies. Issues of cybersecurity of control systems in the world today have gained importance, due to the fact that existing threats concern not only the security of technical means and devices, but also issues of environmental safety and safety of life at sea. The article examines the implementation of cyber risk management in the shipping industry, providing recommendations for the safe ship operation and its systems in order to improve vulnerability to external threats related to cyberattacks, and to ensure the safety and security of such a technical object as a seagoing ship.

A Study on Tracking Method for Command and Control Framework Tools (명령 제어 프레임워크 (Command and Control Framework) 도구 추적 방안에 대한 연구)

  • Hyeok-Ju Gwon;Jin Kwak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.721-736
    • /
    • 2023
  • The Command and Control Framework was developed for penetration testing and education purposes, but threat actors such as cybercrime groups are abusing it. From a cyber threat hunting perspective, identifying Command and Control Framework servers as well as proactive responding such as blocking the server can contribute to risk management. Therefore, this paper proposes a methodology for tracking the Command and Control Framework in advance. The methodology consists of four steps: collecting a list of Command and Control Framework-related server, emulating staged delivery, extracting botnet configurations, and collecting certificates that feature is going to be extracted. Additionally, experiments are conducted by applying the proposed methodology to Cobalt Strike, a commercial Command and Control Framework. Collected beacons and certificate from the experiments are shared to establish a cyber threat response basis that could be caused from the Command and Control Framework.

A Study on Preprocessing Method in Deep Learning for ICS Cyber Attack Detection (ICS 사이버 공격 탐지를 위한 딥러닝 전처리 방법 연구)

  • Seonghwan Park;Minseok Kim;Eunseo Baek;Junghoon Park
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.36-47
    • /
    • 2023
  • Industrial Control System(ICS), which controls facilities at major industrial sites, is increasingly connected to other systems through networks. With this integration and the development of intelligent attacks that can lead to a single external intrusion as a whole system paralysis, the risk and impact of security on industrial control systems are increasing. As a result, research on how to protect and detect cyber attacks is actively underway, and deep learning models in the form of unsupervised learning have achieved a lot, and many abnormal detection technologies based on deep learning are being introduced. In this study, we emphasize the application of preprocessing methodologies to enhance the anomaly detection performance of deep learning models on time series data. The results demonstrate the effectiveness of a Wavelet Transform (WT)-based noise reduction methodology as a preprocessing technique for deep learning-based anomaly detection. Particularly, by incorporating sensor characteristics through clustering, the differential application of the Dual-Tree Complex Wavelet Transform proves to be the most effective approach in improving the detection performance of cyber attacks.

Verification of X-sight Lung Tracking System in the CyberKnife (사이버나이프에서 폐종양 추적 시스템의 정확도 분석)

  • Huh, Hyun-Do;Choi, Sang-Hyoun;Kim, Woo-Chul;Kim, Hun-Jeong;Kim, Seong-Hoon;Cho, Sam-Ju;Min, Chul-Ki;Cho, Kwang-Hwan;Lee, Sang-Hoon;Choi, Jin-Ho;Lim, Sang-Wook;Shin, Dong-Oh
    • Progress in Medical Physics
    • /
    • v.20 no.3
    • /
    • pp.174-179
    • /
    • 2009
  • To track moving tumor in real time, CyberKnife system imports a technique of the synchrony respiratory tracking system. The fiducial marker which are detectable in X-ray images were demand in CyberKnife Robotic radiosurgery system. It issued as reference markers to locate and track tumor location during patient alignment and treatment delivery. Fiducial marker implantation is an invasive surgical operation that carries a relatively high risk of pneumothorax. Most recently, it was developed a direct lung tumor registration method that does not require the use of fiducials. The purpose of this study is to measure the accuracy of target applying X-sight lung tracking using the Gafchromic film in dynamic moving thorax phantom. The X-sight Lung Tracking quality assurance motion phantom simulates simple respiratory motion of a lung tumor and provides Gafchromic dosimetry film-based test capability at locations inside the phantom corresponding to a typical lung tumor. The total average error for the X-sight Lung Tracking System with a moving target was $0.85{\pm}0.22$ mm. The results were considered reliable and applicable for lung tumor treatment in CyberKnife radiosurgery system. Clinically, breathing patterns of patients may vary during radiation therapy. Therefore, additional studies with a set real patient data are necessary to evaluate the target accuracy for the X-sight Lung Tracking system.

  • PDF