• Title/Summary/Keyword: cyber risk

Search Result 248, Processing Time 0.029 seconds

A Study on How to Build a Disaster Recovery System that can Minimize Recovery Time Objective(RTO) and Recovery Point Objective(RPO) to Ensure Business Continuity (비즈니스 연속성 보장을 위한 복구 시간 목표(RTO) 및 복구 지점 목표(RPO)를 최소화할 수 있는 재해복구시스템 구축 방안 연구)

  • Kang, Hyun-Sun
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.91-99
    • /
    • 2021
  • In the current business environment where dependence on IT has increased rapidly, the risk from disasters or cyber-attacks is also increasing. Business continuity, the ability to continue to provide service in the event of a business disruption caused by a disaster, is essential. In other words, you need to have a plan in place to keep your core business functions uninterrupted with rapid recovery within a predetermined Recovery Time Objective (RTO) and Recovery Point Objective (RPO) time frame. In this paper, we propose a disaster recovery system construction method that can minimize RTO and RPO to ensure business continuity. The system configuration adopts Tier 7 disaster recovery model, synchronous storage replication, hot disaster recovery site, and operation management automation solution. This ensures continuity of core business with virtually no data loss and minimal RTO and RPO.

Analysis of the Password Leaking in Virtual Keyboard (가상키보드 비밀번호 유출 분석)

  • Yang, Hee-dong;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.827-835
    • /
    • 2022
  • In order to use online financial services, user authentication technology is necessary. Password check through keyboard typing is the most common technique. However, since it became known that key stokes on the keyboard can be intercepted easily, many Internet banking services and easy payment services have adopted the virtual keyboard. However, contrary to the expectation that the virtual keyboard will be safe, there is a risk that key strokes on the virtual keyboard can be leaked. In this paper, we analyzed the possibility of password leaking on the virtual keyboard and presented a password leaking method using mouse event hooking and screen capture in PC operating system. In addition, we inspected the possibility of password leak attacks on several famous Korea Internet banking websites and simple payment services, and as a result, we verified that the password input method through the virtual keyboard in the PC operating system is not secure.

A Study on Optimal Ventilation Design for Gas Boxes Installed in Semiconductor Manufacturing Equipment Handling Flammable Liquids (인화성 가스를 취급하는 반도체 제조장비에 설치된 가스박스 최적 환기 설계에 대한 연구)

  • Gyu Sun Cho;Sang Ryung Kim;Won Baek Yang
    • Journal of the Korean Institute of Gas
    • /
    • v.27 no.1
    • /
    • pp.63-69
    • /
    • 2023
  • Although Korea is the world's No. 1 semiconductor producing country, most studies are conducted with risk assessment for simple material risks due to the closedness of the site for industrial protection. In terms of industrial safety, a monitoring system such as a gas detector to determine the leakage of hazardous substances has been established, but research on effectively discharging harmful gastritis substances in case of leakage has only recently begun. Semiconductor manufacturing facilities (gas boxes) where a large amount of flammable materials are handled are currently being safety managed by using a gas detector and blocking the air inlet. It is difficult to dilute in a short time in case of leakage of flammable substances. Therefore, in this study, based on various criteria, the size of the duct according to the size of the gas box is determined and the appropriate size of the air inlet is studied to minimize the exhaust performance requirement without exposing hazardous chemicals to the outside in the event of a flammable leak. We want to do an optimal exhaust design.

Device RDoS Attack Determination and Response System Design (디바이스의 DDoS 공격 여부 판단 및 대응 시스템 설계)

  • Kim, Hyo-jong;Choi, Su-young;Kim, Min-sung;Shin, Seung-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.108-110
    • /
    • 2021
  • Since 2015, attacks using the IoT protocol have been continuously reported. Among various IoT protocols, attackers attempt DDoS attacks using SSDP(Simple Service Discovery Protocol), and as statistics of cyber shelters, Korea has about 1 million open SSDP servers. Vulnerable SSDP servers connected to the Internet can generate more than 50Gb of traffic and the risk of attack increases gradually. Until recently, distributed denial of service attacks and distributed reflective denial of service attacks have been a security issue. Accordingly, the purpose of this study is to analyze the request packet of the existing SSDP protocol to identify an amplification attack and to avoid a response when an amplification attack is suspected, thereby preventing network load due to the occurrence of a large number of response packets due to the role of traffic reflection amplification.

  • PDF

Assessment of Apartment Building Construction Workers' Noise Exposure (아파트 건설노동자 소음 노출평가)

  • Taesun Kang
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.33 no.3
    • /
    • pp.308-316
    • /
    • 2023
  • Objectives: The aim of this study is to measure and assess the occupational noise exposure levels among construction workers at apartment building construction sites in South Korea. Methods: Noise exposure assessments were conducted for 139 construction workers across 10 different trades at 53 apartment building construction sites in the northern part of Gyeonggi-do. Assessments were carried out using a noise dosimeter set with a 90 dB criterion, an 80 dB threshold, and a 5 dB exchange rate over a period of more than 6 hours(LMOEL) Results: The mean LMOEL (equivalent continuous noise level over 8 hours) for the 139 dosimeter samples was 87.8 ± 4.3 dBA. The mean noise exposure level for each construction trade, referred to as the trade mean, was also calculated. Significant differences in noise exposure levels were observed between construction trades (ANOVA, p < 0.001). The highest LMOEL values were recorded for concrete chippers (93.2 ± 2.6 dBA), followed by ironworkers (88.4 ± 0.7 dBA), concrete finishers (88.3 ± 2.7 dBA), masonry workers (87.7 ± 1.9 dBA), pile driver operators (85.6 ± 1.7 dBA), concrete carpenters (84.9 ± 2.4 dBA), interior carpenters (83.5 ± 2.1 dBA), and other groups (81.4 ± 2.2 dBA). Conclusions: The findings suggest that nearly all construction workers in this study are at risk of Noise-Induced Hearing Loss (NIHL). Moreover, the study establishes that construction trades can serve as a useful metric for assessing noise exposure levels at apartment construction sites.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Evaluation of Vasodilative Effects on 10 Traditional Herbal Formulas for Treatment of Hypertension (고혈압 치료를 위한 상용하는 한약 처방 10종의 혈관이완 평가)

  • Bumjung Kim
    • The Korea Journal of Herbology
    • /
    • v.39 no.3
    • /
    • pp.69-76
    • /
    • 2024
  • Objectives : Hypertension (high blood pressure), one of the world's major chronic diseases, has a high mortality rate due to its high prevalence and complications, but its control rate is low. The proper management and control through appropriate exercise, diet management, and optimal drug choice can reduce the risk of death from hypertension. Although various antihypertensive drugs are used to treat hypertension, they also have numerous adverse effects. Alongside increased interest in the use of Traditional Herbal Formulas (THF) for hypertension treatment, the purpose of this study was to examine the vasodilative effects of 10 THF in the rat thoracic artery pre-contracted by potassiumchloride (KCl). Methods : THF were extracted with distilled water for 2 hours. The rat thoracic artery was suspended and contracted by KCl in the organ bath which contained 10 ml Krebs Henseleit (KH) buffer. THF extracts were added in a dose-dependent increase (10-1,000 ㎍/mL) to examine vasodilative effects. The vasodilative effects produced by THF were expressed as the percentage in response to KCl-induced contraction. Results : Among the 10 THF, Banhasasim-tang, Buhnsimgieum, Sagunja-tang, and Samul-tang showed vasodilative effects. And, Sipjeondaebo-tang, Ssanghwa-tang, Ojeok-san, Onkyung-tang, Yongdamsagan-tang, and Hyangsayukgunja-tang showed no significant vasodilative effects. Also, in co-administration with amlodipine, Banhasasim-tang showed higher vasodilative effects than amlodipine alone, and Buhnsimgieum showed greater vasodilative effects at low concentrations, but inhibited amlodipine's vasodilative effects at high concentrations. Conclusion : As a result of these studies, they will be expected to provide useful data to establish guidelines of combined administration of THF and western antihypertensive drugs for the treatment of hypertension.

A Study on the Utilization of Artificial Intelligence-Based Infringement Analysis Tools (인공지능 기반 침해분석 도구 활용에 관한 연구)

  • Yang Hwan Seok
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.3-8
    • /
    • 2024
  • Recently, in order to build a cyber threats have increased in number and complexity. These threats increase the risk of using personally owned devices for work. This research addresses how to utilize an AI-enabled breach analysis tool. To this end, we developed and proposed the feasibility of using an AI-based breach analysis tool that reduces the workload of analysts and improves analysis efficiency through automated analysis processes. This allows analysts to focus on more important tasks. The purpose of this research is to propose the development and utilization of an AI-based breach analysis tool. We propose a new research direction in the field of breach analysis and suggest that automated tools should be improved in performance, coverage, and ease of use to enable organizations to respond to cyberattacks more effectively. As a research method, we developed a breach analysis tool using A.I. technology and studied various use cases. We also evaluated the performance, coverage, and ease of use of automated tools, and conducted research on predicting and preventing breaches and automatically responding to them. As a result, this research will serve as a foundation for the development and utilization of AI-based breach analysis tools, which can be used to respond to cyberattacks more effectively through experiments.

A Study of Factors Influencing the Acceptance of non-Face-to-Face Treatment Based on Social Cognitive Theory (사회인지이론에 근거한 비대면 진료서비스 수용의 영향 요인)

  • Myung Soon Kwon;Ji Hye Jang;Hyun Sik Kim;Yeon Jeong Heo
    • Quality Improvement in Health Care
    • /
    • v.30 no.1
    • /
    • pp.55-75
    • /
    • 2024
  • Purpose: This study aimed to elucidate the intention to use non-face-to-face treatment, which was temporarily allowed during the coronavirus disease 2019 pandemic. Based on the social cognitive theory, individual behavioral changes occur through the dynamic interaction of individual, environmental, and behavioral factors. Thus, we investigated the impact of personal, environmental, and behavioral factors on the acceptance of non-face-to-face treatment. Methods: A Web survey was conducted using Korea Research Panel between December 26 and 29, 2022, to examine the conceptual framework. The survey targeted adults aged 19 and older, regardless of whether they had used non-face-to-face treatment. A total of 502 responses were collected. Further, a three-step hierarchical regression analysis was conducted using SPSS Windows software version 25.0. Results: The study showed that 131 out of 502 respondents had experience using non-face-to-face treatment, while 371 did not. The factors that influenced the intention to accept non-face-to-face treatment included the general characteristics of the participants (women, underlying disease), personal factors (usefulness, cost savings, knowledge), and environmental factors (social norms, trust, perceived risk). The model demonstrated an explanatory power of 65%. Conclusion: The results of this study directly show that intention is linked to behavior through the interaction between personal and environmental factors. Further research is needed to explore additional factors influencing the intention to accept non-face-to-face treatment, enabling its effective use in preventing and treating various diseases, including infectious diseases.

A National Survey on the Prevalence and Risk Factors of Child Sexual Abuse (아동기 성학대 발생과 배경요인)

  • Han, In-Young;Lee, Yong-Woo;Yoo, Seo-Koo;Park, Myung-Sook;Kim, Jin-Sook
    • Korean Journal of Social Welfare
    • /
    • v.60 no.2
    • /
    • pp.131-153
    • /
    • 2008
  • Based upon the first national sample of adult men and women, the study aims to examine the prevalence of chid sexual abuse in Korea and factors related to the incidence of child sexual abuse. The results of the study show that 20.8% of the sample experienced one or more types of sexual abuse in their childhood, which indicates that Korean society is not any longer immune to child sexual abuse. With regard to how to cope with sexual abuse, "not informed to anyone and did not get any help at all" is the most major one for all types of sexual abuse. Even those who got help were reported to depend heavily upon private routes such as parents, relatives, or friends, indicating the urgency of establishing systematic intervention schemes for the problem. The results of a logistic regression analysis show that gender of the child, involvement in delinquent behaviors, economic status of the family, number of siblings, and residence in high-crime region are significantly related to the incidence of child sexual abuse. These results of the study would be expected to provide a useful guideline for developing policies or intervention programs aimed to prevent or address child sexual abuse.

  • PDF