• Title/Summary/Keyword: cybersecurity

Search Result 323, Processing Time 0.025 seconds

A Study on the Cybersecurity Workforce Training Program Development by Level of a Characteristic of Training Program (사이버보안 교육과정 특성에 따른 교육 프로그램 설계의 필요성에 대한 연구)

  • Park, Ki Tae;Jun, Hyo-Jung;Kim, Tae-Sung;Kim, In Jung
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.4
    • /
    • pp.127-138
    • /
    • 2016
  • The Korean government has implemented various policies such as establishing new major/department and operating a variety of education programs related with cybersecurity. However, it has not yet been constructed virtuous cycle that can provide appropriate education and training to professionals with the high level and quality. In this study, by surveying and analyzing satisfaction about education and training program aimed at employees in public sector who are in charge of cybersecurity, we suggest the direction of education and training for cybersecurity experts required at the national level.

A Systematic Review on Human Factors in Cybersecurity

  • Alghamdi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.282-290
    • /
    • 2022
  • A huge budget is spent on technological solutions to protect Information Systems from cyberattacks by organizations. However, it is not enough to invest alone in technology-based protection and to keep humans out of the cyber loop. Humans are considered the weakest link in cybersecurity chain and most of the time unaware that their actions and behaviors have consequences in cyber space. Therefore, humans' aspects cannot be neglected in cyber security field. In this work we carry out a systematic literature review to identify human factors in cybersecurity. A total of 27 papers were selected to be included in the review, which focuses on the human factors in cyber security. The results show that in total of 14 identified human factors, risk perception, lack of awareness, IT skills and gender are considered critical for organization as for as cyber security is concern. Our results presented a further step in understanding human factors that may cause issues for organizations in cyber space and focusing on the need of a customized and inclusive training and awareness programs.

Significance and Research Challenges of Defensive and Offensive Cybersecurity in Smart Grid

  • Hana, Mujlid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.29-36
    • /
    • 2022
  • Smart grid (SG) software platforms and communication networks that run and manage the entire grid are increasingly concerned about cyber security. Characteristics of the smart grid networks, including heterogeneity, time restrictions, bandwidth, scalability, and other factors make it difficult to secure. The age-old strategy of "building bigger walls" is no longer sufficient given the rise in the quantity and size of cyberattacks as well as the sophisticated methods threat actor uses to hide their actions. Cyber security experts utilize technologies and procedures to defend IT systems and data from intruders. The primary objective of every organization's cybersecurity team is to safeguard data and information technology (IT) infrastructure. Consequently, further research is required to create guidelines and methods that are compatible with smart grid security. In this study, we have discussed objectives of of smart grid security, challenges of smart grid security, defensive cybersecurity techniques, offensive cybersecurity techniques and open research challenges of cybersecurity.

A study on the Applicability of Software International Standards for SaMD's Cybersecurity Regulation (SaMD의 사이버보안 규제에 대한 소프트웨어 국제표준의 적용 가능성에 대한 연구)

  • Lee Young Kim;Youngjoo Chung;Gyu Ha Ryu;Baek Hwan Cho
    • Journal of Information Technology Services
    • /
    • v.22 no.4
    • /
    • pp.21-35
    • /
    • 2023
  • Software as Medical Devices (SaMD) is a growing category of medical devices that are composed of software to perform one or more medical purposes. SaMD is less likely to cause physical harm compared to conventional medical devices, particularly medical electrical equipments, and may be more vulnerable to privacy issues. This difference was acknowledged and resulted in introducing new regulation guidance specifically for cybersecurity of SaMD. It guides stakeholders of SaMD what to consider in what context in terms of cybersecurity. This study examines the current guidance of how cybersecurity is considered for SaMD by analyzing current medical device standards, then suggest which concept or details beyond current medical device standards may be applicable through analysis of international standards documents published for software in general.

Developing Reference Model for National Cybersecurity Strategy Establishment and Improvement (국가 사이버보안 전략 수립과 개선을 위한 참조 모델 개발)

  • YUN, Jaesuk
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.53-61
    • /
    • 2016
  • A number of countries have been developing and implementing national cybersecurity strategy to prevent damages caused by cyber threats and to minimize damages when they happened. However, there are a lot of differences and disparities in respective strategies with their own background and needs. A vulnerability in some places can be a global problem, so various guidelines have been developed by relevant organizations including international organizations to support the establishment of national cybersecurity strategies and improvement of them. In this paper, with analysis on the guidelines for the establishment of national cybersecurity strategies, reference model consisting of common elements of strategies was suggested. And several recommendations for the improvement measures for Korean national cybersecurity strategies were explained with a comparison of the reference model.

A Study on Cybersecurity Regulation for Financial Sector: Policy Suggestion based on New York's Cybersecurity Regulation (23 NYCRR 500) (국내 금융 사이버보안 규제의 국제경쟁력 제고를 위한 연구: 미(美) 뉴욕 주 금융 사이버보안 규정 (23 NYCRR 500)을 중심으로)

  • Kim, Docheol;Kim, Inseok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.87-107
    • /
    • 2018
  • In March 2017, the State of New York became the first state to implement regulation specific to cybersecurity for financial institutions. Unlike previous regulations regarding information security, it has set a minimum requirements to establish cybersecurity program based on risk assessment results, protect Nonpublic Information, designate of CISO, and report to regulatory entity. This paper presents a need for a new cybersecurity policy in Korea by examining newly adopted cybersecurity regulation in the United States. Finally, the paper identify policy suggestions based on the United States's approach as they have successfully implemented the program.

A Study on establishing the Role of Intelligence Agency on Cybersecurity - Focusing on Revision or Enactment of Cybersecurity related Bill - (정보기관의 사이버안보 역할 정립에 관한 연구 -사이버안보관련 법안 제·개정안을 중심으로-)

  • Yoon, Oh Jun;Kim, So Jeong;Jeong, Jun Hyeon
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.45-52
    • /
    • 2018
  • As the era of the 4th Industrial Revolution has progressed and the information and communication technologies have developed dramatically, the cyber threats will gradually become more intelligent and sophisticated. Therefore, in order to take systematic and prompt action in case of an accident while preparing measures against the threat, the role of intelligence agency is important. However, Korea is having difficulty in responding to the threats due to the lack of support for the national cybersecurity bill or the amendment bill of the National Intelligence Service. In this paper, I examine the cybersecurity function of the intelligence agency, the recent debate trends, and implications for the role of intelligence agency in our current situation. And then I intend to suggest some measures such as concentration on information gathering and analysis, enhancement of cyber threat prediction and response capacity, and strengthening of legal basis as a way to establish the role of intelligence agency for reinforcement of cybersecurity performance system.

  • PDF

A study on the application of mission-based weapon system cybersecurity test and evaluation (임무 기반의 무기체계 사이버보안 시험평가 적용 연구)

  • Kim, Ik-jae;Kang, Ji-won;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.71-81
    • /
    • 2021
  • This paper examines the ongoing research on ways to improve cybersecurity during the entire life cycle of weapons systems applied in advanced countries such as the United States, analyzes restrictions on obtaining domestic weapons systems, and presents effective security evaluation measures. By consistently performing mission-based risk assessment in the cybersecurity test and evaluation plan suitable for domestic circumstances at all stages of acquisition, important information is provided to major decision-making organizations in a timely manner to support decision-making, and to respond to identified vulnerabilities in cybersecurity. It is proposed to set the rules of engagement so that the protection measures can be verified, and a simulated invasion is proposed. In addition, the proposed cybersecurity test and evaluation system was compared with the domestic weapon system test and evaluation. Through this, the mission-based risk assessment element was grafted into the cybersecurity test and evaluation system research conducted so far to identify risks in a timely manner between acquisition projects, thereby supplementing the capability to support major decision-making.

Proposals for GCI Indicators to Improve a National Cybersecurity Level (국가 사이버보안 수준 향상을 위한 GCI의 지표개선 방안)

  • Kim, Dae kyung;Lee, Ju hyeon;Kim, Ye young;Hyeon, Da eun;Oh, Heung-Ryong;Chin, Byoung moon;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.289-307
    • /
    • 2022
  • The Global Cybersecurity Index (GCI) developed by the International Telecommunication Union (ITU) is used to diagnose a country's cybersecurity development level and to strengthen its cybersecurity capabilities. This paper analyzes GCI and tries to suggest a way to strengthen its effectiveness. In addition, we analyze the GCI version 1~GCI version 4 evaluation index in advance, and examine the development plan through SWOT analysis. Through this, basic principles for GCI improvement and utilization will be established, and new indicators related to the GCI version 5 questionnaire will be discovered and suggested. This paper is expected to be used as basic data for GCI performance analysis and improvement plan. In addition, it is intended to contribute to enhance the effectiveness of GCI and the nation's cybersecurity capabilities by proposing more advanced proactive and reactive indicators to be applied to the future GCI evaluations. This paper is an improvement and development for the research result of [1].

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.