• Title/Summary/Keyword: infrastructure scenario

Search Result 158, Processing Time 0.027 seconds

FAIR-Based BIA for Ransomware Attacks in Financial Industry (금융 산업에서 발생하는 랜섬웨어 공격에 대한 FAIR 기반의 손실 측정 모델 분석)

  • Yoon, Hyun-sik;Song, Kyung-hwan;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.873-883
    • /
    • 2017
  • As Ransomware spreads, the target of the attack shifted from a single personal to organizations which lead attackers to be more intelligent and systematic. Thus, Ransomware's threats to domestic infrastructure, including the financial industry, have grown to a level that cannot be ignored. As a measure against these security issues, organizations use ISMS, which is an information protection management system. However, it is difficult for management to make decisions on the loss done by the security issues since amount of the damage done can not be calculated with just ISMS. In this paper, through FAIR-based loss measurement model based on scenario's to identify the extent of damage and calculate the reasonable damages which has been considered to be the problem of the ISMS, we identified losses and risks of Ransomeware on the financial industry and method to reduce the loss by applying the current ISMS and ISO 27001 control items rather than modifying the ISMS.

Projection of Future Sea Level Change Based on HadGEM2-AO Due to Ice-sheet and Glaciers (HadGEM2-AO 기반의 빙상과 빙하에 의한 미래 해수면 변화 전망)

  • Kim, Youngmi;Goo, Tae-Young;Moon, Hyejin;Choi, Juntae;Byun, Young-Hwa
    • Atmosphere
    • /
    • v.29 no.4
    • /
    • pp.367-380
    • /
    • 2019
  • Global warming causes various problems such as the increase of the sea surface temperature, the change of coastlines, ocean acidification and sea level rise. Sea level rise is an especially critical threat to coastal regions where massive population and infrastructure reside. Sea level change is affected by thermal expansion and mass increase. This study projected future sea level changes in the 21st century using the HadGEM2-AO with RCP8.5 scenario. In particular, sea level change due to water mass input from ice-sheets and glaciers melting is studied. Sea level based on surface mass balance of Greenland ice-sheet and Antarctica ice-sheet rose 0.045 m and -0.053 m over the period 1986~2005 to 2081~2100. During the same period, sea level owing to dynamical change on Greenland ice-sheet and Antarctica ice-sheet rose 0.055 m and 0.03 m, respectively. Additionally, glaciers melting results in 0.145 m sea level rise. Although most of the projected sea level changes from HadGEM2-AO are slightly smaller than those from 21 ensemble data of CMIP5, both results are significantly consistent each other within 90% uncertainty range of CMIP5.

Development of VR Fire-extinguishing Experience Education Contents Using UX Design Methodology (UX 디자인 방법론을 적용한 VR 소방체험 교육콘텐츠 개발)

  • Chung, Yoo-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.3
    • /
    • pp.222-230
    • /
    • 2017
  • The Ministry of Public Safety and Security plans to expand fire safety education infrastructure to provide customized fire safety education, spread fire safety culture and develop a tailored fire safety education system as a part of the 2016 Citizens' Safety Improvement Policy. This study has also been designed to improve safety problems in the Republic of Korea. Even though safety education has been given, citizens aren't still able to experience a close-to-real situation. In addition, their understanding and satisfaction with the curriculum are very low. Therefore, this study offers VR fire-extinguishing experience education contents as an effective alternative. With a goal of having the participants experience fire extinguishing and evacuation drill in a virtual space, this program has the following advantages: i) safe fire-extinguishing experience; ii) UI to create fun ; iii) useful in fire-extinguishing education; iv) budget saving. we configure the VR fire experience system structure and hardware by applying UX design methodology. We also develop for VR-specific motion recognition plug-in and controller that can be feeling in HMD environment.

The Routing Algorithm for Wireless Sensor Networks with Random Mobile Nodes

  • Yun, Dai Yeol;Jung, Kye-Dong;Lee, Jong-Yong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.38-43
    • /
    • 2017
  • Sensor Networks (WSNs) can be defined as a self-configured and infrastructure-less wireless networks to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location or base-station where the data can be observed and analyzed. Typically a wireless sensor network contains hundreds of thousands of sensor nodes. The sensor nodes can communicate among themselves using radio signals. A wireless sensor node is equipped with sensing and computing devices, radio transceivers and power components. The individual nodes in a wireless sensor network (WSN) are inherently resource constrained: they have limited processing speed, storage capacity, communication bandwidth and limited-battery power. At present time, most of the research on WSNs has concentrated on the design of energy- and computationally efficient algorithms and protocols In order to extend the network life-time, in this paper we are looking into a routing protocol, especially LEACH and LEACH-related protocol. LEACH protocol is a representative routing protocol and improves overall network energy efficiency by allowing all nodes to be selected to the cluster head evenly once in a periodic manner. In LEACH, in case of movement of sensor nodes, there is a problem that the data transmission success rate decreases. In order to overcome LEACH's nodes movements, LEACH-Mobile protocol had proposed. But energy consumption increased because it consumes more energy to recognize which nodes moves and re-transfer data. In this paper we propose the new routing protocol considering nodes' mobility. In order to simulate the proposed protocol, we make a scenario, nodes' movements randomly and compared with the LEACH-Mobile protocol.

Proposition of System Algorithm for Implement Machine Socialization Environment (Machine Socialization 환경 구현을 위한 시스템 알고리즘 제안)

  • Kim, Wung-Jun;Im, Hyeok;Hwang, Jong-Seon;Jeong, Ji-O;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.595-597
    • /
    • 2015
  • In recent years, global Internet of Things is being fostered by strategic industry in major countries (IoT: Internet of Things) technology is the future Internet -based context-aware infrastructure capable of communication between objects and things. Existing technology was only a single device control via P2M (Puman to Machine) method and simple sensor data to someone directly control the devices down command. However, a kind of IoT Machine Socialization of devices, each device uses an internal feature information, and M2M (Machine to Machine) devices in ways that expand the overall scenario collaboration system through the Device Manager. In this paper, an algorithm of the whole system of the Machine Socialization for changing the system of the conventional system of P2M by M2M, and analysis.

  • PDF

Security Risks Evaluation based on IPv6 Firewall Rules (IPv6의 방화벽 규칙을 기반으로한 보안위험 평가)

  • Phang, Seong-Yee;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF

Priority-Based Dynamic Intent Assignment Method in Wi-Fi Direct Environments (Wi-Fi Direct 환경에서 우선순위 기반의 동적 Intent 할당 방안)

  • Lee, Jae-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.565-573
    • /
    • 2016
  • Wi-Fi Direct standard technology(Wi-Fi Peer to Peer Technical Specifications v1.2, 2010) was designed for allowing peer to peer communication between two or more devices and various products which have been currently manufactured such as smart phone and smart TV have already provided this technical function. In this technology the role of Coordinator in Wi-Fi infrastructure would be matched to GO(Group Owner) which needs relatively high energy resource and computation power due to the high probability for allowing 3rd-party connection, however, the current standard specification would be limited in terms of energy distribution because it has not included a process to determine the role of GO. To address above problem, this paper classified considerable parameters into the general parameters for the physicality of devices and the specific parameters for considering the role position depending on use-case scenario, and proposed a new method called DIVA to help efficiently determining GO role from the member devices of Wi-Fi Direct network. Furthermore the effect of this mechanism was proved via simulation-based experiments.

Paid Peering: Pricing and Adoption Incentives

  • Courcoubetis, Costas;Sdrolias, Kostas;Weber, Richard
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.975-988
    • /
    • 2016
  • Large access providers (ISPs) are seeking for new types of business agreements and pricing models to manage network costs and monetize better the provision of last-mile services. A typical paradigm of such new pricing norms is the proliferation of paid peering deals between ISPs and content providers (CPs), while on top of this, some ISPs are already experimenting with usage-based tariffs, usually through data-plans, instead of the typical fixed-based charging. In this work we define as common platform, the infrastructure in which a single ISP transacts with several CPs through peering agreements. In this context, we examine whether, and under which market conditions, the profitability of the involved stakeholders improves when the establishment of this platform is accompanied by a monetary compensation from the CPs to the ISP (paid peering), v.s. a scenario where their deal is a typical settlement-free one. In both cases, we assume that the ISP implements a usage-based access pricing scheme, implying that end-users will pay more for higher transaction rates with the CPs. Our framework captures some of the most important details of the current market, such as the various business models adopted by the CPs, the end-users' evaluation towards the ISP's and CPs' level of investments and the traffic rates per transaction for the offered services. By analysing the equilibrium derived by a leader-follower game, it turns out (among other practical takeaways) that whether or not the profitability of a CP improves, it highly depends on whether its business model is to sell content, or if it obtains its revenue from advertisements. Finally, we extract that consumer surplus is considerably higher under paid peering, which in turn implies improved levels of social welfare.

Development of a Underground Facility Management System based on Sensor and Object Data (센서 및 객체 정보 기반의 도시 지하시설물 관리시스템 구축 방안)

  • Kang, Joon-Mook;Lee, Jae-Wook;Seo, Myung-Woo;Baik, Song-Hoon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.5
    • /
    • pp.607-617
    • /
    • 2009
  • With the promotion of the u-City project in recent years, the need for the systematic and efficient management of ground and underground facilities comprising the urban infrastructure has been increased. Considering that the diverse services provided in the u-City are closely related to the physical environment of the city itself, including its location and condition, the core of such management must be to continuously maintain these facilities in a normal state, based on accurate data collection from the facilities. This paper discusses a method of collecting the sensor and the object data that are needed to accurately understand the state of the underground facilities, and presents a plan to build an Underground Facility Management System on this basis. This plan is then verified using a scenario test performed by a prototype system.

Probing the Impact Fee Zone Boundaries Based on Stepwise Scenarios of the Population Grid Cell Buffer Formation (인구격자 셀 버퍼공간 설정에 의한 기반시설부담구역경계 검토방안 연구)

  • Choei, Nae-Young
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.4
    • /
    • pp.53-60
    • /
    • 2009
  • Recently, the Korean government has amended the "National Territory Planning Act" by adding criteria to designate the Impact Fee Zone on the basis of the population increase rate. Taking the Dongtan Newtown in Hwasung City as the case, the study first tries to apply a grid analysis method to figure out the cells that exceed the legal population increase rate criteria. Then, the study, for rather a practical purpose, introduces a scenario analysis that tries to envelope the cells into a spatially contiguous groups based on their degrees of stepwise adjacency by cell buffer formation. By overlapping the selected cell groups chosen by such stepwise scenarios over the actual zoning map of land-uses for the vicinity, it seems clear that the chosen areas rationally coincide with those residential blocks and commercial areas with the high population density in the Newtown.

  • PDF