• Title/Summary/Keyword: threat

Search Result 2,850, Processing Time 0.026 seconds

OSINT기반의 활용 가능한 사이버 위협 인텔리전스 생성을 위한 위협 정보 수집 시스템

  • Kim, KyeongHan;Lee, Seulgi;Kim, Byungik;Park, SoonTai
    • Review of KIISC
    • /
    • v.29 no.6
    • /
    • pp.75-80
    • /
    • 2019
  • 2018년까지 알려진 표적공격 그룹은 꾸준히 증가하여 현재 155개로 2016년 대비 39개가 증가하였고, 침해사고의 평균 체류시간(dwell-time)은 2016년 172일에서 2018년 204일로 32일이 증가하였다. 점점 다양해지고 심화되고 있는 APT(Advanced Persistent Threat)공격에 대응하기 위하여 국내외 기업들의 사이버 위협 인텔리전스(CTI; Cyber Threat Intelligence) 활용이 증가하고 있는 추세이다. 현재 KISA에서는 글로벌 동향에 발맞춰 CTI를 활용할 수 있는 시스템을 개발 중에 있다. 본 논문에서는 효율적인 CTI 활용을 위한 OSINT(Open Source Intelligence)기반 사이버 위협 정보 수집 및 연관관계 표현 시스템을 소개하고자 한다.

The Operational Time pressure and TEM (운항시간 압력 및 Threat과 Error 관리)

  • Choe, Jin-Guk;An, Gyeong-Su;Jeong, Won-Gyeong;Kim, Chil-Yeong
    • 한국항공운항학회:학술대회논문집
    • /
    • 2006.11a
    • /
    • pp.61-65
    • /
    • 2006
  • The flight deck crew are under the operational time pressure in the cockpit. The crew tend to make errors when they face the threats of operational time pressure because they are in a rush. The flight deck crew can reduce threats and errors which existing within the airlines by using threat and error management when the crew know these threats and errors. The airlines can implement meaningful safety management system by analyzing into the useful information for to identify the hazard and manage the risk to reduce these threats and errors since aircrafts accidents can be fatal.With the threats and errors that were found regard to operational time pressures, company may implements safety change process to improve the safety systematically and the crew can manage the threats and errors more effectively.

  • PDF

A Review of IPTV Threats Based on the Value Chain

  • Lee, Hong-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.2
    • /
    • pp.163-177
    • /
    • 2009
  • The demand for services using digital technology is constantly increasing as new developments in digital consumer electronics and the Internet are made. This is especially true in terms of the demand for IPTV utilizing high speed Internet networks. Research on IPTV threats is important for facilitating financial transactions via IPTV and preventing illegal use or copying of digital content. Thus, this paper analyzes IPTV threats via the IPTV value chain. That is, the distribution system for IPTV service is analyzed along with the components of the value chain and corresponding IPTV security requirements or security technologies, in order to perform a threat analysis and research suitable for the IPTV service environment. This paper has a greater focus on the value chain of the IPTV business than the approach in previous research, in order to analyze security requirements and technologies that are more applicable to the business environment.

A Coherent Model in Upholding General Deterrence Theory and Impact to Information Security Management

  • Choi, Myeong-Gil;Ramos, Edwin R.;Kim, Man-Sig;Kim, Jin-Soo;Whang, Jae-Hoon;Kim, Ki-Joo
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.73-86
    • /
    • 2009
  • To establish an effective security strategy, business enterprises need a security benchmarking tool. The strategy helps to lessen an impact and a damage in any threat. This study analyses many aspects of information security management and suggests a way to deal with security investments by considering important factors that affect security manager's decision. To address the different threats resulting from a major cause of accidents inside an enterprise, we investigate an approach that followed ISO17799. We unfold a criminology theory that has designated many measures against the threat as suggested by General Deterrence Theory. The study proposes a coherent model of the theory to improve the security measures especially in handling and protecting company assets and human lives as well.

  • PDF

The Express Tilting Train System Specification Development Using Systems Engineering Standard-EIA632 (시스템엔지니어링 표준(EIA632)에 의한 틸팅열차 시스템 사양서 개발)

  • Lee Joongyoon;Shin Guangbok
    • Proceedings of the KSR Conference
    • /
    • 2003.05a
    • /
    • pp.525-532
    • /
    • 2003
  • The mission of tilting train development project is enhancing the speed of transportation of railway passenger using existing infrastructure. The threat of this project is the tilting technology is newly incorporated to this project. To overcome the threat this project incorporate systems engineering technology to development tilting train system. The systems engineering process, which was used in this project, was performed in accordance with systems engineering standard EIA632. This paper shows the systems engineering technology which was used to develop the tilting train system specification. This paper also shows the requirement template which was developed to communicate and synthesis various specialty engineering.

  • PDF

A Study on the Development of Preliminary Hazard Analysis Model for Railway System (철도시스템 기본위험분석모델 개발 방안에 관한 연구)

  • Wang Jong-Bae;Park Chan-Woo;Park Joo-Nam
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.1-6
    • /
    • 2005
  • To improve safety management of railway and cope with the factors to threat technical and social safety, we need to establish railway safety management system based on analysis of hazards and assessment of risk for railway system. So we have to conduct PHA(Preliminary Hazard Analysis) first to understand weak points and factors to possibly threat safety using analysis of related data such as past accident/incident data and safety regulation and classification standards of hazards/causes of railway accidents. Therefore in this research, we led types/dangerous events/causes of risks/factors of risks from hazard log developed based on railway accident classification and hazards of railway accident. PHA model for domestic railway system will be used in risk analysis and risk assessment of railway accident.

  • PDF

The Best Model to Optimize Security Investments with Considering a Corelation of Response Techniques Against Each Threat (위협별 대응기술들의 상관관계를 고려한 보안 투자 모델링)

  • Kim, Min-Sik;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.39-44
    • /
    • 2009
  • To get legitimacy of a security investment, the analysis of ROI about the security investment is required. In this paper, we suggest a practical quantitative model with considering factors that do decision-making of optimized security investment difficult. This model makes use of the value of a residual risk to decide the best information security solution and considers a corelation of response techniques of the information security solution against each threat to do exact decision-making.

  • PDF

A Direction to Korean Countermeasures against Terror Following the Changes in German Countermeasure Policies against Terrors (독일의 테러대응 정책 변화에 따른 한국의 테러대책 방향)

  • Kwon, Jeong-Hoon
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.4
    • /
    • pp.411-418
    • /
    • 2012
  • This thesis aims at presenting the improvements of terror-responsive policy that Korea has to take on the basis of terror threat to Germany and responsive policies. so, First, Korea has to prepare the ways to legislate on terror responsive policies. Second, Korea has to construct a management center to response to terror comprehensively. In addition, Korea, like Germany, has to establish cooperation center related to terror on internet to surveil and analyze information and situation.

Simulating Engagement Model of Avionic ECM Pod on the Virtual Battle Field (가상전장환경하에서 항공전자전 ECM 파드의 전자전 교전모델 시뮬레이션 개발)

  • 김형균;이행호;조성찬;홍장의;변재정
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.7 no.1
    • /
    • pp.69-76
    • /
    • 2004
  • When simulating the mission flight of a fighter equipped with the avionic ECM pod, it is massively required to provide the correct information of threats, to depict the real environment of mission area, and to precisely model the capability of the ECM system. Also, in order to get the reliable results of those simulation, it should be supported the flexible changes of threat environments and the examination of multiple flight paths. This paper presents a software system which is possible to flexible and interactive ECM simulation. This system has capable of the 2D or 3D visualization of virtual battle field, the management of electronic threat data, and the simulation of engagement model.

A Study on the Optimal Allcation of Aircrafts to Defensive Counter Air by Goal Programming (목표계획법을 이용한 방어제공 임부의 항공기 최적할당에 관한 연구)

  • 김선하;강성진
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.2
    • /
    • pp.20-33
    • /
    • 2002
  • This paper deals with assigning defensive counter air aircraft to the moving target in the air. Recently various kinds of allocation problems have been researched for fixed targets using offensive aircrafts. However, the counter air allocation problems for attacking aircrafts with considering the time and the threat have not been studied much. The main objective of this study is to mininize the time to intercept and the threat values simultaneously by using goal programming. The optimal solution by using an integer goal programming and a branch and bound algorithm is found and analyzed. By applying this model to real situation, we expect to reduce the time and number of sorties for destroying enemy aircraft, respectively.