• Title/Summary/Keyword: threat evaluation

Search Result 218, Processing Time 0.023 seconds

Historical Review on Aviation Threats and Management of Aviation Security (항공위협의 역사적 고찰과 항공보안 관리 연구)

  • Ahn, J.H.;Kang, J.Y.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.12 no.2
    • /
    • pp.29-42
    • /
    • 2004
  • This paper performs a historical review on aviation threats through a statistical survey. The impact factor, as a criterion to measure the seriousness of the threats occurred, is introduced and evaluated based on annual totals of hijacking and fatalities against aircraft 1948 through 2004. Also, the paper suggests processes of evaluating the level of threats and key functions for an effective management of the aviation security.

  • PDF

The Design and Implementation for Efficient C2A (효율적인 방공 지휘통제경보체계를 위한 설계 및 구현)

  • Kwon, Cheol-Hee;Hong, Dong-Ho;Lee, Dong-Yun;Lee, Jong-Soon;Kim, Young-Vin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.6
    • /
    • pp.733-738
    • /
    • 2009
  • In this paper, we have proposed the design and implementation for efficient Command Control and Alert(C2A). Information fusion must be done for knowing the state and identification of targets using multi-sensor. The threat priority of targets which are processed and identified by information fusion is calculated by air-defence operation logic. The threat targets are assigned to the valid and effective weapons by nearest neighborhood algorithm. Furthermore, the assignment result allows operators to effectively operate C2A by providing the operators with visualizing symbol color and the assignment pairing color line. We introduce the prototype which is implemented by the proposed design and algorithm.

Evaluation of the Combat Aircraft Susceptibility Against Surface-Based Threat Using the Weighted Score Algorithm

  • Kim, Joo-Young;Kim, Jin-Young;Lee, Kyung-Tae
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.12 no.4
    • /
    • pp.396-402
    • /
    • 2011
  • Aircraft combat survivability is an essential factor in the design of combat aircrafts that operate in an enemy air defense area. The combat aircrafts will be confronted with anti-aircraft artillery and/or surface-to-air missiles (SAM) from the ground, and their survivability can be divided into two categories: susceptibility and vulnerability. This article studies the prediction of susceptibility in the case of a one-on-one engagement between the combat aircraft and a surface-based threat. The weighted score method is suggested for the prediction of susceptibility parameters, and Monte Carlo simulations are carried out to draw qualitative interpretation of the susceptibility characteristics of combat aircraft systems, such as the F-16 C/D, and the hypersonic aircraft, which is under development in the United States, versus ground threat from the SAM SA-10.

The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW (스마트폰 이용자의 악성코드용 모바일 백신 이용 의도에 영향을 미치는 요인)

  • Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.113-131
    • /
    • 2014
  • Smartphone security threat has become an important issue in Information Science field following the wide distribution of smartphones. However, there are few studies related to such. Therefore, this study examined the factors affecting the intention of smartphone users to use the mobile vaccine against malware with the Protection Motivation Theory. To secure the reliability of the study, a surveying agency was commissioned. A total of 263 respondents, excluding 37 respondents who are users of iOS, which does not have mobile vaccine in the smart phone, or who gave invalid responses, were surveyed. The results showed that perception of the installed mobile vaccine significantly affected the Response Efficacy and Self-efficacy, and that the Perceived Severity, Perceived Vulnerability, Response Efficacy, and Self-efficacy significantly influenced the intention to use the mobile vaccine. On the other hand, Installation Perception of mobile vaccine itself did not affect the Perceived Severity and Perceived Vulnerability. This study is significant since it presented the new evaluation model of threat evaluation and response evaluation in the Protection Motivation Theory in accepting the security technology and raised the need for the promotion and exposure of mobile vaccine, since perception of mobile vaccine installation affects the response evaluation. It also found that the promotion must consider the seriousness of smartphone security, outstanding attribute of mobile vaccine, and user-friendliness of mobile vaccine above all.

A Study on the Test and Evaluation Methodology for the Precise Encountering Scenario between Ammunitions (탄약 간 정밀교전을 위한 시험평가기법 연구)

  • Ha, Jongsoo;Park, Youngsik;Lee, Hanjin;Kim, Yongjae;Kwak, Yoon;Park, Minkyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.776-783
    • /
    • 2018
  • This paper proposes an improved test and evaluation methodology to be conducted for a in-flight threat-countermeasure encounter scenario. Although the conventional test method adopted in the precedent researches allows high precision and safety, such full-scale method is practically not appropriate to apply to small-scale test rounds for evaluating the subparts of the ammunition. To address this problem, this study suggests a readily-applicable, small-scale test and evaluation method of the subpart of the ammunition in firing test. In the threat-countermeasure encounter scenario, the results of several tests demonstrate that the proposed technique does not deteriorate the precision when the engagement point should be adjusted.

Standardization Model and Implementation of Event Type in Real Time Cyber Threat (실시간 위협에서 Event 유형의 정형화 설계 및 구현)

  • Lee, Dong-Hwi;Lee, Dong-Chun;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.67-73
    • /
    • 2006
  • The method which research a standardization from real time cyber threat is finding the suspicious indication above the attack against cyber space include internet worm, virus and hacking using analysis the event of each security system through correlation with the critical point, and draft a general standardization plan through statistical analysis of this evaluation result. It means that becomes the basis which constructs the effective cyber attack response system. Especially at the time of security accident occurrence, It overcomes the problem of existing security system through a definition of the event of security system and traffic volume and a concretize of database input method, and propose the standardization plan which is the cornerstone real time response and early warning system. a general standardization plan of this paper summarizes that put out of threat index, threat rating through adding this index and the package of early warning process, output a basis of cyber threat index calculation.

  • PDF

Evaluation Tool for Analyzing Method of the Information System (정보시스템 위험분석 평가도구)

  • Kim, Kang;Cho, Kyoung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.773-777
    • /
    • 2007
  • Very various infusion by development of systems that is based on network is spread. Therefore, Evaluation Tool has been an active research area to reduce the risk from intrusion. On this thesis, during threat assesment, we have planned possible an equal-weight applied assesment and considering the characteristics of the organization an assesment which security factor's weight is variably applied to, and respective organizations to examine its security by itself in order to support the easy findings of the vulnerabilities on the management point of view, and to show the advices to practice.

  • PDF

A Threats Statement Generation Method for Security Environment of Protection Profile (PP의 보안환경을 위한 위협문장 생성방법)

  • 고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.69-86
    • /
    • 2003
  • A Protection Profile(PP) is a common security and assurance requirements for a specific class of Information Technology security products such as firewall and smart card. A PP should be included "TOE(Target of Evaluation) Security Environment", which is consisted of subsections: assumptions, treat, organizational security policies. This paper presents a new threats statement generation method for developing TOE security environment section of PP. Our survey guides the statement of threats in CC(Common Criteria) scheme through collected and analysed hundred of threat statements from certified and published real PPs and CC Tool Box/PKB that is included a class of pre-defined threat and attack statements. From the result of the survey, we present a new asset classification method and propose a threats statement generation model. The former is a new asset classification method, and the later is a production rule for a well formed statement of threats.

  • PDF

Distribution Aspect and Extinction Threat Evaluation of the Endangered Species, Cottus hangiongensis (Pisces: Cottidae) in Korea (멸종위기어류 한둑중개 Cottus hangiongensis(Pisces: Cottidae)의 분포양상 및 멸종위협 평가)

  • Ko, Myeong-Hun;Han, Mee-Sook;Kwan, Sun-Man
    • Korean Journal of Ichthyology
    • /
    • v.30 no.3
    • /
    • pp.155-160
    • /
    • 2018
  • The distribution aspect and extinction threat evaluation of the endangered species, Cottus hangiongensis were investigated from 2011 to 2017 in Korea for this study. The distribution reports of C. hangiongensis were divided into 1954~1985, 1981~2003, 2004~2012, and 2011~2017. The number of habited streams decreased gradually to 30, 24, 10, and 19 streams, respectively. In this study (2011~2017), C. hangiongensis was newly found in two streams (Ayajincheon and Chuksancheon), but 15 streams that appeared in the past are not in this study. The main habitat of C. hangiongensis was the downstream riffle of clean water with fast velocity and cobble-boulder bottoms. Given this evidence as noted for more than a 30% reduction in population after 2003, due to construction wear, river work and the qualitative decline of the habitat, C. hangiongensis is now considered to be Vulnerable (VU A2ac) based on the IUCN Red List categories and criteria.

A Study on Security Evaluation for Mobile Web Services Message (모바일 웹서비스 메시지의 보안 평가에 관한 연구)

  • Lee, Seoung-Hyeon;Lee, Jae-Seung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.765-768
    • /
    • 2007
  • In this paper, the security evaluation method about mobile web services message is suggested in the method for improving the safety an reliability about the mobile web services message. In order that the goal of this paper is accomplished, the security threat and the security vulnerability which can be occurred in the mobile web services message are defined. The evaluation method for performing the security evaluation about the mobile web services message is defined. Also, the requirements for the mobile web services message security evaluation are defined. Finally, the evaluation framework for performing the mobile web services message security evaluation is constituted, and the evaluation scenario example is suggested. By using the mobile web services message security evaluation defined in the paper, before the mobile web services is deployed, the security threats and security vulnerability can be verified. Also, the countermeasure for the security threat and security vulnerability discovered in the verification result can be prepared. Therefore, the sorority and reliability about the mobile web services can be improved.

  • PDF