• Title/Summary/Keyword: threat value

Search Result 168, Processing Time 0.032 seconds

The Best Model to Optimize Security Investments with Considering a Corelation of Response Techniques Against Each Threat (위협별 대응기술들의 상관관계를 고려한 보안 투자 모델링)

  • Kim, Min-Sik;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.39-44
    • /
    • 2009
  • To get legitimacy of a security investment, the analysis of ROI about the security investment is required. In this paper, we suggest a practical quantitative model with considering factors that do decision-making of optimized security investment difficult. This model makes use of the value of a residual risk to decide the best information security solution and considers a corelation of response techniques of the information security solution against each threat to do exact decision-making.

  • PDF

Cybersecurity Risk Assessment of a Diverse Protection System Using Attack Trees (공격 트리를 이용한 다양성보호계통 사이버보안 위험 평가)

  • Jung Sungmin;Kim Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.25-38
    • /
    • 2023
  • Instrumentation and control systems measure and control various variables of nuclear facilities to operate nuclear power plants safely. A diverse protection system, a representative instrumentation and control system, generates a reactor trip and turbine trip signal by high pressure in a pressurizer and containment to satisfy the design requirements 10CFR50.62. Also, it generates an auxiliary feedwater actuation signal by low water levels in steam generators. Cybersecurity has become more critical as digital technology is gradually applied to solve problems such as performance degradation due to aging of analog equipment, increased maintenance costs, and product discontinuation. This paper analyzed possible cybersecurity threat scenarios in the diverse protection system using attack trees. Based on the analyzed cybersecurity threat scenario, we calculated the probability of attack occurrence and confirmed the cybersecurity risk in connection with the asset value.

Measurement and Analysis for 3-D RCS of Maritime Ship based on 6-DOF Model (6 자유도 모델에 기반한 운항중인 함정의 3차원 RCS 측정 및 분석 기법)

  • Gwak, Sang-yell;Jung, Hoi-in
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.4
    • /
    • pp.429-436
    • /
    • 2018
  • The RCS value of maritime ship is indicator of ship's stealth performance and it should be particularly measured for navy ship to ensure survivability on the battlefield. In the design phase of the navy ship, a RCS prediction should be performed to reduce RCS value and achieve ROC(Required Operational Capability) of the ship through configuration control. In operational phase, the RCS value of the ship should be measured for verifying the designed value and obtaining tactical data to take action against enemy missile. During the measurement of RCS for the ship, ship motion can be affected by roll and pitch in accordance with sea state, which should be analyzed into threat elevation from view point of enemy missile. In this paper, we propose a method to measure and analyze RCS of ship in 3-dimensions using a ship motion measuring instrument and a fixed RCS measurement system. In order to verify the proposed method, we conducted a marine experiment using a test ship in sea environment and compared the measurement data with RCS prediction value which is carried by prediction SW($CornerStone^{TM}$) using CAD model of the ship.

The Threat of AI and Our Response: The AI Charter of Ethics in South Korea

  • Hwang, Ha;Park, Min-Hye
    • Asian Journal of Innovation and Policy
    • /
    • v.9 no.1
    • /
    • pp.56-78
    • /
    • 2020
  • Changes in our lives due to Artificial Intelligence (AI) are currently ongoing, and there is little refutation of the effectiveness of AI. However, there have been active discussions to minimize the side effects of AI and use it responsibly, and publishing the AI Charter of Ethics (AICE) is one result of it. This study examines how our society is responding to threats from AI that may emerge in the future by examining various AIECs in the Republic of Korea. First, we summarize seven AI threats and classify these into three categories: AI's value judgment, malicious use of AI, and human alienation. Second, from Korea's seven AICEs, we draw fourteen topics based on three categories: protection of social values, AI control, and fostering digital citizenship. Finally, we review them based on the seven AI threats to evaluate any gaps between the threats and our responses. The analysis indicates that Korea has not yet been able to properly respond to the threat of AI's usurpation of human occupations (jobs). In addition, although Korea's AICEs present appropriate responses to lethal AI weapons, these provisions will be difficult to realize because the competition for AI weapons among military powers is intensifying.

South Korea as a Global Sourcing Site for Textile and Apparel Produce (글로벌 소싱 기지로서의 한국 섬유.의류산업의 현황)

  • 박혜정;이영주;임숙자
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.7
    • /
    • pp.819-830
    • /
    • 2003
  • Korea is facing great threat from other countries as a major global sourcing site for textile and apparel products. The threat has been augmented by changes in external environment such as advents of Trading Blocs and Free Trade Area(FTA) as well as internal environment such as hikes in labor cost and lack of flexibility in accommodating international buyers' needs. This study analyzed international buyers' sourcing activities in Korea for the purpose of developing strategies to enhance competitiveness of the Korean textile and apparel industries in the global market. The data used in this study were gathered by surveying 52 non-Korean textile and apparel product buyers with cooperation of the Korea Federation of Textile Industries (KOFOTI). The data were analyzed by mean, frequency, Pearson correlation coefficient, and x$^2$ analysis. The results indicated that Korea is still attractive to many international buyers especially to those who have been engaged in global sourcing for longer periods of time with bigger purchasing budgets. However, in order to expand and solidify their customer bases, Korean companies should focus more on developing competitively priced value added products a step ahead of their foreign competitors, diversifying their marketing channels including internet.

A study on the direction of security control of IoT environment (사물인터넷 환경에서의 보안 관제 방향에 관한 연구)

  • Koh, Keunho;Lee, Sungryoul;Ahn, Seongjin
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.53-59
    • /
    • 2015
  • With radical development of information and communication Technology, Internet of Things(IoT) era - all the th ings around us are connected through internet so that it enables objects to exchange data with connected devices a nd is expected to offer new advanced services that goes beyond the value where each existing objects could have o ffered respectively - has come. Concerns regarding security threat are being raised in adopting IoT as the number of internet-connected appliances are rapidly increasing. So, we need to consider how to protect and control countles s objects. This paper covers the role and procedures of existing security control. Futhermore, it provides information about the direction of security control when it comes to IoT.

Embedding Method of Secret Data using Error-Diffusion (오차 확산법을 이용한 기밀 데이터 합성법)

  • 박영란;이혜주;박지환
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.2
    • /
    • pp.155-165
    • /
    • 1999
  • Because the encrypted data is random, there is a possibility of threat that attacker reveals the secret data. On the other hand, as the image steganogrphy is to embed the secret data into cover image and to transmit the embedded image to receiver, an attacker could not know the existence of secret data even though he/she sees the embedded image, therefore the sender may reduce the threat of attack. In the image steganography, the secret data is embedded by modifying value of pixels as a form of noise. If the secret data is embedded into gray image, the degradation of image quality results from the modifications of image due to noise. Therefore many methods have been proposed to embed the secret data while dethering the gray image, but the existing method using error-diffusion has a problem that any patterns such as a diagonal lines or vertical take place due to embedding the secret data at the fixed interval. To solve this problem and to improve the existing method, we proposed the new method that embeds the secret data at changed point with respect to 1's run-length or at the position where has the minimum difference with the original dithered value. We evaluated the performance of the proposed method by computer simulation.

  • PDF

Retrieval of Rain-Rate Using the Advanced Microwave Sounding Unit(AMSU)

  • Byon, Jae-Young;Ahn, Myoung-Hwan;Sohn, Eun-Ha;Nam, Jae-Cheol
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.361-365
    • /
    • 2002
  • Rain-rate retrieval using the NOAA/AMSU (Advanced Microwave Sounding Unit) (Zaho et al., 2001) has been implemented at METRI/KMA since 2001. Here, we present the results of the AMSU derived rain-rate and validation result, especially for the rainfall associated with the tropical cyclone for 2001. For the validation, we use rain-rate derived from the ground based radar and/or rainfall observation from the rain gauge in Korea. We estimate the bias score, threat score, bias, RMSE and correlation coefficient for total of 16 tropical cyclone cases. Bias score shows around 1.3 and it increases with the increasing threshold value of rain-rate, while the threat score extends from 0.4 to 0.6 with the increasing threshold value of precipitation. The averaged rain-rate for at all 16 cases is 3.96mm/hr and 1.41mm/hr for the retrieved from AMSU and the ground observation, respectively. On the other hand, AMSU rain-rate shows a much better agreement with the ground based observation over inner part of tropical cyclone than over the outer part (Correlation coefficient for convective region is about 0.7, while it is only about 0.3 over the stratiform region). The larger discrepancy of tile correlation coefficient with the different part of the tropical cyclone is partly due to the time difference in between ice water path and surface rainfall. This results indicates that it might be better to develop the algorithm for different rain classes such as convective and stratiform.

  • PDF

Network Attack Detection based on Multiple Entropies (다중 엔트로피를 이용한 네트워크 공격 탐지)

  • Kim Min-Taek;Kwon Ki Hoon;Kim Sehun;Choi Young-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.71-77
    • /
    • 2006
  • Several network attacks, such as distributed denial of service (DDoS) attack, present a very serious threat to the stability of the internet. The threat posed by network attacks on large networks, such as the internet, demands effective detection method. Therefore, a simple intrusion detection system on large-scale backbone network is needed for the sake of real-time detection, preemption and detection efficiency. In this paper, in order to discriminate attack traffic from legitimate traffic on backbone links, we suggest a relatively simple statistical measure, entropy, which can track value frequency. Den is conspicuous distinction of entropy values between attack traffic and legitimate traffic. Therefore, we can identify what kind of attack it is as well as detecting the attack traffic using entropy value.

Signal Value of Partial Song (Composed of 1 Phrase Unit) in Great Tits, Parus major: Evidence from Playback Experiments (박새(Parus major)의 Partial Song(1 phrase)의 신호적 가치)

  • 천세민;박시룡
    • The Korean Journal of Zoology
    • /
    • v.38 no.2
    • /
    • pp.230-237
    • /
    • 1995
  • Playback experiments were excecuted with seven threat Tit males inhabited in Gsngnae Myeon, Darak Ri, Chungbuk province to investigate the signal value of partial song (one unit phrase composed of two notes) as a species recognition releaser. Territorial males responded strongly to their own natural, synthetic and partial songs played in the field. However, thew showed weak or no responses to the playback songs of other species: Coal Tit (Porus ate4 and Yellow-throated Bunting (EmberiEa elegansl.6reat Tits distinguished conspecific partial songs readily from songs of other species. The results demonstrated that one unit phrase which is a basic arrangement of the Great Tit song, containes information on species recognition.

  • PDF