• Title/Summary/Keyword: vulnerabilities

Search Result 1,062, Processing Time 0.03 seconds

COVID-19's Impact on the Space Industry and Countermeasures in Korea (코로나19가 한국 우주산업에 미친 영향과 대응방안)

  • Kim, Jong-Bum
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.195-201
    • /
    • 2020
  • COVID-19 is hitting the world. In order to bring about new ways of innovation in the space sector, we need to analyze changes in the space sector and design new challenge strategies. COVID-19 exposes inherent vulnerabilities in the space sector. In particular, COVID-19 is causing supply chain shocks in the space industry, resulting in delays in the supply of systems, subsystems and parts due to a complete or partial interruption of a manufacturing unit. As the overall impact of New Normal on the industry is overall, we continue to look at it in the space sector. COVID is causing supply chain shock in the space industry. It causes a delay in the supply of systems, subsystems and parts due to a complete or partial interruption of a manufacturing unit. In the supply of launch services, the launch schedule is being delayed, but the main launch is still taking place. Demand for major applications such as environmental monitoring is soaring in the earth observation utilization sector. Analyzing the impact on manufacturing, the vendor-based contraction is bringing delays in the supply of systems, subsystems and components, and launch service providers are trying to minimize delays in the launch schedule.

Security Knowledge Classification Framework for Future Intelligent Environment (미래 융합보안 인력양성을 위한 보안교육과정 분류체계 설계)

  • Na, Onechul;Lee, Hyojik;Sung, Soyung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.47-58
    • /
    • 2015
  • Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology. Accordingly, new types of cybercrime are on the rise, and security breaches and other security-related incidents are increasing rapidly because of security problems like external cyberattacks, leakage by insiders, etc. These threats will continue to multiply as industry and technology converge. Thus, the main purpose of this paper is to design and present security subjects in order to train professional security management talent who can deal with the enhanced threat to information. To achieve this, the study first set key information security topics for business settings on the basis of an analysis of preceding studies and the results of a meeting of an expert committee. The information security curriculum taxonomy is developed with reference to an information security job taxonomy for domestic conditions in South Korea. The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.

A Development of the Unified Object-Oriented Analysis and Design Methodology for Security-Critical Web Applications Based on Object-Relational Database - Forcusing on Oracle11g - (웹 응용 시스템 개발을 위한 보안을 고려한 통합 분석·설계 방법론 개발 - Oracle11g를 중심으로 -)

  • Joo, Kyung-Soo;Woo, Jung-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.169-177
    • /
    • 2012
  • In the development process of application systems, the most important works are analysis and design. Most of the application systems are implemented on database system. So, database design is important. Also, IT System are confronted with more and more attacks by an increase interconnections between IT systems. Therefore security-related processes belong to a very important process. Security is a complex non-functional requirement that can interaction of many parts in the system. But Security is considered in the final stages of development. Therefore, Their increases the potential for the final product to contain vulnerabilities. Accordingly, Early in development related to security analysis and design process is very important. J2EE gives a solution based on RBAC((Role Based Access Control) for security and object-relational database also has RBAC for security. But there is not a object-oriented analysis and design methodology using RBAC of J2EE and object-relational database for security. In this paper, the unified object-oriented analysis and design methodology is developed for security-critical web application systems based on J2EE and object-relational database. We used UMLsec and RBAC of object-relational database and J2EE for this methodology.

Analysis of the Vulnerability of the IoT by the Scenario (시나리오 분석을 통한 사물인터넷(IoT)의 취약성 분석)

  • Hong, Sunghyuck;Sin, Hyeon-Jun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.1-7
    • /
    • 2017
  • As the network environment develops and speeds up, a lot of smart devices is developed, and a high-speed smart society can be realized while allowing people to interact with objects. As the number of things Internet has surged, a wide range of new security risks and problems have emerged for devices, platforms and operating systems, communications, and connected systems. Due to the physical characteristics of IoT devices, they are smaller in size than conventional systems, and operate with low power, low cost, and relatively low specifications. Therefore, it is difficult to apply the existing security solution used in the existing system. In addition, IoT devices are connected to the network at all times, it is important to ensure that personal privacy exposure, such as eavesdropping, data tampering, privacy breach, information leakage, unauthorized access, Significant security issues can arise, including confidentiality and threats to facilities. In this paper, we investigate cases of security threats and cases of network of IoT, analyze vulnerabilities, and suggest ways to minimize property damage by Internet of things.

An Enhanced System of Group Key Management Based on MIPUF in IoT (IoT 환경의 MIPUF 기반 그룹키 관리 시스템 개선)

  • Tak, Geum Ji;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1243-1257
    • /
    • 2019
  • With the emergence of the IoT environment, various smart devices provide consumers with the convenience and various services. However, as security threats such as invasion of privacy have been reported, the importance of security issues in the IoT environment has emerged, and in particular, the security problem of key management has been discussed, and the PUF has been discussed as a countermeasure. In relation to the key management problem, a protocol using MIPUF has been proposed for the security problem of the group key management system. The system can be applied to lightweight IoT environments and the safety of the PUF ensures the safety of the entire system. However, in some processes, it shows vulnerabilities in terms of safety and efficiency of operation. This paper improves the existing protocol by adding authentication for members, ensuring data independence, reducing unnecessary operations, and increasing the efficiency of database searches. Safety analysis is performed for a specific attack and efficiency analysis results are presented by comparing the computational quantities. Through this, this paper shows that the reliability of data can be improved and our proposed method is lighter than existing protocol.

Technologies trend for Wireless LAN (무선 LAN 통신망의 기술 동향)

  • Gang, Yeong-Jin;Kim, Sung-Nam;Kang, Sin-Ill;Lee, Yeong-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.255-258
    • /
    • 2011
  • Wi-Fi is a rapidly spreading communications network with Smart phone's publication, the technology has become Ubiquitous-based core network which is connected to personal computers, laptops, and tablet PC. Wi-Fi can send currently a variety of data standard due to developed wireless LAN communications network. One of Wi-Fi standard protocols, which is IEEE 802.11n, use 2.4GHz and 5GHz band. 2.4GHz band is used for 802.11b/g protocol because wavelength is long, diffraction and receiving distance is enough to connect other device. 5GHz band has more available channels to use than 2.4GHz band, so there is no frequency interference of other wireless device such as Bluetooth, RFID. Moreover, there is low interference between channels due to small users in each bandwidth level. In the thesis, we are going to analyze 802.11a/b/g protocol which has used since the beginning of Wi-Fi protocol and 802.11n protocol which is used lately. Furthermore, we look into development and direction for standardization of the next generation wireless LANs which are 802.11ac and 802.11ad. In addition, we will consider for the security, vulnerabilities and its countermeasure in Wireless LAN.

  • PDF

Design of Performance Monitoring System for eLoran Time Synchronization Service (eLoran 시각동기 성능 모니터링 시스템 설계)

  • Seo, Kiyeol;Son, Pyo-Woong;Han, Younghoon;Park, Sang-Hyun;Lee, Jong-Cheol
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.6
    • /
    • pp.815-821
    • /
    • 2021
  • This study addresses on the design of performance monitoring system for the time synchronization service of the enhanced long-range navigation (eLoran) system, which has a representative ground-wave radio broadcast system capable of providing positioning, navigation, timing and data (PNT&D) services. The limitations of time-synchronized systems due to the signal vulnerabilities of the global navigation satellite system (GNSS) are explained, and the performance monitoring system for the eLoran timing service as a backup to the GNSS is proposed. The time synchronization service using eLoran system as well as system configurations and the user requirements in the differential Loran (dLoran) system are described to monitor the time synchronization performance. The results of the designed system are presented for long-term operation in the eLoran testbed environment. As the results of time performance monitoring, we were able to verify the time synchronization precision within 43.71 ns without corrections, 22.52 ns with corrections. Based on these results, the eLoran system can be utilized as a precise time synchronization source for GPS timing backup.

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

Ecosystem Vulnerability Assessment of Local Government Due to Climate Change (기후변화에 따른 지자체의 생태계 취약성 평가)

  • Kong, Woo-seok;Lee, Slegee;Park, Heena;Yu, Jeong Ah
    • Journal of Climate Change Research
    • /
    • v.3 no.1
    • /
    • pp.51-69
    • /
    • 2012
  • This work aims to propose a vulnerability assessment methodology of ecosystem at present time, and an to suggest an adaptation strategy of ecosystem in the future for local government, in the fields of plant, animal and conservation area, which would occurred due to climate change. Vulnerability assessment in ecosystem includes first, tree growth and distribution part, mainly for conifers, secondly, insect part for pest and bee, and thirdly conservation area management part, especially at the national parks. To evaluate the degree of vulnerability of each substitute variables, such as exposure of climatic element, sensitivity, and adaptation ability, are respectively selected. Vulnerabilities of conifer growth and distribution, pest and bee, and national park management seem to be strongly influenced by the exposure of climatic element than other factors, such as sensitivity and adaptation ability. With time regional gaps of ecosystem vulnerability are expected to be greater in both conifers growth and distribution, and national park management, but reduced in pest and bee in 2100 in comparison with present time.

A Study on Construction of Collision Prevention Algorithm for Small Vessel Using WAVE Communication System (WAVE 통신을 활용한 소형선박의 충돌예방 알고리즘 구축에 관한 연구)

  • Lee, Myoung-ki;Park, Young-Soo;Kang, Won-Sik
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.1
    • /
    • pp.1-8
    • /
    • 2019
  • In December 2017, many collision accidents of small vessels, such as those between oil refineries and fishing boats, occurred near Yeonghung-do in Incheon. In order to prevent marine casualties from small vessels, the government is striving to improve the safety capabilities of ship operators by strengthening education and improving the working environment. They are providing education and refining training regulations for fishermen operating vessels under 5 tons. However, the situation includes certain vulnerabilities. In this study, we propose a collision prevention algorithm for small vessels using the Wireless Access in Vehicular Environments (WAVE) communication system, which is a new communication technique to prevent collisions with small ships. The collision avoidance algorithm used is based on DCPA/TCPA. Research analyses, simulation experiments and questionnaires have been conducted to define the criteria of DCPA/TCPA. As a result, the standard for DCPA was $8(L_a+L_b)$ and for TCPA was 2.5 min. Three different accident cases were selected, and this algorithm was applied to confirm alarm responses at certain times. This algorithm can provide information to the operators of small ships in advance to help them recognize potential collision situations.