• Title/Summary/Keyword: 보안문화

Search Result 222, Processing Time 0.028 seconds

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

Cyber Security Management of Small and Medium-sized Enterprises with Consideration of Business Management Environment (중소기업의 기업경영 환경을 고려한 사이버 보안 관리)

  • Chun, Yong-Tae
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.9-35
    • /
    • 2019
  • Until now, a lot of research on cyber security have been tried, but there have been few studies on overall relationships, including internal factors and external factors. Therefore, this study examined cyber security management considering not only internal elements of SMEs but also corporate management environment. The first qualitative analysis and the second quantitative analysis were conducted through mixed method research. Qualitative analysis was conducted through a semi-structured interview method, and three themes were found: insufficient cyber security management system, internal noncooperation for cyber security, and problems derived from decision-making system. In the quantitative analysis, multiple regression analysis was conducted on the data obtained through the questionnaire. The perception of cyber threats and internal support among independent variables positively influenced the cyber security management system or the dependent variable. Through this study, internal variables had a causal impact on the cyber security management system rather than external environment variables. This implies that the variables related to the organizational culture such as employees' perception are important. These results are expected to provide practical significance for enhancing the cyber security management system in SMEs.

A study on the Development for the National Cybersecurity Capability Assessment Criteria (국가 사이버보안 역량 평가를 위한 평가항목 연구)

  • Bae, Sunha;Park, Sangdon;Kim, So Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1293-1314
    • /
    • 2015
  • As ICT is becoming a major social infrastructure, the need to strengthen cyber capabilities are emerging. In the major advanced countries including the United States, has a continuing interest in strengthening cyber capabilities and has studied in enhancements of cyber capabilities. The cyber capability assessment is necessary in order to determine the current level of the country, establish policy directions and legislations. The selection of criteria has very important meaning to suggest future policy direction as well as an objective assessment of cybersecurity capabilities. But there are variable criteria for national cyber capabilities assessment such as strategy, legislation, technology, society and culture, and human resources. In this paper we perform the analysis of criteria for the other country's cybersecurity assessments including the U.S. and Europe. And we proposed the criteria for the national cybersecurity assessment reflecting the our country's characteristics.

A Study Covering the Comparative Analysis of Educational Systems in Major Countries for Regular Cybersecurity Education (사이버보안 정규교육화를 위한 주요국 교육체계 비교분석 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.397-405
    • /
    • 2021
  • With the recent phenomenon of the Intelligence Information Society, the cyber security paradigm has begun to change. In particular, the increase of the interconnectedness of the hyperlinked society has extended the scope of damage that can be caused by cyber threats to the real world. In addition to that, it can also be a risk to any given individual who could accompany a crisis that has to do with public safety or national security. Adolescents who are digital natives are more likely to be exposed to cyber threats, which is mainly due to the fact that they are significantly more involved in cyber activities and they also possess insufficient security comprehension and safety awareness. Therefore, it is necessary to strengthen cyber security capabilities of every young individual, so that they can effectively protect themselves against cyber threats and better manage their cyber activities. It examines the changes of the security paradigm and the necessity for cyber security education, which is in direct accordance to the characteristics of a connected society that further suggests directions and a basic system of cyber security education, through a detailed analysis of the current state of Domestic and Overseas Cyber Security Education. The purpose of this study was to define cybersecurity competencies that are necessary within an intelligent information society, and to propose a regular curriculum for strengthening cybersecurity competencies, through the comparison and meticulous analysis of both domestic and overseas educational systems that are pertinent to cybersecurity competencies. Accordingly, a cybersecurity competency system was constructed, by reflecting C3-Matrix, which is a cyber competency system model of digital citizens. The cybersecurity competency system consists of cyber ethics awareness, cyber ethics behavior, cyber security and cyber safety. In addition to this, based on the basic framework of the cybersecurity competency system, the relevant education that is currently being implemented in the United States, Australia, Japan and Korea were all compared and analyzed. From the insight gained through the analysis, the domestic curriculum was finally presented. The main objective of this new unified understanding, was to create a comprehensive and effective cyber security competency curriculum.

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.

An Empirical Study of Employee's Deviant Behavior for Improving Efficiency of Information Security Governance (정보보호 거버넌스 효율성 제고를 위한 조직원의 정보보호 행위에 관한 실증 연구)

  • Kim, Hye Jung;Ahn, Joong Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.147-164
    • /
    • 2013
  • For the continuous information security governance, we have to focus on not just technical aspects like access control and DRM, but informal level management like information security(IS) behavior, culture, and personal value. But there are few informal level studies, while many formal level studies of IS governance or technical means. This study is an empirical test that how IS culture, normal beliefs, personal behavior and value affect employee's deviant behavior. And we define a lack of an awareness of value and importance on IS regulations in organizations as "Information Security Anomie" with the concept of anomie, a viewpoint on social organization.

A Study on Enhanced XR Software Platform based on Superintelligence (한류문화 전수를 위한 수퍼인텔리전스 기반 확장현실 소프트웨어 플랫폼 설계)

  • Ji, Sumi;Kwak, Jeonghoon;Sung, Yunsick
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.43-44
    • /
    • 2020
  • 최근 케이팝 문화의 확산으로 한류라는 브랜드가 구축되고, 이에 관심이 급증함에 따라 관련 콘텐츠 시장의 혁신이 요구되고 있다. 본 논문은 한류문화 전수를 위한 수퍼인텔리전스 기반의 확장현실(XR) 소프트웨어 플랫폼에 관한 것으로, 본 플랫폼을 통하여 한류 문화 체험 및 전수가 가능하다. 세부적으로는 한류 콘텐츠 전수를 위한 확장현실 기반 공간을 바탕으로 딥러닝 기반 영상 생성 및 동작 분석기술, 자동 음악생성 기술, 한류 문화 데이터 보안 기술을 포함한 통합적인 플랫폼 환경을 설계하여 제안한다. 또한 이 플랫폼의 3차원 동작 분류 및 예측을 향상 시킬 수 있는 방법을 제안한다.

국방 소프트웨어의 현대화 및 공급망 보안을 위한 DevSecOps 도입 방안 연구

  • Lee, Seungwoon;Ryu, Haneul;Hong, Suyoun;Kim, Taekyu
    • Review of KIISC
    • /
    • v.32 no.5
    • /
    • pp.67-73
    • /
    • 2022
  • DevOps는 개발과 운영을 배포 기간을 최소화함과 동시에 안정적인 운영을 목표로 하는 현재 가장 진보된 개발 문화이자 방법론이다. DevOps는 수많은 IT 기업에서 활용되고 있으며, 국방 분야도 마찬가지로 소프트웨어 전력 우위를 선점하기 위하여 DevOps 도입을 고려해왔다. 그러나 사이버 위협의 대응이 부족한 DevOps을 국방 소프트웨어에 적용하기가 쉽지 않다. 이에 미 국방부(Department of Defense, 이하 DoD)는 미래의 사이버 위협으로부터 국방 소프트웨어의 피해를 최소화하고자 DevOps 전 단계에 사이버 보안을 결합한 DevSecOps를 채택하여 개발 및 시범운영 중에 있다. 본 연구에서는 DevOps와 DevSecOps의 개념을 소개하고 국방 소프트웨어 분야의 적용 사례를 살펴본다. 그 중 DoD의 DevSecOps의구조, 구축 사례, 공급망 보안 방안을 분석하고 이를 바탕으로 우리 군의 DevSecOps 적용 가능성에 대해 논의하고자 한다.

A Study on the Design of Security Mechanisms for CCTV Control (CCTV 제어를 위한 보안 메커니즘 설계에 관한 연구)

  • Kim, Hyo-Name;Park, Jae-Kyung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.445-446
    • /
    • 2020
  • 최근 사물인터넷의 발전에 따른 많은 기기들이 디지털화 되면서 네트워크의 새로운 주요 장비로 등장하고 있으며 이 중 CCTV의 경우 대부분 IP를 갖는 독립적인 네트워크 디바이스가 되고 있다. 하지만 이러한 CCTV의 네트워크 접근에 따른 해킹 가능성이 끊임없이 제공되면서 CCTV를 통한 내부망의 침투가 현실적으로 가능한 상황이다. 현재 대부분의 영상 화면이 암호화되어 운영되고는 있지만 CCTV를 통제하는 제어 데이터는 어떠한 보안조치도 이루어지지 않은 것이 현실이다. 이러한 점을 보완하기 위해 면에서 본 논문에서는 CCTV 통제를 위한 제어 데이터도 인증 및 암호화를 통해 일반적인 접근을 완전히 차단할 수 있는 방안을 제시하고 이를 통한 사물인터넷의 안정성을 검증하는 방안을 제안하고자 한다.

  • PDF

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.