• Title/Summary/Keyword: 사이버보안 단계

Search Result 95, Processing Time 0.025 seconds

Analysis of Psychological Factors Inducing Cybercrime (사이버범죄를 유발하는 심리적요인 분석)

  • Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2021
  • This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.

Defense ICT Supply Chain Security Threat Response Plan (국방 ICT 공급에 대한 보안 위협 대응 방안)

  • Lee, Yong-Joon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.125-134
    • /
    • 2020
  • The potential security threat is increasing as the supply of ICT products to the defense sector increases with the development of information and communication technology. Attempts to neutralize, such as intelligence gathering and destruction, through attacks on the defense power support system and the intelligence system of the weapons system could pose a fatal threat.Therefore, security measures of supply chain shear system that take into account ICT product production and operation stage to maintenance stage are needed in defense field. In the paper, technical and administrative measures for responding to 12 ICT supply chain security threats at each stage of the defense ICT supply chain life cycle were presented.

A Research on Anomaly type of face detection using Neural Network (신경망을 이용한 정상·비정상 얼굴유형 탐지 연구)

  • Kim, Woon-Yoeng;Weon, IllYoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.623-624
    • /
    • 2009
  • 본 논문에서는 신경망의 오류 역전파(Backpropagation) 학습 알고리즘을 이용한 얼굴의 정상 비정상을 인식하는 보안 시스템을 제안하였다. 제안된 시스템은 정지영상 및 동영상에서 입력된 얼굴영상을 전처리 단계에서 얼굴영역을 검출하여 $160{\times}160$ 크기의 고정 크기로 확대 및 축소 작업을 거친다. Mosaic 처리와 LaplacianEdge 처리를 거쳐 $40{\times}40$ 크기로 이진화한 정규화 데이터를 Gravity-Center 처리를 한다. 오류 역전파 학습 알고리즘으로 얼굴의 특징을 학습한 후 각종 정상 및 비정상 얼굴 데이터를 이용하여 인식률을 실험 하였다. 실험데이터는 이 분야의 공인 자료인 LFW Face Database[7] 데이터를 사용하였으며, 실험결과는 제안된 방법이 문제 해결에 적합한 접근임을 보여준다.

스마트 그리드 통신망의 보안 특성, 고려사항, 구조, 설계 원칙과 연구동향에 관한 고찰

  • Jeon, Yong-Hee;Jang, Jong-Soo
    • Review of KIISC
    • /
    • v.22 no.5
    • /
    • pp.40-53
    • /
    • 2012
  • 여러 가지의 유 무선 통신망이 서로 연결되는 스마트 그리드 통신망은 현재 전력망에서는 존재하지 않는 취약성을 가질 것이다. 따라서 스마트 그리드 통신망에 대한 사이버 공격을 방지하고 대응하기 위하여 보안 기술이 개발단계 초기부터 고려될 필요가 있다. 본 논문에서는 국가적인 주요 인프라가 될 스마트 그리드 통신망에서의 보안 특성, 고려 사항, 구조, 설계 원칙과 연구동향에 대하여 제시하고자 한다.

A Study on The Step-by-step Security Measures of Project through Cases (사례를 통한 프로젝트 단계별 보안 방안에 대한 연구)

  • Shin, Seong-Yoon;Jang, Dai-Hyun;Kim, Hyung-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.44-46
    • /
    • 2012
  • Leading companies has led to the victimization being leaked to accept personal information by the cyber attack. Also planned hacking cases on purpose such as acquiring monetary gain or social distracting is constantly increasing. In this paper, we identify examples of the project step-by-step leading IT services companies to perform security activities. Real-world projects step-by-step through security measures that can be applied are presented.

  • PDF

Artificial Intelligence-based Security Control Construction and Countermeasures (인공지능기반 보안관제 구축 및 대응 방안)

  • Hong, Jun-Hyeok;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.531-540
    • /
    • 2021
  • As cyber attacks and crimes increase exponentially and hacking attacks become more intelligent and advanced, hacking attack methods and routes are evolving unpredictably and in real time. In order to reinforce the enemy's responsiveness, this study aims to propose a method for developing an artificial intelligence-based security control platform by building a next-generation security system using artificial intelligence to respond by self-learning, monitoring abnormal signs and blocking attacks.The artificial intelligence-based security control platform should be developed as the basis for data collection, data analysis, next-generation security system operation, and security system management. Big data base and control system, data collection step through external threat information, data analysis step of pre-processing and formalizing the collected data to perform positive/false detection and abnormal behavior analysis through deep learning-based algorithm, and analyzed data Through the operation of a security system of prevention, control, response, analysis, and organic circulation structure, the next generation security system to increase the scope and speed of handling new threats and to reinforce the identification of normal and abnormal behaviors, and management of the security threat response system, Harmful IP management, detection policy management, security business legal system management. Through this, we are trying to find a way to comprehensively analyze vast amounts of data and to respond preemptively in a short time.

Evaluation Methodology of Diagnostic Tool for Security Weakness of e-GOV Software (전자정부 소프트웨어의 보안약점 진단도구 평가방법론)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.4
    • /
    • pp.335-343
    • /
    • 2013
  • If the SW weaknesses, which are the main cause of cyber breaches, are analyzed and removed in the SW development stages, the cyber breaches can be prevented effectively. In case of Domestic, removing SW weaknesses by applying Secure SDLC(SW Development Life Cycle) has become mandatory. In order to analyze and remove the SW weaknesses effectively, reliable SW weakness diagnostic tools are required. Therefore, we propose the functional requirements of diagnostic tool which is suitable for the domestic environment and the evaluation methodology which can assure the reliability of the diagnostic tools. Then, to analyze the effectiveness of the proposed evaluation framework, both demonstration results and process are presented.

Developing Security Level of Product Development in Industrial Control System Using IEC 62443 Series (IEC 62443 Series를 활용한 산업제어시스템 개발단계 보안성 검증방안)

  • Kim, Chang Yeon;Lee, Kyungho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.246-248
    • /
    • 2018
  • 사이버 위협이 증가하면서 국가 기반시설을 담당하는 산업제어시스템 보안에 대한 위험이 증가하고 있다. 이를 보완하기 위해 산업제어시스템의 다양한 분야에서 표준화가 진행되고있고, IEC 62443 Series는 산업제어시스템의 전반적인 안전을 위한 가이드를 제시한다. 본 논문은 최근 발행 된 IEC 62443-4-1의 통제항목들을 타 표준들과 비교 및 ?석하여 개선방안을 제시하고 최종적으로 산업제어시스템의 제품 개발단계 보안을 향상에 기여하여 전반적인 기반시설 보안 수준을 향상하는 것을 목표로 한다.

Cyber threat Detection and Response Time Modeling (사이버 위협 탐지대응시간 모델링)

  • Han, Choong-Hee;Han, ChangHee
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.53-58
    • /
    • 2021
  • There is little research on actual business activities in the field of security control. Therefore, in this paper, we intend to present a practical research methodology that can contribute to the calculation of the size of the appropriate input personnel through the modeling of the threat information detection response time of the security control and to analyze the effectiveness of the latest security solutions. The total threat information detection response time performed by the security control center is defined as TIDRT (Total Intelligence Detection & Response Time). The total threat information detection response time (TIDRT) is composed of the sum of the internal intelligence detection & response time (IIDRT) and the external intelligence detection & response time (EIDRT). The internal threat information detection response time (IIDRT) can be calculated as the sum of the five steps required. The ultimate goal of this study is to model the major business activities of the security control center with an equation to calculate the cyber threat information detection response time calculation formula of the security control center. In Chapter 2, previous studies are examined, and in Chapter 3, the calculation formula of the total threat information detection response time is modeled. Chapter 4 concludes with a conclusion.

Encounter Measure System Against Cyber-Terror And Legalism (사이버테러 대응체제와 법치주의)

  • Jeong, Jun-hyeon;Kim, Kui-nahm
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.83-90
    • /
    • 2004
  • Preventive measures and control over cyber terrorism in Korea is a complex problem. Today laws should meet requirements made by modern technologies development, Law enforcement, special services and judicial system cooperation, their efforts coordination and their material security are priority directions, None of the country is able to prevent cyber terror independently and international cooperation in this field is vital. Taking the above into consideration, we propose and inisit that National Intelligence Service(NIS) should share cyber terror data with Police Agency and have top police authority over the cyber terror.

  • PDF