• Title/Summary/Keyword: 사이버 자산

Search Result 121, Processing Time 0.026 seconds

A Study for PKI Based Home Network System Authentication and Access Control Protocol (PKI 기반 홈 네트워크 시스템 인증 및 접근제어 프로토콜에 관한 연구)

  • Lee, Young-Gu;Kim, Jung-Jae;Kim, Hyun-Chul;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.592-598
    • /
    • 2010
  • A home network system is made up of subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. So, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this paper designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

Ransomware Threat Countermeasures for the Defense Information System: In terms of Information Security Risk Management (국방정보시스템에서의 랜섬웨어 위협 대응방안: 정보보안 위험관리 관점에서)

  • Yoo, Jincheol;Moon, Sangwoo;Kim, Jong-hwa
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.75-80
    • /
    • 2020
  • Damage caused by ransomware has continued to increase since last year, but cyber operations are managed without any separate classification of ransomware types in the military's guidelines for carrying out cyber operations. However, unlike other malware, ransomware is a threat that could paralyze all defense operations in one moment, and the military should reevaluate ransomware and take countermeasures. Accordingly, this paper aims to analyze the assets, vulnerabilities, and threats related to defense information service based on information security risk management, and propose alternatives to ensure continuity of defense work from ransomware threats.

A Study on Effective Revenue Model for Virtual World - Focusing on Payment Method of In-Game Assets in Social Virtual World (가상 세계를 위한 효과적인 수익 모델 연구 - 생활형 가상 세계에서 게임 내 자산 판매 방식을 중심으로 -)

  • Kim, Ha-Jung;Oh, Gyu-Hwan
    • Journal of Korea Game Society
    • /
    • v.8 no.4
    • /
    • pp.29-43
    • /
    • 2008
  • The virtual world is a cyber gaming space where a player interacts with others through their avatars. It is now mainly developed in foreign countries including USA, Canada, and Europe and many experts say that the market capacity of virtual world will be continually expanded in worldwide. The virtual world will mostly be made such that a user accesses the world for free and pays for in-game activities. But it is hardly that we find the effective methodology of payment system for such virtual world due to its' short development history. In the case of Korea, various payment methods of selling in-game assets have been tested in online games. The paper propose an effective revenue model for social virtual world focused on selling in-game assets. The guideline of the proposed revenue model will be expected to contribute creating revenue focused on selling in-game assets, effectively for social virtual world.

  • PDF

A study for Cybersecurity Risk Management by Blockade and Defense Level Analysis (봉쇄와 보안장비 수준 기반 정보보호 위험관리 수준 측정 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1261-1266
    • /
    • 2021
  • Existing information security risk assessment methods focus on evaluating the vulnerability of information assets. However, when the form of information assets changes and new types of information assets emerge, there is a limitation in that the evaluation standards for them are also added or deleted. Existing methods have insufficient research on the path through which cyber threats are introduced. In particular, there is very little research on blocking the inflow path for web-based information systems with public IPs. Therefore, this paper introduces the main research contents of the BDLA (Blockade and Defense Level Analysis)-based information security risk assessment model. In addition, by applying the BDLA-based information security risk assessment model, the information security risk level was studied by measuring the blockade level and security equipment level of 17 public institutions.

Priority Assessment of Cyber Threat Indicators (사이버 위협 지표 간 중요도 비교 분석 연구)

  • Lee, Ro-woon;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.951-958
    • /
    • 2021
  • With the growing cyber threat to information assets, it has become important to share threat information quickly. This paper examines the sharing of cyber threat information and presents a method to determine the importance of threat indicators in the information sharing market by calculating weights. The analysis was conducted using AHP techniques, with a pairwise comparison of the four factors(attacker & infected system indicators, role indicators, malicious file indicators, technique & spread indicators) and the details of each factor. Analysis shows that malicious file indicators are the most important among the higher evaluation factors and infected system IP, C&C and Smishing are the most important factors in comparison between detailed items. These findings could be used to measure the preference of consumers and the contribution of information provider for facilitating information sharing.

Deriving Essential Security Requirements of IVN through Case Analysis (사례 분석을 통한 IVN의 필수 보안 요구사항 도출)

  • Song, Yun keun;Woo, Samuel;Lee, Jungho;Lee, You sik
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.2
    • /
    • pp.144-155
    • /
    • 2019
  • One of the issues of the automotive industry today is autonomous driving vehicles. In order to achieve level 3 or higher as defined by SAE International, harmonization of autonomous driving technology and connected technology is essential. Current vehicles have new features such as autonomous driving, which not only increases the number of electrical components, but also the amount and complexity of software. As a result, the attack surface, which is the access point of attack, is widening, and software security vulnerabilities are also increasing. However, the reality is that the essential security requirements for vehicles are not defined. In this paper, based on real attacks and vulnerability cases and trends, we identify the assets in the in-vehicle network and derive the threats. We also defined the security requirements and derived essential security requirements that should be applied at least to the safety of the vehicle occupant through risk analysis.

A Study of Financial Structure, Profitability, Growth and Financial Risk of Food Service Franchisor (외식산업프랜차이즈본사의 재무구조, 수익성, 성장성 및 재무위험에 관한 연구)

  • Choi, Hoang-Taig
    • The Korean Journal of Franchise Management
    • /
    • v.5 no.1
    • /
    • pp.85-108
    • /
    • 2014
  • This study provides the information about size, financial structure, profitability and growth of franchisors using financial data(asset, liability, equity, sales volume, operating income and net income) in uniform franchise offering circular of fair trade commission. The data were collected from 1,050 franchisors in various business fields: fast food, family restaurant, bakery, agriculture & fishery and liquor shop in the uniform franchise offering circular in 2012 and 2011. Results of this study are as follows: For company size, median of total assets was KRW 675 million and the accumulated median assets rate was 0.48%, but the accumulated median company numbers were 49.9%, which showed small size. For financial structure, 525 companies were below 200% debt ratio, while 314 (29.9%) companies were in over 200% debt, and 211 (20.1%) companies were impaired in capital. These also showed financial structure was vulunerable. For profitability, median of ROA for total companies were only 4.72%, which showed low profitability. For growth, median of growth rate for sales were 7.57% per year, which showed mature industry. In overall, the results showed franchisors should improve their financial status.

A Study on the application of Information Security Management System(ISMS) according to size and characteristics of company (기업규모와 특성에 따른 정보보호 관리체계(ISMS) 적용 방안 연구)

  • Seo, Dong-Ho;Shin, Hyun-Min
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.227-229
    • /
    • 2017
  • ICT산업의 발전과 전자상거래의 대중화에 따라 정보시스템에 대한 지능 고도화 된 사이버위협이 증가되고 있고, 개인 및 기업정보 유출의 피해규모가 커짐에 따라 정보보호의 중요성이 한층 더 부각되고 있다. 이미 세계 각국에서는 ISO27001, BS10012 등 정보보호 관리 제도를 구축하여 운영하고 있다. 이에 국내에서도 미래창조과학부 주관 정보보호 관리체계(ISMS:Information Security Management System) 인증제도를 비롯한 정보보호 제도를 구축하여 기업 정보자산의 안전과 신뢰성 향상 등의 목적으로 자율과 의무 대상을 구분하여 운영하고 있다. 하지만 기업의 규모와 환경, 매출 등에 따라 형평성 있게 구분하지 않은 현재의 정보보호 관리체계 인증제도에는 여러 모순이 존재한다. 통제항목을 비롯한 세부점검항목을 인증 기업을 대상으로 모두 공통으로 적용하기 때문이다. 본 논문에서는 정보 보호 관리체계 인증제도와 유사 인증체계를 비교하여 인증기준 항목을 기업의 규모와 특성에 따라 유형별로 구분하여 적용하는 방안을 연구하였다.

A Study on the Propagation and Defense Model of Internet Worm (인터넷 웜의 확산 모델과 방어 모델 연구)

  • 서동일;김환국;이상호
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.181-185
    • /
    • 2004
  • In these days, many reports noticed that the Internet worms spread out and have done considerable damage to all over the world network within a few days. The worms, which is infected from various route such as e-mail, can spread very fast with common property, self replication. But, there is not prepare for the way effectively to interrupt internet worm. Therefore, to prevent our network resource, internet hosts and user clients, the systemic categorization and automatic defense mechanism is required in the Internet worm research. Hence, in this paper, we describe internet worm propagation and defense model.

  • PDF

Secure Electronic Financial Services using End-to-End Encryption (종단간 암호화(End-to-End Encryption)를 이용한 전자금융거래 정보보호 강화)

  • Kim, In-Seok;Lee, Su-Mi;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.65-71
    • /
    • 2007
  • Recently, security softwares are the program that is to protect the users from hackers in using electronic financial services. However heackers commit financial crimes to extort asserts using known hacking skills. In our paper, we analyse vulnerability that can be used to hook financial information in user application area and explain end-to-end encryption which is able to be provided by interacting keyboard security program and PKI application program.

  • PDF