• Title/Summary/Keyword: 산업융합보안

Search Result 468, Processing Time 0.024 seconds

An Analysis of Research Trends in Information Security Based on Behavioral Economics (행동경제학 기반 정보보안 연구 동향 분석)

  • Oh, Myeong Oak;Kim, Jung Duk
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.39-46
    • /
    • 2019
  • Recently, information security accidents are becoming more advanced as social engineering attacks using new types of malicious codes such as phishing. Organizations have made various efforts to prevent information security incidents, but tend to rely on technical solutions. Nevertheless, not all security incidents can be prevented completely. In order to overcome the limitations of the information security approach that depends on these technologies, many researchers are increasingly interested in People-Centric Security. On the other hand, some researchers have applied behavioral economics to the information security field to understand human behavior and identify the consequences of the behavior. This study is a trend analysis study to grasp the recent research trend applying the concept and idea of behavioral economics to information security. We analyzed the research trends, research themes, research methodology, etc. As a result, the most part of previous research is focused on 'operational security' topics, and in the future, it is required to expand research themes and combine behavioral economics with security behavioral issues to identify frameworks and influencing factors.

A Study on the Improvement of Security Threat Analysis and Response Technology by IoT Layer (IoT 계층별 보안위협 분석 및 대응기술 개선 방안 연구)

  • Won, Jong-Hyuk;Hong, Jung-Wan;You, Yen-Yoo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.149-157
    • /
    • 2018
  • In this paper, we propose an attack detection technology using SDN Controller to study security threats in IoT environment. The research methodology has been developed by applying IoT security threat management technology to the IoT layer and analyzing the research trend of applied security technology. The study results show that the effectiveness of the detection method using the sampling method is studied by adding OpenFlow based SDN Controller to the network switch equipment of the existing IoT network. This method can detect the monitoring and attack of the whole network by interworking with IDS and IPS without affecting the performance of existing IoT devices. By applying such improved security threat countermeasure technology, we expect to be able to relieve anxiety of IoT security threat and increase service reliability.

Data Security Guidelines for AI Chatbot Services (AI 챗봇 서비스를 위한 데이터 보안 가이드라인)

  • Hyun-Che Song;Hye-In Lee;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.371-373
    • /
    • 2024
  • 디지털 헬스케어 기술이 고도화되면서 디지털 치료제와 원격 의료 서비스가 의료 산업과 일상생활에 널리 활용되고 있다. 그러나 빅데이터 기반의 AI 서비스가 보편화될 수 있도록 데이터 수집, 가공, 활용 과정에서 개인정보가 남용되거나 유출되는 보안 위협도 증가하고 있다. 본 논문에서는 AI 챗봇을 활용한 정신건강 서비스를 위한 보안 위협 대응책을 마련하고 개인정보보호 가이드라인을 수립하여 사용자들에게 안전한 서비스를 제공하고 개인정보보호를 강화하는 AI 챗봇 서비스를 위한 데이터 보안 가이드라인을 제안한다.

국제 학술대회를 중심으로 자동차 보안 기술 동향

  • Choe, Won-Seok
    • Review of KIISC
    • /
    • v.30 no.6
    • /
    • pp.91-99
    • /
    • 2020
  • 운전자의 편의성 및 안전성 향상을 위하여, 과거 기계적으로 제어되던 차량의 많은 기능들이 최근에는 전자제어장치에 의하여 전자적으로 제어되고 있다. 고급 차량의 경우에는 약 100개의 전자제어장치가 탑재되어 있다고 알려져 있으며, 이러한 전자제어장치는 CAN 통신 프로토콜을 이용하여 자동차 내부에서 네트워크를 형성하여 센서 정보나 제어 요청 등이 송·수신된다. 하지만, 자동차의 많은 기능이 전자적으로 제어됨에 따라, 이를 타겟으로 하는 차량 사이버공격에 대한 위협도 함께 증가하고 있다. 실제로 2015년에 사전 조작 없는 차량을 대상으로 원격에서 제어하는 사이버공격이 시연되기도 하였다. 따라서, 유엔유럽경제위원회 (UNECE)에서는 자동차 사이버 보안 요구사항에 관한 내용을 법규로 지정하였고, 2022년 7월 유럽에서 생산되는 모든 차량에 자동차 사이버 보안을 위한 기술적 조치가 의무화되어야 한다. 이로 인해, 자동차 사이버보안은 산업계와 학계 모두 실제 차량에 적용 가능한 자동차 보안기술 개발에 집중하고 있다. 본 고에서는 국제 학술대회를 중심으로 차량에 대한 사이버보안 취약점 및 보안기술 연구 동향을 산업계와 학계를 구분지어 설명하도록 하겠다.

The Structural Analysis and Implications of Security Vulnerabilities In Mobile Srevice Network (모바일 서비스 네트워크의 구조적 분석과 보안 취약성)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.49-55
    • /
    • 2016
  • Recently mobile service industry has grown very rapidly. In this paper, We investigated the changes in mobile service network as well as security vulnerabilities of network in future 5G mobile service network, too. Recently, there are rapid developement of information and communication and rapid growth of mobile e-business users. Therefore We try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. In addition, there is a need of internetworking between mobile and IoT services. Wireless Application Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, We investigate the structure of mobile service network in order to gain security vulnerabilities and insights in this paper.

The Impact of Job Satisfaction of Industrial Security Guards on Organization Commitment and Organization Performance (산업보안요원의 직무만족이 조직몰입과 조직성과에 미치는 영향)

  • Soo-Ho, Choi;Ye-Jin, Jang
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.231-238
    • /
    • 2023
  • The purpose of this paper is to determine the extent to which job satisfaction affects organization commitment and organization performance among industrial security personnel. To this end, we attempted to conduct a four-week survey from August 28 to September 22, 2023, targeting about 150 workers working as industrial security guards in the field. According to the survey, the variables were comprised of "first, job satisfaction, second, organization commitment and third, organization performance" and based on this, three research hypotheses were proposed. After confirming that the internal consistency of each measurement item was satisfied, discriminant validity and conceptual reliability were calculated, and the discriminant validity of each variable was verified. As a result of the analysis, after conducting regression analysis to verify the research model, the results show that among the three research hypotheses, "Job Satisfaction ⇨ Organization Commitment, Job Satisfaction ⇨ Organization Performance" was found to be statistically significant and was adopted. We calculated that "Organization Commitment ⇨ Organization Performance" was not significant and was rejected.

A Study on Classification and Processing of Events to Improve Efficiency of Convergence Security Control System (융합보안관제 시스템의 효율성 향상을 위한 이벤트 분류 및 처리에 관한 연구)

  • Kim, Sung Il;Kim, Jong Sung
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.41-49
    • /
    • 2017
  • According to a research by global IT market research institute IDC, CSIM(Converged Security Information Management) market of Korea was estimated to be 1.7 trillion KRW in 2010, and it has grown approximately 32% every year since. IDC forcasts this size to grow to 12.8 trillion KRW by 2018. Moreover, this case study exemplifies growing importance of CSIM market worldwide. Traditional CSIM solution consists of various security solutions(e.g. firewall, network intrusion detection system, etc.) and devices(e.g. CCTV, Access Control System, etc.). With this traditional solution, the the data collected from these is used to create events, which are then used by the on-site agents to determine and handle the situation. Recent development of IoT industry, however, has come with massive growth of IoT devices, and as these can be used for security command and control, it is expected that the overall amount of event created from these devices will increase as well. While massive amount of events could help determine and handle more situations, this also creates burden of having to process excessive amount of events. Therefore, in this paper, we discuss potential events that can happen in CSIM system and classify them into 3 groups, and present a model that can categorize and process these events effectively to increase overall efficieny of CSIM system.

블록암호 기반 랜섬웨어에 대한 분석 사례 동향

  • Kim, Jun-Sub
    • Review of KIISC
    • /
    • v.32 no.3
    • /
    • pp.41-47
    • /
    • 2022
  • 랜섬웨어는 2005년부터 알려지면서 지금까지도 전 세계적으로 큰 피해를 입히며, 사회적으로 심각한 문제를 야기하고 있다. 또한, 랜섬웨어 공격 그룹은 개인보다는 금전적 이익을 크게 얻을 수 있는 기업들을 주로 공격하고 있으며, 이에 대응하기 위해 각 국에서는 랜섬웨어에 대한 대응하는 방법과 정보를 제공하고 있다. 따라서 본 고에서는 많은 비중을 차지하고 있는 블록암호 기반 랜섬웨어에 대한 분석 사례 동향을 살펴보고자 한다.

Analysis of Security System Priority for the Systematic Defense Technology Security (체계적인 방위산업기술보호를 위한 보호체계 우선순위 분석 연구)

  • Park, Heungsoon;Kim, Seyong;Kim, Yonghwan
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.3-12
    • /
    • 2019
  • The outflow of defense technology can cause serious damage not only in terms of business losses, but also in terms of national security and national interests. Recently, the government has enacted the Defense Technology Security Act, recognizing the importance of technology in the defense industry, and prepared guidelines for the defense technology security accordingly. According to the law, institutions and companies with defense technologies should establish a defense technology protection system, and the government should implement various technology protection policies to improve their level of technology protection. In this study, the implications were derived by comparing existing technology protection guidelines and priority analysis was performed on the protection system details through AHP for self-diagnosis items in the defense technology security guidelines. As a result, it is expected that it will enable efficient diagnosis of the level of protection and policy support for the systematic establishment of the protection system for the target institutions.

Business model correlation analysis according to the technology maturity of the information security industry (정보보호 산업의 기술성숙도에 따른 비즈니스 모델 상관성 분석)

  • Lim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.165-171
    • /
    • 2019
  • The domestic information security market is booming, For the development of the information security industry. I wanted to suggest a strategy for finding and developing a good business model. So the main products were classified by similar industries. And The sector was selected as the dependent variable. Expert interviews were conducted and classified according to technical maturity. Independent variables were sales, number of employees, and performance. Average analysis result, sales amounted to 8.798 billion won, 13.51 years in industry, and 64.3 employees. As a result of SPSS statistical analysis, the correlation between industry type and sales according to technical maturity (r = -.729) was within 5% of significance level. The regression results were significant. (p= .047<0.05) Therefore, industry classification and sales are related to technological maturity.