• Title/Summary/Keyword: 위협문장

Search Result 7, Processing Time 0.021 seconds

Attribute-Based Threats Statement Generation Model (속성기반 위협문장 생성 모델)

  • 최승;최상수;이강수
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.74-77
    • /
    • 2004
  • PP/ST의 보안환경 개발은 정보보호제품에 대하여 이력서라고 할 수 있다. 이에 기존의 위협문장 생성모델을 개선하여 속성기반 위협문장 생성모델을 제시한다. 본 모델은 PKB의 속성들을 이용하여 위협문장 생성시 각 항목(주어, 목적어, 동기, 동사, 결과)에 속성을 추가·확장하여, 문장이 컨텐츠 뿐만 아니라 특수성을 갖게 된다. 본 논문에서 제시된 모델은 PP/ST 개발시 위헙문장을 생성할 때 활용될 수 있다.

  • PDF

A Threats Statement Generation Method for Security Environment of Protection Profile (PP의 보안환경을 위한 위협문장 생성방법)

  • 고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.69-86
    • /
    • 2003
  • A Protection Profile(PP) is a common security and assurance requirements for a specific class of Information Technology security products such as firewall and smart card. A PP should be included "TOE(Target of Evaluation) Security Environment", which is consisted of subsections: assumptions, treat, organizational security policies. This paper presents a new threats statement generation method for developing TOE security environment section of PP. Our survey guides the statement of threats in CC(Common Criteria) scheme through collected and analysed hundred of threat statements from certified and published real PPs and CC Tool Box/PKB that is included a class of pre-defined threat and attack statements. From the result of the survey, we present a new asset classification method and propose a threats statement generation model. The former is a new asset classification method, and the later is a production rule for a well formed statement of threats.

  • PDF

A Security Policy Statements Generation Method for Development of Protection Profile (PP 개발을 위한 보안정책 문장 생성방법)

  • 고정호;이강수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.13-28
    • /
    • 2003
  • The Protection Profile(PP) is a common security function and detailed statement of assurance requirements in a specific class of Information Technology security products such as firewall and smart card. The parts of TOE security environment in the PP have to be described about assumption, treat and security policy through analyzing purpose of TOE. In this paper, we present a new security policy derivation among TOE security environment parts in the PP. Our survey guides the organizational security policy statements in CC scheme through collected and analyzed hundred of real policy statements from certified and published real PPs and CC Toolbox/PKB that is included security policy statements for DoD. From the result of the survey, we present a new generic organizational policy statements list and propose a organizational security policy derivation method by using the list.

Cyber Threats Analysis of AI Voice Recognition-based Services with Automatic Speaker Verification (화자식별 기반의 AI 음성인식 서비스에 대한 사이버 위협 분석)

  • Hong, Chunho;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.33-40
    • /
    • 2021
  • Automatic Speech Recognition(ASR) is a technology that analyzes human speech sound into speech signals and then automatically converts them into character strings that can be understandable by human. Speech recognition technology has evolved from the basic level of recognizing a single word to the advanced level of recognizing sentences consisting of multiple words. In real-time voice conversation, the high recognition rate improves the convenience of natural information delivery and expands the scope of voice-based applications. On the other hand, with the active application of speech recognition technology, concerns about related cyber attacks and threats are also increasing. According to the existing studies, researches on the technology development itself, such as the design of the Automatic Speaker Verification(ASV) technique and improvement of accuracy, are being actively conducted. However, there are not many analysis studies of attacks and threats in depth and variety. In this study, we propose a cyber attack model that bypasses voice authentication by simply manipulating voice frequency and voice speed for AI voice recognition service equipped with automated identification technology and analyze cyber threats by conducting extensive experiments on the automated identification system of commercial smartphones. Through this, we intend to inform the seriousness of the related cyber threats and raise interests in research on effective countermeasures.

The Analysis on the Relation between Real Military Expenditure and Real GDP through Regression Analysis (회귀분석 기법을 이용한 실질 국방비 규모와 실질 GDP와의 관계 분석)

  • Baek, Byung-Sun;Moon, Jang-Yeol
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.2
    • /
    • pp.143-152
    • /
    • 2010
  • Military Power is the most direct and actual measures for national security. For construction, maintenance, management of military power, the adequate expenditure is required but it is difficult to increase blindly owing to the lack of resources. There are security threats and economic conditions in determining of military expenditure. Republic of Korea has been more influenced by economic conditions than by security threats since 1990s In this paper, we analysed relation between real military expenditure and real GDP through regression analysis.

Concept Mapping Analyzing on Counselors' Vicarious Trauma Experience from Working with Victims of Sexual Violence (성폭력 상담자 대리외상 경험에 대한 개념도 연구)

  • Heo, Chan-hee;Lee, Jee-yon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.457-471
    • /
    • 2020
  • The purpose of this study is to explore the in-depth content of vicarious trauma experience of sexual violence counselors and to develop intervention strategy. To this end, depth interviews were conducted with twelve sexual violence counselors working at the sexual violence counseling site for more than three years. In addition, using the concept mapping method, the content exploration of the experience of vicarious trauma of sexual violence counselors was confirmed, and its conceptual structure was identified. As a result, 60 key sentences regarding the experience of vicarious trauma of sexual violence counselors were extracted. Then, multi-dimensional scale and cluster analysis were conducted after making nineteen appraisal participants who are under the same condition as depth interview participants to categorize and assess key sentences. As a result of analysis, the x-axis of negative perception, psychological and emotional dimension, and the y-axis of personal inner and behavioral dimension appeared, and five clusters emerged: immersion and skepticism about work, experience of emotional assimilation, hypersensitivity to sex, increased vigilance against men, and threat of safety. This provided basic data that could categorize and identify the contents of vicarious trauma of sexual violence counselors experience by sexual violence counselors.

Analysis on Infrared Stealth Performance with Emissivity Controlled Aircraft Surface Structure at Various Background (항공기 적외선 스텔스 기술 적용을 위한 다양한 배경조건에서의 방사율 제어구조 성능 분석)

  • Bae, Munjang;Kim, Taehwan;Kim, Taeil;Jung, Daeyoon;Cho, Hyung Hee
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.29 no.5
    • /
    • pp.455-461
    • /
    • 2016
  • Survivability of an aircraft has been greatly threatened by the development of a weapon system using infrared. Therefore, the infrared stealth technology is a very important technique to improve the survivability of an aircraft. In this study, the infrared signal of an aircraft was analyzed which corresponding to the aircraft surface temperature and environmental conditions with various surface conditions(especially emissivity changed). Based on the analyzed infrared signal, the optimized surface emissivity was suggested to reduce the average contrast radiance and contrast radiant intensity(CRI). In addition, we confirmed that the infrared contrast radiant intensity between the aircraft and the background can be minimized through an appropriately controlled surface emissivity of the aircraft at specific background.