• Title/Summary/Keyword: 위협평가

Search Result 696, Processing Time 0.034 seconds

A Threat Assessment Algorithm for Multiple Ground Targets (다수의 대지표적을 위한 위협 평가 알고리즘)

  • Yoon, Moonhyung;Park, Junho;Yi, JeongHoon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.590-599
    • /
    • 2018
  • As a basic information to implement the fire plan that dominates multiple targets effectively under the battle environment with limited resources, such a process is mandatory that gives a priority order to a target with the high level of threat by quantitatively computing the threat level of an individual target through the analysis on the target. However, the study has still remained in the initial level on an evaluation algorithm for the threat level of the ground target. Considering this fact, the present paper proposes the evaluation algorithm for the threat by multiple ground targets. The proposed algorithm has a core point to consider the type of target and protected asset to implement the computation of proximity; set the additional value based on the weights indicating the significance of weapon and protected asset; and compute the threat level of a target that considers the characteristics of the target. The evaluation and verification of performances have been implemented through the simulation and visualization of an algorithm proposed in the present paper. From the performance result, as the proposed algorithm has been able to perform effectively the threat assessment according to the weights indicating the significance of weapons and protected assets under diverse environments where weapons and protected assets are located, high utility and effect are expected when applied to an actual ground weapon system.

A Study on the Threat-Level Assessment Model Developmnet using Fuzzy Theory (퍼지이론 이용한 적 위협수준평가 모델개발 연구)

  • Jang, Dong-Hak;Hong, Yoon-Gee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.7
    • /
    • pp.3245-3250
    • /
    • 2011
  • This study introduces a threat level assessment model adapting Fuzzy theories in order to help make decisions for better covering quantitative factors and qualitative ones together. The threat is classified into three major categories - one resulting from navigational condition, another from target vessel specification and the other from external decision environment. The threat levels by each category are examined by a fuzzy inference, and its corresponding weights are assigned via fuzzy measures. Finally the high level threat measures become integrated via a Choquet Fuzzy Integral method into ultimate threat level indicators.

Multi-Attribute Risk Assessment : Threat Index (다속성 위험평가: 위협지수)

  • Kim, Ki-Yoon;Na, Kwan-Sik
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.543-549
    • /
    • 2003
  • 다속성 위험평가는 위협과 보안요구사항의 집합을 순위화해서 계량적으로 위험을 평가하는 유용한 체계를 제공해 준다. 본 논문의 목적은 위험을 파악해서 순위화 하는 과정을 다속성 위험평가에 의해서 분석하는 이론과 사례를 제시하는 것이다.

  • PDF

Security Threats and Security Requirements Analysis of VoIP and Protection Profile Development (VoIP 보안 위협과 보안요구사항 분석 및 보호프로파일 개발)

  • Hong, Won-Soon;Choi, Yong-Joon;Sung, Yune Gie;Sim, Won-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1463-1465
    • /
    • 2009
  • 인터넷망을 이용하여 음성 및 영상통화를 제공하는 VoIP(인터넷전화)서비스가 확대되고, VoIP 서비스가 인터넷망을 이용함에 따라 기존의 인터넷망에서 제기된 보안위협이 증가하고 사이버 공격에 노출되고 있다. 이에 따라 본 고에서는 국제 표준인 공통평가기준(ISO 15408)에서 규정된 방법에 따라 VoIP 서비스를 제공하는 IP Phone 및 IP PBX시스템이 노출되는 사이버 상의 보안위협사항을 도출하고, 보안목적과 VoIP 및 IP PBX 시스템 보안위협에 대응할 수 있는 보안요구사항을 정의하였다.

A Threats Statement Generation Method for Security Environment of Protection Profile (PP의 보안환경을 위한 위협문장 생성방법)

  • 고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.69-86
    • /
    • 2003
  • A Protection Profile(PP) is a common security and assurance requirements for a specific class of Information Technology security products such as firewall and smart card. A PP should be included "TOE(Target of Evaluation) Security Environment", which is consisted of subsections: assumptions, treat, organizational security policies. This paper presents a new threats statement generation method for developing TOE security environment section of PP. Our survey guides the statement of threats in CC(Common Criteria) scheme through collected and analysed hundred of threat statements from certified and published real PPs and CC Tool Box/PKB that is included a class of pre-defined threat and attack statements. From the result of the survey, we present a new asset classification method and propose a threats statement generation model. The former is a new asset classification method, and the later is a production rule for a well formed statement of threats.

  • PDF

A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification (전투기 감항 보안 인증을 위한 위험기반 보안위협 평가 프로세스 설계)

  • Kim, Hyunju;Kang, Dongsu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.223-234
    • /
    • 2019
  • Cyber attacks are an important factor that determines the victory and defeat of Network-centric wars in which advanced weapon systems are highly interlinked. In addition the increasing dependability on software as its develop as the latest fighter is demanding enhanced security measures for fighter software to Cyber attacks. In this paper, we apply the DO-326A, which is an airworthiness security certification standard, to design a risk-based security threat assessment process by reflecting characteristics and operational environment of fighter aircraft. To do this, we add the following steps in security threat assessment stage of DO-326A's airworthiness security certification process. First, we derive security threats of fighter. And then, we scored the security threat in terms of possibility and impact on the fighter. Finally, we determine the security risk severity.

A Study on Cyber Security Evaluation Method of the Digital Instrument and Control System using the Construction of a Test-bed (테스트베드 구축을 통한 디지털계측제어계통 사이버보안 평가 방법에 관한 연구)

  • Cha, Ki-Jong;Shin, Yo-Soon;Seo, Dal-Mi;Sohn, Chang-Ho;Kim, Young-Mi;Jeong, Choong-Heui
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.368-371
    • /
    • 2014
  • 최근 디지털계측제어시스템은 사이버위협에 매우 취약하여 사이버공격에 의해 발전소 안전에 부정적인 영향을 받을 수 있는 실정이다. 따라서 디지털계측제어시스템에 대해 주기적인 사이버보안 위험 평가가 필요하다. 이에 따라 본 논문에서는 테스트베드 구축을 통해 특정 시점에서의 사이버 위협의 침해 가능성 분석, 또는 자체적으로 사이버보안성을 평가할 수 있는 방법에 대해 제안한다. 동 연구에서 제안하는 사이버보안 위험 평가는 자산분석, 테스트베드 구축, 취약점 분석, 위협평가, 위험도분석 및 평가 총 5단계로 구성되며 각 단계의 사이버보안 활동 수행을 통해 디지털계측제어계통의 사이버보안수준이 향상될 것으로 사료된다.

A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment (봉쇄와 보안장비 수준평가를 통한 정보보호 위험평가 개선 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.187-196
    • /
    • 2020
  • In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.

A Study on Priority Analysis of Evaluation Factors for Cyber Threats using Open Source Intelligence (OSINT) (공개출처정보를 활용한 사이버위협 평가요소의 중요도 분석 연구)

  • Kang, Sungrok;Moon, Minam;Shin, Kyuyong;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.49-57
    • /
    • 2020
  • It is no exaggeration to say that we live with cyber threats every day. Nevertheless, it is difficult for us to obtain objective information about cyber threats and attacks because it is difficult to clearly identify the attacker, the purpose of attack, and the range of damage, and rely on information from a single source. In the preceding research of this study, we proposed the new approach for establishing Database (DB) for cyber attacks using Open Source Intelligence(OSINT). In this research, we present the evaluation factors for cyber threats among cyber attack DB and analyze the priority of those factors in oder to quantify cyber threats. We select the purpose of attack, attack category, target, ease of attack, attack persistence, frequency of OSINT DB, and factors of the lower layer for each factor as the evaluation factors for cyber threats. After selection, the priority of each factor is analyzed using the Analytic Hierarchy Process(AHP).

국내.외 정보보호 수준 팽가 체계 및 지표 동향

  • Lee, Dong-Hee;Yeo, Don-Gu;Youm, Heung-Youl
    • Review of KIISC
    • /
    • v.20 no.5
    • /
    • pp.74-85
    • /
    • 2010
  • 인터넷의 발달로 해킹과 같은 각종 보안위협이 증가하고 있으며 이는 국가, 기업 그리고 개인에게 심각한 위협이 되고 있다. 해킹으로 인해 유/무형적인 손실을 받을 수 있기 때문에 보안 위협에 대한 적절한 보안 대책의 수립이 필요하며, 또한 수립된 보안 대책 및 대상의 보안 수준을 확인하기 위한 다양한 정보보호 체계 및 평가 지표들이 존재하고 있다. 본 논문에서는 국내/외에서 개발된 정보보호 평가 체계와 지표, 그리고 국제 표준과 진행 동향을 살펴보고, 각 체계간의 차이점을 도출한다.