• Title/Summary/Keyword: 침해 대응

Search Result 476, Processing Time 0.03 seconds

Analysis of Public Sector Sharing Rate based on the IoT Device Classification Methodology (사물인터넷(IoT) 기기 분류 체계 기반 공공분야 점유율 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.65-72
    • /
    • 2022
  • The Internet of Things (IoT) provides data convergence and sharing functions, and IoT technology is the most fundamental core technology in creating new services by convergence of various cutting-edge technologies. However, there are different classification systems for the Internet of Things, and when it is limited to the domestic public sector, it is difficult to properly grasp the current status of which devices are installed and operated with what share, and systematic data or research The results are very difficult to find. Therefore, in this study, the relevance of the classification system for IoT devices was analyzed according to reality based on sales, shipments, and growth rate, and based on this, the actual share of IoT devices among domestic public institutions was analyzed in detail. The derived detailed analysis results are expected to be efficiently utilized in the process of selecting IoT devices for research and analysis to advance information protection technology such as responding to malicious code attacks on IoT devices, analyzing incidents, and strengthening security vulnerabilities.

Protection System Against The Infringement of Information Signals in Fiber Communication System (광섬유 통신 시스템의 정보 신호 침해에 대한 보호 시스템)

  • Ugli, Sobirov Asilzoda Alisher;Umaralievich, Nishonov Ilhomjon;Kim, Daeik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.219-228
    • /
    • 2022
  • One of the most pressing and demanding issues today in the conditions of widespread transformation and digitalization of spheres of human activity is information security and ensuring the integrity of data. The main research and development in the field of information security is aimed at improving efficiency and rationalization. One of the main means of data transmission and operation of information complexes are fiber-optic systems. To date, there have been incidents of illegal intrusion and theft of information, passing through this type of communication. Thus, today there is a problem associated with insufficient information security in fiber-optic data transmission systems. One of the most effective tools to counter acts of illegal interference in systems are artificial intelligence and cryptographic algorithms of information protection. It is the symbiosis of these two tools that can qualitatively improve the level of information security in fiber-optic data transmission systems. Thus, the authors of this article pursue the goal associated with the description of an innovative system for protecting information from violations in fiber-optic data transmission systems based on the integration of intelligent cryptographic algorithms.

IaC-VIMF: IaC-Based Virtual Infrastructure Mutagenesis Framework for Cyber Defense Training (IaC-VIMF: 사이버 공방훈련을 위한 IaC 기반 가상 인프라 변이 생성 프레임워크)

  • Joo-Young Roh;Se-Han Lee;Ki-Woong Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.527-535
    • /
    • 2023
  • To develop experts capable of responding to cyber security incidents, numerous institutions have established cyber training facilities to cultivate security professionals equipped with effective defense strategies. However, these challenges such as limited resources, scenario-based content development, and cost constraints. To address these issues, this paper proposes a virtual infrastructure variation generation framework. It provides customized, diverse IT infrastructure environments for each organization, allowing cyber defense trainers to accumulate a wide range of experiences. By leveraging Infrastructure-as-Code (IaC) containers and employing Word2Vec, a natural language processing model, mutable code elements are extracted and trained, enabling the generation of new code and presenting novel container environments.

Republic of Korea's Position on the Convention on Biological Diversity - Digital Sequence Information and post-2020 Global Biodiversity Framework - (생물다양성협약 대응 대한민국의 전략 - 디지털 염기서열 정보 및 2020년 이후 지구 생물다양성 보전 프레임워크 -)

  • Byoungyoon Lee
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2022.09a
    • /
    • pp.4-4
    • /
    • 2022
  • 앞으로 10년간 세계의 생물다양성 보전을 위한 유엔 생물다양성협약 당사국 총회가 2022년 12월 캐나다 몬트리올에서 열린다. 전 세계 전문가와 정책입안자들이 여러 내용을 다루지만 그중에서도 염기서열 정보에 관한 내용을 집중적으로 소개한다. 우선 생물다양성협약에서의 이익공유에 관한 내용은 북아시아 원산인 콩을 현재 대량으로 재배하고 수확하고 있는 미국, 브라질 등의 사례를 선별하여 소개한다. 이어서 생물다양성협약 체결 전후의 생물자원에 대한 인식 변화로 인해 국제적으로 합의한 나고야 의정서의 주요 핵심 내용을 발표한다. 그러나, 최근의 합성생물학은 유전정보만을 가지고 설계자의 의도대로 실물 생물자원 없이 새로운 생물과 원하는 물질을 합성할 수 있기에 국제적으로 마찰이 발생하고 있다. 유전공학과 합성생물학에서 가장 기본적으로 이용하고 있는 유전정보를 생물다양성협약에서는 어떻게 정의하고 있는지, 그리고 이익을 어떻게 공유하는지 알아본다. 생물자원 이용 국가들은 유전정보는 물리적인 실체가 없기에 이익공유대상이 아님을 주장하면서 유전정보는 원하는 누구에게나 이용되어야 한다고 보고 있다. 반면 생물자원 풍부국 입장은 생명과학기술 발전으로 인해 원산지 국가의 허가 없이 생물 유전정보를 활용하는 것은 생물 주권의 침해로 보고 있으며, 유전정보를 실물 생물자원과 동일하게 취급하여 나고야 의정서상의 이익공유를 요구하고 있다. 유전정보에 대한 대한민국의 공식적인 입장과 제 14차 협약 총회에서 합의한 결정문을 소개한다. 또한, 2019년 생물다양성과학기구(IPBES)에서 지구의 생물다양성과 생태계를 평가한 보고서에서 생물 멸종의 위협요인으로 제시된 토지이용 변화, 남획, 기후변화, 오염, 외래종에 대한 문제점을 기반으로 작성된 post-2020 생물다양성협약 10개년 실행 목표를 알아보고 2022년 12월 개최하는 제15차 당사국총회의 주요 의제에 대한 전망과 최근 문제가 되고 있는 '공동의 그러나 차별적인 책임(CBDR, Common But Differentiated Responsibility)'의 개념을 소개한다.

  • PDF

Strengthening Enterprise Security through the Adoption of Zero Trust Architecture - A Focus on Micro-segmentation Approach - (제로 트러스트 아키텍처 도입을 통한 기업 보안 강화 방안 - 마이크로 세그먼테이션 접근법 중심으로 -)

  • Seung-Hyun Joo;Jin-Min Kim;Dae-Hyun Kwon;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.3-11
    • /
    • 2023
  • Zero Trust, characterized by the principle of "Never Trust, Always Verify," represents a novel security paradigm. The proliferation of remote work and the widespread use of cloud services have led to the establishment of Work From Anywhere (WFA) environments, where access to corporate systems is possible from any location. In such environments, the boundaries between internal and external networks have become increasingly ambiguous, rendering traditional perimeter security models inadequate to address the complex and diverse nature of cyber threats and attacks. This research paper introduces the implementation principles of Zero Trust and focuses on the Micro Segmentation approach, highlighting its relevance in mitigating the limitations of perimeter security. By leveraging the risk management framework provided by the National Institute of Standards and Technology (NIST), this paper proposes a comprehensive procedure for the adoption of Zero Trust. The aim is to empower organizations to enhance their security strategies.

Autoencoder-Based Anomaly Detection Method for IoT Device Traffics (오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구)

  • Seung-A Park;Yejin Jang;Da Seul Kim;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.281-288
    • /
    • 2024
  • The sixth generation(6G) wireless communication technology is advancing toward ultra-high speed, ultra-high bandwidth, and hyper-connectivity. With the development of communication technologies, the formation of a hyper-connected society is rapidly accelerating, expanding from the IoT(Internet of Things) to the IoE(Internet of Everything). However, at the same time, security threats targeting IoT devices have become widespread, and there are concerns about security incidents such as unauthorized access and information leakage. As a result, the need for security-enhancing solutions is increasing. In this paper, we implement an autoencoder-based anomaly detection model utilizing real-time collected network traffics in respond to IoT security threats. Considering the difficulty of capturing IoT device traffic data for each attack in real IoT environments, we use an unsupervised learning-based autoencoder and implement 6 different autoencoder models based on the use of noise in the training data and the dimensions of the latent space. By comparing the model performance through experiments, we provide a performance evaluation of the anomaly detection model for detecting abnormal network traffic.

A Study on the Operation and System Improvement of Cyber Security Center (사이버보안관제센터 운영 및 제도 개선에 관한 연구)

  • Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.39-45
    • /
    • 2024
  • The purpose of security control in the public sector is to secure the safety of administrative services for the public by preventing resource loss or information infringement in information systems and information and communication networks. The security control system is a process that performs real-time detection, analysis, response, and reporting through system vulnerability analysis and security system detection pattern optimization. This study aims to objectively identify the current situation of the mismatch between the supply and demand of cyber security control centers currently in operation and specialized security control companies that can be entrusted to operate them, and to derive and propose practical and institutional improvement measures. Considering that the operation of security control centers in the public sector is expected to increase in the future, research on the practical supplementation required for the operation process of security control centers and the improvement of the designation system of security control specialized organizations has fundamental and timely significance, and it is an area that requires continuous research in terms of strategic industrialization.

Analysis of Trends in Detection Environments and Proposal of Detection Frame work for Malicious Cryptojacking in Cloud Environments (악성 크립토재킹 대응을 위한 탐지 환경별 동향 분석 및 클라우드 환경에서의 탐지 프레임워크 제안)

  • Jiwon Yoo;Seoyeon Kang;Sumi Lee;Seongmin Kim
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.19-29
    • /
    • 2024
  • A crypto-jacking attack is an attack that infringes on the availability of users by stealing computing resources required for cryptocurrency mining. The target of the attack is gradually diversifying from general desktop or server environments to cloud environments. Therefore, it is essential to apply a crypto-minor detection technique suitable for various computing environments. However, since the existing detection methodologies have only been detected in a specific environment, comparative analysis has not been properly performed on the methodologies that can be applied to each environment. Therefore, in this study, classification criteria for conventional crypto-minor detection techniques are established, and a complex and integrated detection framework applicable to the cloud environment is presented through in-depth comparative analysis of existing crypto-minor detection techniques based on different experimental environments and datasets.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

The Hmong Response to State Intervention in Vietnam's Upland: A case study of a remote hamlet in North Central Vietnam (베트남 산악지역에서의 국가의 간섭과 흐몽족의 대응 - 베트남 북중부의 프론티어 마을을 사례로 -)

  • Le, Quy Ngoc Phuong;Kim, Doo-Chul
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.21 no.2
    • /
    • pp.119-138
    • /
    • 2018
  • The Hmong people are one of the largest ethnic groups in Vietnam. They traditionally practice shifting cultivation for their daily subsistence. This group has a traditional governance system as well as strong clan and kinship relationships that occupy an important role in maintaining Hmong culture and livelihoods. The state's approval of the legitimate and statutory law for the Nature Reserve largely excluded local rights of access to and the use of natural resources. This study focusses on Hmong responses to the state interventions of the establishment of the Nature Reserve as well as forest land allocation. Based on Scott's contribution of Moral Economy (1976), the authors argue that local responses function as a 'risk-averter' against state intervention. Meanwhile, the intra and inter-ethnic relationships based on the 'subsistence ethic' help locals successfully mitigate state intervention. These findings help the state rethink their interventions, which have been constructed with very little respect for local differences or the desires of ethnic peoples. Furthermore, the main findings, which reveal that not only the intra-ethnic relationship but also the inter-ethnic relationship among ethnic minorities can play an important role in maintaining the Moral Economy, are expected to deepen the previous understanding on the Moral Economy, which has previously constrained its scope to the intra-ethnic relationship.