• Title/Summary/Keyword: Critical digital asset

Search Result 12, Processing Time 0.082 seconds

A Study on the Implementation of Technical Security Control for Critical Digital Asset of Nuclear Facilities (원자력시설의 필수디지털자산에 대한 기술적 보안조치항목에 대한 연구)

  • Choi, Yun-hyuk;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.877-884
    • /
    • 2019
  • As technology advances, equipment installed in Nuclear facilities are changing from analog system to digital system. Nuclear facilities have been exposed to cyber threats as the proportion of computers and digital systems increases. As a result, interest in cyber security has increased and there has been a need to protect the system from cyber attacks. KINAC presented 101 cyber security controls for critical digital asset. However, this is a general measure that does not take into account the characteristics of digital assets. Applying all cyber security controls to critical digital assets is a heavy task and can be lower efficient. In this paper, we propose an effective cyber security controls by identifying the characteristics of critical digital assets and presenting proper security measures.

A Study On Valuation Factors of Patent (특허가치평가 요소에 관한 연구)

  • Kim, Young-Ki;Park, Seong-Taek;Lee, Seung-Jun
    • Journal of Digital Convergence
    • /
    • v.7 no.2
    • /
    • pp.63-70
    • /
    • 2009
  • It is well known that in the knowledge-based economy a firm's intellectual property including patent is crucial for its competitive advantage. In industrial economy, tangible assets such as land and equipment have been of critical importance for a firm's competitiveness. However, as the paradigm shift to the knowledge-base economy is being accelerated, intangible assets such as intellectual property are considered to be more influential for a firm to be competitive. The valuation of intangible asset is as necessary as that of tangible asset. In particular, reasonably accurate valuation of patent which represents a firm's technological competitiveness seems to be of great importance since (1) it is essential for a firm's patent strategy development, (2) it can activate the technology market, and (3) it is necessary to evaluate a patent's technological contribution when multiple patents are used to develop and commercialize an innovative product. Unlike that of tangible asset, the valuation of intangible asset is very difficult. In order to figure out a value of patent it is necessary to use a number of appropriate valuation factors. In this paper, we surveyed various valuation factors presented by previous researches and several technology valuation organizations to find a set of common valuation factors considered to be of more importance.

  • PDF

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants

  • Park, Jong Woo;Lee, Seung Jun
    • Nuclear Engineering and Technology
    • /
    • v.51 no.1
    • /
    • pp.138-145
    • /
    • 2019
  • With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious consequences by initiating dangerous events or rendering important safety systems unavailable. Since a cyber-attack is conducted intentionally, numerous possible cases should be considered for developing a cyber security system, such as the attack paths, methods, and potential target systems. Therefore, prior to developing a risk-informed cyber security strategy, the importance of cyber-attacks and significant critical digital assets (CDAs) should be analyzed. In this work, an importance analysis method for cyber-attacks on an NPP was proposed using the probabilistic safety assessment (PSA) method. To develop an importance analysis framework for cyber-attacks, possible cyber-attacks were identified with failure modes, and a PSA model for cyber-attacks was developed. For case studies, the quantitative evaluations of cyber-attack scenarios were performed using the proposed method. By using quantitative importance of cyber-attacks and identifying significant CDAs that must be defended against cyber-attacks, it is possible to develop an efficient and reliable defense strategy against cyber-attacks on NPPs.

Cybersecurity Risk Assessment of a Diverse Protection System Using Attack Trees (공격 트리를 이용한 다양성보호계통 사이버보안 위험 평가)

  • Jung Sungmin;Kim Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.25-38
    • /
    • 2023
  • Instrumentation and control systems measure and control various variables of nuclear facilities to operate nuclear power plants safely. A diverse protection system, a representative instrumentation and control system, generates a reactor trip and turbine trip signal by high pressure in a pressurizer and containment to satisfy the design requirements 10CFR50.62. Also, it generates an auxiliary feedwater actuation signal by low water levels in steam generators. Cybersecurity has become more critical as digital technology is gradually applied to solve problems such as performance degradation due to aging of analog equipment, increased maintenance costs, and product discontinuation. This paper analyzed possible cybersecurity threat scenarios in the diverse protection system using attack trees. Based on the analyzed cybersecurity threat scenario, we calculated the probability of attack occurrence and confirmed the cybersecurity risk in connection with the asset value.

Improving the Efficiency of Cybersecurity Risk Analysis Methods for Nuclear Power Plant Control Systems (원전 제어시스템 사이버보안 위험 분석방법의 효율성 개선)

  • Shin-woo Lee;Jung-hee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.537-552
    • /
    • 2024
  • Domestic nuclear power plants operate under the establishment of the "Information System Security Regulations" in accordance with the Nuclear Safety Act, introducing and implementing a cybersecurity system that encompasses organizational structure as well as technical, operational, and managerial security measures for assets. Despite attempts such as phased approaches and alternative measures for physical protection systems, the reduction in managed items has not been achieved, leading to an increased burden on security capabilities due to limited manpower at the site. In the main text, an analysis is conducted on Type A1 assets performing nuclear safety functions using Maintenance Rules (MR) and EPRI Technical Assessment Methodology (TAM) from both a maintenance perspective and considering device characteristics. Through this analysis, approaches to re-evaluate the impact of cyber intrusions on asset functionality are proposed.

A Study on the Assessment of Critical Assets Considering the Dependence of Defense Mission (국방 임무 종속성을 고려한 핵심 자산 도출 방안 연구)

  • Kim Joon Seok;Euom Ieck Chae
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.189-200
    • /
    • 2024
  • In recent years, the development of defense technology has become digital with the introduction of advanced assets such as drones equipped with artificial intelligence. These assets are integrated with modern information technologies such as industrial IoT, artificial intelligence, and cloud computing to promote innovation in the defense domain. However, the convergence of the technology is increasing the possibility of transfer of cyber threats, which is emerging as a problem of increasing the vulnerability of defense assets. While the current cybersecurity methodologies focus on the vulnerability of a single asset, interworking of various military assets is necessary to perform the mission. Therefore, this paper recognizes these problems and presents a mission-based asset management and evaluation methodology. It aims to strengthen cyber security in the defense sector by identifying assets that are important for mission execution and analyzing vulnerabilities in terms of cyber security. In this paper, we propose a method of classifying mission dependencies through linkage analysis between functions and assets to perform a mission, and identifying and classifying assets that affect the mission. In addition, a case study of identifying key assets was conducted through an attack scenario.

The Discursive Topography in Maker Culture A Critical Discourse Analysis of 'Maker Movement' (메이커 문화를 둘러싼 담론적 지형 메이커 운동(maker movement)에 대한 비판적 담론 분석)

  • Choi, Hyuk Kyoo
    • Korean journal of communication and information
    • /
    • v.82
    • /
    • pp.73-103
    • /
    • 2017
  • With the introduction and expansion of 'maker movement', maker culture captured attention and saw itself as an emerging culture. This study aims to analyze published books, policy report, columns and news articles related to maker culture through the perspective of critical discourse analysis. Maker movement led by the government gives meaning to the maker culture as the force of 'creative economy' that can overcome the economic crisis. Following this meaning making, one-man digital fabrication start-ups have been actively promoted by government policies. In the case of Seoul, it criticizes government led maker movement that only focuses on economy and institutionalizes maker movement by focusing on the maker culture's aspect as 'digital social innovation' that can resolve social problems. In the world of art, it tries to rediscover the value craft, that is, 'creative craftsman'. Moreover, resistance movement that tries to fight against dominant technology structure through constructing 'critical making' was also spotted. Nonetheless, it is rather untimely to definitely find dominant discourse's power effect in reality and sign of rupture in dominant structure as the result of resisting discourse's struggle. Thus, maker movement is the field of struggle where an ongoing clash can be found: between discourse strategy that tries to make maker culture a social or economic asset by combining with dominant power structure, and alternating or resisting practice of signification that focuses on its cultural techno-political potential.

  • PDF

Prospect Analysis for Utilization of Virtual Assets using Blockchain Technology

  • Jeongkyu Hong
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.1
    • /
    • pp.64-69
    • /
    • 2024
  • Blockchain is a decentralized network in which data blocks are linked. Through a decentralized peer-to-peer network, users can create shared databases, resulting in a trustworthy and aggregated database known as a blockchain that enhances reliability and security. The distributed nature of the blockchain enables data to be stored on multiple nodes, eliminating the need for a central server or platform. This disintermediation significantly reduces the transaction and administrative costs. The blockchain is particularly valuable in applications where reliability and stability are critical because it establishes an open database that ensures data integrity, making it virtually impossible to tamper with or falsify data. This study explores the diverse applications of the blockchain technology in virtual assets, such as cryptocurrency, decentralized finance, central bank digital currency, nonfungible tokens, and metaverses. In addition, it analyzes the potential prospects and developments driven by these innovative technologies.

Prospects & Issues of NFT Art Contents in Blockchain Technology (블록체인 NFT 문화예술콘텐츠의 현황과 과제)

  • Jong-Guk Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.1
    • /
    • pp.115-126
    • /
    • 2023
  • In various fields such as art, design, music, film, sports, games, and fashion, NFTs (Non-Fungible Tokens) are creating new economic value through trading platforms dedicated to NFT art and content. In this article, I analyze the current state of blockchain technology and NFT art content in the context of an expanding market for blockchain-based NFT art content in the metaverse. I also propose several tasks based on the economic and industrial logic of technological innovation. The first task proposed is to integrate cultural arts on blockchain, metaverse, and NFT platforms through digital innovation, instead of separating or distinguishing between creative production and consumption. Before the COVID-19 pandemic, there was a clear separation between creators and consumers. However, with the rise of Web 3.0 platforms, any user can now create and own their own content. Therefore, it is important to promote a collaborative and integrated approach to cultural arts production and consumption in the blockchain and metaverse ecosystem. The second task proposed is to align the legal framework with blockchain-based technological innovation. The enactment and revision of relevant laws should focus on promoting the development of the NFT trading platform ecosystem, rather than merely regulating it for user protection. As blockchain-based technology continues to evolve, it is important that legal systems adapt to support and promote innovation in the space. This shift in focus can help create a more conducive environment for the growth of blockchain-based NFT platforms. The third task proposed is to integrate education on digital arts, including metaverse and NFT art contents, into the current curriculum. This education should focus on convergence and consilience, rather than merely mixing together humanities, technology, and arts. By integrating digital arts education into the curriculum, students can gain a more comprehensive understanding of the potential of blockchain-based technologies and NFT art. This article examines the digital technological innovation such as blockchain, metaverse, and NFT from an economic and industrial point of view. As a limitation of this research, the critical mind such as philosophical thinking or social criticism on technological innovation is left as a future task.

The Study of Online Piracy Protection -Focusing on Punishment and Moral Obligation- (인터넷 저작권 침해 보호에 관한 연구 -저작권 침해에 대한 처벌 및 윤리의식을 중심으로-)

  • Park, Joo Yeon
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.145-151
    • /
    • 2013
  • As the Internet is widely used worldwide, digital asset on the internet becomes to be critical to protect from illegal copying and piracy which is an unlawful action that download or upload copyrighted materials from the Internet without having a right to use them from the copyright owners. Such an illegal and unethical behavior are pervading and becoming a big concern in many industries and business sectors over the world. This study examines the effect of the user's perception for piracy regulation and moral obligation on online piracy intention. Therefore, the purpose of this study is to see the different effect of regulation and moral obligation on piracy attitude and intention so as to suggest an effective method of piracy protection and to bring an attention on moral and ethical education for online piracy. The result of this study showed both punishment and moral obligation toward online piracy are significantly associated with users' attitude on piracy, indicating that higher level of punishment severity as well as moral obligation lead to decrease piracy attitude. This research also revealed that the level of users' moral obligation has a stronger relationship with piracy attitude than punishment.