• Title/Summary/Keyword: Critical infrastructure protection

Search Result 52, Processing Time 0.021 seconds

A Preliminary Study on State Responsibility for Establishment and Protection of Information and Telecommunication Infrastructure in COVID-19 Pandemic (코로나19 사태에서 국가의 정보통신기반 구축·보호 책임에 대한 시론적 고찰)

  • Park, Sangdon
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.49-54
    • /
    • 2020
  • COVID-19 pandemic is an opportunity to recognize the necessity of information and telecommunications infrastructure which is base of information and telecommunication. This paper discusses the importance of information and telecommunications infrastructure in COVID-19 pandemic and overview proper institutional measures to fulfill state responsibility for establishment and protection of the infrastructure through documentary survey and normative study with juristic consideration. Information and telecommunications infrastructure has critical functions to respond to the pandemic and is one of the key to make digital transformation. A state is responsible for establishment and protection of Information and telecommunications infrastructure. Institutional measures have significance for the state responsibility and they are formed by not only statute but also constitution with making state object provision for establishment and protection of Information and telecommunications infrastructure. This paper shows premise and direction of further studies on related individual legislation.

A Study on the Introduction of Legal EMP Protection System (고출력 전자기파 방호 제도 도입에 관한 연구)

  • Chung, Yeon-Choon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.8
    • /
    • pp.781-790
    • /
    • 2013
  • Nowadays, national critical infrastructures have been known to be highly vulnerable to the EMP threats which are internationally growing. But their realistic solutions have been not made by the lack of detailed rules and regulations in current laws, however, which cover most of cyber threats. This paper takes a look at the domestic and overseas trends on the EMP protections, and proposes the revision directives of relevant laws and the contents included into the proposed legislation. Among them, the amendment of the current "Information Infrastructure Protection Act" is considered to be the most effective, including provisions on protected informations, industrial promotions, R&D supports, education, etc. Anyway, this paper is expected to be helpful for introducing an effective legal scheme on the CIP against EMP threats. domestic rule.

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.

Modelling the dynamic response and failure modes of reinforced concrete structures subjected to blast and impact loading

  • Ngo, Tuan;Mendis, Priyan
    • Structural Engineering and Mechanics
    • /
    • v.32 no.2
    • /
    • pp.269-282
    • /
    • 2009
  • Responding to the threat of terrorist attacks around the world, numerous studies have been conducted to search for new methods of vulnerability assessment and protective technologies for critical infrastructure under extreme bomb blasts or high velocity impacts. In this paper, a two-dimensional behavioral rate dependent lattice model (RDLM) capable of analyzing reinforced concrete members subjected to blast and impact loading is presented. The model inherently takes into account several major influencing factors: the progressive cracking of concrete in tension, the inelastic response in compression, the yielding of reinforcing steel, and strain rate sensitivity of both concrete and steel. A computer code using the explicit algorithm was developed based on the proposed lattice model. The explicit code along with the proposed numerical model was validated using experimental test results from the Woomera blast trial.

Securing SCADA Systems: A Comprehensive Machine Learning Approach for Detecting Reconnaissance Attacks

  • Ezaz Aldahasi;Talal Alkharobi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.1-12
    • /
    • 2023
  • Ensuring the security of Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) is paramount to safeguarding the reliability and safety of critical infrastructure. This paper addresses the significant threat posed by reconnaissance attacks on SCADA/ICS networks and presents an innovative methodology for enhancing their protection. The proposed approach strategically employs imbalance dataset handling techniques, ensemble methods, and feature engineering to enhance the resilience of SCADA/ICS systems. Experimentation and analysis demonstrate the compelling efficacy of our strategy, as evidenced by excellent model performance characterized by good precision, recall, and a commendably low false negative (FN). The practical utility of our approach is underscored through the evaluation of real-world SCADA/ICS datasets, showcasing superior performance compared to existing methods in a comparative analysis. Moreover, the integration of feature augmentation is revealed to significantly enhance detection capabilities. This research contributes to advancing the security posture of SCADA/ICS environments, addressing a critical imperative in the face of evolving cyber threats.

A Study of the Operation Management Strategy on the National Critical Infrastructures : Transportation and Logistics Sector

  • Chung, Sung-Hak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.89-97
    • /
    • 2021
  • The objective of this study is to propose an operation management strategy for the connectivity which are the designated and managed in sector of the transportation and logistics on the national critical infrastructures. The industrial structure is becoming advanced. The national critical infrastructure managed by the shows forms of the cooperative connection and collaborative R&D. Also, in-depth and specific analysis for the disaster safety budget are implemented to consideration for the R&D life cycle. The government responsibility are expanded comprehensively. Needs are exchanging life styles by the economic and safety demands. At this trends, this study encourage facility maintenance and scientific management to the public service. Throughout the result of this study, national critical infrastructure are implementing for protection plan of the sustainable maintenance and management. And, we have to prepare and implement for the consideration of the characteristics through comprehensive guidelines. This study contributes to the disaster and safety management by proposed an operation strategy of the cooperative connection in the sector of transportation and logistic sector on the national critical infrastructure.

A Study on the Security Management for Critical Key Infrastructure(SCADA) (중요핵심기반시설(SCADA)에 대한 보안 관리 연구)

  • Kim InJung;Chung YoonJung;Koh JaeYoung;Won Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8C
    • /
    • pp.838-848
    • /
    • 2005
  • Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management techniques. This paper attempts to propose such security management techniques, including information protection measures and troubleshooting, based on a risk analysis process concerning assets, threats/vulnerability, and hazards, and to examine the security management status of critical key infrastructure in the U.S. and Japan.

A Study on Models for Strengthening Infrastructure Protection through Analysis of Cyber Intrusions (침해사고 분석을 통한 기반시설 보호 강화 모델 연구)

  • Yoon, Oh Jun;Han, Bok Dong;Park, Jeong Keun;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.29-36
    • /
    • 2015
  • The hacking threats made against the Korea Hydro & Nuclear Power(KNDP) and the leakage of critical information on nuclear power safety raised the public awareness on the importance of protecting and managing national infrastructure necessary for sustaining the state and society. Cyber security activities and relevant institutions in the ROK, however, are still insufficient, because of which there is a possibility that similar incidents would reoccur and cause serious damages. Hence, a grave and direct threat is posed to the national security of the ROK. In this thesis, I would like to give my analysis and assessment on the recent cyber intrusions against infrastructure at home and abroad, measures established in response and their implementation, and the deficiency of the existing infrastructure protection system ; and lastly propose measures to reinforce infrastructure protection of the ROK.

International Legal Measures of Protection of Critical Infrastructure Facilities in Banking Sphere

  • Oleg, Batiuk;Oleg, Novikov;Oleksandr, Komisarov;Natalia, Benkovska;Nina, Anishchuk
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.145-154
    • /
    • 2022
  • Based on the obtained results of the study, the most problematic issues and legal conflicts are identified, which are related to the ratio of norms of domestic and foreign legislation, taking into account the requirements of the Constitution of Ukraine and the provisions of the Law of Ukraine "On international agreements". Along with this, it is stated in this scientific article that there are a number of provisions and examples of positive practice on the specified topic abroad and in international legal acts today, which should be used by Ukraine both in improving legislation on the issues of banking activity and in increasing the level of criminal legal protection of relevant critical infrastructure facilities, especially those that are substantively related to prevention and counteraction of activity, with regard to the legalization (laundering) of criminally obtained funds, financing of terrorism and the financing of the proliferation of weapons of mass destruction, which is quite relevant for our state, given the military conflict that is taking place on its territory in the Donbass. Again, in the same context, the need for more active cooperation between Ukraine and the FATF (international body developing a policy to combat money laundering) has been proven.

Development of a structure analytic hierarchy approach for the evaluation of the physical protection system effectiveness

  • Zou, Bowen;Wang, Wenlin;Liu, Jian;Yan, Zhenyu;Liu, Gaojun;Wang, Jun;Wei, Guanxiang
    • Nuclear Engineering and Technology
    • /
    • v.52 no.8
    • /
    • pp.1661-1668
    • /
    • 2020
  • A physical protection system (PPS) is used for the protection of critical facilities. This paper proposes a structure analytic hierarchy approach (SAHA) for the hierarchical evaluation of the PPS effectiveness in critical infrastructure. SAHA is based on the traditional analysis methods "estimate of adversary sequence interruption, EASI". A community algorithm is used in the building of the SAHA model. SAHA is applied to cluster the associated protection elements for the topological design of complicated PPS with graphical vertexes equivalent to protection elements.