• Title/Summary/Keyword: Cyber Assets

Search Result 80, Processing Time 0.028 seconds

Development of Korean Cybersecurity Goods Menu (Korean Cybersecurity Goods Menu 개발)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.266-267
    • /
    • 2015
  • The information security (information security knowledge) industry is technology-intensive, high value-added industries. South Korea's response has excellent ICT skills and experience and skills in a variety of cyber attacks, has become a benchmark in the world. However, the small size of the domestic information security company, supporting infrastructure is lacking. Domestic information security industry is the primary condition to activate the export. In order to export it is necessary to develop for the Korean Cybersecurity Goods Menu for products, services and technologies of the domestic information security industry. Buyer Menu as well as foreign and domestic Seller, companies and governments know the details of the assets and product information security industry and is a prerequisite to sell. In this paper, I study the Korean Cybersecurity Goods Menu development.

  • PDF

Market in Medical Devices of Blockchain-Based IoT and Recent Cyberattacks

  • Shih-Shuan WANG;Hung-Pu (Hong-fu) CHOU;Aleksander IZEMSKI ;Alexandru DINU;Eugen-Silviu VRAJITORU;Zsolt TOTH;Mircea BOSCOIANU
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.2
    • /
    • pp.39-44
    • /
    • 2023
  • The creativity of thesis is that the significance of cyber security challenges in blockchain. The variety of enterprises, including those in the medical market, are the targets of cyberattacks. Hospitals and clinics are only two examples of medical facilities that are easy targets for cybercriminals, along with IoT-based medical devices like pacemakers. Cyberattacks in the medical field not only put patients' lives in danger but also have the potential to expose private and sensitive information. Reviewing and looking at the present and historical flaws and vulnerabilities in the blockchain-based IoT and medical institutions' equipment is crucial as they are sensitive, relevant, and of a medical character. This study aims to investigate recent and current weaknesses in medical equipment, of blockchain-based IoT, and institutions. Medical security systems are becoming increasingly crucial in blockchain-based IoT medical devices and digital adoption more broadly. It is gaining importance as a standalone medical device. Currently the use of software in medical market is growing exponentially and many countries have already set guidelines for quality control. The achievements of the thesis are medical equipment of blockchain-based IoT no longer exist in a vacuum, thanks to technical improvements and the emergence of electronic health records (EHRs). Increased EHR use among providers, as well as the demand for integration and connection technologies to improve clinical workflow, patient care solutions, and overall hospital operations, will fuel significant growth in the blockchain-based IoT market for linked medical devices. The need for blockchain technology and IoT-based medical device to enhance their health IT infrastructure and design and development techniques will only get louder in the future. Blockchain technology will be essential in the future of cybersecurity, because blockchain technology can be significantly improved with the cybersecurity adoption of IoT devices, i.e., via remote monitoring, reducing waiting time for emergency rooms, track assets, etc. This paper sheds the light on the benefits of the blockchain-based IoT market.

Effects of Third-Party Logistics Choice Factors on the Performance of Cyber Logistics (삼자물류선택요인들이 사이버물류성과에 미치는 영향에 관한 연구)

  • Park, Yeung-Kurn;Kim, Chang-Wan
    • Journal of Global Scholars of Marketing Science
    • /
    • v.8
    • /
    • pp.429-449
    • /
    • 2001
  • Objectives of this study were: First, The Purpose of this study is to develope the concept of Third-Party Logistics choice factors and to review effects of Third-Party Logistics choice Factors on the Logistics Performance. Second, to set up research model specifying relationships between Third-Party Logistics choice factors and the Logistics Performance of EC(Electronic Commerce) firms. Third, to test hypotheses derived from the research model of this study and to attempts to explain how to have the effect the Logistics Performance of EC firms. Marketing Implications of this study were: First, As a result factor analysis, Third-Party Logistics choice Factors was divided into three dimensions, credibility, the pursuit of relationship, and assets factors. Second, three factors which are credibility, the pursuit of relationship, and assets factors increase and enhance the Logistics Performance of EC firms. Limitations of this study were: First, validity and reliability of data collection methods used in this study were questionable for the lack of past researches in korea. Second, static research method was employed in this study. Generalization over different time interval was almost impossible from results of this study.

  • PDF

A Study of Financial Structure, Profitability, Growth and Financial Risk of Food Service Franchisor (외식산업프랜차이즈본사의 재무구조, 수익성, 성장성 및 재무위험에 관한 연구)

  • Choi, Hoang-Taig
    • The Korean Journal of Franchise Management
    • /
    • v.5 no.1
    • /
    • pp.85-108
    • /
    • 2014
  • This study provides the information about size, financial structure, profitability and growth of franchisors using financial data(asset, liability, equity, sales volume, operating income and net income) in uniform franchise offering circular of fair trade commission. The data were collected from 1,050 franchisors in various business fields: fast food, family restaurant, bakery, agriculture & fishery and liquor shop in the uniform franchise offering circular in 2012 and 2011. Results of this study are as follows: For company size, median of total assets was KRW 675 million and the accumulated median assets rate was 0.48%, but the accumulated median company numbers were 49.9%, which showed small size. For financial structure, 525 companies were below 200% debt ratio, while 314 (29.9%) companies were in over 200% debt, and 211 (20.1%) companies were impaired in capital. These also showed financial structure was vulunerable. For profitability, median of ROA for total companies were only 4.72%, which showed low profitability. For growth, median of growth rate for sales were 7.57% per year, which showed mature industry. In overall, the results showed franchisors should improve their financial status.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.

Study of Information Security Management Model in Public Institution (공공기관의 정보보안 관리 모델 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.43-50
    • /
    • 2013
  • Recently, Cyber threats that is doing intelligence and sophistication from the organization's information assets to secure order technical disciplines, as well as managerial and environmental sectors, such as mind-response system is must established. In this paper, possible to analyze the case for the theory in network security, such as the logical network and physical network separation suitable for the corporate environment and constantly respond and manage the Information Security Management Model A secure network design is proposed. In particular, the proposed model improvements derived from the existing network, network improvements have been made in order to design improved ability to respond to real-time security and central manageability, security threats, pre-emptive detection and proactive coping, critical equipment in the event of a dual hwalreu through applied features such as high-availability, high-performance, high-reliability, ensuring separation of individual network security policy integrated management of individual network, network security directional.

Real-time Abnormal Behavior Detection System based on Fast Data (패스트 데이터 기반 실시간 비정상 행위 탐지 시스템)

  • Lee, Myungcheol;Moon, Daesung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1027-1041
    • /
    • 2015
  • Recently, there are rapidly increasing cases of APT (Advanced Persistent Threat) attacks such as Verizon(2010), Nonghyup(2011), SK Communications(2011), and 3.20 Cyber Terror(2013), which cause leak of confidential information and tremendous damage to valuable assets without being noticed. Several anomaly detection technologies were studied to defend the APT attacks, mostly focusing on detection of obvious anomalies based on known malicious codes' signature. However, they are limited in detecting APT attacks and suffering from high false-negative detection accuracy because APT attacks consistently use zero-day vulnerabilities and have long latent period. Detecting APT attacks requires long-term analysis of data from a diverse set of sources collected over the long time, real-time analysis of the ingested data, and correlation analysis of individual attacks. However, traditional security systems lack sophisticated analytic capabilities, compute power, and agility. In this paper, we propose a Fast Data based real-time abnormal behavior detection system to overcome the traditional systems' real-time processing and analysis limitation.

A Study on Cyber Security Threat and Security Requirements for Industrial Wireless Communication Devices (산업용 무선통신기기 사이버 보안위협 및 보안요구사항에 관한 연구)

  • Lee, Jiseop;Park, Kyungmi;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.757-770
    • /
    • 2020
  • Industrial Control System(ICS) is a system that measures, monitors, and controls various distributed assets, and is used in industrial facilities such as energy, chemical, transportation, water treatment, and manufacturing plants or critial infrastructure. Because ICS system errors and interruptions can cause serious problem and asset damage, research on prevention and minimization of security threats in industrial control systems has been carried out. Previously wireless communication was applied in limited fields to minimize security risks, but the demand for industrial wireless communication devices is increasing due to ease of maintenance and cost advantages. In this paper, we analyzed the security threats of industrial wireless communication devices supporting WirelessHART and ISA100.11a. Based on the analysis results, we proposed the security requirements for adopting and operating industrial wireless communication devices. We expect that the proposed requirements can mitigate security threats of industrial wireless devices in ICS.

A Study on the Cyber Museum Organization System for Intangible Cultural Properties I - Focused on the Information system and classification code anger - (무형문화재를 위한 사이버뮤지엄 구성체계에 관한 연구 I - 정보체계 및 분류코드화를 중심으로 -)

  • 한영호;장중식;정용섭;황복득
    • Korean Institute of Interior Design Journal
    • /
    • no.38
    • /
    • pp.266-273
    • /
    • 2003
  • The culture is a product of the century, and so a worldwide-recognized cultural legacy is like an incorporeal property owned by a country. It is a new legacy created In new environment conditions among countries. The meaning of this study is to give wider publicity to our intangible cultural properties through active database research. There are a significant number of museums that manage tangible cultural properties at a national level, but we can find that most stay very superficial in the aspects of database protection, classification system, and demonstration method. This is a critical physical factor that makes it difficult to create an information-oriented management system, or to manage intangible cultural properties as incorporeal entities. The preservation of tangible cultural properties may be a more proper approach of handing down valuable national characteristics to posterity In that they can show those characteristics more readily. Unlike tangible cultural properties, the preservation of intangible cultural properties requires a different approach and process. They are treated as a category of human cultural assets because of their incorporeity and formlessness. Since those intangible cultural properties to be preserved and quantified at a national level, it is an important consideration in the study on cultural properties. The objectives of this study are to present the intangible products by making the best use of the information society's merits; rediscover human elements constituting those products; ultimately help promote our cultural succession and development by databasing such human elements.

A Study on Index Selection for ICT Evaluation of North Korea using AHP (AHP 방법론을 이용한 북한의 ICT 평가를 위한 인덱스 선정에 관한 연구)

  • Park, Cheol-Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.4
    • /
    • pp.41-55
    • /
    • 2017
  • Industrial Revolution is a concept and a development that has fundamentally changed our society and economy. Industry 4.0 focuses on the end-to-end digitization of all physical assets and integration into digital ecosystems with value chain partners. At present, we find ourselves at the beginning of this fourth stage, which is characterized by so-called "Cyber-Physical Systems". These systems are a consequence of the far-reaching integration of production, sustainability and customer-satisfaction forming the basis of intelligent network systems and processes. If South Korea ran toward global ICT with the advent of the Fourth Industrial Revolution, North Korea has adhered to a unique Juche science and technology. ICT in South Korea and North Korea seems very difficult to find common interests. However, as seen in the Internet and intranets, information and communication technology can find similarities in many areas than in general science and technology. There are many differences not only in the level of ICT and science and technology but also in the direction. And IT terminology and all technologies are also different. What are we preparing for the unification of North and South Korea? If we look at the science and technology sector at present, there seems to be no systematic preparation by the government. South Korea and North Korea need to be prepared for science and technology cooperation. First, it is necessary to understand the exact situation of North Korea's science and technology. In this study, we will perform research to establish mid and long term plans for revitalization of ICT cooperation between the two Koreas. In this study, we will determine the extent to which the two Koreas utilize ICT based on available ICT capabilities and technologies. To do this, we conducted research to measure and evaluate the ICT development index of North Korea using ICT international index.