• Title/Summary/Keyword: Cyber Operation

Search Result 261, Processing Time 0.03 seconds

Improvement Plan for Public Institution Remote Security Model in the New-Normal Era (뉴노멀 시대의 공공기관 원격보안 모델 개선방안)

  • Shin, SeungWoo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.104-112
    • /
    • 2022
  • The pandemic caused by the COVID-19 virus, which has lasted for the past three years, has changed society and the way people live in many ways. These changes also affect cyberspace, so the pre-pandemic information security model and standards have limitations when applied to the current situation. In this paper, a new method to improve the information security model of public institutions was proposed in consideration of various situations in the new normal era. In other words, through the proposed information security model, the possibility of external intrusion is blocked in advance through the policy and technical supplementation of remote work, which is a weakness of the existing information security operation of public institutions. Also, how to prevent abnormal authentication attempts by building a secure VPN environment, how to prevent social engineering cyber attacks targeting fear and uncertainty caused by COVID-19, and how to use a smooth network and create a remote work environment. For this purpose, methods for securing service availability were additionally presented.

A Study On Operation for DevOps Using Zero Trust in Network Separation Environment (망분리 환경에서 제로 트러스트를 활용한 DevOps 운영에 관한 연구)

  • Bong-Yong Han;Young-Kun Choi;Ga-Yeon So;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.27-34
    • /
    • 2024
  • Network separation is an important policy that Cyber Incident prevent cyber and protect data. Recently, the IT environment is changing in software development, such as remote work, using the cloud, and using open sources. Due to these changes, fintech companies' development productivity and efficiency are lowering due to network separation regulations, and the demand for easing network separation continued. The government revised the regulations electronic financial supervision(hereafter EFS) in response to needs for mitigation of network separation in the IT environment and fintech companies. Some amendments to the EFS, which took effect on 01/01/2023, mitigate network separation only for research and development purposes in cloud environments. If software developed in a cloud development environment is applied to an operating system through a distribution system the existing perimeter-based security model will not satisfaction the network separation conditions. In this Study, we would like to propose a way to maintain the DevOps system in a network separation environment by Using the zero trust security system.

A Study on the Safety of Carbon Manufacturing By-product Gas Emissions (카본제조 부생가스 배출 안전성에 관한 연구)

  • Joo, Jong-Yul;Jeong Phil-Hoon;Kim, Sang-Gil;Sung-Eun, Lee
    • Journal of the Korea Safety Management & Science
    • /
    • v.26 no.1
    • /
    • pp.99-106
    • /
    • 2024
  • In the event of an emergency such as facility shutdown during process operation, the by-product gas must be urgently discharged to the vent stack to prevent leakage, fire, and explosion. At this time, the explosion drop value of the released by-product gas is calculated using ISO 10156 formula, which is 27.7 vol%. Therefore, it does not correspond to flammable gas because it is less than 13% of the explosion drop value, which is the standard for flammable gas defined by the Occupational Safety and Health Act, and since the explosion drop value is high, it can be seen that the risk of fire explosion is low even if it is discharged urgently with the vent stock. As a result of calculating the range of explosion hazard sites for hydrogen gas discharged to the Bent Stack according to KS C IEC 60079-10-1, 23 meters were calculated. Since hydrogen is lighter than air, electromechanical devices should not be installed within 23 meters of the upper portion of the Bent Stack, and if it is not possible, an explosion-proof electromechanical device suitable for type 1 of dangerous place should be installed. In addition, the height of the stack should be at least 5 meters so that the diffusion of by-product gas is facilitated in case of emergency discharge, and it should be installed so that there are no obstacles around it.

Big Data Governance Model for Effective Operation in Cyberspace (효과적인 사이버공간 작전수행을 위한 빅데이터 거버넌스 모델)

  • Jang, Won-gu;Lee, Kyung-ho
    • The Journal of Bigdata
    • /
    • v.4 no.1
    • /
    • pp.39-51
    • /
    • 2019
  • With the advent of the fourth industrial revolution characterized by hyperconnectivity and superintelligence and the emerging cyber physical systems, enormous volumes of data are being generated in the cyberspace every day ranging from the records about human life and activities to the communication records of computers, information and communication devices, and the Internet of things. Big data represented by 3Vs (volume, velocity, and variety) are actively used in the defence field as well. This paper proposes a big data governance model to support effective military operations in the cyberspace. Cyberspace operation missions and big data types that can be collected in the cyberspace are classified and integrated with big data governance issues to build a big data governance framework model. Then the effectiveness of the constructed model is verified through examples. The result of this study will be able to assist big data utilization planning in the defence sector.

  • PDF

Result Based Evaluation Model and Its Application to Peace Operation of the ROK Military Contingent to UN Mission (한국군의 UN평화활동에 대한 성과기반 평가모델개발과 적용)

  • KWON, Goosoon
    • International Area Studies Review
    • /
    • v.21 no.1
    • /
    • pp.303-324
    • /
    • 2017
  • Current methods to evaluate the performance of ROK military contingents to UN missions unnecessarily raises the issues of relevance, validity and reliability. Thus, this article aims to suggest how the result based evaluation (RBE) model which is widely adopted in the UN field missions as well as the international development community would be modified and applied to peace operation of the ROK contingent. As a result of the study, the model presents a framework that integrates the planning process and monitoring and evaluation with a logical framework, which entails a cycle of assessment of pre-deployment planning, monitoring and phased evaluation, and post-deployment evaluation. Secondly, according to measurement of RBE benchmarks to the present ROK's monitoring and evaluation system, factors in an evaluation unit and a logical framework approach are unmet or partly met to the benchmarks. In addition, ex-post impact evaluation has been rarely performed. Finally, the policy recommendations for resolution of the aforementioned challenges as well as a joint evaluation unit, participated by experts in a civilian, public, and a military domain are proposed.

A Comparative Study of Actuality of Elementary and Middle School Teachers' Perception on Cyber Home Learning System (사이버 가정학습체제에 대한 초중등 교사의 인식실태 비교연구)

  • Jung, Ju-Young;Kim, Hyang-Sook
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.3
    • /
    • pp.339-347
    • /
    • 2007
  • Along with developments of information and communication technologies, internet has spread not only all over the society, but also our everyday life deeply. Recently, requirements for e-learning using internet in the educational aspect have a great influence on the changes of school educations. Cyber Home Learning System, in particular, has been implemented throughout the nation for the purpose of reducing private expenditure for education and promoting substantial improvements in quality of public education. However, there have been exposed many problems with respect to quality of operations and managements of the system comparing to its quantitative growth, and so, at this point in time, researcher conducted analysis of actuality of perceptions of both elementary and middle school teachers with a focus on the case of S System in K province. To test this, total 278 participants were sampled from the elementary schools (139 teachers) and the middle schools (139 teachers) located in K province and were asked to complete a survey and the results therefrom were analyzed accordingly. Results from the analyses revealed that elementary school teachers responded more positively than other respondents in the most areas, including supply of a variety of learning contents of S System, quality of contents, and providing for helps insomuch as to complement school works, etcetera. In addition, researcher has found out that, to make the system become all the more efficient, it shall be required to establish a strategy in order to induce students' interest in the system, as well as to construct infrastructure for facilitating the use of computer. And that there are also needs for continuous supports from both the school and the education authority concerned, and for method of flexible operation of curriculum.

  • PDF

A Legal Study on the Electronic Ticketing (전자항공권의 법적 제문제에 대한 고찰)

  • Kim, Jong-Bok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.21 no.2
    • /
    • pp.55-69
    • /
    • 2006
  • Electronic ticketing ("e-ticketing") through the internet will be the most critical commercial tool in the international airline industry. Actually the International Air Transport Association(IATA) has announced that it's goal is to accomplish 100 percent implementation of e-ticketing worldwide by 2007. Domestically e-ticketing will be put into operation in a full scale from the next year(2007). Thus, we count on, sooner or later, e-ticketing will be accomplished globally. As a legal aspect, this e-ticketing raises many legal issues which are no longer subject to a static set of legal rules driven by judicial precedent because e-ticketing is carried out on the "cyber space" which is a new and developing law area. In this treatise, I studied these legal issues, specially on the time and place(jurisdiction) of the contract which are the most important issues based on the New Montreal Convention signed at Montreal on May 28, 1999, which would seem prove that the airline industry is receptive and capable of change. Upon this opportunity, I hope the more comprehensive legal study on the e-ticketing will be introduced in the near future.

  • PDF

A Real-Time and Statistical Visualization Methodology of Cyber Threats Based on IP Addresses (IP 주소 기반 사이버공격 실시간 및 통계적 가시화 방법)

  • Moon, Hyeongwoo;Kwon, Taewoong;Lee, Jun;Ryou, Jaecheol;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.465-479
    • /
    • 2020
  • Regardless of the domestic and foreign governments/companies, SOC (Security Operation Center) has operated 24 hours a day for the entire year to ensure the security for their IT infrastructures. However, almost all SOCs have a critical limitation by nature, caused from heavily depending on the manual analysis of human agents with the text-based monitoring architecture. Even though, in order to overcome the drawback, technologies for a comprehensive visualization against complex cyber threats have been studying, most of them are inappropriate for the security monitoring in large-scale networks. In this paper, to solve the problem, we propose a novel visual approach for intuitive threats monitoring b detecting suspicious IP address, which is an ultimate challenge in cyber security monitoring. The approach particularly makes it possible to detect, trace and analysis of suspicious IPs statistically in real-time manner. As a result, the system implemented by the proposed method is suitably applied and utilized to the real-would environment. Moreover, the usability of the approach is verified by successful detecting and analyzing various attack IPs.

A Fundamental Study on the Development of the Fusion Education Curriculum in the Field of Architecture and Urban: based on Practitioner-oriented Survey (건축·도시 분야 융복합 교육과정 개발을 위한 기초연구 -실무자 중심의 설문조사를 기반으로-)

  • Hong, So-Hee;Yoo, Seung-Kyu;Yuh, Ok-Kyung;Kim, Jae-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3491-3498
    • /
    • 2015
  • The purpose of this study is to identify demand of fusion education in the field of architecture and urban, according to architecture and urban market changing, product changing, increasing fusion education demand. We conducted online surveys targeting construction and non construction field practitioners so that we want to identify consumer's needs about fusion education in the field of architecture and urban. Research findings can be summarized in three parts. First, practitioners need to fuse business-related majors (Frequency changing ratio : financing(716.7%), management(633.3%), planning(454.5%) etc.) and traditional majors. Second, the survey results show that 79 percent of those questioned were in favor of switching the cyber and off-line operation methods for fusion education. They require the complementary education system between off-line and cyber education based on education accessability. Third, the survey results show that 70.9 percent of those questioned were in favor of limited freestyle(Freedom of choices without required subjects). The curriculum should be arranged according to the flow of construction business process including fusion subjects.

Effective Defense Mechanism Against New Vulnerability Attacks (신규 취약점 공격에 대한 효율적인 방어 메커니즘)

  • Kwak, Young-Ok;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.499-506
    • /
    • 2021
  • Hackers' cyber attack techniques are becoming more sophisticated and diversified, with a form of attack that has never been seen before. In terms of information security vulnerability standard code (CVE), about 90,000 new codes were registered from 2015 to 2020. This indicates that security threats are increasing rapidly. When new security vulnerabilities occur, damage should be minimized by preparing countermeasures for them, but in many cases, companies are insufficient to cover the security management level and response system with a limited security IT budget. The reason is that it takes about a month for analysts to discover vulnerabilities through manual analysis, prepare countermeasures through security equipment, and patch security vulnerabilities. In the case of the public sector, the National Cyber Safety Center distributes and manages security operation policies in a batch. However, it is not easy to accept the security policy according to the characteristics of the manufacturer, and it takes about 3 weeks or more to verify the traffic for each section. In addition, when abnormal traffic inflow occurs, countermeasures such as detection and detection of infringement attacks through vulnerability analysis must be prepared, but there are limitations in response due to the absence of specialized security experts. In this paper, we proposed a method of using the security policy information sharing site "snort.org" to prepare effective countermeasures against new security vulnerability attacks.