• Title/Summary/Keyword: Cyber Operation

Search Result 256, Processing Time 0.026 seconds

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.

Perception of Science High School Teachers on Cyber Education (사이버 교육에 대한 과학고 교사의 인식 조사)

  • Lee, Jaeho;Chun, Miran;Jin, Sukun
    • Journal of Gifted/Talented Education
    • /
    • v.26 no.4
    • /
    • pp.635-652
    • /
    • 2016
  • This study investigated operation plan for the Cyber Bridge Program based on the survey from teachers of science high schools. Teachers were found to be thinking it positive that cyber programs can be operated free from the time and spatial restrictions. They thought that teacher interactions are hard to occur and teachers' role in learning is limited as well. Also, the geographical, physical, and socio cultural minorities might have benefits from cyber programs either as regular programs or the before entrance programs. Therefore, the detailed plans are needed. Most of all, since the educational contents are the key for the programs, we suggested some contents categories and developmental criteria. As a result, the developments of high quality contents and financial supports for the successful Cyber Bridge Program are essential.

Security Technology for SCADA Communication Data (SCADA 통신 데이터 보호 기술)

  • Kim, Hak-Man
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2008.10a
    • /
    • pp.217-219
    • /
    • 2008
  • SCADA(Supervisory Control and Data Acquisition) is popular control and monitor areas not only in critical infrastructures such as electric power, gas, oil but also industrial applications. Increasement of cyber attack technique and frequency threats secure operation of SCADA systems. Recently many researches have been studied for protecting SCADA system against cyber attacks. This paper introduces overall security technologies in SCADA systems.

  • PDF

Development of Hardware In the Loop System for Cyber Security Training in Nuclear Power Plants (원자력발전소 사이버보안 훈련을 위한 HIL(Hardware In the Loop) System 개발)

  • Song, Jae-gu;Lee, Jung-woon;Lee, Cheol-kwon;Lee, Chan-young;Shin, Jin-soo;Hwang, In-koo;Choi, Jong-gyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.867-875
    • /
    • 2019
  • Security awareness and training are becoming more important as cyber security incidents tend to increase in industrial control systems, including nuclear power plants. For effective cyber security awareness and training for the personnel who manage and operate the target facility, a TEST-BED is required that can analyze the impact of cyber attacks from the sensor level to the operation status of the nuclear power plant. In this paper, we have developed an HIL system for nuclear power plant cyber security training. It includes nuclear power plant status simulations and specific system status simulation together with physical devices. This research result will be used for the specialized cyber security training program for Korean nuclear facilities.

Proposal of a framework for evaluating the operational impact of cyber attacks on aviation weapons systems(EOICA) (항공무기체계 사이버공격에 대한 작전영향성평가 프레임워크 제안)

  • Hong, Byoung-jin;Kim, Wan-ju;Lee, Soo-jin;Lim, Jae-sung
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.35-45
    • /
    • 2020
  • Cyber attacks on the aviation weapon system, a state-of-the-art asset, have become a reality and are approaching as a constant threat. However, due to the characteristics of embedded software of the current aviation weapon system, it is managed and operated without connection to the network in peacetime, so the response management to cyber attacks is relatively weak. Therefore, when a cyber attack becomes a reality, it is urgent to prepare and evaluate measures for the adverse effects that such attack will have on the execution of the Air Tasking Order(ATO). In this paper, we propose a framework for operational impact assessment in order to avoid confusion in ATO execution and systematic response to cyber attacks on aviation weapons systems. The proposed framework is designed to minimize the negative impact on operations against cyber attacks that may occur under no warning by analyzing the impact on air operations for each aviation weapon system and standardizing countermeasures for this. In addition, it supports the operational commander to make a quick decision to command for the execution of the operation even in a situation where a cyber attack occurs.

A study on the Application of Effects-based Operation in Cyberspace (사이버공간에서의 효과중심작전 적용방안 연구)

  • Jang, Won-gu;Lee, Kyun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.221-230
    • /
    • 2020
  • The effects-based operation, which would reduce unnecessary efforts and meaningless sacrifices incurred during a war and simultaneously reach the will of the enemy leadership by strategic attacks, was discarded for the reason that it was difficult to apply it to military power except for airpower. However, cyberspace, which can be thoroughly logical and calculated, can be suitable for conducting effects-based operations. This study examined a way to carry out effects-based operations in such cyberspaces. It laid the foundation for overcoming the limitations of effects-based operations revealed in previous battle cases and executing the operations in cyber battlespace where the boundary between physical and cyberspaces gradually disappeared. Futhermore, it demonstrated that effects-based operations could be carried out in cyberspace by establishing a military strategy, which could conduct the operations through an analysis of previous cyber-attack cases.

Efficient Operation Model for Effective APT Defense (효율적인 APT 대응 시스템 운영 모델)

  • Han, Eun-hye;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.501-519
    • /
    • 2017
  • With the revolution of IT technology, cyber threats and crimes are also increasing. In the recent years, many large-scale APT attack executed domestically and internationally. Specially, many of the APT incidents were not recognized by internal organizations, were noticed by external entities. With fourth industrial revolution(4IR), advancement of IT technology produce large scale of sensitive data more than ever before; thus, organizations invest a mount of budget for various methods such as encrypting data, access control and even SIEM for analyzing any little sign of risks. However, enhanced intelligent APT it's getting hard to aware or detect. These APT threats are too much burden for SMB, Enterprise and Government Agencies to respond effectively and efficiently. This paper will research what's the limitation and weakness of current defense countermeasure base on Cyber Kill Chain process and will suggest effective and efficient APT defense operation model with considering of organization structure and human resources for operation.

A Study on Vulnerability of Cyber Electronic Warfare and Analysis of Countermeasures for swarm flight of the NBC Reconnaissance Drones (화생방 정찰 드론의 군집비행 시 사이버전자전 취약점 및 대응방안 분석)

  • Kim, Jee-won;Park, Sang-jun;Lee, Kwang-ho;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.133-139
    • /
    • 2018
  • The 5 Game changer means the concepts of the army's operation against the enemy's asymmetric threats so that minimize damage to the public and leads to victory in war in the shortest time. A study of network architecture of Dronebot operation is a key study to carry out integrated operation with integrated C4I system by organically linking several drones battle groups through ICT. The NBC reconnaissance drones can be used instead of vehicles and humans to detect NBC materials and share situations quickly. However, there is still a lack of research on the swarm flight of the NBC reconnaissance drones and the weaknesses of cyber electronic warfare. In this study, we present weaknesses and countermeasures of CBRNs in swarm flight operations and provide a basis for future research.

  • PDF

The Effects of Academic Self-Efficacy, Self-Regulated Learning and Online Task Value on Academic Achievement and Learning Transfer in Corporate Cyber Education (기업 사이버교육생의 학업적 자기효능감, 자기조절학습능력, 온라인과제가치가 학업성취도와 학습전이에 미치는 영향)

  • Joo, Young Ju;Kim, So Na;Kim, Eun Kyung;Park, Su Yeong
    • Knowledge Management Research
    • /
    • v.9 no.4
    • /
    • pp.1-16
    • /
    • 2008
  • The purpose of the present study is to explain the effects of academic self-efficacy, self-regulated learning and online task value on academic achievement and learning transfer in corporate cyber education. 202 students who completed S corporate's cyber courses in 2007 and responded to all survey participated in this study. A hypothetical model was proposed, which was composed of academic self-efficacy, online task value and self-regulated learning factors as prediction variables, and learning transfer as well as academic achievement factors as outcome variables. The results of this study through regression analysis as follows. First, learners' academic self-efficacy, self-regulated learning and online task value predict learners' academic achievement significantly. Second, except for academic self-efficacy, learners' self-regulated learning and online task value predict on learners' learning transfer significantly. Third, academic achievement plays a role as mediating value in predicting academic achievement by online task. It implies that learners' academic self-efficacy, online task value and self-regulated learning which predict learners' academic achievement and learning transfer should be considered in developing strategies for the design and operation of cyber courses.

  • PDF

ICS Security Risk Analysis Using Attack Tree (공격 트리를 이용한 산업 제어 시스템 보안 위험 분석)

  • Kim, Kyung-Ah;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.53-58
    • /
    • 2011
  • There is increasing use of common commercial operation system and standard PCs to control industrial production systems, and cyber security threat for industrial facilities have emerged as a serious problem. Now these network connected ICS(Industrial Control Systems) stand vulnerable to the same threats that the enterprise information systems have faced and they are exposed to malicious attacks. In particular Stuxnet is a computer worm targeting a specific industrial control system, such as a gas pipeline or power plant and in theory, being able to cause physical damage. In this paper we present an overview of the general configuration and cyber security threats of a SCADA and investigate the attack tree analysis to identify and assess security vulnerabilities in SCADA for the purpose of response to cyber attacks in advance.