• 제목/요약/키워드: Cyber Security Technology

검색결과 551건 처리시간 0.023초

Analysis on Cyber Security and Its Challenges to Society

  • Shashank Mishra;Raghav Sandhane
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.141-152
    • /
    • 2024
  • Cyber security plays an important role in the field of IT industry and other industry too. Whenever we talk about cyber security, the word cybercrime pops out. Cybercrime is the biggest issues we are facing right now. Every 39 seconds an attacker is hacking something. Since 2008 to 2019 there are more than 8800 data breach cases is being found or filed. Even as we are aware of cybercrime and its stats, only 5% organization are fully secured and other 95% are not fully secured. According to survey 56% organization have weak controls. Basically they are not secured. Apart from taking measures cyber security are facing huge challenges or disturbs to many. This paper mainly focuses on dare to cyber security and also center of attraction is cyber security expertise, morals with changing in technology with time. [1]

프레임워크 기반 스마트시티 사이버 보안 메트릭스 (Framework Based Smart City Cyber Security Matrix)

  • 김성민;정혜선;이용우
    • 한국산업융합학회 논문집
    • /
    • 제23권2_2호
    • /
    • pp.333-341
    • /
    • 2020
  • In this paper, we introduce a smart city-cyber-security-grid-matrix methodology, as a result of research on overall cyber security of smart cities. The identified cyber security risks that threaten smart cities and smart-city-cyber-security-threat list are presented. The smart-city-cyber-security-requirements necessary to secure the smart city cyber security with the developed smart city-cyber-security-grid-matrix are given in this paper. We show how the developed smart city-cyber-security-grid-matrix methodology can be applied to real world. For it, we interlocked the developed smart city-cyber-security-grid-matrix methodology with the cyber-security-framework of the National Institute of Standards and Technology, and developed a framework-based smart city-cyber-security-grid-matrix. Using it, it is easy and comfortable to check the level of cyber security of the target smart ciy at a glace, and the construction and operation of the smart city security system is systematized.

침해 경험 및 정보보호 인식이 정보보호 행동에 미치는 영향에 대한 연구 : 이중 프로세스 이론을 중심으로 (A Study on the Influence of Victimization Experience and Awareness on Cyber Security Behavior - Focusing on Dual Process Theory)

  • 김창일;허덕원;이혜민;성욱준
    • 정보화정책
    • /
    • 제26권2호
    • /
    • pp.62-80
    • /
    • 2019
  • 본 연구의 목적은 정보침해 경험이 정보보호 활동에 직관적으로 미치는 영향과 정보보호 인식을 통해 분석적으로 미치는 영향을 이중 프로세스 이론(Dual Process Theory)을 통해 분석하는데 있다. 이를 위해 Baron & Kenny 매개 회귀분석을 사용하였으며 그 분석결과는 다음과 같다. 첫째, 정보침해 경험은 정보보호 활동에 긍정적인 영향을 미치는 것으로 분석되었다. 둘째, 정보보호 인식은 정보침해 경험과 정보보호 활동 간의 관계를 매개하는 것으로 분석되었다. 셋째, 정보침해 경험이 정보보호 활동에 직접적으로 주는 영향과 인식을 매개하여 주는 간접적 영향의 효과는 모두 정(+)의 효과를 주는 것으로 분석되었다. 또한 정보침해 경험이 정보보호 활동에 주는 직접적 영향은 인식을 매개하여 정보보호 활동에 주는 간접적 영향에 비해 상대적으로 큰 것으로 분석되었다. 해당 분석결과를 바탕으로 정보보안 활동이 제고 될 수 있도록 하는 주기적 정보보안 교육 및 캠페인 정책이 필요함을 제언하였다.

A study on classification of the security controls for the effective implementation to nuclear power plant

  • Han, Sang Min;Lee, Chanyoung;Chae, Young Ho;Seong, Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • 제54권4호
    • /
    • pp.1245-1252
    • /
    • 2022
  • As regulatory bodies require full implementation of security controls in nuclear power plants (NPPs), security functions for critical digital assets are currently being developed. For the ultimate introduction of security controls, not alternative measures, it is important to understand the relationship between possible cyber threats to NPPs and security controls to prevent them. To address the effectiveness of the security control implementation, this study investigated the types of cyber threats that can be prevented when the security controls are implemented through the mapping of the reorganized security controls in RS-015 to cyber threats on NPPs. Through this work, the cyber threat that each security control can prevent was confirmed, and the effectiveness of several strategies for implementing the security controls were compared. This study will be a useful reference for utilities or researchers who cannot use design basis threat (DBT) directly and be helpful when introducing security controls to NPPs that do not have actual security functions.

지능형 사이버 훈련장의 기술 동향 (Technological Trends in Intelligent Cyber Range)

  • 유재학;구기종;김익균;문대성
    • 전자통신동향분석
    • /
    • 제37권4호
    • /
    • pp.36-45
    • /
    • 2022
  • As the interest in achieving an intelligent society grows with the fourth industrial revolution's development, information and communications technologies technologies like artificial intelligence (AI), Internet of Things, virtual reality, information security, and blockchain technology are being actively employed in different fields for achieving an intelligent society. With these modifications, the information security paradigm in industrial and public institutions, like personal sensitive data, is quickly changing, and it is exposed to different cyber threats and breaches. Furthermore, as the number of cyber threats and breaches grows, so does the need for rapid detection and response. This demand can be satisfied by establishing cyber training programs and fostering experts that can improve cyber security abilities. In this study, we explored the domestic and international technology trends in cyber security education and training facilities for developing experts in information security. Additionally, the AI technology application in the cyber training ground, which can be established to respond to and deter cyber threats that are becoming more intelligent, was examined.

Cyber attack taxonomy for digital environment in nuclear power plants

  • Kim, Seungmin;Heo, Gyunyoung;Zio, Enrico;Shin, Jinsoo;Song, Jae-gu
    • Nuclear Engineering and Technology
    • /
    • 제52권5호
    • /
    • pp.995-1001
    • /
    • 2020
  • With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead to an accident involving the release of radioactive materials cyber-attacks. However, cyber security research on industrial control systems (ICSs) and supervisory control and data acquisition (SCADA) systems is relatively inadequate compared to information technology (IT) and further it is difficult to study cyber-attack taxonomy for NPPs considering the characteristics of ICSs. The advanced research of cyber-attack taxonomy does not reflect the architectural and inherent characteristics of NPPs and lacks a systematic countermeasure strategy. Therefore, it is necessary to more systematically check the consistency of operators and regulators related to cyber security, as in regulatory guide 5.71 (RG.5.71) and regulatory standard 015 (RS.015). For this reason, this paper attempts to suggest a template for cyber-attack taxonomy based on the characteristics of NPPs and exemplifies a specific cyber-attack case in the template. In addition, this paper proposes a systematic countermeasure strategy by matching the countermeasure with critical digital assets (CDAs). The cyber-attack cases investigated using the proposed cyber-attack taxonomy can be used as data for evaluation and validation of cyber security conformance for digital devices to be applied, and as effective prevention and mitigation for cyber-attacks of NPPs.

코로나19 관련 사이버 공격 및 대응현황 분석 (An Analysis of Cyber Attacks and Response Cases Related to COVID-19)

  • 이용필;이동근
    • 한국IT서비스학회지
    • /
    • 제20권5호
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

원전 디지털 계측제어시스템 사이버보안 기술 체계 수립 방법 연구 (A Study on Method to Establish Cyber Security Technical System in NPP Digital I&C)

  • 정만현;안우근;민병길;서정택
    • 정보보호학회논문지
    • /
    • 제24권3호
    • /
    • pp.561-570
    • /
    • 2014
  • 원자력 발전소(이하 원전)의 계측제어시스템은 원자력 발전소를 안전하게 운전하기 위한 설비로 아날로그 기술에서 디지털기술로 변하고 있다. 그리고 2010년 이란의 부셰르 원자력 발전소의 원심분리기의 가동을 중단시킨 스턱스넷 공격으로 인해 원전의 사이버공격의 가능성이 많이 증가하고 있다. 하지만 국내외 원전 디지털 계측제어시스템의 사이버 보안 강화를 위해 발간된 규제지침들은 보안요구사항들과 정책 및 절차 수립 방법들에 대하여 기술하고 있으며, 실제 적용 가능한 사이버보안 기술을 개발하기 위한 지침으로는 사용하기에 적합하지 않다. 이러한 이유로 원전 디지털 계측제어시스템의 보안을 강화 할 수 있는 원전에 특화된 사이버보안 기술 개발이 필요하다. 이에 본 논문은 원전에 특화된 사이버보안 기술 개발을 위한 기술 개발 체계를 제안하고, 이를 KINCS 사업에서 개발된 공학적안전설비-기기계통에 적용하였다.

사이버보안 전문가 양성을 위한 연구 (The Research for Cyber Security Experts)

  • 김슬기;박대우
    • 한국정보통신학회논문지
    • /
    • 제21권6호
    • /
    • pp.1137-1142
    • /
    • 2017
  • 사이버 해킹공격과 사이버테러는 국민 생활에 피해를 주고, 결국엔 국가 안보가 위협을 당하고 있다. 사이버 해킹공격으로 원자력 냉각시스템 설계도면이 유출되었으며, 청와대 홈페이지의 해킹, KBS 방송국 해킹 등 사이버사고가 발생하였다. 정보통신기반보호법, 정보통신망이용촉진 및 정보보호 등에 관한 법률, 개인정보보호법이 사이버공격의 책임을 지우고 있으나, 새로운 기술로 무장한 해커의 공격을 막기는 어렵다. 본 논문은 사이버안보를 위한 사이버보안 전문가 양성을 연구한다. 사이버보안 전문가를 위한 지식 데이터베이스를 구축한다. 웹 해킹, 시스템 해킹, 네트워크 해킹의 기술과 평가를 통해 사이버보안 전문가 자격증 제도를 도입한다. 사이버보안 전문가 자격증 운영과 취득방안에 관한 연구를 통해, 국가 사이버안보를 위한 사이버보안 전문가를 육성하는데 도움이 되고자한다.

선박 사이버보안 책임자를 위한 교육과정 개발에 관한 연구 (A Study on the Development of a Training Course for Ship Cyber Security Officers)

  • 이은수;안영중;박성호
    • 해양환경안전학회지
    • /
    • 제26권7호
    • /
    • pp.830-837
    • /
    • 2020
  • 정보통신기술의 발전에 따라 선박과 육상 간의 정보교환은 더욱 빠르고 편리해졌으나 선박정보에 대한 접근이 용이해져 사이버보안 공격에 대한 우려도 커지고 있다. 선박이 사이버 공격의 피해를 입게 되면 복구하는데 막대한 비용과 시간 손해가 발생하며, 해사 산업계는 선박 사이버보안 책임자를 지정하여 보안관리 업무를 담당할 것을 요구하고 있다. 공격의 피해를 줄이고 효과적인 대응을 위하여 선박 사이버보안 책임자를 위한 전문적 교육과정이 필요하다. 이 연구의 목적은 선박 사이버보안 책임자 교육과정과 법제정비 필요성 제시에 있으며, 이를 위해 국내외 동향 및 사고사례, 주요 사이버보안 교육과정을 조사하였다. 조사결과를 바탕으로 선박 사이버보안 책임자에게 필요한 표준교육과정을 개발하였고 관련 법제정비의 방향성을 제시하였다. 연구의 결과는 향후 선박 사이버보안 책임자 교육과정을 개설하는데 기초자료로 활용될 수 있다.