• Title/Summary/Keyword: Cyber asset

Search Result 54, Processing Time 0.029 seconds

ADAM: An Approach of Digital Asset Management system (사후 디지털 자산 관리 시스템에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Hwang-Rae;Kim, Jin-Mook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1977-1982
    • /
    • 2012
  • Social network service user or smart phone user is very convenient, because there are supported to various social network services such as Facebook, Twitter, Flickr, Naver blog, Daum blog, and so on. This Is very good because they store multimedia datas that user wants to cyber space if they want it conveniently. But, if social network user increases, space of cloud storage increases sharply, and when social network service used user dies then they have big problems such as they did not know in existing. Typically, problems of notice, dissemination, storage, and inheritance for digital asset can happen representatively. Now, If successor send relation information of he and his dead user that is family to social network service provider then service provider checks it. And successor may can use, save and only backup are possible after confirm of family relation truth. Therefore, We wish to propose ADAM that successor may can inherit digital assets easily, conveniently, and safely in this paper. If someone use ADAM, successor submits information about dead and own family relation in the third certification party. And ADAM can be inherited freely and conveniently about digital assets as general assets passing through right inheritance process.

Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry (전력 SCADA 시스템의 사이버 보안 위험 평가를 위한 정량적 방법론에 관한 연구)

  • Kang, Dong-Joo;Lee, Jong-Joo;Lee, Young;Lee, Im-Sop;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.445-457
    • /
    • 2013
  • This paper is about the study to build a quantitative methodology to assess cyber threats and vulnerabilities on control systems. The SCADA system in power industry is one of the most representative and biggest control systems. The SCADA system was originally a local system but it has been extended to wide area as both ICT and power system technologies evolve. Smart Grid is a concept to integrate energy and IT systems, and therefore the existing cyber threats might be infectious to the power system in the integration process. Power system is operated on a real time basis and this could make the power system more vulnerable to the cyber threats. It is a unique characteristic of power systems different from ICT systems. For example, availability is the most critical factor while confidentiality is the one from the CIA triad of IT security. In this context, it is needed to reflect the different characteristics to assess cyber security risks in power systems. Generally, the risk(R) is defined as the multiplication of threat(T), vulnerability(V), and asset(A). This formula is also used for the quantification of the risk, and a conceptual methodology is proposed for the objective in this study.

Access Management Using Knowledge Based Multi Factor Authentication In Information Security

  • Iftikhar, Umar;Asrar, Kashif;Waqas, Maria;Ali, Syed Abbas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.119-124
    • /
    • 2021
  • Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company's information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.

A Study on the Residue Risk Analysis and Insurance Estimation toward Cyber-Intrusion in Information System (정보시스템에서 사이버 침해에 따른 잔여위험분석 및 보험산정 연구)

  • Kim, In-Jung;Chung, Yoon-Jung;Park, Joong-Gil;Won, Dong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1241-1244
    • /
    • 2005
  • 중요 정보시스템에 대한 위험분석 프로세스는 자산 식별을 통해 위협, 취약성을 분석하고 이에 보호대책을 수립한다. 하지만 모든 보호대책을 적용하기에는 비용 대 효과면에서 불가능한 경우가 발생한다. 따라서, 잔여위험에 대한 분석을 통해 해결할 수 없는 위험에 대해서는 보험을 통하여 보호대책을 세워야 한다. 본 논문에서는 위험분석을 통해 계산된 피해 산정으로 사이버침해에 따른 보험 수준을 산정하는 방안을 제안하고자 한다.

  • PDF

Research on Emergency CAS Mission asset scoring for cyber battle damage assesment (사이버 전투 피해평가를 위한 긴급 CAS 임무 자산 스코어링 연구)

  • Kim, Jaekeun;Kim, Seongjung;Kim, Kookjin;Lee, Donghwan;Shin, Dongil;Shin, Dongkyoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.157-160
    • /
    • 2020
  • 사이버 공격은 조직과 국가에 큰 피해를 주려는 목적으로 정보를 가로채고 파괴하는 의도적인 행동으로 빚어지는 경우가 많다. 이에 따라 국제 표준화 기구(ISO)는 ISO/IEC 27000 시리즈 등 정보 자산의 보호를 위한 표준 문서를 지침으로 제공한다. 하지만 지침만 제공할 뿐 자산 보호를 위한 구체적인 방법이나 절차가 포함되어 있지 않다. 본 연구에서는 공군의 긴급 CAS(Close Air Support) 작전을 대상으로 추후 사이버 전투 피해평가를 위해 사이버 공격에 의한 정보 자산에 대한 점수를 가산화 한다. 긴급 CAS 작전 시뮬레이션 진행 후 도출된 요소를 가지고 객관적인 수치라고 할 수 있는 CIA(Confidentiality, Integrity, Availability)지표들과 군 정보를 접목시켜 자산의 중요성을 계산하고 나아가 가중치를 주어 차별성을 가지게 된다.

Exploring housing consumption adjustment of pre-retirees after retirement using ordered probit model in terms of different housing size (순위프로빗모형을 이용한 예비은퇴자의 주택소비 조정 의향 결정요인 분석 - 주택규모의 변화를 중심으로 -)

  • Lee, So-Young;Kim, Ji-Hyun;Choi, Youn-Young
    • Journal of Cadastre & Land InformatiX
    • /
    • v.48 no.1
    • /
    • pp.35-53
    • /
    • 2018
  • Recently, there is a growing interest in housing policy to prepare for the aging society. The purpose of this study is exploring the factors that explain housing consumption and adjustment of pre-retirees after retirement. 1,351 samples were collected from A bank and analyzed. There categories of housing consumption adjustment were considered including downsizing, maintain, and upsizing. Gender, educational level, housing size, housing type, asset size, and willingness to work after retirement were examined to see if they can explain the housing consumption adjustment of pre-retirees using orderd- probit model. The finding of this study is that housing size, asset size, and willingness to work after retirement statistically significantly explain the housing consumption adjustment. At specific, firstly, if the current size of the housing is relatively large, it is highly likely to downsize housing after retirement. Second, pre-retiree whose assets exceeded 1 billion won were more likely to scale up housing than assets of over 300 million to less than 500 million won. Lastly, unless there is absolutely no willingness to work after retirement, it is indicated that it intends to up-sizing consumption rather than down-sizing adjustment. The results of this study can provide useful information for the housing policy in order to prepare for the (post) aged society.

Implementation of user authentication and access control system using x.509 v3 certificate in Home network system (홈 네트워크 시스템에서 x.509 v3 인증서를 이용한 사용자 인증 및 접근제어 시스템의 구현)

  • Lee, Kwang-Hyoung;Lee, Young-Gu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.920-925
    • /
    • 2010
  • A home network system is made up of home devices and wire and wireless network can not only be the subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. As a result, a variety of problems such as abuse of private life, and exposure and stealing of personal information arose. Therefore, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this dissertation designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

Requirments Analysis and AAS Design for Energy Digital Twin (에너지 디지털 트윈을 위한 요구사항 분석 및 AAS 설계)

  • Park, Kishik;Oh, Seongjin;Kang, Changku;Sung, Inmo;Sakar, Aranya
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.109-117
    • /
    • 2020
  • Recently, with the advent of the 4th industrial revolution, digital twins are emerging as an important technology that connects and integrates physical systems and cyber systems. In this article, we analyzed the major requirements of digital twins required for the construction of digital twins of power equipments in the energy field, focusing on the industry 4.0-based Asset Administration Shell(AAS). However, since not so many studies have been conducted yet on a common platform or demonstration model for implementing digital twins both domestically and internationally, digital twin requirements are analyzed with the consideration of digital twinning of power equipment in the energy field. Also, we suggested necessary procedures and specific functions of AAS to establish a smart energy digital twin in the future by analyzing the core requirements necessary for the construction and designing the AAS design for specific power equipment.

Small Business Technological Assets Protection Factors Analysis Using Logistic Regression Analysis (로지스틱 회귀분석을 이용한 중소기업 기술보호 요인 분석)

  • Hong, Jun Suk;Park, Won Hyung;Kim, Yanghoon;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.1-10
    • /
    • 2015
  • The main objective of this study was to identify the factors that can maximize the effect of preventing technology leakage by government support. Therefore we used the 2013 small business technology protection capabilities and level of research which is conducted by the Small and Medium Business Administration, and have analyzed the presence of small business technological assets leakage protection eand skills. Multiple logistic regression analysis was performed to identify 1,518 small companies (43 big companies are excluded) which are divided into 155 technological assets leaked small business and non-leaked 1363 small business. The most important factors associated with technology leakage were entrant control system, security audit, employee absence of security activities and important data protection measures. This result shows that if the government can support more for these details, technological asset leakage prevention effect is expected to be maximized.

Analysis of trends in information security using LDA topic modeling

  • Se Young Yuk;Hyun-Jong Cha;Ah Reum Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.99-107
    • /
    • 2024
  • In an environment where computer-related technologies are rapidly changing, cyber threats continue to emerge as they are advanced and diversified along with new technologies. Therefore, in this study, we would like to collect security-related news articles, conduct LDA topic modeling, and examine trends. To that end, news articles from January 2020 to August 2023 were collected and major topics were derived through LDA analysis. After that, the flow by topic was grasped and the main origin was analyzed. The analysis results show that ransomware attacks in 2021 and hacking of virtual asset exchanges in 2023 are major issues in the recent security sector. This allows you to check trends in security issues and see what research should be focused on in the future. It is also expected to be able to recognize the latest threats and support appropriate response strategies, contributing to the development of effective security measures.