• 제목/요약/키워드: Cybersecurity data

검색결과 114건 처리시간 0.026초

효과적인 데이터 공유를 위한 계층적 구조를 갖는 사이버 보안 데이터 공유시스템 모델 연구 (A Study on Cybersecurity Data Sharing System Model with a Hierarchical Structure for Effective Data Sharing)

  • 유호제;김찬희;조예림;임성식;오수현
    • 융합보안논문지
    • /
    • 제22권1호
    • /
    • pp.39-54
    • /
    • 2022
  • 최근 지능화‧고도화되는 사이버 위협에 효과적으로 대응하기 위해 다양한 사이버 보안 데이터의 수집, 분석, 실시간 공유의 중요성이 대두되고 있다. 이러한 상황에 대응하기 위해 국내에서는 사이버 보안 데이터 공유시스템의 확대를 위해 노력하고 있지만, 많은 민간 기업들은 사이버 보안 데이터를 수집하기 위한 예산과 전문 인력의 부족으로 인해 사이버 보안 데이터 공유시스템에 참여가 어려운 상황이다. 이러한 문제를 해결하기 위해 본 논문에서는 현존하는 국‧내외 사이버 보안 데이터 공유시스템의 연구‧개발 동향을 분석하고 이를 기반으로 조직 규모를 고려하여 계층적 구조를 갖는 사이버 보안 데이터 공유시스템 모델과 해당 모델에 적용할 수 있는 단계별 보안정책을 제안한다. 본 논문에서 제안하는 모델을 적용할 때 다양한 민간 기업들이 사이버 보안 데이터 공유시스템에 참여하는 것을 확대할 수 있으며, 지능화되고 있는 보안 위협에 신속하게 대처할 수 있는 대응체계 마련에 활용할 수 있을 것으로 기대한다.

사이버 보안 분야 주요 기업의 시장 성과와 ICT 공급망 관련 정책 동향 (Market Performance of Major Companies in Cybersecurity and Policy Trends in Information and Communication Technology Supply Chain)

  • 안춘모;유영상
    • 전자통신동향분석
    • /
    • 제39권3호
    • /
    • pp.48-57
    • /
    • 2024
  • Cyberthreats and crimes have become common in society and demand the adoption of robust security measures. Financial cybercrimes, personal information breaches, and spam messages are now prevalent, while companies and nations face an increasing number of cyberthreats and attacks such as distributed denial of service, ransomware, and malware. As the overall socioeconomic landscape undergoes digitalization powered by big data, cloud computing, and artificial intelligence technologies, the importance of cybersecurity is expected to steadily increase. Developed nations are actively implementing various policies to strengthen cybersecurity and providing government support for research and development activities to bolster their domestic cybersecurity industries. In particular, the South Korean government has designated cybersecurity as one of the 12 nationwide strategic technology sectors. We examine the current landscape of cybersecurity companies and the information and communication technology supply chain, providing insights into the domestic cybersecurity market and suggesting implications for South Korea.

A Systems Engineering Approach to Implementing Hardware Cybersecurity Controls for Non-Safety Data Network

  • Ibrahim, Ahmad Salah;Jung, Jaecheon
    • 시스템엔지니어링학술지
    • /
    • 제12권2호
    • /
    • pp.101-114
    • /
    • 2016
  • A model-based systems engineering (MBSE) approach to implementing hardware-based network cybersecurity controls for APR1400 non-safety data network is presented in this work. The proposed design was developed by implementing packet filtering and deep packet inspection functions to control the unauthorized traffic and malicious contents. Denial-of-Service (DoS) attack was considered as a potential cybersecurity issue that may threaten the data availability and integrity of DCS gateway servers. Logical design architecture was developed to simulate the behavior of functions flow. HDL-based physical architecture was modelled and simulated using Xilinx ISE software to verify the design functionality. For effective modelling process, enhanced function flow block diagrams (EFFBDs) and schematic design based on FPGA technology were together developed and simulated to verify the performance and functional requirements of network security controls. Both logical and physical design architectures verified that hardware-based cybersecurity controls are capable to maintain the data availability and integrity. Further works focus on implementing the schematic design to an FPGA platform to accomplish the design verification and validation processes.

Significance and Research Challenges of Defensive and Offensive Cybersecurity in Smart Grid

  • Hana, Mujlid
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.29-36
    • /
    • 2022
  • Smart grid (SG) software platforms and communication networks that run and manage the entire grid are increasingly concerned about cyber security. Characteristics of the smart grid networks, including heterogeneity, time restrictions, bandwidth, scalability, and other factors make it difficult to secure. The age-old strategy of "building bigger walls" is no longer sufficient given the rise in the quantity and size of cyberattacks as well as the sophisticated methods threat actor uses to hide their actions. Cyber security experts utilize technologies and procedures to defend IT systems and data from intruders. The primary objective of every organization's cybersecurity team is to safeguard data and information technology (IT) infrastructure. Consequently, further research is required to create guidelines and methods that are compatible with smart grid security. In this study, we have discussed objectives of of smart grid security, challenges of smart grid security, defensive cybersecurity techniques, offensive cybersecurity techniques and open research challenges of cybersecurity.

산업 IoT 전용 분산 연합 학습 기반 침입 탐지 시스템 (Distributed Federated Learning-based Intrusion Detection System for Industrial IoT Networks)

  • ;최필주;이석환;권기룡
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 추계학술발표대회
    • /
    • pp.151-153
    • /
    • 2023
  • Federated learning (FL)-based network intrusion detection techniques have enormous potential for securing the Industrial Internet of Things (IIoT) cybersecurity. The openness and connection of systems in smart industrial facilities can be targeted and manipulated by malicious actors, which emphasizes the significance of cybersecurity. The conventional centralized technique's drawbacks, including excessive latency, a congested network, and privacy leaks, are all addressed by the FL method. In addition, the rich data enables the training of models while combining private data from numerous participants. This research aims to create an FL-based architecture to improve cybersecurity and intrusion detection in IoT networks. In order to assess the effectiveness of the suggested approach, we have utilized well-known cybersecurity datasets along with centralized and federated machine learning models.

사이버보안 교육과정 특성에 따른 교육 프로그램 설계의 필요성에 대한 연구 (A Study on the Cybersecurity Workforce Training Program Development by Level of a Characteristic of Training Program)

  • 박기태;전효정;김태성;김인중
    • Journal of Information Technology Applications and Management
    • /
    • 제23권4호
    • /
    • pp.127-138
    • /
    • 2016
  • The Korean government has implemented various policies such as establishing new major/department and operating a variety of education programs related with cybersecurity. However, it has not yet been constructed virtuous cycle that can provide appropriate education and training to professionals with the high level and quality. In this study, by surveying and analyzing satisfaction about education and training program aimed at employees in public sector who are in charge of cybersecurity, we suggest the direction of education and training for cybersecurity experts required at the national level.

국가 사이버안보를 위한 정책 연구 (Study on Policies for National Cybersecurity)

  • 함승현;박대우
    • 한국정보통신학회논문지
    • /
    • 제21권9호
    • /
    • pp.1666-1673
    • /
    • 2017
  • 대한민국은 남한과 북한으로 분단되어, 군사적 대립과 사회적 갈등을 발생시키고 있다. 북한은 남한에 대해 사이버공격을 수행하고 있으며, 남한의 국방망을 해킹하였다. 사이버공간에서 세계 각국은 국경도 한계도 모호해지고 있으며, 사이버전쟁을 위한 사이버공격과 사이버테러는 점과 시간과 공간으로 연결된 디지털 컴퓨팅으로 작동된다. 국가 사이버안보를 위해서는 아젠다와 매뉴얼이 필요하다. 또한 국가 사이버안보 정책을 만들고, 수행 할 수 있는 국가 사이버안보 법률과 정책에 대한 연구가 필요하다. 본 논문은 현재 남북한 대치 상황의 사이버테러 상황과 세계의 사이버전쟁에 대한 피해를 연구한다. 또한 국내 외의 사이버안보 활동과 사이버전쟁 대응 아젠다와 매뉴얼과 신기술을 연구한다. 그리고 국가사이버안보 정책을 제시하여 '(가칭)국가사이버안보법'이 마련되도록 정책을 제안한다. 본 연구는 국가 사이버안보법과 정책의 기초자료로 활용될 것이다.

STRIDE-based threat modeling and DREAD evaluation for the distributed control system in the oil refinery

  • Kyoung Ho Kim;Kyounggon Kim;Huy Kang Kim
    • ETRI Journal
    • /
    • 제44권6호
    • /
    • pp.991-1003
    • /
    • 2022
  • Industrial control systems (ICSs) used to be operated in closed networks, that is, separated physically from the Internet and corporate networks, and independent protocols were used for each manufacturer. Thus, their operation was relatively safe from cyberattacks. However, with advances in recent technologies, such as big data and internet of things, companies have been trying to use data generated from the ICS environment to improve production yield and minimize process downtime. Thus, ICSs are being connected to the internet or corporate networks. These changes have increased the frequency of attacks on ICSs. Despite this increased cybersecurity risk, research on ICS security remains insufficient. In this paper, we analyze threats in detail using STRIDE threat analysis modeling and DREAD evaluation for distributed control systems, a type of ICSs, based on our work experience as cybersecurity specialists at a refinery. Furthermore, we verify the validity of threats identified using STRIDE through case studies of major ICS cybersecurity incidents: Stuxnet, BlackEnergy 3, and Triton. Finally, we present countermeasures and strategies to improve risk assessment of identified threats.

An AI-Based Prevention Program to Protect Youth from Cybergrooming

  • 김기정;리푸 후앙;조진희
    • 인터넷정보학회논문지
    • /
    • 제24권5호
    • /
    • pp.67-73
    • /
    • 2023
  • The Digital Age calls for improvement of information literacy particularly among children and youth who are vulnerable to cybergrooming. Taking an interdisciplinary approach by leveraging our team's expertise including child and adolescent development, data analytics, and cybersecurity, this study proposes an interactive artificial intelligence (AI)-based preventive simulation program that raises youth knowledge and awareness about the risk of cybergrooming as well as increases resilient self-efficacy in their cybersecurity-relevant skills. The primary purpose of this project is to evaluate the effectiveness of the simulation program on preventing cybergrooming. More specifically, this study is designed to examine developmental changes in self-efficacy of cybersecurity-relevant skills among youth participants as a function of the preventive simulation program. Further, this study will identify risk and protective factors that explain interindividual differences in the ability of children and youth either to fall victim to advances from a cyber predator or to recognize and deter such threats. The preliminary data will help improve the effectiveness of the preventive simulation program as well as the methods of implementation to large groups of youth. The findings from the proposed study will contribute to making specific recommendations to parents, educators, practitioners, and policy makers for the prevention of cybergrooming.

국가 사이버보안 수준 향상을 위한 GCI의 지표개선 방안 (Proposals for GCI Indicators to Improve a National Cybersecurity Level)

  • 김대경;이주현;김예영;현다은;오흥룡;진병문;염흥열
    • 정보보호학회논문지
    • /
    • 제32권2호
    • /
    • pp.289-307
    • /
    • 2022
  • 국제전기통신연합(International Telecommunication Union, ITU)에서 개발한 글로벌사이버보안지수(Global Cybersecurity Index, GCI)는 국가의 사이버보안발전 수준을 진단하고, 사이버보안 역량을 강화하기 위해 활용되고 있다. 본 논문은 GCI를 분석하고, 그 효과성을 강화하기 위한 방안을 제시하고자 한다. 또한, GCI 버전1~GCI 버전4 평가지표를 사전 분석하고, SWOT 분석을 통해 발전 방안을 살펴본다. 이를 통해, GCI 개선 및 활용을 위한 기본원칙을 수립하고, GCI 버전5 설문지 관련 신규 지표를 발굴하고 제안하고자 한다. 본 논문은 GCI의 성과 분석 및 개선 방안을 위한 기초 자료로 활용 가능할 것으로 기대된다. 또한, 향후 GCI 평가에서 적용 될 보다 발전된 사전대응 지표와 사후대응 지표를 제안하여 GCI의 효과성을 높이고 국가의 사이버보안 역량을 높이는데 기여하고자 한다. 본 논문은 [1]의 연구 결과를 개선 발전시킨 것이다.