• Title/Summary/Keyword: Data Breach

Search Result 73, Processing Time 0.027 seconds

Analysis of Cyber Incident Artifact Data Enrichment Mechanism for SIEM (SIEM 기반 사이버 침해사고 대응을 위한 데이터 보완 메커니즘 비교 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • As various services are linked to IoT(Internet of Things) and portable communication terminals, cyber attacks that exploit security vulnerabilities of the devices are rapidly increasing. In particular, cyber attacks targeting heterogeneous devices in large-scale network environments through advanced persistent threat (APT) attacks are on the rise. Therefore, in order to improve the effectiveness of the response system in the event of a breach, it is necessary to apply a data enrichment mechanism for the collected artifact data to improve threat analysis and detection performance. Therefore, in this study, by analyzing the data supplementation common elements performed in the existing incident management framework for the artifacts collected for the analysis of intrusion accidents, characteristic elements applicable to the actual system were derived, and based on this, an improved accident analysis framework The prototype structure was presented and the suitability of the derived data supplementary extension elements was verified. Through this, it is expected to improve the detection performance when analyzing cyber incidents targeting artifacts collected from heterogeneous devices.

An Exploratory Study on the impact of EU Adequacy Decision on GDPR compliant companies (EU 적정성 결정이 GDPR 대상기업에 미치는 영향에 관한 탐색적 연구)

  • Kim, YoungSoo;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.4
    • /
    • pp.32-41
    • /
    • 2021
  • The EU enacted a law strongly regulating the GDPR to protect the privacy of its citizens on 25 May 2018. Compliance with GDPR is an essential prerequisite for companies to enter the European market in the global economic era. In this paper, Step-by-step measures have been defined to conclude DPA agreements for the appropriate level of protection against EU personal data transfer. To explore the benefits and expected effects of determining appropriateness at the government level. As a result, enterprises benefit from simplifying processes, reducing time, and reducing costs when entering the EU. Government-level support in response to personal data breach and communication with the EU Commission will have a positive impact, However, even after the adequacy decision, the entity continues to need activities to secure personal data through compliance with GDPR principles and obligations. Major operations of companies that comply with GDPR are also maintained as important tasks that must be observed in most cases except for the Data Protection Agreement.

A Study on Level of Safety Awareness and Disaster Prevention Measures According to Driver's Characteristic (운전자 특성에 따른 안전 의식 수준과 재해예방 대책에 대한 연구)

  • Lee, Man-Soo
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.4
    • /
    • pp.131-136
    • /
    • 2013
  • Automobile was first introduced in 1903 in South Korea, the masses of the car was carried out rapidly compared to other countries. However, many people were killed in a traffic accidents and economic loss was occurred due to the spread of the automobile. In South Korea, 2012, traffic accident occurred 223,656 times, 5,392 fatality, 344,565 injured people. In the last five years, about 224,000 accidents per year were occurring. In other words, 610 traffic accidents occur and about 15 people pass away in one day. In addition, the proportion of traffic accidents is first place in the OECD countries and it is very high in the world. Understand occurrence tendency of traffic accident, accident frequency rate of the driver who drives more than 10 years was higher than the novice driver. In addition, as a result of examining the cause of the traffic accident, breach of safe driving obligation appears highest case (125,391 times), and followed by signal violation, break safety distance. Therefore, the majority of traffic accidents occurred by the lack of safety awareness of the driver. In this study, prevent the loss of human life and property in traffic disaster, by establish disaster prevention measures that investigated by questionnaire survey and statistical data of the state of consciousness and driving posture in response to the driving history of the driver.

Design and Implementation of a Real-time Integrated Analysis Framework based on Multiprocessor Search Modules against Malicious Codes (악성코드 대응 MPSM기반 실시간통합분석체계의 설계 및 구현)

  • Moon, Yoon Jong
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.69-82
    • /
    • 2015
  • This dissertation introduce how to react against the cybercrime and analysis of malware detection. Also this dissertation emphasize the importance about efficient control of correspond process for the information security. Cybercrime and cyber breach are becoming increasingly intelligent and sophisticated. To correspond those crimes, the strategy of defense need change soft kill to hard kill. So this dissertation includes the study of weak point about OS, Application system. Also this dissertation suggest that API structure for handling and analyzing big data forensic.

SAFETY STUDIES ON HYDROGEN PRODUCTION SYSTEM WITH A HIGH TEMPERATURE GAS-COOLED REACTOR

  • TAKEDA TETSUAKI
    • Nuclear Engineering and Technology
    • /
    • v.37 no.6
    • /
    • pp.537-556
    • /
    • 2005
  • A primary-pipe rupture accident is one of the design-basis accidents of a High-Temperature Gas-cooled Reactor (HTGR). When the primary-pipe rupture accident occurs, air is expected to enter the reactor core from the breach and oxidize in-core graphite structures. This paper describes an experiment and analysis of the air ingress phenomena and the method fur the prevention of air ingress into the reactor during the primary-pipe rupture accident. The numerical results are in good agreement with the experimental ones regarding the density of the gas mixture, the concentration of each gas species produced by the graphite oxidation reaction and the onset time of the natural circulation of air. A hydrogen production system connected to the High-Temperature Engineering Test Reactor (HTTR) Is being designed to be able to produce hydrogen by themo-chemical iodine-Sulfur process, using a nuclear heat of 10 MW supplied by the HTTR. The HTTR hydrogen production system is first connected to a nuclear reactor in the world; hence a permeation test of hydrogen isotopes through heat exchanger is carried out to obtain detailed data for safety review and development of analytical codes. This paper also describes an overview of the hydrogen permeation test and permeability of hydrogen and deuterium of Hastelloy XR.

Inference of birthplaces of users with public information in FaceBook (페이스북 공개 정보를 이용한 사용자 출생지 추론)

  • Choi, Daeseon;Lee, Younho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.431-434
    • /
    • 2014
  • This paper shows the users' birthplace information can be inferred with only the public information in FaceBook SNS. Through experiments with various machine learning algorithms and various parameters, we have found that SVM algorithm with the location of the highschool, the current address, and the graduate year of highschool performs best for the inference, as this can infer 78% of users' birthplaces correctly. Since the birthplace information is used for various security purpose such as questions for getting the forgotten password and a part of korean residence registration number, this is a non-trival security breach and users need be cautious about it.

A Study on Effect of Capture Volume in a Cavity on Direct Containment Heating Phenomena

  • Chung, C.Y.;Kim, M.H.;Lee, H.Y.;Kim, P.S.
    • Nuclear Engineering and Technology
    • /
    • v.28 no.3
    • /
    • pp.290-298
    • /
    • 1996
  • Direct Containment Heating, DCH, is supposed to occur during a core melt-down accident if the primary system pressure is still high at the time of vessel breach in a Nuclear Power Plant (NPP). In this case, DCH is considered to be one of very important severe phenomena during postulated severe accident scenario because of the fast heat transfer rate to atmosphere and the sharp pressure increase in a containment. To reduce the effect of this DCH phenomena, the capture volume wes designed at Ulchin NPP units 3 and 4. But, the effect of this has not been studied extensively. This work consists of experimental and numerical analyses of the effects of capture volume in the cavity on DCH phenomena. The experimental model is a 1/30 scaled-down model of Ulchin NPP units 3 and 4. We used three types of capture volumes to investigate the effect of size. Numerical analysis using CONTAIN 1.2 is performed with the correlation for the dispersed fraction of molten corium from the cavity into the containment derived from the experimental data to examine the effect of capture volume on DCH phenomena in full scale of Ulchin NPP units 3 and 4.

  • PDF

A Study on Threat Containment through VDI for Security Management of Partner Companies Operating at Industrial Control System Facility

  • Lee, Sangdo;Huh, Jun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.491-494
    • /
    • 2019
  • The results from the analysis of recent security breach cases of industrial control systems revealed that most of them were caused by the employees of a partner company who had been managing the control system. For this reason, the majority of the current company security management systems have been developed focusing on their performances. Despite such effort, many hacking attempts against a major company, public institution or financial institution are still attempted by the partner company or outsourced employees. Thus, the institutions or organizations that manage Industrial Control Systems (ICSs) associated with major national infrastructures involving traffic, water resources, energy, etc. are putting emphasis on their security management as the role of those partners is increasingly becoming important as outsourcing security task has become a common practice. However, in reality, it is also a fact that this is the point where security is most vulnerable and various security management plans have been continuously studied and proposed. A system that enhances the security level of a partner company with a Virtual Desktop Infrastructure (VDI) has been developed in this study through research on the past performances of partner companies stationed at various types of industrial control infrastructures and its performance outcomes were statistically compiled to propose an appropriate model for the current ICSs by comparing vulnerabilities, measures taken and their results before and after adopting the VDI.

An Analysis of Factors Affecting Fintech Payment Service Acceptance Using Logistic Regression (로지스틱 회귀분석을 이용한 핀테크 결제 서비스 수용 요인 분석)

  • Hwang, Sin-Hae;Kim, Jeoung Kun
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.51-60
    • /
    • 2018
  • This study aims to understand crucial factors affecting user's Fintech payment service adoption. On the basis of innovation diffusion theory and prior Fintech literature, this study classifies the influence factors of users' adoption of Fintech payment service into two dimensions - service dimension containing complexity, perceived benefit, trust in service provider and user dimension containing personal innovativeness and security breach experience. The data analysis results using binary logistic regression shows the negative direct effects of perceived risk, complexity, security accident experience on user's service adoption are statistically significant. Personal innovativeness has a positive effect on user's Fintech payment service adoption. The moderation effect of security accident experience is also significant at p<0.05.

Upward Flame Spread for Fire Risk Classification of High-Rise Buildings

  • McLaggan, Martyn S.;Gupta, Vinny;Hidalgo, Juan P.;Torero, Jose L.
    • International Journal of High-Rise Buildings
    • /
    • v.10 no.4
    • /
    • pp.299-310
    • /
    • 2021
  • External fire spread has the potential to breach vertical compartmentation and violate the fire safety strategy of a building. The traditional design solution to this has been the use of non-combustible materials and spandrel panels but recent audits show that combustible materials are widespread and included in highly complex systems. Furthermore, most jurisdictions no longer require detailing of spandrel panels under many different circumstances. These buildings require rapid investigation using rational scientific methods to be able to adequately classify the fire risk. In this work, we use an extensive experimental campaign of material-scale data to explore the critical parameters driving upward flame spread. Two criteria are outlined using two different approaches. The first evaluates the time to ignition and the time to burnout to assess the ability for a fire to spread, and can be easily determined using traditional means. The second evaluates the preheated flame length as the critical parameter driving flame spread. A wide range of cladding materials are ranked according to these criteria to show their potential propensity to flame spread. From this, designers can use conservative approaches to perform fire risk assessments for buildings with combustible materials or can be used to aid decision-making. Precise estimates of flame spread rates within complex façade systems are not achievable with the current level of knowledge and will require a substantial amount of work to make progress.