• Title/Summary/Keyword: ISAC

Search Result 19, Processing Time 0.022 seconds

Countermeasure for Preventing a Secondary Damage of Information Leakage using Financial ISAC (금융 ISAC을 활용한 정보유출 2차피해 방지 방안)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.14 no.5
    • /
    • pp.31-36
    • /
    • 2014
  • As security management center of financial area, financial ISAC monitors financial corporations and provides security services. Financial ISAC minimizes damage by responding quickly to external attack such as hacking, virus but it is poor at handling internal attack. For the efficient management and stable operation of information source, also to respond jointly to online hacking, the necessity of information sharing system increases day by day in and outside country. This paper proposes financial ISAC that can prevent a secondary damage of leakage information as well as providing security services. The proposed financial ISAC provides new password to financial corporation in which the same ID and password as leakage information are used and in case of financial information leakage it warns customers against phishing etc.

Sixth-Generation Networks and Integrated Sensing and Communications (6G 통신에서의 센싱과 통신의 결합 서비스(ISAC))

  • D.M. Baek;T.Y. Kim
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.6
    • /
    • pp.107-118
    • /
    • 2023
  • Sixth-generation (6G) networks may allow to evolve from everything connected to everything sensed. Integrated sensing and communications (ISAC) requires the higher frequencies, wider bands, and more advanced antenna technology offered by 6G technology. We analyze advanced beamforming techniques to overcome the poor propagation characteristics of millimeter and terahertz waves as well as new waveforms designed to include sensing. This paper is intended to provide communication researchers with short summaries of ISAC, use cases, and standardization initiatives as guidelines for exploring new research and development directions.

A Study on Roles of CERT and ISAC for enhancing the Security of Smart Mobile Office (스마트 모바일 오피스 보안을 위한 CERT와 ISAC의 역할)

  • Lee, Keun-Young;Park, Tae-Hyoung;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.109-127
    • /
    • 2011
  • Mobile Office is a new type of working method in the workplace that can be used at any time or anywhere by connecting to the network with mobile devices. This allows people to do their jobs without their physical presence in their offices to use computers. The elements in mobile office environment are advancing. They include the widespread distribution of the smart phones, the network enhancing strategy in a ubiquitous environment and expansion of the wireless internet; however, there are not enough security guidelines or policies against these threats on the new environment, the mobile office, although there is the revitalization policy of smart work supported by the government. CERT and ISAC, the known security system as of now, could be used for the secure mobile office, In this paper, suggestions are to be provided for strengthening the security of smart mobile office by analysing the functions of CERT and ISAC.

보안팀 탐방-금융결제원 금융ISAC

  • Korea Information Security Agency
    • 정보보호뉴스
    • /
    • s.130
    • /
    • pp.19-21
    • /
    • 2008
  • 전 세계에서 우리나라처럼 전자금융거래 시스템이 발달한 나라는 없다고 해도 과언이 아니다. 물론 비대면 사이버 거래에 따른 위험은 항상 존재한다. 특히 최근처럼 각종 사이버 위협이 부각되고, 실제로 크고 작은 침해사고가 발생하는 상황에서 금융기관의 침해사고는 금전적 피해 이상으로 사회적 파장을 가져올 수 있다. 때문에 금융기관에서는 작은 위협 하나도 무시할 수 없는 상황이다. 그런 의미에서 이번 호에서는 금융기관이라는 특성 때문에 보다 더 전문적이고, 보다 더 책임감 있는 사람들을 만나봤다. 금융결제원 금융ISAC이 그들이다.

  • PDF

ANALYSIS OF PRIVACY-PRESERVING ELEMENT REDUCTION OF A MULTISET

  • Seo, Jae-Hong;Yoon, Hyo-Jin;Lim, Seong-An;Cheon, Jung-Hee;Hong, Do-Won
    • Journal of the Korean Mathematical Society
    • /
    • v.46 no.1
    • /
    • pp.59-69
    • /
    • 2009
  • The element reduction of a multiset S is to reduce the number of repetitions of an element in S by a predetermined number. Privacy-preserving element reduction of a multiset is an important tool in private computation over multisets. It can be used by itself or by combination with other private set operations. Recently, an efficient privacy-preserving element reduction method was proposed by Kissner and Song [7]. In this paper, we point out a mathematical flaw in their polynomial representation that is used for the element reduction protocol and provide its correction. Also we modify their over-threshold set-operation protocol, using an element reduction with the corrected representation, which is used to output the elements that appear over the predetermined threshold number of times in the multiset resulting from other privacy-preserving set operations.

Remote handling systems for the ISAC and ARIEL high-power fission and spallation ISOL target facilities at TRIUMF

  • Minor, Grant;Kapalka, Jason;Fisher, Chad;Paley, William;Chen, Kevin;Kinakin, Maxim;Earle, Isaac;Moss, Bevan;Bricault, Pierre;Gottberg, Alexander
    • Nuclear Engineering and Technology
    • /
    • v.53 no.4
    • /
    • pp.1378-1389
    • /
    • 2021
  • TRIUMF, Canada's particle accelerator centre, is constructing a new high-power ISOL (Isotope Separation On-Line) facility called ARIEL (Advanced Rare IsotopE Laboratory). Thick porous targets will be bombarded with up to 48 kW of 480 MeV protons from TRIUMF's cyclotron, or up to 100 kW of 30 MeV electrons from a new e-linac, to produce short-lived radioisotopes for a variety of applications, including nuclear astrophysics, fundamental nuclear structure and nuclear medicine. For efficient release of radioisotopes, the targets are heated to temperatures approaching 2000 ℃, and are exposed to GSv/h level radiation fields resulting from intended fissions and spallations. Due to these conditions, the operational life for each target is only about five weeks, calling for frequent remote target exchanges to limit downtime. A few days after irradiation, the targets have a residual radiation field producing a dose rate on the order of 10 Sv/h at 1 m, requiring several years of decay prior to shipment to a national disposal facility. TRIUMF is installing new remote handling infrastructure dedicated to ARIEL, including hot cells and a remote handling crane. The system design applies learnings from multiple existing facilities, including CERN-ISOLDE, GANIL-SPIRAL II as well as TRIUMF's ISAC (Isotope Separator and ACcelerator).

방위산업 사이버 보안을 위한 방산 정보 공유·분석센터(ISAC) 설립 방안

  • Park, Heungsoon
    • Review of KIISC
    • /
    • v.28 no.6
    • /
    • pp.56-62
    • /
    • 2018
  • 미래 군사력은 첨단 무기체계가 병력 위주의 군 구조를 대체할 것임은 자명하다. 이를 증명하듯 최근 국내 방위산업은 무기체계의 고도화 첨단화로 급속하게 성장하고 있으며 해외 수출도 성공적으로 진행 중이다. 그러나 컴퓨터 해킹 등 사이버 공격에 의한 방산 정보나 방위산업기술의 유출은 방위산업의 성장을 저해시킬 뿐 아니라 국가 안보까지 심대한 영향을 미친다. 국방부는 방산업체 사이버 보안을 위해 2010년부터 보안관제를 실시하고 있으나, 지능형 지속 위협(APT) 공격과 같은 최근의 공격 양상에 대응하기 위해서는 위협 정보를 다각적으로 수집 분석하는 노력이 필수적이다. 미국을 중심으로 한 선진국은 정보공유 분석센터(ISAC) 등 정보공유체계 구축을 통해 주요 기반시설의 사이버 보안을 강화하고 있으며 국내에서도 금융, 통신 분야 등을 시작으로 최근에는 의료 분야로 점차 확대되고 있는 추세이다. 본 논문에서는 정보공유 분석센터 설립 사례와 국내 방산업체 보안관제 환경 분석을 통해 방산 정보공유 분석센터 설립 방안을 제안한다.

Services analysis and improvement of MKE(Ministry of Knowledge Economy) Cyber Security Center (지식경제사이버안전센터의 대응활동분석과 개선방안)

  • Lee, Seung-Won;Roh, Young-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.249-258
    • /
    • 2012
  • Cyber attacks expose sensitive information and cause fatal damage in both the public and the private sectors. Therefore, MKE (Ministry of Knowledge Economy) Cyber Security Center was founded on July 25, 2008, to perform three major roles. First, it detects and analyzes cyber attacks for the both sectors. Second, its ISAC (Information Sharing & Analysis Center) service analyzes and evaluates the vulnerability of the communication and network infrastructure to security threats, including control systems. Third, it provides CERT/CC (Computer Emergency Response Team Coordination Center) service to prevent and to respond to computer security incidents. This study focuses on the MKE Cyber Security Center's service analysis, which is playing an increasingly larger role in the both sectors. Based on this analysis, after grasping the response services activity and pointing out the problems, this study suggests improvements to the MKE Cyber Security Center.

A Study on the Establishment and Operation of Autonomous Cooperative Road Traffic Security Institutions (자율협력 주행 도로교통 보안기관 설립 및 운영을 위한 방안 연구)

  • Mose Kim;Keecheon Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.1
    • /
    • pp.208-218
    • /
    • 2023
  • Research on autonomous vehicles is being actively conducted, and the effort to commercialize them is underway in several countries. In Korea, platform construction projects are being carried out under the supervision of the Ministry of Land, Infrastructure, and Transport to achieve autonomous cooperative driving. To enable a flawless infrastructure, there is a requirement to build a safe security agency responsible for the secure operations of the entire process. However, there is no traffic ISAC in Korea that performs these roles. This paper analyzes related bills and acts of the other domestic security institutions currently in operation. Based on these results, we suggest appropriate directions to modify the current laws related to the C-ITS system. Finally, we propose a suitable plan to establish and operate a C-ITS ISAC.

Computational and Experimental Simulations of the Flow Characteristics of an Aerospike Nozzle

  • Rajesh, G.;Kumar, Gyanesh;Kim, H.D.;George, Mathew
    • Journal of the Korean Society of Visualization
    • /
    • v.10 no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Single Stage To Orbit (SSTO) missions which require its engines to be operated at varying back pressure conditions, use engines operate at high combustion chamber pressures (more than 100bar) with moderate area ratios (AR 70~80). This ensures that the exhaust jet flows full during most part of the operational regimes by optimal expansion at each altitude. Aero-spike nozzle is a kind of altitude adaptation nozzle where requirement of high combustion chamber pressures can be avoided as the flow is adapted to the outside conditions by the virtue of the nozzle configuration. However, the thrust prediction using the conventional thrust equations remains to be a challenge as the nozzle plume shapes vary with the back pressure conditions. In the present work, the performance evaluation of a new aero-spike nozzle is being carried out. Computational studies are carried out to predict the thrust generated by the aero-spike nozzle in varying back pressure conditions which requires the unsteady pressure boundary conditions in the computational domain. Schlieren pictures are taken to validate the computational results. It is found that the flow in the aero-spike nozzle is mainly affected by the base wall pressure variation. The aerospike nozzle exhibits maximum performance in the properly expanded flow regime due to the open wake formation.