• Title/Summary/Keyword: Internet Incidents

Search Result 103, Processing Time 0.035 seconds

A Study on the Emergency Response System for Internet game event with simulation circumstance (시뮬레이션 환경하에서 인터넷 게임 사고 대응시스템모델 연구)

  • Shin, Seung-Jung;Choi, Woon-Ho
    • Journal of Korea Game Society
    • /
    • v.5 no.1
    • /
    • pp.41-44
    • /
    • 2005
  • This paper is model can be useful and capable of automatically collecting and classifying the various information about a wide range of security incidents such as hackings, worms, spyware, cyber-terror, network espionage and information warfare from firewall, IDS, VPN and so on. According to them Internet game and an automated/integrated computer emergency response system can perform an attack assessment and an early warning for any incidents based on Enterprise Security Management environment.

  • PDF

A Development of Evaluation Indicators for Information Security by Means of the Coincidence Analyses (부합성 분석을 통한 정보보안 평가지표 개발)

  • Lee, Yeong-Kyu;Kim, Sang-Hoon
    • Journal of Information Technology Services
    • /
    • v.7 no.3
    • /
    • pp.175-198
    • /
    • 2008
  • The wide spread of the Internet has become a momentum to promote informatization, and thus individuals, organizations, and government bodies are competitively participating in this kind of new wave. Informatization enables us not only to circulate and utilize information without any limitation but also to maximize users' benefits and convenience. On the other hand, it brings about negative effects-security incidents such as cyber terror, Internet fraud and technology leakage, etc. Evaluation on security level should precede over all the others in order to minimize damage by security incidents since it diagnoses current status on security as it is and can be used as a guideline for appropriate security management. In this study, evaluation domains, items and indicators of information security to evaluate information security are theoretically developed on the basis of critically reviewing the major existing research. And then the coincidence level(content validity, ease and reliability of evaluation) of each evaluation indicators are empirically analyzed through performing the field study of 83 information security experts.

Risk of Attack through an Open Wireless Network of IoT Devices (IoT 장치의 개방형 무선 네트워크를 통한 공격 위험)

  • Lee, Geonwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.10-14
    • /
    • 2019
  • The number of security incidents is increasing as the Internet of Things(IoT) is distributed widely. The security incidents of IoT can cause financial damages. Moreover, It can become direct threats to humans. In order to prevent these problems, the security installation for IoT devices is important. This paper describes the definition of IoT devices, security incident case, architecture, and the security threats that can occur when a device is connected to network without security installation.

  • PDF

Browser fuzzing and analysis using known vulnerability (파이썬 모듈과 정규표현식을 활용한 웹 취약점 탐색 자동화 봇)

  • Kim, Nam-gue;Kim, Ki Hwan;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.749-751
    • /
    • 2016
  • Internet technology is universal, news from the Web browser, shopping, search, etc., various activities have been carried out. Its size becomes large, increasing the scale of information security incidents, as damage to this increases the safety for the use of the Internet is emphasized. IE browser is ASLR, such as Isolated Heap, but has been continually patch a number of vulnerabilities, such as various protection measures, this vulnerability, have come up constantly. And, therefore, in order to prevent security incidents, it is necessary to be removed to find before that is used to exploit this vulnerability. Therefore, in this paper, we introduce the purge is a technique that is used in the discovery of the vulnerability, we describe the automation technology related thereto. And utilizing the known vulnerabilities, and try to show any of the typical procedures for the analysis of the vulnerability.

  • PDF

A Study on Survivability Management Model for Information Systems Over Internet (인터넷에서 정보시스템의 생존성 관리 모델)

  • Kim, Hwang-Rae;Park, Jin-Sub
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1185-1193
    • /
    • 2006
  • The next generation networked information system over unbounded internet is open to various network attacks and incidents, so many users suffer from damage and financial loss. In this paper we propose a survivability management model to evaluate the tradeoffs between the cost of defence mechanisms for information systems with weighted service and the resulting expected survivability after a network attack or occurrence of incidents. By varying the level of defence in the simulation, we examine how survivability changes according to the defense level. We derive a cost/survivability and weighted service/survivability curve that managers can use to decide on the appropriate level of defense for the network system of their organizations.

  • PDF

Simulation of Detecting the Distributed Denial of Service by Multi-Agent

  • Seo, Hee-Suk;Lee, Young-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.59.1-59
    • /
    • 2001
  • The attackers on Internet-connected systems we are seeing today are more serious and more technically complex than those in the past. Computer security incidents are different from many other types of crimes because detection is unusually difficult. So, network security managers need a IDS and Firewall. IDS (Intrusion Detection System) monitors system activities to identify unauthorized use, misuse or abuse of computer and network system. It accomplishes these by collecting information from a variety of systems and network resources and then analyzing the information for symptoms of security problems. A Firewall is a way to restrict access between the Internet and internal network. Usually, the input ...

  • PDF

A Study on Designing an Undergraduate Curriculum in Digital Forensics per Stages for Developing Human Resource (디지털 포렌식 인력 양성을 위한 단계별 대학 교과과정 설계에 관한 연구)

  • Rha, HyeonDae;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.75-84
    • /
    • 2014
  • It is a current situation that a large number of physical and financial damages are increasing due to the growth of intellectual cyber crime and unexpected Internet incidents year by year. In the large scale security incidents, digital forensics techniques for computer crime investigations are essential to secure a place in the field. However, qualified digital forensics investigators who complete with digital security technology are practically insufficient in domestic. In this paper, as one of developing human resources plans regarding to scientific investigation of Internet security incidents, an undergraduate curriculum per stage in digital forensics was proposed. For the effective curriculum per stage, the interviews, group discussion on focused group of existing digital forensics investigators and related research were performed to select curriculum, and then the level of difficulty and practical suitability on each subject designed were analyzed through survey and interview to current investigators and security professionals. After collating the survey, the digital forensic curriculum per level was designed to highly adaptable workforce for the future for working and positive suggestions and proposals are addressed.

  • PDF

A Study on Building a Cyber Incidents Information based Relational Graph and Using Plan (사이버 침해정보 연관 그래프 구축 및 활용방안 연구)

  • Lee, Seulgi;Cho, Hyeisun;Kim, Byungik;Shin, Youngsang;Lee, Taijin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.771-772
    • /
    • 2015
  • 사이버 침해사고 정보를 공유하는 체계가 전 세계적으로 확산되고 있는 추세이다. 상호 네트워크 통신을 위하여 필요한 인터넷기반정보와 사이버 침해사고 관련 정보를 획득하기 위한 채널 다양하게 존재하고 공공의 이익을 목적으로 공유되고 있으며 침해정보에 대한 세부적인 분석정보 또한 오픈소스 프로젝트를 통해 손쉽게 획득할 수 있다. 한국인터넷진흥원에서는 공인된 사용자 혹은 기관을 대상으로 침해사고에 활용된 악성정보를 공유하고 있다. 본 논문은 이러한 인터넷기반정와 침해사고와 관련된 연관정보를 활용한 사이버 침해정보 연관 그래프 구축방안에 대하여 논하며 그 활용방안이 어떠한 것이 있는지 제안한다.

Factors Affecting Medical Incident Care on WBAN

  • Lim, Sungryel;Lee, Hongchul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1058-1076
    • /
    • 2013
  • The WBAN(Wireless Body Area Network) supplies mobile convenience to our medical services. But if we have few effective control variables across this service deployment, the hidden distortions or defects of the system might threaten the lives and rights of the stakeholders. Therefore we need to increase the service credibility, to get WBAN effective. This study proposes a governance mechanism using feasible variables that are currently in use in practices in WBAN environments against medical incidents. Control variables were tested in Seoul National University hospital and related medical industries of South Korea. We assume that WBAN systems would be open based on integrating patients, medical employees and law enforcements to get smart theater operations against medical incidents by implementing proposed MJA(Multilateral Joint Analysis) model. MJA model also contributes to the convergence of computer systems and medical services by demonstrating flexible SOA(Service Oriented Architecture) dashboard of healthcare services with credibility factors in medicine. The important components in MJA model across WBAN, were found to be "Safety, Accuracy and Reliability" in priority order. Factor analysis, correlations and ANOVA were used to evaluate this model and an IT dashboard with a realization of mobile application, was used to support participants' decision-making.

A Study on Improving Cyber Liability Insurance for Electronic Financial Incident in Easy Payment System (간편결제 서비스에서 전자금융사고 시 국내 사이버 배상책임보험의 한계 및 개선방안에 대한 연구)

  • Lee, Han-Jun;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2016
  • A convergence of finance and information technology brought a remarkable development in Fin-Tech industry. On the other hand, currently existing laws seemed inappropriate to address the liability of financial institutions, Fin-tech enterprises and consumers in case of financial accidents due to its ambiguity. The minimum insurance obligation by financial institutions specified under the Electronic Financial Transaction Act 2006 is not keeping with current reality, considering transaction volume, frequency of incidents, and security investments. This paper aims to lay stress on the need of cyber liability insurance by understanding the domestic financial incidents and management, and the limit of existing insurance policy.