• Title/Summary/Keyword: Major information and communication infrastructure

Search Result 65, Processing Time 0.024 seconds

Analysis of Efficiency of Major Information and Communication Infrastructure Analysis and Evaluation Methods Using DEA Model (DEA 모형을 이용한 주요정보통신기반시설 취약점 분석·평가의 효율성 분석)

  • Sun, Jong-wook;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.853-862
    • /
    • 2021
  • Today, disturbance and paralysis of information and communication infrastructure by electronic infringement of national infrastructure is emerging as a threat. Accordingly, the government regularly implements the vulnerability analysis and evaluation system of major information and communication infrastructure to protect the information system and control system of major infrastructure, and invests increased human and material resources every year to efficiently operate it. However, despite the government's efforts, as infringement accidents and attempts targeting national infrastructure continue to occur, the government's resource input to prepare the information protection foundation has little effect on the information protection activity result calculation, making the evaluation system not efficient. The question arises that it is not. Therefore, in this study, we use the DEA model to review the efficient operation of the vulnerability analysis and evaluation system for major information and communications infrastructure, and suggest improvement measures to enhance the level of information protection based on the analyzed results.

An Advanced Model for Week Point Analysis and Evaluation on Important Information Communication Infrastructures (주요 정보통신 기반시설 취약점 분석 및 평가절차 모델 개선 연구)

  • Choi, Woong Gyu
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.43-48
    • /
    • 2012
  • As the major information communication infrastructure had been getting more important, 'Act on the Protection of Information and Communications Infrastructure'(APICI) was legislated in Korea 2001. Consequently, the major information system, nationwide monitering service systems and government administration operation & management systems have been registered and managed under the APICI. The authorized organizations related to above service and system, perform vulnerability analysis and evaluation for chief communication infrastructures by themselves or registered agencies. In this research, we propose an advanced model for vulnerability analysis and evaluation and apply it to the main information and communication infrastructures through the case study. We hope each related organization could apply this model for analysis and evaluation of vulnerability in these infrastructures.

A STUDY OF DISTRIBUTED DENIAL OF SERVICE ATTACK ON GOVERNMENT INFRASTRUCTURE

  • Kim, Suk-Jin;Jeong, Gisung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.55-65
    • /
    • 2016
  • Distributed Denial of service attack is one of the major threats nowadays especially to the government infrastructure that give huge impact to the reputation and interrupt the services and resource. Our survey start with brief introduction about DDoS attacks, we illustrate the trends and incident happened at government from various countries. We then provide an extensive literature review on the existing research about implication, types of attacks and initiative to defence against the DDoS attacks. Our discussion aims to identify the trends in DDoS attacks, in depth impact of DDoS attacks to government infrastructure, classification of attacks and techniques against the attacks. And we will use for a fire fight safety and management.

A study and analysis of WiBro for infrastructure-vehicle communication technology (인프라-차량단말간 통신기술을 위한 WiBro 기술 분석 및 연구)

  • Lim, Il-kwon;Choi, Sang-wook;Kim, Young-hyuk;Choi, Jeong-Dan;Lee, Jea-kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.120-123
    • /
    • 2009
  • The WiBro to start June 2006 is mobile internet service with 60km/h, 3Mbps. And current WiBro service is used in Seoul, the metropolitan area and the local major cities. This study suggests WiBro technology and analyzes wireless communication technology to vehicle-to-infrastructure communications for the unmanned vehicle control. We were driving vehicle with two laptop computer's WiBro unit for V2I communication environment. So each RAS(Radio Access Station) on center is tested coverage area, transmission rate, latency rate, lost rate and transmission rate to parking area environment.

  • PDF

Analysis of Information Security Issues and Classification through Metaverse Infringement Cases

  • Mi-Na, Shim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.13-22
    • /
    • 2023
  • In the age of Web 3.0, the metaverse is emerging as a new innovative element to replace the Internet. Leading major ICT companies, it is striving to become a metaverse platform or infrastructure-oriented company. Along with the expansion of the VR and AR market, governments of each country are investing large budgets in this field. However, security concerns about metaverse are also growing. In addition to potential damage to infrastructure, platform and services, personal information leakage and privacy damage are expected to increase further. In this study, we investigated and closely analyzed cases of infringement on the infrastructure, platform, and service of Metaverse. We have clearly identified the current state of metaverse security and the characteristics of the risks of greatest concern. The research procedure is composed of a method of determining the metaverse security area for case analysis first and deriving the type of threat by area through the type of infringement. In particular, the results were mapped into Domain, Case, and Threat, and the implications of the results were analyzed. Through these results, researchers want to contribute to finding the right direction of research by clearly understanding the latest metaverse security status.

Security Measures by Diagnosing Vulnerabilities in Web Applications

  • Kim, Hee Wan
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.22-29
    • /
    • 2021
  • For web application vulnerability diagnosis, from the development stage to the operation stage, it is possible to stably operate the web only when there is a policy that is commonly applied to each task through diagnosis of vulnerabilities, removal of vulnerabilities, and rapid recovery from web page damage. KISA presents 28 evaluation items for technical vulnerability analysis of major information and communication infrastructure. In this paper, we diagnose the vulnerabilities in the automobile goods shopping mall website and suggest security measures according to the vulnerabilities. As a result of diagnosing 28 items, major vulnerabilities were found in three items: cross-site scripting, cross-site request tampering, and insufficient session expiration. Cookie values were exposed on the bulletin board, and personal information was exposed in the parameter values related to passwords when personal information was edited. Also, since the session end time is not set, it was confirmed that session reuse is always possible. By suggesting security measures according to these vulnerabilities, the discovered security threats were eliminated, and it was possible to prevent breaches in web applications and secure the stability of web services.

Development of Extraction Technique for Irrigated Area and Canal Network Using High Resolution Images (고해상도 영상을 이용한 농업용수 수혜면적 및 용배수로 추출 기법 개발)

  • Yoon, Dong-Hyun;Nam, Won-Ho;Lee, Hee-Jin;Jeon, Min-Gi;Lee, Sang-Il;Kim, Han-Joong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.63 no.4
    • /
    • pp.23-32
    • /
    • 2021
  • For agricultural water management, it is essential to establish the digital infrastructure data such as agricultural watershed, irrigated area and canal network in rural areas. Approximately 70,000 irrigation facilities in agricultural watershed, including reservoirs, pumping and draining stations, weirs, and tube wells have been installed in South Korea to enable the efficient management of agricultural water. The total length of irrigation and drainage canal network, important components of agricultural water supply, is 184,000 km. Major problem faced by irrigation facilities management is that these facilities are spread over an irrigated area at a low density and are difficult to access. In addition, the management of irrigation facilities suffers from missing or errors of spatial information and acquisition of limited range of data through direct survey. Therefore, it is necessary to establish and redefine accurate identification of irrigated areas and canal network using up-to-date high resolution images. In this study, previous existing data such as RIMS (Rural Infrastructure Management System), smart farm map, and land cover map were used to redefine irrigated area and canal network based on appropriate image data using satellite imagery, aerial imagery, and drone imagery. The results of the building the digital infrastructure in rural areas are expected to be utilized for efficient water allocation and planning, such as identifying areas of water shortage and monitoring spatiotemporal distribution of water supply by irrigated areas and irrigation canal network.

Regional Information Infrastructure and Competitiveness (지역 정보 인프라와 기업 경쟁력 강화 방안)

  • 김유일;조영복;방호열;장활식;서문식;신종국
    • The Journal of Information Systems
    • /
    • v.8 no.1
    • /
    • pp.149-176
    • /
    • 1999
  • Regional information infrastructure(RII) plays an increasingly important role in determining the competitiveness of companies operating within the region. The purposes of this research are (1) to identify the types of RII demanded by the companies operating within Pusan and KyungNam areas in Republic of Korea, (2) to explain the levels of RII demand using variables including organizational environment, organizational strategy, and the importance of information systems for the organization, and (3) to examine whether the types of RII demand are different depending on the competition strategies that companies are pursuing. The most important type of RII that region companies demand is information systems personnel having knowledge in systems control, systems planning, communication network, database administration, and system construction. In addition, demanded are TSDN, satellite communication network, and shareable software and hardware. The levels of RII demand are different depending on the importance of information systems(IS) roles for the businesses. The more important IS role is for a company, the more sharable computing equipments and facilities are demanded. The importance of IS role is affected by the organizational environment and organizational strategy. The levels of RII demand are different also depending on the competitive advantages that companies are pursuing. Companies focusing on achieving short-term and direct benefits using information technology tend to have higher demands on sharable computing equipments and facilities as well as on information communication services. This research is explorative in nature One major limitation of this research, therefore, is that the plausibility of the postulated hypotheses was not examined simultaneously. This research is meaningful in that it first attempted to measure the demands of regional companies for RII.

  • PDF

Developing an On-line Scheduling System for Increasing Effectiveness of Public Research Facility (공공기관 연구시설장비 효율성 향상을 위한 온라인 일정계획 시스템 개발)

  • Lee, Chae-Yun;Kim, Ki-Hong;Shin, Seung-Jun
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.1
    • /
    • pp.181-189
    • /
    • 2017
  • The systematic management of technology infrastructure increasingly becomes critical as it represents the driving power for creating competitive advantage of nations and enterprises. In this sense, public facility and equipment, which is one major asset of technology infrastructure, should be managed effectively, systematically and efficiently to increase its overall equipment effectiveness. However, the manual and off-line communication was the unique way to communicate between the suppliers who provide facilities in the public sector and the customers who utilize the facilities in the industrial sector. This communication way caused invisibility of available usage time and increase of idle time, thereby decreasing the equipment effectiveness. This paper presents an web-based scheduling system that enables real-time collaboration and information sharing for increasing the equipment effectiveness. The designed system performs scheduling, facility management, order management and customer relationship management in an on-line platform, and carries out the processing and storing of relevant information in an integrated database. The paper includes a development approach to identify business process models and standardized system models by using object-modeling technique. The deliverable of the present work will contribute to increasing the equipment effectiveness by enhancing visibility, transparency and predictability by means of the integration with a legacy Enterprise Resource Planning.

On the Study of Key Management in Mobile Ad Hoc Networks (이동 임시무선망에서의 키 관리 기법에 관한 연구)

  • Kim Si-Gwan;Shin Yoon-Shik;Lim Eun-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.4
    • /
    • pp.90-98
    • /
    • 2004
  • This paper covers the issue of securing ad hoc networks. Such networks exhibit a number of characteristics that make such a task challenging. One of the major challenges is that ad hoc networks typically lack a fixed infrastructure both in form of physical infrastructure such as routers, servers, and stable communication links and in the form of an organizational or administrative infrastructure. Another difficulty lies in the highly dynamic nature of ad hoc networks since new nodes can join and leave the network at any time. The major problem in providing security services in such infrastructure less networks is how to manage the cryptographic keys that are needed. In order to design practical and efficient key management systems it is necessary to understand the characteristics of ad hoc networks and why traditional key management systems cannot be used. These issues are covered and we also present a new efficient key management solutions. Finally we show that the proposed method is more efficient than the previous works through simulations.

  • PDF