• Title/Summary/Keyword: National Cybersecurity

Search Result 113, Processing Time 0.025 seconds

A Proposal of Cybersecurity Technical Response Job Competency Framework and its Applicable Model Implementation (사이버보안 기술적 대응 직무 역량 프레임워크 제안 및 적용 모델 구현 사례)

  • Hong, Soonjwa;Park, Hanjin;Choi, Younghan;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1167-1187
    • /
    • 2020
  • We are facing the situation where cyber threats such as hacking, malware, data leakage, and theft, become an important issue in the perspective of personal daily life, business, and national security. Although various efforts are being made to response to the cyber threats in the national and industrial sectors, the problems such as the industry-academia skill-gap, shortage of cybersecurity professionals are still serious. Thus, in order to overcome the skill-gap and shortage problems, we propose a Cybersecurity technical response Job Competency(CtrJC) framework by adopting the concept of cybersecurity personnel's job competency. As a sample use-case study, we implement the CtrJC against to personals who are charged in realtime cybersecurity response, which is an important job at the national and organization level, and verify the our framework's effects. We implement a sample model, which is a CtrJC against to realtime cyber threats (We call it as CtrJC-R), and study the verification and validation of the implemented model.

A study on the Development for the National Cybersecurity Capability Assessment Criteria (국가 사이버보안 역량 평가를 위한 평가항목 연구)

  • Bae, Sunha;Park, Sangdon;Kim, So Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1293-1314
    • /
    • 2015
  • As ICT is becoming a major social infrastructure, the need to strengthen cyber capabilities are emerging. In the major advanced countries including the United States, has a continuing interest in strengthening cyber capabilities and has studied in enhancements of cyber capabilities. The cyber capability assessment is necessary in order to determine the current level of the country, establish policy directions and legislations. The selection of criteria has very important meaning to suggest future policy direction as well as an objective assessment of cybersecurity capabilities. But there are variable criteria for national cyber capabilities assessment such as strategy, legislation, technology, society and culture, and human resources. In this paper we perform the analysis of criteria for the other country's cybersecurity assessments including the U.S. and Europe. And we proposed the criteria for the national cybersecurity assessment reflecting the our country's characteristics.

A Study on the Framework of Comparing New Cybersecurity Workforce Development Policy Based on the ATE Programs of U.S. (미국 ATE 정책 기반의 신규 사이버보안 인력양성 정책 비교 프레임워크 연구)

  • Hong, Soonjwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.249-267
    • /
    • 2018
  • The US cybersecurity workforce policy is being pursued comprehensively and systematically, based on the NICE established initiated in 2010. Security Technologies, one of the eight areas of Advanced Technology Education(ATE) of the National Science Foundation(NSF) included in the STEM. This policy has been comprehensively promoted in conjunction with NICE, and this security technology field is operated with five detailed programs. In this paper, we examine in detail five cybersecurity workforce development programs supported by ATE, and compare them with the current status cultivation of cybersecurity workforce in Korea. After finding out the problems and improvements by comparison with the current situation of cybersecurity workforce development in Korea, we propose several implementations of nation-wide strategies for cultivating new cybersecurity workforce in Korea.

A Study on the Analysis of Trump Administration Cybersecurity Policy: Focusing on Critical Infrastructure (트럼프 행정부의 주요기반시설 사이버보안 정책분석에 관한 연구)

  • Kim, Geunhye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.907-918
    • /
    • 2019
  • The purpose of this study is to understand the cybersecurity policies and critical infrastructure protection of the United States through analyzing Donald Trump's administration executive orders, the national cyber strategy, and the legislation. The analysis has three findings. First, the Department of Homeland Security (DHS) became a main agent in the cybersecurity while the role of the White House was reduced. Second, Trump's administration expanded its role and mission in the policy area by extending the meaning of critical infrastructure. Third, in the case of cyber threats, the government can be involved in the operation of critical infrastructures in the private sector. The opinions of the professional bureaucrats and DHS were more reflected in the direction of the cybersecurity policy than those of the White House. In contrast to Barack Obama's administration, the Trump administration's cybersecurity strategies were not much studied. This study provides insights for improving cybersecurity policies and critical infrastructure protection.

Plaintext Recovery Attack of PRESENT Using Deep Learning (딥러닝 기술을 활용한 PRESENT 평문 복구 공격)

  • Kim, Donghoon;Kwon, Donggeun;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.442-445
    • /
    • 2020
  • 최근, 딥러닝 기술을 활용하여 암호 알고리즘 식별, 평문 복구, 이론적 암호분석을 향상시키는 방법 등이 제안되고 있다. 이 중, 2019년에 Xiao 등이 암호학적 특성을 고려되지 않고 2-라운드 DES의 평문복구 공격에 딥러닝을 적용하는 방법을 제안하였다. 본 논문에서는 이러한 기법을 향상하여 암호문과 평문의 선형 연관성을 고려한 평문 복구 공격을 딥러닝을 통해 수행하는 방법을 제안한다. 이를 활용하여, PRESENT의 평문 복구 공격을 5-라운드까지 가능함을 보인다.

Proposals for GCI Indicators to Improve a National Cybersecurity Level (국가 사이버보안 수준 향상을 위한 GCI의 지표개선 방안)

  • Kim, Dae kyung;Lee, Ju hyeon;Kim, Ye young;Hyeon, Da eun;Oh, Heung-Ryong;Chin, Byoung moon;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.289-307
    • /
    • 2022
  • The Global Cybersecurity Index (GCI) developed by the International Telecommunication Union (ITU) is used to diagnose a country's cybersecurity development level and to strengthen its cybersecurity capabilities. This paper analyzes GCI and tries to suggest a way to strengthen its effectiveness. In addition, we analyze the GCI version 1~GCI version 4 evaluation index in advance, and examine the development plan through SWOT analysis. Through this, basic principles for GCI improvement and utilization will be established, and new indicators related to the GCI version 5 questionnaire will be discovered and suggested. This paper is expected to be used as basic data for GCI performance analysis and improvement plan. In addition, it is intended to contribute to enhance the effectiveness of GCI and the nation's cybersecurity capabilities by proposing more advanced proactive and reactive indicators to be applied to the future GCI evaluations. This paper is an improvement and development for the research result of [1].

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

The possibility of abusing Game the preventing way of abuse through AI (인공지능을 통한 게임의 악용과 개선방안 및 제안)

  • Jang, Hyunseo;Kim, Jinsu;Park, Namje
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.901-903
    • /
    • 2019
  • 인공지능 기술의 발전에 따라 산업, 교육, 게임, 의료, 국방, 교통 등에서 여러 가지 방면으로 활용되어가고 있다. 하지만 인공지능을 게임에 접목해 게임 내에서 사람보다 월등한 성적을 낼 수 있다는 것이다. 과거에는 메모리 변조, 패킷 변조 등의 공정한 플레이 규정을 파괴하는 프로그램을 사용하였다면 현재에는 딥러닝을 통해 학습된 게임 알고리즘은 이제까지의 프로그램과는 다르므로 게임 인공지능 산업의 개선방안을 제안하고자 한다.

Blockchain-based Federated Learning for Intrusion Detection in IoT Networks (IoT 네트워크에서 침입 탐지를 위한 블록체인 기반 연합 학습)

  • Md Mamunur Rashid;Philjoo Choi;Suk-Hwan Lee;Ki-Ryong Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.262-264
    • /
    • 2023
  • Internet of Things (IoT) networks currently employ an increased number of users and applications, raising their susceptibility to cyberattacks and data breaches, and endangering our security and privacy. Intrusion detection, which includes monitoring and analyzing incoming and outgoing traffic to detect and prohibit the hostile activity, is critical to ensure cybersecurity. Conventional intrusion detection systems (IDS) are centralized, making them susceptible to cyberattacks and other relevant privacy issues because all the data is gathered and processed inside a single entity. This research aims to create a blockchain-based architecture to support federated learning and improve cybersecurity and intrusion detection in IoT networks. In order to assess the effectiveness of the suggested approach, we have utilized well-known cybersecurity datasets along with centralized and federated machine learning models.

Trends of SOC & SIEM Technology for Cybersecurity (Cybersecurity를 위한 SOC & SIEM 기술의 동향)

  • Cha, ByungRae;Choi, MyeongSoo;Kang, EunJu;Park, Sun;Kim, JongWon
    • Smart Media Journal
    • /
    • v.6 no.4
    • /
    • pp.41-49
    • /
    • 2017
  • According to the occurrence of many security incidents, the SOC(Security Operation Center) and SIEM(Security Information & Event Management) are concentrated recently. The various studies and commercial products of the information security industry are being released. As reflected in this situation, NIST in the US is publishing and revising the document about the Cybersecurity Framework. In this study, we investigated the NIST's Cyberseurity Framework, trends in SOC and SIEM security technologies and solutions, and also introduce the open source Apache Metron of a real-time Bigdata security tool.