• Title/Summary/Keyword: Operational Security

Search Result 371, Processing Time 0.022 seconds

Proposal of a framework for evaluating the operational impact of cyber attacks on aviation weapons systems(EOICA) (항공무기체계 사이버공격에 대한 작전영향성평가 프레임워크 제안)

  • Hong, Byoung-jin;Kim, Wan-ju;Lee, Soo-jin;Lim, Jae-sung
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.35-45
    • /
    • 2020
  • Cyber attacks on the aviation weapon system, a state-of-the-art asset, have become a reality and are approaching as a constant threat. However, due to the characteristics of embedded software of the current aviation weapon system, it is managed and operated without connection to the network in peacetime, so the response management to cyber attacks is relatively weak. Therefore, when a cyber attack becomes a reality, it is urgent to prepare and evaluate measures for the adverse effects that such attack will have on the execution of the Air Tasking Order(ATO). In this paper, we propose a framework for operational impact assessment in order to avoid confusion in ATO execution and systematic response to cyber attacks on aviation weapons systems. The proposed framework is designed to minimize the negative impact on operations against cyber attacks that may occur under no warning by analyzing the impact on air operations for each aviation weapon system and standardizing countermeasures for this. In addition, it supports the operational commander to make a quick decision to command for the execution of the operation even in a situation where a cyber attack occurs.

A Study on Contents Security Method Based on a Content Delivery Network (CDN 환경에서 콘텐츠 보안 방법 연구)

  • Kim, Jeom-Goo;Kim, Tae-Eun
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.51-56
    • /
    • 2008
  • Is caused by with growth etc. of the digital contents circulation market which leads suddenly accommodates in order to control the network traffic which increases and the researches which are various are being advanced the explosive evidence and a electronic transaction of the Internet user. The present paper protects a digital contents and a copyright from CDN system environments which will appear the center of new network service with the plan for the dispersive DRM system of CDN bases plans. Respect this dispersion DRM package formats which provide a stronger security characteristic in the contents which is stored the operational process of the dispersive DRM system for to be defined, CDN system and of existing interoperability they present.

  • PDF

Preventive Control for Transient Security with Generation Rescheduling Based on Rotor Trajectory Index

  • Verma, Kusum;Niazi, K.R.
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.2
    • /
    • pp.465-473
    • /
    • 2015
  • The increasing need to improve transient security assessment of existing or forecasted operating conditions of networks by power system operators is major concern of the power system security monitoring problem at the Energy Management Systems. This paper proposes a preventive control of transient stability with generation rescheduling based on rotor trajectory index obtained using time domain simulations. This index may help power engineers in making operational decision and to obtain a generation configuration with better transient security dispatch. The effectiveness of the proposed methodology is demonstrated on IEEE 39-bus New England system for a three phase fault at different loading conditions with single and multiple line outage cases.

A Model of Software Rejuvenation for Survivability (생존성을 위한 소프트웨어 재활기법의 모델)

  • Aung, Khin Mi Mi;Park, Jong-Sou
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1965-1968
    • /
    • 2003
  • The importance of Security measures by means of Physical Security, Network Security and Online/Internet Security. Lack of security is one of the primary obstacles in fielding many technologies in both commercial and DoD networks. Moreover, Internet censorship may be growing and is becoming increasingly sophisticated. In this paper, we will evaluate the Practice to Policy to Theory Approach for survivability by means of software rejuvenation models. These models would be assessed the effectiveness of proactive fault management in operational software systems and determined optimal times to perform rejuvenation.

  • PDF

A Study on the System and Operation of the Next Military Satellite Communication (차기 군 위성통신 체계 및 운용에 대한 연구)

  • Kim, Jin;Ha, Su-Cheol
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.419-442
    • /
    • 2006
  • In this paper, we introduce the operational management architecture on the military satellite communication of United States and analyze the current problems of Korea military. We discuss on the development scheme and the idea of construction to manage and to operate the next military satellite communication stabilitly.

  • PDF

The Concept and Measurement of Food Security (식품보장의 개념과 측정)

  • Kim, Ki-Rang;Kim, Mi-Kyung;Shin, Young-Jeon
    • Journal of Preventive Medicine and Public Health
    • /
    • v.41 no.6
    • /
    • pp.387-396
    • /
    • 2008
  • Objectives : During the past two decades, food deprivation and hunger have been recognized to be not just the concerns of only underdeveloped or developing countries, but as problems for many affluent Western nations as well Many countries have made numerous efforts to define and measure the extent of these problems. Based on these efforts, the theory and practice of food security studies has significantly evolved during the last decades. Thus, this study aims to provide a comprehensive review of the concept and measurement of food security Methods and results : In this review, we introduce the definition and background of food security, we describe the impact of food insecurity on nutrition and health, we provide its measurements and operational instruments and we discuss its applications and implications. Some practical information for the use of the food security index in South Korea is also presented. Conclusions : Food security is an essential element in achieving a good nutritional and health status and it has an influence to reduce poverty The information about the current understanding of food security can help scientists, policy makers and program practitioners conduct research and maintain outreach programs that address the issues of poverty and the promotion of food security.

A Study on Self Assessment of Mobile Secure Coding (모바일 시큐어코딩 자가평가(M-SCSA) 방법에 대한 연구)

  • Kim, Dong-Won;Han, Keun-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.901-911
    • /
    • 2012
  • The removal of security vulnerabilities during the developmental stage is found to be much more effective and much more efficient than performing the application during the operational phase. The underlying security vulnerabilities in software have become the major cause of cyber security incidents. Thus, secure coding is drawing much attention for one of its abilities includes minimizing security vulnerabilities at the source code level. Removal of security vulnerabilities at the software's developmental stage is not only effective but can also be regarded as a fundamental solution. This thesis is a research about the methods of Mobile-Secure Coding Self Assessment in order to evaluate the security levels in accordance to the application of mobile secure coding of every individual, groups, and organizations.

A Wireless Network Structure and AKA(Authentication and Key Agreement) Protocol of Advanced Metering Infrastructure on the Smart Grid based on Binary CDMA (스마트 그리드를 위한 Binary CDMA 기반의 AMI 무선 네트워크 구조 및 AKA 프로토콜)

  • Jeon, Jae-Woo;Lim, Sun-Hee;Yi, Ok-Yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.111-124
    • /
    • 2010
  • AMI (Advanced Metering Infrastructure) is a core infrastructure of Smart Grid, and is promoting in various country. Wireless network is considered for cost savings and operational efficiencies in AMI. But various security problems are expected in wireless networks of AMI, so we should solve these problems. In this paper, we suggest a wireless network of AMI by using Binary CDMA and security countermeasures of AMI wireless network. Proposed security architecture is using BSIM (Binary Subscriber Identity Module) to perform user authentication and key agreement for the encryption and decryption over radio network to reduce security threats.

A Study on The United States Secret Service (미국 대통령경호제도에 관한 고찰)

  • Jang, Ki-Boong
    • Korean Security Journal
    • /
    • no.4
    • /
    • pp.299-317
    • /
    • 2001
  • The United States Secret Service is the strongest presidential protective organization in the world. Almost every country's security organization in the world is benchmarking its organization, protective operation system, security equipments and etc. In this paper, I study largely on the protective operation system of the U.S Secret Chapter I is the introduction part. Chapter II introduces the establishment and the background of its development of the U.S Secret Service. Chapter III deals with the organization and ranking system of the U.S SS. Chapter IV consider the protective operation system of the 5.5. The main theory of the protective operation is the 'Protective Envelope Philosophy' which emphasizes the "Cover and Evacuate". Also the protective operation system is developed with the principle of the democracy and in the history of continuing assassination attempt against president. Chapter V describes the legal basis and missions of the S.S. Every protective operational mission of the U.S SS is peformed by the legal basis and democratic procedure. It is followed by concluding observation made in Chapter VI.

  • PDF

Combined Relay Selection and Cooperative Beamforming for Physical Layer Security

  • Kim, Jun-Su;Ikhlef, Aissa;Schober, Robert
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.364-373
    • /
    • 2012
  • In this paper, we propose combined relay selection and cooperative beamforming schemes for physical layer security. Generally, high operational complexity is required for cooperative beamforming withmultiple relays because of the required information exchange and synchronization among the relays. On the other hand, while it is desirable to reduce the number of relays participating in cooperative beamforming because of the associated complexity problem, doing so may degrade the coding gain of cooperative beamforming. Hence, we propose combined relay selection and cooperative beamforming schemes, where only two of the available relays are selected for beamforming and data transmission. The proposed schemes introduce a selection gain which partially compensates for the decrease in coding gain due to limiting the number of participating relays to two. Both the cases where full and only partial channel state information are available for relay selection and cooperative beamforming are considered. Analytical and simulation results for the proposed schemes show improved secrecy capacities compared to existing physical layer security schemes employing cooperative relays.