• 제목/요약/키워드: Physical threats

검색결과 145건 처리시간 0.029초

국가기반시설 물리적 방호체계 운영개념 및 설계방법 개선방안 연구: 원자력발전소를 중심으로 (A Study on the Concept of Operations and Improvement of the Design Methodology for the Physical Protection System of the National Infrastructure - Focused on Nuclear Power Plants -)

  • 나석종;성하얀;최선희
    • 시큐리티연구
    • /
    • 제61호
    • /
    • pp.9-38
    • /
    • 2019
  • 한국의 국가기반시설은 시설규모가 증가하고 밀집되어 강화된 북한의 국지도발, 테러공격을 위한 풍부하고 매력적인 잠재적 표적으로 식별될 것이다. 또한 드론위협, 주 52시간 근무제도에 따른 경비병력 부족 등의 보안환경 변화에 따라 현 물리적 방호체계에 대한 유효성과 적절성을 재평가하고 전환을 고려할 시점으로 사료된다. 본 연구에서는 국가기반시설 중 원자력발전소의 외곽 물리적 방호체계에 집중하여 국가 기반시설 외곽 물리적 방호체계의 전환 방향과 개선방안을 운영개념 및 설계 방법론 측면에서 연구하였다. 원자력발전소에 집중하는 이유는 원자력발전소는 피해 시 전기발전 중단의 단기적인 피해와 함께, 방사능 물질 유출과 오염에 따르는 광범위하고 장기적인 피해가 발생하므로 가장 높은 보안수준을 필요로 하기 때문이다. 개선방향 도출 목표로 국내 연구동향과 국내·해외 관련법을 종합 검토하고 한국의 특수성을 고려하여, 과학화, 기동화, 유연성으로 운영개념을 재설정하고 체계전환의 기준을 수립하였다. 새로운 외곽 물리적 방호체계의 기술적 성능개선을 위하여 개별설계에서 탈피, 고신뢰성·다방법론 기반의 통합설계 방법론 적용방안을 연구하고 구매제도 개선 및 해외 수출, 타(他)국가기반시설로의 확대적용을 제언한다.

개인정보 손해배상책임 보장제도의 쟁점과 과제 (Issues and Tasks of Personal Information Protection Liability Insurance)

  • 이수연;권헌영
    • 한국IT서비스학회지
    • /
    • 제19권1호
    • /
    • pp.37-53
    • /
    • 2020
  • Today, our society is exposed to cyber threats, such as the leakage of personal information, as various systems are connected and operated organically with the development of information and communication technology. With the impact of these cyber risks, we are experiencing damage from the virtual world to the physical world. As the number of cases of damage caused by cyber attacks has continued to rise, social voices have risen that the government needs to manage cyber risks. Thus, information and telecommunication service providers are now mandatory to have insurance against personal information protection due to amendment of "the Act on Promotion of Information and Communication Network Utilization and Information Protection". However, the insurance management system has not been properly prepared, with information and communication service providers selecting the service operators based on sales volume rather than selecting them based on the type and amount of personal information they store and manage. In order for the personal information protection liability insurance system to be used more effectively in line with the legislative purpose, effective countermeasures such as cooperation with the government and related organizations and provision of benefits for insured companies should be prepared. Thus, the author of this study discuss the current status of personal information protection liability insurance system and the issues raised in the operation of the system. Based on the results of this analysis, the authors propsoe tasks and plans to establish an effective personal information protection liability insurance system.

ACT를 이용한 AMI 보안 분석 (Security Analysis of AMI Using ACT)

  • 위미선;김동성;박종서
    • 정보보호학회논문지
    • /
    • 제23권4호
    • /
    • pp.639-653
    • /
    • 2013
  • 스마트 그리드는 기존 전력망에 IT 기술을 접목하여 에너지 효율을 최적화하는 차세대 지능형 전력망으로 미국, 유럽, 일본 등 전 세계적으로 기술개발이 이루어지고 있으며 실증사업을 추진하고 있다. 최근 스마트 그리드에 대한 공격 사례가 증가되고 있으며 개인정보의 사용 및 유출의 피해가 높아지고 있다. 전력망이 더욱 복잡해지고 상호 연결됨에 따라 보안 분석과 평가에 대한 노력이 점차 중요해지고 있다. 본 논문에서는 스마트 그리드의 핵심 기술인 AMI(Advanced Metering Infrastructure)의 공격과 공격에 대한 대응책을 ACT(Attack Countermeasure Tree)를 이용하여 모델링 하였다. 보안 분석은 확률이 있는 경우와 확률이 없는 경우로 나누어서 수행하였다. 이러한 모델을 가지고 SHARPE(Symbolic Hierarchical Automated Reliability and Performance Evaluator)로 구현하여 다양한 경우의 확률과 ROA, ROI, Structure Importance, Birnbaum Importance에 대해 계산하였다.

BNP 멱승 알고리듬에 대한 물리적인 조합 공격 및 대응책 (A Physical Combined Attack and its Countermeasure on BNP Exponentiation Algorithm)

  • 김형동;하재철
    • 정보보호학회논문지
    • /
    • 제23권4호
    • /
    • pp.585-591
    • /
    • 2013
  • 최근 정보보호 장치를 이용하여 암호 알고리듬을 수행할 경우 부채널 공격과 오류 주입 공격을 결합한 물리적 조합 공격에 의해 비밀 키가 노출될 수 있음이 밝혀졌다. 특히, RSA 암호 시스템에서 수행하는 멱승 연산에 대해 한 번의 오류 주입과 전력 분석을 통해 조합 공격이 가능하다. 본 논문에서는 SPA(Simple Power Analysis)와 FA(Fault Attack)을 방어하기 위해 제안되었던 BNP(Boscher, Naciri, and Prouff) 멱승 알고리듬이 조합 공격에 취약함을 보이고자 한다. 또한, 오류 확산 기법에 기반하여 개인 키를 랜덤화시키는 대응 방안을 제안한다.

An IBC and Certificate Based Hybrid Approach to WiMAX Security

  • Rodoper, Mete;Trappe, Wade;Jung, Edward Tae-Chul
    • Journal of Communications and Networks
    • /
    • 제11권6호
    • /
    • pp.615-625
    • /
    • 2009
  • Worldwide inter-operability for microwave access (WiMAX) is a promising technology that provides high data throughput with low delays for various user types and modes of operation. While much research had been conducted on physical and MAC layers, little attention has been paid to a comprehensive and efficient security solution for WiMAX. We propose a hybrid security solution combining identity-based cryptography (IBC) and certificate based approaches. We provide detailed message exchange steps in order to achieve a complete security that addresses the various kind of threats identified in previous research. While attaining this goal, efficient fusion of both techniques resulted in a 53% bandwidth improvement compared to the standard's approach, PKMv2. Also, in this hybrid approach, we have clarified the key revocation procedures and key lifetimes. Consequently, to the best of knowledge our approach is the first work that unites the advantages of both techniques for improved security while maintaining the low overhead forWiMAX.

진화심리학적 관점에서의 불안 및 불안장애 (The Evolutionary Psychological Aspects of Anxiety and Anxiety Disorders)

  • 오강섭
    • 생물정신의학
    • /
    • 제24권2호
    • /
    • pp.45-51
    • /
    • 2017
  • Anxiety is one of the basic human emotions. From the evolutionary psychology point of view, it is a necessary factor for survival and prosperity of human beings that had been developed throughout time with the history of human survival and development. Anxiety plays the role of protecting one from social or physical threats. In reality, lacking of anxiety showed lots of examples of maladjustments. But the result of over-adjustment, which is overanxious disorder, is definitely disturbing one's survival and growth, and it can lead to anxiety disorder that needs to be treated. Anxiety from the evolutionary psychology point of view, started as a primary adjustment form and it evolves into various types of anxiety disorders that relates to the modern society's characters. Therefore, having the grasp of evolutionary psychology, which can be the base of treating anxiety and anxiety disorders, is very important. So from now on, studies for this aspect would need to be done as integrated and multidisciplinary studies not only by psychiatrists, but by including epidemiologists, psychologists, ecologists, biologists, and neuropsychologists. In this article, the author tried to review and explore the idea of anxiety and anxiety disorders from the evolutionary psychology point of view.

사물인터넷 보안 문제제기와 대안 (Security Vulnerability of Internet of Things and Its Solution)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제11권1호
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.

마아케팅의 생태학적(生態學的) 접근법(接近法)과 환경적(環境的) 접근법(接近法) (Ecological Approach and Environment Approach for Marketing)

  • 장광수
    • 산학경영연구
    • /
    • 제3권
    • /
    • pp.47-75
    • /
    • 1990
  • This study focuses on the ecological and environmental approach for marketing in the attempt to harmonize the objectives and resources of the organizations with the changing environment. This study presents the deductive and nomative method for analyzing recurrent marketing problem and contains seven chapters. The marketing environment is the place the company must start in searching for oportunities and in monitoring threats. It consists of all the actors and forces that affect the company's ability to transact can be divided into two componets-The marketing environment comperies a microenvironment consists of the actors in the company's immediate environment that affect its ability to serve its customers, namely, the company, market channal firms, customers, competitors and publics, the macroenvironment consists of the larger societal forces that affect all the actors in the macroenvironment, nanly, the demographic, economic, natural, technological and cultural forces. Most marketing executives took the phyisical environment for granted. Few consistered it one of the most dynamic elements in the totoal environment of business. However, two development have brought the physical environment to the forefront of business decision. The first has been labeled the ecological crisis-the polution and deterioration of air, water and land, the second is the accelerated depletion of the earth's natural resources. Currently, most product are designed to obtain an optimum combination of customer acceptances and production and distribution efficiencies. If we look to the future, products increasingly will be planned to obtain an optimum combination of market acceptance increasingly, efficiency and environmental protection. The entire ecological cycle of product will have to be considered.

  • PDF

여름철 건축현장 작업자의 작업복 착의 실태 및 작업 환경에 관한 연구 (Working Clothes and Working Environment of Workers at a Construction Site in Summer)

  • 최정화;박준희
    • 한국의류학회지
    • /
    • 제31권11호
    • /
    • pp.1520-1529
    • /
    • 2007
  • Workers on construction sites are exposed to multiple and varied threats. Of those, climatic factors such as high/low air temperatures and high/low humidity have a bad mental and physical health effect on workers. Especially, work in hot environment has a tendency to cause fatigue, reduce productivity and increase the incidence of accident. So, the purpose of this research was to understand working clothes and working environment of workers at a construction site in summer. The depth interview was performed by 45 workers of 4 different construction sites and the results were as follows. Workers wore average 4 items as clothing(upper, lower) and average 5 items as personal protective equipments(PPEs). They answered "head" is the hottest body area and must be protected during working. This means the necessity of development in safety hat. In addition, it should be developed working clothes and gaiters for alleviating heat stress and safety shoes for diminishing weight. It is expected that this research plays basic and important rolls to develop PPEs for reducing the heat stress of construction workers.

직장 내 괴롭힘 개념 개발: 병원간호사를 중심으로 (Conceptual Development of Workplace Bullying: Focusing on Hospital Nurses)

  • 이윤주;이은진
    • 보건교육건강증진학회지
    • /
    • 제31권1호
    • /
    • pp.57-70
    • /
    • 2014
  • Objectives: The purpose of this study was to build a conceptual framework of bullying in nursing workplace. Methods: A comprehensive literature review was conducted to identify concepts in relation to bullying in nursing workplace by searching research articles published between 1995 and 2013. In-depth interviews were performed with 14 nurses who experienced bullying at work. The Hybrid Model was applied for concept analysis which led to identify attributes of bullying in nursing workplace. Results: The antecedents of bullying in nursing workplace were offenders, victims, and administrators. They create negative effects on organizational culture and imbalance of power between authority and subordinate workers in the organization. Bullying in nursing workplace that occurred in the forms of inefficient organizational culture, imbalance of power, and the vulnerability of individual or individuals and groups of individuals formed an unstable dynamic. It is expressed as verbal and nonverbal bullying, work-related bullying, and external threats. Consequently, workplace bullying causes physical and psychological withdrawal and increased negative energy in an organization. Conclusions: Workplace bullying consisted of verbal abuse, alienation, unreasonable work processes, restriction on work-related rights, and external threat.