• Title/Summary/Keyword: Physical threats

Search Result 138, Processing Time 0.028 seconds

OTP-Based Dynamic Authentication Framework for Virtual Machine Migration (가상머신 마이그레이션을 위한 OTP 기반 동적인증 프레임워크)

  • Lee, Eun-Ji;Park, Choon-Sik;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.315-327
    • /
    • 2017
  • Security threats such as unauthorized access and data tampering can occur during the virtual machine migration process. In particular, since virtual machine migration requires users to transfer important data and infrastructure information, it is relatively risky to other cloud services in case of security threats. For this reason, there is a need for dynamic authentication for virtual machine migration. Therefore, this paper proposes an OTP-based dynamic authentication framework to improve the vulnerabilities of the existing authentication mechanism for virtual machine migration. It consists of a virtual machine migration request module and an operation module. The request module includes an OTP-based user authentication process and a migration request process to a data center when a user requests a migration. The operation module includes a secure key exchange process between the data centers using SPEKE and a TOTP-based mutual authentication process between the data center and the physical server.

Global Development Strategy of Korean Marine (Leisure) Sports Industry Using SWOT / AHP Method

  • XU, Jin Shou;KIM, Suwan;LEE, Chunsu
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.8 no.3
    • /
    • pp.1-13
    • /
    • 2020
  • Purpose - Identify the priorities of important factors through SWOT/AHP analysis method for vitalization of global marine sports in Korea. Through this, we will identify prerequisites and strategies for Korean marine sports to become a global powerhouse, including revitalizing the Korean Wave for Chinese consumers. It also revitalizes global competitiveness and draws policy implications. Research design and methodology - Through interviews with experts and literature data, elements of important opportunities, threats, strengths and weaknesses of marine sports are summarized. Based on this SWOT, the AHP technique is applied to determine which is first and what is important between the factors that save opportunities and increase strengths, and measures to cope with threats and factors that complement weaknesses. Through this, the priority factor of experts suggests a plan for activating strategic marine sports. Results - First, the current status of marine sports in Korea and the perception of consumers are grasped through current data and literature research. Sub-elements are derived based on the theoretical literature on SWOT elements and opinions of experts. Prioritization is identified based on the AHP questionnaire of Korean experts. Conclusions - The strategy was derived through SWOT/AHP analysis, and the following implications were obtained. Regionally, Busan is psychologically and geographically adjacent to China and Japan. It is also an area where human exchanges are actively taking place along with the volume of imports and exports. Due to the increase in China's marine sports industry and population, it is necessary to expand the scope of Korea to marine sports beyond cosmetics, dramas, movies, and Korean waves (Hallyu) stars.

A Methodology for the Ship System Integration with Open Architecture : Focusing on the Total Ship Computing Environment based Architecture Building and Validation (개방형 구조(OA)를 이용한 함정체계통합 구축 방법론 : 통합함정컴퓨팅환경(TSCE)기반 아키텍처 구축 및 검증을 중심으로)

  • Park, Gang-Soo;Yoo, Byeong-Chun;Kim, Kyeongtaek;Choi, Bong-Wan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.3
    • /
    • pp.68-76
    • /
    • 2020
  • In a series of recent launch tests, North Korea has been improving the firepower of its missiles that can target South Korea. North Korea's missiles and submarines are capable of threatening targets in South Korea and are likely faster and more covert than the systems previously seen in North Korea. The advanced threats require that ROK Navy should not only detect them earlier than ever but also response quicker than ever. In addition to increasing threats, the number of young man that can be enlisted for military service has been dramatically decreasing. To deal with these difficulty, ROK navy has been making various efforts to acquire a SMART warship having enhanced defense capability with fewer human resources. For quick response time with fewer operators, ROK Navy should improve the efficiency of systems and control tower mounted on the ship by promoting the Ship System Integration. Total Ship Computing Environment (TSCE) is a method of providing single computing environment for all ship systems. Though several years have passed since the first proposal of TSCE, limited information has been provided and domestic research on the TSCE is still in its infancy. In this paper, we apply TSCE with open architecture (OA) to solve the problems that ROK Navy is facing in order to meet the requirements for the SMART ship. We first review the level of Ship System Integration of both domestic and foreign ships. Then, based on analyses of integration demands for SMART warship, we apply real time OA to design architecture for TSCE from functional view and physical view. Simulation result shows that the proposed architecture has faster response time than the response time of the existing architecture and satisfies its design requirements.

A Study on Quantitative methodology to Assess Cyber Security Risks of EMS (스마트그리드 체제에 따른 EMS의 보안 평가를 위한 정량적 방법론에 관한 연구)

  • Woo, Pil Sung;Kim, Balho H.
    • Journal of Energy Engineering
    • /
    • v.24 no.1
    • /
    • pp.123-131
    • /
    • 2015
  • This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. The EMS and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. In this study, the optimal power flow(OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.

Cyber-Threat Detection of ICS Using Sysmon and ELK (Sysmon과 ELK를 이용한 산업제어시스템 사이버 위협 탐지)

  • Kim, Yongjun;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.331-346
    • /
    • 2019
  • Global cyber threats to industrial control systems are increasing. As a result, related research and cooperation are actively underway. However, we are focusing on strengthening security for physical network separation and perimeter. Internal threats are still vulnerable. This is because the easiest and strongest countermeasure is to enhance border security, and solutions for enhancing internal security are not easy to apply due to system availability problems. In particular, there are many vulnerabilities due to the large number of legacy systems remaining throughout industrial control systems. Unless these vulnerable systems are newly built according to the security framework, it is necessary to respond to these vulnerable systems, and therefore, a security solution considering availability has been verified and suggested. Using Sysmon and ELK, security solutions can detect Cyber-threat that are difficult to detect in unstructured ICS.

A Study on Roles of CERT and ISAC for enhancing the Security of Smart Mobile Office (스마트 모바일 오피스 보안을 위한 CERT와 ISAC의 역할)

  • Lee, Keun-Young;Park, Tae-Hyoung;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.109-127
    • /
    • 2011
  • Mobile Office is a new type of working method in the workplace that can be used at any time or anywhere by connecting to the network with mobile devices. This allows people to do their jobs without their physical presence in their offices to use computers. The elements in mobile office environment are advancing. They include the widespread distribution of the smart phones, the network enhancing strategy in a ubiquitous environment and expansion of the wireless internet; however, there are not enough security guidelines or policies against these threats on the new environment, the mobile office, although there is the revitalization policy of smart work supported by the government. CERT and ISAC, the known security system as of now, could be used for the secure mobile office, In this paper, suggestions are to be provided for strengthening the security of smart mobile office by analysing the functions of CERT and ISAC.

A Random ID-based RFID Mutual authentication protocol for detecting Impersonation Attack against a back-end server and a reader (서버와 리더의 위장공격 탐지가 가능한 랜덤 ID기반 RFID 상호 인증 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.89-108
    • /
    • 2010
  • Recently many mutual authentication protocol for light-weight hash-based for RFID have been proposed. Most of them have assumed that communications between a backend server and reader are secure, and not considered threats for backend server and RFID reader impersonation. In the real world, however, attacks against database or reader are more effective rather than attacks against RFID tag, at least from attacker's perspective. In this paper, we assume that all communications are not secure to attackers except the physical attack, and considering realistic threats for designing a mutual authentication protocol based on hash function. And It supports a mutual authentication and can protect against the replay attack, impersonation attack, location tracking attack, and denial of service attack in the related work. We besides provide a secure and efficient RFID mutual authentication protocol which resists impersonation attacks on all of the entities and alow a backend server to search tag-related information efficiently. We conclude with analyzing the safety and efficiency among latest works.

Efficient Privacy Protection in Radio Frequency Identification Systems (RFID 시스템에서의 효율적인 프라이버시 보호 기법)

  • Yang Yuan;Lee Tae-seok;Lu XiaoYi;In Hoh Peter;Park Myong-Soon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.112-114
    • /
    • 2005
  • In today's hyper-competitive business environment, Radio Frequency Identification (RFID) technology is expected to enhance the operation efficiency of supplying chain management in both manufactures and retail industries. However, the widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Many authentication protocols for RFID have been proposed. They are helpful preventing passersby being scanned to determine what articles they are carrying. However, most of them would not prevent the bigger physical tracking problem of RFID, especially when being tracked by the 'constellation' of products they carry. We proposed this RFID scheme to prevent these tracking problems.

  • PDF

Hotel Workers and Workplace Harassment: A Comparison of South Korea and Japan

  • Jung, Hyo Sun;Yoon, Hye Hyun
    • Culinary science and hospitality research
    • /
    • v.23 no.1
    • /
    • pp.10-18
    • /
    • 2017
  • This study examined the positive impact of workplace harassment on the employees' counterproductive work behavior at deluxe hotel in Seoul and Tokyo. The study verified a differentiated influence based on the nationality of the employees. The hypothesized relationships in the model were tested simultaneously by using structural equation modelling. First, isolation/exclusion (${\beta}=.403$), disrespectful behavior (${\beta}=.312$), physical aggression (${\beta}=.245$), and verbal aggression (${\beta}=.133$) had a positive impact on counterproductive work behavior. However, threats/bribes (${\beta}=.091$) did not show a significant impact. Second, no significant moderating effect based on employees' nationality (Korean versus Japanese) was observed in the relationship between the five workplace harassment factors and CWB. This study will investigate workplace harassment perceived by deluxe hotel employees in Korea and Japan, and the obtained data can also be used to help identify realistic plans to reduce workplace harassment between bosses and subordinates at an organizational level.

Space Technology in Environmental Health (Emerging Vial Disease)

  • Nakhapakorn, Kanchana;Andrianasolo, Haja
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.411-416
    • /
    • 2002
  • The emergence of viral diseases transmitted is nowadays a central problem in the world. Problem, which is becoming very critical in developing countries, where the health systems are not yet enough developed to face the bursting of such diseases. Emerging viral diseases constitute one of the major threats to human being that are arising in the modern world. Besides bio-chemical and medical researches, new orientations are developed to understand the environmental dimensions of such emergence. Questions concerning the inter-plays between the environmental and disease dynamics are building up new investigations, both in remote sensing and GIS, for the elaboration of levels of organization of space and environment in relation to incidences, to gain understandings in these issues. Environmental attributes attached to land cover types: area, spatial heterogeneity and physical state, are derived from remote sensing and applied to uncover related dimensions of the Dengue disease.

  • PDF