• 제목/요약/키워드: Security Activities

Search Result 983, Processing Time 0.028 seconds

State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis

  • Kookjin Kim;Jaepil Youn;Hansung Kim;Dongil Shin;Dongkyoo Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1273-1300
    • /
    • 2024
  • In the complex virtual environment of cyberspace, comprised of digital and communication networks, ensuring the security of information is being recognized as an ongoing challenge. The importance of 'Cyber Situation Awareness (CSA)' is being emphasized in response to this. CSA is understood as a vital capability to identify, understand, and respond to various cyber threats and is positioned at the heart of cyber security strategies from a defensive perspective. Critical industries such as finance, healthcare, manufacturing, telecommunications, transportation, and energy can be subjected to not just economic and societal losses from cyber threats but, in severe cases, national losses. Consequently, the importance of CSA is being accentuated and research activities are being vigorously undertaken. A systematic five-step approach to CSA is introduced against this backdrop, and a deep analysis of recent research trends, techniques, challenges, and future directions since 2019 is provided. The approach encompasses current situation and identification awareness, the impact of attacks and vulnerability assessment, the evolution of situations and tracking of actor behaviors, root cause and forensic analysis, and future scenarios and threat predictions. Through this survey, readers will be deepened in their understanding of the fundamental importance and practical applications of CSA, and their insights into research and applications in this field will be enhanced. This survey is expected to serve as a useful guide and reference for researchers and experts particularly interested in CSA research and applications.

A Study on the Improvement of Wired and Wireless Network Survivability using Integrated IP Management (IP 통합 관리를 통한 유·무선 네트워크의 생존성 향상에 관한 연구)

  • Kim, Si-hung;Koo, Ja-Hwan;Park, Byung-Yeon;Park, Hark-Soo;Choi, Jang-Won;Lee, Jae Young
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.43-50
    • /
    • 2003
  • Computer Communications and networks have been revolutionized by technological advances in the last decade. There has been an increasing interest in the network security because of the growing popularity of Internet and the importance of networking in business area. With this growing interest, Network engineers come to more concern about improving network survivability. In this paper, we suggest the method that improves the survivability of wired and wireless network. To achieve this goal, we propose the integrated IP management with monitoring network nodes in the same network and controlling its activities.

  • PDF

A Study on an Effective Countermeasure for Certification of Development of Disaster Management International Standards - Focus on ISO 22301 and Top Company Certification System in the Reduction Law - (재난관리 국제표준 개발에 대한 인증의 효율적인 대응 방안에 관한 연구 - ISO 22301과 경감법의 우수기업인증제도를 중심으로 -)

  • Cheung, Chong Soo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.49-56
    • /
    • 2012
  • As ISO22301 (Societal security-Business continuity management systems-Requirements) related to BCM (BCP) was established in May 2012, KS A ISO22301 (National Standards) will be enacted at the end of the year. Foreign certification agencies at home and abroad are expanding their business, accordingly. And it is expected that there will be a trade barrier such as a demand for compliance with the Standards in the trade between companies. Hence I am trying to find the countermeasures of domestic companies and ways to invigorate Top Company Certification System in the reduction law (The Legislative bill on the support of voluntary activities of enterprises for disaster reduction).

A Study on Configuration Management Methodology for Information Security Product based on Process Model (정보보호제품 개발을 위한 프로세스 기반 형상관리 방법론 연구)

  • Hwang, Sun-Myung
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.917-928
    • /
    • 2004
  • Common Criteria as ISO/IEC 15408 is used to assure and evaluate IT system security. As the Prime class of security assurance requirement, CM Configuration Management needs the more principled quality activities and practices for developer must be supported. So in this paper, we propose the well-defined CM method as guideline for TOE developer based on Process model including common criteria and develop the CMPET a quantitative process evaluating tool for CM using checklist. It can support useful process analyzing data to developer, evaluator and user.

A Profiling Case Study to Phishing Mail Attack Group (피싱 메일 공격조직에 대한 프로파일링 사례 연구)

  • Lee, Jae-il;Lee, Yong-joon;Kwon, Hyuk-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.91-97
    • /
    • 2020
  • Recently, phishing attacks targeting those involved in defense, security and unification have been on the rise. In particular, hacking attack organization Kimsuky has been engaged in activities to collect important information from public organizations through phishing attacks since 2013. In this paper, profiling analysis of phishing mail attack organization was performed. Through this process, we estimated the purpose of the attack group and suggested countermeasures.

A Common Data Model for Bridge Management and Maintenance Activities (교량 유지관리 업무를 위한 공통 자료모델)

  • Lee, Ji- Hoon;Kim, Bong-Geun;Lee, young Jung;Lee, Sang-Ho
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.4
    • /
    • pp.41-49
    • /
    • 2008
  • As bridges have been longer and bigger recently, lots of bridge management systems (BMS) have been developed for each bridge. However, the differences among the data models developed by different system developers give a serious problem in integrated information management for national security. The aim of this study is to develop a common data model which can be referred in development of the BMS. The existing BMS and work process by laws are carefully analyzed. Based on the analysis results, the bridge management and maintenance process is categorized into the four basic activity types. In addition, common data models for each the unit activity type are defined.

  • PDF

A Study on the Improvement of the Criteria for Calculating Compensation of Deferment of Defense Acquisition Projects (무기체계 연구개발시 지체상금 개선방안에 관한 연구)

  • Kim, SeongHo;Ryoo, YeonUk;Chun, SamHyun
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.31-37
    • /
    • 2017
  • This study compares the main features of the Act of National Contract with the Act of Defense Aquisition Program, which is the only one in Korea for long-term contracts. When applying the progress payments system to the defense R&D project, We can prevent disputes between parties and create a stable development environment through smooth partnerships. Smaller, direct and indirect losses can be alleviated, such as the waste of administrative power required to deal with disputes due to the payment of delayed prizes and restrictions on business activities due to the difficulty of forecasting the results of companies. In large measure, we will be able to procure a high-quality weapon system in a timely manner to support the security of the nation as well as international competitiveness through the growth of our defense industry.

Offline-to-Online Service and Big Data Analysis for End-to-end Freight Management System

  • Selvaraj, Suganya;Kim, Hanjun;Choi, Eunmi
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.377-393
    • /
    • 2020
  • Freight management systems require a new business model for rapid decision making to improve their business processes by dynamically analyzing the previous experience data. Moreover, the amount of data generated by daily business activities to be analyzed for making better decisions is enormous. Online-to-offline or offline-to-online (O2O) is an electronic commerce (e-commerce) model used to combine the online and physical services. Data analysis is usually performed offline. In the present paper, to extend its benefits to online and to efficiently apply the big data analysis to the freight management system, we suggested a system architecture based on O2O services. We analyzed and extracted the useful knowledge from the real-time freight data for the period 2014-2017 aiming at further business development. The proposed system was deemed useful for truck management companies as it allowed dynamically obtaining the big data analysis results based on O2O services, which were used to optimize logistic freight, improve customer services, predict customer expectation, reduce costs and overhead by improving profit margins, and perform load balancing.

E-Government Case Studies for Fixed Mobile Convergence and its security (해외국가사례분석을 통한 국가공공기관의 유무선서비스 활성화 제도 방안 및 보안)

  • Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1350-1354
    • /
    • 2014
  • Although there were many activities to provide FMC (Fixed Mobile Convergence) service by several foreign countries such as United States, FMC service could not make a good success for a number of reasons for example, customers indifference and lack of needs. On the other hand, recently FMC is showing its good progress at B2B market in foreign government such as in Germany and US satisfying e-government and BYOD (Bring Your Own Device) needs. This paper studies FMC service of foreign countries and as a result makes a analysis presenting issues for Korean e-government service. Also, we make several suggestions to energize FMC service success.

Network security and legal protection of the Criminal (네트워크보안의 형사법적 보호)

  • Kim, Hyung-Man
    • Journal of Digital Convergence
    • /
    • v.9 no.3
    • /
    • pp.11-19
    • /
    • 2011
  • The spread of computer and network gets various social and economic activities done quickly and efficiently. As a result, it makes a crime using network easy and increases the vulnerability of a social system. As there is a crime as a social being, we need to give careful consideration to the crime occurring in virtual space. Accordingly, the purpose of this paper is to investigate the regulatory need of the Criminal Procedure concerning the network security issues as the new legal and regulatory space that begins to be realized from the late of 20th century because of the extent of social threat. Above all, we addresses whether the amendment of existing legal regulations is necessary, based on the special characteristics of the virtual space.