• 제목/요약/키워드: Security Case

검색결과 1,799건 처리시간 0.03초

Analysis of Information Security Issues and Classification through Metaverse Infringement Cases

  • Mi-Na, Shim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권1호
    • /
    • pp.13-22
    • /
    • 2023
  • In the age of Web 3.0, the metaverse is emerging as a new innovative element to replace the Internet. Leading major ICT companies, it is striving to become a metaverse platform or infrastructure-oriented company. Along with the expansion of the VR and AR market, governments of each country are investing large budgets in this field. However, security concerns about metaverse are also growing. In addition to potential damage to infrastructure, platform and services, personal information leakage and privacy damage are expected to increase further. In this study, we investigated and closely analyzed cases of infringement on the infrastructure, platform, and service of Metaverse. We have clearly identified the current state of metaverse security and the characteristics of the risks of greatest concern. The research procedure is composed of a method of determining the metaverse security area for case analysis first and deriving the type of threat by area through the type of infringement. In particular, the results were mapped into Domain, Case, and Threat, and the implications of the results were analyzed. Through these results, researchers want to contribute to finding the right direction of research by clearly understanding the latest metaverse security status.

금융회사 대형 IT프로젝트 추진 시 외주직원에 대한 보안정책 적용 사례 연구 (A Case Study on the Application of Security Policy for Outsourcing Personnel in case of Large-Scale Financial IT Projects)

  • 손병준;김인석
    • 한국인터넷방송통신학회논문지
    • /
    • 제17권4호
    • /
    • pp.193-201
    • /
    • 2017
  • 금융회사에서는 내부자에 의한 개인정보유출 방지 및 내부통제 강화를 위하여 출력물 보안, 인터넷 망 분리시스템, 고객정보분리보관, 개인정보 암호화, 개인정보검색, DLP(Data Loss Prevention), 출력물보안, 개인정보모니터링 시스템 등의 보안 솔루션을 도입 운영하고 있다. 아울러 금융회사는 금융 소비채널의 변화 및 금융상품의 패러다임 변화를 겪으며 무한경쟁시대로 진입하고 있다. 금융회사가 보유한 고객정보의 보안에 대한 필요성이 높아지고 있다. '2014년 1월 발생한 카드 3사 대량고객정보 유출 사고는 외주 직원 한 명이 주요 카드사의 고객 개인정보를 탈취하여 대출광고업자와 대출모집인에게 팔아 넘겨졌던 사례이다. 대형 보안사고가 발생한지 3년여의 시간이 흐른 지금도 IT 외주인력의 보안 위협은 여전하다. 정부 및 감독기관은 '금융분야 개인정보 유출 재발방지 종합대책' 이행 점검 및 개인정보유출에 대한 금융회사 제재수준 강화를 진행하고 있다. 본 논문은 금융회사 대형 IT프로젝트 추진 시에 외주직원에 대한 보안정책 적용 사례 분석을 통해 IT프로젝트 성공 및 효율적인 보안 준수를 위한 정책 설정을 연구함으로서 대형 IT프로젝트의 성공과 외주인력의 보안사고 위험도를 최소화할 수 있는 방안을 사례를 통해 제시해 보고자 한다.

물리보안 관제시스템의 보안위협 사례를 통한 취약점 분석 및 대응방안 연구 (Problem Analysis and Countermeasures Research through Security Threat Cases of Physical Security Control Systems)

  • 고윤성;박광혁;김창수
    • 한국멀티미디어학회논문지
    • /
    • 제19권1호
    • /
    • pp.51-59
    • /
    • 2016
  • Physical security protecting people from physical threats, such as a person or vehicle, has received a great attention. However, it has many risks of hacking and other security threats because it is highly dependent on automated management systems. In addition, a representative system of physical security, a CCTV control system has a high risk of hacking, such as video interceptions or video modulation. So physical security needs urgent security measures in accordance with these threats. In this paper, we examine the case of security threats that have occurred in the past, prevent those from threatening the physical security, and analyze the security problem with the threats. Then we study the countermeasures to prevent these security threats based on the problems found in each case. Finally we study for the method to apply these countermeasures.

Security Awareness among Students in Campus Environment: Case Study

  • Najihah Osman;Haniza N;Zulkiflee M.
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.188-198
    • /
    • 2023
  • In this era of globalization without limitation, many security issues occur, especially in a public network. Internet users significantly increased every single day. However, only some users are aware of security issues when they use Internet services. For the campus network environment, both staffs and students are susceptible to security threats such as data theft, unauthorized access and more due to different levels of awareness towards security threats. This paper is to study the level of awareness among students on security issues based on KSA model. As a case study, the survey was distributed among students in the UTeM campus network. A quantitative study was conducted, and a structured questionnaire has been designed and distributed among students. The variables were focused on three (3) aspects, which are Knowledge, Skill and Ability (KSA). The finding shows the relationship between KSA with the level of awareness among students has been revealed. From the result, Knowledge is the most significant aspect that contributes to high awareness. For the future, a study about increasing students' knowledge about security issues should be addressed.

보안위험분석을 위한 평가기반 CBR모델 (The Evaluation-based CBR Model for Security Risk Analysis)

  • 방영환;이강수
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제34권7호
    • /
    • pp.282-287
    • /
    • 2007
  • 정보시스템을 이용하는 금융, 무역, 의료, 에너지, 교육 등 사회 각 분야에서 정보화가 급속하게 진전되고 있다. 정보시스템에 대한 보안관리는 위험분석평가가 선행 되어야하며, 보안위험분석은 요구되는 정보보호서비스의 취약점을 해결하고 위협으로부터 시스템을 안전하게 관리할 수 있는 최선의 방법이다. 본 논문에서는 최적의 평가계획을 수립한 수 있는 평가사례기반추론 기능을 모델링하였다. 평가 사례기반추론(case-based reasoning) 기능은 보안위험분석평가를 프로젝트단위로 관리하며, 기존의 평가사례 간유사도를 평가하고, 유사한 평가 사례를 바탕으로 최적의 보안위험분석평가 계획을 수립할 수 있다.

The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd.

  • Lee, Kyung-bok;Lim, Jong-in
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권2호
    • /
    • pp.857-880
    • /
    • 2016
  • Due to an increasing number of cyberattacks globally, cybersecurity has become a crucial part of national security in many countries. In particular, the Digital Pearl Harbor has become a real and aggressive security threat, and is considered to be a global issue that can introduce instability to the dynamics of international security. Against this context, the cyberattacks that targeted nuclear power plants (NPPs) in the Republic of Korea triggered concerns regarding the potential effects of cyber terror on critical infrastructure protection (CIP), making it a new security threat to society. Thus, in an attempt to establish measures that strengthen CIP from a cybersecurity perspective, we perform a case study on the cyber-terror attacks that targeted the Korea Hydro & Nuclear Power Co., Ltd. In order to fully appreciate the actual effects of cyber threats on critical infrastructure (CI), and to determine the challenges faced when responding to these threats, we examine factual relationships between the cyberattacks and their responses, and we perform analyses of the characteristics of the cyberattack under consideration. Moreover, we examine the significance of the event considering international norms, while applying the Tallinn Manual. Based on our analyses, we discuss implications for the cybersecurity of CI in South Korea, after which we propose a framework for strengthening cybersecurity in order to protect CI. Then, we discuss the direction of national policies.

국가안보와 내부의 적 대응방안 연구 -독일 통일과정 사례를 중심으로- (On the Study of National Security and Corresponding Strategies gainst Inside Enemies - A Case Study of German Unification Process -)

  • 김규남
    • 융합보안논문지
    • /
    • 제13권5호
    • /
    • pp.11-18
    • /
    • 2013
  • 국가안보란? 국가의 안전보장을 줄여 이르는 말이다. 현재 우리의 안보위협은 주적과 잠재적인 적의 위협으로 구분할 수 있으며 주적은 다시 내부의 적과 외부의 적으로 구분한다. 아놀드 토인비는 "국가의 멸망은 외부가 아니라 내부의 분열로 시작 된다"고 하였다. 즉 내부의 적을 더 경계하라는 뜻인데 과연 우리는 얼마나 국민의 분열과 체제전복을 시도하는 내부의 적을 인식하고 있는가? 본고에서는 일부이기는 하나 사회 전 분야에 침투하여 적과의 내통은 물론 유언비어의 날조, 폭력시위를 선동하고 심지어 합법을 가장하여 입법기관에 까지 입성하여 국가전복을 시도하는 우리 내부의 적과 그 숙주세력인 동조자 및 방조자들을 어떻게 봐야하며 선진국의 국가 전복세력에 대한 대응실태와 과거 서독이 체제 수호를 위해 노력했던 교훈을 토대로 우리나라가 자유민주주의 체제 수호를 위해 내부의 적에 대한 전 역량이 결집된 대응방안을 제시하고자 한다.

The Security Establishment for Cloud Computing through CASE Study

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • 제27권6호
    • /
    • pp.89-99
    • /
    • 2020
  • Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.

가청 주파수대 음장 변화 측정 기반 침입 감지 기술 (Intrusion detection based on the sound field variation of audible frequency band)

  • 이성규;박강호;양우석;김종대;김대성;김기현;왕세명
    • 한국소음진동공학회:학술대회논문집
    • /
    • 한국소음진동공학회 2010년도 추계학술대회 논문집
    • /
    • pp.187-192
    • /
    • 2010
  • In this paper, intrusion detection technique based on the sound field variation of audio frequency in the security space is proposed. The sound field formed by sound source can be detected with the microphone when the obstacle or intruder is positioned. The sound field variation due to the intruder is based on the interference of audio wave. With the help of numerical simulation of sound field formations, the increase or decrease of sound pressure level is analyzed not only the obstacle, but also the intruder. Even the microphone is positioned behind the source, sound pressure level can be increase or decrease due to the interference. Frequency response test is performed with Gaussian white noise signal to get the whole frequency response from 0 to half of sampling frequency. There are three security cases. Case 1 is the situation of empty space with and without intruder, case 2 is the situation of blocking obstacle with and without intruder, and case 3 is the situation of side blocking obstacle with and without intruder. At each case, the frequency response is obtained first at the security space without intruder, and second with intruder. From the experiment, intruder size of $50cm{\times}50cm$ can be successfully detected with the proposed technique. Moreover, the case 2 or case 3 bring about bigger sound field variation. It means that the proposed technique have the potential of more credible security sensing in real situation.

  • PDF

가청 주파수대 음장 변화 측정 기반 침입 감지 기술 (Intrusion Detection Based on the Sound Field Variation of Audible Frequency Band)

  • 이성규;박강호;양우석;김종대;김대성;김기현;왕세명
    • 한국소음진동공학회논문집
    • /
    • 제21권3호
    • /
    • pp.212-219
    • /
    • 2011
  • In this paper, intrusion detection technique based on the sound field variation of audio frequency in the security space is proposed. The sound field formed by sound source can be detected with the microphone when the obstacle or intruder is positioned. The sound field variation due to the intruder is mainly caused by the interference of audio wave. With the help of numerical simulation of sound field formations, the increase or decrease of sound pressure level is analyzed not only by the obstacle, but also by the intruder. Even the microphone is positioned behind the source, sound pressure level can be increased or decreased due to the interference of sound wave. Frequency response test is performed with Gaussian white noise signal to get the whole frequency response from 0 to half of sampling frequency. There are three security cases. Case 1 is the situation of empty space with and without intruder, case 2 is the situation of blocking obstacle with and without intruder, and case 3 is the situation of side blocking obstacle with and without intruder. At each case, the frequency response is obtained first at the security space without intruder, and second with intruder. From the experiment, intruder size of diameter of 50 cm pillar can be successfully detected with the proposed technique. Moreover, the case 2 and case 3 bring about bigger sound field variation. It means that the proposed technique have the potential of more credible security guarantee in real situation.