• Title/Summary/Keyword: Security Program

Search Result 1,232, Processing Time 0.027 seconds

Development of Cyber Incident Response System Program of Industrial Control System (산업제어시스템 사이버침해사고 대응체계 프로그램 개발)

  • Kim, Eun-Ji;Kim, Ju-Yeon;Yun, Seon-Woo;Yoon, Joo-Hye
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.401-404
    • /
    • 2019
  • 최근 국가기반시설 산업제어시스템은 시나리오를 기반으로 시뮬레이션 훈련을 진행한다. 그러나 국내 ICS 보안 기술은 외부 경계 보호에 중점을 둔 시나리오가 대다수였기 때문에 내부에서 발생할 수 있는 시나리오 가이드라인이 상대적으로 부족하고 이를 평가하는 기준 또한 제대로 정의되어 있지 않다. 내부 공격이 증가함에 따라 국내에서도 사회공학적 기법에 초점을 둔 시뮬레이션 훈련을 진행할 필요가 있다. 이에 본 논문은 NEI 08-09 의 운영·관리항목 중 가장 빈번하게 발생하는 위협을 바탕으로 한 시나리오 및 구성요소를 개발하고, 이를 평가할 수 있는 명확한 기준을 제시하여 효과적인 비상대응 훈련을 수행할 수 있도록 한다.

Development of Fatigue Scale of Private Security Guards (민간경비원의 피로도 척도개발)

  • Kim, Kyong-Sik;Park, Young-Man
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.175-185
    • /
    • 2014
  • This study is to develop a fatigue scale for the private security guard for a private security guard to effectively manage fatigue were tested for validity and reliability. To achieve that, this study employed purposive sampling to draw 300 samples among private security guards working for the security firms registered in Seoul District Police Office as of 2014, and used 259 samples for final analysis. Fatigue scale was developed on the basis of the scale development methods and procedures in previous studies. For data processing, SPSSWIN 18.0 program was applied to conduct exploratory factor analysis, reliability analysis, and correlation analysis, and AMOS 18.0 program was employed to conduct confirmatory factory analysis. This study came to the following conclusion. First, the validity of the fatigue measurement tool was high. In other words, content validity was high, and construct validity was also high. The factor loading of exploratory factor analysis was .452, and the standard value of confirmatory factor analysis was .403. Therefore, the tool satisfied the basis value of fit index. The sub categories of fatigue, finally drawn from validity test, were mental fatigue, nervous system dysfunction, physical deformity, and exhaustion. Secondly, the reliability of the fatigue measurement tool was high. In other words, according to item analysis, the correlation between items and their sub categories, and between items and total score was more than .602, relatively high. And the reliability coefficient (Cronbach's ${\alpha}$) was high, or more than .658. Fatigue Scale tool will be developed by private security guards in the present study is to measure the validity and reliability verification is clearly tired of the private security guards than the tools that are used in other studies in the existing area.

Nuclear·Atomic Public Diplomacy: The Possibility of Expanding Toward New Issue Area (핵·원자력 공공외교: 새로운 영역으로의 확장 가능성)

  • Hanhyung Lee
    • Journal of Public Diplomacy
    • /
    • v.3 no.1
    • /
    • pp.43-63
    • /
    • 2023
  • Objectives: Nuclear security and atomic energy industry have always been the domain of political and economical diplomatic affairs. The issue of nuclear proliferation must be resolved politically or militarily given the importance of the problem, the impact it has on global security, the influence of major powers, and non-proliferation regimes. Considering scope of the budget, manpower, and scale of the project, the atomic energy issue was also viewed from an economic perspective. Therefore, the goal of this study is to depart from the conventional viewpoint and investigate if public diplomacy may be extended to a new issue domain of nuclear security and atomic energy. Methods: In order to determine whether there are any areas that overlap, the uniqueness of Korea's position in the nuclear security and atomic power domains is evaluated and compared with the traits of public diplomacy. Results: It seems plausible to broaden the scope and function of public diplomacy in that field given Korea's uniqueness in nuclear security and atomic energy issue and overlap with public diplomacy. This is especially true given that the state must take the leading role and that ongoing policy demands are made in light of Korea's security and economic structure. In reality, it is assessed that the Summer Fellows Program, run by the KAIST Nuclear Nonproliferation Education and Research Center (KAIST NEREC), has had a considerable impact on public diplomacy in the area of nuclear security and atomic energy. Conclusions: Nuclear security and atomic energy issues have traditionally been handled from the perspectives of political diplomacy, summit diplomacy, and economic diplomacy. However, this paper evaluate that the possibility of enhancing the role of public diplomacy in this issue area is high and underscore that the budget support, programs, and manpower for similar public diplomacy activities are needed. Through this, South Korea's nuclear security policy and atomic energy industry could be supported from international community and it will advance national interest.

Network Intrusion Detection System Using Gaussian Mixture Models (가우시안 혼합 모델을 이용한 네트워크 침입 탐지 시스템)

  • Park Myung-Aun;Kim Dong-Kook;Noh Bong-Nam
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.130-132
    • /
    • 2005
  • 초고속 네트워크의 폭발적인 확산과 함께 네트워크 침입 사례 또한 증가하고 있다. 이를 검출하기 위한 방안으로 침입 탐지 시스템에 대한 관심과 연구 또한 증가하고 있다. 네트워크 침입을 탐지위한 방법으로 기존의 알려진 공격을 찾는 오용 탐지와 비정상적인 행위를 탐지하는 방법이 존재한다. 본 논문에서는 이를 혼합한 하이브리드 형태의 새로운 침입 탐지 시스템을 제안한다. 기존의 혼합된 방식과는 다르게 네트워크 데이터의 모델링과 탐지를 위해 가우시안 혼합 모델을 사용한다. 가우시안 혼합 모델에 기반한 침입 탐지 시스템의 성능을 평가하기 위해 DARPA'99 데이터에 적용하여 실험하였다. 실험 결과 정상과 공격은 확연히 구분되는 결과를 나타내었으며, 공격 간의 분류도 상당 수 가능하였다.

  • PDF

Design and Implementation of Intrusion Evaluation Dataset Generator based on SSFNet (SSFNet 기반의 침입평가데이터 생성기 설계 및 구현)

  • Yi Young-Soo;Mun Gil-Jong;Kim Yong-Min;Noh Bong-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.917-920
    • /
    • 2006
  • 정보보호 분야에서 네트워크 시뮬레이터에 대한 관심이 커지고 있으나 여러가지 제약 때문에 연구 및 개발이 미흡하다. 특히 침입탐지 시뮬레이터의 평가를 위한 적절한 데이터가 존재하지 않아 침입탐지 시뮬레이터가 적절한지 판단할 근거 자료가 충분하지 않다. 본 논문에서는 네트워크 시뮬레이터에서 DARPA 99 데이터셋을 활용하는 방법으로 트래픽 생성기를 설계 및 구현 하였으며, 그 결과가 정상적으로 동작함을 확인하였다.

  • PDF

A Study on Facility Information System using GIS and Semantic Web in Underground Space

  • Cui, Yulan;Hwang, Hyun-Suk;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.12
    • /
    • pp.1843-1854
    • /
    • 2010
  • The utilization of underground space has recently increased with the complication of road, the rise of the land price, and the development of green technology. Underground space ranges from classical excavations to subway, underground cities, and shopping malls where there are crowds of people. At this time, government has spent a lot of money in installing various types of safety facilities for preparations of increasing potential disasters. Therefore, an effective facility management system is required. In this paper, we propose an information retrieval process to effectively extract the facilities' information based on the ontology and spatial analysis in underground space. The ontology-based searching supports hierarchical and associated results as well as knowledge sharing with hierarchy concepts. The spatial analysis based searching has "Buffer" and "Near" functions to operate on a map without understanding any property of the facility information.

U.S. FUEL CYCLE TECHNOLOGIES R&D PROGRAM FOR NEXT GENERATION NUCLEAR MATERIALS MANAGEMENT

  • Miller, M.C.;Vega, D.A.
    • Nuclear Engineering and Technology
    • /
    • v.45 no.6
    • /
    • pp.803-810
    • /
    • 2013
  • The U.S. Department of Energy's Fuel Cycle Technologies R&D program under the Office of Nuclear Energy is working to advance technologies to enhance both the existing and future fuel cycles. One thrust area is in developing enabling technologies for next generation nuclear materials management under the Materials Protection, Accounting and Control Technologies (MPACT) Campaign where advanced instrumentation, analysis and assessment methods, and security approaches are being developed under a framework of Safeguards and Security by Design. An overview of the MPACT campaign's activities and recent accomplishments is presented along with future plans.

Profile based Malicious Loader Attack Detection and Filtering Method (프로파일 기반 악성 로더 공격탐지 및 필터링 기법)

  • Yoon, E-Joong;Kim, Yo-Sik
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.21-29
    • /
    • 2006
  • Recently, illegal manipulation and forgery threats on computer softwares are increasing. Specially, forge the code of program and disrupt normal operation using a malicious loader program against the Internet application client. In this paper, we first analyze and generate signatures of malicious loader detection. And, we propose a method to secure the application client based on profiling which can detect and filter out abnormal malicious loader requests.

  • PDF

Analysis of the combined technique with proofs of ownership and verification of integrity in cloud (클라우드에서 소유권 증명과 무결성 검증이 결합된 기법에 대한 분석)

  • Kim, Dong-ee;Park, Hyo-min;Shin, Sang Uk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.226-227
    • /
    • 2016
  • 클라우드 컴퓨팅 환경에서 사용자 관점에서는 아웃소싱한 데이터의 기밀성 및 무결성을, 클라우드 제공자 입장에서는 저장 공간 및 대역폭 효율을 모두 제공하는 것이 필요하다. 본 논문에서는 이를 동시에 만족시키기 위해 아웃소싱된 데이터의 중복 제거 기법과 클라우드 스토리지에 저장된 데이터 파일의 무결성 검증 기법이 결합된 기법에 대해 분석한다.

Design and Implementation of An Application Program Logging System with Linux Security Module (리눅스 보안 모듈을 이용한 응용 프로그램 로깅 시스템 설계 및 구현)

  • Park, Nam-Youl;Song, Choon-Hwan H.;Kim, Chong-Il;Noh, Bong-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.1081-1084
    • /
    • 2001
  • 리눅스 시스템의 급격한 사용증가에 비해 리눅스 보안에 대한 인식은 취약한 상태이며, 응용수준에서 제공되는 로깅시스템은 위.변조의 가능성이 높다. 특히 서버 데몬에서의 감시나 추적은 전적으로 응용수준에 의존하고 있는 상태이므로 현재의 특정한 자료나 연결 요청이 공격인지 아닌지를 판단하기에는 어려움이 많다. 본 논문에서는 리눅스의 시스템 호출 로깅 모듈인 리눅스 보안 모듈(LSM:Linux Security Module)을 이용하여 서버 데몬이나 유틸리티 등에 대해 선택적으로 응용프로그램에 대한 동작상태를 감사 및 추적하여 침입여부를 판단할 수 있도록 지원하는 응용 프로그램 로깅 시스템(ALOGS: Application Program Logging System)을 설계 및 구현하고자 한다.

  • PDF