• Title/Summary/Keyword: Security and Resilience

Search Result 103, Processing Time 0.028 seconds

A Study on Risk Assessments and Protection Improvement for Electric Power Infrastructures against High-altitude Electromagnetic Pulse (전력기반시설의 고 고도 핵 전자기파에 대한 위험성 검토 및 방호 개선방안 연구)

  • Chung, Yeon-Choon
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.43-50
    • /
    • 2019
  • In a hyper-connected society, electric power infrastructures and information and communication infrastructures are the core of critical national infrastructures. However, electric power infrastructure is very deadly to high-frequency nuclear electromagnetic pulse (HEMP) threats recently issued by North Korea, so the resilience through rapid recovery after attack is directly related to the survivability of our country. Therefore, electric power infrastructure should take precedence over any other key infrastructure, with preemptive protection measures and fast recovery plans. In this paper, the characteristics of the HEMP threats was examined, and the risks and effective major protection measures of the electric power infrastructures are discussed. In the future, it is expected that it will be able to help establish the direction of enactment and revision of legal schems related to the 'high power EMP infringement prevention' for Korea's electric power infrastructures.

Are There Any Solutions for the Cybersecurity Education Gap in the Public Sector? (공공부문의 사이버보안 교육격차 해소를 위한 탐색적 연구)

  • Lee, Song-ha;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.973-985
    • /
    • 2021
  • South Korea has been guaranteed the efficiency and the convenience of administrative work based on long-term experience and well-established ICT infrastructure. Vice versa, South Korea is always exposed to various scale cyber-attacks. It is an important element of national competitiveness to secure cybersecurity resilience and response in the public sector. For this, the well-trained cybersecurity professionals' retention and support for their capacity development through retraining are critical. As the Special Act on Balanced National Development, most public agencies moved to provincial areas, but the provincial areas are not ready for this, thus the workforce can't get enough retaining courses. We study to analyze whether there is a gap in cybersecurity educational opportunities or needs in the public sector depending on regions, institution type, and personal traits. This paper aims to suggest solutions for the cybersecurity education gap in the public sector based on the empirical analysis results.

A Secure and Practical Encrypted Data De-duplication with Proof of Ownership in Cloud Storage (클라우드 스토리지 상에서 안전하고 실용적인 암호데이터 중복제거와 소유권 증명 기술)

  • Park, Cheolhee;Hong, Dowon;Seo, Changho
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1165-1172
    • /
    • 2016
  • In cloud storage environment, deduplication enables efficient use of the storage. Also, in order to save network bandwidth, cloud storage service provider has introduced client-side deduplication. Cloud storage service users want to upload encrypted data to ensure confidentiality. However, common encryption method cannot be combined with deduplication, because each user uses a different private key. Also, client-side deduplication can be vulnerable to security threats because file tag replaces the entire file. Recently, proof of ownership schemes have suggested to remedy the vulnerabilities of client-side deduplication. Nevertheless, client-side deduplication over encrypted data still causes problems in efficiency and security. In this paper, we propose a secure and practical client-side encrypted data deduplication scheme that has resilience to brute force attack and performs proof of ownership over encrypted data.

A New Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 새로운 키 사전 분배 구조)

  • Kim, Tae-Yeon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.183-188
    • /
    • 2009
  • Wireless sensor networks will be broadly deployed in the real world and widely utilized for various applications. A prerequisite for secure communication among the sensor nodes is that the nodes should share a session key to bootstrap their trust relationship. The open problems are how to verify the identity of communicating nodes and how to minimize any information about the keys disclosed to the other side during key agreement. At any rate, any one of the existing schemes cannot perfectly solve these problems due to some drawbacks. Accordingly, we propose a new pre-distribution scheme with the following merits. First, it supports authentication services. Second, each node can only find some indices of key spaces that are shared with the other side, without revealing unshared key information. Lastly, it substantially improves resilience of network against node capture. Performance and security analyses have proven that our scheme is suitable for sensor networks in terms of performance and security aspects.

The Effect of Veterans' Positive Psychological Capital on the Will to Re-employment (제대군인의 긍정심리자본이 재취업 의지에 미치는 영향 -정보보안관련업체 취업희망자를 중심으로-)

  • Kim Bo Ram;Hahn Jae Phil
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.101-108
    • /
    • 2023
  • Military organizations have stricter ranks than other organizations, and the age of retirement is lower than that of civil servants in other fields. In a rapidly changing society with a high unemployment rate, it is very important to prepare psychological resources for self-management by improving individual positive strengths throughout life, including job search activities. Various studies are being attempted on positive psychological capital, employment, and productivity that emphasize the strength of positive resources and, from this point of view, contribute to productivity improvement. In this study, the effect of the positive psychological capital of discharged soldiers on their will to re-employment was investigated through questionnaires targeting actual veterans. As a result, it is found that hope, self-efficacy, resilience, and optimism influenced the will to re-employment in the order.

Real Estate Industry in the Era of Technology 5.0

  • Sun Ju KIM
    • The Journal of Economics, Marketing and Management
    • /
    • v.11 no.6
    • /
    • pp.9-22
    • /
    • 2023
  • Purpose: This paper aims to suggest ways to apply the leading technologies of Industry 5.0 to the housing welfare field, tasks for this, and policy implications. Research design, data, and methodology: The analysis method of this study is a literature study. The analysis steps are as follows. Technology trends and characteristics of Industry 5.0 were investigated and analyzed. The following is a method of applying technology 5.0 in the industrial field. Finally, the application areas of each technology and the challenges to be solved in the process were presented. Results: The results of the analysis are 1) the accessibility and diffusion of technology. This means that all citizens have equal access to and use of the latest technology. To this end, the appropriate use of technology and the development of a user-centered interface are needed. 2) Data protection and privacy. Residential welfare-related technologies may face risks such as personal information leakage and hacking in the process of collecting and analyzing residents' data. 3) Stability, economic feasibility, and sustainability of the technology. Conclusions: The policy implications include: 1) Enhancing technology education and promotion to improve tech accessibility for groups like the low-income, rural areas, and the elderly, 2) Strengthening security policies and regulations to safeguard resident data and mitigate hacking risks, 3) Standardization of technology, 4) Investment and support in R&D.

Integrated Flood Risk Management through Modelling of Nature Based Solutions

  • Bastola, Shiksha;Kareem, Kola Yusuff;Park, Kiddo;Jung, Younghun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.160-160
    • /
    • 2022
  • Floods are the most common natural disasters and are annually causing severe destructions worldwide. Human activities, along with expected increased extreme precipitation patterns as a result of climate change enhance the future potential of floods. There are proven evidence that infrastructure based responses to flood disaster is no longer achieving optimum mitigation and have created a false sense of security. Nature-based solutions(NBS) is a widely accepted sustainable and efficient approach for disaster risk reduction and involves the protection, restoration, or management of natural and semi-natural ecosystems to tackle the climate and natural crisis. Adoption of NBS in decision-making, especially in developing nations is limited due to a lack of sufficient scenario-based studies, research, and technical knowledge. This study explores the knowledge gap and challenges on NBS adoption with case study of developing nation, specially for flood management, by the study of multiple scenario analysis in the context of climate, land-use change, and policies. Identification and quantification of the strength of natural ecosystems for flood resilience and water management can help to prioritize NBS in policymaking leading to sustainable measures for integrated flood management.

  • PDF

Match-Fixing in Korean Football: Corruption in the K-League and the Importance of Maintaining Sporting Integrity

  • Brooks, Graham;Lee, Ju-Lak;Kim, Hak-Kyong
    • International Journal of Contents
    • /
    • v.8 no.2
    • /
    • pp.82-88
    • /
    • 2012
  • Fraud and corruption is a problem that undermines the credibility and integrity of all sport. It affects fans, owners, shareholders, officials, and players. With the recent scandal in the K-League in Korea, the importance of maintaining the integrity of Korean football is presently of great importance. While other European or Asian football leagues have been plagued with fraud and corruption, Korea has maintained its professional sporting integrity successfully until recent times. This paper is an examination as to why players in the K-League succumbed to match- fixing in 2011. Firstly, we discuss the important role of sport in Korea, which is not to be underestimated. Secondly, we briefly illustrate the range and types of fraud and corruption in international football. Thirdly, we focus on the match-fixing and gambling scandal currently engulfing the K-League. Fourthly, we make some practical suggestions on how to combat and increase resilience to fraud and corruption in football. Finally, in the conclusion, we suggest that much needs to be done to reduce the incident of fraud and corruption in football worldwide, particularly through employing a clear counter fraud strategy.

Feasibility Study of IEEE 802.15.4 LR-WPAN to the Real-time Voice Application (IEEE 802.15.4 LR-WPAN의 실시간 음성 데이터 응용에 대한 적용 가능성 연구)

  • Hur, Yun-Kang;Kim, You-Jin;Huh, Jae-Doo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.2
    • /
    • pp.82-94
    • /
    • 2007
  • Wireless sensor networking technology is one of the basic infrastructures for ubiquitous environment. It enables us to gather various sensory data such as temperature, humidity, gas leakage, and speed from the remote sensor devices. To support these networking functions, IEEE WPAN working group makes standards for PHY and MAC, while ZigBee Alliance defines the standards for the network, security, and applications. The low-rate WPAN was emerged to have the characteristics of network resilience, low cost, and low power consumption. It has a broad range of applications including, but not limit to industrial control and monitoring, home automation, disaster forecast and monitoring, health care. In order to provide more intelligent and robust services, users want voice-based solutions to accommodate to low-rate WPAN. In this paper, we have evaluated voice quality of an IEEE 802.15.4 standard compliant voice node. Specifically, it includes the design of a voice node and experiments based on the prediction of voice quality using the E-model suggested by ITU-T G.107, and the network communication mechanisms considering beacon-enabled and nonbeacon-enabled networks for real-time voice communications.

  • PDF

A Study on the Floating House for New Resilient Living (새로운 탄력적인 생활을 위한 플로팅 주택에 대한 연구)

  • Moon, Changho
    • Journal of the Korean housing association
    • /
    • v.26 no.5
    • /
    • pp.97-104
    • /
    • 2015
  • This paper aims to discuss the concept of resilience in floating housing, to investigate the resilient features of floating houses & to review the possibility of floating housing as a new form of resilient living, and to suggest some reference ideas for the planning and design of floating housing projects. Resilient features of the floating house can be summarized as the buoyant characteristics for natural disasters, the easy employment & potential use of renewable and nearly self-sufficient energy systems in locations subject to limited energy sources, the movability, mobility, long life, water recycle system, prefabrication and modular construction with the potential for reduced environmental impact. Additional benefits include the potential for a peaceful and comfortable atmosphere due to direct connections with nature, good relationship with neighbors, a solid social spirit of unity, and sense of security. Considering the resilient features of floating house at a time of serious climate change requires a new paradigm, and floating/amphibious/floatable housing has great possibility as a new form of resilient living.