• Title/Summary/Keyword: Security measure

Search Result 568, Processing Time 0.03 seconds

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

An Ex Ante Evaluation Method for Assessing a Government Enforced Security Measure (정부의 정보 보안 대책 법제화의 사전 효과성 분석 방법)

  • Shim, Woohyun
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.241-256
    • /
    • 2015
  • In order to ensure that all firms are cyber-secure, many governments have started to enforce the implementation of various security measures on firms. Prior to the implementation, however, it is vague whether government enforced security measures will be effective for mitigating cyber-security risks. By applying a method for estimating the effectiveness of a mandatory seatbelt law in reducing fatalities from motor vehicle accidents, this study develops an ex ante evaluation method that can approximate the effectiveness of a government enforced security measure in reducing country-wide or industry-wide cyber-security risks. Using data obtained from the Korean Internet and Security Agency, this study then explores how to employ the developed method to assess the effectiveness of a specific security measure in mitigating cyber-security risks, if enforced by the government, and compares the effectiveness of various security measures. The comparison shows that compulsory security training has the highest effectiveness.

Economic Security of Household: The Comparison of Short-term and Long-term Indicators (가계의 경제적 안정도: 단기지표와 장기지표의 비교)

  • 김강자
    • Journal of Families and Better Life
    • /
    • v.11 no.1
    • /
    • pp.107-118
    • /
    • 1993
  • A dimension of well-being economic security was analyzed and compared with economic adequacy. Again it was tested whether two indicators of economic security(short-term vs. long-term) yield same distribution across all household groups. Economic Security was defined as the household ability to sustain a given level of consumption in the case of economic emergency; specifically loss of income. Measure of 8 different kinds of economic security were constructed from household net worth including and excluding home equity. Data were taken from the 1988 U.S. Consumer Expenditure Survey and 2148 households were selected to test hypotheses concerning the economic security of American households Empirical results showed a very low level of economic security in general. The first hypothesis that distribution of economic adequacy and economic security are same across all population groups was rejected. On the average security measure rather than adequacy measure was favor to white female-headed households and households who have old and highly educated house-holder. The second hypothesis that the indicators of long-term and short-term economic security yield the same results across all household was not rejected. In general the level of economic security was relatively higher when long-term indicator was used than short-term indicator was however the direction and relative size of effect of income and each control variable was almost same.

  • PDF

Enhanced Security Scheme to Support Secure and Fast ASN-anchored Mobility in Mobile WiMAX

  • Park, Chang-Seop;Kang, Hyun-Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2204-2220
    • /
    • 2011
  • Without providing a proper security measure to the handover procedure in Mobile WiMAX, several security attacks can be mounted. Even though security schemes have been previously proposed for this purpose, they are still vulnerable to several security attacks due to fatal design flaws. A newly proposed security scheme in this paper is based on the framework of authentication domain and concept of handover ticket. A method of establishing security associations within the authentication domain is proposed, and a lightweight security measure to protect the management messages associated with the handover is also proposed. Especially, using the handover ticket, the new security scheme can defend against a Redirection Attack arising from a compromised base station. The new security scheme is comparatively analyzed with the previous security schemes in terms of Replay, Session Hijacking, Man-In-The-Middle, and Redirection attacks.

A survey and categorization of anomaly detection in online games (온라인 게임에서의 이상 징후 탐지 기법 조사 및 분류)

  • Kwak, Byung Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1097-1114
    • /
    • 2015
  • As the online game market grows, illegal activities such as cheating play using game bots or game hack programs, running private servers, hacking game companies' system and network, and account theft are also increasing. There are various security measures for online games to prevent illegal activities. However, the current security measures are not enough to prevent all highly evolving game attacks and frauds. Some security measure can do harm game players usability, game companies need to develop usable security measure that is well fit to game genre and contents design. In this study, we surveyed the recent trend of various security measure applied in online games. This research also classified illegal activities and their related countermeasure for detection and prevention.

Forecast System for Security Incidents (보안사고 예보시스템)

  • Lee, Dongkun;Lim, Jong In
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.6
    • /
    • pp.69-79
    • /
    • 2016
  • If the security incidents are occurred then, the company concentrates on the quick reaction to security incidents, reports the reason of incidents, it's problem, the result of measure to the top management team. There will be the case that actively finding problems and taking it's actions with linking the internal problems whenever external security incidents are occurred or that having only interest of problems at the moment. It is important that lasting the preventing action to prevent security incidents than not concentrating on only the security incidents are occurred. To do this, the systematical and consistent method for this should be provided. In this paper, we will provide a security incident forecast system. The security incident forecast system updates the incident induction factor which helping to forecast the potential security incidents on the database inferred from the direct security incidents which are occurred inside the company as well as the indirect security incidents which are occurred outside the company and makes interact with the incident experience and the measure process systematically. The security incident forecast system is the efficient measure about the potential security incidents in taking precaution.

A Study on Security Solution for USB Flash Drive (USB 메모리를 위한 보안 솔루션에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.93-101
    • /
    • 2010
  • A USB flash drive is a portable storage device. For its promising moderate price, portability and high capacity USB flash drive users are increasing rapidly. Despite these advantages USB flash drives have critical problems as well. Such as personal information data leakage due to easy loss of the portable device. As these personal information leakage incidents increases various security measure solutions are produced and distributed. Despite these security measures and solutions it is not enough to perfectly protect personal data leakage. Hence the necessity of a more concrete, secure, user-friendly security measure solution is required. In this paper we provide you with portable USB flash drive security solution analysis and provide you with the latest secure, user-friendly security measure solutions.

A Study on the hacking countermeasures in Military security (군보안상 해킹대응방안에 관한 연구)

  • Kim, Doo Hwan;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.133-142
    • /
    • 2017
  • Breaking away from the blind faith of internal military security network, current military security demands strengthening measure on the H/W, controlling measure against information communications within the military, strengthening measure on the linkage point of the military and universal internal networks, legal supplementation, sucurity management ofn the military facilities from outsourcing services supporting the military. By analyzing the danger of military organizations hacking and real hacking cases, policy establishment for strengthening the security on military network hacking, legal supplementation and controlling measure for the outsourcing services are the pragmatic counter measures against military security hacking considering the peculiarities of military rather than the application of physical containment linked with information communications technology on the H/W safety measures.

Black Consumer Detection in E-Commerce Using Filter Method and Classification Algorithms (Filter Method와 Classification 알고리즘을 이용한 전자상거래 블랙컨슈머 탐지에 대한 연구)

  • Lee, Taekyu;Lee, Kyung Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1499-1508
    • /
    • 2018
  • Although fast-growing e-commerce markets gave a lot of companies opportunities to expand their customer bases, it is also the case that there are growing number of cases in which the so-called 'black consumers' cause much damage on many companies. In this study, we will implement and optimize a machine learning model that detects black consumers using customer data from e-commerce store. Using filter method for feature selection and 4 different algorithms for classification, we could get the best-performing machine learning model that detects black consumer with F-measure 0.667 and could also yield improvements in performance which are 11.44% in F-measure, 10.51% in AURC, and 22.87% in TPR.

Design and Implementation of Simulation Tool for Cyber Battle Damage Assessment Using MOCE(Measure of Cyber Effectiveness) (사이버 효과 지표를 활용한 사이버 전투 피해평가 시뮬레이션 도구의 설계 및 구현)

  • Park, JinHo;Kim, DuHoe;Shin, DongIl;Shin, DongKyoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.465-472
    • /
    • 2019
  • In recent years, the cyber attack has become a universal phenomenon, and the attacks in cyberspace are regarded as a kind of war, cyber-warfare. However, cyber-warfare is difficult to identify the damage caused by the attack. In order to effectively evaluate the damage to the attack that may occur in the cyber-warfare, this paper describes the damage evaluation simulation of the cyber-warfare based on DEVSim++, which can calculate the damage to the cyber attack using the MOCE (Measure of Cyber Effectiveness). Also, in order to help the commander in the cyber Command&Control phase, the number of victims by attack classification is expressed in the form of Venn diagram.