• Title/Summary/Keyword: System Vulnerability

Search Result 1,016, Processing Time 0.02 seconds

Research on Security System for Safe Communication in Maritime Environment (해상환경에서 안전한 통신을 위한 보안체계 연구)

  • Seoung-Pyo Hong;Hoon-Jae Lee;Young-Sil Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • As a means of helping ships navigate safely, navigational aids in operation in the maritime envirionment require periodic management, and due to the nature of the environment, it is difficult to visually check the exact state. As a result, the smart navigation aid system, which improves route safety and operational efficiency, utillizes expertise including sensors, communications, and information technology, unlike general route markings. The communication environment of the smart navigation aid system, which aims to ensure the safety of the navigators operating the ship and the safety of the ship, uses a wireless communication network in accordance with the marine environment. The ship collects the information necessary for the maritime environment on the land and operates. In this process, there is a need to consider the wireless communication security guideline. Basically, based on IHO S-100 a standard for facilitating data exchange and SECOM, which provides an interface for safe communication. This paper research a security system for safe communication in a maritime environment. The security system for the basic interface based on the document was presented, and there were some vulnerabillties to data exchange due to the wireless communication characteristics of the maritime environment, and the user authetication part was added considering the vulnerability that unauthorized users can access the service.

A Case of Developing Performance Evaluation Model for Korean Defense Informatization (국방정보화 수준평가 모델 개발 사례)

  • Gyoo Gun Lim;Dae Chul Lee;Hyuk Jin Kwon;Sung Rim Cho
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.23-45
    • /
    • 2017
  • The ROK military is making a great effort and investment in establishing network-centric warfare, a future battlefield concept, as a major step in the establishment of a basic plan for military innovation. In the military organization level, an advanced process is introduced to shorten the command control time of the military and the business process is improved to shorten the decision time. In the information system dimension, an efficient resource management is achieved by establishing an automated command control system and a resource management information system by using the battle management information system. However, despite these efforts, we must evaluate the present level of informatization in an objective manner and assess the current progress toward the future goal of the military by using objective indicators. In promoting informatization, we must systematically identify the correct areas of improvement and identify policy directions to supplement in the future. Therefore, by analyzing preliminary research, workshops, and expert discussions on the major informatization level evaluation models at home and abroad, this study develops an evaluation model and several indicators that systematically reflect the characteristics of military organizations. The developed informatization level evaluation model is verified by conducting a feasibility test for the troops of the operation class or higher. We expect that this model will be able to objectively diagnose the level of informatization of the ROK military by putting budget and resources into the right place at the right time and to rapidly improve the vulnerability of the information sector.

A Study of the Application of Earthquake Early Warning System for the Enhancements in Protective Action by Korea National Park (국립공원의 지진 대응 체계 개선을 위한 지진 조기경보 시스템의 적용에 관한 연구)

  • Yang, Eomzi;Ha, Seong Jun;Kim, Won Kyung;Yun, Tae Sup
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.38 no.3
    • /
    • pp.439-448
    • /
    • 2018
  • Conventional Earthquake Early Warning System (EEWS) detects the propagated P-wave from epicenter which should be achieved within 5 seconds to provide seconds to minutes of warning, allowing people to prepare for protective actions. EEWS in Korea is currently capable of providing a warning within 50 seconds after the primary P-wave detection, however, it is well-known that earthquake warning systems operating around Korean National Parks (KNP) have limited capability to fully monitor earthquake events. This study, therefore, presents a strategy to quantify the potential vulnerability to earthquake hazards by superimposing the distribution of Korea Integrated Seismic System (KISS) and the discretized map of KNP. Total 22 national parks are evaluated, and the results suggest that the improvement of the on-site systems should be necessitated for Gyoengju, Gyeryongsan, Songnisan, Gayasan, and Deogyusan national parks, whereas enhancement of regional systems is required for Bukhansan national park.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

Development and Assessment of Hedging Rule for Han River Reservoir System Operation against Severe Drought (한강수계 저수지군의 갈수대응 운영을 위한 Hedging Rule의 개발과 적용성 평가)

  • Kim, Jeong Yup;Park, Myung Ky;Lee, Gi Ha;Jung, Kwan Sue
    • Journal of Korea Water Resources Association
    • /
    • v.47 no.10
    • /
    • pp.891-906
    • /
    • 2014
  • This study suggests the hedging rule of MIP (Mixed Integer Programing) in counting the risk evaluation criteria of the objective function and constraints in order to provide the optimum operating rule in reservoir system as constraining water shortage as much as possible which may happen in the downstream control point of water supply in the aspect of water system management. The proposed model is applied to the Han-river reservoir system for two testing periods (Case I: Jan. 1993~Dec. 1997, Case II: Jan. 1999~Dec. 2003). The model based on the hedging rule with trigger volume, estimated in this study shows that in Case I, the monthly minimum discharge was $310.6{\times}10^6m^3$ in the single operation, $56.3{\times}10^6m^3$ in the joint operation, and $317.5{\times}10^6m^3$ in the hedging rule and also, in Case II, the monthly minimum discharge was found to be $204.2{\times}10^6m^3$ in the single operation, $111.2{\times}10^6m^3$ in the joint operation, and $243.7{\times}10^6m^3$ in the hedging rule. In conclusion, the hedging rule, proposed in this study can decrease vulnerability while guarantees reliability and resiliency.

A Comparative Study of on-site Action Manual for People with Disaster Vulnerability (재난취약자의 현장조치 행동매뉴얼 비교연구 - 한국과 일본의 장애인 대상으로)

  • Kim, Soodong;Lee, Sahong;Choi, Kilhyun;Cheung, Chongsoo
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.2
    • /
    • pp.155-162
    • /
    • 2017
  • This study has some issues about the elderly, the disabled, and the vulnerable groups whose economic ability is low even if the disaster or disaster situation is not a big problem for the people. we should emphasize the necessity of disaster preparedness action manual considering the characteristics of disaster vulnerable classes and taking serious risks to them even in the same situation. We also want to conduct research only for people with disabilities who are choosing the same definition of the world among the vulnerable groups. I would like to provide a basis for developing a site action manual for people with disabilities by comparing the cases of Korea and Japan. Therefore, through the cases of Japan and Korea, it is possible to maintain the independence of everyday life during disasters, the communication function in disasters, the method of moving information and mobile information, the function of recognizing emergency response, Action Emphasize the urgency of developing action manuals. From this domestic situation, we will conclude the discussion on the disaster safety and action manual for the disabled.

Comparison of Predicted and Measured ASF (ASF 예측치와 실측치 비교)

  • Shin, Mi-Young;Hwang, Sang-Wook;Yu, Dong-Hui;Park, Chan-Sik;Lee, Chang-Bok;Lee, Sang-Jeong
    • Journal of Navigation and Port Research
    • /
    • v.34 no.3
    • /
    • pp.175-180
    • /
    • 2010
  • In the almost application parts, GNSS being used the primary navigation system on world-widely. However, some of nations attempt or deliberate to enhance current Loran system, as a backup to satellite navigation system because of the vulnerability to the disturbance signal. Loran interests in supplemental navigation system by the development and enhancement, which is called eLoran, and that consists of advancement of receiver and transmitter and of differential Loran in order to increase the accuracy of current Loran-C. A significant factor limiting the ranging accuracy of the eLoran signal is the ASF in the TOAs observed by the receiver. The ASF is mostly due to the fact that the ground-wave signal is likely to propagate over paths of varying conductivity and topography. This paper presents comparison results between the predicted ASF and the measured ASF in a southern east region of Korea. For predicting ASF, the Monteath model is used. Actual ASF is measured from the legacy Loran signal transmitted Pohang station in the GRI 9930 chain. The test results showed the repeatability of the measured ASF and the consistent characteristics between the predicted and the measured ASF values.

A Study on The Preference Analysis of Personal Information Security Certification Systems: Focused on SMEs and SBs (개인정보보호 인증제도 선호도 분석에 관한 연구: 중소기업 및 소상공인을 중심으로)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.911-918
    • /
    • 2014
  • Over the past few years, security breaches have been consistently reported around the world. Especially, people's personal information are at risk of being breached as the firms gather and utilize the information for their marketing purposes. As an effort to revamp their data infrastructures, companies have rebuilt their system that almost every data, including the personal information, are stored within the digital database. However, this migration provides easier access to the database but it has also increased the system vulnerability. As the data can be easily exposed to the unauthorized personnel both intentionally and unintentionally, it is necessary for companies to establish a set of security protocol and operate the personal information protection system. There are two major certified security system in South Korea; PIMS from KISA and PIPL from NIA. This paper analyzes the preferences of SMEs and small business using conjoint attributes of PIMS and PIPL. The study shows that the business owners take post certification rewards as the most important factor. It also shows that the attributes that have the highest utility rates are the following; 1) KISA certification, 2) 79 points of protection counter measurements, 3) 28 items of life cycle, 3) 50 percent discount on certification fee, and 4) Reduced amount of fine for personal information leakage incident.

A System for SSL/TLS Vulnerability Detection of Servers (서버 SSL/TLS 취약점 자동 탐지를 위한 시스템 개발)

  • Cho, Sungwon;Choi, Hyunsang;Heo, Gyu;Cho, Sanghyun;Kim, Young-Gab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.145-153
    • /
    • 2018
  • SSL (Secure Socket Layer) and TLS (Transport Layer Security) are widely used protocols for secure and encrypted communication over a computer network. However, there have been reported several security vulnerabilities of SSL/TLS over the years. The vulnerabilities can let an adversary carry out critical attacks on SSL/TLS enabled servers. In this paper, we have developed a system which can periodically scan SSL/TLS vulnerabilities on internal network servers and quickly detects, reports and visualizes the vulnerabilities. We have evaluated the system on working servers of Naver services and analyzed detected vulnerabilities. 816 vulnerabilities are found on 213 internal server domains (4.2 vulnerabilities on average) and most vulnerable servers are not opened to public. However, 46 server domains have old vulnerabilites which were found 2016. We could patch and response to SSL/TLS vulnerabilites of servers by leveraging the proposed system.