• Title/Summary/Keyword: Terror Information

Search Result 136, Processing Time 0.027 seconds

Dynamic Simulation on a Network Security Simulator using SSFNet (SSFNet을 이용한 네트워크 보안 시뮬레이터에서 동적 시뮬레이션 방법)

  • 박응기;윤주범;임을규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.101-106
    • /
    • 2004
  • Recently, a network defense simulator becomes essential in studying cyber incidents because the cyber terror become more and more interesting. The network defense simulator is a tool to estimate damages and an effectiveness of a defense mechanism by modeling network intrusions and defense mechanisms. Using this tool, users can find efficient ways of preventing a cyber terror and recovering from the damage. Previous simulators start the simulation after entire scenario has made and been loaded to simulation engine. However, in this way it can't model human judgement and behavior, and it can't simulate the real cyber terror very well. In this paper, we have added a dynamic simulation component to our previous network security simulator. This component improved accurate modeling of network intrusions and defense behaviors. We have also proposed new modified architecture of the simulation system. Finally we have verified correct simulation results from stammer worn simulation.

A Study on the Management System of Bioterrorism by the Phases of Crisis Management (위기관리단계별 생물테러 관리체계에 관한 연구)

  • Kim, Chang-Ho;Lee, Kwang-Lyeol
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.113-144
    • /
    • 2007
  • The entire world has lived in terror threatened by new-terrorism since the 9.11 terror. Having appeared since 9.11, new-terrorism is new kind of terror targeting victims at random. Bioterrorism is one good example. Since bioterrorism happens secretly, it's hard to identify. The case becomes even harder to detect if it takes the form of a new epidemic. This study set out to apply the four phases of crisis management regarding outbreak and measures of SARS, the latest new epidemic, and to prepare against bioterrorism taking the form of a new epidemic, It also shows the efforts to study what to prepare and what kind of actions to take in case of bioterrorism by applying the four phases. There results demonstrate that the preventive measures against bioterrorism include arranging terror-related laws and identifying and monitoring expected pathogenic organs. In the preparation phases, they should integrate the related agencies, prepare for the standard operating procedures(SOP), execute integrated training sessions among the related agencies, and secure the necessary resources such as vaccine, cures, and exploration devices. In the response phases, they need to set up a rapid diagnosis system, quarantine and then cure the patients, and pursue cooperation from the media and promotions and further an international cooperation system to take appropriate measures. And the final recovery phases should involve offering emergency support by checking the situations and engaging in activities to prevent another terror attack by providing counseling, exchanging information, and analyzing and evaluating the causes.

  • PDF

A Study on Rethinking the Operating of Counter-terrorism Systems in South Korea (한국 대테러시스템 운영의 재모색)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.153-170
    • /
    • 2017
  • The purpose of this study is to rediscover the operation of anti-terrorism system focusing on the system approach and crisis management approach for counter terrorism in Korea. According to the results of this study, it is required to establish a link between open systems and integrative system focusing on functional linkage of counter-terrorism systems, and cooperative measures with private sectors in the dimension of governance activation. Further, it is necessary to prepare legal foundations for the cooperation with private sectors and then promote open consciousness transformation through the partnership with private security for anti-terrorism activities. In addition, in its preventive stage, it is required to prepare legal systems related to biochemical terrorism for stronger regulations through crisis-managerial approach. Next, in its preparatory stage, it is necessary to prepare education and enact named Terror Prevention Day for increasing terror safety consciousness, and then extend citizen reporting reward systems to enable citizens to participate and become interested voluntarily in terror prevention. Also, it is essential to establish the substantial training system for preparing for terror occurrence. Moreover, in its response stage, it is urgent to construct networks between related institutions to manage field and spot responses with integrative management systems through information sharing. Furthermore, in its restoration stage, it is indispensible to prepare long-term management systems for injured persons and families of the deceased from terror incidents.

  • PDF

A Study on the improvement for response manual of chemical terror incident using the service design analysis (서비스디자인 접근법을 활용한 화학테러현장 대응매뉴얼의 개선방안 연구)

  • Ham, Seung Hee;Park, Namkwun;Lee, Jun
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.325-333
    • /
    • 2018
  • Purpose: There have been terrorist attacks all over the world, causing massive damage. In Korea, there are few cases of terrorist damage, but the lack of the on-site response experience lead to constraints on the opportunity to verify capabilities against terrorism. Therefore, in this study, the chemical terrorism on-site countermeasures is considered as a concept of service, it was possible to draw up improvement alternatives for each element by reviewing at once the interactions between the concerned organizations and citizens in the field and the utilization of the equipment and facilities in the invisible area. Results: It had been evaluated the service process of the counterpart manager from the viewpoint of the victim citizen, who is the beneficiary of the final security service. It has found out the waiting point(W.P) between the victim's civilian incident management, and the element of failure(F.P). Conclusion: In this way, comparing chemical terror incident response manuals belonged to each related organization by fusion of service design approach and scenario technique, It is expected that it will be able to find out more specific problems and to find improvement alternatives.

A New Trace Model of Internet Indirect Connection (우회 경로를 통한 인터넷 연결의 차세대 역추적 모델)

  • Han, Dae-Il;An, Chang-Hoon;Ha, Ok-Hyun;Eom, Doo-Seop
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1123-1126
    • /
    • 2002
  • 연구와 군사 목적으로 발전한 인터넷은 현재 많은 기업들과 일반인들이 사용하는 현대 사회의 중요한 기반 시설로 자리잡게 되었으며, 아울러 인터넷이 사회에 끼치는 영향이 커짐에 따라 여러 가지 목적으로 자신의 접속 위치를 우회하여 숨기고 인터넷 보안 모델의 취약점을 공격하는 침입자가 증가하고 있다. 따라서, 침입에 사용되는 기술과 그에 대한 대응 기법 또한 보다 복잡하고 정교해 지고 있으나 근본적으로 악의적 침입을 근절하는 능동적인 대응은 미약한 현실이다. 본 논문에서는 인터넷 환경에서 여러 가지 우회 경로를 통해 접근한 침입자의 실제 접속 위치를 효율적으로 추적하기 위해 기존 역추적 연구의 유형과 문제점을 살펴보고 차세대 인터넷 환경에서 활용 가능한 역추적 기법의 모델을 제시한다. 따라서, 기존 역추적 기법의 현실적으로 적용이 어려운 구성과 침입자의 보안 설정에 따른 추적 제한 등의 문제점을 살펴보고 그 해결 방안이 되는 새로운 역추적 시스템의 모델을 제시한다. 그리고, 본 연구에서 제시하는 모델은 기존의 연결 경로를 거슬러 추적하는 기법과 달리 프록시 등 우회 경로를 통해 접근한 침입자에 대해 직접 연결되는 프로토콜을 자동 실행 되도록 구성하여 접근한 침입자의 위치를 파악하는 모델이나. 이 모델을 적용할 경우 실제 적용 가능한 구성과 효율적인 추적 특성을 가지게 되며 구성 비용의 손실 또한 줄일 수 있게 되는 장점을 가지게 된다.

  • PDF

A Study on Establishing of the Future Development Strategy for National Cyber Terror Response (국가 사이버테러대응 미래 발전전략 수립에 관한 연구)

  • Kim, MinSu;Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.15-24
    • /
    • 2020
  • Cyber terror and cyberwarfare are no longer virtual, but real, and as an actual security situation, it is necessary to have new understanding through expanding the concept of war to neutralize not only the other country's military command system, but also the country's main functions such as telecommunications, energy, finance, and transport systems, and it also needs to establish the future development strategy of cyber terror response at the national level. Through analysis of cyberwarfare trends in each country and current status of cyberwarfare in Korea, it will systematically explore the demand of new policy based on laws and systems, including the strategies of cyber security technology development, industry promotion, and manpower training and existing information protection policies. through this, it effectively manages a sustainable national crisis, and it suggests to establish a future strategy for the medium and long term cyber security that can effectively and actively respond to cyberwarfare.

A Case Study of the US Military Utilizing Female Personnel Strengths during the War on Terror (테러와의 전쟁(War on Terror) 시기 여성 인력의 강점을 활용한 미군 사례 연구)

  • Hong, Myung Sook;Yu, Sun Young;Lee, Seon Jeong;Kim, In Chan;Cho, Sang Keun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.21-26
    • /
    • 2021
  • After starting the war on terrorism, the U.S. military began to utilize the strength of its women's workforce by operating a cultural support team (CST) and a women's close combat team (FET) that obtained the information needed for civil operations with emphasis on civil factors. In addition, in order to subdue resistance forces that carry out surprise attacks by covering the shielded terrain of the rugged land or among residents, female personnel with excellent understanding, calmness, and detail were operated as unmanned aircraft operators (RPA). Since the situations that the U.S. has already experienced are likely to be reproduced on the Korean Peninsula, the South Korean military will be able to overcome uncertainties in the future battlefield environment by utilizing the U.S. female workforce.

Design and Simulation of Policy Based Integrated Server System Capable to Provide Real-time Internet Security Service (실시간 인터넷 보안 서비스 제공을 위한 정책기반 통합 서버 설계 및 시뮬레이션)

  • Kim, Gi-Yeong;An, Gae-Il;Jang, Jong-Su;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.565-572
    • /
    • 2001
  • Recently, due to the open architecture of the internet and wide spread of internet users, the cyber terror threatens to the network\`s weak point are tending grow. Until now, information security solutions are passive on security host and particular security system. This passive information security solution is weak from the attacks through the networks connected worldwide internet systems, and has limitation on the defense against cyber terror attacks. Therefore, network level integrated security function must be provided. In this paper, we consider technology limitations on the information security problems and its environment. Then we present the architecture and functions of policy-based information security services for network level active information security function. This paper also includes design of target system, which provide information security services. Finally, we discuss network level system deployment direction and discuss with Network Security Simulation.

  • PDF

Anti-CyberTerror Team, ETRI (인터넷 패킷 워터마크 검출 시스템 구현)

  • 최병철;서동일
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.493-495
    • /
    • 2002
  • 본 연구에서는 TCP Connection을 유지하는 Stepping Stone 형태의 공격을 역추적하기 위해 사용되는 패킷 워터마크를 검출하는 시스템의 구현에 대해서 기술하고 있다. 본 연구에서 사용한 패킷 워터마크는 Sleepy Watermark Tracing(SWT)에서 사용한 virtual null string 형태의 워터마크를 사용하였으며, 이러한 워터마크의 효율적인 탐지 및 분석하는 방법을 설계 구현하였다. 본 연구의 의의는 패킷 워터마크 검출 시스템의 실제 구현을 통하여 TCP Connection Traceback 형태의 침입자 역추적 시스템에 활용할 수 있다는 것이다.

  • PDF

A Study on the Aspects and Counter Systems of the Cyber Terrorism in the Era of Changing Information Circumstances (정보환경변화시대의 사이버테러 양상 및 대응체계에 관한 연구)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.237-260
    • /
    • 2005
  • Development of IT technology as well as arrival of information-oriented society raise the curtain of 'the era of Ubiquitous Computing', implying accessing computers beyond boundary of time and space. In this era, it is expected that IT paradigms and life-styles would be transformed immensely above the experiences of 20th century. However, improvement of technology summons a new risk of cyber terrorism which have not been in the past. Thus, it is urgent to prepare for the threats in the national level. This paper point out five major threats relating to 'the security in the era of Ubiquitous Computing'. : First, spread of threats in connection with BcN establishment, second, vulnerable information-security for wireless communication, third, leakage of private information, fourth, cyber terror and deterioration of security, fifth, security problems of Korea including the drain of military information and solutions in the views of organization, personnel, technology and budget, comparing with other countries.

  • PDF