• 제목/요약/키워드: Threat Management

검색결과 645건 처리시간 0.018초

Roles of Threat and Coping Appraisal in Adoption of Green Information Technology: Ordered Protection Motivation Theory Perspective

  • Lee, Namyeon;Jin, Yanshou;Kwon, Ohbyung
    • Asia pacific journal of information systems
    • /
    • 제23권2호
    • /
    • pp.87-109
    • /
    • 2013
  • While many surveys show very positive attitudes on the part of consumers towards eco-friendly products, the market share actually reflecting green IT purchases remains low in most countries. The motivations behind green IT purchase behavior are still obscure. Several studies have addressed the question of green IT diffusion from economic and normative viewpoints in an attempt to interpret IT adoption behavior. This study comes at the question from a different angle, namely negative frame, examining threat and coping behaviors using the Ordered Protection Motivation (OPM) model and threat appraisal theory. The results show that attitudes toward fairness and positive change, which are precedents of threat appraisal, play an important role in determining threat appraisal. Perceived threats in the green IT arena include habit change and ecological change. Appraisal for coping with these threats directly affects initial adoption behaviors regarding available green IT, and then indirectly encourages the purchase of new green IT products.

  • PDF

위험관리 개념에 근거한 항공보안업무 합리화 방안 연구 (A Study on Airport Security Performance Improvement based on Risk Management Concept)

  • 황경철;유광의
    • 한국항공운항학회지
    • /
    • 제20권2호
    • /
    • pp.47-57
    • /
    • 2012
  • The strengthened aviation security measurements caused by increased terror threat all around the world have air passengers annoyed by uneasy treatment and some delayed process. The service level of air travel and competitiveness of airlines industry has been weakened also. The aviation security process is mainly conducted at an airport. The threat level of airport is not usually same airport to airport, and the quality of aviation security activity is neither same. However, ICAO requires every international airport to conduct similar process to ensure aviation security without considering situational difference of each airport. The paper has objectives to develop reasonable security measurements based on risk management concept. It studied the ways of achieving target level of security of an airport, considering the threat situation of the airport and its ability to conduct security procedures.

다대다 대응 위협평가 및 무기할당 알고리즘 연구: 탄도미사일 및 장사정포 위협을 중심으로 (A Study of Multi-to-Majority Response on Threat Assessment and Weapon Assignment Algorithm: by Adjusting Ballistic Missiles and Long-Range Artillery Threat)

  • 임준성;유병천;김주현;최봉완
    • 산업경영시스템학회지
    • /
    • 제44권4호
    • /
    • pp.43-52
    • /
    • 2021
  • In weapon assignment studies to defend against threats such as ballistic missiles and long range artillery, threat assessment was partially lacking in analysis of various threat attributes, and considering the threat characteristics of warheads, which are difficult to judge in the early flight stages, it is very important to apply more reliable optimal solutions than approximate solution using LP model, Meta heuristics Genetic Algorithm, Tabu search and Particle swarm optimization etc. Our studies suggest Generic Rule based threat evaluation and weapon assignment algorithm in the basis of various attributes of threats. First job of studies analyzes information on Various attributes such as the type of target, Flight trajectory and flight time, range and intercept altitude of the intercept system, etc. Second job of studies propose Rule based threat evaluation and weapon assignment algorithm were applied to obtain a more reliable solution by reflection the importance of the interception system. It analyzes ballistic missiles and long-range artillery was assigned to multiple intercept system by real time threat assessment reflecting various threat information. The results of this study are provided reliable solution for Weapon Assignment problem as well as considered to be applicable to establishing a missile and long range artillery defense system.

정보품질을 위한 개인정보 보호행위: 건강심리이론 관점을 중심으로 (Personal Information Protection Behavior for Information Quality : Health Psychology Theory Perspectives)

  • 지범석;판류;이상철;서영호
    • 품질경영학회지
    • /
    • 제39권3호
    • /
    • pp.432-443
    • /
    • 2011
  • The purpose of this research is to understand users' information protection behavior on personal information security from health psychology theory perspectives. Empirical results indicate that users' information protection behavior on personal information is predicted by perceived threat and perceived responsiveness. Perceived threat is determined by perceived susceptibility and perceived severity. Perceived responsiveness is determined by response efficacy and self-efficacy, but response cost is not significant. These findings provide an enriched understanding about users' information protection behavior on personal information security.

W-TMS(Wireless-Threat Management System)에서의 효율적 관리를 위한 위협 분류기법 (Threat Classification Schemes for Effective Management based on W-TMS(Wireless-Threat Management System))

  • 서종원;조제경;이형우
    • 한국콘텐츠학회논문지
    • /
    • 제7권3호
    • /
    • pp.93-100
    • /
    • 2007
  • 지난 10년 동안 인터넷은 빠른 속도로 모든 분야에 확산되어 왔으면 이와 비슷한 현상으로 최근 몇 년 동안 무선 네트워크의 확산 역시 빠른 속도로 보급되고 있는 추세이다. 그리고, 무선 네트워크 공격 시도 및 침입에 성공하는 공격의 횟수도 증가하고 있다. 이런 무선 네트워크 위협을 극복하기 위해 기존의 TMS는 필요에 따라 자동화되고 능동적인 대응 수단을 제공하기도 하지만, 새로운 형태의 무선 공격 등에는 효율적으로 대응하지 못한다는 취약점을 가지고 있다. 따라서 본 연구에서는 정보검색분야에서 사용되는 Vector Space모델을 이용해 실시간으로 유입되는 패킷과의 유사도를 비교하여, 분석된 유사도의 패턴을 분석해 무선 네트워크의 이상 징후를 탐지하고 자동으로 분류하는 기법을 설계했다.

지식기반 실시간 사이버위협 조기 예.경보시스템 (A Conceptual Design of Knowledge-based Real-time Cyber-threat Early Warning System)

  • 이동휘;이상호;김귀남
    • 융합보안논문지
    • /
    • 제6권1호
    • /
    • pp.1-11
    • /
    • 2006
  • 최근 사이버테러의 급증은 정보사회의 근간을 위협하고 있고, 특히 악성 트래픽에 의한 네트워크마비는 단 시간 내에 국가적인 손실을 초래할 수 있어 이에 대한 대비책이 시급히 요구되고 있다. 이와 관련, 국가사이버안전 위협에 대한 신속한 대처능력확보를 위해 국가사이버위협 조기 예 경보시스템에 대해 많은 연구가 이루어지고 있으나 기술적인 문제와 함께 시스템의 효용성에 대한 한계 때문에 실용적인 연구가 가시화되지 못하고 있는 실정이다. 현재까지는 ESM, TMS 등을 이용한 제한적 자료수집분석을 통하여 보안관리자가 개개인의 경험을 바탕으로 예 경보 판단을 내려왔다. 이러한 판단은 상황에 따라 극히 위험한 결과를 초래 할 수도 있다. 이러한 문제점을 방지하기 위해 본 논문에서는 "지식기반을 이용한 실시간 사이버위협 조기 예 경보시스템"을 제안하였다. 제안된 시스템은 향후 사이버공격에 대해 체계적이고 보다 정확한 예 경보 판단을 내리는데 사용할 수 있다.

  • PDF

인터넷 환경에서의 비정상행위 공격 탐지를 위한 위협관리 시스템 (Threat Management System for Anomaly Intrusion Detection in Internet Environment)

  • 김효남
    • 한국컴퓨터정보학회논문지
    • /
    • 제11권5호
    • /
    • pp.157-164
    • /
    • 2006
  • 최근에는 대부분의 인터넷 공격은 악성코드(Malware)에 의한 잘 알려지지 않은 제로데이 공격 형태가 주류를 이루고 있으며, 이미 알려진 공격유형들에 대해서 탐지하는 오용탐지 기술로는 이러한 공격에 대응하기가 어려운 실정이다. 또한, 다양한 공격 패턴들이 인터넷상에 나타나고 있기 때문에 기존의 정보 보호 기술로는 한계에 다다르게 되었고, 웹기반 서비스가 보편화됨에 따라 인터넷상에 노출된 웹 서비스가 주공격 대상이 되고 있다. 본 논문은 인터넷상의 트래픽 유형을 분류하고, 각 유형에 따른 이상 징후를 탐지하고 분석할 수 있는 비정상행위공격 탐지기술(Anomaly Intrusion Detection Technologies)을 포함하고 있는 위협관리 시스템(Threat Management System)을 제안한다.

  • PDF

한국에서의 NOSS적용에 관한 연구 (The Study on Application of NOSS in Korea)

  • 최연철
    • 한국항공운항학회지
    • /
    • 제18권2호
    • /
    • pp.60-66
    • /
    • 2010
  • Normal Operations Safety Survey (NOSS), a methodology for capturing safety data during normal Air Traffic Control (ATC) operations. The NOSS methodology is based on the Threat and Error Management (TEM) framework, and is a safety management tool to monitor safety during normal aviation operations. Monitoring safety in normal operations is an essential activity within the safety management systems of Air Traffic Services (ATS) providing organizations, and NOSS is proposed as a suitable way to do this. This study, operating in the latter half of the year of 2010 in South Korea on NOSS was the understanding and to apply.

Business Process Reengineering of an Information Exchange Management System for a Nationwide Cyber Threat Intelligence

  • Pramadi, Yogha Restu;Rosmansyah, Yousep;Kim, Myonghee;Park, Man-Gon
    • 한국멀티미디어학회논문지
    • /
    • 제20권2호
    • /
    • pp.279-288
    • /
    • 2017
  • Nowadays, nations cyber security capabilities play an important role in a nation's defense. Security-critical infrastructures such as national defenses, public services, and financial services are now exposed to Advanced Persistent Threats (APT) and their resistance to such attacks effects the nations stability. Currently Cyber Threat Intelligence (CTI) is widely used by organizations to mitigate and deter APT for its ability to proactively protect their assets by using evidence-based knowledge. The evidence-based knowledge information can be exchanged among organizations and used by the receiving party to strengthen their cyber security management. This paper will discuss on the business process reengineering of the CTI information exchange management for a nationwide scaled control and governance by the government to better protect their national information security assets.

원자로보호계통 사이버보안 연계 위협 분석 연구 (A Study on Chaining Threat Analysis of Cybersecurity against Reactor Protection Systems)

  • 정성민;김태경
    • 디지털산업정보학회논문지
    • /
    • 제18권2호
    • /
    • pp.39-48
    • /
    • 2022
  • The application of digital technology to instrumentation and control systems in nuclear power plants has overcome many shortcomings of analog technology, but the threat of cybersecurity has increased. Along with other systems, the reactor protection system also uses digital-based equipment, so responding to cybersecurity threats is essential. We generally determine cybersecurity threats according to the role and function of the system. However, since the instrumentation and control system has various systems linked to each other, it is essential to analyze cybersecurity threats together between the connected systems. In this paper, we analyze the cybersecurity threat of the reactor protection system with the associated facilities. To this end, we quantitatively identified the risk of the reactor protection system by considering safety functions, a communication type, the use of analog or digital-based equipment of the associated systems, and the software vulnerability of the configuration module of the reactor protection system.