• Title/Summary/Keyword: Threat Management

Search Result 651, Processing Time 0.026 seconds

Analysis on Presidential Security Threat of Cyber Physical System by Cyber Attack Focusing Intelligent Building System (사이버물리시스템에 대한 사이버공격 경호위협 분석 - 지능형건물관리시스템을 중심으로 -)

  • Choi, Junesung;Lee, Sam Youl
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.669-672
    • /
    • 2020
  • In this paper, we analyzed the characteristics of cyber attacks and major threat scenarios that could occur around intelligent building management Systems(IBS) by cyber attack security threats against cyber physics systems. Generally determined that lowering the likelihood of aggression against predictable threats would be a more realistic approach to attack response. The countermeasures against this need to be applied to multi-layered defense systems, and three alternatives were proposed: preliminary cyber safety diagnosis for protection targets and the establishment of mobile security control systems.

Simulating Engagement Model of Avionic ECM Pod on the Virtual Battle Field (가상전장환경하에서 항공전자전 ECM 파드의 전자전 교전모델 시뮬레이션 개발)

  • 김형균;이행호;조성찬;홍장의;변재정
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.7 no.1
    • /
    • pp.69-76
    • /
    • 2004
  • When simulating the mission flight of a fighter equipped with the avionic ECM pod, it is massively required to provide the correct information of threats, to depict the real environment of mission area, and to precisely model the capability of the ECM system. Also, in order to get the reliable results of those simulation, it should be supported the flexible changes of threat environments and the examination of multiple flight paths. This paper presents a software system which is possible to flexible and interactive ECM simulation. This system has capable of the 2D or 3D visualization of virtual battle field, the management of electronic threat data, and the simulation of engagement model.

Exploring the Psychological Mechanism Underlying the Effect of COVID-19 Information Exposure via Digital Media on COVID-19 Preventive Behavioral Intention

  • Choi, Ji Hye;Noh, Ghee-Young
    • Asian Journal for Public Opinion Research
    • /
    • v.10 no.2
    • /
    • pp.76-101
    • /
    • 2022
  • Despite the increasing use of digital media and their powerful impact on risk management during recent outbreaks of emerging infectious diseases, the question of how digital media exposure influences preventive behaviors has not been fully explained. Using the appraisal tendency framework and protection motivation theory as theoretical frameworks, we theorized the affective and cognitive mechanisms under which the differential roles of three negative emotions (fear, anger, worry) on two cognitive appraisals (perceived threat and perceived efficacy) were examined. Based on data collected from a survey of 1,500 South Koreans during the COVID-19 pandemic, we found that while worry and anger increased perceived efficacy, fear reduced perceived efficacy. The results also showed that although exposure to COVID-19 information via digital formats increased preventive behavioral intention in general, digital media use for COVID-19 information had a negative influence on preventive behavioral intention through the sequential mediation of fear and perceived efficacy.

A Risk Management Model for Efficient Domestic Information Technology Security (효율적 국내 정보기술 보안을 위한 위험관리 모형)

  • Ahn, Choon-soo;Cho, Sung-Ku
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.28 no.1
    • /
    • pp.44-56
    • /
    • 2002
  • For the risk analysis and risk assessment techniques to be effectively applied to the field of information technology (IT) security, it is necessary that the required activities and specific techniques to be applied and their order of applications are to be determined through a proper risk management model. If the adopted risk management model does not match with the characteristics of host organization, an inefficient management of security would be resulted. In this paper, a risk management model which can be well adapted to Korean domestic IT environments is proposed for an efficient security management of IT. The structure and flow of the existing IT-related risk management models are compared and analysed, and their common and/or strong characteristics are extracted and incorporated in the proposed model in the light of typical threat types observed in Korean IT environments.

A Study on the Security Management System for Preventing Technology Leakage of Small and Medium Enterprises in Digital New Deal Environment

  • Kim, Sun-Jib
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.355-362
    • /
    • 2021
  • Through the Korean version of the New Deal 2.0, manufacturing-oriented SMEs are facing a new environmental change called smart factory construction. In addition, SMEs are facing new security threats along with a contactless environment due to COVID-19. However, it is practically impossible to apply the previously researched and developed security management system to protect the core technology of manufacturing-oriented SMEs due to the lack of economic capacity of SMEs. Therefore, through research on security management systems suitable for SMEs, it is necessary to strengthen their business competitiveness and ensure sustainability through proactive responses to security threats faced by SMEs. The security management system presented in this study is a security management system to prevent technology leakage applicable to SMEs by deriving and reflecting the minimum security requirements in consideration of technology protection point of view, smart factory, and remote access in a non-contact environment. It is also designed in a modular form. The proposed security management system is standardized and can be selectively used by SMEs.

A Study on the Security Checklist Improvements to improve the Security in the Mobile Applications Development (모바일 어플리케이션 개발에서의 보안성 향상을 위한 보안 점검항목 개선에 관한 연구)

  • Shin, Jun-Yuop;Kim, Dong-Soo;Han, Ki-Jun;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.113-127
    • /
    • 2014
  • The use of mobile devices offers a variety of services to the individuals and companies. On the other hand, security threats and new mobile security threats that exist in IT infrastructure to build the environment for mobile services are present at the same time. Services such as mobile and vaccine management services, such as MDM (Mobile Device Management) has attracted a great deal of interest in order to minimize the threat of security in mobile environment. These solutions can not protect an application that was developed for the mobile service from the threat of vulnerability of mobile application itself. Under these circumstances, in this paper, we proposed mobile application security checklists based on application security review items in order to prevent security accidents that can occur in a mobile service environment. We collected and analyzed Android applications, we performed a total inspection of the applications for verification of the effectiveness of the check items. And we checked that the check items through a survey of experts suitability was verified.

The Strategical Scenario Analysis for the Efficient Management of Resource in Open Access (공유자원의 효율적 경영을 위한 전략적 시나리오분석)

  • Choi, Jong-Du
    • The Journal of Fisheries Business Administration
    • /
    • v.42 no.3
    • /
    • pp.31-39
    • /
    • 2011
  • This paper attempts to extend such analysis to the rather more difficult problem of optimal management of transnational fish stocks jointly owned by two countries. Transboundary fish such as Mackerel creates an incentive to harvest fish before a competitor does and leads to over-exploitation. This tendency is especially poignant for transnational stocks since, in the absence of an enforceable, international agreement, there is little or no reason for either government or the fishing industry to promote resource conservation and economic efficiency. In the current paper I examine a game theoretic setting in which cooperative management can provide more benefits than noncooperative management. A dynamic model of Mackerel fishery is combined with Nash's theory of two countries cooperative games. A characteristic function game approach is applied to describe the sharing of the surplus benefits from cooperation and noncooperation. A bioeconomic model was used to compare the economic yield of the optimal strategies for two countries, under joint maximization of net benefits in joint ocean. The results suggest as follows. First, the threat points represent the net benefits for two countries in absence of cooperation. The net benefits to Korea and China in threat points are 2,000 billion won(${\pi}^0_{KO}$) and 1,130 billion won(${\pi}^0_{CH}$). Total benefits are 3,130 billion won. Second, if two countries cooperate one with another, they reach the solution payoffs such as Pareto efficient. The net benefits to Korea and China in Pareto efficient are 2,785 billion won(${\pi}^0_{KO}$) and 1,605 billion won(${\pi}^0_{CH}$) or total benefits of 4,390 billion won : a gain of 1,260 billion won. Third, the different price effects under the two scenarios show that total benefit rise as price increases.

A Risk Analysis Methodology for Information Systems Security Management (정보시스템 보안관리를 위한 위험분석 방법론)

  • 이문구
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.6
    • /
    • pp.13-22
    • /
    • 2004
  • This study proposes a risk analysis methodology for information system security management in which the complexity on the procedure that the existing risk analysis methodology is reduced to the least. The proposed risk analysis methodology is composed of 3 phases as follows: beforehand processing phase, counter measure setting phase, post processing phase. The basic risk analysis phase is a basic security management phase in which fixed items are checked when the information security system is not yet established or a means for the minimum security control is necessary for a short period of time. In the detailed risk analysis phase, elements of asset a vulnerability, and threat are analysed, and using a risk degree production table produced from these elements, the risk degree is classified into 13 cases. In regard to the risk, the 13 types of risk degree will execute physical, administrative, and technical measures through ways such as accepting, rejecting, reducing, and transferring. Also, an evaluation on a remaining risk of information system is performed through a penetration test, and security policy set up and post management phase is to be carried out.

An Efficient Management Model of Security Policy in the Unified Threat Management System (통합 보안 시스템에서의 효율적인 보안 정책 관리 모델)

  • Joo, Heon-Sik;Kim, Jong-Wan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.99-107
    • /
    • 2010
  • This paper showed that the integrated system to fortify security was much more efficient than the respective system through the analysis of problems from Firewall and IPS system in the existing security systems. The results of problem analysis revealed that there were the delay of processing time and lack of efficiency in the existing security systems. Accordingly, their performance was evaluated by using the separated Firewall, IPS system, and the integrated system. The result of evaluation shows that the integrated security system this paper suggested is five times faster than the existing one in terms of processing speed of response. This paper demonstrated the excellence of the proposed security system is also more than fivefold in session handling per second and six times process speeding in the CPU processing performance. In addition, several security policies are applied, and it provided a fact that it gave an excellent performance when it comes to protecting from harmful traffic attacks. In conclusion, this paper emphasized that fortifying the integrated security system was more efficient than fortifying the existing one considering in various respects such as cost, management, time, space and so on.

A Home Management System Using Smart Devices in an IoT Environment (IoT 환경에서의 스마트디바이스를 활용한 주택관리시스템)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.807-808
    • /
    • 2016
  • With the recent rise in nuclear families and single-member families, there is a need for the kind of home management unaffected by neither space nor time. Moreover, electronic devices in and around the home need to be managed efficiently and prevented from overheating, and there is an increasing risk of fire, theft, and leak of personal data with these devices, which is leading to an increase in the economic costs. Accordingly, there is a growing need for an efficient and secure smart home management system. This paper proposes a home management system that uses smart devices. This system has addressed the shortcomings of a conventional Internet-based home network. Furthermore, it communicates with IoT-enabled devices and features intelligent information home appliances that are isolated from personally identifiable information and which are secure against advanced persistent threats, a type of cyber-attack.

  • PDF