• Title/Summary/Keyword: Threat Management

Search Result 651, Processing Time 0.029 seconds

A Study on the Improvement of Naval Combat Management System for the Defense of Drone

  • Ki-Chang Kwon;Ki-Pyo Kim;Ki-Tae Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.93-104
    • /
    • 2023
  • Recently, the technology of drones is developing remarkably. The role of military drones is so great that they can cause serious damage to the enemy's important strategic assets without any damage to our allies in all battlefield environments (land, sea, air). However, the battleship combat management system currently operated by the Korean Navy is vulnerable to defense because there is no customized defense system against drones. As drones continue to develop, they are bound to pose a major threat to navy in the future. This paper proposes a way for the warfare software of naval combat management system sets a combat mode suitable for anti-drone battle, evaluates the threat priority in order to preemptively respond to drone threats and eliminate drone threats through automatic allocation of self-ship-mounted weapons and sensors, and through a test of the improved warfare software in a simulated environment, it was proved that the time to respond to the drone was improved by 62%.

A Study on the Smart Medical Equipment Management Program (Secure-MEMP) Method Considering Security (보안성을 고려한 스마트 의료기기 관리(Secure-MEMP) 방법에 관한 연구)

  • Kim, Dong-Won
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.63-72
    • /
    • 2021
  • The hospital biomedical engineering team is responsible for establishing and regulating the Medical Device Management Program (MEMP) to ensure that medical devices are safe and reliable. As technology advances, medical devices such as artificial intelligence and precision medicine are developing into a form that allows connection between objects anytime, anywhere, and as various technologies converge, internal and external security threats continue to increase. In this paper, we present a study of the Medical Device Management Program (Secure-MEMP) method, considering that the security threat of medical devices continues to increase due to advances in technology.

State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents

  • Kryshtanovych, Myroslav;Britchenko, Igor;Losonczi, Peter;Baranovska, Tetiana;Lukashevska, Ulyana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.33-38
    • /
    • 2022
  • The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified.

A Study on the Observer Training and Implementation for Effective Normal Operation Safety Survey (NOSS)

  • Choi, Jin-Kook;Choi, Se-Jong
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.2
    • /
    • pp.111-116
    • /
    • 2021
  • Normal Operation Safety Survey (NOSS) is a safety management tool used by air traffic control organizations to measure data related to threats and errors to proactively prevent accidents before they occur. NOSS was developed to be applied to the air traffic control field according to the concept of Line Operation Safety Audit (LOSA) conducted by airlines to reduce human errors in the cockpits. Safety management based on data is crucial for the prevention of control-related accidents, and the competency of observers for this is important for the successful implementation of NOSS. Based on LOSA implementation experiences and expert interviews, this paper introduces the international NOSS methods and discusses the key factors required for effective observation and the implementation methods and implications of NOSS observer training.

Clinical Feature and General Management of Post-Hemorrhagic Hydrocephalus in Premature Infants

  • Shunsuke Ichi
    • Journal of Korean Neurosurgical Society
    • /
    • v.66 no.3
    • /
    • pp.247-257
    • /
    • 2023
  • Recently, the survival of the high-risk population of preterm infants has steadily improved, and the severity of prematurity is a growing threat of gestational-age-related fatal conditions. Posthemorrhagic hydrocephalus (PHH) is the most common but serious neurological complication in premature infants, which can have life-threatening consequences during the acute phase in the neonatal period and life-long psychomotor and cognitive sequelae in their later life. Although neonatologists, pediatric neurologists, and pediatric neurosurgeons have investigated a diversified strategy for several decades, a consensus on the best management of PHH in premature infants still must be reached. Several approaches have tried to reduce the incidence of intraventricular hemorrhage (IVH) and mitigate the effect of IVH-related hydrocephalus. This paper reviews and discusses the clinical feature of PHH in premature infants, general/nonsurgical management of prematurity for IVH prevention, and posthemorrhagic management, and how and when to intervene.

Secure and Resilient Framework for Internet of Medical Things (IoMT) with an Effective Cybersecurity Risk Management

  • Latifah Khalid Alabdulwahhab;Shaik Shakeel Ahamad
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.73-78
    • /
    • 2024
  • COVID-19 pandemic outbreak increased the use of Internet of Medical Things (IoMT), but the existing IoMT solutions are not free from attacks. This paper proposes a secure and resilient framework for IoMT, it computes the risk using Risk Impact Parameters (RIP) and Risk is also calculated based upon the Threat Events in the Internet of Medical Things (IoMT). UICC (Universal Integrated Circuit Card) and TPM (Trusted Platform Module) are used to ensure security in IoMT. PILAR Risk Management Tool is used to perform qualitative and quantitative risk analysis. It is designed to support the risk management process along long periods, providing incremental analysis as the safeguards improve.

Detecting Insider Threat Based on Machine Learning: Anomaly Detection Using RNN Autoencoder (기계학습 기반 내부자위협 탐지기술: RNN Autoencoder를 이용한 비정상행위 탐지)

  • Ha, Dong-wook;Kang, Ki-tae;Ryu, Yeonseung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.763-773
    • /
    • 2017
  • In recent years, personal information leakage and technology leakage accidents are frequently occurring. According to the survey, the most important part of this spill is the 'insider' within the organization, and the leakage of technology by insiders is considered to be an increasingly important issue because it causes huge damage to the organization. In this paper, we try to learn the normal behavior of employees using machine learning to prevent insider threats, and to investigate how to detect abnormal behavior. Experiments on the detection of abnormal behavior by implementing an Autoencoder composed of Recurrent Neural Network suitable for learning time series data among the neural network models were conducted and the validity of this method was verified.

The Influence of Violence Experience on the Job Stress among Hospital Employees Working at Administration and Discharging Department (병원 원무행정근무자의 폭력경험이 직무스트레스에 미치는 영향)

  • Choi, Yun-young;Han, Mi Ah;Park, Jong;Choi, Seong Woo
    • Health Policy and Management
    • /
    • v.26 no.4
    • /
    • pp.325-332
    • /
    • 2016
  • Background: Workplace violence was recognized to be social problems that might impact the health status and the job satisfaction of employee in hospitals. This study investigated the current status of violence and job stress among hospital employees working at administration and discharging department. Methods: The study subjects were 213 administrative employees working at 20 general hospitals. Data were collected by self-administered questionnaire that included information such as demographics, job-related characteristics, experience of violence, and job stress. The violence was classified as verbal violence, physical threat, and physical violence occurred by patients and caregivers. Analysis of variance, t-tests, correlation analysis, and multiple linear regression analysis were performed to examine the associated factors with job stress. Results: The levels of verbal violence, physical threat, and physical violence were $1.64{\pm}1.08$, $0.54{\pm}0.67$, and $0.04{\pm}0.17$, respectively. The score of job stress was $2.74{\pm}0.50$ and it was associated with age, existence of spouse, drinking frequency, subjective health status, disease history, night-time treatment, and public health administration career in simple analysis. In multiple linear regression analysis, the level of verbal violence experience was significantly associated with job stress (B=0.09, p=0.001). Also physical threats (B=0.18, p<0.001) and physical violence (B=0.48, p=0.008) showed positive association with job stress. Conclusion: This study attempted to examine the association between experience of violence and job stress in administrative employees at medical institutions. Levels of violence showed positive correlation with the job stress. Environment improvement to protect employee from violence and management of employees who experienced workplace violence are needed to reduce the job stress.

The Exploratory Study on Security Threats and Vulnerabilities for Mobile Office Environment (모바일오피스 환경에서의 보안위협 및 취약점에 대한 탐색적 연구)

  • Choi, Young-Jin;Ra, Jong-Hei;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.175-185
    • /
    • 2014
  • This study is based on the information security management system, the threat from mobile office, mobile office configuration item type, vulnerability analysis and control at the level of the current possibilities for technology to its purpose. To perform exploratory study for mobile Office to target the new technology, we were used the integrated research methods such as the documentary survey, expert FGI and real user's survey. To identify the main risk areas of mobile office services, we develop the mobile service layer model that separated the place, terminal, network, server according to service deliverly system. Finally, the result of survey for threats and vulnerabilities showed that the control of the terminal of user is a significant.

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.