• 제목/요약/키워드: Threat Management

검색결과 651건 처리시간 0.026초

우리나라 국민의 우주위험인식 수준과 국가 재난정책 (Public's Recognition of the Space Object's Re-entry Situations and the National Space Disaster Management Policy)

  • 김시은;조성기;홍정유
    • 한국안전학회지
    • /
    • 제31권6호
    • /
    • pp.84-92
    • /
    • 2016
  • Since the mankind started its space mission, the number of artificial space objects has been increasing exponentially. It contains not just the space machines which are in use but the machines which are out of order. Meantime, those dead machines are being a serious danger, a real threat to human's lives and property because of it could re-enter into the earth's atmosphere and fall to the ground causing mega-disaster. As the number of space activities gets growing so far, the re-entry of the space objects will be a lot more happened in the future. Therefore, not just natural space object like asteroids but the artificial space object like artificial satellite and space station can cause the disaster by falling to the ground. To protect our nation and our property, the government has set up the space disaster management center in Korea astronomy and Space science Institute. In this study, we surveyed public's recognition of the space object's re-entry situation and analyzed it to contribute building national space disaster management policy.

개인사용자 기반 스마트폰 원격관리 시스템 설계 및 구현 (Individual users based SmartPhone Remote Management System Design and Implementation)

  • 강성태;조인준
    • 한국정보통신학회논문지
    • /
    • 제16권12호
    • /
    • pp.2675-2681
    • /
    • 2012
  • 최근 스마트폰 사용인구가 늘어나면서 휴대하기 쉽고, 각종 컨텐츠의 보관 및 이동이 쉬운 특성으로 인해 분실, 도난에 따른 개인 정보 유출뿐만 아니라 기밀 유출에 이르기까지 다양한 보안 위협 문제가 발생하고 있다. 본 논문에서는 고객을 대상으로 스마트폰의 다양한 보안 위협에 대응하기 위해 Mobile Device Management (MDM) 기술을 활용하여 사용자가 직접 관리가 가능한 스마트폰 원격관리 시스템을 설계하고 구현하였다. 이를 통해서 고객 스스로가 웹에서 스마트폰을 원격 관리하여 스마트폰의 분실, 도난에 따른 정보유출을 방지 할 수 있고, 사용제어 및 모니터링이 가능하다.

전략물자 무역 리스크 관리 방안에 대한 연구 (A Study on the Risk Management of Strategic Materials)

  • 이경령;이승택
    • 무역상무연구
    • /
    • 제72권
    • /
    • pp.115-137
    • /
    • 2016
  • Trade can be greatly influenced by the change of international trade environment due to the characteristics of remote transactions. Furthermore, in the circumstance of emphasizing the national security again, the importance of the risk management of special materials has been increasing. As it was noted at Chapter 4, significant results such as the threat of enterprises' sustainable growth can be occurred when companies are related to the unlawful export of strategic materials or experience discouragement of export of main products. As the decision of strategic materials greatly depend on a specialized knowledge there is a possibility of misjudgement of strategic materials in terms of ordinary companies which is not accustomed to them. Furthermore risk management is more difficult due to the inclusion to the items of export license. To prepare such a risk of export of strategic materials, firstly, it should be checked to find whether counter traders are working in the industry which is not related to the spread of weapons of mass destruction, secondly, an appropriate process shall be designed and operated for products to be safely delivered to the trade counter. Therefore, our export enterprises have to introduce CP(Compliance Program), AEO or ISO28000 considering suitability for their actual situations not only to promote export and but also to avoid risk of export control and additional expenses. Through these appropriate processes, an efficient and effective management of the trade risk of strategic materials can be accomplished.

  • PDF

컨택센터의 고객 개인정보 보호 모델 (Security Management Model for Protecting Personal Information for the Customer Contact Center)

  • 권영관;염흥열
    • 정보보호학회논문지
    • /
    • 제19권2호
    • /
    • pp.117-125
    • /
    • 2009
  • 일반적으로 컨택센터에서는 고객의 개인정보 취급이 필수적이며, 중요정보자산인 고객의 개인정보를 취급하는 고객정보취급자의 수가 매우 많아, 내부 고객정보 유출 가능성 등의 위협요인이 존재하고 있다. 본 논문에서는 컨택센터의 특성과 위협요인 및 취약점을 분석하였으며, 고객의 개인정보를 효과적으로 보호할 수 있는 방안을 연구하였다. 또한 내부 정보 유출 가능성을 사전에 예방할 수 있는 개인정보 보호 방안을 마련하였다. 그리고 컨택센터의 고객 개인정보보호 방안에 대하여 ISMS (Information Security Management System) 표준을 따르는 "컨택 센터의 고객 개인정보 보호 모델"을 수립하여 제안한다.

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

Methodology of Cyber Security Assessment in the Smart Grid

  • Woo, Pil Sung;Kim, Balho H.
    • Journal of Electrical Engineering and Technology
    • /
    • 제12권2호
    • /
    • pp.495-501
    • /
    • 2017
  • The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. In other words, The Energy Management System (EMS) and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. In this study, the optimal power flow (OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.

격추확률 최대화를 위한 미사일 최적배치 문제 (An Optimal Missile Allocation Problem for Maximizing Kill Probability)

  • 정치영;이재영;이상헌
    • 경영과학
    • /
    • 제27권1호
    • /
    • pp.75-90
    • /
    • 2010
  • In this paper, we proposed new solution procedure of the air defense missile allocation problem. In order to find the optimal location of missile, we formulated a simple mathematical model maximizing the kill probability of enemy air threat including aircraft and missile. To find the Kill probability, we developed a new procedure using actual experimental data in the mathematical model. Actual experimental data mean real characteristic factor, which was acquired when the missile had been developed through missile fire experiment. The result of this study can offer practical solution for missile allocation and the methodology in this study can be used to the decision making for the optimal military facility allocation.

쉬운 키패드 - 스마트 기기에서 사용하는 로그인 정보 입력만을 위한 소프트키보드 (Easy Keypad - Soft Keyboard for Login Information Input in Smart Devices)

  • 고형대
    • 디지털산업정보학회논문지
    • /
    • 제10권2호
    • /
    • pp.107-120
    • /
    • 2014
  • In this paper, we suggest a soft keyboard, called easy keypad, that we use only for login information input in smart devices. Especially, as easy keypad is applied to MTS(Mobile Trading System) we suggest easy keypad in MTS. Easy keypad UI in MTS represents 20 letters and users input login information by using 20 letters. We suggest protocol which decides letters represented in easy keypad UI, which is code for users to input login information by using 20 letters. We analyze easy keypad's safe degree for soft keyboard security threat, especially when it comes to point hacking, we suggest comparison among original soft keyboard's safe degree. Also we suggest mathematical fomula for measuring soft keyboard's convenience and then we analyze the result of soft keyboard's convenience by the presented mathematical formula.

Issues Related to RFID Security and Privacy

  • Kim, Jong-Ki;Yang, Chao;Jeon, Jin-Hwan
    • 한국경영정보학회:학술대회논문집
    • /
    • 한국경영정보학회 2007년도 International Conference
    • /
    • pp.951-958
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID may be viewed as a means of explicitly labeling objects to facilitate their "perception" by computing devices. RFlD systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFlD systems which could threat the technology s future. To successfully adopt RFID technology in various applications. we need to develop the solutions to protect the RFID system s data information. This study investigates important issues related to privacy and security of RF1D based on the recent literature and suggests solutions to cope with the problem.

  • PDF

탄도미사일 방어무기체계 배치모형 연구 (Optimal Allocation Model for Ballistic Missile Defense System by Simulated Annealing Algorithm)

  • 이상헌
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회/대한산업공학회 2005년도 춘계공동학술대회 발표논문
    • /
    • pp.1020-1025
    • /
    • 2005
  • The set covering(SC) problem has many practical application of modeling not only real world problems in civilian but also in military. In this paper we study optimal allocation model for maximizing utility of consolidating old fashioned and new air defense weapon system like Patriot missile and develop the new computational algorithm for the SC problem by using simulated annealing(SA) algorithm. This study examines three different methods: 1) simulated annealing(SA); 2) accelerated simulated annealing(ASA); and 3) selection by effectiveness degree(SED) with SA. The SED is adopted as an enhanced SA algorithm that the neighboring solutions could be generated only in possible optimal feasible region at the PERTURB function. Furthermore, we perform various experiments for both a reduced and an extended scale sized situations depending on the number of customers(protective objective), service(air defense), facilities(air defense artillery), threat, candidate locations, and azimuth angles of Patriot missile. Our experiment shows that the SED obtains the best results than others.

  • PDF