• Title/Summary/Keyword: Threat Management

Search Result 642, Processing Time 0.022 seconds

Implementation of the Web-Based K-LOSA Program for the Safety Observation in Normal Operation (정상운항에서 안전 관찰을 위한 웹 기반 K-LOSA 프로그램 구현)

  • Choi, Youn-Chul;Hong, Seung-Beom
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.4
    • /
    • pp.319-324
    • /
    • 2014
  • Line operation safety audit (LOSA) is the proactive data collection system to capture the accident and serious incident caused by flight crew and is the safety management program for collecting threat error management (TEM) and crew resource management (CRM) during normal operations. The typically LOSA is written by hand, manages and archives the LOSA Observation Worksheet. But, this method is not easy to archive and ensure confidentiality of the LOSA worksheets. As we implemented the K-LOSA of the web-document type instead of the existing LOSA archive method and change the TEM category code. we yields to archive the efficient data management and confidentiality. In this paper, we introduce the LOSA and to configure the K-LOSA program.

Historical Review on Aviation Threats and Management of Aviation Security (항공위협의 역사적 고찰과 항공보안 관리 연구)

  • Ahn, J.H.;Kang, J.Y.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.12 no.2
    • /
    • pp.29-42
    • /
    • 2004
  • This paper performs a historical review on aviation threats through a statistical survey. The impact factor, as a criterion to measure the seriousness of the threats occurred, is introduced and evaluated based on annual totals of hijacking and fatalities against aircraft 1948 through 2004. Also, the paper suggests processes of evaluating the level of threats and key functions for an effective management of the aviation security.

  • PDF

A Study Threat Classification Schemes for Effective Management based on W-TMS(Wireless-Threat Management System) (W-TMS(Wireless-Threat Management System)에서의 효율적 관리를 위한 위협 분류기법에 관한 연구)

  • Seo, Jong-Won;Jo, Je-Gyeong;Lee, Hyung-Woo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.238-241
    • /
    • 2006
  • 지난 10년 동안 인터넷은 빠른 속도로 모든 분야에 확산되어 왔으면 이와 비슷한 현상으로 최근 몇 년 동안 무선 네트워크의 확산 역시 타른 속도로 보급되고 있는 추세이다. 그리고 무선 네트워크 침입의 형태와 기술 또한 시간과 비례하여 그 다양성이 점차 증가되고 있으며 공격 시도 및 침입에 성공하는 공격의 횟수도 증가하고 있다. 기존 무선 보안 시스템인 Wireless-IDS는 사고 대응 계획이 설계되고 기획되지 않으면, 보안성을 거의 제공하지 않는다. 그리고 이벤트를 감시하고 사고에 대응하기 위한 인적 요소 비용이 크게 소요되는 단점을 가지고 있다. 기존의 TMS는 필요에 따라 자동화되고 능동적인 대응 수단을 제공하기도 하지만, 새롭게 생성되는 많은 무선 위협의 경우 사람이 막아야 하는 현실을 고려하고 있다. 그리하여 본 연구에서는 무선 상에서의 위협을 자동적으로 관리하는 Wireless-TMS의 효율적인 관리를 위해 수많은 무선 트래픽 중에 위협을 어떻게 분류할 것인가에 초점을 맞추어 연구를 진행한다.

  • PDF

Design of Wireless Threat Management System (무선망 위협 관리 시스템(W-TMS : Wireless Threat Management System) 설계에 관한 연구)

  • Seo Jong-Won;Lee Hyung-Woo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.654-657
    • /
    • 2006
  • 무선 네트워크의 가장 큰 이점은 이동성에 있다. 따라서 사용자들은 네트워크에 접속하면서 자유롭게 로밍(이동)할 수 있다. 그 이동성의 전제는 물리적인 매체 없이 네트워크에 접속이 가능하다는 것이다. 그러나 이러한 이점에도 불구하고 유선 네트워크에서의 기초적인 물리적 보안기반 구조를 무선네트워크에서는 제공하고 있지 않다는 것이다. 하지만 무선 네트워크가 기존 유선 네트워크에 비해 대역폭이 적다는 이유로 성능감소를 우려하는 사용자들은 보안 알고리즘 적용을 꺼려왔고 쉽게 해킹의 대상이 되어 왔다. 이에 본 논문에서는 특정 네트워크에 국한되지 않으면서도 유연성을 제공하는 W-TMS(Wireless Threat Management System) 시스템을 설계하여 기존 무선 네트워크 환경에서 보안 취약성을 보안하면서 안전성을 강화할 수 있는 무선망 보안 시스템을 제안한다.

  • PDF

Security Risk Evaluation Scheme for Effective Threat Management (효과적인 위협관리를 위한 보안 위험도 평가기법)

  • Kang, Pil-Yong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.380-386
    • /
    • 2009
  • It is most important that identifying security threats(or vulnerabilities) of critical IT assets and checking the propriety of related security countermeasures in advance for enhancing security level. In this paper, we present a new security risk evaluation scheme based on critical assets and threats for this. The presented scheme provides the coverage and propriety of the countermeasures(e.g., intrusion detection rules and vulnerability scan rules, etc.), and the quantitative risk level of identified assets and threats. So, it is expected that the presented scheme will be utilized in threat management process efficiently compared to previous works.

Doing More by Seeing Less: Gritty Applicants are Less Sensitive to Facial Threat Cues

  • Shin, Ji-eun;Lee, Hyeonju
    • Science of Emotion and Sensibility
    • /
    • v.25 no.1
    • /
    • pp.21-28
    • /
    • 2022
  • People differ greatly in their capacity to persist in the face of challenges. Despite significant research, relatively little is known about cognitive factors that might be involved in perseverance. Building upon human threat-management mechanism, we predicted that perseverant people would be characterized by reduced sensitivity (i.e., longer detection latency) to threat cues. Our data from 5,898 job applicants showed that highly perseverant individuals required more time to correctly identify anger in faces, regardless of stimulus type (dynamic or static computer-morphed faces). Such individual differences were not observed in response to other facial expressions (happiness, sadness), and the effect was independent of gender, dispositional anxiety, or conscientiousness. Discussions were centered on the potential role of threat sensitivity in effortful pursuit of goals.

A Study on the Threat-Level Assessment Model Developmnet using Fuzzy Theory (퍼지이론 이용한 적 위협수준평가 모델개발 연구)

  • Jang, Dong-Hak;Hong, Yoon-Gee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.7
    • /
    • pp.3245-3250
    • /
    • 2011
  • This study introduces a threat level assessment model adapting Fuzzy theories in order to help make decisions for better covering quantitative factors and qualitative ones together. The threat is classified into three major categories - one resulting from navigational condition, another from target vessel specification and the other from external decision environment. The threat levels by each category are examined by a fuzzy inference, and its corresponding weights are assigned via fuzzy measures. Finally the high level threat measures become integrated via a Choquet Fuzzy Integral method into ultimate threat level indicators.

Development Security agents for Integrated security management of the Educational Network (교육망의 통합보안관리를 위한 보안 에이전트 개발)

  • Lee, Do Hyeon;Kim, Hyun Cheol;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.43-55
    • /
    • 2015
  • Security infrastructure of Educational Network responds to threats by collecting and analyzing security events from various information protection system based on the integrated management system. Even if this system provides useful and detailed information to the administrator, there are some problems that this system does not provide effective response process and management systems for various threatening situations and the simultaneous threat processes. To solve this problem, we propose and develop security agents that enable the administrator to effectively manage integrated security for Educational Network. The proposed solution provides the administrator with efficient management techniques and process scheduling for various security events so that the administrator can response promptly to problems with the initial threat to Educational Network.

A study on the Development of Personnel Security Management for Protection against Insider threat (내부 정보보호를 위한 인원보안 관리 방안 연구)

  • Cha, In-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.4
    • /
    • pp.210-220
    • /
    • 2008
  • Insider threat is becoming a very serious issue in most organizations and management is responsible for security implementation. This study is to develop a personnel security management indicators in the areas of Personnel Assurance, Personnel Competence, and Security Environment and protection against insider threats. In this study, the information security management system and related papers are examined by reviewing the existing researches and cases. Proposed indicators are verified by pilot test, empirically analyzed to expose experts' perception and the validity, importance, and risk level of each indicators through a questionnaire. Result were encouraging, but additional study focused on personnel security management using factor analysis is needed in the future.

  • PDF

A Study for Cyber Situation Awareness System Development with Threat Hunting (위협 헌팅을 적용한 사이버 상황인식 시스템 개발에 관한 연구)

  • Lee, Jaeyeon;Choi, Jeongin;Park, Sanghyun;Kim, Byeongjin;Hyun, Dae-Won;Kim, Gwanyoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.807-816
    • /
    • 2018
  • Threat hunting is defined as a process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions. The main concept of threat hunting is to find out weak points and remedy them before actual cyber threat has occurred. And HMM(Hunting Maturity Matrix) is suggested to evolve hunting processes with five levels, therefore, CSOC(Cyber Security Operations Center) can refer HMM how to make them safer from complicated and organized cyber attacks. We are developing a system for cyber situation awareness system with pro-active threat hunting process called unMazeTM. With this unMaze, it can be upgraded CSOC's HMM level from initial level to basic level. CSOC with unMaze do threat hunting process not only detecting existing cyber equipment post-actively, but also proactively detecting cyber threat by fusing and analyzing cyber asset data and threat intelligence.