• Title/Summary/Keyword: Threat analyzing

Search Result 154, Processing Time 0.02 seconds

Importance-Performance Analysis (IPA) of Cyber Security Management: Focused on ECDIS User Experience

  • Park, Sangwon;Chang, Yeeun;Park, Youngsoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.3
    • /
    • pp.429-438
    • /
    • 2021
  • The mandatory installation of the ECDIS (Electronic Chart Display and Information System) became an important navigational equipment for navigation officer. In addition, ECDIS is a key component of the ship's digitalization in conjunction with various navigational equipment. Meanwhile, cyber-attacks emerge as a new threat along with digitalization. Damage caused by cyber-attacks is also reported in the shipping sector, and IMO recommends that cybersecurity guidelines be developed and included in International Security Management (ISM). This study analyzed the cybersecurity hazards of ECDIS, where various navigational equipment are connected. To this end, Importance-Performance Analysis (IPA) was conducted on navigation officer using ECDIS. As a result, the development of technologies for cyber-attack detection and prevention should be priority. In addition, policies related to 'Hardware and Software upgrade', 'network access control', and 'data backup and recovery' were analyzed as contents to be maintained. This paper is significant in deriving risk factors from the perspective of ECDIS users and analyzing their priorities, and it is necessary to analyze various cyber-attacks that may occur on ships in the future.

Technology Competitiveness Analysis of New & Renewable Energy in Major Countries (주요국의 신재생에너지 분야 기술경쟁력 분석 연구)

  • Ha, Su-Jin;Choi, Ji-Hyeok;Oh, Sang Jin
    • New & Renewable Energy
    • /
    • v.18 no.3
    • /
    • pp.72-84
    • /
    • 2022
  • As the threat of climate change escalates, 'net-zero' has become a priority for the international community, and the use of new and renewable energy sources is expected to play a significant role in reaching international carbon neutrality. Here, we evaluate technological competitiveness in terms of implementation and technology by analyzing scientific literature and patents in the new and renewable energy fields of five major countries. For the past 10 years (2009-2019), the most active areas of new and renewable energy research and development have been solar power, wind power, waste, and fuel cells. China is the forerunner in implementation, whereas the United States has the most advanced technology. Portfolio analysis revealed that Korea's fuel cell, the United States' bioenergy, China's waste, Japan's solar and fuel cell, and the European Union's wind power have shown to be in Star Field respectively. Technological competitiveness analysis found that Korea is lagging behind other countries in the new and renewable energy sector, and needs to set a new direction for future carbon-neutral research and development, investment, and policy.

A Study on the ChatGPT: Focused on the News Big Data Service and ChatGPT Use Cases (ChatGPT에 관한 연구: 뉴스 빅데이터 서비스와 ChatGPT 활용 사례를 중심으로)

  • Lee Yunhee;Kim Chang-Sik;Ahn Hyunchul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.1
    • /
    • pp.139-151
    • /
    • 2023
  • This study aims to gain insights into ChatGPT, which has recently received significant attention. The study utilized a mixed method involving case studies and news big data analysis. ChatGPT can be described as an optimized language model for dialogue. The question arises whether ChatGPT will replace Google search services, posing a potential threat to Google. It could hurt Google's advertising business, which is the foundation of its profits. With AI-based chatbots like ChatGPT likely to disrupt the web search industry, Google is establishing a new AI strategy. The study used the BIG KINDS service and analyzed 2,136 articles over six months, from August 23, 2022, to February 22, 2023. Thirty of these articles were written in 2022, while 2,106 have been reported recently as of February 22, 2023. Also, the study examined the contents of ChatGPT by utilizing literature research, news big data analysis, and use cases. Despite limitations such as the potential for false information, analyzing news big data and use cases suggests that ChatGPT is worth using.

A Study on Strategies of Gunsan Port by Considering Regional Characteristics (지역특화산업을 고려한 군산항 발전 방안)

  • Jung-Ho Na;Sung-Woo Cho
    • Korea Trade Review
    • /
    • v.46 no.6
    • /
    • pp.39-54
    • /
    • 2021
  • This study comprehensively reviews the research conducted until recently in order to derive realistic alternatives in consideration of local industries. The case analysis was performed on a competitive port of similar size, and strategies and revitalization measures were suggested in consideration of the conditions of Gunsan Port. Literature review focused on papers and major reports. The case of similar size were analyzed for Daesan port, Boryeong port, and Mokpo port. In order to find strategies to revitalize the regional port logistics industry behind Gunsan Port, the recent opportunities and threat factors of Gunsan Port were derived. In order to foster the regional port logistics industry with Gunsan Port as its main base, this study proposes a three-step development strategy. It is necessary to increase the effectiveness of the public-private joint port sales and maintain the incentive system, but use it as a means to strengthen the competitiveness of Gunsan Port. Since the possibility of opening various routes is not high due to the conditions of Gunsan Port, various business models can be devised to link the currently opened routes. Start-up in the logistics field can stand out if they provide predictive data or provide consulting services by securing and analyzing logistics data, not directly providing logistics services.

A Novel Framework for APT Attack Detection Based on Network Traffic

  • Vu Ngoc Son
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.52-60
    • /
    • 2024
  • APT (Advanced Persistent Threat) attack is a dangerous, targeted attack form with clear targets. APT attack campaigns have huge consequences. Therefore, the problem of researching and developing the APT attack detection solution is very urgent and necessary nowadays. On the other hand, no matter how advanced the APT attack, it has clear processes and lifecycles. Taking advantage of this point, security experts recommend that could develop APT attack detection solutions for each of their life cycles and processes. In APT attacks, hackers often use phishing techniques to perform attacks and steal data. If this attack and phishing phase is detected, the entire APT attack campaign will be crash. Therefore, it is necessary to research and deploy technology and solutions that could detect early the APT attack when it is in the stages of attacking and stealing data. This paper proposes an APT attack detection framework based on the Network traffic analysis technique using open-source tools and deep learning models. This research focuses on analyzing Network traffic into different components, then finds ways to extract abnormal behaviors on those components, and finally uses deep learning algorithms to classify Network traffic based on the extracted abnormal behaviors. The abnormal behavior analysis process is presented in detail in section III.A of the paper. The APT attack detection method based on Network traffic is presented in section III.B of this paper. Finally, the experimental process of the proposal is performed in section IV of the paper.

Research on Security Detection Policy Model in the SIEM for Ship (선박용 Security Information Event Management (SIEM) 개발을 위한 보안 정책 모델에 관한 연구)

  • Gumjun Son;Jongwoo Ahn;Changsik Lee;Namseon Kang;Sungrok Kim
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.61 no.4
    • /
    • pp.278-288
    • /
    • 2024
  • According to International Association of Classification Societies (IACS) Unified Requirement (UR) E26, ships contracted for construction after July 1, 2024 should be designed, constructed, commissioned and operated taking into account of cyber security. In particular, ship network monitoring tools should be installed in accordance with requirement 4.3.1 in IACS UR E26. In this paper, we propose a Security Information and Event Management (SIEM) security policy model for ships as an effective threat detection method by analyzing the cyber security regulations and ship network status in the maritime domain. For this purpose, we derived the items managed in the SIEM from the maritime cyber security regulations such as those of International Maritime Organization (IMO) and IACS, and defined 14 detection policies considering the status of the ship network. We also presents the detection policy for non-expert crews to understand it, and occurrence conditions depending on the ship's network environment to minimize indiscriminate alarms. We expect that the results of this study will help improve the efficiency of ship SIEM to be installed in the future.

Gynecologic Patients' Recognition of Radiation Exposure in Gyeongbuk Area (경북 지역 산부인과 환자의 방사선피폭 인식)

  • Park, Jeong-Kyu
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.8
    • /
    • pp.176-187
    • /
    • 2008
  • As the radiological medical instruments have been competitively developed in recent years, its utilization for the patient treatment has been expanded. The medical examination using the radiation has been gradually increased, so that it is recognized as a significant factor of increasing the radiation exposure. In this study, the recognition about the radiation exposure was analyzed for 555 gynecologic patients in 8 secondary and tertiary medical centers in Gyeongbuk from November 17 to April 19, 2007. The results are followed. There was a significant difference on the recognition for the radiation by age and education (p<0.05), There was the significant difference in the recognition about the radiological instruments by age and occupation (p<0.05), and there was the significant difference in the information identification & analysis by age and occupation (p<0.05). As the result of analyzing a correlation of the radiation's harmfulness, recognition, psychological state and exposure prevention, there was the correlation of 0.572 between the harmfulness and recognition, the correlation of 0.740 between the harmfulness and the psychological state, and the correlation of 0.477 between the harmfulness and the exposure prevention. It was statistically very significant (p<0.01). But, there was no significance with the radiological instrument and information identification (p>0.05). As the result of the study, it could be known that the mental threat factor was more included than the physical threat from the position of gynecologic patients who were sensitive to the radiation. Accordingly, radiological technologist who manages the radiation needs to let the patient or its guardians recognize the degree of physical harmfulness exactly.

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

Environmental analysis and strategy to jointly host the 2027 Chungcheong Summer World University Games (2027 충청 하계세계대학경기대회 공동유치를 위한 환경분석 및 전략)

  • Lee, Jong-Hyun;Kim, Hwa-Ryong;Jeon, Sang-Wan
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.333-346
    • /
    • 2022
  • This study proposes a strategy to attract visitors by analyzing the justification for hosting the 2027 Summer World University Games in Chungcheong, Korea, as well as by assessing the internal and external factors to promote regional development. Using Environmental Analysis as the diagnostic approach, we focus on strength/opportunity (SO), strength/threat (ST), weakness/opportunity (WO), and weakness/threat (WT) analyses. SO analysis show that a matching strategy of mid- to long-term cooperation among the four cities and provinces in Chungcheong and development of local sports by promoting its linkages to science, and industry offer best strategic use-value. ST analysis shows that optimal infrastructure development and establishment of competition management strategies in preparation for non-face-to-face engagement make balanced regional development possible. WO analysis shows the need for rearrangement and renovation of outdated sports facilities, development of programs linked to convergence sports tourism products, efficient and strategic attraction activities, and promoting sustainable development of bed town cities. WT analysis suggests that the imbalance in regional development due to expansion of sports facilities, insufficient cultural contents in tourism, and tourism demand fluctuation are potential problems. Follow-up studies can focus on deeper analysis of the possibility and attractiveness of hosting the Summer World University Games in Chungcheong, Korea using qualitative methods such as focus group interviews and in-depth interviews with stakeholders and local residents.

A Study on Deriving Strategic Tasks of Continuing Education Institutions for Librarians Applying PEST-3Cs-SWOT (PEST-3Cs-SWOT 방법론을 적용한 사서 계속교육 기관의 전략과제 도출에 관한 연구)

  • Jung, Youngmi;Noh, Younghee
    • Journal of Korean Library and Information Science Society
    • /
    • v.53 no.3
    • /
    • pp.343-376
    • /
    • 2022
  • Continuing education for professionals is the most basic requirement for continuous professional development. The enhancement of the professionalism of librarians will also be possible through the establishment of a systematic continuing education strategy of the national level. In this study, we tried to derive a strategy for continuing education for librarians in Korea by analyzing the internal and external environment of national institutions that are the center of continuing education for librarians. To this end, we proposed a complex framework of PEST-3Cs-SWOT as a systematic environmental analysis methodology and tried to apply it. For PEST analysis, literature related to library, librarian, and librarian education was extensively reviewed, and for 3Cs analysis, in-depth interviews with internal employees, questionnaire data analysis on the demand survey of training subjects, and case studies of similar institutions in Korea and abroad were conducted. Based on this, SWOT analysis was conducted, and finally, 4 strengths-opportunity strategic tasks, 5 weaknesses-opportunity strategic tasks, 5 strength-threat strategic tasks, and 3 weaknesses-threat strategic tasks were derived. This study will be meaningful in that it presents strategic tasks for continuing education institutions in Korea, and at the same time suggests and applies a complex analysis methodology that can be applied to tasks similar to development plans and strategy establishment.