• Title/Summary/Keyword: cyber disaster

Search Result 102, Processing Time 0.022 seconds

A Method of Establishing the National Cyber Disaster Management System (국가 사이버재난관리 시스템 구축 방안)

  • Kim, Sang-Wook;Shin, Yong-Tae
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.351-362
    • /
    • 2010
  • In Korea, national information infrastructure has been grown well because of the rapid growth and supply of Internet, but threats of cyber terror and cyber war are also increasing. Cyber attacks on knowledge information society threaten industry, economy and security. Major countries realize that cyber attacks can cause national heavy loss. So, they are trying to adopt policy on their cyber safe. And natural environmental crisises are increasing around the world. Countries such as India and Philippine in which tsunami, typhoon and earthquake are often occurring have national systematic disaster management system that can prevent and recover. We need systematic management for prevention and recovery from cyber terror, and need to establish national cyber disaster management system. Therefore, in this paper, we analyze major countries's cyber security policy and suggest a method of establishing the national cyber disaster management system.

Cyber Risk Management of SMEs to Prevent Personal Information Leakage Accidents (개인정보유출 사고 방지를 위한 중소기업의 사이버 위험관리)

  • So, Byoung-Ki;Cheung, Chong-Soo
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.2
    • /
    • pp.375-390
    • /
    • 2021
  • Purpose: Most of cybersecurity breaches occur in SMEs. As the existing cybersecurity framework and certification system are mainly focused on financial and large companies, it is difficult for SMEs to utilize it due to lack of cybersecurity budget and manpower. So it is necessary to come up with measures to allow SMEs to voluntarily manage cyber risks. Method: After reviewing Cybersecurity market, cybersecurity items of financial institutions, cybersecurity framework comparison and cybersecurity incidents reported in the media, the criticality of cybersecurity items was analyzed through AHP analysis. And cybersecurity items of non-life insurers were also investigated and made a comparison between them. Result: Cyber risk management methods for SMEs were proposed for 20 major causes of cyber accidents. Conclusion: We hope that the cybersecurity risk assessment measures of SMEs in Korea will help them assess their risks when they sign up for cyber insurance, and that cyber risk assessment also needs to be linked to ERM standardization.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

Analysis of Response Status Based on Cyber Crisis Scenario (사이버 위기 시나리오 기반 대응 현황 분석)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.296-297
    • /
    • 2019
  • An effective crisis management system capable of responding early in the event of a major disaster or cyber crisis is needed not only within the organization but also with the partner organizations and the outside. In this paper, we review the domestic and international countermeasures against major disasters and cyber crises, and discuss the emerging crisis responses and future prospects along with the development of ICT technology.

  • PDF

Actual Conditions of Cyberbullying and the Countermeasure (사이버 괴롭힘의 실태와 대응방안)

  • Lim, Woon-sik;Choi, Hyun-sick
    • Journal of the Society of Disaster Information
    • /
    • v.6 no.1
    • /
    • pp.122-137
    • /
    • 2010
  • The purpose of this study is to find the exact state of cyberbullying and the countermeasure for it. cyberbullying is characterized by having the wideness, the anonymity and the intellectualization unlike the harassment of off-line. The result of this study, the cyberbullying is increased through the e-mail, cellular phone, and website around the teenagers. In particular, the cyberbullying has appeared mainly among the same age friends, it is proved that injurers inflict the harassment mainly at their own place and the ratio of the harassment by one self is higher than many. In addition, it is quite probable that the injurer-student who inflicts the harassment in off-line also can do it in on-line and to attack the cyberbullying is easy to find by the student who is indulged himself in internet use. Therefore, it is presented that the countermeasure in educational side and systematic side on this study. First on the educational side, there are presented the practice of the preventive education against the cyberbullying, expansion of the preventive schools for the cyber ethics and cyber crime and strengthening of the guideline for students in cyberspace. Second on the systematic side, there are presented the appointment of various committee, to strengthen the protection of damaged students, preparation of laws for cyberbullying, expansion of information office for internet addiction, improvement of the system for the school custodian and to extend the operating for cyber clearness school.

The Proposal of Installations Standards for Commercial Kitchen Automatic Fire System (상업용 주방자동소화장치 도입과 설치기준 제안)

  • Lee, Changwoo;Kang, Dowoo;Oh, Seungju;Ham, Eungu;Cho, Yongsun
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.1
    • /
    • pp.89-97
    • /
    • 2016
  • According to the statistics released by Ministry of Public Safety and Security, the number of restaurant fires in Korea reached around 2,400 and 169 damages of human life and damages to property was approximately over $8.8 billion for recent 3 years. It could be desirable having automatic commercial fire-extinguishing equipment at commercial facilities excluding housing facilities for the safety, applying at the place first where it has been more risky and expected fire can be occurred relatively because economical burden can be accelerated. In order to do this, adjust its level to meet the same level of the kitchen for 'Specific Target for Fire Fighting' that "gas leak alarm" has be equipped relevant regulations and it is considered and reasonable to expand the limit of application gradually.

Analysis on The Characteristics of Occupancy Prediction and The Fire Hazard in Narrow Dwelling Space (협소 거주공간 재실자 특성 및 화재위험성 분석)

  • Lee, Changwoo;Oh, Seungju;Yoo, Juyoul;Kim, Jinsung;Cho, Ahra;Cho, Yongsun
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.4
    • /
    • pp.342-349
    • /
    • 2016
  • The objectives of this study is analysis of the characteristics of fire risk and survey of narrow dwelling space(the Karaoke, Gosiwon etc). The narrow dwelling space has special structure characteristics; the narrow and the complex escape rote. Gosiwon have very separate and exclusive space room, so have the problem a suppression of fire. Furthermore almost Karaokes located in basement have a complex and limitary escape rote. Therefore we should research and development the exploration equipment that search a source of the fire and a emergency rescuer in the scene of the fire.

Vehicle Warehousing Support System Based on Safe Human Cooperation Mobility System in Collaboration with Cyber City

  • Yamaguchi, Toru;Jing, Jianping;Kawakatsu, Jun
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.114-117
    • /
    • 2003
  • Recently, the aging society is a serious problem; we paid attention to the welfare and a disaster prevention cyber city. In this research, we propose the validity of Safe Human Cooperation Mobility System in Collaboration with Cyber City, and show Vehicle Warehousing Support System as an example.

  • PDF

The Study of Simulation for Reproduce Accidents of Narrow Dwelling Space (협소 거주공간 사고 재현을 위한 시뮬레이션 연구)

  • Lee, Changwoo;Choi, Beakyoul;Kim, Jinsung;Cho, Yongsun;Yoo, Juyoul
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.3
    • /
    • pp.210-218
    • /
    • 2016
  • In this study, the fire analysis program FDS and Pathfinder was used to analysis a simulated accidental fire of a narrow dwelling space as a test bed. The results showed that the evacuation time of the H form internal building structure was the fastest at 285 seconds. In addition, when the automatic sprinkler system functioned with the entrances closed, the temperature distribution was lower and the visible smoke density was reduced.

Research on Integrated Management of ISMS : Comparative Analysis of IT Disaster Recovery Framework (IT재해복구 연관 프레임워크 비교분석을 통한 ISMS의 통합관리방안)

  • Bak, Yurim;Kim, Byungki;Yoon, Ohjun;Khil, Ara;Shin, Yongtea
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.3
    • /
    • pp.177-182
    • /
    • 2017
  • To develop computer and communication in the information society, difficulties exist in managing the enormous data manually. Also, loss of data due to natural disasters or hacker attacks, generate a variety of disasters in the IT securities. Hence, there is an urgent need for an information protection management system in order to mitigate these incidents. Information Security Management System has various existing frameworks for IT disaster management. These include Cyber Security Framework, Risk Management Framework, ISO / IEC 27001: 2013, and COBIT 5.0. Each framework analyses and compares the entry for IT disaster recovery from among the various available data. In this paper, we describe a single integrated management scheme for fast resolution of IT disasters.