• 제목/요약/키워드: cyber disaster

Search Result 102, Processing Time 0.022 seconds

Establishment of Cyber Security Countermeasures amenable to the Structure of Power Monitoring & Control Systems (전력계통 제어시스템 구조에 따른 사이버 보안대책 수립)

  • Woo, Pil Sung;Kim, Balho H.
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.12
    • /
    • pp.1577-1586
    • /
    • 2018
  • The emergence of the Smart Grid is an integrated solution for the next generation power system that combines IT technology in the power system to create optimal energy utilization and various services. However, these convergence technologies (power systems and information communications) are not only improving the related technologies but also producing various problems especially exposure to cyber risk. In particular, the intelligent power grid has security vulnerabilities through real-time information sharing among various organically linked systems, and it is more complicated than the cyber risk problem in the existing IT field and is directly connected to national disaster accidents. Therefore, in order to construct and operate a more stable smart grid, this paper analyzes the system of power system control system in Korea, and proposes a cyber security element definition and a countermeasure establishment method of power monitoring & control systems based on security standards of smart grid (No. SPS-SGSF-121-1-1).

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

A Study on the Closing Force according to the Opening Angle of the Door in the Smoke Control System (제연구역 출입문 개방 각도에 따른 폐쇄력에 관한 연구)

  • Oh, Won-Sin;Joung, Suck-Hwan
    • Journal of the Korea Safety Management & Science
    • /
    • v.23 no.4
    • /
    • pp.43-48
    • /
    • 2021
  • In this study, the experiment was conducted on a fire door(W × H = 0.98 m × 2.19 m) installed on the vestibule. The effective leakage area for each opening angles and closing forces derived from the impulse-momentum equation was compared and analyzed with the experimental results. As a result of the experiment, the major factors affecting the door closing forces were the pressure difference and the area of the door. The difference of door closing forces between measured and calculated values by the impulse-momentum equation showed a deviation of less than ±15% at the opening angles of 5°to 10°. At the door opening angle of 2.5°, the dynamic pressure was much higher than the measured static pressure, and this pressure difference is estimated to be air resistance acting to prevent the door from being completely closed.

A Study on the Enhancement of Cyber Security Legislation and the Institutionalization of the 'Cyber Iron Dome' Establishment (사이버안보법제의 강화와 '사이버 아이언돔(가칭)' 구축을 위한 제도화 방안 연구)

  • Shin, YuLee
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2023.11a
    • /
    • pp.309-310
    • /
    • 2023
  • 본 논문에서는 전 세계적으로 사이버공간에서 발생하는 위협 등에 대한 대응으로 다각적인 방식에서의 사이버공간 내 행위에 대한 제재와 통제에 대한 법제변화에 대한 연구를 토대로 최근 사회주의체제 국가들에서의 적극적인 사이버공간 내 규제를 위한 입법동향을 비교·분석하고 있다. 더불어 현재 사이버안보법, 사이버기본법 등 사이버공간상 보안과 안보에 연계된 관련 입법안들이 사회적으로 논의가 지속되고 있는 상황에서 개인정보 등 헌법상 가치를 보호함과 동시에 국가차원의 사전적 방어를 위한 방안으로 '사이버 아이언돔(가칭)' 구축과 이를 위한 제도화를 제안하고 있다.

  • PDF

기업 사이버재난 관리를 위한 재해경감활동계획 수립

  • Lee, Young-Jai;Lee, Sung-Joong
    • Review of KIISC
    • /
    • v.20 no.4
    • /
    • pp.42-51
    • /
    • 2010
  • Government legislates a private sector preparedness act related to disasters such as natural, technological, and social ones. According to the law, it announces new standard for private sector preparedness. This paper illustrates a mitigation action plan based on the standard in terms of a cyber disaster. This plan includes organization, policy, assessment, impact analysis, strategy, plan, action, evaluation, and feedback. It will also help for business to mitigate a cyber disaster. Private sector accreditation and certification preparedness program which introduces on the law is the realization that enterprise disaster management will be expected as a great tipping-point.

A Study on the Direction of the Formulation of "Safe Country" Laws and Regulations due to the Development of Information Technology (정보사회에 있어서 '안전국가' 법규의 정립방향에 관한 소고)

  • Kim, Hyun-Kyung
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.151-163
    • /
    • 2013
  • It is no doubt that information technology is the key factor of national safety. Information technology is positively useful for national security such as crime prevention and detection, criminal investigation, disaster management, and national defense. However, it might be a threat to the security as we saw in the examples such as '3.4 DDoS attacks' and 'Nong-hyup Computer Network Failure.' Although the effect that information technology makes upon the national security is immense, the current legal system does not reflect these changes well. National security should be kept during 'prevention-response-recovery' process regardless it is in the online on offline. In addition, public administration for national security should be based on laws. However, the current legal system is lack of legislative basis on cyber and physical disaster, and the laws on the response to disaster might cause confusing. Therefore, this study examines the limitation of the current legal system on national security, and suggests directions for the development of the system based on the new establishment of the legal concept for 'national security'.

A Simulation Model for the Response of Information-Warfare based on Computer Forensics (정보전대응을 위한 컴퓨터 포렌식스 기반 모의실험1))

  • Choe, Yong-Rak;Ko, Byong-Su;Park, Meong-Chan
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.391-421
    • /
    • 2003
  • While the social activities using Internet become generalized, the side effect of the information security violation is increasing steadily and threaten the countries which is not ready to prevent from offensive penetration such as the Information-fighter or Cyber-military. In this paper, we define the concept and characteristics of the modern Information-Warfare and analyze various kinds of threatened elements and also examine the recent trend in other countries. And introducing Computer Forensics raised recently for the confrontation against the security violation in the future, we will show the developing strategies and the necessity in order to response cyber attacks. These developing strategies can be used to ensure and re-trace the technical evidence for the security violation and to achieve the disaster relief effectively. So we hope that can apply them to the actual preparation through developing cyber trial test of the defense and attack for the Information-Warfare.

  • PDF

Study on Disaster Recovery Efficiency of Terminal PC in Financial Company (금융회사 단말PC 재해복구 효율에 관한 연구)

  • Yi, Seung-Chul;Yoon, Joon-Seob;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.211-224
    • /
    • 2015
  • Financial companies have invested a lot in their disaster recovery system and exercised training more than once a year to comply related laws and regulations. But massive PCs(Personal Computers) became disrupted simultaneously and it took a lot of time to recover massive PCs concurrently when March 20 cyber attack occurred. So, it was impossible to meet the tartgeted business continuity level. It was because the importance of PC recovery was neglected compared to other disaster recovery areas. This study suggests the measure to recover massive branch terminal PCs of financial companies simultaneously in cost-effective way utilizing the existing technology and tests recovery time. It means that in the event of disaster financial companies could recover branch terminal PCs in 3 hours which is recommended recovery time by regulatory body. Other financial companies operating similar type and volume of branches would refer to the recovery structure and method proposed by this study.

A Study on the Improvement of Cybersecurity Training System in Nuclear Facilities (원자력 시설 사이버보안 훈련체계 개선 방안 연구)

  • Kim, Hyun-hee;Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.187-188
    • /
    • 2022
  • As information processing technology develops with the trend of the times, the possibility of cyber threats to nuclear facilities is increasing. In the 2000s, there was a growing perception that cyberattacks on nuclear facilities were needed, and in fact, a cybersecurity regulatory system for nuclear power plants began to be established to prepare for cyberattacks. In Korea, in order to prepare for cyber threats, in 2013 and 2014, the Act on Protection and Radiation Disaster Prevention, Enforcement Decree, and Enforcement Rules of Nuclear Facilities, etc., and notices related to the Radioactive Disaster Prevention Act were revised. In 2015, domestic nuclear operators prepared information system security regulations for each facility in accordance with the revised laws and received approval from the Nuclear Safety Commission for implementation of information system security regulations divided into seven stages. In 2019, a special inspection for step-by-step implementation was completed, and since 2019, the cybersecurity system of operators has been continuously inspected through regular inspections. In this paper, we present some measures to build improved training to suit the steadily revised inspection of the nuclear facility cybersecurity system to counter cyber threats to the ever-evolving nuclear facilities.

  • PDF

A Study on the Characteristics of Z-Trap and Improvement of Maintenance Ability in the Sewage Bay (오수받이 내 Z-트랩 특성 및 유지관리 능력 향상에 관한 연구)

  • Kim, Yong-Cheol;Lee, Chang-Woo
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.3
    • /
    • pp.450-458
    • /
    • 2019
  • Purpose: The purpose of this study is to develop a new sewage bay that has removed its previous problems and verify the excellence of the maintainability of the new sewage bay. Method: The fluid characteristics in the developed sewage bay was analysed with computer simulation tool(COMSOL MultiphysicsTM ver. 3.2 ; COMSOL) and clarified the problems of the existing sewage bay. In addition, the durability of the newly developed sewage bay was verified by the long-term usability testing. Results: As a result of the simulation of a blocked drainage trap, an whirlpool and blockage did not occurred at the flow rate of 0.6m/sec, and we verified that switch device of drain trap was in good condition durably with 6 months long-term usability test. Conclusion: In this study, a newly advanced sewage bay was developed that solved the problems of the existing sewage bay structure. With the fluid simulation and the long-term usability tests, the excellence of the maintenance ability of the newly developed sewage bay was proved.