• Title/Summary/Keyword: space threats

Search Result 116, Processing Time 0.027 seconds

Realization of Futuristic Aviation Security of Incheon International Airport by implementing Smart Security Project (Smart Security 추진을 통한 인천국제공항의 미래 항공보안 구현)

  • Sang-hoon Lim;Baek-yong Heo;Ho-won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.6
    • /
    • pp.492-497
    • /
    • 2021
  • Smart Security is the global initiative of Airports Council International in collaboration with airports, airlines and governmental agencies. Its main objective is to create a step change in passenger and cabin baggage screening, escalating security costs and constantly evolving threats. Incheon International Airport should adopt and deploy smart security systems not only to strengthen aviation security but also increase passenger's experiences and operational efficiency by way of seamless security screening that it will lead to establish the best security environment to prevent terrorism and acts of unlawful interference.

A Study on the Tourism Watchdog for Optimizing Safety System (관광활동의 민원 관계망 최적화 관광 와치도그 도입에 관한 소고)

  • Kyung-Yeo, Koo
    • Asia-Pacific Journal of Business
    • /
    • v.14 no.2
    • /
    • pp.187-199
    • /
    • 2023
  • Purpose - The purpose of this study is to formulate a plan to cope with tourists' rights which can occur in tourist attraction place and anywhere for tourist activities and to seek a plan for introducing a watchdog system for tourists' civil complaints. Design/methodology/approach - To perform this purpose, this article will discuss a research review of the scope of tourist activities in terms of space and place perspectives and compare them to the watchdog and ombudsman concepts. And the study analyses and look at the suggestion about Tourism complains center and the Tourism policy system of procedure function and role critically. Findings - The Watchdog system is a routine activity in which citizen monitoring activities are developed in the form of a system and share inconvenience and anxiety detected in time and space in the expanding range of entertainment, leisure, and sports tourism activities. The resulting accident rate can be reduced, the administrative and private businesses can be resolved, and the cost of handling can be solved. Research implications or Originality - The social contribution of Watchdog can be systematically expanded and resolved at various sites by securing public trust in the country threats in daily places preventing risks securing continuous safety management of related facilities and other industries

A Study about Early Detection Techniques of Cyber Threats Based Honey-Net (허니넷 기반의 사이버위협 조기탐지기법 연구)

  • Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.67-72
    • /
    • 2005
  • The exponential increase of malicious and criminal activities in cyber space is posing serious threat which could destabilize the foundation of modern information society. In particular, unexpected network paralysis or break-down created by the spread of malicious traffic could cause confusion and disorder in a nationwide scale, and unless effective countermeasures against such unexpected attacks are formulated in time, this could develop into a catastrophic condition. In order to solve a same problem, this paper researched early detection techniques for only early warning of cyber threats with separate way the detection due to and existing security equipment from the large network. It researched the cyber example alert system which applies the module of based honeynet from the actual large network and this technique against the malignant traffic how many probably it will be able to dispose effectively from large network.

  • PDF

Design of Effective Intrusion Detection System for Wireless Local Area Network (무선랜을 위한 효율적인 침입탐지시스템 설계)

  • Woo, Sung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.185-191
    • /
    • 2008
  • Most threats of WLAN are easily caused by attackers who access to the radio link between STA and AP, which involves some Problems to intercept network communications or inject additional messages into them. In comparison with wired LAN, severity of wireless LAN against threats is bigger than the other networks. To make up for the vulnerability of wireless LAN, it needs to use the Intrusion Detection System using a powerful intrusion detection method as SVM. However, due to classification based on calculating values after having expressed input data in vector space by SVM, continuous data type can not be used as any input data. In this paper, therefore, we design the IDS system for WLAN by tuning with SVM and data-mining mechanism to defend the vulnerability on certain WLAN and then we demonstrate the superiority of our method.

  • PDF

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

Efficient RFID Authentication protocol for Distribution Database Environment (분산시스템 환경에 적합한 효율적인 RFID 인증 시스템)

  • Choi, Eun-Young;Lee, Su-Mi;Lim, Jong-In;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.25-35
    • /
    • 2006
  • Radio Frequency identification (RFID) will become an important technology in remotely object identification systems. However, the use of RFID tags may create new threats to the sniな and Privacy of individuals holding RFID tags. These threats bring several problems which are information leakage of a tag, location trace of individuals and impersonation of a tag. Low-cost RFID systems have much restrictions such as the limited computing power, passive power mechanism and low storage space. Therefore, the cost of tag's computation should be considered as an important factor in low-cost RFID systems. We propose an authentication protocol, OHLCAP which requires only one one-way hash function operation and hence is very efficient. Furthermore, our protocol is suitable to distribution database environment. Hence our scheme can be applied to ubiquitous computing environment.

Analysis of Improvement Targets for Public Safety Threats in the Maritime Area Around the Launch Site (발사장 주변 해상의 공공안전 위협요인에 대한 개선 대상 분석)

  • Ahn-Tae Shin;Hun-Soo Byun
    • Korean Chemical Engineering Research
    • /
    • v.62 no.2
    • /
    • pp.153-162
    • /
    • 2024
  • Securing safety in the maritime danger zone around the launch site before a launch is a fundamental requirement. If maritime safety is not ensured, the launch is halted or postponed. However, challenges have arisen in the process of securing public safety at sea due to factors such as the increasing population engaged in water leisure activities. These challenges include unauthorized entry of vessels into controlled areas, unauthorized access by water leisure activity participants, and non-compliance with regulations. In this paper, we employed the Delphi/Analytic Hierarchy Process to survey 22 experts, including professionals in launch vehicle development and launch site operation, to identify 10 factors posing threats to maritime public safety. Additionally, we identified five issues that need improvement for ensuring maritime safety. This study verified the consistency of expert opinions and conducted an analysis of importance and prioritization, objectively confirming the necessity for amendments to relevant laws or the enactment of new laws concerning the establishment and control of danger zones around launch sites.

Autoencoder-Based Anomaly Detection Method for IoT Device Traffics (오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구)

  • Seung-A Park;Yejin Jang;Da Seul Kim;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.281-288
    • /
    • 2024
  • The sixth generation(6G) wireless communication technology is advancing toward ultra-high speed, ultra-high bandwidth, and hyper-connectivity. With the development of communication technologies, the formation of a hyper-connected society is rapidly accelerating, expanding from the IoT(Internet of Things) to the IoE(Internet of Everything). However, at the same time, security threats targeting IoT devices have become widespread, and there are concerns about security incidents such as unauthorized access and information leakage. As a result, the need for security-enhancing solutions is increasing. In this paper, we implement an autoencoder-based anomaly detection model utilizing real-time collected network traffics in respond to IoT security threats. Considering the difficulty of capturing IoT device traffic data for each attack in real IoT environments, we use an unsupervised learning-based autoencoder and implement 6 different autoencoder models based on the use of noise in the training data and the dimensions of the latent space. By comparing the model performance through experiments, we provide a performance evaluation of the anomaly detection model for detecting abnormal network traffic.

Study on Automation of Comprehensive IT Asset Management (포괄적 IT 자산관리의 자동화에 관한 연구)

  • Wonseop Hwang;Daihwan Min;Junghwan Kim;Hanjin Lee
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • The IT environment is changing due to the acceleration of digital transformation in enterprises and organizations. This expansion of the digital space makes centralized cybersecurity controls more difficult. For this reason, cyberattacks are increasing in frequency and severity and are becoming more sophisticated, such as ransomware and digital supply chain attacks. Even in large organizations with numerous security personnel and systems, security incidents continue to occur due to unmanaged and unknown threats and vulnerabilities to IT assets. It's time to move beyond the current focus on detecting and responding to security threats to managing the full range of cyber risks. This requires the implementation of asset Inventory for comprehensive management by collecting and integrating all IT assets of the enterprise and organization in a wide range. IT Asset Management(ITAM) systems exist to identify and manage various assets from a financial and administrative perspective. However, the asset information managed in this way is not complete, and there are problems with duplication of data. Also, it is insufficient to update of data-set, including Network Infrastructure, Active Directory, Virtualization Management, and Cloud Platforms. In this study, we, the researcher group propose a new framework for automated 'Comprehensive IT Asset Management(CITAM)' required for security operations by designing a process to automatically collect asset data-set. Such as the Hostname, IP, MAC address, Serial, OS, installed software information, last seen time, those are already distributed and stored in operating IT security systems. CITAM framwork could classify them into unique device units through analysis processes in term of aggregation, normalization, deduplication, validation, and integration.

Fault Tree Analysis and Failure Mode Effects and Criticality Analysis for Security Improvement of Smart Learning System (스마트 러닝 시스템의 보안성 개선을 위한 고장 트리 분석과 고장 유형 영향 및 치명도 분석)

  • Cheon, Hoe-Young;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.11
    • /
    • pp.1793-1802
    • /
    • 2017
  • In the recent years, IT and Network Technology has rapidly advanced environment in accordance with the needs of the times, the usage of the smart learning service is increasing. Smart learning is extended from e-learning which is limited concept of space and place. This system can be easily exposed to the various security threats due to characteristic of wireless service system. Therefore, this paper proposes the improvement methods of smart learning system security by use of faults analysis methods such as the FTA(Fault Tree Analysis) and FMECA(Failure Mode Effects and Criticality Analysis) utilizing the consolidated analysis method which maximized advantage and minimized disadvantage of each technique.