• Title/Summary/Keyword: threat classification

Search Result 98, Processing Time 0.023 seconds

Security Knowledge Classification Framework for Future Intelligent Environment (미래 융합보안 인력양성을 위한 보안교육과정 분류체계 설계)

  • Na, Onechul;Lee, Hyojik;Sung, Soyung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.47-58
    • /
    • 2015
  • Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology. Accordingly, new types of cybercrime are on the rise, and security breaches and other security-related incidents are increasing rapidly because of security problems like external cyberattacks, leakage by insiders, etc. These threats will continue to multiply as industry and technology converge. Thus, the main purpose of this paper is to design and present security subjects in order to train professional security management talent who can deal with the enhanced threat to information. To achieve this, the study first set key information security topics for business settings on the basis of an analysis of preceding studies and the results of a meeting of an expert committee. The information security curriculum taxonomy is developed with reference to an information security job taxonomy for domestic conditions in South Korea. The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

Critiques of 'The Endangered and Protected Wild Species List in Korea' Proposed by Korea Ministry of Environment and Listing Process - Is This the Best Process for the Current National Management of Endangered Wildlife and Plants in Korea? - (2011년 환경부 멸종위기종 등록절차 및 대상 멸종위기종 식물 목록 재고-과연 현재 국가 멸종위기종 관리가 최선의 방안인가? -)

  • Kim, Hui;Lee, Byong Cheon;Kim, Yong Shik;Chang, Chin-Sung
    • Journal of Korean Society of Forest Science
    • /
    • v.101 no.1
    • /
    • pp.7-19
    • /
    • 2012
  • After having announced legislation for threatened or endangered species on the List of Endangered and Threatened Wildlife and Plants in 2005, the Korea Ministry of Environment proposed (in June 2011) amending the list, thereby delisting or reclassifying endangered species using new quantitative criteria for two levels (I and II), as well as status reviews. The new legislation included 40 species remained in their original endangered status, but 19 species were delisted, 5 species were proposed as candidates for delisting, 29 species were given a new endangered listing, and 3 species were proposed for an endangered listing in Korea. We assessed the threatened status of 98 plants using the IUCN Red List Criteria (version 3.1) at the global level, and compared the Ministry's revised criteria with the IUCN Red List Criteria and ESA criteria used in the USA. Most species proposed by the Ministry do not qualify as threatened and one of the major difficulties found in applying IUCN Red List Criteria at the global scale was a lack of knowledge on the status of species at broader geographic scales and the perceived difficulty this causes. Under the current classification process, many endangered species, such as Abeliophyllum distichum, Leontice microrhyncha, Echinosophora koreensis, Leontopodium coreanum, Iris odaesanensis, and Corylopsis coreana at global level were excluded here. Knowledge gaps and uncertainties mean that the number of taxa at high risk of extinction may be substantially greater than is currently understood. Due to a lack of information on its taxonomic status, currently there is controversy over the Red List status of Physocarpus insularis. Also, Caragana koreana, which was an invalidly published name, should be excluded here. Although the Korea Ministry of Environment insisted this procedure was conducted by applying the modified IUCN threat categories and definitions, this evaluation has been carried out based only on subjective views and misapplication of the IUCN Red List Criteria. The current listings by the Korea Ministry of Environment should be challenged. We suggest that broad species concepts on endemic species are applied and also criteria that adequately address the proper quantitative knowledge should be used. It is suggested that the highest priorities for the Red List should be given to endemic species at least in the Korean peninsula first at global scale.

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

Review on Prior Evaluation for Terrorism Risk of High-rise Buildings (초고층건축물의 테러 위험도 사전평가에 관한 연구)

  • Seong, Bin;Lee, Yoon-Ho
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.293-316
    • /
    • 2013
  • Today's high-rise buildings are increasing concern about the safety and evacuation of people related to the fire and threat from outside. Terrorism breaking out in high-rise buildings, a symbol of the national economy results in a number of casualties, economic loss, social fear and damage to national status. That's why high-rise building has also emerged as a target of major terrorist attacks, compared to other types of buildings. We have 54 high-rise buildings in 15 regions over the country. The Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government have offered the guidelines to prevent terrorist attacks toward high-rise buildings. Since the 9/11 terrorist attacks, the U.S. Federal Emergency Management Agency (FEMA) has developed and taken advantage of the Risk Management Manual Series. According to this manual, pre-assessment is conducted for the prevention of terrorism and particularly in FEMA 455, risk of the surrounding areas, vulnerability, possibility from terrorist attacks are checked. After the check, experts classify the risk of terrorist attacks toward the high-rise buildings and according to the risk classification, architects, security experts and structure engineers can carry out terrorism prevention program for high-rise buildings. The U.K. NaCTSO has also offered the terrorism prevention guidelines. Therefore, the Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government should make more concrete guidelines for high-rise buildings such as what U.S. FEMA and U.K. NaCTSO implement, including prior evaluation technique for terrorism risk.

  • PDF

A Practical Feature Extraction for Improving Accuracy and Speed of IDS Alerts Classification Models Based on Machine Learning (기계학습 기반 IDS 보안이벤트 분류 모델의 정확도 및 신속도 향상을 위한 실용적 feature 추출 연구)

  • Shin, Iksoo;Song, Jungsuk;Choi, Jangwon;Kwon, Taewoong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.385-395
    • /
    • 2018
  • With the development of Internet, cyber attack has become a major threat. To detect cyber attacks, intrusion detection system(IDS) has been widely deployed. But IDS has a critical weakness which is that it generates a large number of false alarms. One of the promising techniques that reduce the false alarms in real time is machine learning. However, there are problems that must be solved to use machine learning. So, many machine learning approaches have been applied to this field. But so far, researchers have not focused on features. Despite the features of IDS alerts are important for performance of model, the approach to feature is ignored. In this paper, we propose new feature set which can improve the performance of model and can be extracted from a single alarm. New features are motivated from security analyst's know-how. We trained and tested the proposed model applied new feature set with real IDS alerts. Experimental results indicate the proposed model can achieve better accuracy and false positive rate than SVM model with ordinary features.

Quantitative Flood Forecasting Using Remotely-Sensed Data and Neural Networks

  • Kim, Gwangseob
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2002.05a
    • /
    • pp.43-50
    • /
    • 2002
  • Accurate quantitative forecasting of rainfall for basins with a short response time is essential to predict streamflow and flash floods. Previously, neural networks were used to develop a Quantitative Precipitation Forecasting (QPF) model that highly improved forecasting skill at specific locations in Pennsylvania, using both Numerical Weather Prediction (NWP) output and rainfall and radiosonde data. The objective of this study was to improve an existing artificial neural network model and incorporate the evolving structure and frequency of intense weather systems in the mid-Atlantic region of the United States for improved flood forecasting. Besides using radiosonde and rainfall data, the model also used the satellite-derived characteristics of storm systems such as tropical cyclones, mesoscale convective complex systems and convective cloud clusters as input. The convective classification and tracking system (CCATS) was used to identify and quantify storm properties such as life time, area, eccentricity, and track. As in standard expert prediction systems, the fundamental structure of the neural network model was learned from the hydroclimatology of the relationships between weather system, rainfall production and streamflow response in the study area. The new Quantitative Flood Forecasting (QFF) model was applied to predict streamflow peaks with lead-times of 18 and 24 hours over a five year period in 4 watersheds on the leeward side of the Appalachian mountains in the mid-Atlantic region. Threat scores consistently above .6 and close to 0.8 ∼ 0.9 were obtained fur 18 hour lead-time forecasts, and skill scores of at least 4% and up to 6% were attained for the 24 hour lead-time forecasts. This work demonstrates that multisensor data cast into an expert information system such as neural networks, if built upon scientific understanding of regional hydrometeorology, can lead to significant gains in the forecast skill of extreme rainfall and associated floods. In particular, this study validates our hypothesis that accurate and extended flood forecast lead-times can be attained by taking into consideration the synoptic evolution of atmospheric conditions extracted from the analysis of large-area remotely sensed imagery While physically-based numerical weather prediction and river routing models cannot accurately depict complex natural non-linear processes, and thus have difficulty in simulating extreme events such as heavy rainfall and floods, data-driven approaches should be viewed as a strong alternative in operational hydrology. This is especially more pertinent at a time when the diversity of sensors in satellites and ground-based operational weather monitoring systems provide large volumes of data on a real-time basis.

  • PDF

Designing the Maritime Strategy of the Middle-Power Korea: The Maritime Access Strategy (중견국 한국의 해양전략 디자인 : 해양접근전략(Maritime Access Strategy))

  • Ban, Kiljoo
    • Strategy21
    • /
    • s.45
    • /
    • pp.116-147
    • /
    • 2019
  • Despite the fact that South Korea, one of peninsula countries, has been already a middle power in an international arena, it still tends to get stuck in continental-driven inertia and be reluctant to become a consolidated maritime power. In its efforts to deal with the parable of South Korea, designing a tailored-made strategy needs to be initiated in detail. Its design is centered around two variables: classification of waters and prestige. First of all, the domain of waters confronted to South Korea ranges from the greatest threat to scattered national interest. Second, South Korea is prestigiously regarded as the middle power which is equipped with the capability to see beyond its sovereign waters. The Maritime Access Strategy(MAS) can be more clearly explained by three-axis factors: ends, ways, and means. Ends need to be oriented to achieving three types of classified objectives-Deterrence, Engagement around the world to maximize remotely-scattered interest and Check of neighboring countries' seapower expansion, called DEC. Ways is mainly driven by the closer access to three different types of waters: waters of security, check, and interest. The active access and closer approach to the domain of waters need to be maintained with a high degree of willingness and capability. Means is attainable by guiding naval forces to be armed with multiple platforms and functionally-balanced assets. These platforms and assets will allow the naval forces to attain and maintain cost effective means, leading to making MAS feasible. This strategy allows the middle-power Korea to make the best of its maritime assets at various seas, contributing to international stability as well as national security and interest.

A study on the Changes in form and spatial uses of Urban Hanok in Bukchon, Seoul (서울 북촌한옥의 변화양상에 관한 연구 - 북촌 가꾸기 사업에 따른 2002~2007 한옥 대수선 사례를 대상으로 -)

  • Song, In-Ho;Kim, Young-Soo;Cho, Eun-Joo
    • Journal of architectural history
    • /
    • v.18 no.2
    • /
    • pp.47-63
    • /
    • 2009
  • This study focused on changes in form and spatial uses of Urban Hanok in Bukchon, Seoul. There are 10 representative cases which have been renovated through the policy of 'Preservation & Regeneration of Bukchon' by Seoul metropolitan government and other experts. Changes in form and spatial uses of Urban Hanok in Buckon are as follows. First, Changes of scale. Trough removing extension parts, facade of renovated Hanoks are 'transformed' into recovering their identity. Using basements or lofts, intensive application of spaces is transformation which promotes the vitality of Hanoks. Second, changes of space organization. As Hanok changes its function from residence to commercial or cultural use, il a1so changes space character or reorganizes space organization. It is important that deciding function of Hanok has to adjust its scale and organization. Third, changes of construction performance. Through introducing new material and constructing method, performance of wall has been changed respecting its wooden structure and interior-exterior figure. However, technical studies must back it up not to destroy its value of eco-friendly architecture. Fourth, changes of facility systems, like floor heating system. They changes floor level of Hanok equally, and then sections of Hanok have became simple. Furthermore, inserting new facility space, such as boiler room, stand-up kitchen, bathroom and toilet, organization of space also changed. It is necessary that wise alternative proposal through the method of transformation or mutation must be presented. These four changes can be classification into method of 'transformation' and 'mutation'. Changes of scale are method of transformation and changes of space organization are method of mutation. Also, while changes of construction performance are mutation, changes of facility systems are transformation. Recently, as price of lots have been increased, a lot of Hanoks have been commercialized. Thc commercial energy threat 'the identity of Bukchon as residential area'. From now on, to operate 'identity' and 'vitality' complementary, it is necessary to make up for the preservation policy of Hanok and consolidate renovating standards of Hanok which correspond to character of particular region and building usage.

  • PDF

Usability Test and Investigation of Improvements of the ECDIS (ECDIS의 사용성 평가 및 개선사항 분석)

  • Lee, Bo-Kyeong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.2
    • /
    • pp.146-156
    • /
    • 2018
  • The ship's chart system was changed from the use of paper chart to the ENC (Electronic Navigational Chart) using ECDIS (Electronic Chart Display and Information System). The introduction of ENC in ships is necessary for ship automation and for the digitalizing of data and integration of information, but unexpected various problems have occurred and are posing a great threat to safe navigation in the transitional period when the new system has been applied to the sea. In this paper, to assess whether ECDIS contributes to the safety of navigation for its intended purposes as new navigation equipment, a usability test of ECDIS was conducted on masters and crew who have used ECDIS on ocean-going vessels. The result was verified with a paired sample T-test, and it was significantly analyzed with the effectiveness of a simplified task; cost efficiency was decreased since ECDIS was used. By analyzing 'MSC.1/Circ.1503 ECDIS - Guidance for good practice', we found that the effects of the maintenance of ECDIS software, operating anomalies identified within ECDIS, differences between raster chart display system (RCDS) and ECDIS, and matters of identification were compounded by the overlapping information on the safety of ships. The anomalies were also grouped according to their characteristics, and we proposed suitable improvements accordingly. The reason for the reduction in efficiency in the usability test was that the problems with ECDIS were intended to be solved only with the careful use of navigational officers who did not have systematic solutions. To solve these problems, the maintenance of software, the improvement of ECDIS anomalies, the reliable ENC issuance including the global oceans, and S-mode development are a priority.