RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Cyber Security Enhancement Method for Non-direct CDAs

        In Hyo Lee 한국방사성폐기물학회 2023 한국방사성폐기물학회 학술논문요약집 Vol.21 No.1

        Nuclear Safety and Security Commission (NSSC) and KINAC review a Cyber Security Plan (CSP) by「ACT ON PHYSICAL PROTECTION AND RADIOLOGICAL EMERGENCY」. The CSP contains cyber security implementation plans for the licensee’s nuclear power plant, and it shall meet the requirements of KINAC/RS-015, a regulatory standard. The KINAC/RS-015 provides more detailed information on the legal requirements, so if licensees implement cyber security under the approved CSP, they can meet the law. To protect nuclear facilities from cyber-attacks, licensees should identify their essential digital assets, so-called “Critical Digital Assets” (CDAs). Then, they apply cyber security controls (countermeasures for cyber-attacks) on CDAs consisting of technical, operational, and management security controls. However, it is hard to apply cyber security controls on CDAs because of the large amounts of CDAs and security controls in contrast to the shortage of human resources. So, licensees in the USA developed a methodology to solve this problem and documented it by NEI 13-10, and US NRC endorsed this document. The main idea of this methodology is, by classifying CDAs according to their importance, applying small amounts of security controls on less important CDAs, so-called non-direct CDAs. In the case of non-direct CDAs, only basic cyber security controls are applied, that is, baseline cyber security controls. The baseline cyber security controls are a minimum set of cyber security controls; they consist of control a) from control g) a total of 7 controls. Although non-direct CDAs are less critical than other CDAs (direct CDAs), they are still essential to protect them from cyber-attacks. This paper aims to suggest a cyber security enhancement method for non-direct CDAs by analyzing the baseline cyber security controls. In this paper, baseline cyber security controls were analyzed respectively and relatively and then concluded how to apply small amounts of cyber security controls on non-direct CDAs rather than direct CDAs without scarifying cyber security.

      • KCI등재

        國際經濟法 發展에 있어 國家安保의 役割과 課題

        崔昇煥(Seung-Hwan Choi) 대한국제법학회 2006 國際法學會論叢 Vol.51 No.3

        2001년 9ㆍ11 사태 이후 미국 등에 의해 주도되고 있는 ‘테러와의 전쟁’은 국제평화 및 안전을 유지하기 위한 기존의 전략물자 수출통제 및 대량살상무기(WMD) 비확산체제를 더욱 강화시키는 결과를 초래하였다. 특히 2004년 4월 UN 안전보장이사회에서 ‘결의 1540호’가 채택됨으로써 WMD 수출통제는 모든 국가의 의무사항으로 UN 차원에서 운영ㆍ관리되는 보편적인 국제규범으로 전환되었다고 할 수 있다. ‘관세 및 무역에 관한 일반협정’(GATT) 및 세계무역기구(WTO) 협정은 국가안보를 위한 통상규제조치를 WTO 법원칙의 예외로서 인정하고 있다. 국제경제법의 적용 및 발전에 있어 ‘국가안보’는 자유무역의 확대가 안보이익을 손상하는 것을 방지하고, 국제평화 및 안전을 유지하기 위한 수출통제 및 경제제재를 정당화하고, 보호주의에 입각한 관할권행사를 정당화하고, 자유무역에 대한 예외적인 무역제한조치를 적법화하고, 수출통제 및 경제제재 관련 정책 및 입법을 정당화하는 역할을 수행한다. 전략물자 수출통제제도는 교역증진에 따른 경제성장과 국가안보상의 통상규제간의 끊임없는 균형을 요하는 정치적ㆍ경제적ㆍ사회적 문제를 수반하는 정책적문제이기도 하다. 그러나 국가안보에 대한 구체적인 ‘판정기준’이 없는 경우 국가안보상의 통상규제는 타국에 대한 부당한 간섭 및 경제강제 수단으로서 남용될 가능성이 많다. 국가안보를 위한 수출통제의 효율성을 제고하기 위한 정책적 과제에는 수출통제규범의 제정 및 적용에 있어 투명성을 확보하는 것, 국제수출통제규범 및 UN결의를 이행하기 위하여 관련 국내법을 정비하는 것, 수출통제법규의 역외적용에 따른 관할권분쟁을 방지하거나 해결하는 것, 남북경협을 활성화하기 위한 전략물자 수출통제제도의 운영방안을 마련하는 것, 자율준수제도를 확대하여 기업의 자발적 참여를 확보하는 것, 수출통제제도를 첨단산업기술의 보호정책과 연계해서 운영하는 것 등이 있다. 자유무역의 확대가 국제 및 지역평화 및 안전에 미치는 부정적인 영향을 최소화하기 위해서는 안보이익과 무역이익간의 조화 및 균형을 유지하는 것이 무엇보다 중요하다. Because of the heightened concerns over terrorism raised by the attacks of September 11, 2001, multilateral export control regimes such as Wassenaar Arrangement(WA), Nuclear Suppliers Group(NSG), Australia Group(AG), Missile Technology Control Regime(MTCR), Proliferation Security Initiative(PSI) tightened export controls of dual-use items and weapons of mass destructions(WMD) for the maintenance of international peace and security. Dual-use items are products or technology that are commercial or civil in nature but can be used to produce dangerous weapons. Export control on strategic items including dual-use items and WMD is indispensable for national security as well as international peace and security. The United Nations Security Council Resolution 1540(UNSCR 1540), adopted in April 2004, transformed export controls on WMD into universal norms legally binding upon all states. UNSCR 1540 forbids the proliferation of WMD and their means of delivery to both states and non-state actors. The World Trade Organization(WTO) Agreements including Article XXI of the GATT 1994 allows a member to take measures “necessary for the protection of its essential security interests”. National security in the application and development of international economic law has played an important role to prevent the impairment of security interests caused by the expansion of free trade, justify export controls and economic sanctions for the maintenance of international peace and security, permit the exercise of jurisdiction based on protective principle, recognize a special exception to the prohibition of all quantitative restrictions, and legitimatize to make the policy and legislation for export controls and economic sanctions. Export controls may be considered an aspect of foreign economic policy involving a wide range of issues, from commercial policy to national security. Export controls on strategic items involve political, economic, and social problems requiring the balance between commercial trade and national security. In the absence of standards judging the scope of national security, export controls for national security may be abused as a tool of unjust intervention and economic coercion against other States. Policies to enhance the efficiency of international export control are as follows: to ensure the transparency in the application of export control regulations; to arrange domestic laws with a view to implementing international export control norms and the UN Resolutions; to prevent international disputes caused by the extraterritorial application of export control regulations; to administer effectively the export control system for successful economic cooperation between South and North Korea; to ensure the voluntary participation of companies by expanding compliance programs; to administer the export control system in connection with the protection of high-tech industries. In order to minimize negative effects of trade liberalization on international peace and security, it is important to maintain the balance between security interests and trade interests.

      • KCI등재

        On the Configuration and Improvement of Security Control Systems

        Seung Jae Yoo 한국융합보안학회 2017 융합보안 논문지 Vol.17 No.2

        IT시대의 고도화로 인한 사이버 범죄는 지능화, 다양화, 고도화 되고 있는 가운데 보안 관제의 역할은 더욱중요해졌다. 과거 방화벽이나 IDS 등 보안 장비에만 의존하던 방식과는 달리 실시간 감시를 통해 사이버 공격에 대한 대응을 하는 보안 관제 업무가 광범위해지고 그 역할 또한 중요하게 되었다. 현재의 사이버 위협에 대해 보안 장비만으로는 안정적인 방어를 할 수 없기 때문에 보안 장비를 운영 및 감시하고 실시간적인 대응을할 수 있는 보안 관제의 업무가 필수 요소가 된 것이다. 본 연구에서는 네트워크 보안시스템을 효율적으로 구성하는 방법과 보안시스템을 실시간 운영하는 보안관제의 현황과 개선방안에 대해 다루고자 한다. Due to the advanced IT environment, the role of Security Monitoring & Control becomes more important as the cyber-crime is becoming intelligent, diversified, and advanced. In contrast to the way it relied solely on security devices such as Firewall and IDS in the past, Security Monitoring & Control tasks responding to cyber attacks through real-time monitoring have become wide spread and their role is also important. In response to current cyber threats, since security equipment alone can not be guaranteed a stable defense, the task of Security Monitoring & Control became essential to operate and monitor security equipment and to respond in real time. In this study, we will discuss how to configure network security system effectively and how to improve the real-time Security Monitor & Control.

      • SCIESCOPUSKCI등재

        A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study

        ( Hwankuk Kim ),( Kyungho Lee ),( Jongin Lim ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.9

        The measurement of information security levels is a very important but difficult task. So far, various measurement methods have studied the development of new indices. Note, however, that researches have focused on the problem of attaining a certain level but largely neglecting research focused on the issue of how different types of possible flaws in security controls affect each other and which flaws are more critical because of these effects. Furthermore, applying the same weight across the board to these flaws has made it difficult to identify the relative importance. In this paper, the interrelationships among security flaws that occurred in the security controls of K-ISMS were analyzed, and the relative impact of each security control was measured. Additionally, a case-control study was applied using empirical data to eliminate subjective bias as a shortcoming of expert surveys and comparative studies. The security controls were divided into 2 groups depending on whether or not a security flaw occurs. The experimental results show the impact relationship and the severity among security flaws. We expect these results to be applied as good reference indices when making decisions on the removal of security flaws in an enterprise

      • KCI등재

        사회보장에 관한 헌법재판소 판례의 분석과 평가

        이호용 한국법정책학회 2008 법과 정책연구 Vol.8 No.2

        This year is 20th anniversary of foundation of Constitutional Court. This study designed to analyse and evaluate Constitutional Court's precedent case on social security for bygone 20 years. The right to live on constitutional law is materialized by social security law. So social security law study in a view of Constitutional law is very important. Constitutional Court's precedent case study on social security, makes to interpret & applicate social security law in Constitutional law, and so Constitutional Court's precedent case study on social security, is the opening gate of study of social security law. Early many precedent case on social security is rejected because of suit period passing, but recently rejected case is rare and contents and quality of decision is more and more better and riper than former days. The number of Constitutional Court's precedent case of social security is very few, that is caused by structured problems of the right to live and social security law. This structured problems are abstraction of "the right to live" in the step of constitutional basic human rights, legislation discretion in the step of formation of law, administration discretion in the step of execution of law, denial of public service action or performance of duty action in the step of judicial dispute. These are legal barriers of social security individually and systematically. The task of this study is to plot legal principal of administrative law in order to overcome these legal barriers. In this study, I intend to present several suggestions to solve this problems. First of all, to overcome "abstraction of the right to live", we should comprehend the right to live in the structural principle of social state constitutional law, the right to live and the right of freedom should not be evaluated together on the same plane. And the principle of that social security law create and realize right to live is very useful too. So to speak, the theory of "The formation of general principal of constitutional law by administrative law" is applied to this. Secondly, in social security law, legislation discretion is admitted but, this should be allowed "narrowly" as much as possible in constitutional court. Thirdly, about the control of administrative discretion, two methods of control are suggested. One is a method of discretion control through basic right. So called, if decision by discretion is connected with basic right it should be judged. The other is a method of discretion control through discretion character that is policy discretion and specialized technical discretion of social security administrative agency. In policy judgment, discretion decision is limited estimation of supply standard and amount in supply procedure. Finally, constitutional precedent case will be served momentum for legislation and policy making on social security. Hereafter, the study about how constitutional judgment affect legislation and policy making on social security, will be interesting theme of law and policy study. This year is 20th anniversary of foundation of Constitutional Court. This study designed to analyse and evaluate Constitutional Court's precedent case on social security for bygone 20 years. The right to live on constitutional law is materialized by social security law. So social security law study in a view of Constitutional law is very important. Constitutional Court's precedent case study on social security, makes to interpret & applicate social security law in Constitutional law, and so Constitutional Court's precedent case study on social security, is the opening gate of study of social security law. Early many precedent case on social security is rejected because of suit period passing, but recently rejected case is rare and contents and quality of decision is more and more better and riper than former days. The number of Constitutional Court's precedent case of social security is very few, that is caused by structured problems of the right to live and social security law. This structured problems are abstraction of "the right to live" in the step of constitutional basic human rights, legislation discretion in the step of formation of law, administration discretion in the step of execution of law, denial of public service action or performance of duty action in the step of judicial dispute. These are legal barriers of social security individually and systematically. The task of this study is to plot legal principal of administrative law in order to overcome these legal barriers. In this study, I intend to present several suggestions to solve this problems. First of all, to overcome "abstraction of the right to live", we should comprehend the right to live in the structural principle of social state constitutional law, the right to live and the right of freedom should not be evaluated together on the same plane. And the principle of that social security law create and realize right to live is very useful too. So to speak, the theory of "The formation of general principal of constitutional law by administrative law" is applied to this. Secondly, in social security law, legislation discretion is admitted but, this should be allowed "narrowly" as much as possible in constitutional court. Thirdly, about the control of administrative discretion, two methods of control are suggested. One is a method of discretion control through basic right. So called, if decision by discretion is connected with basic right it should be judged. The other is a method of discretion control through discretion character that is policy discretion and specialized technical discretion of social security administrative agency. In policy judgment, discretion decision is limited estimation of supply standard and amount in supply procedure. Finally, constitutional precedent case will be served momentum for legislation and policy making on social security. Hereafter, the study about how constitutional judgment affect legislation and policy making on social security, will be interesting theme of law and policy study.

      • Security Model for Sensitive Information Systems and Its Applications in Sensor Networks

        Tianbo Lu,Xiaobo Guo,Lingling Zhao,Yang Li,Peng Lin,Binxing Fang 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.5

        The study of security models for sensitive information systems has been taken on for years, but still lag far away behind the progress of information security practice. During this century, the thought of seeking the system security to the source of system development lifecycle received huge improvement in the system and software assurance domain. This paper firstly expounds the understanding of information security by illustrating information security study development progress since pre-computer age and presents a description of cyberspace and cyberization security by summarizing the status quo of cyberization. Then a security model called PDRL, which includes six core security attributes of sensitive information systems, is proposed to protect the security of sensitive information systems in the whole system life-cycle. At last, this paper probes into further discussion about controllability attribute and proposes a controllability model in sensitive sensor networks, followed by a probability computing formula and the example for computing the controllability of sensitive sensor networks. By dividing each single element of sensitive information and each element-related operation into a corresponding classification, this paper makes a reasonable description of the quantitative description about controllability.

      • SCISCIESCOPUS

        Development of a quantitative method for evaluating the efficacy of cyber security controls in NPPs based on intrusion tolerant concept

        Lee, Chanyoung,Yim, Ho Bin,Seong, Poong Hyun Elsevier 2018 Annals of nuclear energy Vol.112 No.-

        <P><B>Abstract</B></P> <P>Many regulatory documents, guides, and standards for cyber security issues in the nuclear industry have been published since Digital Instrumentation and Control (DI&C) systems were introduced to Nuclear Power Plants (NPPs). However, there are still difficulties when it comes to deciding which security controls are needed and to defining appropriate security control requirements for NPPs. With these regard, a quantitative method for evaluating the efficacy of security controls for DI&C systems in NPPs based on the intrusion tolerant concept is proposed in this study. The essence of the suggested method, <B> <I>In</I> </B>trusion <B> <I>To</I> </B>lerance based <B> <I>C</I> </B>yber <B> <I>S</I> </B>ecurity <B> <I>I</I> </B>ndex (<I>InTo-CSI</I>), is defined as a reduction ratio of probability that a cyber-attack damages a target system. The intrusion tolerant concept is applied to the evaluation method because availability of system’s safety functions is the first priority in the nuclear industry. “How much the system is intrusion-tolerant” means that to what extent does the system provide the minimum level of safe operation when facing unexpected intrusions. Based on intrusion tolerant strategies, an event tree was constructed, and <I>InTo-CSI</I> was estimated by failure probability of intrusion tolerant strategies: the resistance strategy, the detection strategy, and the graceful-degradation strategy. Among these three strategies, quantifying failure probability of the resistance strategy is more challenging than the other two strategies because its relation with attack-difficulty. Attack-difficulty has a strong dependence on unexpected and abstract factors such as attacker’s skills and accessibility to information of the target system. For this reason, the model of Mean Time To Compromise (MTTC) was adopted to estimate abstract variables, and the adopted model was revised in accordance with the suggested evaluation method. Validity of the suggested method was proven by conducting a case study. The suggested method can help assess how much the system security can be improved by applying specific cyber security controls, and which types of additional cyber security controls should be taken. Furthermore, <I>InTo-CSI</I> can make security designers achieve efficacy levels of the specific target system by quantitatively evaluating cyber security controls.</P> <P><B>Highlights</B></P> <P> <UL> <LI> A quantitative index was developed to evaluate the efficacy of security controls in NPPs. </LI> <LI> The intrusion tolerant concept was applied to the evaluation method. </LI> <LI> The model of Mean Time To Compromise (MTTC) was adopted to estimate abstract variables. </LI> <LI> The adopted model and concept were revised in accordance with the suggested method. </LI> <LI> The validity of the suggested method was demonstrated by conducting a case study. </LI> </UL> </P>

      • KCI등재

        The Integrated Cyber SRM(Security Risk Monitoring) System Based on the Patterns of Cyber Security Charts

        Gang-Soo Lee(이강수),Hyun Mi Jung(정현미) 한국컴퓨터정보학회 2019 韓國컴퓨터情報學會論文誌 Vol.24 No.11

        사이버 보안을 위한 활동인 ‘위험관리(Risk management)’와 ‘보안관제(security monitoring)’ 업무는 미래에 발생할 보안 위협에 대비하고 보안 사고를 최소화 하는 활동이라는 점에서 깊은 상관관계를 가지고 있다. 또한 위험관리와 보안관제 분야 모두 관리자에게 시각적으로 그 정보자산에 대한 위협을 보여주는 패턴 모델을 적용하는 것이 효과적이다. 검증받은 패턴모델로는 전통적인 품질관리 분야에서 오랫동안 사용되어온 ‘관리도’(control chart)모델이 존재하지만 정보시스템의 사이버 위험관리와 보안관제에서의 활용은 부족하다. 이에 본 논문에서는 위험관리와 보안관제 시스템을 통합한 사이버 SRM(Security Risk Monitoring)시스템을 설계하였다. SRM은 ‘관리도’의 패턴을 이용한 ‘보안대책’ (security control)의 적용 전략을 제시한다. 보안대책은 기존의 표준화된 보안대책 집합인 ISMS, NIST SP 800-53, CC를 통합적으로 적용하였다. 이를 활용하여 2014~2018년 까지 4년간 우리나라사이버위기 경보동향을 분석하였고 이는 향후 보다 유연한 보안대책 수립을 가능하게 한다. The "Risk management" and "Security monitoring" activities for cyber security are deeply correlated in that they prepare for future security threats and minimize security incidents. In addition, it is effective to apply a pattern model that visually demonstrates to an administrator the threat to that information asset in both the risk management and the security system areas. Validated pattern models have long-standing "control chart" models in the traditional quality control sector, but lack the use of information systems in cyber risk management and security systems. In this paper, a cyber Security Risk Monitoring (SRM) system that integrates risk management and a security system was designed. The SRM presents a strategy for applying "security control" using the pattern of "control charts". The security measures were integrated with the existing set of standardized security measures, ISMS, NIST SP 800-53 and CC. Using this information, we analyzed the warning trends of the cyber crisis in Korea for four years from 2014 to 2018 and this enables us to establish more flexible security measures in the future.

      • KCI등재

        SCADA(Supervisory Control and Data Acquisition)시스템 사이버 보안 통제 지원을 위한 스키마 설계

        정현미,한경수,이강수 한국지식정보기술학회 2012 한국지식정보기술학회 논문지 Vol.7 No.6

        As to SCADA system, there is the differentiation with the other information system. Therefore, the modeling activity is needed based on the security control guide in order to build control and instrumentation system security control. In this paper, and the role and by the security control designed the relationship (that is, the relation schema) between the document for ‘The system for supporting the cyber security control of SCADA system design’ based on the security control guide. The designed schema plans ‘The system for supporting the cyber security control of SCADA system’ for observing the security control guide, and is used as the database and content that it supports the design and implementation.

      • KCI등재

        An Analysis of Technical Security Control Requirements for Digital I&C Systems in Nuclear Power Plants

        송재구,이정운,박기용,권기춘,이동영,이철권 한국원자력학회 2013 Nuclear Engineering and Technology Vol.45 No.5

        Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security.. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼