본문바로가기

자료 카테고리

전체 1
도서자료 1
학위논문 0
연속간행물·학술기사 0
멀티미디어 0
동영상 0
국회자료 0
특화자료 0

도서 앰블럼

전체 (1)
일반도서 (0)
E-BOOK (0)
고서 (0)
세미나자료 (1)
웹자료 (0)
전체 (0)
학위논문 (0)
전체 (0)
국내기사 (0)
국외기사 (0)
학술지·잡지 (0)
신문 (0)
전자저널 (0)
전체 (0)
오디오자료 (0)
전자매체 (0)
마이크로폼자료 (0)
지도/기타자료 (0)
전체 (0)
동영상자료 (0)
전체 (0)
외국법률번역DB (0)
국회회의록 (0)
국회의안정보 (0)
전체 (0)
표·그림DB (0)
지식공유 (0)

도서 앰블럼

전체 1
국내공공정책정보
국외공공정책정보
국회자료
전체 ()
정부기관 ()
지방자치단체 ()
공공기관 ()
싱크탱크 ()
국제기구 ()
전체 ()
정부기관 ()
의회기관 ()
싱크탱크 ()
국제기구 ()
전체 ()
국회의원정책자료 ()
입법기관자료 ()

검색결과

검색결과 (전체 1건)

검색결과제한

열기
자료명/저자사항
(UC버클리 전문가 초청)인터넷 보안 국제심포지엄 : 클라우드 시대, 인터넷 보안을 다시 논한다 = Cyber security symposium with berkeley experts : revisiting cyber security in the era of cloud computing / 국회의원 이용경 주최 인기도
발행사항
서울 : 이용경의원실, 2011
형태사항
127 p. : 삽화, 표 ; 30 cm
주기사항
일시: 2011. 11. 8(화) 13시 30분 ~ 18시, 장소: 국회의원회관 소회의실
제어번호
PAMP1000033214
원문
미리보기

목차보기더보기

표제지

Programme

목차

Opening remark / Yong-Kyung Lee 6

Welcoming remark / Jae-hee Jeon 10

주제발표 1. Above the Clouds: A Berkeley View of Cloud Computing / Anthony D. Joseph 14

BIOGRAPHY 16

ABSTRACT 17

Everyone Has Lots of Data to Process! 18

RAD Lab Mission ('05-'11) 19

Cloud as Major Enabler 19

Cloud Computing: True Utility 20

Economics of Cloud Users 20

Economics of Cloud Providers 22

Cloud Security Risks 22

Split Security Responsibilities 23

Physical Security 23

Shared Computing Infrastructure Risks 24

Securing Data in the Cloud 24

Stepping Stone Compromise 25

Advanced Persistent Threat Risk 25

Summary 26

주제발표 2. Online Privacy in the Age of Targeted Advertising / Larry Rohrbough 28

BIOGRAPHY 30

ABSTRACT 31

Motivation 32

Evolution of the Web 33

Evolution of Web Tracking 35

TRUST Studies - UC Berkeley 36

TRUST Studies - Stanford 37

Solutions: Policy / Standards / Legal 39

Technical Solution 39

Going Forward... 40

주제발표 3. Comparing Korean and US Cyber Security Infrastructure / Yongdae Kim 42

BIOGRAPHY 44

ABSTRACT 45

2010 ~ 2011: Security Breaches Everywhere 46

Security Breaches: Goals 47

Security Breaches: Main Tools (Reports) 47

Questions 48

A Few Possible Reasons 48

System/Security Admin in US Univs 49

System/Security Admin in US Company 49

System/Security Admin in US Major Bank 50

Some More Details 50

Spear Phishing (Targeted Phishing) 51

Examples of Spear Phishing 51

APT and Insider Misuse 53

Questions and Reasons Revisited 54

주제발표 4. Towards a Theory of High Confidence Networked Control Systems: Action Webs / S. Shankar Sastry 56

BIOGRAPHY 58

ABSTRACT 60

Motivation: Cybersecurity : Sensor networks & Networked Control Systems (NCS) NCS vulnerabilities 62

The swarm at the edge of the cloud 62

Ubiquitous instrumentation 63

Sensor webs everywhere 63

Widely deployed in critical infrastructures 64

Societal cyber-physical systems 64

Action Webs 65

Challenges for Action Webs 65

Cyber-attacks to NCS 66

NCS security concerns 66

Previous work in WSN security 67

Previous work in security is not enough 67

Cybersecurity for NCS 68

Cybersecurity for NCS: three problems 68

Cybersecurity for NCS 69

Threat assessment 69

Gignac water canal network 70

Gignac canal network 70

Reported attacks on water SCADA systems 71

Regulatory control of canal pools 71

Defender and attacker models 72

Cyber-attack on the Avencq canal pool 72

Cyber-attacks on NCS 73

Attack diagnosis 74

Attacks on supervisory control layer 74

Flow model 75

Finite-dimensional [approximate] model 75

State Estimation 76

Diagnosis scheme for unauthorized withdrawals 76

Diagnosis of unauthorized withdrawals: no attack 77

Attack diagnosis: upstream level sensors hacked 77

Attack diagnosis: downstream level sensors hacked 78

Security implications 78

Attack diagnosis for [other] SCADA systems 79

Resilient control 79

Attacks on regulatory control layer 80

Attack model: switching system of PDEs 80

Switching attack: stability 81

Switching attack: characterization of system stability 81

Interdependent security (IDS) & incetives to secure 82

Interdependent NCS 82

Interdependent failure probabilities 83

Multiplayer game with interdependent security 83

Increasing and decreasing incentives to secure 84

Individual optima [Nash equilibria] and social optima 84

Conclusion and future research 85

Economics of NCS security and reliability 86

NCS security experimentation 86

Towards a theory of high confidence NCS: Action Webs 87

주제발표 5. Computer Privacy Risks: Snooping on Keyboards / Doug Tygar 88

BIOGRAPHY 90

ABSTRACT 91

Keyboard Acoustic Sniffing 93

Acoustic Information in Typing 93

Previous Work vs. Our Approach 94

Key Observation 94

Sound of a Keystroke 95

Overview 95

Feature Extraction 96

Cepstrum vs. FFT 96

Unsupervised Learning 97

Bi-grams of Characters 98

Language Model Correction 98

Word Tri-grams 99

Two Copies of Recovered Text 99

Feedback-based Training 100

Experiment 101

Limitations of Our Experiments 103

Defenses 104

Summary 104

Overview of the Trust Center 106

TRUST Overview 109

TRUST Research 110

TRUST Education and Outreach 111

TRUST Knowledge Transfer 112

TRUST Human Resource Development 113

TRUST Science of Security 114

Summary 118

Panel 120

1. Sehun Kim 120

2. Hongsun Kim 124

[뒷표지] 127

권호기사보기

권호기사 목록 테이블로 기사명, 저자명, 페이지, 원문, 기사목차 순으로 되어있습니다.
기사명 저자명 페이지 원문 기사목차
연속간행물 팝업 열기 연속간행물 팝업 열기