JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Problem Analysis and Countermeasures Research through Security Threat Cases of Physical Security Control Systems
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Problem Analysis and Countermeasures Research through Security Threat Cases of Physical Security Control Systems
Ko, Yun Seong; Park, Kwang Hyuk; Kim, Chang Soo;
  PDF(new window)
 Abstract
Physical security protecting people from physical threats, such as a person or vehicle, has received a great attention. However, it has many risks of hacking and other security threats because it is highly dependent on automated management systems. In addition, a representative system of physical security, a CCTV control system has a high risk of hacking, such as video interceptions or video modulation. So physical security needs urgent security measures in accordance with these threats. In this paper, we examine the case of security threats that have occurred in the past, prevent those from threatening the physical security, and analyze the security problem with the threats. Then we study the countermeasures to prevent these security threats based on the problems found in each case. Finally we study for the method to apply these countermeasures.
 Keywords
Physical Security;CCTV;Backdoor;IP Exposure;
 Language
Korean
 Cited by
1.
SSH 터널링을 이용한 CCTV 원격접속 보안기법,황기진;박재표;양승민;

한국산학기술학회논문지, 2016. vol.17. 11, pp.148-154 crossref(new window)
 References
1.
D.H. Kim, S.W. Yoon, and Y.P. Lee, “Security for IoT Services,“ Journal of Korea Communications Society (Information and Communication) , Vol. 30, No. 8, pp. 53-59, 2013.

2.
Physical Security in Wikipedia, https://ko.wikipedia.org/wiki/%EB%AC%BC%EB%A6%AC%EB%B3%B4%EC%95%88(accessed Aug. 25. 2015).

3.
KISA, Survey for Information Security Industry in Korea : Year 2013, KISIA & KDCA, 2013.

4.
T.W. Seo, S.R. Lee, B.C. Bae, E.J. Yoon, and C.S. Kim, “An Analysis of Vulnerabilities and Performance on the CCTV Security Monitoring and Control,” Journal of Korea Multimedia Society, Vol. 15, No. 1, pp. 93-100, 2012. crossref(new window)

5.
KAIST, Security Threat Report of Foreignmade CCTV, IP-Camera, SysSec lab, 2015.

6.
GAO, Information Security-FAA Needs to Address Weaknesses in Air Traffic Control Systems, 2015.

7.
Y.W. Joo and S.J. Lee, Intelligent CCTV Trends and Performance Improvement, 2013.

8.
S.H. Park, Intelligent CCTV System Technology Issues and Industry Trends, 2013.

9.
R. Bodenheim, J. Butts, S. Dunlap, and B. Mullins, “Evaluation of the Ability of the Shodan Search Engine to Identify Internetfacing Industrial Control Devices,” International Journal of Critical Infrastructure Protection, Vol. 7, No. 2, pp. 114-123, 2014. crossref(new window)

10.
H.J. Shin and Y.K. Jeong, “Device Alive Check Algorithm Using TCP Session under CCTV Network based on NAT,” Journal of Korea Multimedia Society, Vol. 18, No. 5, pp. 631-640, 2015. crossref(new window)

11.
S.J. Park and J.H. Park, “Current Status and Analysis of Domestic Security Monitoring Systems,” Korea Institute of Electronic Communication Science, Vol. 9, No. 2, pp. 261-266, 2014. crossref(new window)

12.
Y.J. Kim, S.Y. Lee, H.Y. Kwon, and J.I. Lim, “A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services,” Korea Institute of Information Security & Cryptography, Vol. 19, No. 1, pp. 103-111, 2009.

13.
R.A. Rouse, Is Someone Watching You Through Your Webcam?, 2012.

14.
C. Rodriguez, The Growing Hacking Threat to Websites: An Ongoing Commitment to Web Application Security, 2012.

15.
KISA, Survey for Global Information Security Industry : Year 2013, 2013.