[go: up one dir, main page]

WO2023158111A1 - Cyber security management system for maritime autonomous surface ship - Google Patents

Cyber security management system for maritime autonomous surface ship Download PDF

Info

Publication number
WO2023158111A1
WO2023158111A1 PCT/KR2023/000729 KR2023000729W WO2023158111A1 WO 2023158111 A1 WO2023158111 A1 WO 2023158111A1 KR 2023000729 W KR2023000729 W KR 2023000729W WO 2023158111 A1 WO2023158111 A1 WO 2023158111A1
Authority
WO
WIPO (PCT)
Prior art keywords
security management
network
management system
cyber security
autonomous
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/KR2023/000729
Other languages
French (fr)
Korean (ko)
Inventor
최성민
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange Security Co Ltd
Original Assignee
Orange Security Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Orange Security Co Ltd filed Critical Orange Security Co Ltd
Publication of WO2023158111A1 publication Critical patent/WO2023158111A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • One embodiment of the present invention relates to a cyber security management system for an autonomous vessel.
  • VSAT fast satellite communication
  • a general ship cyber security management system has a basic network structure of a digital ship (smart ship) and an autonomous navigation system.
  • a general ship cyber security management system sets up a logical network configuration using a hub switch. It has a structure in which cyber attacks generated in IT networks can easily propagate to autonomous navigation systems and OT networks. In the general ship cyber security management system, it is difficult to check whether the OT system is abnormal until a direct failure occurs.
  • This embodiment integrates and monitors the IT (Information Technology) network and the OT (Operational Technology) network of the autonomous ship in order to manage the cyber security of the autonomous ship, and when a cyber attack occurs, both the IT network and the OT network are monitored. It aims to provide a cyber security management system for autonomous vessels that protects and simplifies onboard operations while complying with maritime security regulations to prevent cyber attacks from spreading.
  • IT Information Technology
  • OT Operaational Technology
  • the data collection unit for generating collected data by collecting transmission and reception data for a plurality of networks in the autonomous vessel; a cyber attack identification unit that analyzes the collected data and checks whether a cyber attack or abnormal traffic to one or more networks among the plurality of networks is detected; and a cyber attack blocking unit blocking the cyber attack or the network in which the abnormal traffic is detected among the plurality of networks.
  • FIG. 1 is a block diagram schematically illustrating an autonomous ship cyber security management system according to an embodiment.
  • FIG. 2 is a block diagram schematically showing an apparatus for managing cyber security for an autonomous vessel according to the present embodiment.
  • FIG. 3 is a diagram showing the functions of the cyber security management system according to the present embodiment.
  • FIG. 4 is a diagram showing the configuration of a cyber security management system according to this embodiment.
  • FIG. 5 is a diagram showing a risk evaluation matrix according to the present embodiment.
  • 6a, 6b, and 6c are diagrams illustrating impact (importance) indexes according to the present embodiment.
  • 7a and 7b are diagrams showing probability indexes according to this embodiment.
  • FIG. 8 is a diagram showing a threat list according to the present embodiment.
  • FIG. 9 is a diagram showing vulnerability scores according to this embodiment.
  • FIG. 10 is a diagram illustrating an account extortion scenario among risk scenarios according to the present embodiment.
  • FIG. 11 is a diagram illustrating a privilege abuse scenario among risk scenarios according to the present embodiment.
  • FIG. 12 is a diagram illustrating information tampering/altering scenarios among risk scenarios according to the present embodiment.
  • FIG. 13 is a diagram illustrating an information leakage scenario among risk scenarios according to the present embodiment.
  • FIG. 14 is a diagram illustrating an unauthorized person access scenario among risk scenarios according to the present embodiment.
  • 15 is a diagram illustrating an unauthorized USB use scenario among risk scenarios according to the present embodiment.
  • 16 is a diagram illustrating an illegal SW installation scenario among risk scenarios according to the present embodiment.
  • 17 is a diagram showing a DDOS scenario among risk scenarios according to the present embodiment.
  • FIG. 18 is a diagram illustrating an unauthorized terminal scenario among risk scenarios according to the present embodiment.
  • 19 is a diagram showing a malicious code scenario among risk scenarios according to the present embodiment.
  • 20 is a diagram illustrating a malicious action scenario among risk scenarios according to the present embodiment.
  • 21 is a diagram illustrating a personal information abuse scenario among risk scenarios according to the present embodiment.
  • 22 is a diagram illustrating a denial of infringement scenario among risk scenarios according to the present embodiment.
  • FIG. 23 is a diagram illustrating an operation mistake scenario among risk scenarios according to the present embodiment.
  • 24 is a diagram illustrating a hardware failure scenario among risk scenarios according to the present embodiment.
  • 25 is a diagram illustrating a power outage scenario among risk scenarios according to the present embodiment.
  • FIG. 1 is a block diagram schematically illustrating an autonomous ship cyber security management system according to an embodiment.
  • the autonomous ship cyber security management system 100 is mounted in a ship.
  • the autonomous ship cyber security management system 100 refers to a system for evaluating or managing cyber security according to regulations corresponding to autonomous ships.
  • the autonomous ship cyber security management system 100 manages cyber security for the IT network 120 and the OT network 150 as well as the crew network 130 .
  • the autonomous vessel cyber security management system 100 generates a cyber security evaluation result that evaluates the cyber security risk for the router 108, the IT network 120, the OT network 150, and the crew network 130 .
  • the autonomous ship cyber security management system 100 manages the security of the router 108, the IT network 120, the OT network 150, and the crew network 130 based on the cyber security evaluation result.
  • the autonomous ship cyber security management system 100 is applied to a special environment of a ship to provide a solution capable of performing satellite communication, responding to situations in which additional technical support is not received, and various adverse conditions.
  • the autonomous ship cyber security management system 100 predicts cyber attacks (threats) on autonomous ships in advance using AI by combining AI or cloud big data.
  • the autonomous ship cyber security management system 100 analyzes cyber attacks (threats) on autonomous ships using cloud big data.
  • the autonomous vessel cyber security management system 100 provides risk scenarios that can be selected according to constraints, since there are many cases when evaluating risks for cyber security. For example, the autonomous ship cyber security management system 100 provides a scenario in a manner of confirming whether the cause is infiltration by an outsider or email by an insider based on a result of a malicious code destroying specific information.
  • the autonomous ship cyber security management system 100 provides a risk scenario when a cyber attack occurs on an autonomous ship, so that a captain or crew member operating the ship can select a risk scenario corresponding to the ship.
  • the autonomous ship cyber security management system 100 controls the navigation system by itself, and controls and monitors the ship remotely from land.
  • the autonomous ship cyber security management system 100 is exposed to cyber threats because the land and the ship are constantly connected.
  • the autonomous ship cyber security management system 100 monitors and controls an IT network 120 , a crewman network 130 , and an OT network 150 .
  • the autonomous vessel cyber security management system (100) blocks the propagation of cyber attacks between networks when individual cyber attacks occur in the IT network (120), the crew network (130), and the OT network (150), thereby preventing navigation accidents caused by cyber attacks. prevent.
  • the autonomous vessel cyber security management system 100 integrates and manages the vessel's internal IT network 120 and the OT network 150.
  • the autonomous vessel cyber security management system 100 installs an agent program in the IT network 120 and installs a traffic detection sensor in the OT network 150 to collect and monitor all network traffic generated in the vessel.
  • the autonomous vessel cyber security management system includes a cyber security management device 110, an IT network 120, a crew member network 130, an autonomous navigation device 140, and an OT network 150.
  • the cyber security management device 110 communicates with a Very Small Aperture Terminal (VSAT) that communicates with a satellite via a router.
  • VSAT Very Small Aperture Terminal
  • the cyber security management device 110 checks whether a cyber attack occurs during communication with the VSAT.
  • the cyber security management device 110 communicates with a base station via a router via Long-Term Evolution (LTE) and 5G.
  • LTE Long-Term Evolution
  • 5G Long-Term Evolution
  • the cyber security management device 110 checks whether a cyber attack occurs during communication with the base station.
  • the cyber security management device 110 communicates with a router via a firewall/Intrusion Preventing System (IPS).
  • IPS firewall/Intrusion Preventing System
  • the cyber security management device 110 communicates with the IT network 120 via the L3 switch.
  • the cyber security management device 110 checks whether a cyber attack occurs during communication with the IT network 120 .
  • the cyber security management device 110 communicates with the crew member network 130 via the L3 switch. The cyber security management device 110 checks whether a cyber attack occurs during communication with the flight attendant network 130 . The cyber security management device 110 communicates with the autonomous navigation device 140 via the L3 switch. The cyber security management device 110 checks whether a cyber attack occurs during communication with the autonomous navigation device 140 .
  • the cyber security management device 110 provides an integrated system for ship cyber security management for each of the router 108, the IT network 120, the OT network 150, and the crew network 130.
  • the cyber security management device 110 performs integrated network monitoring on the router 108, the IT network 120, the OT network 150, and the crew network 130 to prevent mutual damage from spreading.
  • the IT network 120 refers to a network capable of transmitting and receiving data by being connected to a business PC and a business server provided inside the ship.
  • the IT network 120 installs an endpoint agent to control and manage individual PCs.
  • the crew network 130 refers to a network capable of transmitting and receiving data by being connected to a wireless AP and a crew terminal provided inside the ship.
  • An Operational Technology (OT) network 150 refers to a network capable of transmitting and receiving data by connecting a monitoring device, a navigation device, and a control device provided inside a ship. Since it is impossible to install an agent on the OT network 150, the cyber security management device 110 identifies abnormal traffic on the OT network 150 through machine learning.
  • the autonomous navigation device 140 uses the OT network 150 to interwork with a monitoring device, a navigation device, and a control device for autonomous navigation.
  • FIG. 2 is a block diagram schematically showing an apparatus for managing cyber security for an autonomous vessel according to the present embodiment.
  • the cyber security management device 110 includes a collection unit 210, a cyber attack confirmation unit 220, a risk evaluation unit 230, a cyber attack blocking unit 240, and a scenario providing unit 250. do. Components included in the cyber security management device 110 are not necessarily limited thereto.
  • Each component included in the cyber security management device 110 is connected to a communication path that connects software modules or hardware modules inside the device and can operate organically with each other. These components communicate using one or more communication buses or signal lines.
  • Each component of the cyber security management device 110 shown in FIG. 2 means a unit that processes at least one function or operation, and may be implemented as a software module, a hardware module, or a combination of software and hardware.
  • the data collection unit 210 collects transmission and reception data for a plurality of networks (router 108, IT network 120, OT network 150, and crew network 130) in the autonomous ship to generate collected data. .
  • the data collection unit 210 collects transmission/reception data collected from the router, the IT network 120 , the crew network 130 , and the OT network 150 to generate aggregated data.
  • the data collecting unit 210 generates collected data by compressing the collected data and then applying an open stack for a maximum protocol range.
  • a plurality of networks are a VSAT (Very Small Aperture Terminal) that interworks with satellites, a router (108) that communicates with mobile communication base stations, and an IT network (120) that communicates with business PCs and business servers installed inside autonomous ships.
  • VSAT Very Small Aperture Terminal
  • IT network 120
  • Wireless AP Access Point
  • crew network 130 communicating with the crew terminal
  • monitoring device installed inside the autonomous ship
  • navigation device interlocking with control device It includes an OT network 150 that
  • the cyber attack check unit 220 analyzes the collected data to detect a cyber attack or abnormality on one or more networks among a plurality of networks (router 108, IT network 120, OT network 150, crew network 130). Check whether traffic is detected or not.
  • the cyber attack checking unit 220 checks whether a cyber attack or abnormal traffic of the collected data on the IT network 120 is detected using an agent program installed on a work PC and a work server.
  • the cyber attack check unit 220 detects a cyber attack or abnormal traffic of collected data for the OT network 150 from a traffic detection sensor that detects traffic for a monitoring device, a navigation device, and a control device installed inside the autonomous ship. check whether the
  • the risk evaluation unit 230 evaluates the risk against cyber threats for each of a plurality of networks (router 108, IT network 120, OT network 150, crew network 130) Calculate risk evaluation results do.
  • the risk evaluation unit 230 evaluates each of the plurality of networks based on the transmission and reception data received from the plurality of networks (router 108, IT network 120, OT network 150, and crew network 130) to determine the risk level Create a Risk Assessment Matrix.
  • the risk evaluation unit 230 is included in the risk evaluation matrix based on the results of checking items set in a plurality of networks (router 108, IT network 120, OT network 150, crew network 130) Determine the Impact Index from 1 to 25.
  • the risk evaluation unit 230 determines that the impact index is low when the impact index is 1 to 7, determines it to be significant when the impact index is 8 to 14, and determines it to be significant when the impact index is 15 to 25. ) judged by
  • the risk evaluation unit 230 determines a probability index for a cyber attack as '1' when all five impact indices are determined to be low.
  • the risk evaluation unit 230 determines a probability index for a cyber attack as '2' when three out of five impact indices are determined to be low and two are determined to be significant. .
  • the risk evaluation unit 230 determines that 2 out of 5 impact indices are low, 2 are significant, and 1 is significant, the probability index for a cyber attack ( Probability Index) is set to '3'.
  • the risk evaluation unit 230 determines that one of the five impact indices is low, two are significant, and two are determined to be significant, the probability index for a cyber attack ( Probability Index) is set to '4'.
  • the risk evaluation unit 230 determines that one of the five impact indices is low, one is significant, and three are determined to be major, the probability index for a cyber attack ( Probability Index) is set to '5'.
  • the risk evaluation unit 230 classifies the impact index into a confidentiality index, an integrity index, and an availability index.
  • the risk evaluation unit 230 is one of 5 Critical, 4 Significant, 3 Moderate, 2 Minor, and 1 Negligible for each of the confidentiality index, integrity index, and availability index. determined by the value of The risk evaluation unit 230 calculates a value obtained by adding the confidentiality index, the integrity index, and the availability index as an asset criticality value, and the asset criticality value (Confidentiality Index + Integrity Index + Availability Index) as an impact index Recognize.
  • the risk evaluation unit 230 sets the asset importance value to a preset standard (3 ⁇ Index 1 ⁇ 4, 5 ⁇ Index 2 ⁇ 6, 7 ⁇ Index 3 ⁇ 9, 10 ⁇ Index 4 ⁇ 12, 13 ⁇ Index 5 ⁇ 15) decide according to The risk evaluation unit 230 determines the impact index value as index 1 (Index 1) when 3 ⁇ asset importance value ⁇ 4. When 5 ⁇ asset importance value ⁇ 6, the risk evaluation unit 230 determines the impact index value as index 2 (Index 2). The risk evaluation unit 230 determines the impact index value as index 3 when 7 ⁇ asset importance value ⁇ 9. The risk evaluation unit 230 determines the impact index value as Index 4 when 10 ⁇ asset importance value ⁇ 12. The risk evaluation unit 230 determines the impact index value as Index 5 when 13 ⁇ asset importance value ⁇ 15.
  • the risk evaluation unit 230 divides the probability index into a threat index and a vulnerability index.
  • the risk evaluation unit 230 determines the threat index as one of 5 Definite, 4 Probable, 3 Occasional, 2 Remote, and 1 Improbable.
  • the risk assessment unit 230 determines the vulnerability index as one of 5 very high, 4 high, 3 medium, 2 low, and 1 very low. .
  • the risk evaluation unit 230 calculates the product of the threat index and the vulnerability index as a cyber attack probability value, and recognizes the cyber attack probability value (Threat Index ⁇ Vulnerability Index) as the probability index.
  • the risk evaluation unit 230 sets the cyber attack probability value to a predetermined standard (1 ⁇ Index 1 ⁇ 5, 6 ⁇ Index 2 ⁇ 10, 11 ⁇ Index 3 ⁇ 15, 16 ⁇ Index 4 ⁇ 20, 21 ⁇ Index 5 ⁇ 25) decide according to When 1 ⁇ cyber attack probability value ⁇ 5, the risk evaluation unit 230 determines the probability index value as index 1 (Index 1). When 6 ⁇ cyber attack probability value ⁇ 10, the risk evaluation unit 230 determines the probability index value as index 2 (Index 2). When 11 ⁇ cyber attack probability value ⁇ 15, the risk evaluation unit 230 determines the probability index value as index 3 (Index 3). When 16 ⁇ cyber attack probability value ⁇ 20, the risk evaluation unit 230 determines the probability index value as index 4 (Index 4). When 21 ⁇ cyber attack probability value ⁇ 25, the risk evaluation unit 230 determines the probability index value as Index 5.
  • a predetermined standard (1 ⁇ Index 1 ⁇ 5, 6 ⁇ Index 2 ⁇ 10, 11 ⁇ Index 3 ⁇ 15, 16 ⁇ Index 4 ⁇ 20, 21 ⁇
  • the code is assigned T101 and the threat index (TI) is determined to be '5'.
  • the code is assigned T102 and the threat index (TI) is determined to be '4'.
  • the code is assigned T103 and the threat index (TI) is determined to be '4'.
  • the code is assigned T201 and the threat index (TI) is determined to be '4'.
  • the code is assigned T202 and the threat index (TI) is determined to be '4'.
  • the code is assigned T203 and the threat index (TI) is determined to be '4'.
  • the code is assigned T204 and the threat index (TI) is determined to be '2'.
  • the code is assigned T301 and the threat index (TI) is determined to be '5'.
  • the code is assigned T302 and the threat index (TI) is determined to be '5'.
  • the code is assigned T401 and the threat index (TI) is determined to be '4'.
  • the code is assigned T402 and the threat index (TI) is determined to be '5'.
  • the code is assigned T403 and the threat index (TI) is determined to be '4'.
  • the code is assigned T404 and the threat index (TI) is determined to be '4'.
  • the code is assigned T501 and the threat index (TI) is determined to be '3'.
  • the code is assigned T51 and the threat index (TI) is determined to be '3'.
  • the risk assessment unit 230 detects a threat when important information (network/cargo/financial information) is leaked by a hacker among the router 108, the IT network 120, the OT network 150, and the crew network 130.
  • the scenario provision unit 250 is responsible for threat factors ('account takeover', 'abuse of authority', 'information leakage', 'illegal SW installation', 'DDOS', 'malicious code', 'abuse of personal information', 'denial of infringement'). , 'operation mistake', 'hardware defect', 'power outage').
  • the risk assessment unit 230 classifies the threat factor as 'authority abuse' when exposure to an intrusion occurs through a port of a vulnerable service among the router 108, the IT network 120, the OT network 150, and the crew network 130. ', 'information leakage', 'illegal SW installation', 'unauthorized terminal', 'malicious code', 'infringement denial', 'operation mistake', 'hardware defect', 'power outage'.
  • the scenario providing unit 250 is responsible for threat factors ('authority abuse', 'information leakage', 'illegal SW installation', 'unauthorized terminal', 'malicious code', 'infringement denial', 'operation mistake', 'hardware defect'). , one or more of 'power outages') to provide response scenarios.
  • the risk assessment unit 230 identifies threat factors in the event of unauthorized tampering (manipulation) of the router 108, the IT network 120, the OT network 150, and the crew network 130.
  • the scenario providing unit 250 is responsible for threat factors ('account takeover', 'abuse of authority', 'falsification/change of information', 'access by unauthorized persons', 'illegal SW installation', 'DDOS', 'malicious behavior', It provides response scenarios according to 'denial of infringement', 'operating mistake', 'hardware defect', 'outage').
  • the risk evaluation unit 230 classifies the threat factors as 'authority abuse' and 'information' when exposure to a zero-day attack occurs among the router 108, the IT network 120, the OT network 150, and the crew network 130. Leakage', 'illegal software installation', 'operation mistake', 'hardware defect', 'power outage'.
  • the scenario providing unit 250 provides response scenarios according to threat factors (one or more of 'authority abuse', 'information leakage', 'illegal SW installation', 'operation mistake', 'hardware defect', and 'power outage') .
  • the risk evaluation unit 230 determines the threat factor as 'authority abuse' when a system failure occurs due to the execution of a patch whose stability has not been verified among the router 108, the IT network 120, the OT network 150, and the crew network 130. ', 'illegal SW installation', 'operation mistake', 'hardware defect', 'power failure'.
  • the scenario providing unit 250 provides response scenarios according to threat factors (at least one of 'authority abuse', 'illegal SW installation', 'operation mistake', 'hardware defect', and 'power outage').
  • the risk evaluation unit 230 determines the threat factor as 'unauthorized access' when infection and propagation of malicious code/ransomware occurs among the router 108, the IT network 120, the OT network 150, and the crew network 130. ', 'use of unauthorized USB', 'installation of illegal SW', 'DDOS', 'malicious code', 'denial of infringement', 'operating mistake', 'hardware defect', 'power outage'.
  • the scenario provision unit 250 provides threat factors ('access by unauthorized person', 'use of unauthorized USB', 'installation of illegal SW', 'DDOS', 'malicious code', 'denial of infringement', 'operation mistake', 'hardware defect'). ', 'outage') to provide response scenarios.
  • the risk evaluation unit 230 determines the threat factor as 'account hijacking' when infection and propagation of malicious code/ransomware occurs among the router 108, the IT network 120, the OT network 150, and the crew network 130. , 'abuse of authority', 'information leakage', 'access by unauthorized person', 'use of unauthorized USB', 'unauthorized terminal', 'malicious code', 'malicious behavior', 'abuse of personal information', 'operation mistake', It is recognized as one or more of 'hardware defect' and 'power outage'.
  • the scenario providing unit 250 provides threat factors ('account hijacking', 'authority abuse', 'information leakage', 'unauthorized person access', 'unauthorized USB use', 'unauthorized terminal', 'malicious code', 'malicious Action', 'misuse of personal information', 'operation mistake', 'hardware defect', 'power outage').
  • threat factors 'account hijacking', 'authority abuse', 'information leakage', 'unauthorized person access', 'unauthorized USB use', 'unauthorized terminal', 'malicious code', 'malicious Action', 'misuse of personal information', 'operation mistake', 'hardware defect', 'power outage').
  • the risk evaluation unit 230 accesses a system among the router 108, the IT network 120, the OT network 150, and the crew network 130 and changes important information to determine the threat factor when work (flight) delay occurs. 'account hijacking', 'abuse of authority', 'tampering/altering of information', 'access by unauthorized person', 'DDOS', 'unauthorized terminal', 'malicious code', 'malicious act', 'abuse of personal information' , 'denial of infringement', 'operation mistake', 'hardware defect', 'outage'.
  • the scenario provision unit 250 is responsible for threat factors ('account takeover', 'abuse of authority', 'falsification/altering of information', 'access by an unauthorized person', 'DDOS', 'unauthorized terminal', 'malicious code', 'malicious code'). Provides response scenarios according to one or more of 'personal information misuse', 'infringement denial', 'operation mistake', 'hardware defect', and 'power outage').
  • the risk assessment unit 230 determines the threat factor as 'illegal SW installation', when a work delay occurs due to system overload among the router 108, the IT network 120, the OT network 150, and the crew network 130. Recognizes one or more of 'DDOS', 'unauthorized terminal', 'malicious code', 'operation error', 'hardware defect', and 'power outage'.
  • the scenario providing unit 250 responds according to threat factors (one or more of 'illegal SW installation', 'DDOS', 'unauthorized terminal', 'malicious code', 'operation mistake', 'hardware defect', and 'power outage') provide a scenario.
  • the risk evaluation unit classifies the threat factors as 'account takeover' and 'abuse of authority' in the case of system interruption due to unauthorized person's random manipulation among the router (108), IT network (120), OT network (150), and crew network (130). ', 'tampering/altering of information', 'access by unauthorized person', 'DDOS', 'unauthorized terminal', 'malicious code', 'malicious act', 'denial of infringement', 'operation mistake', 'hardware defect' , recognized as one or more of 'blackouts'.
  • the scenario provision unit 250 is responsible for threat factors ('account takeover', 'abuse of authority', 'falsification/altering of information', 'access by an unauthorized person', 'DDOS', 'unauthorized terminal', 'malicious code', 'malicious code'). response scenarios) are provided.
  • the risk assessment unit 230 is a threat when an unauthorized person among the router 108, the IT network 120, the OT network 150, and the crew network 130 randomly tries to log in and steals an account to falsify or destroy important information.
  • the scenario provision unit 250 provides threat factors ('account hijacking', 'falsification/change of information', 'access by unauthorized persons', 'unauthorized terminal', 'malicious code', 'malicious behavior', 'abuse of personal information'). , 'denial of infringement', 'operation mistake', 'hardware defect', 'outage').
  • the risk evaluation unit identifies the threat factor as an 'account' in the case of intentional business (flight) delay by accessing and changing unauthorized information among the router (108), IT network (120), OT network (150), and crew network (130).
  • the router 108
  • IT network 120
  • OT network 150
  • crew network 130
  • Stealing', 'abuse of authority', 'falsification/altering of information', 'access by unauthorized person', 'use of unauthorized USB', 'installation of illegal SW', 'unauthorized terminal', 'malicious code', 'malicious behavior' Recognize it as one or more of 'abuse of personal information', 'denial of infringement', 'operation mistake', 'hardware defect', and 'power outage'.
  • the scenario providing unit 250 provides threat factors ('account hijacking', 'abuse of authority', 'falsification/change of information', 'access by unauthorized persons', 'use of unauthorized USB', 'installation of illegal SW', 'unauthorized terminal'). , 'malicious code', 'malicious behavior', 'abuse of personal information', 'denial of infringement', 'operation mistake', 'hardware defect', 'power outage').
  • the risk assessment unit 230 accesses important information and arbitrarily manipulates the OT network 150 by connecting to the internal network with an unauthorized terminal among the router 108, the IT network 120, the OT network 150, and the crew network 130 If this occurs, the threat factors are 'abuse of authority', 'access by unauthorized person', 'use of unauthorized USB', 'installation of illegal SW', 'unauthorized terminal', 'malicious code', 'malicious act', 'denial of infringement' ', 'Operation mistake', 'Hardware defect', or 'Power outage'.
  • the scenario provision unit 250 provides threat factors ('abuse of authority', 'access by unauthorized persons', 'use of unauthorized USB', 'installation of illegal SW', 'unauthorized terminal', 'malicious code', 'malicious behavior', ' denial of infringement', 'operating mistake', 'hardware defect', 'outage').
  • the risk evaluation unit 230 determines the threat factor as an 'account' when malicious code propagation occurs by connecting to an internal network with an unauthorized terminal among the router 108, the IT network 120, the OT network 150, and the crew network 130. Stealing', 'Abuse of authority', 'Access by unauthorized person', 'Use of unauthorized USB', 'Installation of illegal SW', 'Unauthorized terminal', 'Malicious act', 'Denial of infringement', 'Operation mistake', 'Hardware defect' ', 'power outage'.
  • the scenario providing unit 250 provides threat factors ('account hijacking', 'authority abuse', 'unauthorized access', 'unauthorized USB use', 'illegal SW installation', 'unauthorized terminal', 'malicious behavior', ' denial of infringement', 'operating mistake', 'hardware defect', 'outage').
  • the risk assessment unit 230 determines the threat factor as 'information' when a vulnerability to a cyberattack occurs due to a missing security patch among the router 108, the IT network 120, the OT network 150, and the crew network 130. 'modification/change', 'illegal SW installation', 'operation mistake', 'hardware defect', and 'power outage'.
  • the scenario providing unit 250 provides response scenarios according to threat factors (one or more of 'falsification/change of information', 'illegal SW installation', 'operation mistake', 'hardware defect', and 'power outage').
  • the risk evaluation unit 230 is a threat factor in the case of stealing important information and malicious behavior by accessing administrator/user privileges among the router 108, the IT network 120, the OT network 150, and the crew network 130. 'account hijacking', 'abuse of authority', 'tampering/altering of information', 'information leakage', 'access by unauthorized person', 'illegal SW installation', 'DDOS', 'unauthorized terminal', 'malicious code', Recognize one or more of 'malicious acts', 'abuse of personal information', 'denial of infringement', 'operation mistakes', 'hardware defects', and 'power outages'.
  • the scenario providing unit 250 is responsible for threat factors ('account takeover', 'abuse of authority', 'falsification/change of information', 'information leakage', 'access by unauthorized persons', 'illegal SW installation', 'DDOS', ' Provides response scenarios according to one or more of 'unauthorized terminal', 'malicious code', 'malicious behavior', 'abuse of personal information', 'denial of infringement', 'operation mistake', 'hardware defect', and 'power outage' .
  • the risk evaluation unit 230 determines the threat factor as 'illegal SW installation', in the case of a business delay caused by excessive traffic generation among the router 108, the IT network 120, the OT network 150, and the crew network 130. Recognizes one or more of 'DDOS', 'malicious code', 'operation error', 'hardware defect', and 'power outage'.
  • the scenario providing unit 250 provides response scenarios according to threat factors (one or more of 'illegal SW installation', 'DDOS', 'malicious code', 'operation mistake', 'hardware defect', and 'power outage').
  • the risk assessment unit 230 determines whether an account theft occurs when a hacker infiltrates because the password (PW) is not encrypted and stored among the router 108, the IT network 120, the OT network 150, and the crew network 130.
  • Threat factors include 'tampering/altering of information', 'information leakage', 'access by unauthorized person', 'installation of illegal software', 'DDOS', 'unauthorized terminal', 'malicious code', 'denial of infringement', and 'operation mistake'. ', 'hardware defect', 'power outage'.
  • the scenario provision unit 250 is responsible for threat factors ('information alteration/modification', 'information leakage', 'unauthorized access', 'illegal SW installation', 'DDOS', 'unauthorized terminal', 'malicious code', ' denial of infringement', 'operating mistake', 'hardware defect', 'outage').
  • threat factors 'information alteration/modification', 'information leakage', 'unauthorized access', 'illegal SW installation', 'DDOS', 'unauthorized terminal', 'malicious code', ' denial of infringement', 'operating mistake', 'hardware defect', 'outage').
  • the risk evaluation unit 230 is a router 108, IT network 120, OT network 150, crew network 130 of the OT network arbitrarily manipulated / important information falsification, when a flight accident occurs, the threat factor 'Account hijacking', 'abuse of authority', 'tampering/altering of information', 'access by unauthorized person', 'installation of illegal SW', 'DDOS', 'unauthorized terminal', 'malicious code', 'malicious behavior', It is recognized as one or more of 'denial of infringement', 'operation mistake', 'hardware defect', and 'power outage'.
  • the scenario providing unit 250 is responsible for threat factors ('account takeover', 'abuse of authority', 'falsification/change of information', 'access by unauthorized person', 'illegal SW installation', 'DDOS', 'unauthorized terminal', ' Malicious code', 'malicious behavior', 'denial of infringement', 'operation mistake', 'hardware defect', 'power outage').
  • threat factors 'account takeover', 'abuse of authority', 'falsification/change of information', 'access by unauthorized person', 'illegal SW installation', 'DDOS', 'unauthorized terminal', ' Malicious code', 'malicious behavior', 'denial of infringement', 'operation mistake', 'hardware defect', 'power outage').
  • the risk assessment unit 230 determines the threat factor as 'unauthorized access' when a system is interrupted by removing/changing a LAN port among the router 108, the IT network 120, the OT network 150, and the crew network 130. ', 'unauthorized terminal', 'malicious behavior', 'operation error', 'hardware defect', and 'power outage'.
  • the scenario provider 250 provides response scenarios according to threat factors (one or more of 'access by an unauthorized person', 'unauthorized terminal', 'malicious behavior', 'operation mistake', 'hardware defect', and 'power outage'). do.
  • the cyber attack blocking unit 240 blocks a network in which a cyber attack or abnormal traffic is detected among a plurality of networks (router 108, IT network 120, OT network 150, and crew network 130).
  • the cyber attack blocker 240 detects cyber attacks or abnormalities among a plurality of networks (router 108, IT network 120, OT network 150, crew network 130) based on the index included in the risk evaluation matrix. Block networks where traffic has been detected.
  • the scenario providing unit 250 extracts and provides a (risk level) scenario corresponding to the risk evaluation result.
  • FIG. 3 is a diagram showing the functions of the cyber security management system according to the present embodiment.
  • the autonomous vessel cyber security management system 100 provides a visibility function, a security function, and a security compliance function.
  • the autonomous vessel cyber security management system 100 searches and maintains an asset inventory with a visibility function.
  • the autonomous vessel cyber security management system 100 calculates cyber risks for the IT network 120 , the OT network 150 , and the crew network 130 as a visibility function.
  • the autonomous vessel cyber security management system 100 determines when a crew member behaves unsafely based on a degree of cyber risk.
  • the autonomous ship cyber security management system 100 provides a countermeasure method and an emergency situation when a cyber attack occurs as a security function.
  • the autonomous vessel cybersecurity management system 100 allows access to security operations expertise when needed as a security function.
  • the autonomous vessel cyber security management system 100 can be applied by extending a corporate cyber monitoring function to a vehicle as a security function.
  • the autonomous ship cyber security management system 100 identifies the cyber policy violation time with a security compliance function.
  • the autonomous ship cyber security management system 100 can prove the ship cyber security management status to an inspector.
  • FIG. 4 is a diagram showing the configuration of a cyber security management system according to this embodiment.
  • the autonomous ship cyber security management system 100 includes a visualization unit, a user input unit, an analysis and control unit, a data collection unit, an agent, an app server, a database, and an OT sensing unit.
  • the data collection unit collects local data.
  • the data collection unit collects IT network data from agents installed in the IT network 120 .
  • the data collection unit collects crew member network data from the crew member network 130 .
  • the data collection unit collects OT network data from OT network monitoring sensors installed in the OT network 150 .
  • the data collection unit generates aggregated data by collecting IT network data, OT network data, and crew network data.
  • the data collection unit compresses the aggregated data to optimize bandwidth usage.
  • the data collection unit applies an open stack for maximum protocol coverage to the collection data.
  • the analysis and control unit transmits the corresponding hacking information to the visualization unit and outputs it.
  • the analytics and control unit performs centralized analytics to detect machine learning for cyber and compliance risks.
  • the analysis and control unit may analyze the collected data using the cloud.
  • the analysis and control unit detects a cyber attack or abnormal traffic to any one of the router 108, the IT network 120, the OT network 150, and the crew network 130 based on the collected data, preventing the spread to block the network.
  • the visualization unit performs security information and event management.
  • the visualization unit includes a fleet management dashboard.
  • the visualization unit generates risk-based scores and report information.
  • the visualization unit creates and outputs an asset list and configuration diagram.
  • FIG. 5 is a diagram showing a risk evaluation matrix according to the present embodiment.
  • the autonomous vessel cyber security management system 100 evaluates each of the router 108, the IT network 120, the OT network 150, and the crew network 130 to generate a risk assessment matrix.
  • the autonomous ship cyber security management system 100 determines an impact of 1 to 25.
  • the autonomous vessel cyber security management system 100 determines that the impact is low when the impact is 1 to 7, determines it to be significant when the impact is 8 to 14, and determines it to be significant when the impact is 15 to 25 (maj).
  • the autonomous vessel cyber security management system 100 determines a probability index for cyber attack as '1' when all five impacts are determined to be low.
  • the autonomous ship cyber security management system 100 sets the probability index for cyber attacks to '2' when three of the five impacts are determined to be low and two are determined to be significant. to decide
  • the cyber attack Determine the probability index as '4'.
  • the cyber attack Determine the probability index as '5'.
  • 6a, 6b, and 6c are diagrams illustrating impact (importance) indexes according to the present embodiment.
  • the autonomous ship cyber security management system 100 divides the impact (criticality) index into a confidentiality index, an integrity index, and an availability index.
  • the autonomous ship cyber security management system 100 has 5 Critical, 4 Significant, 3 Moderate, 2 Minor, and 1 negligible for each of the confidentiality index, integrity index, and availability index ( Negligible) is determined by one of the values.
  • the autonomous vessel cyber security management system 100 calculates a value obtained by adding the confidentiality index, the integrity index, and the availability index as an asset criticality value, and the asset criticality value (Confidentiality Index + Integrity Index + Availability Index) It is recognized as an impact index.
  • the autonomous ship cyber security management system 100 sets the asset importance value to a preset standard (3 ⁇ Index 1 ⁇ 4, 5 ⁇ Index 2 ⁇ 6, 7 ⁇ Index 3 ⁇ 9, 10 ⁇ Index 4 ⁇ 12, 13 ⁇ Index 5 ⁇ 15).
  • the autonomous vessel cyber security management system 100 determines the corresponding asset importance value as index 1 (Index 1). When 5 ⁇ asset importance value ⁇ 6, the autonomous vessel cyber security management system 100 determines the corresponding asset importance value as index 2 (Index 2). When 7 ⁇ asset importance value ⁇ 9, the autonomous vessel cyber security management system 100 determines the corresponding asset importance value as Index 3.
  • the autonomous ship cyber security management system 100 determines the corresponding asset importance value as Index 4.
  • the autonomous ship cyber security management system 100 determines the corresponding asset importance value as Index 5.
  • 7a and 7b are diagrams showing probability indexes according to this embodiment.
  • the autonomous ship cyber security management system 100 divides a probability index into a threat index and a vulnerability index.
  • the autonomous ship cyber security management system 100 determines the threat index as one of 5 Definite, 4 Probable, 3 Occasional, 2 Remote, and 1 Improbable. .
  • the autonomous ship cyber security management system 100 sets the vulnerability index to one of 5 Very high, 4 High, 3 Medium, 2 Low, and 1 Very Low. determined by the value
  • the autonomous ship cyber security management system 100 calculates the product of the threat index and the vulnerability index as a cyber attack probability value, and recognizes the cyber attack probability value (Threat Index ⁇ Vulnerability Index) as the probability index.
  • the autonomous vessel cyber security management system 100 determines the cyber attack probability value based on a preset standard (1 ⁇ Index 1 ⁇ 5, 6 ⁇ Index 2 ⁇ 10, 11 ⁇ Index 3 ⁇ 15, 16 ⁇ Index 4 ⁇ 20, 21 ⁇ Index 5 ⁇ 25).
  • the autonomous ship cyber security management system 100 determines the asset importance value as index 1 (Index 1). When 6 ⁇ cyber attack probability value ⁇ 10, the autonomous ship cyber security management system 100 determines the asset importance value as Index 2 (Index 2).
  • the autonomous vessel cyber security management system 100 determines the asset importance value as Index 3.
  • the autonomous vessel cyber security management system 100 determines the asset importance value as Index 4.
  • the autonomous vessel cyber security management system 100 determines the corresponding asset importance value as Index 5.
  • FIG. 8 is a diagram showing a threat list according to the present embodiment.
  • the autonomous ship cyber security management system 100 identifies an attacker in a threat list as an outsider (remote), an outsider (radio), an insider (remote), and an insider (crew).
  • the autonomous ship cyber security management system 100 verifies the intent intentionally or unintentionally.
  • the code is assigned T101 and the threat index (TI: Threat Index) is determined to be '5'.
  • the code is assigned T102 and the threat index (TI: Threat Index) is determined to be '4'.
  • the code is assigned T103 and the threat index (TI: Threat Index) is determined to be '4'.
  • the code is assigned T201 and the threat index (TI: Threat Index) is determined to be '4'.
  • the code is assigned T202 and the threat index (TI: Threat Index) is determined to be '4'.
  • the code is assigned T203 and the threat index (TI: Threat Index) is determined to be '4'.
  • the code is assigned T204 and the threat index (TI: Threat Index) is determined to be '2'.
  • the code is assigned T301 and the threat index (TI: Threat Index) is determined to be '5'.
  • the code is assigned T302 and the threat index (TI: Threat Index) is determined to be '5'.
  • the code is assigned T401 and the threat index (TI: Threat Index) is determined to be '4'.
  • the code is assigned T402 and the threat index (TI: Threat Index) is determined to be '5'.
  • TI Threat Index
  • the code is assigned T403 and the threat index (TI: Threat Index) is determined to be '4'.
  • the code is assigned T404 and the threat index (TI: Threat Index) is determined to be '4'.
  • the code is assigned T501 and the threat index (TI: Threat Index) is determined to be '3'.
  • the autonomous ship cyber security management system 100 determines that the threat factor is 'power outage', the code is assigned T51 and the threat index (TI: Threat Index) is determined to be '3'.
  • FIG. 9 is a diagram showing vulnerability scores according to this embodiment.
  • the autonomous ship cyber security management system 100 evaluates each of the router 108, the IT network 120, the OT network 150, and the crew network 130 to extract a plurality of vulnerabilities.
  • the autonomous ship cyber security management system 100 calculates scores according to a plurality of vulnerabilities.
  • the vulnerability score is calculated as '5'.
  • the vulnerability score is calculated as '5'.
  • the vulnerability score is calculated as '4'.
  • the vulnerability score is calculated as '4'.
  • the vulnerability score is calculated as '3'.
  • the vulnerability score is calculated as '3'.
  • the vulnerability score is calculated as '4'.
  • the vulnerability score is calculated as '3'.
  • the vulnerability score is calculated as '4'.
  • the autonomous ship cyber security management system 100 determines that 'file management' is necessary as a vulnerability, it calculates the vulnerability score as '3'.
  • the vulnerability score is calculated as '4'.
  • FIG. 10 is a diagram illustrating an account extortion scenario among risk scenarios according to the present embodiment.
  • Autonomous vessel cyber security management system 100 describes a method for providing scenarios corresponding to account theft by evaluating each of router 108, IT network 120, OT network 150, and crew network 130 .
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'account hijacking' and provides a response scenario when important information is leaked to the outside (competitor/institution) by accessing the system.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'account hijacking' when business (operation) delays occur due to access to the system and change of important information.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'account hijacking' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.
  • the cyber security management system 100 for autonomous ships recognizes the threat factor as 'account hijacking' and provides a response scenario in the event of intentional delay in business (operation) by accessing and changing unauthorized information.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'account hijacking' and provides a response scenario when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'account hijacking' and provides a response scenario when a malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'account takeover' in the event of unauthorized tampering (manipulation) of important systems, business delays/operation interruptions.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'account hijacking' when important information (network/cargo/financial information) is leaked by a hacker.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'account hijacking' and provides a response scenario when system shutdown occurs due to unauthorized person's arbitrary manipulation.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'account hijacking' and provides a response scenario.
  • FIG. 11 is a diagram illustrating a privilege abuse scenario among risk scenarios according to the present embodiment.
  • An autonomous ship cyber security management system (100) describes a method for evaluating each of a router (108), an IT network (120), an OT network (150), and a crewman network (130) to provide a scenario to respond to abuse of authority. .
  • the autonomous ship cyber security management system 100 recognizes that 'abuse of authority' has occurred by recognizing the threat factor as 'internal information leakage' when important information is leaked to the outside (competitor/institution) after accessing the system. do.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'internal information tampering' and recognizes it as 'authority abuse' and provides response scenarios when business (operation) delays occur due to access to the system and change of important information. do.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'destruction of internal information' and recognizes it as 'abuse of authority' to provide response scenarios in the case of stealing important information and malicious behavior by accessing administrator/user rights do.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'disclosure of navigation information' and recognizes it as 'abuse of authority' to provide response scenarios in case of intentional delay in business (flight) due to access to and change of unauthorized information. do.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'falsification of flight information' and recognizes it as 'abuse of authority' when malicious code propagation occurs by connecting to the internal network with an unauthorized terminal, and provides a response scenario.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'destruction of navigation information' and recognizes it as 'abuse of authority' to provide response scenarios in the event of unauthorized modification (manipulation) of important systems, delays/operation interruptions, etc. .
  • the autonomous ship cyber security management system (100) recognizes 'delay/accident' as a threat factor when accessing important information and arbitrary manipulation of the OT network (150) by connecting to the internal network with an unauthorized terminal ' and provides a response scenario.
  • the autonomous ship cyber security management system 100 recognizes 'environmental pollution' as an 'environmental pollution' when important information (network/cargo/financial information) is leaked by a hacker, recognizes the threat factor as 'authority abuse', and provides a response scenario. do.
  • the autonomous ship cyber security management system 100 recognizes a 'life accident' when a system shutdown occurs due to arbitrary manipulation by an unauthorized person, recognizes the threat factor as 'authority abuse', and provides a response scenario.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'authority abuse' and provides a response scenario when a navigation accident occurs due to arbitrary manipulation/modulation of important information of the OT network 150.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'authority abuse' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'authority abuse' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.
  • the autonomous ship cyber security management system 100 When exposure to a zero-day attack occurs, the autonomous ship cyber security management system 100 recognizes the threat factor as 'authority abuse' and provides a response scenario.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'authority abuse' and provides a response scenario when a system failure occurs due to the execution of a patch whose stability has not been verified.
  • FIG. 12 is a diagram illustrating information tampering/altering scenarios among risk scenarios according to the present embodiment.
  • the autonomous vessel cyber security management system 100 accesses the system and changes important information to cause business (operation) delays by accessing the system, recognizing it as 'internal information leakage' and changing the threat factor to 'information falsification/alteration'. Recognize and provide countermeasure scenarios.
  • Autonomous ship cyber security management system 100 recognizes 'internal information tampering' and recognizes the threat as 'information tampering/altering' in the event of stealing important information and malicious behavior by accessing administrator/user privileges, and responding to scenarios provides
  • the cyber security management system 100 for autonomous vessels responds by recognizing the threat as 'information tampering/altering' by recognizing it as 'internal information destruction' in case of intentional delay in business (operation) due to access to and modification of unauthorized information. provide a scenario.
  • the autonomous ship cyber security management system (100) recognizes as 'disclosure of navigation information' and responds by recognizing the threat factor as 'information tampering/altering' when an unauthorized person attempts to log in at random and steals an account and falsification or destruction of important information occurs. provide a scenario.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'falsification/altering of information' when an account is stolen when a hacker infiltrates because the password (PW) is not encrypted and stored. Provide response scenarios.
  • the autonomous ship cyber security management system 100 recognizes 'destruction of navigation information' in the case of unauthorized modification (manipulation) of important systems, and 'destruction of operational information' in case of unauthorized modification (manipulation) of important systems, and recognizes the threat factor as 'information alteration/alteration' to develop a response scenario. to provide.
  • the autonomous ship cyber security management system 100 recognizes 'delay/accident' as a 'delay/accident' and recognizes the threat factor as 'information falsification/alteration' in the event of a system shutdown due to arbitrary manipulation by an unauthorized person, and provides a response scenario.
  • the autonomous vessel cyber security management system 100 recognizes it as 'environmental pollution' and recognizes the threat as 'information alteration/alteration' Provide response scenarios.
  • the autonomous vessel cyber security management system 100 recognizes a threat factor as 'information tampering/altering' in case of delay in business (operation) due to access to the system and changes in important information, and responds to scenarios. to provide.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'information falsification/change' when vulnerability to cyber attacks occurs due to missing security patches.
  • FIG. 13 is a diagram illustrating an information leakage scenario among risk scenarios according to the present embodiment.
  • Autonomous vessel cyber security management system 100 describes a method for providing a scenario corresponding to an information leakage scenario by evaluating each of the router 108, the IT network 120, the OT network 150, and the crew network 130 do.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'information leakage' when important information is leaked to the outside (competitor/institution) by accessing the system.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'information leakage' when important information stealing or malicious behavior occurs by accessing administrator/user rights.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'information leakage' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'information leak' and provides a response scenario.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'information leakage' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.
  • the autonomous ship cyber security management system 100 When exposure to a zero-day attack occurs, the autonomous ship cyber security management system 100 recognizes the threat factor as 'information leakage' and provides a response scenario.
  • FIG. 14 is a diagram illustrating an unauthorized person access scenario among risk scenarios according to the present embodiment.
  • the autonomous ship cyber security management system 100 evaluates each router 108, IT network 120, OT network 150, and crew network 130 to provide a scenario corresponding to an unauthorized access scenario.
  • each router 108, IT network 120, OT network 150, and crew network 130 evaluates each router 108, IT network 120, OT network 150, and crew network 130 to provide a scenario corresponding to an unauthorized access scenario.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized access' when important information is leaked to the outside (competitor/institution) by accessing the system.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized access' when business (operation) delays occur due to access to the system and change of important information.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized access' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized person access' when intentional business (operation) delay occurs due to access to and change of unauthorized information.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'unauthorized access' and provides a response scenario when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'unauthorized access' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'unauthorized access' and provides a response scenario when malicious code propagation occurs by connecting to the internal network with an unauthorized terminal.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized access' in case of unauthorized modification (manipulation) of important systems, delay / operation interruption.
  • Autonomous ship cyber security management system 100 recognizes the threat factor as 'unauthorized access' and provides a response scenario when access to important information and arbitrary manipulation of the OT network 150 occurs by connecting to the internal network with an unauthorized terminal do.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'unauthorized access' and provides a response scenario when system interruption occurs due to removal/change of the LAN port.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'access by an unauthorized person' when system shutdown occurs due to arbitrary manipulation by an unauthorized person.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'unauthorized access' and provides a response scenario.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized access' when infection and propagation of malicious code/ransomware occurs.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized access' when business (operation) delays occur due to access to the system and change of important information.
  • 15 is a diagram illustrating an unauthorized USB use scenario among risk scenarios according to the present embodiment.
  • the autonomous ship cyber security management system 100 evaluates each router 108, IT network 120, OT network 150, and crew network 130 to provide a scenario corresponding to an unauthorized USB usage scenario.
  • each router 108, IT network 120, OT network 150, and crew network 130 evaluates each router 108, IT network 120, OT network 150, and crew network 130 to provide a scenario corresponding to an unauthorized USB usage scenario.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized USB use' when important information is leaked to the outside (competitor/institution) by accessing the system.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized USB use' when intentional business (operation) delay occurs due to access to and change of unauthorized information.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized USB use' when infection and propagation of malicious code/ransomware occurs.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized USB use' when a malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'unauthorized USB use' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal do.
  • 16 is a diagram illustrating an illegal SW installation scenario among risk scenarios according to the present embodiment.
  • the autonomous ship cyber security management system 100 evaluates each of the router 108, the IT network 120, the OT network 150, and the crew network 130 to provide a scenario corresponding to an illegal SW installation scenario.
  • the autonomous ship cyber security management system 100 evaluates each of the router 108, the IT network 120, the OT network 150, and the crew network 130 to provide a scenario corresponding to an illegal SW installation scenario.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'illegal SW installation' when important information stealing or malicious behavior occurs by accessing administrator/user rights.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when a deliberate business (operation) delay occurs due to access to and change of unauthorized information.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when a malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario in the case of unauthorized modification (manipulation) of important systems, delay / operation interruption.
  • Autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides response scenarios when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal do.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when infection and propagation of malicious code/ransomware occurs.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'illegal SW installation' when a business delay occurs due to system overload.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.
  • the autonomous vessel cyber security management system 100 When exposure to a zero-day attack occurs, the autonomous vessel cyber security management system 100 recognizes the threat factor as 'illegal software installation' and provides a response scenario.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when a system failure occurs due to the execution of a patch whose stability has not been verified.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when vulnerability to cyber attacks occurs due to missing security patches.
  • 17 is a diagram showing a DDOS scenario among risk scenarios according to the present embodiment.
  • Autonomous ship cyber security management system 100 describes a method of providing a scenario corresponding to a DDOS scenario by evaluating each of a router 108, an IT network 120, an OT network 150, and a crewman network 130 .
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'DDOS' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when infection and propagation of malicious code/ransomware occurs.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario in case of unauthorized modification (manipulation) of important systems, delay / operation interruption.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when system shutdown occurs due to unauthorized manipulation.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when business delay occurs due to excessive traffic.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when a business delay occurs due to system overload.
  • FIG. 18 is a diagram illustrating an unauthorized terminal scenario among risk scenarios according to the present embodiment.
  • Autonomous ship cyber security management system 100 describes a method of providing a scenario corresponding to an unauthorized terminal scenario by evaluating each of a router 108, an IT network 120, an OT network 150, and a crew member network 130 do.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as an 'unauthorized terminal' and provides a response scenario when important information is leaked to the outside (competitor/institution) by accessing the system.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when a business (operation) delay occurs due to access to the system and change of important information.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when important information stealing or malicious behavior occurs by accessing administrator/user rights.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when a deliberate business (operation) delay occurs due to access to and change of unauthorized information.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as an 'unauthorized terminal' and provides a response scenario when an account theft occurs when a hacker invades because the password (PW) is not encrypted.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as an 'unauthorized terminal' and provides a response scenario when malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as an 'unauthorized terminal' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal .
  • the autonomous ship cyber security management system 100 recognizes the threat factor as an 'unauthorized terminal' and provides a response scenario when system interruption occurs due to removal/change of the LAN port.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when system shutdown occurs due to arbitrary manipulation by an unauthorized person.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when a business delay occurs due to system overload.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when exposure to intrusion through a port of a vulnerable service occurs.
  • 19 is a diagram showing a malicious code scenario among risk scenarios according to the present embodiment.
  • Autonomous ship cyber security management system 100 describes a method of providing a scenario corresponding to a malicious code scenario by evaluating each of the router 108, the IT network 120, the OT network 150, and the crew network 130 do.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when important information is leaked to the outside (competitor/institution) by accessing the system.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'malicious code' when important information stealing or malicious behavior occurs by accessing administrator/user rights.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when a deliberate business (operation) delay occurs by accessing and changing unauthorized information.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when infection and propagation of malicious code/ransomware occurs.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal .
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when system shutdown occurs due to unauthorized manipulation.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when a business delay occurs due to excessive traffic.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when a business delay occurs due to system overload.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.
  • 20 is a diagram illustrating a malicious action scenario among risk scenarios according to the present embodiment.
  • the autonomous ship cyber security management system (100) evaluates each of the router (108), IT network (120), OT network (150), and crew network (130) to provide a scenario for responding to malicious behavior scenarios.
  • the autonomous ship cyber security management system (100) evaluates each of the router (108), IT network (120), OT network (150), and crew network (130) to provide a scenario for responding to malicious behavior scenarios.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'malicious act' when accessing the system and leaking important information to the outside (competitor/institution).
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'malicious act' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'malicious behavior' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'malicious act' in case of intentional delay in business (operation) by accessing and changing unauthorized information.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'malicious act' and provides a response scenario when an unauthorized person randomly attempts to log in and steals an account and falsification or destruction of important information occurs.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'malicious act' and provides a response scenario when malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'malicious act' in case of unauthorized modification (manipulation) of important systems, business delays/operation interruptions.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious behavior' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal do.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'malicious act' and provides a response scenario when system interruption occurs due to removal/change of the LAN port.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'malicious act' and provides a response scenario when system shutdown occurs due to unauthorized manipulation.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'malicious act' when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.
  • 21 is a diagram illustrating a personal information abuse scenario among risk scenarios according to the present embodiment.
  • the autonomous vessel cyber security management system 100 evaluates each of the router 108, the IT network 120, the OT network 150, and the crew network 130 to provide a scenario corresponding to a personal information abuse scenario.
  • the autonomous vessel cyber security management system 100 evaluates each of the router 108, the IT network 120, the OT network 150, and the crew network 130 to provide a scenario corresponding to a personal information abuse scenario.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'abuse of personal information' and provides a response scenario when important information is leaked to the outside (competitor/institution) by accessing the system.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'abuse of personal information' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'personal information abuse' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'abuse of personal information' and provides a response scenario when intentional business (operation) delay occurs due to access to and change of unauthorized information.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'abuse of personal information' and provides a response scenario when an unauthorized person randomly attempts to log in and steals an account and falsification or destruction of important information occurs.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'abuse of personal information' and provides a response scenario.
  • 22 is a diagram illustrating a denial of infringement scenario among risk scenarios according to the present embodiment.
  • Autonomous ship cyber security management system 100 describes a method for providing a scenario corresponding to a denial of infringement scenario by evaluating each of a router 108, an IT network 120, an OT network 150, and a crewman network 130 do.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'denial of infringement' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'infringement denial' when intentional business (operation) delay occurs due to access to and change of unauthorized information.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'denial of infringement' and provides a response scenario when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'infringement denial' and provides a response scenario when account hijacking occurs when a hacker infiltrates because the password (PW) is not encrypted.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'infringement denial' and provides a response scenario when malicious code propagation occurs by connecting to the internal network with an unauthorized terminal.
  • the autonomous vessel cyber security management system (100) provides a response scenario by recognizing the threat factor as 'infringement denial' in case of unauthorized modification (manipulation) of important systems, business delays/operation interruptions.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'denial of infringement' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal .
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'denial of infringement' and provides a response scenario.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'infringement denial' when system shutdown occurs due to unauthorized manipulation.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'infringement denial' when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'denial of infringement' when infection and propagation of malicious code/ransomware occurs.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'infringement denial' when business (operation) delays occur due to access to the system and change of important information.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'infringement denial' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.
  • FIG. 23 is a diagram illustrating an operation mistake scenario among risk scenarios according to the present embodiment.
  • Autonomous vessel cyber security management system (100) describes a method for evaluating each router (108), IT network (120), OT network (150), and crew network (130) to provide scenarios corresponding to operational error scenarios do.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when important information is leaked to the outside (competitor/institution) by accessing the system.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when a business (operation) delay occurs due to access to the system and change of important information.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when a deliberate business (operation) delay occurs due to accessing and changing unauthorized information.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when infection and propagation of malicious code/ransomware occurs.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as an 'operation mistake' and provides a response scenario when malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' in the event of an unauthorized modification (manipulation) of important systems, delay / operation interruption.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario when access to important information and arbitrary manipulation of the OT network 150 occur by connecting to the internal network with an unauthorized terminal .
  • the autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when a system shutdown occurs due to an unauthorized person's arbitrary manipulation.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when business delay occurs due to excessive traffic.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when infection and propagation of malicious code/ransomware occurs.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when a business (operation) delay occurs due to access to the system and change of important information.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when a business delay occurs due to system overload.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when exposure to intrusion through a port of a vulnerable service occurs.
  • the autonomous ship cyber security management system 100 When exposure to a zero-day attack occurs, the autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario when a system failure occurs due to the execution of a patch whose stability has not been verified.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when vulnerability to cyber attacks occurs due to missing security patches.
  • 24 is a diagram illustrating a hardware failure scenario among risk scenarios according to the present embodiment.
  • Autonomous ship cyber security management system 100 describes a method for evaluating each router 108, IT network 120, OT network 150, and crew network 130 to provide a scenario corresponding to a hardware fault scenario do.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'hardware defect' when important information is leaked to the outside (competitor/institution) by accessing the system.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'hardware defect' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when a deliberate delay in business (operation) occurs due to access to and change of unauthorized information.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when an unauthorized person randomly attempts to log in and steals an account and falsification or destruction of important information occurs.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when infection and propagation of malicious code/ransomware occurs.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.
  • the autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'hardware defect' in the event of an unauthorized modification (manipulation) of an important system, a delay / operation interruption.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal .
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when system interruption occurs due to removal/change of the LAN port.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when a system shutdown occurs due to an unauthorized person's arbitrary manipulation.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when business delay occurs due to excessive traffic.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'hardware defect' when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when infection and propagation of malicious code/ransomware occurs.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when a business delay occurs due to system overload.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.
  • the autonomous vessel cyber security management system 100 When exposure to a zero-day attack occurs, the autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when a system failure occurs due to the execution of a patch whose stability has not been verified.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when vulnerability to cyber attacks occurs due to missing security patches.
  • 25 is a diagram illustrating a power outage scenario among risk scenarios according to the present embodiment.
  • the autonomous ship cyber security management system 100 describes a method for evaluating each of the router 108, the IT network 120, the OT network 150, and the crew network 130 to provide a scenario corresponding to a power outage scenario. .
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'power outage' when important information is leaked to the outside (competitor/institution) by accessing the system.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.
  • the autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'power outage' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a deliberate business (operation) delay occurs due to access to and change of unauthorized information.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when infection and propagation of malicious code/ransomware occurs.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario in case of unauthorized modification (manipulation) of important systems, delay / operation interruption.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a system interruption occurs due to the removal/change of the LAN port.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a system shutdown occurs due to unauthorized manipulation.
  • the autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when business delay occurs due to excessive traffic.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a business delay occurs due to system overload.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.
  • the autonomous ship cyber security management system 100 When exposure to a zero-day attack occurs, the autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a system failure occurs due to the execution of a patch whose stability has not been verified.
  • the autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when vulnerability to cyber attacks occurs due to missing security patches.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Technology Law (AREA)

Abstract

A cyber security management system for a maritime autonomous surface ship is disclosed. Provided in the present embodiment is a cyber security management system for a maritime autonomous surface ship, the system managing cyber security for a maritime autonomous surface ship by protecting both information technology (IT) and operational technology (OT) systems of a maritime autonomous surface ship, and by simplifying on-board work while complying with maritime security regulations so as to prevent cyberattacks from spreading.

Description

자율 운항 선박의 사이버 보안 관리 시스템Cyber Security Management System for Autonomous Ships

본 발명의 일 실시예는 자율 운항 선박의 사이버 보안 관리 시스템에 관한 것이다.One embodiment of the present invention relates to a cyber security management system for an autonomous vessel.

이하에 기술되는 내용은 단순히 본 실시예와 관련되는 배경 정보만을 제공할 뿐 종래기술을 구성하는 것이 아니다.The contents described below merely provide background information related to the present embodiment and do not constitute prior art.

현재의 선박 대부분은 통신환경의 제한과 사이버 보안 관리의 부재 때문에 기본적인 최신보안 패치 등이 제공되지 않으며, 백신 또한 관리되고 있지 않다.Most of the current ships are not provided with the latest basic security patches due to the limitations of the communication environment and the absence of cyber security management, and vaccines are also not managed.

네트워크 환경이 개선되고 있는 최신 디지털(스마트)선박 및 자율운항 선박은 빨리진 위성 통신(VSAT)을 통하여 항시 육상과 연결되어 있다. 하지만, 빨라진 통신환경에 비하여 사이버 보안은 예전과 동일하게 미비한 수준이다. 일부 사이버 보안 시스템의 경우, IT 영역에서의 백신 및 방화벽의 기능만을 지원한다.The latest digital (smart) ships and autonomous ships, whose network environment is being improved, are always connected to the land through fast satellite communication (VSAT). However, compared to the faster communication environment, cyber security is still at the same insufficient level as before. Some cyber security systems only support vaccine and firewall functions in the IT area.

일반적인 선박 사이버 보안 관리 시스템은 디지털쉽(스마트쉽)과 자율운항시스템의 기본적인 네트워크 구조를 갖는다. 일반적인 선박 사이버 보안 관리 시스템은 허브 스위치를 이용하여 논리적 망 구성을 설정한다. IT 네트워크에서 발생한 사이버 공격이 자율운항 시스템 및 OT 네트워크로 쉽게 전파가 되는 구조를 갖는다. 일반적인 선박 사이버 보안 관리 시스템은 직접적인 장애가 발생하기 전까지는 OT 시스템의 이상 유무를 확인하기 어렵다.A general ship cyber security management system has a basic network structure of a digital ship (smart ship) and an autonomous navigation system. A general ship cyber security management system sets up a logical network configuration using a hub switch. It has a structure in which cyber attacks generated in IT networks can easily propagate to autonomous navigation systems and OT networks. In the general ship cyber security management system, it is difficult to check whether the OT system is abnormal until a direct failure occurs.

종래의 시스템은 외부로부터의 침입과 IT 네트워크 영역에서만 보안이 통제되었으나, 자율운항 시스템과 같은 고도화되는 시스템에서 OT 네트워크에 대한 관리 및 통제가 필요하다.In the conventional system, security is controlled only in the IT network area and intrusion from the outside, but management and control of the OT network are required in an advanced system such as an autonomous navigation system.

본 실시예는 자율 운항 선박에 대한 사이버 보안을 관리하기 위해, 자율 운항 선박의 IT(Information Technology) 네트워크와 OT(Operational Technology) 네트워크를 통합하여 모니터링하다가 사이버 공격이 발생한 경우 IT 네트워크와 OT 네트워크를 모두 보호하고, 사이버 공격이 확산되지 않도록 해상 보안 규제를 준수한 상태에서 선내 업무를 간소화하는 자율 운항 선박의 사이버 보안 관리 시스템을 제공하는 데 목적이 있다.This embodiment integrates and monitors the IT (Information Technology) network and the OT (Operational Technology) network of the autonomous ship in order to manage the cyber security of the autonomous ship, and when a cyber attack occurs, both the IT network and the OT network are monitored. It aims to provide a cyber security management system for autonomous vessels that protects and simplifies onboard operations while complying with maritime security regulations to prevent cyber attacks from spreading.

본 실시예의 일 측면에 의하면, 자율운항 선박 내의 복수의 네트워크에 대한 송수신 데이터를 수집하여 수집 데이터를 생성하는 데이터 수집부; 상기 수집 데이터를 분석하여 상기 복수의 네트워크 중 하나 이상의 네트워크에 대한 사이버 공격 또는 비정상 트래픽이 감지되는 지의 여부를 확인하는 사이버 공격 확인부; 및 상기 복수의 네트워크 중 상기 사이버 공격 또는 상기 비정상 트래픽이 감지된 네트워크를 차단하는 사이버 공격 차단부;를 포함하는 것을 특징으로 하는 사이버 보안 관리장치를 제공한다.According to one aspect of this embodiment, the data collection unit for generating collected data by collecting transmission and reception data for a plurality of networks in the autonomous vessel; a cyber attack identification unit that analyzes the collected data and checks whether a cyber attack or abnormal traffic to one or more networks among the plurality of networks is detected; and a cyber attack blocking unit blocking the cyber attack or the network in which the abnormal traffic is detected among the plurality of networks.

이상에서 설명한 바와 같이 본 실시예에 의하면, 자율 운항 선박에 대한 사이버 보안을 관리하기 위해, 자율 운항 선박의 IT(Information Technology) 네트워크와 OT(Operational Technology) 네트워크를 통합하여 모니터링하다가 사이버 공격이 발생한 경우 IT 네트워크와 OT 네트워크를 모두 보호하고, 사이버 공격이 확산되지 않도록 해상 보안 규제를 준수한 상태에서 선내 업무를 간소화하는 효과가 있다.As described above, according to the present embodiment, in order to manage the cyber security of the autonomous ship, when a cyber attack occurs while integrating and monitoring the IT (Information Technology) network and the OT (Operational Technology) network of the autonomous ship It protects both IT and OT networks and has the effect of simplifying onboard operations while complying with maritime security regulations to prevent the spread of cyber attacks.

본 실시예에 의하면, OT(Operational Technology) 네트워크 감시하고 분석하여 IT(Information Technology)와 OT(Operational Technology)간 사이버 공격 확산을 차단하는 효과가 있다.According to this embodiment, there is an effect of blocking the spread of cyberattacks between IT (Information Technology) and OT (Operational Technology) by monitoring and analyzing the OT (Operational Technology) network.

도 1은 본 실시예에 따른 자율운항 선박 사이버 보안 관리 시스템을 개략적으로 나타낸 블럭 구성도이다.1 is a block diagram schematically illustrating an autonomous ship cyber security management system according to an embodiment.

도 2는 본 실시예에 따른 자율운항 선박 사이버 보안 관리장치를 개략적으로 나타낸 블럭 구성도이다.2 is a block diagram schematically showing an apparatus for managing cyber security for an autonomous vessel according to the present embodiment.

도 3은 본 실시예에 따른 사이버 보안 관리 시스템의 기능을 나타낸 도면이다.3 is a diagram showing the functions of the cyber security management system according to the present embodiment.

도 4는 본 실시예에 따른 사이버 보안 관리 시스템의 구성을 나타낸 도면이다.4 is a diagram showing the configuration of a cyber security management system according to this embodiment.

도 5는 본 실시예에 따른 위험도 평가 매트릭스를 나타낸 도면이다.5 is a diagram showing a risk evaluation matrix according to the present embodiment.

도 6a, 6b, 6c는 본 실시예에 따른 임팩트(중요도) 인덱스를 나타낸 도면이다.6a, 6b, and 6c are diagrams illustrating impact (importance) indexes according to the present embodiment.

도 7a, 7b는 본 실시예에 따른 확률 인덱스를 나타낸 도면이다.7a and 7b are diagrams showing probability indexes according to this embodiment.

도 8은 본 실시예에 따른 위협 리스트를 나타낸 도면이다.8 is a diagram showing a threat list according to the present embodiment.

도 9는 본 실시예에 따른 취약점 점수를 나타낸 도면이다.9 is a diagram showing vulnerability scores according to this embodiment.

도 10은 본 실시예에 따른 위험도 시나리오 중 계정 탈취 시나리오를 나타낸 도면이다.10 is a diagram illustrating an account extortion scenario among risk scenarios according to the present embodiment.

도 11은 본 실시예에 따른 위험도 시나리오 중 권한 남용 시나리오를 나타낸 도면이다.11 is a diagram illustrating a privilege abuse scenario among risk scenarios according to the present embodiment.

도 12는 본 실시예에 따른 위험도 시나리오 중 정보 변조/변경 시나리오를 나타낸 도면이다.12 is a diagram illustrating information tampering/altering scenarios among risk scenarios according to the present embodiment.

도 13은 본 실시예에 따른 위험도 시나리오 중 정보 유출 시나리오를 나타낸 도면이다.13 is a diagram illustrating an information leakage scenario among risk scenarios according to the present embodiment.

도 14는 본 실시예에 따른 위험도 시나리오 중 비인가자 접근 시나리오를 나타낸 도면이다.14 is a diagram illustrating an unauthorized person access scenario among risk scenarios according to the present embodiment.

도 15는 본 실시예에 따른 위험도 시나리오 중 비인가 USB 사용 시나리오를 나타낸 도면이다.15 is a diagram illustrating an unauthorized USB use scenario among risk scenarios according to the present embodiment.

도 16은 본 실시예에 따른 위험도 시나리오 중 불법 SW 설치 시나리오를 나타낸 도면이다.16 is a diagram illustrating an illegal SW installation scenario among risk scenarios according to the present embodiment.

도 17은 본 실시예에 따른 위험도 시나리오 중 DDOS 시나리오를 나타낸 도면이다.17 is a diagram showing a DDOS scenario among risk scenarios according to the present embodiment.

도 18은 본 실시예에 따른 위험도 시나리오 중 비인가 단말기 시나리오를 나타낸 도면이다.18 is a diagram illustrating an unauthorized terminal scenario among risk scenarios according to the present embodiment.

도 19는 본 실시예에 따른 위험도 시나리오 중 악성코드 시나리오를 나타낸 도면이다.19 is a diagram showing a malicious code scenario among risk scenarios according to the present embodiment.

도 20은 본 실시예에 따른 위험도 시나리오 중 악의적인 행위 시나리오를 나타낸 도면이다.20 is a diagram illustrating a malicious action scenario among risk scenarios according to the present embodiment.

도 21은 본 실시예에 따른 위험도 시나리오 중 개인정보 악용 시나리오를 나타낸 도면이다.21 is a diagram illustrating a personal information abuse scenario among risk scenarios according to the present embodiment.

도 22는 본 실시예에 따른 위험도 시나리오 중 침해부인 시나리오를 나타낸 도면이다.22 is a diagram illustrating a denial of infringement scenario among risk scenarios according to the present embodiment.

도 23은 본 실시예에 따른 위험도 시나리오 중 운영 실수 시나리오를 나타낸 도면이다.23 is a diagram illustrating an operation mistake scenario among risk scenarios according to the present embodiment.

도 24는 본 실시예에 따른 위험도 시나리오 중 하드웨어 결함 시나리오를 나타낸 도면이다.24 is a diagram illustrating a hardware failure scenario among risk scenarios according to the present embodiment.

도 25는 본 실시예에 따른 위험도 시나리오 중 정전 시나리오를 나타낸 도면이다.25 is a diagram illustrating a power outage scenario among risk scenarios according to the present embodiment.

이하, 본 실시예를 첨부된 도면을 참조하여 상세하게 설명한다.Hereinafter, this embodiment will be described in detail with reference to the accompanying drawings.

도 1은 본 실시예에 따른 자율운항 선박 사이버 보안 관리 시스템을 개략적으로 나타낸 블럭 구성도이다.1 is a block diagram schematically illustrating an autonomous ship cyber security management system according to an embodiment.

본 실시예에 따른 자율운항 선박 사이버 보안 관리 시스템(100)은 선박 내에 탑재된다. The autonomous ship cyber security management system 100 according to this embodiment is mounted in a ship.

자율운항 선박 사이버 보안 관리 시스템(100)은 자율운항 선박에 대응하는 규제에 따라 사이버 보안을 평가 또는 관리하는 시스템을 의미한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 IT 네트워크(120), OT 네트워크(150) 뿐만 아니라 승무원 네트워크(130)에 대한 사이버 보안을 관리한다.The autonomous ship cyber security management system 100 refers to a system for evaluating or managing cyber security according to regulations corresponding to autonomous ships. The autonomous ship cyber security management system 100 manages cyber security for the IT network 120 and the OT network 150 as well as the crew network 130 .

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130)에 대한 사이버 보안에 대한 위험도를 평가한 사이버 보안 평가 결과를 생성한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 사이버 보안 평가 결과를 기반으로 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130)의 보안을 관리한다.The autonomous vessel cyber security management system 100 generates a cyber security evaluation result that evaluates the cyber security risk for the router 108, the IT network 120, the OT network 150, and the crew network 130 . The autonomous ship cyber security management system 100 manages the security of the router 108, the IT network 120, the OT network 150, and the crew network 130 based on the cyber security evaluation result.

자율운항 선박 사이버 보안 관리 시스템(100)은 선박이라는 특수한 환경에 적용되어 위성 통신을 수행하거나, 추가적인 기술지원을 받지 못하는 상황, 여러가지 악조건에 대해 대응할 수 있는 솔루션을 제공한다.The autonomous ship cyber security management system 100 is applied to a special environment of a ship to provide a solution capable of performing satellite communication, responding to situations in which additional technical support is not received, and various adverse conditions.

자율운항 선박 사이버 보안 관리 시스템(100)은 AI 또는 클라우드 빅데이터와 접목하여 자율운항 선박에 대한 사이버 공격(위협)을 AI를 이용하여 미리 예측한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 자율운항 선박에 대한 사이버 공격(위협)을 클라우드 빅데이터를 이용하여 분석한다.The autonomous ship cyber security management system 100 predicts cyber attacks (threats) on autonomous ships in advance using AI by combining AI or cloud big data. The autonomous ship cyber security management system 100 analyzes cyber attacks (threats) on autonomous ships using cloud big data.

자율운항 선박 사이버 보안 관리 시스템(100)은 사이버 보안에 대한 위험도를 평가할 때, 위험도 평가 시 경우의 수가 많으므로, 제약 상황에 따라 선택할 수 있는 위험도 시나리오를 제공한다. 예컨대, 자율운항 선박 사이버 보안 관리 시스템(100)은 악성 코드가 특정 정보를 파괴한 결과를 기반으로 원인이 외부자 침투 또는 내부자 이메일인지의 여부를 확인하는 방식으로 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides risk scenarios that can be selected according to constraints, since there are many cases when evaluating risks for cyber security. For example, the autonomous ship cyber security management system 100 provides a scenario in a manner of confirming whether the cause is infiltration by an outsider or email by an insider based on a result of a malicious code destroying specific information.

자율운항 선박 사이버 보안 관리 시스템(100)은 자율운항 선박에 사이버 공격이 발생한 경우, 위험도 시나리오를 제공하여 선박을 운항 중인 선장 또는 승무원이 선박에 해당되는 위험 시나리오를 선택할 수 있도록 한다.The autonomous ship cyber security management system 100 provides a risk scenario when a cyber attack occurs on an autonomous ship, so that a captain or crew member operating the ship can select a risk scenario corresponding to the ship.

자율운항 선박 사이버 보안 관리 시스템(100)은 자율운항시스템 스스로 항해시스템을 제어하기도 하며, 육상에서 원격으로 선박을 제어하고 모니터링한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 육상과 선박이 항시 연결되는 상태이므로 사이버 위협에 노출되어 있다.The autonomous ship cyber security management system 100 controls the navigation system by itself, and controls and monitors the ship remotely from land. The autonomous ship cyber security management system 100 is exposed to cyber threats because the land and the ship are constantly connected.

자율운항 선박 사이버 보안 관리 시스템(100)은 IT 네트워크(120), 승무원 네트워크(130), OT 네트워크(150)를 모니터링 및 통제한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 IT 네트워크(120), 승무원 네트워크(130), OT 네트워크(150)에서 개별 사이버 공격 발생시, 네트워크 간의 사이버 공격 전파를 차단하여, 사이버 공격으로 인한 운항 사고를 방지한다.The autonomous ship cyber security management system 100 monitors and controls an IT network 120 , a crewman network 130 , and an OT network 150 . The autonomous vessel cyber security management system (100) blocks the propagation of cyber attacks between networks when individual cyber attacks occur in the IT network (120), the crew network (130), and the OT network (150), thereby preventing navigation accidents caused by cyber attacks. prevent.

자율운항 선박 사이버 보안 관리 시스템(100)은 선박 내부 IT 네트워크(120)와 OT 네트워크(150)를 통합하여 관리한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 IT 네트워크(120)에 에이전트 프로그램 설치하고, OT 네트워크(150)에 트래픽 감지 센서를 설치하여 선박에서 발생하는 모든 네트워크 트래픽을 수집한 후 감시한다.The autonomous vessel cyber security management system 100 integrates and manages the vessel's internal IT network 120 and the OT network 150. The autonomous vessel cyber security management system 100 installs an agent program in the IT network 120 and installs a traffic detection sensor in the OT network 150 to collect and monitor all network traffic generated in the vessel.

본 실시예에 따른 자율운항 선박 사이버 보안 관리 시스템은 사이버 보안 관리장치(110), IT 네트워크(120), 승무원 네트워크(130), 자율 운항 장치(140), OT 네트워크(150)를 포함한다.The autonomous vessel cyber security management system according to this embodiment includes a cyber security management device 110, an IT network 120, a crew member network 130, an autonomous navigation device 140, and an OT network 150.

사이버 보안 관리장치(110)는 라우터(Router)를 경유하여 위성과 통신하는 VSAT(Very Small Aperture Terminal)와 통신을 수행한다. 사이버 보안 관리장치(110)는 VSAT와의 통신 중에 사이버 공격이 발생하는 지의 여부를 확인한다. 사이버 보안 관리장치(110)는 라우터를 경유하여 기지국과 LTE(Long-Term Evolution), 5G로 통신을 수행한다. 사이버 보안 관리장치(110)는 기지국과의 통신 중에 사이버 공격이 발생하는 지의 여부를 확인한다.The cyber security management device 110 communicates with a Very Small Aperture Terminal (VSAT) that communicates with a satellite via a router. The cyber security management device 110 checks whether a cyber attack occurs during communication with the VSAT. The cyber security management device 110 communicates with a base station via a router via Long-Term Evolution (LTE) and 5G. The cyber security management device 110 checks whether a cyber attack occurs during communication with the base station.

사이버 보안 관리장치(110)는 방화벽(Firewall)/IPS(Intrusion Preventing System)를 경유하여 라우터와 통신을 수행한다. 사이버 보안 관리장치(110)는 L3 스위치를 경유하여 IT 네트워크(120)와 통신을 수행한다. 사이버 보안 관리장치(110)는 IT 네트워크(120)와의 통신 중에 사이버 공격이 발생하는 지의 여부를 확인한다.The cyber security management device 110 communicates with a router via a firewall/Intrusion Preventing System (IPS). The cyber security management device 110 communicates with the IT network 120 via the L3 switch. The cyber security management device 110 checks whether a cyber attack occurs during communication with the IT network 120 .

사이버 보안 관리장치(110)는 L3 스위치를 경유하여 승무원 네트워크(130)와 통신을 수행한다. 사이버 보안 관리장치(110)는 승무원 네트워크(130)와의 통신 중에 사이버 공격이 발생하는 지의 여부를 확인한다. 사이버 보안 관리장치(110)는 L3 스위치를 경유하여 자율 운항 장치(140)와 통신을 수행한다. 사이버 보안 관리장치(110)는 자율 운항 장치(140)와의 통신 중에 사이버 공격이 발생하는 지의 여부를 확인한다.The cyber security management device 110 communicates with the crew member network 130 via the L3 switch. The cyber security management device 110 checks whether a cyber attack occurs during communication with the flight attendant network 130 . The cyber security management device 110 communicates with the autonomous navigation device 140 via the L3 switch. The cyber security management device 110 checks whether a cyber attack occurs during communication with the autonomous navigation device 140 .

사이버 보안 관리장치(110)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각에 대한 선박 사이버 보안 관리를 위한 통합 시스템을 제공한다. 사이버 보안 관리장치(110)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130)에 대한 통합 네트워크 모니터링을 수행하여 상호 간의 피해 확산을 차단한다.The cyber security management device 110 provides an integrated system for ship cyber security management for each of the router 108, the IT network 120, the OT network 150, and the crew network 130. The cyber security management device 110 performs integrated network monitoring on the router 108, the IT network 120, the OT network 150, and the crew network 130 to prevent mutual damage from spreading.

IT 네트워크(120)는 선박 내부에 구비된 업무용 PC 및 업무용 서버와 연결되어 데이터를 송수신할 수 있는 망을 의미한다. IT 네트워크(120)는 엔드포인트 에이전트를 설치하여 개별 PC를 통제 및 관리한다. 승무원 네트워크(130)는 선박 내부에 구비된 무선 AP, 승무원 단말기와 연결되어 데이터를 송수신할 수 있는 망을 의미한다. The IT network 120 refers to a network capable of transmitting and receiving data by being connected to a business PC and a business server provided inside the ship. The IT network 120 installs an endpoint agent to control and manage individual PCs. The crew network 130 refers to a network capable of transmitting and receiving data by being connected to a wireless AP and a crew terminal provided inside the ship.

OT(Operational Technology) 네트워크(150)는 선박 내부에 구비된 모니터링(Monitoring) 장치, 네비게이션(Navigation) 장치, 제어(Control) 장치를 연결하여 데이터를 송수신할 수 있는 망을 의미한다. OT 네트워크(150)에 에이전트 설치가 불가능하기 때문에, 사이버 보안 관리장치(110)는 머신 러닝으로 OT 네트워크(150)에 대한 비정상 트래픽을 식별한다.An Operational Technology (OT) network 150 refers to a network capable of transmitting and receiving data by connecting a monitoring device, a navigation device, and a control device provided inside a ship. Since it is impossible to install an agent on the OT network 150, the cyber security management device 110 identifies abnormal traffic on the OT network 150 through machine learning.

자율 운항 장치(140)는 OT 네트워크(150)를 이용하여 자율 운항을 위한 모니터링(Monitoring) 장치, 네비게이션(Navigation) 장치, 제어(Control) 장치와 연동한다.The autonomous navigation device 140 uses the OT network 150 to interwork with a monitoring device, a navigation device, and a control device for autonomous navigation.

도 2는 본 실시예에 따른 자율운항 선박 사이버 보안 관리장치를 개략적으로 나타낸 블럭 구성도이다.2 is a block diagram schematically showing an apparatus for managing cyber security for an autonomous vessel according to the present embodiment.

본 실시예에 따른 사이버 보안 관리장치(110)는 수집부(210), 사이버 공격 확인부(220), 위험도 평가부(230), 사이버 공격 차단부(240), 시나리오 제공부(250)를 포함한다. 사이버 보안 관리장치(110)에 포함된 구성요소는 반드시 이에 한정되는 것은 아니다.The cyber security management device 110 according to this embodiment includes a collection unit 210, a cyber attack confirmation unit 220, a risk evaluation unit 230, a cyber attack blocking unit 240, and a scenario providing unit 250. do. Components included in the cyber security management device 110 are not necessarily limited thereto.

사이버 보안 관리장치(110)에 포함된 각 구성요소는 장치 내부의 소프트웨어적인 모듈 또는 하드웨어적인 모듈을 연결하는 통신 경로에 연결되어 상호 간에 유기적으로 동작할 수 있다. 이러한 구성요소는 하나 이상의 통신 버스 또는 신호선을 이용하여 통신한다.Each component included in the cyber security management device 110 is connected to a communication path that connects software modules or hardware modules inside the device and can operate organically with each other. These components communicate using one or more communication buses or signal lines.

도 2에 도시된 사이버 보안 관리장치(110)의 각 구성요소는 적어도 하나의 기능이나 동작을 처리하는 단위를 의미하며, 소프트웨어적인 모듈, 하드웨어적인 모듈 또는 소프트웨어와 하드웨어의 결합으로 구현될 수 있다.Each component of the cyber security management device 110 shown in FIG. 2 means a unit that processes at least one function or operation, and may be implemented as a software module, a hardware module, or a combination of software and hardware.

데이터 수집부(210)는 자율운항 선박 내의 복수의 네트워크(라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130))에 대한 송수신 데이터를 수집하여 수집 데이터를 생성한다.The data collection unit 210 collects transmission and reception data for a plurality of networks (router 108, IT network 120, OT network 150, and crew network 130) in the autonomous ship to generate collected data. .

데이터 수집부(210)는 라우터, IT 네트워크(120), 승무원 네트워크(130), OT 네트워크(150)로부터 수집한 송수신 데이터를 취합한 취합 데이터를 생성한다. 데이터 수집부(210)는 취합 데이터를 압축한 후 최대 프로토콜 범위를 위한 개방형 스택을 적용하여 수집 데이터를 생성한다.The data collection unit 210 collects transmission/reception data collected from the router, the IT network 120 , the crew network 130 , and the OT network 150 to generate aggregated data. The data collecting unit 210 generates collected data by compressing the collected data and then applying an open stack for a maximum protocol range.

복수의 네트워크는 위성과 연동하는 VSAT(Very Small Aperture Terminal), 이동통신 기지국과 각각 통신하는 라우터(Router)(108), 자율운항 선박 내부에 설치된 업무용 PC 및 업무용 서버와 통신하는 IT 네트워크(120), 자율운항 선박 내부에 설치된 무선 AP(Access Point), 승무원 단말기와 통신하는 승무원 네트워크(130), 자율운항 선박 내부에 설치된 모니터링(Monitoring) 장치, 네비게이션(Navigation) 장치, 제어(Control) 장치와 연동하는 OT 네트워크(150)를 포함한다.A plurality of networks are a VSAT (Very Small Aperture Terminal) that interworks with satellites, a router (108) that communicates with mobile communication base stations, and an IT network (120) that communicates with business PCs and business servers installed inside autonomous ships. , Wireless AP (Access Point) installed inside the autonomous ship, crew network 130 communicating with the crew terminal, monitoring device installed inside the autonomous ship, navigation device, interlocking with control device It includes an OT network 150 that

사이버 공격 확인부(220)는 수집 데이터를 분석하여 복수의 네트워크(라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130)) 중 하나 이상의 네트워크에 대한 사이버 공격 또는 비정상 트래픽이 감지되는 지의 여부를 확인한다.The cyber attack check unit 220 analyzes the collected data to detect a cyber attack or abnormality on one or more networks among a plurality of networks (router 108, IT network 120, OT network 150, crew network 130). Check whether traffic is detected or not.

사이버 공격 확인부(220)는 업무용 PC 및 업무용 서버에 설치된 에이전트 프로그램을 이용하여 IT 네트워크(120)에 대한 수집 데이터의 사이버 공격 또는 비정상 트래픽이 감지되는 지의 여부를 확인한다.The cyber attack checking unit 220 checks whether a cyber attack or abnormal traffic of the collected data on the IT network 120 is detected using an agent program installed on a work PC and a work server.

사이버 공격 확인부(220)는 자율운항 선박 내부에 설치된 모니터링 장치, 네비게이션 장치, 제어 장치에 대한 트래픽을 감지하는 트래픽 감지 센서로부터 OT 네트워크(150)에 대한 수집 데이터의 사이버 공격 또는 비정상 트래픽이 감지되는 지의 여부를 확인한다.The cyber attack check unit 220 detects a cyber attack or abnormal traffic of collected data for the OT network 150 from a traffic detection sensor that detects traffic for a monitoring device, a navigation device, and a control device installed inside the autonomous ship. check whether the

위험도 평가부(230)는 복수의 네트워크(라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130)) 각각에 대한 사이버 위협에 대한 위험도를 평가한 위험도 평가 결과를 산출한다.The risk evaluation unit 230 evaluates the risk against cyber threats for each of a plurality of networks (router 108, IT network 120, OT network 150, crew network 130) Calculate risk evaluation results do.

위험도 평가부(230)는 복수의 네트워크(라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130))로부터 수신된 송수신 데이터를 기반으로 복수의 네트워크 각각을 평가하여 위험도 평가 매트릭스(Risk Assessment Matrix)를 생성한다.The risk evaluation unit 230 evaluates each of the plurality of networks based on the transmission and reception data received from the plurality of networks (router 108, IT network 120, OT network 150, and crew network 130) to determine the risk level Create a Risk Assessment Matrix.

위험도 평가부(230)는 복수의 네트워크(라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130))에 기 설정된 항목을 확인한 결과에 근거하여 위험도 평가 매트릭스에 포함되는 임팩트 인덱스(Impact Index)를 1~25로 결정한다.The risk evaluation unit 230 is included in the risk evaluation matrix based on the results of checking items set in a plurality of networks (router 108, IT network 120, OT network 150, crew network 130) Determine the Impact Index from 1 to 25.

위험도 평가부(230)는 임팩트 인덱스가 1~7인 경우 낮음(Low)으로 판단하고, 임팩트 인덱스가 8~14인 경우 중요(Significant)로 판단하고, 임팩트 인덱스가 15~25인 경우 심각(Major)으로 판단한다.The risk evaluation unit 230 determines that the impact index is low when the impact index is 1 to 7, determines it to be significant when the impact index is 8 to 14, and determines it to be significant when the impact index is 15 to 25. ) judged by

위험도 평가부(230)는 임팩트 인덱스 5개가 모두 낮음(Low)으로 판단된 경우, 사이버 공격에 대한 확률 인덱스(Probability Index)를 ‘1’로 결정한다. 위험도 평가부(230)는 임팩트 인덱스 5개 중 3개가 낮음(Low)으로 판단되고, 2개가 중요(Significant)로 판단된 경우, 사이버 공격에 대한 확률 인덱스(Probability Index)를 ‘2’로 결정한다. 위험도 평가부(230)는 임팩트 인덱스 5개 중 2개가 낮음(Low)으로 판단되고, 2개가 중요(Significant)로 판단되고, 1개가 심각(Major)으로 판단된 경우, 사이버 공격에 대한 확률 인덱스(Probability Index)를 ‘3’으로 결정한다. 위험도 평가부(230)는 임팩트 인덱스 5개 중 1개가 낮음(Low)으로 판단되고, 2개가 중요(Significant)로 판단되고, 2개가 심각(Major)으로 판단된 경우, 사이버 공격에 대한 확률 인덱스(Probability Index)를 ‘4’로 결정한다. 위험도 평가부(230)는 임팩트 인덱스 5개 중 1개가 낮음(Low)으로 판단되고, 1개가 중요(Significant)로 판단되고, 3개가 심각(Major)으로 판단된 경우, 사이버 공격에 대한 확률 인덱스(Probability Index)를 ‘5’로 결정한다.The risk evaluation unit 230 determines a probability index for a cyber attack as '1' when all five impact indices are determined to be low. The risk evaluation unit 230 determines a probability index for a cyber attack as '2' when three out of five impact indices are determined to be low and two are determined to be significant. . The risk evaluation unit 230 determines that 2 out of 5 impact indices are low, 2 are significant, and 1 is significant, the probability index for a cyber attack ( Probability Index) is set to '3'. The risk evaluation unit 230 determines that one of the five impact indices is low, two are significant, and two are determined to be significant, the probability index for a cyber attack ( Probability Index) is set to '4'. The risk evaluation unit 230 determines that one of the five impact indices is low, one is significant, and three are determined to be major, the probability index for a cyber attack ( Probability Index) is set to '5'.

위험도 평가부(230)는 임팩트 인덱스를 기밀성 인덱스(Confidentiality Index), 무결성 인덱스(Integrity Index), 가용성 인덱스(Availability Index)로 구분한다. 위험도 평가부(230)는 기밀성 인덱스, 무결성 인덱스, 가용성 인덱스 각각에 대해 5 위기(Critical), 4 중요(Significant), 3 절제(Moderate), 2 마이너(Minor), 1 무시가능(Negligible) 중 하나의 값으로 결정한다. 위험도 평가부(230)는 기밀성 인덱스, 무결성 인덱스, 가용성 인덱스를 가산한 값을 자산 중요도 값(Asset criticality value)으로 산출하고, 자산 중요도 값(Confidentiality Index + Integrity Index + Availability Index)를 임팩드 인덱스로 인식한다.The risk evaluation unit 230 classifies the impact index into a confidentiality index, an integrity index, and an availability index. The risk evaluation unit 230 is one of 5 Critical, 4 Significant, 3 Moderate, 2 Minor, and 1 Negligible for each of the confidentiality index, integrity index, and availability index. determined by the value of The risk evaluation unit 230 calculates a value obtained by adding the confidentiality index, the integrity index, and the availability index as an asset criticality value, and the asset criticality value (Confidentiality Index + Integrity Index + Availability Index) as an impact index Recognize.

위험도 평가부(230)는 자산 중요도 값을 기 설정된 기준(3 ≤ Index 1 ≤ 4, 5 ≤ Index 2 ≤ 6, 7 ≤ Index 3 ≤ 9, 10 ≤ Index 4 ≤ 12, 13 ≤ Index 5 ≤ 15)에 따라 결정한다. 위험도 평가부(230)는 3 ≤ 자산 중요도 값 ≤ 4인 경우, 임팩드 인덱스 값을 인덱스 1(Index 1)로 결정한다. 위험도 평가부(230)는 5 ≤ 자산 중요도 값 ≤ 6인 경우, 임팩드 인덱스 값을 인덱스 2(Index 2)로 결정한다. 위험도 평가부(230)는 7 ≤ 자산 중요도 값 ≤ 9인 경우, 임팩드 인덱스 값을 인덱스 3(Index 3)으로 결정한다. 위험도 평가부(230)는 10 ≤ 자산 중요도 값 ≤ 12인 경우, 임팩드 인덱스 값을 인덱스 4(Index 4)로 결정한다. 위험도 평가부(230)는 13 ≤ 자산 중요도 값 ≤ 15인 경우, 임팩드 인덱스 값을 인덱스 5(Index 5)로 결정한다.The risk evaluation unit 230 sets the asset importance value to a preset standard (3 ≤ Index 1 ≤ 4, 5 ≤ Index 2 ≤ 6, 7 ≤ Index 3 ≤ 9, 10 ≤ Index 4 ≤ 12, 13 ≤ Index 5 ≤ 15) decide according to The risk evaluation unit 230 determines the impact index value as index 1 (Index 1) when 3 ≤ asset importance value ≤ 4. When 5 ≤ asset importance value ≤ 6, the risk evaluation unit 230 determines the impact index value as index 2 (Index 2). The risk evaluation unit 230 determines the impact index value as index 3 when 7 ≤ asset importance value ≤ 9. The risk evaluation unit 230 determines the impact index value as Index 4 when 10 ≤ asset importance value ≤ 12. The risk evaluation unit 230 determines the impact index value as Index 5 when 13 ≤ asset importance value ≤ 15.

위험도 평가부(230)는 확률 인덱스(Probability Index)를 위협 인덱스(Threat Index), 취약성 인덱스(Vulnerability Index)로 구분한다. 위험도 평가부(230)는 위협 인덱스를 5 확실(Definite), 4 가능(Probable), 3 일시적(Occasional), 2 먼(Remote), 1 불가능(Improbable) 중 하나의 값으로 결정한다. 위험도 평가부(230)는 취약성 인덱스를 5 매우 높음(Very high), 4 높음(High), 3 중간(Medium), 2 낮음(Low), 1 매우 낮음(Very Low) 중 하나의 값으로 결정한다. 위험도 평가부(230)는 위협 인덱스와 취약성 인덱스의 곱을 사이버 공격 확률값(Cyber attack probability value)으로 산출하고, 사이버 공격 확률값(Threat Index × Vulnerability Index)을 확률 인덱스로 인식한다.The risk evaluation unit 230 divides the probability index into a threat index and a vulnerability index. The risk evaluation unit 230 determines the threat index as one of 5 Definite, 4 Probable, 3 Occasional, 2 Remote, and 1 Improbable. The risk assessment unit 230 determines the vulnerability index as one of 5 very high, 4 high, 3 medium, 2 low, and 1 very low. . The risk evaluation unit 230 calculates the product of the threat index and the vulnerability index as a cyber attack probability value, and recognizes the cyber attack probability value (Threat Index × Vulnerability Index) as the probability index.

위험도 평가부(230)는 사이버 공격 확률값을 기 설정된 기준(1 ≤ Index 1 ≤ 5, 6 ≤ Index 2 ≤ 10, 11 ≤ Index 3 ≤ 15, 16 ≤ Index 4 ≤ 20, 21 ≤ Index 5 ≤ 25)에 따라 결정한다. 위험도 평가부(230)는 1 ≤ 사이버 공격 확률값 ≤ 5인 경우, 확률 인덱스 값을 인덱스 1(Index 1)로 결정한다. 위험도 평가부(230)는 6 ≤ 사이버 공격 확률값 ≤ 10인 경우, 확률 인덱스 값을 인덱스 2(Index 2)로 결정한다. 위험도 평가부(230)는 11 ≤ 사이버 공격 확률값 ≤ 15인 경우, 확률 인덱스 값을 인덱스 3(Index 3)으로 결정한다. 위험도 평가부(230)는 16 ≤ 사이버 공격 확률값 ≤ 20인 경우, 확률 인덱스 값을 인덱스 4(Index 4)로 결정한다. 위험도 평가부(230)는 21 ≤ 사이버 공격 확률값 ≤ 25인 경우, 확률 인덱스 값을 인덱스 5(Index 5)로 결정한다.The risk evaluation unit 230 sets the cyber attack probability value to a predetermined standard (1 ≤ Index 1 ≤ 5, 6 ≤ Index 2 ≤ 10, 11 ≤ Index 3 ≤ 15, 16 ≤ Index 4 ≤ 20, 21 ≤ Index 5 ≤ 25) decide according to When 1 ≤ cyber attack probability value ≤ 5, the risk evaluation unit 230 determines the probability index value as index 1 (Index 1). When 6 ≤ cyber attack probability value ≤ 10, the risk evaluation unit 230 determines the probability index value as index 2 (Index 2). When 11 ≤ cyber attack probability value ≤ 15, the risk evaluation unit 230 determines the probability index value as index 3 (Index 3). When 16 ≤ cyber attack probability value ≤ 20, the risk evaluation unit 230 determines the probability index value as index 4 (Index 4). When 21 ≤ cyber attack probability value ≤ 25, the risk evaluation unit 230 determines the probability index value as Index 5.

위험도 평가부(230)는 위협 요인을 ‘계정 탈취’로 판별한 경우 코드를 T101을 할당하고 위협 인덱스(TI)를 ‘5’로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘권한 남용’으로 판별한 경우 코드를 T102을 할당하고 위협 인덱스(TI)를 ‘4’로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘비인가자 접근’으로 판별한 경우 코드를 T103을 할당하고 위협 인덱스(TI)를 ‘4’로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘비인가 USB 사용’으로 판별한 경우 코드를 T201을 할당하고 위협 인덱스(TI)를 ‘4’로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘비인가 단말기’로 판별한 경우 코드를 T202을 할당하고 위협 인덱스(TI)를 ‘4’로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘불법 SW 설치’로 판별한 경우 코드를 T203을 할당하고 위협 인덱스(TI)를 ‘4’로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘운영 실수’로 판별한 경우 코드를 T204을 할당하고 위협 인덱스(TI)를 ‘2’로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘DDOS’로 판별한 경우 코드를 T301을 할당하고 위협 인덱스(TI)를 ‘5’로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘악성코드’로 판별한 경우 코드를 T302을 할당하고 위협 인덱스(TI)를 ‘5’로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘개인정보 악용’으로 판별한 경우 코드를 T401을 할당하고 위협 인덱스(TI)를 ‘4’로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘정보의 변조/변경’으로 판별한 경우 코드를 T402을 할당하고 위협 인덱스(TI)를 ‘5’로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘정보 유출’로 판별한 경우 코드를 T403을 할당하고 위협 인덱스(TI)를 ‘4’로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘침해부인’으로 판별한 경우 코드를 T404을 할당하고 위협 인덱스(TI)를 ‘4’로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘하드웨어 결함’으로 판별한 경우 코드를 T501을 할당하고 위협 인덱스(TI)를 ‘3’으로 결정한다. 위험도 평가부(230)는 위협 요인을 ‘정전’으로 판별한 경우 코드를 T51을 할당하고 위협 인덱스(TI)를 ‘3’으로 결정한다.When the risk evaluation unit 230 determines that the threat factor is 'account hijacking', the code is assigned T101 and the threat index (TI) is determined to be '5'. When the risk evaluation unit 230 determines that the threat factor is 'abuse of authority', the code is assigned T102 and the threat index (TI) is determined to be '4'. When the risk assessment unit 230 determines that the threat factor is 'unauthorized access', the code is assigned T103 and the threat index (TI) is determined to be '4'. When the risk assessment unit 230 determines that the threat factor is 'unauthorized USB use', the code is assigned T201 and the threat index (TI) is determined to be '4'. When the risk evaluation unit 230 determines that the threat factor is 'unauthorized terminal', the code is assigned T202 and the threat index (TI) is determined to be '4'. When the risk assessment unit 230 determines that the threat factor is 'illegal SW installation', the code is assigned T203 and the threat index (TI) is determined to be '4'. When the risk evaluation unit 230 determines that the threat factor is 'operation mistake', the code is assigned T204 and the threat index (TI) is determined to be '2'. When the risk evaluation unit 230 determines that the threat factor is 'DDOS', the code is assigned T301 and the threat index (TI) is determined to be '5'. When the risk evaluation unit 230 determines that the threat factor is 'malicious code', the code is assigned T302 and the threat index (TI) is determined to be '5'. When the risk evaluation unit 230 determines that the threat factor is 'abuse of personal information', the code is assigned T401 and the threat index (TI) is determined to be '4'. When the risk evaluation unit 230 determines that the threat factor is 'falsification/change of information', the code is assigned T402 and the threat index (TI) is determined to be '5'. When the risk evaluation unit 230 determines that the threat factor is 'information leakage', the code is assigned T403 and the threat index (TI) is determined to be '4'. When the risk evaluation unit 230 determines that the threat factor is 'denial of infringement', the code is assigned T404 and the threat index (TI) is determined to be '4'. When the risk evaluation unit 230 determines that the threat factor is 'hardware defect', the code is assigned T501 and the threat index (TI) is determined to be '3'. When the risk evaluation unit 230 determines that the threat factor is 'power outage', the code is assigned T51 and the threat index (TI) is determined to be '3'.

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 해커에 의해 중요정보(네트워크/화물/금융정보) 유출이 발생하는 경우, 위협 요인을 ‘계정 탈취’, ‘권한 남용’, ‘정보 유출’, ‘불법 SW 설치’, ‘DDOS’, ‘악성코드’, ‘개인정보 악용’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘계정 탈취’, ‘권한 남용’, ‘정보 유출’, ‘불법 SW 설치’, ‘DDOS’, ‘악성코드’, ‘개인정보 악용’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk assessment unit 230 detects a threat when important information (network/cargo/financial information) is leaked by a hacker among the router 108, the IT network 120, the OT network 150, and the crew network 130. 'Account hijacking', 'abuse of authority', 'information leak', 'illegal software installation', 'DDOS', 'malicious code', 'abuse of personal information', 'denial of infringement', 'operation mistake', 'hardware' It is recognized as one or more of 'defect' and 'power outage'. The scenario provision unit 250 is responsible for threat factors ('account takeover', 'abuse of authority', 'information leakage', 'illegal SW installation', 'DDOS', 'malicious code', 'abuse of personal information', 'denial of infringement'). , 'operation mistake', 'hardware defect', 'power outage').

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 취약한 서비스의 포트를 통한 침입에 노출이 발생하는 경우, 위협 요인을 ‘권한 남용’, ‘정보 유출’, ‘불법 SW 설치’, ‘비인가 단말기’, ‘악성코드’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘권한 남용’, ‘정보 유출’, ‘불법 SW 설치’, ‘비인가 단말기’, ‘악성코드’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk assessment unit 230 classifies the threat factor as 'authority abuse' when exposure to an intrusion occurs through a port of a vulnerable service among the router 108, the IT network 120, the OT network 150, and the crew network 130. ', 'information leakage', 'illegal SW installation', 'unauthorized terminal', 'malicious code', 'infringement denial', 'operation mistake', 'hardware defect', 'power outage'. The scenario providing unit 250 is responsible for threat factors ('authority abuse', 'information leakage', 'illegal SW installation', 'unauthorized terminal', 'malicious code', 'infringement denial', 'operation mistake', 'hardware defect'). , one or more of 'power outages') to provide response scenarios.

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 중요 시스템 무단 변조(조작) 업무 지연 / 작동 중단이 발생하는 경우, 위협 요인을 ‘계정 탈취’, ‘권한 남용’, ‘정보의 변조/변경’, ‘비인가자 접근’, ‘불법 SW 설치’, ‘DDOS’, ‘악의적인 행위’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘계정 탈취’, ‘권한 남용’, ‘정보의 변조/변경’, ‘비인가자 접근’, ‘불법 SW 설치’, ‘DDOS’, ‘악의적인 행위’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’)에 따른 대응 시나리오를 제공한다.The risk assessment unit 230 identifies threat factors in the event of unauthorized tampering (manipulation) of the router 108, the IT network 120, the OT network 150, and the crew network 130. 'Account hijacking', 'abuse of authority', 'falsification/altering of information', 'access by unauthorized person', 'installation of illegal software', 'DDOS', 'malicious act', 'denial of infringement', 'operation mistake', It is recognized as one or more of 'hardware defect' and 'power outage'. The scenario providing unit 250 is responsible for threat factors ('account takeover', 'abuse of authority', 'falsification/change of information', 'access by unauthorized persons', 'illegal SW installation', 'DDOS', 'malicious behavior', It provides response scenarios according to 'denial of infringement', 'operating mistake', 'hardware defect', 'outage').

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 제로데이 어택에 노출이 발생하는 경우, 위협 요인을 ‘권한 남용’, ‘정보 유출’, ‘불법 SW 설치’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘권한 남용’, ‘정보 유출’, ‘불법 SW 설치’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk evaluation unit 230 classifies the threat factors as 'authority abuse' and 'information' when exposure to a zero-day attack occurs among the router 108, the IT network 120, the OT network 150, and the crew network 130. Leakage', 'illegal software installation', 'operation mistake', 'hardware defect', 'power outage'. The scenario providing unit 250 provides response scenarios according to threat factors (one or more of 'authority abuse', 'information leakage', 'illegal SW installation', 'operation mistake', 'hardware defect', and 'power outage') .

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 안정성이 검증되지 않은 패치 실행으로 시스템 장애가 발생하는 경우, 위협 요인을 ‘권한 남용’, ‘불법 SW 설치’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘권한 남용’, ‘불법 SW 설치’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk evaluation unit 230 determines the threat factor as 'authority abuse' when a system failure occurs due to the execution of a patch whose stability has not been verified among the router 108, the IT network 120, the OT network 150, and the crew network 130. ', 'illegal SW installation', 'operation mistake', 'hardware defect', 'power failure'. The scenario providing unit 250 provides response scenarios according to threat factors (at least one of 'authority abuse', 'illegal SW installation', 'operation mistake', 'hardware defect', and 'power outage').

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 악성코드/랜섬웨어 감염 및 전파가 발생하는 경우, 위협 요인을 ‘비인가자 접근’, ‘비인가 USB 사용’, ‘불법 SW 설치’, ‘DDOS’, ‘악성코드’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘비인가자 접근’, ‘비인가 USB 사용’, ‘불법 SW 설치’, ‘DDOS’, ‘악성코드’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk evaluation unit 230 determines the threat factor as 'unauthorized access' when infection and propagation of malicious code/ransomware occurs among the router 108, the IT network 120, the OT network 150, and the crew network 130. ', 'use of unauthorized USB', 'installation of illegal SW', 'DDOS', 'malicious code', 'denial of infringement', 'operating mistake', 'hardware defect', 'power outage'. The scenario provision unit 250 provides threat factors ('access by unauthorized person', 'use of unauthorized USB', 'installation of illegal SW', 'DDOS', 'malicious code', 'denial of infringement', 'operation mistake', 'hardware defect'). ', 'outage') to provide response scenarios.

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 악성코드/랜섬웨어 감염 및 전파가 발생하는 경우, 위협 요인을 ‘계정 탈취’, ‘권한 남용’, ‘정보 유출’, ‘비인가자 접근’, ‘비인가 USB 사용’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘개인정보 악용’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘계정 탈취’, ‘권한 남용’, ‘정보 유출’, ‘비인가자 접근’, ‘비인가 USB 사용’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘개인정보 악용’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk evaluation unit 230 determines the threat factor as 'account hijacking' when infection and propagation of malicious code/ransomware occurs among the router 108, the IT network 120, the OT network 150, and the crew network 130. , 'abuse of authority', 'information leakage', 'access by unauthorized person', 'use of unauthorized USB', 'unauthorized terminal', 'malicious code', 'malicious behavior', 'abuse of personal information', 'operation mistake', It is recognized as one or more of 'hardware defect' and 'power outage'. The scenario providing unit 250 provides threat factors ('account hijacking', 'authority abuse', 'information leakage', 'unauthorized person access', 'unauthorized USB use', 'unauthorized terminal', 'malicious code', 'malicious Action', 'misuse of personal information', 'operation mistake', 'hardware defect', 'power outage').

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생하는 경우, 위협 요인을 ‘계정 탈취’, ‘권한 남용’, ‘정보의 변조/변경’, ‘비인가자 접근’, ‘DDOS’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘개인정보 악용’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘계정 탈취’, ‘권한 남용’, ‘정보의 변조/변경’, ‘비인가자 접근’, ‘DDOS’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘개인정보 악용’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk evaluation unit 230 accesses a system among the router 108, the IT network 120, the OT network 150, and the crew network 130 and changes important information to determine the threat factor when work (flight) delay occurs. 'account hijacking', 'abuse of authority', 'tampering/altering of information', 'access by unauthorized person', 'DDOS', 'unauthorized terminal', 'malicious code', 'malicious act', 'abuse of personal information' , 'denial of infringement', 'operation mistake', 'hardware defect', 'outage'. The scenario provision unit 250 is responsible for threat factors ('account takeover', 'abuse of authority', 'falsification/altering of information', 'access by an unauthorized person', 'DDOS', 'unauthorized terminal', 'malicious code', 'malicious code'). Provides response scenarios according to one or more of 'personal information misuse', 'infringement denial', 'operation mistake', 'hardware defect', and 'power outage').

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 시스템 과부하로 인한 업무 지연이 발생하는 경우, 위협 요인을 ‘불법 SW 설치’, ‘DDOS’, ‘비인가 단말기’, ‘악성코드’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘불법 SW 설치’, ‘DDOS’, ‘비인가 단말기’, ‘악성코드’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk assessment unit 230 determines the threat factor as 'illegal SW installation', when a work delay occurs due to system overload among the router 108, the IT network 120, the OT network 150, and the crew network 130. Recognizes one or more of 'DDOS', 'unauthorized terminal', 'malicious code', 'operation error', 'hardware defect', and 'power outage'. The scenario providing unit 250 responds according to threat factors (one or more of 'illegal SW installation', 'DDOS', 'unauthorized terminal', 'malicious code', 'operation mistake', 'hardware defect', and 'power outage') provide a scenario.

위험도 평가부는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 비인가자의 임의 조작으로 인한 시스템 중단이 발생하는 경우, 위협 요인을 ‘계정 탈취’, ‘권한 남용’, ‘정보의 변조/변경’, ‘비인가자 접근’, ‘DDOS’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘계정 탈취’, ‘권한 남용’, ‘정보의 변조/변경’, ‘비인가자 접근’, ‘DDOS’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’)에 따른 대응 시나리오를 제공한다.The risk evaluation unit classifies the threat factors as 'account takeover' and 'abuse of authority' in the case of system interruption due to unauthorized person's random manipulation among the router (108), IT network (120), OT network (150), and crew network (130). ', 'tampering/altering of information', 'access by unauthorized person', 'DDOS', 'unauthorized terminal', 'malicious code', 'malicious act', 'denial of infringement', 'operation mistake', 'hardware defect' , recognized as one or more of 'blackouts'. The scenario provision unit 250 is responsible for threat factors ('account takeover', 'abuse of authority', 'falsification/altering of information', 'access by an unauthorized person', 'DDOS', 'unauthorized terminal', 'malicious code', 'malicious code'). response scenarios) are provided.

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 비인가자가 무작위 로그인 시도하여 계정 탈취하여 중요정보 변조 및 파괴가 발생하는 경우, 위협 요인을 ‘계정 탈취’, ‘정보의 변조/변경’, ‘비인가자 접근’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘개인정보 악용’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘계정 탈취’, ‘정보의 변조/변경’, ‘비인가자 접근’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘개인정보 악용’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk assessment unit 230 is a threat when an unauthorized person among the router 108, the IT network 120, the OT network 150, and the crew network 130 randomly tries to log in and steals an account to falsify or destroy important information. 'Account hijacking', 'falsification/altering of information', 'access by unauthorized person', 'unauthorized terminal', 'malicious code', 'malicious behavior', 'abuse of personal information', 'denial of infringement', 'operation It is recognized as one or more of 'mistake', 'hardware defect', and 'power outage'. The scenario provision unit 250 provides threat factors ('account hijacking', 'falsification/change of information', 'access by unauthorized persons', 'unauthorized terminal', 'malicious code', 'malicious behavior', 'abuse of personal information'). , 'denial of infringement', 'operation mistake', 'hardware defect', 'outage').

위험도 평가부는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연이 발생하는 경우, 위협 요인을 ‘계정 탈취’, ‘권한 남용’, ‘정보의 변조/변경’, ‘비인가자 접근’, ‘비인가 USB 사용’, ‘불법 SW 설치’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘개인정보 악용’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘계정 탈취’, ‘권한 남용’, ‘정보의 변조/변경’, ‘비인가자 접근’, ‘비인가 USB 사용’, ‘불법 SW 설치’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘개인정보 악용’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’)에 따른 대응 시나리오를 제공한다.The risk evaluation unit identifies the threat factor as an 'account' in the case of intentional business (flight) delay by accessing and changing unauthorized information among the router (108), IT network (120), OT network (150), and crew network (130). Stealing', 'abuse of authority', 'falsification/altering of information', 'access by unauthorized person', 'use of unauthorized USB', 'installation of illegal SW', 'unauthorized terminal', 'malicious code', 'malicious behavior', Recognize it as one or more of 'abuse of personal information', 'denial of infringement', 'operation mistake', 'hardware defect', and 'power outage'. The scenario providing unit 250 provides threat factors ('account hijacking', 'abuse of authority', 'falsification/change of information', 'access by unauthorized persons', 'use of unauthorized USB', 'installation of illegal SW', 'unauthorized terminal'). , 'malicious code', 'malicious behavior', 'abuse of personal information', 'denial of infringement', 'operation mistake', 'hardware defect', 'power outage').

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 비인가 단말기로 내부망 연결하여 중요정보 접근 및 OT 네트워크(150)에 대한 임의 조작이 발생하는 경우, 위협 요인을 ‘권한 남용’, ‘비인가자 접근’, ‘비인가 USB 사용’, ‘불법 SW 설치’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘권한 남용’, ‘비인가자 접근’, ‘비인가 USB 사용’, ‘불법 SW 설치’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk assessment unit 230 accesses important information and arbitrarily manipulates the OT network 150 by connecting to the internal network with an unauthorized terminal among the router 108, the IT network 120, the OT network 150, and the crew network 130 If this occurs, the threat factors are 'abuse of authority', 'access by unauthorized person', 'use of unauthorized USB', 'installation of illegal SW', 'unauthorized terminal', 'malicious code', 'malicious act', 'denial of infringement' ', 'Operation mistake', 'Hardware defect', or 'Power outage'. The scenario provision unit 250 provides threat factors ('abuse of authority', 'access by unauthorized persons', 'use of unauthorized USB', 'installation of illegal SW', 'unauthorized terminal', 'malicious code', 'malicious behavior', ' denial of infringement', 'operating mistake', 'hardware defect', 'outage').

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 비인가 단말기로 내부망 연결하여 악성코드 전파가 발생하는 경우, 위협 요인을 ‘계정 탈취’, ‘권한 남용’, ‘비인가자 접근’, ‘비인가 USB 사용’, ‘불법 SW 설치’, ‘비인가 단말기’, ‘악의적인 행위’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘계정 탈취’, ‘권한 남용’, ‘비인가자 접근’, ‘비인가 USB 사용’, ‘불법 SW 설치’, ‘비인가 단말기’, ‘악의적인 행위’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk evaluation unit 230 determines the threat factor as an 'account' when malicious code propagation occurs by connecting to an internal network with an unauthorized terminal among the router 108, the IT network 120, the OT network 150, and the crew network 130. Stealing', 'Abuse of authority', 'Access by unauthorized person', 'Use of unauthorized USB', 'Installation of illegal SW', 'Unauthorized terminal', 'Malicious act', 'Denial of infringement', 'Operation mistake', 'Hardware defect' ', 'power outage'. The scenario providing unit 250 provides threat factors ('account hijacking', 'authority abuse', 'unauthorized access', 'unauthorized USB use', 'illegal SW installation', 'unauthorized terminal', 'malicious behavior', ' denial of infringement', 'operating mistake', 'hardware defect', 'outage').

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 누락된 보안 패치로 인해 사이버공격에 취약이 발생하는 경우, 위협 요인을 ‘정보의 변조/변경’, ‘불법 SW 설치’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘정보의 변조/변경’, ‘불법 SW 설치’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk assessment unit 230 determines the threat factor as 'information' when a vulnerability to a cyberattack occurs due to a missing security patch among the router 108, the IT network 120, the OT network 150, and the crew network 130. 'modification/change', 'illegal SW installation', 'operation mistake', 'hardware defect', and 'power outage'. The scenario providing unit 250 provides response scenarios according to threat factors (one or more of 'falsification/change of information', 'illegal SW installation', 'operation mistake', 'hardware defect', and 'power outage').

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생하는 경우, 위협 요인을 ‘계정 탈취’, ‘권한 남용’, ‘정보의 변조/변경’, ‘정보 유출’, ‘비인가자 접근’, ‘불법 SW 설치’, ‘DDOS’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘개인정보 악용’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘계정 탈취’, ‘권한 남용’, ‘정보의 변조/변경’, ‘정보 유출’, ‘비인가자 접근’, ‘불법 SW 설치’, ‘DDOS’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘개인정보 악용’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk evaluation unit 230 is a threat factor in the case of stealing important information and malicious behavior by accessing administrator/user privileges among the router 108, the IT network 120, the OT network 150, and the crew network 130. 'account hijacking', 'abuse of authority', 'tampering/altering of information', 'information leakage', 'access by unauthorized person', 'illegal SW installation', 'DDOS', 'unauthorized terminal', 'malicious code', Recognize one or more of 'malicious acts', 'abuse of personal information', 'denial of infringement', 'operation mistakes', 'hardware defects', and 'power outages'. The scenario providing unit 250 is responsible for threat factors ('account takeover', 'abuse of authority', 'falsification/change of information', 'information leakage', 'access by unauthorized persons', 'illegal SW installation', 'DDOS', ' Provides response scenarios according to one or more of 'unauthorized terminal', 'malicious code', 'malicious behavior', 'abuse of personal information', 'denial of infringement', 'operation mistake', 'hardware defect', and 'power outage' .

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 과다한 트래픽 발생시켜 업무 지연이 발생하는 경우, 위협 요인을 ‘불법 SW 설치’, ‘DDOS’, ‘악성코드’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘불법 SW 설치’, ‘DDOS’, ‘악성코드’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk evaluation unit 230 determines the threat factor as 'illegal SW installation', in the case of a business delay caused by excessive traffic generation among the router 108, the IT network 120, the OT network 150, and the crew network 130. Recognizes one or more of 'DDOS', 'malicious code', 'operation error', 'hardware defect', and 'power outage'. The scenario providing unit 250 provides response scenarios according to threat factors (one or more of 'illegal SW installation', 'DDOS', 'malicious code', 'operation mistake', 'hardware defect', and 'power outage').

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 패스워드(PW)가 암호화 저장되어있지 않아 해커 침입시 계정 탈취가 발생하는 경우, 위협 요인을 ‘정보의 변조/변경’, ‘정보 유출’, ‘비인가자 접근’, ‘불법 SW 설치’, ‘DDOS’, ‘비인가 단말기’, ‘악성코드’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘정보의 변조/변경’, ‘정보 유출’, ‘비인가자 접근’, ‘불법 SW 설치’, ‘DDOS’, ‘비인가 단말기’, ‘악성코드’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk assessment unit 230 determines whether an account theft occurs when a hacker infiltrates because the password (PW) is not encrypted and stored among the router 108, the IT network 120, the OT network 150, and the crew network 130. Threat factors include 'tampering/altering of information', 'information leakage', 'access by unauthorized person', 'installation of illegal software', 'DDOS', 'unauthorized terminal', 'malicious code', 'denial of infringement', and 'operation mistake'. ', 'hardware defect', 'power outage'. The scenario provision unit 250 is responsible for threat factors ('information alteration/modification', 'information leakage', 'unauthorized access', 'illegal SW installation', 'DDOS', 'unauthorized terminal', 'malicious code', ' denial of infringement', 'operating mistake', 'hardware defect', 'outage').

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 OT 네트워크의 임의 조작 / 중요정보 변조하여 운항 사고가 발생하는 경우, 위협 요인을 ‘계정 탈취’, ‘권한 남용’, ‘정보의 변조/변경’, ‘비인가자 접근’, ‘불법 SW 설치’, ‘DDOS’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘계정 탈취’, ‘권한 남용’, ‘정보의 변조/변경’, ‘비인가자 접근’, ‘불법 SW 설치’, ‘DDOS’, ‘비인가 단말기’, ‘악성코드’, ‘악의적인 행위’, ‘침해부인’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk evaluation unit 230 is a router 108, IT network 120, OT network 150, crew network 130 of the OT network arbitrarily manipulated / important information falsification, when a flight accident occurs, the threat factor 'Account hijacking', 'abuse of authority', 'tampering/altering of information', 'access by unauthorized person', 'installation of illegal SW', 'DDOS', 'unauthorized terminal', 'malicious code', 'malicious behavior', It is recognized as one or more of 'denial of infringement', 'operation mistake', 'hardware defect', and 'power outage'. The scenario providing unit 250 is responsible for threat factors ('account takeover', 'abuse of authority', 'falsification/change of information', 'access by unauthorized person', 'illegal SW installation', 'DDOS', 'unauthorized terminal', ' Malicious code', 'malicious behavior', 'denial of infringement', 'operation mistake', 'hardware defect', 'power outage').

위험도 평가부(230)는 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 LAN 포트 제거/변경하여 시스템 중단이 발생하는 경우, 위협 요인을 ‘비인가자 접근’, ‘비인가 단말기’, ‘악의적인 행위’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상으로 인지한다. 시나리오 제공부(250)는 위협 요인(‘비인가자 접근’, ‘비인가 단말기’, ‘악의적인 행위’, ‘운영 실수’, ‘하드웨어 결함’, ‘정전’ 중 하나 이상)에 따른 대응 시나리오를 제공한다.The risk assessment unit 230 determines the threat factor as 'unauthorized access' when a system is interrupted by removing/changing a LAN port among the router 108, the IT network 120, the OT network 150, and the crew network 130. ', 'unauthorized terminal', 'malicious behavior', 'operation error', 'hardware defect', and 'power outage'. The scenario provider 250 provides response scenarios according to threat factors (one or more of 'access by an unauthorized person', 'unauthorized terminal', 'malicious behavior', 'operation mistake', 'hardware defect', and 'power outage'). do.

사이버 공격 차단부(240)는 복수의 네트워크(라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130)) 중 사이버 공격 또는 비정상 트래픽이 감지된 네트워크를 차단한다. 사이버 공격 차단부(240)는 위험도 평가 매트릭스에 포함된 인덱스를 기반으로 복수의 네트워크(라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130)) 중 사이버 공격 또는 비정상 트래픽이 감지된 네트워크를 차단한다.The cyber attack blocking unit 240 blocks a network in which a cyber attack or abnormal traffic is detected among a plurality of networks (router 108, IT network 120, OT network 150, and crew network 130). The cyber attack blocker 240 detects cyber attacks or abnormalities among a plurality of networks (router 108, IT network 120, OT network 150, crew network 130) based on the index included in the risk evaluation matrix. Block networks where traffic has been detected.

시나리오 제공부(250)는 위험도 평가 결과에 대응하는 (위험도) 시나리오를 추출하여 제공한다.The scenario providing unit 250 extracts and provides a (risk level) scenario corresponding to the risk evaluation result.

도 3은 본 실시예에 따른 사이버 보안 관리 시스템의 기능을 나타낸 도면이다.3 is a diagram showing the functions of the cyber security management system according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 가시성 기능, 보안성 기능, 보안 컴플라이언스 기능을 제공한다.The autonomous vessel cyber security management system 100 provides a visibility function, a security function, and a security compliance function.

자율운항 선박 사이버 보안 관리 시스템(100)은 가시성 기능으로 자산 인벤토리 검색 및 유지 관리한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 가시성 기능으로 IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130)에 대한 사이버 위험도를 산출한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 사이버 위험도를 기반으로 승무원이 불안정하게 행동하는 시점을 파악한다.The autonomous vessel cyber security management system 100 searches and maintains an asset inventory with a visibility function. The autonomous vessel cyber security management system 100 calculates cyber risks for the IT network 120 , the OT network 150 , and the crew network 130 as a visibility function. The autonomous vessel cyber security management system 100 determines when a crew member behaves unsafely based on a degree of cyber risk.

자율운항 선박 사이버 보안 관리 시스템(100)은 보안성 기능으로 사이버 공격이 발생했을 때 대처 방법 및 긴급 상황을 제공한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 보안성 기능으로 필요할 때 보안 운영 전문 지식에 액세스를 허용한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 보안성 기능으로 기업 사이버 모니터링 기능을 차량에 확장하여 적용 가능하다.The autonomous ship cyber security management system 100 provides a countermeasure method and an emergency situation when a cyber attack occurs as a security function. The autonomous vessel cybersecurity management system 100 allows access to security operations expertise when needed as a security function. The autonomous vessel cyber security management system 100 can be applied by extending a corporate cyber monitoring function to a vehicle as a security function.

자율운항 선박 사이버 보안 관리 시스템(100)은 보안 컴플라이언스 기능으로 사이버 정책 위반 시점을 파악한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 선박 사이버 보안 관리 현황을 검사관에게 증명 가능하다.The autonomous ship cyber security management system 100 identifies the cyber policy violation time with a security compliance function. The autonomous ship cyber security management system 100 can prove the ship cyber security management status to an inspector.

도 4는 본 실시예에 따른 사이버 보안 관리 시스템의 구성을 나타낸 도면이다.4 is a diagram showing the configuration of a cyber security management system according to this embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 시각화부, 사용자 입력부, 분석 및 제어부, 데이터 수집부, 에이전트, 앱서버, 데이터베이스, OT 센싱부를 포함한다.The autonomous ship cyber security management system 100 includes a visualization unit, a user input unit, an analysis and control unit, a data collection unit, an agent, an app server, a database, and an OT sensing unit.

데이터 수집부는 로컬 데이터를 수집한다. 데이터 수집부는 IT 네트워크(120)에 설치된 에이전트로부터 IT 네트워크 데이터를 수집한다. 데이터 수집부는 승무원 네트워크(130)로부터 승무원 네트워크 데이터를 수집한다.The data collection unit collects local data. The data collection unit collects IT network data from agents installed in the IT network 120 . The data collection unit collects crew member network data from the crew member network 130 .

데이터 수집부는 OT 네트워크(150)에 설치된 OT 네트워크 모니터링 센서로부터 OT 네트워크 데이터를 수집한다. 데이터 수집부는 IT 네트워크 데이터, OT 네트워크 데이터, 승무원 네트워크 데이터를 취합한 취합 데이터를 생성한다. 데이터 수집부는 대역폭 사용을 최적화하기 위해 취합 데이터를 압축한다. 데이터 수집부는 취합 데이터에 최대 프로토콜 범위를 위한 개방형 스택을 적용한다.The data collection unit collects OT network data from OT network monitoring sensors installed in the OT network 150 . The data collection unit generates aggregated data by collecting IT network data, OT network data, and crew network data. The data collection unit compresses the aggregated data to optimize bandwidth usage. The data collection unit applies an open stack for maximum protocol coverage to the collection data.

분석 및 제어부는 사이버공격 또는 비정상 트래픽이 감지되면, 해당 해킹정보를 시각화부에 전송하여 출력하도록 한다.When a cyberattack or abnormal traffic is detected, the analysis and control unit transmits the corresponding hacking information to the visualization unit and outputs it.

분석 및 제어부는 중앙 집중식 분석을 수행하여 사이버 및 컴플라이언스 위험도에 대한 머신 러닝을 감지한다. 분석 및 제어부는 클라우드를 이용하여 취합 데이터를 분석할 수 있다. 분석 및 제어부는 취합 데이터를 기반으로 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 중 어느 하나의 네트워크에 대한 사이버 공격 또는 비정상 트래픽이 감지되면, 확산을 방지하기 위해 해당 네트워크를 차단한다.The analytics and control unit performs centralized analytics to detect machine learning for cyber and compliance risks. The analysis and control unit may analyze the collected data using the cloud. The analysis and control unit detects a cyber attack or abnormal traffic to any one of the router 108, the IT network 120, the OT network 150, and the crew network 130 based on the collected data, preventing the spread to block the network.

시각화부는 보안 정보(Security information)와 이벤트 관리(event management)를 수행한다. 시각화부는 선단 관리 대시보드를 포함한다. 시각화부는 위험 기반 점수 및 리포트 정보를 생성한다. 시각화부는 자산 목록 및 구성도를 생성하여 출력한다.The visualization unit performs security information and event management. The visualization unit includes a fleet management dashboard. The visualization unit generates risk-based scores and report information. The visualization unit creates and outputs an asset list and configuration diagram.

도 5는 본 실시예에 따른 위험도 평가 매트릭스를 나타낸 도면이다.5 is a diagram showing a risk evaluation matrix according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 위험도 평가 매트릭스(Risk Assessment Matrix)를 생성한다.The autonomous vessel cyber security management system 100 evaluates each of the router 108, the IT network 120, the OT network 150, and the crew network 130 to generate a risk assessment matrix.

자율운항 선박 사이버 보안 관리 시스템(100)은 임팩트(Impact)를 1~25로 결정한다.The autonomous ship cyber security management system 100 determines an impact of 1 to 25.

자율운항 선박 사이버 보안 관리 시스템(100)은 임팩트가 1~7인 경우 낮음(Low)으로 판단하고, 임팩트가 8~14인 경우 중요(Significant)로 판단하고, 임팩트가 15~25인 경우 심각(Major)으로 판단한다.The autonomous vessel cyber security management system 100 determines that the impact is low when the impact is 1 to 7, determines it to be significant when the impact is 8 to 14, and determines it to be significant when the impact is 15 to 25 ( Major).

자율운항 선박 사이버 보안 관리 시스템(100)은 5개의 임팩트가 모두 낮음(Low)으로 판단된 경우, 사이버 공격에 대한 확률 인덱스(Probability Index)를 ‘1’로 결정한다.The autonomous vessel cyber security management system 100 determines a probability index for cyber attack as '1' when all five impacts are determined to be low.

자율운항 선박 사이버 보안 관리 시스템(100)은 5개의 임팩트 중 3개가 낮음(Low)으로 판단되고, 2개가 중요(Significant)로 판단된 경우, 사이버 공격에 대한 확률 인덱스(Probability Index)를 ‘2’로 결정한다.The autonomous ship cyber security management system 100 sets the probability index for cyber attacks to '2' when three of the five impacts are determined to be low and two are determined to be significant. to decide

자율운항 선박 사이버 보안 관리 시스템(100)은 5개의 임팩트 중 2개가 낮음(Low)으로 판단되고, 2개가 중요(Significant)로 판단되고, 1개가 심각(Major)으로 판단된 경우, 사이버 공격에 대한 확률 인덱스(Probability Index)를 ‘3’으로 결정한다.In the autonomous ship cyber security management system 100, when two of the five impacts are determined to be low, two are determined to be significant, and one is determined to be major, Determine the probability index as '3'.

자율운항 선박 사이버 보안 관리 시스템(100)은 5개의 임팩트 중 1개가 낮음(Low)으로 판단되고, 2개가 중요(Significant)로 판단되고, 2개가 심각(Major)으로 판단된 경우, 사이버 공격에 대한 확률 인덱스(Probability Index)를 ‘4’로 결정한다.In the autonomous ship cyber security management system 100, when one of the five impacts is determined to be low, two are determined to be significant, and two are determined to be significant, the cyber attack Determine the probability index as '4'.

자율운항 선박 사이버 보안 관리 시스템(100)은 5개의 임팩트 중 1개가 낮음(Low)으로 판단되고, 1개가 중요(Significant)로 판단되고, 3개가 심각(Major)으로 판단된 경우, 사이버 공격에 대한 확률 인덱스(Probability Index)를 ‘5’로 결정한다.In the autonomous ship cyber security management system 100, when one of the five impacts is determined to be low, one is determined to be significant, and three are determined to be major, the cyber attack Determine the probability index as '5'.

도 6a, 6b, 6c는 본 실시예에 따른 임팩트(중요도) 인덱스를 나타낸 도면이다.6a, 6b, and 6c are diagrams illustrating impact (importance) indexes according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 임팩트(중요도(Criticality)) 인덱스를 기밀성 인덱스(Confidentiality Index), 무결성 인덱스(Integrity Index), 가용성 인덱스(Availability Index)로 구분한다.The autonomous ship cyber security management system 100 divides the impact (criticality) index into a confidentiality index, an integrity index, and an availability index.

자율운항 선박 사이버 보안 관리 시스템(100)은 기밀성 인덱스, 무결성 인덱스, 가용성 인덱스 각각에 대해 5 위기(Critical), 4 중요(Significant), 3 절제(Moderate), 2 마이너(Minor), 1 무시가능(Negligible) 중 하나의 값으로 결정한다.The autonomous ship cyber security management system 100 has 5 Critical, 4 Significant, 3 Moderate, 2 Minor, and 1 negligible for each of the confidentiality index, integrity index, and availability index ( Negligible) is determined by one of the values.

자율운항 선박 사이버 보안 관리 시스템(100)은 기밀성 인덱스, 무결성 인덱스, 가용성 인덱스를 가산한 값을 자산 중요도 값(Asset criticality value)으로 산출하고, 자산 중요도 값(Confidentiality Index + Integrity Index + Availability Index)을 임팩드 인덱스로 인식한다.The autonomous vessel cyber security management system 100 calculates a value obtained by adding the confidentiality index, the integrity index, and the availability index as an asset criticality value, and the asset criticality value (Confidentiality Index + Integrity Index + Availability Index) It is recognized as an impact index.

자율운항 선박 사이버 보안 관리 시스템(100)은 자산 중요도 값을 기 설정된 기준(3 ≤ Index 1 ≤ 4, 5 ≤ Index 2 ≤ 6, 7 ≤ Index 3 ≤ 9, 10 ≤ Index 4 ≤ 12, 13 ≤ Index 5 ≤ 15)에 따라 결정한다.The autonomous ship cyber security management system 100 sets the asset importance value to a preset standard (3 ≤ Index 1 ≤ 4, 5 ≤ Index 2 ≤ 6, 7 ≤ Index 3 ≤ 9, 10 ≤ Index 4 ≤ 12, 13 ≤ Index 5 ≤ 15).

자율운항 선박 사이버 보안 관리 시스템(100)은 3 ≤ 자산 중요도 값 ≤ 4인 경우, 해당 자산 중요도 값을 인덱스 1(Index 1)로 결정한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 5 ≤ 자산 중요도 값 ≤ 6인 경우, 해당 자산 중요도 값을 인덱스 2(Index 2)로 결정한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 7 ≤ 자산 중요도 값 ≤ 9인 경우, 해당 자산 중요도 값을 인덱스 3(Index 3)으로 결정한다.When 3 ≤ asset importance value ≤ 4, the autonomous vessel cyber security management system 100 determines the corresponding asset importance value as index 1 (Index 1). When 5 ≤ asset importance value ≤ 6, the autonomous vessel cyber security management system 100 determines the corresponding asset importance value as index 2 (Index 2). When 7 ≤ asset importance value ≤ 9, the autonomous vessel cyber security management system 100 determines the corresponding asset importance value as Index 3.

자율운항 선박 사이버 보안 관리 시스템(100)은 10 ≤ 자산 중요도 값 ≤ 12인 경우, 해당 자산 중요도 값을 인덱스 4(Index 4)로 결정한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 13 ≤ 자산 중요도 값 ≤ 15인 경우, 해당 자산 중요도 값을 인덱스 5(Index 5)로 결정한다.When 10 ≤ asset importance value ≤ 12, the autonomous ship cyber security management system 100 determines the corresponding asset importance value as Index 4. When 13 ≤ asset importance value ≤ 15, the autonomous ship cyber security management system 100 determines the corresponding asset importance value as Index 5.

도 7a, 7b는 본 실시예에 따른 확률 인덱스를 나타낸 도면이다.7a and 7b are diagrams showing probability indexes according to this embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 확률 인덱스(Probability Index)를 위협 인덱스(Threat Index), 취약성 인덱스(Vulnerability Index)로 구분한다.The autonomous ship cyber security management system 100 divides a probability index into a threat index and a vulnerability index.

자율운항 선박 사이버 보안 관리 시스템(100)은 위협 인덱스를 5 확실(Definite), 4 가능(Probable), 3 일시적(Occasional), 2 먼(Remote), 1 불가능(Improbable) 중 하나의 값으로 결정한다.The autonomous ship cyber security management system 100 determines the threat index as one of 5 Definite, 4 Probable, 3 Occasional, 2 Remote, and 1 Improbable. .

자율운항 선박 사이버 보안 관리 시스템(100)은 취약성 인덱스를 5 매우 높음(Very high), 4 높음(High), 3 중간(Medium), 2 낮음(Low), 1 매우 낮음(Very Low) 중 하나의 값으로 결정한다.The autonomous ship cyber security management system 100 sets the vulnerability index to one of 5 Very high, 4 High, 3 Medium, 2 Low, and 1 Very Low. determined by the value

자율운항 선박 사이버 보안 관리 시스템(100)은 위협 인덱스와 취약성 인덱스의 곱을 사이버 공격 확률값(Cyber attack probability value)으로 산출하고, 사이버 공격 확률값(Threat Index × Vulnerability Index)을 확률 인덱스로 인식한다.The autonomous ship cyber security management system 100 calculates the product of the threat index and the vulnerability index as a cyber attack probability value, and recognizes the cyber attack probability value (Threat Index × Vulnerability Index) as the probability index.

자율운항 선박 사이버 보안 관리 시스템(100)은 사이버 공격 확률값이 기 설정된 기준(1 ≤ Index 1 ≤ 5, 6 ≤ Index 2 ≤ 10, 11 ≤ Index 3 ≤ 15, 16 ≤ Index 4 ≤ 20, 21 ≤ Index 5 ≤ 25)에 따라 결정한다.The autonomous vessel cyber security management system 100 determines the cyber attack probability value based on a preset standard (1 ≤ Index 1 ≤ 5, 6 ≤ Index 2 ≤ 10, 11 ≤ Index 3 ≤ 15, 16 ≤ Index 4 ≤ 20, 21 ≤ Index 5 ≤ 25).

자율운항 선박 사이버 보안 관리 시스템(100)은 1 ≤ 사이버 공격 확률값 ≤ 5인 경우, 해당 자산 중요도 값을 인덱스 1(Index 1)로 결정한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 6 ≤ 사이버 공격 확률값 ≤ 10인 경우, 해당 자산 중요도 값을 인덱스 2(Index 2)로 결정한다.When 1 ≤ cyber attack probability value ≤ 5, the autonomous ship cyber security management system 100 determines the asset importance value as index 1 (Index 1). When 6 ≤ cyber attack probability value ≤ 10, the autonomous ship cyber security management system 100 determines the asset importance value as Index 2 (Index 2).

자율운항 선박 사이버 보안 관리 시스템(100)은 11 ≤ 사이버 공격 확률값 ≤ 15인 경우, 해당 자산 중요도 값을 인덱스 3(Index 3)으로 결정한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 16 ≤ 사이버 공격 확률값 ≤ 20인 경우, 해당 자산 중요도 값을 인덱스 4(Index 4)로 결정한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 21 ≤ 사이버 공격 확률값 ≤ 25인 경우, 해당 자산 중요도 값을 인덱스 5(Index 5)로 결정한다.When 11 ≤ cyber attack probability value ≤ 15, the autonomous vessel cyber security management system 100 determines the asset importance value as Index 3. When 16 ≤ cyber attack probability value ≤ 20, the autonomous vessel cyber security management system 100 determines the asset importance value as Index 4. When 21 ≤ cyber attack probability value ≤ 25, the autonomous vessel cyber security management system 100 determines the corresponding asset importance value as Index 5.

도 8은 본 실시예에 따른 위협 리스트를 나타낸 도면이다.8 is a diagram showing a threat list according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 위협 리스트(Threat List)의 공격자를 외부자(원격), 외부자(방선), 내부자(원격), 내부자(승무원)로 확인한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 의도를 의도적 또는 비의도적으로 확인한다.The autonomous ship cyber security management system 100 identifies an attacker in a threat list as an outsider (remote), an outsider (radio), an insider (remote), and an insider (crew). The autonomous ship cyber security management system 100 verifies the intent intentionally or unintentionally.

자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘계정 탈취’로 판별한 경우 코드를 T101을 할당하고 위협 인덱스(TI: Threat Index)를 ‘5’로 결정한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘권한 남용’으로 판별한 경우 코드를 T102을 할당하고 위협 인덱스(TI: Threat Index)를 ‘4’로 결정한다.When the autonomous ship cyber security management system 100 determines that the threat factor is 'account hijacking', the code is assigned T101 and the threat index (TI: Threat Index) is determined to be '5'. When the autonomous ship cyber security management system 100 determines that the threat factor is 'abuse of authority', the code is assigned T102 and the threat index (TI: Threat Index) is determined to be '4'.

자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘비인가자 접근’으로 판별한 경우 코드를 T103을 할당하고 위협 인덱스(TI: Threat Index)를 ‘4’로 결정한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘비인가 USB 사용’으로 판별한 경우 코드를 T201을 할당하고 위협 인덱스(TI: Threat Index)를 ‘4’로 결정한다.When the autonomous ship cyber security management system 100 determines that the threat factor is 'unauthorized access', the code is assigned T103 and the threat index (TI: Threat Index) is determined to be '4'. When the autonomous vessel cyber security management system 100 determines that the threat factor is 'unauthorized USB use', the code is assigned T201 and the threat index (TI: Threat Index) is determined to be '4'.

자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘비인가 단말기’로 판별한 경우 코드를 T202을 할당하고 위협 인덱스(TI: Threat Index)를 ‘4’로 결정한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘불법 SW 설치’로 판별한 경우 코드를 T203을 할당하고 위협 인덱스(TI: Threat Index)를 ‘4’로 결정한다.When the autonomous ship cyber security management system 100 determines that the threat factor is 'unauthorized terminal', the code is assigned T202 and the threat index (TI: Threat Index) is determined to be '4'. When the autonomous ship cyber security management system 100 determines that the threat factor is 'illegal SW installation', the code is assigned T203 and the threat index (TI: Threat Index) is determined to be '4'.

자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘운영 실수’로 판별한 경우 코드를 T204을 할당하고 위협 인덱스(TI: Threat Index)를 ‘2’로 결정한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘DDOS’로 판별한 경우 코드를 T301을 할당하고 위협 인덱스(TI: Threat Index)를 ‘5’로 결정한다.When the autonomous vessel cyber security management system 100 determines that the threat factor is 'operation mistake', the code is assigned T204 and the threat index (TI: Threat Index) is determined to be '2'. When the autonomous ship cyber security management system 100 determines that the threat factor is 'DDOS', the code is assigned T301 and the threat index (TI: Threat Index) is determined to be '5'.

자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘악성코드’로 판별한 경우 코드를 T302을 할당하고 위협 인덱스(TI: Threat Index)를 ‘5’로 결정한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘개인정보 악용’으로 판별한 경우 코드를 T401을 할당하고 위협 인덱스(TI: Threat Index)를 ‘4’로 결정한다.When the autonomous ship cyber security management system 100 determines that the threat factor is 'malicious code', the code is assigned T302 and the threat index (TI: Threat Index) is determined to be '5'. When the autonomous vessel cyber security management system 100 determines that the threat factor is 'abuse of personal information', the code is assigned T401 and the threat index (TI: Threat Index) is determined to be '4'.

자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘정보의 변조/변경’으로 판별한 경우 코드를 T402을 할당하고 위협 인덱스(TI: Threat Index)를 ‘5’로 결정한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘정보 유출’로 판별한 경우 코드를 T403을 할당하고 위협 인덱스(TI: Threat Index)를 ‘4’로 결정한다.When the autonomous ship cyber security management system 100 determines that the threat factor is 'falsification/change of information', the code is assigned T402 and the threat index (TI: Threat Index) is determined to be '5'. When the autonomous ship cyber security management system 100 determines that the threat factor is 'information leakage', the code is assigned T403 and the threat index (TI: Threat Index) is determined to be '4'.

자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘침해부인’으로 판별한 경우 코드를 T404을 할당하고 위협 인덱스(TI: Threat Index)를 ‘4’로 결정한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘하드웨어 결함’으로 판별한 경우 코드를 T501을 할당하고 위협 인덱스(TI: Threat Index)를 ‘3’으로 결정한다.When the autonomous ship cyber security management system 100 determines that the threat factor is 'denial of infringement', the code is assigned T404 and the threat index (TI: Threat Index) is determined to be '4'. When the autonomous vessel cyber security management system 100 determines that the threat factor is 'hardware defect', the code is assigned T501 and the threat index (TI: Threat Index) is determined to be '3'.

자율운항 선박 사이버 보안 관리 시스템(100)은 위협 요인을 ‘정전’으로 판별한 경우 코드를 T51을 할당하고 위협 인덱스(TI: Threat Index)를 ‘3’으로 결정한다.When the autonomous ship cyber security management system 100 determines that the threat factor is 'power outage', the code is assigned T51 and the threat index (TI: Threat Index) is determined to be '3'.

도 9는 본 실시예에 따른 취약점 점수를 나타낸 도면이다.9 is a diagram showing vulnerability scores according to this embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 복수의 취약점을 추출한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 복수의 취약점에 따른 점수를 산출한다.The autonomous ship cyber security management system 100 evaluates each of the router 108, the IT network 120, the OT network 150, and the crew network 130 to extract a plurality of vulnerabilities. The autonomous ship cyber security management system 100 calculates scores according to a plurality of vulnerabilities.

자율운항 선박 사이버 보안 관리 시스템(100)은 취약점으로 ‘계정 관리’가 필요한 것으로 판별한 경우, 취약성 점수를 ‘5’로 산출한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 취약점으로 ‘네트워크 관리’가 필요한 것으로 판별한 경우, 취약성 점수를 ‘5’로 산출한다.When the autonomous ship cyber security management system 100 determines that 'account management' is required as a vulnerability, the vulnerability score is calculated as '5'. When the autonomous ship cyber security management system 100 determines that 'network management' is necessary as a vulnerability, the vulnerability score is calculated as '5'.

자율운항 선박 사이버 보안 관리 시스템(100)은 취약점으로 ‘보안 관리’가 필요한 것으로 판별한 경우, 취약성 점수를 ‘4’로 산출한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 취약점으로 ‘서비스 관리’가 필요한 것으로 판별한 경우, 취약성 점수를 ‘4’로 산출한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 취약점으로 ‘자산 관리’가 필요한 것으로 판별한 경우, 취약성 점수를 ‘3’으로 산출한다.When the autonomous ship cyber security management system 100 determines that 'security management' is required as a vulnerability, the vulnerability score is calculated as '4'. When the autonomous ship cyber security management system 100 determines that 'service management' is necessary as a vulnerability, the vulnerability score is calculated as '4'. When the autonomous ship cyber security management system 100 determines that 'asset management' is required as a vulnerability, the vulnerability score is calculated as '3'.

자율운항 선박 사이버 보안 관리 시스템(100)은 취약점으로 ‘로그 관리’가 필요한 것으로 판별한 경우, 취약성 점수를 ‘3’으로 산출한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 취약점으로 ‘패치 관리’가 필요한 것으로 판별한 경우, 취약성 점수를 ‘4’로 산출한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 취약점으로 ‘설정 관리’가 필요한 것으로 판별한 경우, 취약성 점수를 ‘3’으로 산출한다.When the autonomous vessel cyber security management system 100 determines that 'log management' is necessary as a vulnerability, the vulnerability score is calculated as '3'. When the autonomous ship cyber security management system 100 determines that 'patch management' is required as a vulnerability, the vulnerability score is calculated as '4'. When the autonomous ship cyber security management system 100 determines that 'setting management' is required as a vulnerability, the vulnerability score is calculated as '3'.

자율운항 선박 사이버 보안 관리 시스템(100)은 취약점으로 ‘접근 관리’가 필요한 것으로 판별한 경우, 취약성 점수를 ‘4’로 산출한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 취약점으로 ‘파일 관리’가 필요한 것으로 판별한 경우, 취약성 점수를 ‘3’으로 산출한다. 자율운항 선박 사이버 보안 관리 시스템(100)은 취약점으로 ‘정책 관리’가 필요한 것으로 판별한 경우, 취약성 점수를 ‘4’로 산출한다.When the autonomous ship cyber security management system 100 determines that 'access management' is required as a vulnerability, the vulnerability score is calculated as '4'. When the autonomous ship cyber security management system 100 determines that 'file management' is necessary as a vulnerability, it calculates the vulnerability score as '3'. When the autonomous ship cyber security management system 100 determines that 'policy management' is necessary as a vulnerability, the vulnerability score is calculated as '4'.

도 10은 본 실시예에 따른 위험도 시나리오 중 계정 탈취 시나리오를 나타낸 도면이다.10 is a diagram illustrating an account extortion scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 계정 탈취에 대응하는 시나리오를 제공하는 방법을 설명한다.Autonomous vessel cyber security management system 100 describes a method for providing scenarios corresponding to account theft by evaluating each of router 108, IT network 120, OT network 150, and crew network 130 .

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보를 외부(경쟁사/기관) 등으로 유출이 발생한 경우, 위협 요인을 ‘계정 탈취’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'account hijacking' and provides a response scenario when important information is leaked to the outside (competitor/institution) by accessing the system.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘계정 탈취’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'account hijacking' when business (operation) delays occur due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘계정 탈취’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'account hijacking' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연 발생한 경우, 위협 요인을 ‘계정 탈취’로 인지하여 대응 시나리오를 제공한다.The cyber security management system 100 for autonomous ships recognizes the threat factor as 'account hijacking' and provides a response scenario in the event of intentional delay in business (operation) by accessing and changing unauthorized information.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자가 무작위 로그인 시도하여 계정 탈취하여 중요정보 변조 및 파괴가 발생한 경우, 위협 요인을 ‘계정 탈취’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'account hijacking' and provides a response scenario when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 악성코드 전파가 발생한 경우, 위협 요인을 ‘계정 탈취’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'account hijacking' and provides a response scenario when a malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.

자율운항 선박 사이버 보안 관리 시스템(100)은 중요 시스템 무단 변조(조작) 업무 지연 / 작동 중단이 발생한 경우, 위협 요인을 ‘계정 탈취’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'account takeover' in the event of unauthorized tampering (manipulation) of important systems, business delays/operation interruptions.

자율운항 선박 사이버 보안 관리 시스템(100)은 해커에 의해 중요정보(네트워크/화물/금융정보) 유출이 발생한 경우, 위협 요인을 ‘계정 탈취’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'account hijacking' when important information (network/cargo/financial information) is leaked by a hacker.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자의 임의 조작으로 인한 시스템 중단이 발생한 경우, 위협 요인을 ‘계정 탈취’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'account hijacking' and provides a response scenario when system shutdown occurs due to unauthorized person's arbitrary manipulation.

자율운항 선박 사이버 보안 관리 시스템(100)은 OT 네트워크(150)에 대한 임의 조작 / 중요정보 변조로 인한 운항 사고가 발생한 경우, 위협 요인을 ‘계정 탈취’로 인지하여 대응 시나리오를 제공한다.When a navigation accident occurs due to arbitrary manipulation of the OT network 150 / alteration of important information, the autonomous ship cyber security management system 100 recognizes the threat factor as 'account hijacking' and provides a response scenario.

도 11은 본 실시예에 따른 위험도 시나리오 중 권한 남용 시나리오를 나타낸 도면이다.11 is a diagram illustrating a privilege abuse scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 권한 남용에 대응하는 시나리오를 제공하는 방법을 설명한다.An autonomous ship cyber security management system (100) describes a method for evaluating each of a router (108), an IT network (120), an OT network (150), and a crewman network (130) to provide a scenario to respond to abuse of authority. .

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보를 외부(경쟁사/기관) 등으로 유출이 발생한 경우, 위협 요인을 ‘내부정보 유출’로 인지하여 ‘권한 남용’이 발생한 것으로 인지한다.The autonomous ship cyber security management system 100 recognizes that 'abuse of authority' has occurred by recognizing the threat factor as 'internal information leakage' when important information is leaked to the outside (competitor/institution) after accessing the system. do.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘내부정보 변조’로 인지하여 ‘권한 남용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'internal information tampering' and recognizes it as 'authority abuse' and provides response scenarios when business (operation) delays occur due to access to the system and change of important information. do.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘내부정보 파괴’로 인지하여 ‘권한 남용’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'destruction of internal information' and recognizes it as 'abuse of authority' to provide response scenarios in the case of stealing important information and malicious behavior by accessing administrator/user rights do.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연 발생한 경우, 위협 요인을 ‘운항정보 유출’로 인지하여 ‘권한 남용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'disclosure of navigation information' and recognizes it as 'abuse of authority' to provide response scenarios in case of intentional delay in business (flight) due to access to and change of unauthorized information. do.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 악성코드 전파가 발생한 경우, 위협 요인을 ‘운항정보 변조’로 인지하여 ‘권한 남용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'falsification of flight information' and recognizes it as 'abuse of authority' when malicious code propagation occurs by connecting to the internal network with an unauthorized terminal, and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 중요 시스템 무단 변조(조작) 업무 지연 / 작동 중단이 발생한 경우, 위협 요인을 ‘운항정보 파괴’로 인지하여 ‘권한 남용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'destruction of navigation information' and recognizes it as 'abuse of authority' to provide response scenarios in the event of unauthorized modification (manipulation) of important systems, delays/operation interruptions, etc. .

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 중요정보 접근 및 OT 네트워크(150)에 대한 임의 조작이 발생한 경우, ‘운항 지연/사고’로 인지하여 위협 요인을 ‘권한 남용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system (100) recognizes 'delay/accident' as a threat factor when accessing important information and arbitrary manipulation of the OT network (150) by connecting to the internal network with an unauthorized terminal ' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 해커에 의해 중요정보(네트워크/화물/금융정보) 유출이 발생한 경우,‘환경 오염’으로 인지하여 위협 요인을 ‘권한 남용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes 'environmental pollution' as an 'environmental pollution' when important information (network/cargo/financial information) is leaked by a hacker, recognizes the threat factor as 'authority abuse', and provides a response scenario. do.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자의 임의 조작으로 인한 시스템 중단이 발생한 경우, ‘인명 사고’로 인지하여 위협 요인을 ‘권한 남용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes a 'life accident' when a system shutdown occurs due to arbitrary manipulation by an unauthorized person, recognizes the threat factor as 'authority abuse', and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 OT 네트워크(150)의 임의 조작 / 중요정보 변조하여 운항 사고가 발생한 경우, 위협 요인을 ‘권한 남용’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'authority abuse' and provides a response scenario when a navigation accident occurs due to arbitrary manipulation/modulation of important information of the OT network 150.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘권한 남용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'authority abuse' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 취약한 서비스의 포트를 통한 침입에 노출이 발생한 경우, 위협 요인을 ‘권한 남용’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'authority abuse' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 제로데이 어택에 노출이 발생한 경우, 위협 요인을 ‘권한 남용’으로 인지하여 대응 시나리오를 제공한다.When exposure to a zero-day attack occurs, the autonomous ship cyber security management system 100 recognizes the threat factor as 'authority abuse' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 안정성이 검증되지 않은 패치 실행으로 시스템 장애 발생한 경우, 위협 요인을 ‘권한 남용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'authority abuse' and provides a response scenario when a system failure occurs due to the execution of a patch whose stability has not been verified.

도 12는 본 실시예에 따른 위험도 시나리오 중 정보 변조/변경 시나리오를 나타낸 도면이다.12 is a diagram illustrating information tampering/altering scenarios among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 정보 변조/변경 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.How the autonomous ship cyber security management system 100 evaluates each of the router 108, the IT network 120, the OT network 150, and the crew network 130 to provide a scenario corresponding to an information tampering/altering scenario explain

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, ‘내부정보 유출’로 인지하여 위협 요인을 ‘정보 변조/변경’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 accesses the system and changes important information to cause business (operation) delays by accessing the system, recognizing it as 'internal information leakage' and changing the threat factor to 'information falsification/alteration'. Recognize and provide countermeasure scenarios.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, ‘내부정보 변조’로 인지하여 위협 요인을 ‘정보 변조/변경’으로 인지하여 대응 시나리오를 제공한다.Autonomous ship cyber security management system 100 recognizes 'internal information tampering' and recognizes the threat as 'information tampering/altering' in the event of stealing important information and malicious behavior by accessing administrator/user privileges, and responding to scenarios provides

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연이 발생한 경우, ‘내부정보 파괴’로 인지하여 위협 요인을 ‘정보 변조/변경’으로 인지하여 대응 시나리오를 제공한다.The cyber security management system 100 for autonomous vessels responds by recognizing the threat as 'information tampering/altering' by recognizing it as 'internal information destruction' in case of intentional delay in business (operation) due to access to and modification of unauthorized information. provide a scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자가 무작위 로그인 시도하여 계정 탈취하여 중요정보 변조 및 파괴가 발생한 경우, ‘운항정보 유출’로 인지하여 위협 요인을 ‘정보 변조/변경’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system (100) recognizes as 'disclosure of navigation information' and responds by recognizing the threat factor as 'information tampering/altering' when an unauthorized person attempts to log in at random and steals an account and falsification or destruction of important information occurs. provide a scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 패스워드(PW)가 암호화 저장되어있지 않아 해커 침입시 계정 탈취가 발생한 경우, ‘운항정보 변조’로 인지하여 위협 요인을 ‘정보 변조/변경’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'falsification/altering of information' when an account is stolen when a hacker infiltrates because the password (PW) is not encrypted and stored. Provide response scenarios.

자율운항 선박 사이버 보안 관리 시스템(100)은 중요 시스템 무단 변조(조작) 업무 지연 / 작동 중단이 발생한 경우, ‘운항정보 파괴’로 인지하여 위협 요인을 ‘정보 변조/변경’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes 'destruction of navigation information' in the case of unauthorized modification (manipulation) of important systems, and 'destruction of operational information' in case of unauthorized modification (manipulation) of important systems, and recognizes the threat factor as 'information alteration/alteration' to develop a response scenario. to provide.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자의 임의 조작으로 인한 시스템 중단이 발생한 경우, ‘운항 지연/사고’로 인지하여 위협 요인을 ‘정보 변조/변경’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes 'delay/accident' as a 'delay/accident' and recognizes the threat factor as 'information falsification/alteration' in the event of a system shutdown due to arbitrary manipulation by an unauthorized person, and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 OT 네트워크(150)에 대한 임의 조작 / 중요정보 변조하여 운항 사고가 발생한 경우, ‘환경 오염’으로 인지하여 위협 요인을 ‘정보 변조/변경’으로 인지하여 대응 시나리오를 제공한다.When a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150, the autonomous vessel cyber security management system 100 recognizes it as 'environmental pollution' and recognizes the threat as 'information alteration/alteration' Provide response scenarios.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, ‘인명 사고’로 인지하여 위협 요인을 ‘정보 변조/변경’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes a threat factor as 'information tampering/altering' in case of delay in business (operation) due to access to the system and changes in important information, and responds to scenarios. to provide.

자율운항 선박 사이버 보안 관리 시스템(100)은 누락된 보안 패치로 인해 사이버공격에 취약이 발생한 경우, 위협 요인을 ‘정보 변조/변경’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'information falsification/change' when vulnerability to cyber attacks occurs due to missing security patches.

도 13은 본 실시예에 따른 위험도 시나리오 중 정보 유출 시나리오를 나타낸 도면이다.13 is a diagram illustrating an information leakage scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 정보 유출 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.Autonomous vessel cyber security management system 100 describes a method for providing a scenario corresponding to an information leakage scenario by evaluating each of the router 108, the IT network 120, the OT network 150, and the crew network 130 do.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보를 외부(경쟁사/기관) 등으로 유출이 발생한 경우, 위협 요인을 ‘정보 유출’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'information leakage' when important information is leaked to the outside (competitor/institution) by accessing the system.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘정보 유출’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'information leakage' when important information stealing or malicious behavior occurs by accessing administrator/user rights.

자율운항 선박 사이버 보안 관리 시스템(100)은 패스워드(PW)가 암호화 저장되어있지 않아 해커 침입시 계정 탈취 발생한 경우, 위협 요인을 ‘정보 유출’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'information leakage' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.

자율운항 선박 사이버 보안 관리 시스템(100)은 해커에 의해 중요정보(네트워크/화물/금융정보) 유출이 발생한 경우, 위협 요인을 ‘정보 유출’로 인지하여 대응 시나리오를 제공한다.When important information (network/cargo/financial information) is leaked by a hacker, the autonomous ship cyber security management system 100 recognizes the threat factor as 'information leak' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 취약한 서비스의 포트를 통한 침입에 노출이 발생한 경우, 위협 요인을 ‘정보 유출’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'information leakage' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 제로데이 어택에 노출이 발생한 경우, 위협 요인을 ‘정보 유출’로 인지하여 대응 시나리오를 제공한다.When exposure to a zero-day attack occurs, the autonomous ship cyber security management system 100 recognizes the threat factor as 'information leakage' and provides a response scenario.

도 14는 본 실시예에 따른 위험도 시나리오 중 비인가자 접근 시나리오를 나타낸 도면이다.14 is a diagram illustrating an unauthorized person access scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 비인가자 접근 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.The autonomous ship cyber security management system 100 evaluates each router 108, IT network 120, OT network 150, and crew network 130 to provide a scenario corresponding to an unauthorized access scenario. Explain.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보를 외부(경쟁사/기관) 등으로 유출이 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized access' when important information is leaked to the outside (competitor/institution) by accessing the system.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized access' when business (operation) delays occur due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized access' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연이 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized person access' when intentional business (operation) delay occurs due to access to and change of unauthorized information.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자가 무작위 로그인 시도하여 계정 탈취하여 중요정보 변조 및 파괴가 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'unauthorized access' and provides a response scenario when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 패스워드(PW)가 암호화 저장되어있지 않아 해커 침입시 계정 탈취가 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'unauthorized access' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 악성코드 전파가 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'unauthorized access' and provides a response scenario when malicious code propagation occurs by connecting to the internal network with an unauthorized terminal.

자율운항 선박 사이버 보안 관리 시스템(100)은 중요 시스템 무단 변조(조작) 업무 지연 / 작동 중단이 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized access' in case of unauthorized modification (manipulation) of important systems, delay / operation interruption.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 중요정보 접근 및 OT 네트워크(150)에 대한 임의 조작이 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.Autonomous ship cyber security management system 100 recognizes the threat factor as 'unauthorized access' and provides a response scenario when access to important information and arbitrary manipulation of the OT network 150 occurs by connecting to the internal network with an unauthorized terminal do.

자율운항 선박 사이버 보안 관리 시스템(100)은 LAN 포트 제거/변경하여 시스템 중단이 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'unauthorized access' and provides a response scenario when system interruption occurs due to removal/change of the LAN port.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자의 임의 조작으로 인한 시스템 중단이 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'access by an unauthorized person' when system shutdown occurs due to arbitrary manipulation by an unauthorized person.

자율운항 선박 사이버 보안 관리 시스템(100)은 OT 네트워크(150)에 대한 임의 조작 / 중요정보 변조하여 운항 사고 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.When a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150, the autonomous vessel cyber security management system 100 recognizes the threat factor as 'unauthorized access' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 악성코드/랜섬웨어 감염 및 전파가 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized access' when infection and propagation of malicious code/ransomware occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘비인가자 접근’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized access' when business (operation) delays occur due to access to the system and change of important information.

도 15는 본 실시예에 따른 위험도 시나리오 중 비인가 USB 사용 시나리오를 나타낸 도면이다.15 is a diagram illustrating an unauthorized USB use scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 비인가 USB 사용 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.The autonomous ship cyber security management system 100 evaluates each router 108, IT network 120, OT network 150, and crew network 130 to provide a scenario corresponding to an unauthorized USB usage scenario. Explain.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보를 외부(경쟁사/기관) 등으로 유출이 발생한 경우, 위협 요인을 ‘비인가 USB 사용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized USB use' when important information is leaked to the outside (competitor/institution) by accessing the system.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연이 발생한 경우, 위협 요인을 ‘비인가 USB 사용’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized USB use' when intentional business (operation) delay occurs due to access to and change of unauthorized information.

자율운항 선박 사이버 보안 관리 시스템(100)은 악성코드/랜섬웨어 감염 및 전파가 발생한 경우, 위협 요인을 ‘비인가 USB 사용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized USB use' when infection and propagation of malicious code/ransomware occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 악성코드 전파가 발생한 경우, 위협 요인을 ‘비인가 USB 사용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'unauthorized USB use' when a malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 중요정보 접근 및 OT 네트워크(150)에 대한 임의 조작이 발생한 경우, 위협 요인을 ‘비인가 USB 사용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'unauthorized USB use' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal do.

도 16은 본 실시예에 따른 위험도 시나리오 중 불법 SW 설치 시나리오를 나타낸 도면이다.16 is a diagram illustrating an illegal SW installation scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 불법 SW 설치 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.The autonomous ship cyber security management system 100 evaluates each of the router 108, the IT network 120, the OT network 150, and the crew network 130 to provide a scenario corresponding to an illegal SW installation scenario. Explain.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'illegal SW installation' when important information stealing or malicious behavior occurs by accessing administrator/user rights.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연이 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when a deliberate business (operation) delay occurs due to access to and change of unauthorized information.

자율운항 선박 사이버 보안 관리 시스템(100)은 패스워드(PW)가 암호화 저장되어있지 않아 해커 침입시 계정 탈취가 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 악성코드 전파가 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when a malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.

자율운항 선박 사이버 보안 관리 시스템(100)은 중요 시스템 무단 변조(조작) 업무 지연 / 작동 중단이 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario in the case of unauthorized modification (manipulation) of important systems, delay / operation interruption.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 중요정보 접근 및 OT 네트워크(150)에 대한 임의 조작이 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.Autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides response scenarios when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal do.

자율운항 선박 사이버 보안 관리 시스템(100)은 해커에 의해 중요정보(네트워크/화물/금융정보) 유출이 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.When important information (network/cargo/financial information) is leaked by a hacker, the autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 과다한 트래픽 발생시켜 업무 지연이 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.When business delay occurs due to excessive traffic, the autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 OT 네트워크(150)에 대한 임의 조작 / 중요정보 변조하여 운항 사고 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.When a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150, the autonomous vessel cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 악성코드/랜섬웨어 감염 및 전파가 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when infection and propagation of malicious code/ransomware occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템 과부하로 인한 업무 지연이 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'illegal SW installation' when a business delay occurs due to system overload.

자율운항 선박 사이버 보안 관리 시스템(100)은 취약한 서비스의 포트를 통한 침입에 노출이 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 제로데이 어택에 노출이 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.When exposure to a zero-day attack occurs, the autonomous vessel cyber security management system 100 recognizes the threat factor as 'illegal software installation' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 안정성이 검증되지 않은 패치 실행으로 시스템 장애가 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when a system failure occurs due to the execution of a patch whose stability has not been verified.

자율운항 선박 사이버 보안 관리 시스템(100)은 누락된 보안 패치로 인해 사이버공격에 취약이 발생한 경우, 위협 요인을 ‘불법 SW 설치’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'illegal SW installation' and provides a response scenario when vulnerability to cyber attacks occurs due to missing security patches.

도 17은 본 실시예에 따른 위험도 시나리오 중 DDOS 시나리오를 나타낸 도면이다.17 is a diagram showing a DDOS scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 DDOS 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.Autonomous ship cyber security management system 100 describes a method of providing a scenario corresponding to a DDOS scenario by evaluating each of a router 108, an IT network 120, an OT network 150, and a crewman network 130 .

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘DDOS’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'DDOS' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.

자율운항 선박 사이버 보안 관리 시스템(100)은 패스워드(PW)가 암호화 저장되어있지 않아 해커 침입시 계정 탈취가 발생한 경우, 위협 요인을 ‘DDOS’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.

자율운항 선박 사이버 보안 관리 시스템(100)은 악성코드/랜섬웨어 감염 및 전파가 발생한 경우, 위협 요인을 ‘DDOS’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when infection and propagation of malicious code/ransomware occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 중요 시스템 무단 변조(조작) 업무 지연 / 작동 중단이 발생한 경우, 위협 요인을 ‘DDOS’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario in case of unauthorized modification (manipulation) of important systems, delay / operation interruption.

자율운항 선박 사이버 보안 관리 시스템(100)은 해커에 의해 중요정보(네트워크/화물/금융정보) 유출이 발생한 경우, 위협 요인을 ‘DDOS’로 인지하여 대응 시나리오를 제공한다.When important information (network/cargo/financial information) is leaked by a hacker, the autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자의 임의 조작으로 인한 시스템 중단이 발생한 경우, 위협 요인을 ‘DDOS’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when system shutdown occurs due to unauthorized manipulation.

자율운항 선박 사이버 보안 관리 시스템(100)은 과다한 트래픽 발생시켜 업무 지연이 발생한 경우, 위협 요인을 ‘DDOS’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when business delay occurs due to excessive traffic.

자율운항 선박 사이버 보안 관리 시스템(100)은 OT 네트워크(150)에 대한 임의 조작 / 중요정보 변조하여 운항 사고가 발생한 경우, 위협 요인을 ‘DDOS’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘DDOS’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템 과부하로 인한 업무 지연이 발생한 경우, 위협 요인을 ‘DDOS’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'DDOS' and provides a response scenario when a business delay occurs due to system overload.

도 18은 본 실시예에 따른 위험도 시나리오 중 비인가 단말기 시나리오를 나타낸 도면이다.18 is a diagram illustrating an unauthorized terminal scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 비인가 단말기 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.Autonomous ship cyber security management system 100 describes a method of providing a scenario corresponding to an unauthorized terminal scenario by evaluating each of a router 108, an IT network 120, an OT network 150, and a crew member network 130 do.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보를 외부(경쟁사/기관) 등으로 유출이 발생한 경우, 위협 요인을 ‘비인가 단말기’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as an 'unauthorized terminal' and provides a response scenario when important information is leaked to the outside (competitor/institution) by accessing the system.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘비인가 단말기’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when a business (operation) delay occurs due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘비인가 단말기’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when important information stealing or malicious behavior occurs by accessing administrator/user rights.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연 발생이 발생한 경우, 위협 요인을 ‘비인가 단말기’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when a deliberate business (operation) delay occurs due to access to and change of unauthorized information.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자가 무작위 로그인 시도하여 계정 탈취하여 중요정보 변조 및 파괴가 발생한 경우, 위협 요인을 ‘비인가 단말기’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 패스워드(PW)가 암호화 저장되어있지 않아 해커 침입시 계정 탈취가 발생이 발생한 경우, 위협 요인을 ‘비인가 단말기’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as an 'unauthorized terminal' and provides a response scenario when an account theft occurs when a hacker invades because the password (PW) is not encrypted.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 악성코드 전파가 발생한 경우, 위협 요인을 ‘비인가 단말기’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as an 'unauthorized terminal' and provides a response scenario when malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 중요정보 접근 및 OT 네트워크(150)에 대한 임의 조작이 발생한 경우, 위협 요인을 ‘비인가 단말기’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as an 'unauthorized terminal' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal .

자율운항 선박 사이버 보안 관리 시스템(100)은 LAN 포트 제거/변경하여 시스템 중단이 발생한 경우, 위협 요인을 ‘비인가 단말기’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as an 'unauthorized terminal' and provides a response scenario when system interruption occurs due to removal/change of the LAN port.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자의 임의 조작으로 인한 시스템 중단이 발생한 경우, 위협 요인을 ‘비인가 단말기’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when system shutdown occurs due to arbitrary manipulation by an unauthorized person.

자율운항 선박 사이버 보안 관리 시스템(100)은 OT 네트워크(150)에 대한 임의 조작 / 중요정보 변조하여 운항 사고가 발생한 경우, 위협 요인을 ‘비인가 단말기’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템 과부하로 인한 업무 지연이 발생한 경우, 위협 요인을 ‘비인가 단말기’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when a business delay occurs due to system overload.

자율운항 선박 사이버 보안 관리 시스템(100)은 취약한 서비스의 포트를 통한 침입에 노출이 발생한 경우, 위협 요인을 ‘비인가 단말기’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'unauthorized terminal' when exposure to intrusion through a port of a vulnerable service occurs.

도 19는 본 실시예에 따른 위험도 시나리오 중 악성코드 시나리오를 나타낸 도면이다.19 is a diagram showing a malicious code scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 악성코드 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.Autonomous ship cyber security management system 100 describes a method of providing a scenario corresponding to a malicious code scenario by evaluating each of the router 108, the IT network 120, the OT network 150, and the crew network 130 do.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보를 외부(경쟁사/기관) 등으로 유출이 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when important information is leaked to the outside (competitor/institution) by accessing the system.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'malicious code' when important information stealing or malicious behavior occurs by accessing administrator/user rights.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연이 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when a deliberate business (operation) delay occurs by accessing and changing unauthorized information.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자가 무작위 로그인 시도하여 계정 탈취하여 중요정보 변조 및 파괴가 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 패스워드(PW)가 암호화 저장되어있지 않아 해커 침입시 계정 탈취가 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.

자율운항 선박 사이버 보안 관리 시스템(100)은 악성코드/랜섬웨어 감염 및 전파가 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when infection and propagation of malicious code/ransomware occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 중요정보 접근 및 OT 네트워크(150)에 대한 임의 조작이 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal .

자율운항 선박 사이버 보안 관리 시스템(100)은 해커에 의해 중요정보(네트워크/화물/금융정보) 유출이 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.When important information (network/cargo/financial information) is leaked by a hacker, the autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자의 임의 조작으로 인한 시스템 중단이 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when system shutdown occurs due to unauthorized manipulation.

자율운항 선박 사이버 보안 관리 시스템(100)은 과다한 트래픽 발생시켜 업무 지연이 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when a business delay occurs due to excessive traffic.

자율운항 선박 사이버 보안 관리 시스템(100)은 OT 네트워크(150)에 대한 임의 조작 / 중요정보 변조하여 운항 사고가 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템 과부하로 인한 업무 지연이 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when a business delay occurs due to system overload.

자율운항 선박 사이버 보안 관리 시스템(100)은 취약한 서비스의 포트를 통한 침입에 노출이 발생한 경우, 위협 요인을 ‘악성코드’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious code' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.

도 20은 본 실시예에 따른 위험도 시나리오 중 악의적인 행위 시나리오를 나타낸 도면이다.20 is a diagram illustrating a malicious action scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 악의적인 행위 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.The autonomous ship cyber security management system (100) evaluates each of the router (108), IT network (120), OT network (150), and crew network (130) to provide a scenario for responding to malicious behavior scenarios. Explain.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보를 외부(경쟁사/기관) 등으로 유출이 발생한 경우, 위협 요인을 ‘악의적인 행위’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'malicious act' when accessing the system and leaking important information to the outside (competitor/institution).

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘악의적인 행위’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'malicious act' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘악의적인 행위’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'malicious behavior' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연 발생한 경우, 위협 요인을 ‘악의적인 행위’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'malicious act' in case of intentional delay in business (operation) by accessing and changing unauthorized information.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자가 무작위 로그인 시도하여 계정 탈취하여 중요정보 변조 및 파괴가 발생한 경우, 위협 요인을 ‘악의적인 행위’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'malicious act' and provides a response scenario when an unauthorized person randomly attempts to log in and steals an account and falsification or destruction of important information occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 악성코드 전파가 발생한 경우, 위협 요인을 ‘악의적인 행위’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'malicious act' and provides a response scenario when malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.

자율운항 선박 사이버 보안 관리 시스템(100)은 중요 시스템 무단 변조(조작) 업무 지연 / 작동 중단이 발생한 경우, 위협 요인을 ‘악의적인 행위’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'malicious act' in case of unauthorized modification (manipulation) of important systems, business delays/operation interruptions.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 중요정보 접근 및 OT 네트워크(150)에 대한 임의 조작이 발생한 경우, 위협 요인을 ‘악의적인 행위’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'malicious behavior' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal do.

자율운항 선박 사이버 보안 관리 시스템(100)은 LAN 포트 제거/변경하여 시스템 중단이 발생한 경우, 위협 요인을 ‘악의적인 행위’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'malicious act' and provides a response scenario when system interruption occurs due to removal/change of the LAN port.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자의 임의 조작으로 인한 시스템 중단이 발생한 경우, 위협 요인을 ‘악의적인 행위’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'malicious act' and provides a response scenario when system shutdown occurs due to unauthorized manipulation.

자율운항 선박 사이버 보안 관리 시스템(100)은 OT 네트워크(150)에 대한 임의 조작 / 중요정보 변조하여 운항 사고가 발생한 경우, 위협 요인을 ‘악의적인 행위’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'malicious act' when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.

도 21은 본 실시예에 따른 위험도 시나리오 중 개인정보 악용 시나리오를 나타낸 도면이다.21 is a diagram illustrating a personal information abuse scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 개인정보 악용 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.The autonomous vessel cyber security management system 100 evaluates each of the router 108, the IT network 120, the OT network 150, and the crew network 130 to provide a scenario corresponding to a personal information abuse scenario. Explain.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보를 외부(경쟁사/기관) 등으로 유출이 발생한 경우, 위협 요인을 ‘개인정보 악용’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'abuse of personal information' and provides a response scenario when important information is leaked to the outside (competitor/institution) by accessing the system.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘개인정보 악용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'abuse of personal information' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘개인정보 악용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'personal information abuse' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연이 발생한 경우, 위협 요인을 ‘개인정보 악용’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'abuse of personal information' and provides a response scenario when intentional business (operation) delay occurs due to access to and change of unauthorized information.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자가 무작위 로그인 시도하여 계정 탈취하여 중요정보 변조 및 파괴가 발생한 경우, 위협 요인을 ‘개인정보 악용’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'abuse of personal information' and provides a response scenario when an unauthorized person randomly attempts to log in and steals an account and falsification or destruction of important information occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 해커에 의해 중요정보(네트워크/화물/금융정보) 유출이 발생한 경우, 위협 요인을 ‘개인정보 악용’으로 인지하여 대응 시나리오를 제공한다.When important information (network/cargo/financial information) is leaked by a hacker, the autonomous vessel cyber security management system 100 recognizes the threat factor as 'abuse of personal information' and provides a response scenario.

도 22는 본 실시예에 따른 위험도 시나리오 중 침해부인 시나리오를 나타낸 도면이다.22 is a diagram illustrating a denial of infringement scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 침해부인 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.Autonomous ship cyber security management system 100 describes a method for providing a scenario corresponding to a denial of infringement scenario by evaluating each of a router 108, an IT network 120, an OT network 150, and a crewman network 130 do.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘침해부인’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'denial of infringement' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연이 발생한 경우, 위협 요인을 ‘침해부인’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'infringement denial' when intentional business (operation) delay occurs due to access to and change of unauthorized information.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자가 무작위 로그인 시도하여 계정 탈취하여 중요정보 변조 및 파괴가 발생한 경우, 위협 요인을 ‘침해부인’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'denial of infringement' and provides a response scenario when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 패스워드(PW)가 암호화 저장되어있지 않아 해커 침입시 계정 탈취가 발생한 경우, 위협 요인을 ‘침해부인’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'infringement denial' and provides a response scenario when account hijacking occurs when a hacker infiltrates because the password (PW) is not encrypted.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 악성코드 전파가 발생한 경우, 위협 요인을 ‘침해부인’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'infringement denial' and provides a response scenario when malicious code propagation occurs by connecting to the internal network with an unauthorized terminal.

자율운항 선박 사이버 보안 관리 시스템(100)은 중요 시스템 무단 변조(조작) 업무 지연 / 작동 중단이 발생한 경우, 위협 요인을 ‘침해부인’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system (100) provides a response scenario by recognizing the threat factor as 'infringement denial' in case of unauthorized modification (manipulation) of important systems, business delays/operation interruptions.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 중요정보 접근 및 OT 네트워크(150)에 대한 임의 조작이 발생한 경우, 위협 요인을 ‘침해부인’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'denial of infringement' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal .

자율운항 선박 사이버 보안 관리 시스템(100)은 해커에 의해 중요정보(네트워크/화물/금융정보) 유출이 발생한 경우, 위협 요인을 ‘침해부인’으로 인지하여 대응 시나리오를 제공한다.When important information (network/cargo/financial information) is leaked by a hacker, the autonomous ship cyber security management system 100 recognizes the threat factor as 'denial of infringement' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자의 임의 조작으로 인한 시스템 중단이 발생한 경우, 위협 요인을 ‘침해부인’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'infringement denial' when system shutdown occurs due to unauthorized manipulation.

자율운항 선박 사이버 보안 관리 시스템(100)은 OT 네트워크(150)에 대한 임의 조작 / 중요정보 변조하여 운항 사고가 발생한 경우, 위협 요인을 ‘침해부인’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as 'infringement denial' when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.

자율운항 선박 사이버 보안 관리 시스템(100)은 악성코드/랜섬웨어 감염 및 전파가 발생한 경우, 위협 요인을 ‘침해부인’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'denial of infringement' when infection and propagation of malicious code/ransomware occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘침해부인’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'infringement denial' when business (operation) delays occur due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 취약한 서비스의 포트를 통한 침입에 노출이 발생한 경우, 위협 요인을 ‘침해부인’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'infringement denial' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.

도 23은 본 실시예에 따른 위험도 시나리오 중 운영 실수 시나리오를 나타낸 도면이다.23 is a diagram illustrating an operation mistake scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 운영 실수 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.Autonomous vessel cyber security management system (100) describes a method for evaluating each router (108), IT network (120), OT network (150), and crew network (130) to provide scenarios corresponding to operational error scenarios do.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보를 외부(경쟁사/기관) 등으로 유출이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when important information is leaked to the outside (competitor/institution) by accessing the system.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when a business (operation) delay occurs due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연 발생이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when a deliberate business (operation) delay occurs due to accessing and changing unauthorized information.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자가 무작위 로그인 시도하여 계정 탈취하여 중요정보 변조 및 파괴가 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 패스워드(PW)가 암호화 저장되어있지 않아 해커 침입시 계정 탈취가 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.

자율운항 선박 사이버 보안 관리 시스템(100)은 악성코드/랜섬웨어 감염 및 전파가 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when infection and propagation of malicious code/ransomware occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 악성코드 전파가 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as an 'operation mistake' and provides a response scenario when malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.

자율운항 선박 사이버 보안 관리 시스템(100)은 중요 시스템 무단 변조(조작) 업무 지연 / 작동 중단이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' in the event of an unauthorized modification (manipulation) of important systems, delay / operation interruption.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 중요정보 접근 및 OT 네트워크(150)에 대한 임의 조작이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario when access to important information and arbitrary manipulation of the OT network 150 occur by connecting to the internal network with an unauthorized terminal .

자율운항 선박 사이버 보안 관리 시스템(100)은 해커에 의해 중요정보(네트워크/화물/금융정보) 유출이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.When important information (network/cargo/financial information) is leaked by a hacker, the autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 LAN 포트 제거/변경하여 시스템 중단이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.In the event of a system outage due to the removal/change of the LAN port, the autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자의 임의 조작으로 인한 시스템 중단이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when a system shutdown occurs due to an unauthorized person's arbitrary manipulation.

자율운항 선박 사이버 보안 관리 시스템(100)은 과다한 트래픽 발생시켜 업무 지연이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when business delay occurs due to excessive traffic.

자율운항 선박 사이버 보안 관리 시스템(100)은 OT 네트워크(150)에 대한 임의 조작 / 중요정보 변조하여 운항 사고가 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.

자율운항 선박 사이버 보안 관리 시스템(100)은 악성코드/랜섬웨어 감염 및 전파가 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when infection and propagation of malicious code/ransomware occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when a business (operation) delay occurs due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템 과부하로 인한 업무 지연이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when a business delay occurs due to system overload.

자율운항 선박 사이버 보안 관리 시스템(100)은 취약한 서비스의 포트를 통한 침입에 노출이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when exposure to intrusion through a port of a vulnerable service occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 제로데이 어택에 노출이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.When exposure to a zero-day attack occurs, the autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 안정성이 검증되지 않은 패치 실행으로 시스템 장애가 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as an 'operational mistake' and provides a response scenario when a system failure occurs due to the execution of a patch whose stability has not been verified.

자율운항 선박 사이버 보안 관리 시스템(100)은 누락된 보안 패치로 인해 사이버공격에 취약이 발생한 경우, 위협 요인을 ‘운영 실수’로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as an 'operational mistake' when vulnerability to cyber attacks occurs due to missing security patches.

도 24는 본 실시예에 따른 위험도 시나리오 중 하드웨어 결함 시나리오를 나타낸 도면이다.24 is a diagram illustrating a hardware failure scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 하드웨어 결함 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.Autonomous ship cyber security management system 100 describes a method for evaluating each router 108, IT network 120, OT network 150, and crew network 130 to provide a scenario corresponding to a hardware fault scenario do.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보를 외부(경쟁사/기관) 등으로 유출이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'hardware defect' when important information is leaked to the outside (competitor/institution) by accessing the system.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'hardware defect' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when a deliberate delay in business (operation) occurs due to access to and change of unauthorized information.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자가 무작위 로그인 시도하여 계정 탈취하여 중요정보 변조 및 파괴가 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when an unauthorized person randomly attempts to log in and steals an account and falsification or destruction of important information occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 패스워드(PW)가 암호화 저장되어있지 않아 해커 침입시 계정 탈취가 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.

자율운항 선박 사이버 보안 관리 시스템(100)은 악성코드/랜섬웨어 감염 및 전파가 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when infection and propagation of malicious code/ransomware occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 악성코드 전파가 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.

자율운항 선박 사이버 보안 관리 시스템(100)은 중요 시스템 무단 변조(조작) 업무 지연 / 작동 중단이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'hardware defect' in the event of an unauthorized modification (manipulation) of an important system, a delay / operation interruption.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 중요정보 접근 및 OT 네트워크(150)에 대한 임의 조작이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal .

자율운항 선박 사이버 보안 관리 시스템(100)은 해커에 의해 중요정보(네트워크/화물/금융정보) 유출이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.When important information (network/cargo/financial information) is leaked by a hacker, the autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 LAN 포트 제거/변경하여 시스템 중단이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when system interruption occurs due to removal/change of the LAN port.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자의 임의 조작으로 인한 시스템 중단이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when a system shutdown occurs due to an unauthorized person's arbitrary manipulation.

자율운항 선박 사이버 보안 관리 시스템(100)은 과다한 트래픽 발생시켜 업무 지연이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when business delay occurs due to excessive traffic.

자율운항 선박 사이버 보안 관리 시스템(100)은 OT 네트워크(150)에 대한 임의 조작 / 중요정보 변조하여 운항 사고 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as a 'hardware defect' when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.

자율운항 선박 사이버 보안 관리 시스템(100)은 악성코드/랜섬웨어 감염 및 전파가 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when infection and propagation of malicious code/ransomware occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템 과부하로 인한 업무 지연이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when a business delay occurs due to system overload.

자율운항 선박 사이버 보안 관리 시스템(100)은 취약한 서비스의 포트를 통한 침입에 노출이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 제로데이 어택에 노출이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.When exposure to a zero-day attack occurs, the autonomous vessel cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 안정성이 검증되지 않은 패치 실행으로 시스템 장애가 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when a system failure occurs due to the execution of a patch whose stability has not been verified.

자율운항 선박 사이버 보안 관리 시스템(100)은 누락된 보안 패치로 인해 사이버공격에 취약이 발생한 경우, 위협 요인을 ‘하드웨어 결함’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as a 'hardware defect' and provides a response scenario when vulnerability to cyber attacks occurs due to missing security patches.

도 25는 본 실시예에 따른 위험도 시나리오 중 정전 시나리오를 나타낸 도면이다.25 is a diagram illustrating a power outage scenario among risk scenarios according to the present embodiment.

자율운항 선박 사이버 보안 관리 시스템(100)은 라우터(108), IT 네트워크(120), OT 네트워크(150), 승무원 네트워크(130) 각각을 평가하여 정전 시나리오에 대응하는 시나리오를 제공하는 방법을 설명한다.The autonomous ship cyber security management system 100 describes a method for evaluating each of the router 108, the IT network 120, the OT network 150, and the crew network 130 to provide a scenario corresponding to a power outage scenario. .

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보를 외부(경쟁사/기관) 등으로 유출이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'power outage' when important information is leaked to the outside (competitor/institution) by accessing the system.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템에 접속하여 중요 정보 변경하여 업무(운항) 지연이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a business (operation) delay occurs due to access to the system and change of important information.

자율운항 선박 사이버 보안 관리 시스템(100)은 관리자/사용자 권한 접근하여 중요 정보 탈취 및 악의적인 행동이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 provides a response scenario by recognizing the threat factor as 'power outage' when important information stealing or malicious behavior occurs by accessing administrator/user privileges.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 정보에 접근하여 변경하여 고의적인 업무(운항)지연이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a deliberate business (operation) delay occurs due to access to and change of unauthorized information.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자가 무작위 로그인 시도하여 계정 탈취하여 중요정보 변조 및 파괴가 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when an unauthorized person attempts to log in randomly and steals an account and falsification or destruction of important information occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 패스워드(PW)가 암호화 저장되어있지 않아 해커 침입시 계정 탈취가 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when account hijacking occurs when a hacker invades because the password (PW) is not encrypted.

자율운항 선박 사이버 보안 관리 시스템(100)은 악성코드/랜섬웨어 감염 및 전파가 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when infection and propagation of malicious code/ransomware occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 악성코드 전파가 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a malicious code propagation occurs by connecting to an internal network with an unauthorized terminal.

자율운항 선박 사이버 보안 관리 시스템(100)은 중요 시스템 무단 변조(조작) 업무 지연 / 작동 중단이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario in case of unauthorized modification (manipulation) of important systems, delay / operation interruption.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가 단말기로 내부망 연결하여 중요정보 접근 및 OT 네트워크(150)에 대한 임의 조작이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when accessing important information and arbitrary manipulation of the OT network 150 by connecting to the internal network with an unauthorized terminal.

자율운항 선박 사이버 보안 관리 시스템(100)은 해커에 의해 중요정보(네트워크/화물/금융정보) 유출이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.When important information (network/cargo/financial information) is leaked by a hacker, the autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 LAN 포트 제거/변경하여 시스템 중단이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a system interruption occurs due to the removal/change of the LAN port.

자율운항 선박 사이버 보안 관리 시스템(100)은 비인가자의 임의 조작으로 인한 시스템 중단이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a system shutdown occurs due to unauthorized manipulation.

자율운항 선박 사이버 보안 관리 시스템(100)은 과다한 트래픽 발생시켜 업무 지연이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous vessel cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when business delay occurs due to excessive traffic.

자율운항 선박 사이버 보안 관리 시스템(100)은 OT 네트워크(150)에 대한 임의 조작 / 중요정보 변조하여 운항 사고 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a navigation accident occurs due to arbitrary manipulation/modulation of important information on the OT network 150.

자율운항 선박 사이버 보안 관리 시스템(100)은 시스템 과부하로 인한 업무 지연이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a business delay occurs due to system overload.

자율운항 선박 사이버 보안 관리 시스템(100)은 취약한 서비스의 포트를 통한 침입에 노출이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when exposure to intrusion through a port of a vulnerable service occurs.

자율운항 선박 사이버 보안 관리 시스템(100)은 제로데이 어택에 노출이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.When exposure to a zero-day attack occurs, the autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario.

자율운항 선박 사이버 보안 관리 시스템(100)은 안정성이 검증되지 않은 패치 실행으로 시스템 장애가 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when a system failure occurs due to the execution of a patch whose stability has not been verified.

자율운항 선박 사이버 보안 관리 시스템(100)은 누락된 보안 패치로 인해 사이버공격에 취약이 발생한 경우, 위협 요인을 ‘정전’으로 인지하여 대응 시나리오를 제공한다.The autonomous ship cyber security management system 100 recognizes the threat factor as 'power outage' and provides a response scenario when vulnerability to cyber attacks occurs due to missing security patches.

이상의 설명은 본 실시예의 기술 사상을 예시적으로 설명한 것에 불과한 것으로서, 본 실시예가 속하는 기술 분야에서 통상의 지식을 가진 자라면 본 실시예의 본질적인 특성에서 벗어나지 않는 범위에서 다양한 수정 및 변형이 가능할 것이다. 따라서, 본 실시예들은 본 실시예의 기술 사상을 한정하기 위한 것이 아니라 설명하기 위한 것이고, 이러한 실시예에 의하여 본 실시예의 기술 사상의 범위가 한정되는 것은 아니다. 본 실시예의 보호 범위는 아래의 청구범위에 의하여 해석되어야 하며, 그와 동등한 범위 내에 있는 모든 기술 사상은 본 실시예의 권리범위에 포함되는 것으로 해석되어야 할 것이다.The above description is merely an example of the technical idea of the present embodiment, and various modifications and variations can be made to those skilled in the art without departing from the essential characteristics of the present embodiment. Therefore, the present embodiments are not intended to limit the technical idea of the present embodiment, but to explain, and the scope of the technical idea of the present embodiment is not limited by these embodiments. The scope of protection of this embodiment should be construed according to the claims below, and all technical ideas within the scope equivalent thereto should be construed as being included in the scope of rights of this embodiment.

CROSS-REFERENCE TO RELATED APPLICATIONCROSS-REFERENCE TO RELATED APPLICATION

본 특허출원은 2022.02.15.에 한국에 출원한 특허출원번호 제10-2022-0019444호에 대해 미국 특허법 119(a)조(35 U.S.C § 119(a))에 따라 우선권을 주장하면, 그 모든 내용은 참고문헌으로 본 특허출원에 병합된다. 아울러, 본 특허출원은 미국 이외에 국가에 대해서도 위와 동일한 이유로 우선권을 주장하면 그 모든 내용은 참고문헌으로 본 특허출원에 병합된다.In accordance with Article 119 (a) of the United States Patent Act (35 U.S.C § 119 (a)), this patent application claims priority to Patent Application No. 10-2022-0019444 filed in Korea on 2022.02.15. The contents are incorporated into this patent application by reference. In addition, if this patent application claims priority for the same reason as above for countries other than the United States, all the contents are incorporated into this patent application as references.

Claims (5)

자율운항 선박 내의 복수의 네트워크에 대한 송수신 데이터를 수집하여 수집 데이터를 생성하는 데이터 수집부;a data collection unit that generates collection data by collecting transmission and reception data for a plurality of networks in an autonomous ship; 상기 수집 데이터를 분석하여 상기 복수의 네트워크 중 하나 이상의 네트워크에 대한 사이버 공격 또는 비정상 트래픽이 감지되는 지의 여부를 확인하는 사이버 공격 확인부; 및a cyber attack identification unit that analyzes the collected data and checks whether a cyber attack or abnormal traffic to one or more networks among the plurality of networks is detected; and 상기 복수의 네트워크 중 상기 사이버 공격 또는 상기 비정상 트래픽이 감지된 네트워크를 차단하는 사이버 공격 차단부;a cyber attack blocker blocking the cyber attack or the network in which the abnormal traffic is detected among the plurality of networks; 를 포함하는 것을 특징으로 하는 사이버 보안 관리장치.A cyber security management device comprising a. 제1항에 있어서,According to claim 1, 상기 복수의 네트워크는 The plurality of networks 위성과 연동하는 VSAT(Very Small Aperture Terminal), 이동통신 기지국과 각각 통신하는 라우터(Router);A Very Small Aperture Terminal (VSAT) interworking with a satellite, a router communicating with a mobile communication base station, respectively; 상기 자율운항 선박 내부에 설치된 업무용 PC 및 업무용 서버와 통신하는 IT(Information Technology) 네트워크;IT (Information Technology) network communicating with a business PC and a business server installed inside the autonomous ship; 상기 자율운항 선박 내부에 설치된 무선 AP(Access Point), 승무원 단말기와 통신하는 승무원 네트워크; A crew network communicating with a wireless access point (AP) installed inside the autonomous ship and a crew terminal; 상기 자율운항 선박 내부에 설치된 모니터링(Monitoring) 장치, 네비게이션(Navigation) 장치, 제어(Control) 장치와 연동하는 OT(Operational Technology) 네트워크;An OT (Operational Technology) network interworking with a monitoring device, a navigation device, and a control device installed inside the autonomous ship; 를 포함하는 것을 특징으로 하는 사이버 보안 관리장치.A cyber security management device comprising a. 제2항에 있어서,According to claim 2, 상기 데이터 수집부는The data collection unit 상기 라우터, 상기 IT 네트워크, 상기 승무원 네트워크, 상기 OT 네트워크로부터 수집한 송수신 데이터를 취합한 취합 데이터를 생성하고, 상기 취합 데이터를 압축한 후 최대 프로토콜 범위를 위한 개방형 스택을 적용하여 상기 수집 데이터를 생성하는 것을 특징으로 하는 사이버 보안 관리장치.Generating collected data by combining transmission and reception data collected from the router, the IT network, the crew network, and the OT network, compressing the collected data, and applying an open stack for a maximum protocol range to generate the collected data A cyber security management device characterized in that for doing. 제2항에 있어서,According to claim 2, 상기 사이버 공격 확인부는The cyber attack confirmation unit 상기 업무용 PC 및 상기 업무용 서버에 설치된 에이전트 프로그램을 이용하여 상기 IT 네트워크에 대한 상기 수집 데이터의 사이버 공격 또는 비정상 트래픽이 감지되는 지의 여부를 확인하는 것을 특징으로 하는 사이버 보안 관리장치.The cyber security management device characterized in that it checks whether a cyber attack or abnormal traffic of the collected data on the IT network is detected by using an agent program installed on the work PC and the work server. 제2항에 있어서,According to claim 2, 상기 사이버 공격 확인부는The cyber attack confirmation unit 상기 모니터링 장치, 상기 네비게이션 장치, 상기 제어 장치에 대한 트래픽을 감지하는 트래픽 감지 센서로부터 상기 OT 네트워크에 대한 상기 수집 데이터의 사이버 공격 또는 비정상 트래픽이 감지되는 지의 여부를 확인하는 것을 특징으로 하는 사이버 보안 관리장치.Cyber security management characterized in that it checks whether a cyber attack or abnormal traffic of the collected data for the OT network is detected from a traffic detection sensor that detects traffic for the monitoring device, the navigation device, and the control device Device.
PCT/KR2023/000729 2022-02-15 2023-01-16 Cyber security management system for maritime autonomous surface ship Ceased WO2023158111A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020220019444A KR102433928B1 (en) 2022-02-15 2022-02-15 System for Managing Cyber Security of Autonomous Ship
KR10-2022-0019444 2022-02-15

Publications (1)

Publication Number Publication Date
WO2023158111A1 true WO2023158111A1 (en) 2023-08-24

Family

ID=83113574

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2023/000729 Ceased WO2023158111A1 (en) 2022-02-15 2023-01-16 Cyber security management system for maritime autonomous surface ship

Country Status (2)

Country Link
KR (1) KR102433928B1 (en)
WO (1) WO2023158111A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024162927A3 (en) * 2023-12-29 2024-09-19 Bts Kurumsal Bi̇li̇şi̇m Teknoloji̇leri̇ Anoni̇m Şi̇rketi̇ Digital twin-supported honeypot for cyber-secure smart sea ports

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102433928B1 (en) * 2022-02-15 2022-08-19 주식회사 오렌지씨큐리티 System for Managing Cyber Security of Autonomous Ship
KR102578059B1 (en) 2023-04-11 2023-09-13 사단법인 한국선급 Cyber risk quantitative evaluation system for autonomous ship and method performing thereof
WO2024248529A1 (en) * 2023-05-31 2024-12-05 한화오션 주식회사 Method for measuring cybersecurity state of ship, and method for evaluating cybersecurity risk and detecting abnormal sign of ship
KR102821719B1 (en) * 2023-05-31 2025-06-18 한화오션 주식회사 Methods for Measuring Ship Cybersecurity Status
KR102729650B1 (en) * 2023-06-02 2024-11-15 한화오션 주식회사 Ship Cyber Attack Scenario Development Method And System
KR102596396B1 (en) * 2023-07-04 2023-10-30 손순배 Ship security server and ship security enhancement method thereof
KR102824543B1 (en) 2024-11-26 2025-06-26 주식회사 이글루코퍼레이션 Ship integrated security management system and method performing thereof
KR102847531B1 (en) * 2025-01-07 2025-08-18 동명대학교산학협력단 Monitoring System based on AI Analysis of Port Equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050120875A (en) * 2004-06-21 2005-12-26 엘지엔시스(주) Method for securing system using server security solution and network security solution, and security system implementing the same
KR101327477B1 (en) * 2013-07-16 2013-11-08 서원기 Total monitoring and control management system
KR20200029266A (en) * 2018-09-10 2020-03-18 대우조선해양 주식회사 Security system for preventing hacking of communication network in ship
KR20200141774A (en) * 2019-06-11 2020-12-21 대우조선해양 주식회사 Integrated security network system having reinforced cyber security in smartship
KR102239769B1 (en) * 2019-11-29 2021-04-13 호원대학교산학협력단 Network security method using ship maintenance support network system
KR102433928B1 (en) * 2022-02-15 2022-08-19 주식회사 오렌지씨큐리티 System for Managing Cyber Security of Autonomous Ship

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050120875A (en) * 2004-06-21 2005-12-26 엘지엔시스(주) Method for securing system using server security solution and network security solution, and security system implementing the same
KR101327477B1 (en) * 2013-07-16 2013-11-08 서원기 Total monitoring and control management system
KR20200029266A (en) * 2018-09-10 2020-03-18 대우조선해양 주식회사 Security system for preventing hacking of communication network in ship
KR20200141774A (en) * 2019-06-11 2020-12-21 대우조선해양 주식회사 Integrated security network system having reinforced cyber security in smartship
KR102239769B1 (en) * 2019-11-29 2021-04-13 호원대학교산학협력단 Network security method using ship maintenance support network system
KR102433928B1 (en) * 2022-02-15 2022-08-19 주식회사 오렌지씨큐리티 System for Managing Cyber Security of Autonomous Ship

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024162927A3 (en) * 2023-12-29 2024-09-19 Bts Kurumsal Bi̇li̇şi̇m Teknoloji̇leri̇ Anoni̇m Şi̇rketi̇ Digital twin-supported honeypot for cyber-secure smart sea ports

Also Published As

Publication number Publication date
KR102433928B1 (en) 2022-08-19

Similar Documents

Publication Publication Date Title
WO2023158111A1 (en) Cyber security management system for maritime autonomous surface ship
WO2021060857A1 (en) System for remote execution code-based node control flow management, and method therefor
WO2018082482A1 (en) Network sharing method, and method and system for accessing network
WO2016089009A1 (en) Method and cloud server for managing device
WO2022114689A1 (en) Method and device for image-based malware detection, and artificial intelligence-based endpoint detection and response system using same
WO2015142002A1 (en) Method and device for sharing functions of smart key
WO2017096604A1 (en) Method and system for exchange, transmission, and reception of flight data, storage device, and aircraft
WO2020032604A1 (en) Access management system and access management method using same
WO2017096601A1 (en) Unmanned aerial vehicle, and flight state supervising method and monitoring system thereof
WO2020101108A1 (en) Artificial-intelligence model platform and method for operating artificial-intelligence model platform
WO2019216739A1 (en) Security protection method and apparatus in wireless communication system
WO2017084337A1 (en) Identity verification method, apparatus and system
WO2017035695A1 (en) Information transmission method and mobile device
WO2012077993A2 (en) Door lock system
WO2020105892A1 (en) Method by which device shares digital key
WO2019146812A1 (en) Vehicle update system and control method
WO2020060231A1 (en) Network security monitoring method, network security monitoring device, and system
WO2021215787A1 (en) Wireless ip camera detection system and method
WO2017188497A1 (en) User authentication method having strengthened integrity and security
WO2017107158A1 (en) Flight prompting system and method for unmanned aerial vehicle, control terminal, and flight system
WO2020153660A1 (en) Device and method for updating immobilizer token in digital key sharing system
WO2019194428A1 (en) Electronic device sharing key with external electronic device and operating method for electronic device
CN100458701C (en) Input/output control device, input/output control system, and input/output control method
WO2018169292A1 (en) Method and system for providing security service and device for same
WO2021230702A1 (en) Method and apparatus for providing assurance service for lost portable terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23756524

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 23756524

Country of ref document: EP

Kind code of ref document: A1