• Title/Summary/Keyword: 공격전략

Search Result 260, Processing Time 0.025 seconds

Power Process: The Interrelationships of Marital Power, Influence Strategies, and Negative Conflict Resolution Styles(Attack vs. Avoidance) (권력의 과정: 부부권력, 영향력전략, 부정적 갈등해결방식(공격 vs. 회피)의 관계)

  • Lee, Myung Shin;Yang, Nan Mee
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.262-277
    • /
    • 2021
  • In order to explore the power process, a hypothetical model which explains the interrelationships among 3 marital power(traditional, egalitarian, personal), 3 influence strategies(reward, coercion, emotional), and 2 negative conflict resolution styles(attack vs. avoidance) was developed. In order to examine the gender differences, male model and female model were developed separately and compared. Using the data collected from 182 males and 196 females, the hypothetical model was tested. For data analysis, SEM was used. As a result, 3 common paths were found: Greater use of emotional influence strategy increased attack as well as avoidance. Greater egalitarian power increased reward. Egalitalian power affected the use of coercion, but the direction was opposed: male's egalitarian power decreased coercion, while female's egalitarian power increased it. Except these, the analyses revealed the substantial differences between male and female. Based on the findings, the ways to reduce attack and avoidance, and theoretical implications were discussed.

The convergence study of beliefs supporting aggression and aggression in elementary students: Focusing on mediating effects of self-esteem (초등학생의 공격신념과 공격성에 대한 융합 연구: 자아존중감의 매개효과를 중심으로)

  • Yoo, Sun-Yee
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.8
    • /
    • pp.327-334
    • /
    • 2019
  • This study was conducted to understand the relationship between elementary students' beliefs supporting aggression, aggression and self-esteem. In addition, we aimed to provide basic data for controlling the aggression of children and developing effective coping strategies. This study population consisted of 184 elementary school students. Data were analyzed using SPSS 24.0 program. As a result, the aggression of elementary school students showed a significant positive correlation with beliefs supporting aggression(r=.39, p<.001) and a significant negative correlation with self-esteem(r=-.46, p<.001). In addition, Results of the hierarchical regression analysis revealed that self-esteem has the mediating effect on the relationship between beliefs supporting aggression and aggression(${\beta}=.26$, p<.001). In other words, the higher the beliefs supporting aggression, the higher the aggression, and self-esteem means to act as a mediating effect in the relationship between them. Therefore, when arranging an intervention plan to control the aggression of elementary school students, it is necessary to find strategies to control the beliefs spporting aggression and increase self-esteem.

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.

네트워크 포렌식을 통한 분산서비스거부공격 비교분석

  • Kim, Hyuk-Joon;Lee, Sang-Jin
    • Review of KIISC
    • /
    • v.21 no.4
    • /
    • pp.69-74
    • /
    • 2011
  • 2011년 3월 4일 발생한 DDoS 공격은 악성코드 제작, 봇넷 구성 및 공격전개 방식에서 지난 2009년 발생한 7.7 DDoS 공격과 많은 유사점이 있다. 그러나 공격 전략과 공격 수행 방법 측면에서 좀 더 자세히 분석해보면 상호간의 유사점보다는 차이점이 더 많음을 알 수 있다. 7.7 DDoS 공격의 경우 공격자는 공격 전개를 위해 종 더 많은 시간을 투자하였으며 당시 국내 DDoS 방어수준에 대한 정확한 이해를 바탕으로 매우 효과적인 공격을 수행하였다. 그러나 3.4 DDoS 공격의 경우 공격자는 공격 망 구성을 위해 충분한 시간을 투자하지 않았으며, 비록 악성코드 전개에 있어 진일보한 모습을 보였으나 DDoS 방어수준에 대한 충분한 이해가 부족하였던 것으로 나다났다. 본 고에서는 2011년 3.4일 발생한 DDoS 공격을 네트워크 수준에서 양 공격의 유사점과 차이점을 분석 비교한다.

Study On Identifying Cyber Attack Classification Through The Analysis of Cyber Attack Intention (사이버공격 의도분석을 통한 공격유형 분류에 관한 연구 - 사이버공격의 정치·경제적 피해분석을 중심으로 -)

  • Park, Sang-min;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.103-113
    • /
    • 2017
  • Cyber attacks can be classified by type of cyber war, terrorism and crime etc., depending on the purpose and intent. Those are mobilized the various means and tactics which are like hacking, DDoS, propaganda. The damage caused by cyber attacks can be calculated by a variety of categories. We may identify cyber attackers to pursue trace-back based facts including digital forensics etc. However, recent cyber attacks are trying to induce confusion and deception through the manipulation of digital information or even conceal the attack. Therefore, we need to do the harm-based analysis. In this paper, we analyze the damage caused during cyber attacks from economic and political point of view and by inferring the attack intent could classify types of cyber attacks.

Information Technology Strategy and Architecture: An Explanatory Contingency Framework (정보기술전략과 정보기술아키텍쳐: 설명적 상황이론 프레임워크)

  • Yum, Ji-Hwan
    • Information Systems Review
    • /
    • v.4 no.2
    • /
    • pp.81-94
    • /
    • 2002
  • The study employs the conceptual framework of the strategic success paradigm developed by Ansoff (1990). The strategic success paradigm denotes that optimal performance will be attained when the level of environmental turbulence is aligned with the strategic aggressiveness and organizational capability. Based on the paradigm, authors developed the concept of IT (information technology) aggressiveness (IT aggressiveness henceforth) and capability (IT capability henceforth). In order to clarify the different concept of IT aggressiveness and capability, the author brought the concept of IT architecture. The difference of capability and architecture lies in the depth of technical considerations. Where capability refers attitudinal aspects of managers, architecture emphasizes technical capacity of the organization as a whole. The study validated the need for alignment among IT architecture, environmental turbulence and IT aggressiveness. The imbalance between IT strategy and IT architecture (such as a higher level of IT aggressiveness but a lower level of IT architecture, or vice versa) has a marginal contribution to the organizational IT performance. The alignment among organizational environmental turbulence, IT aggressiveness, and IT architecture resulted in an optimal level of IT performance especially in a turbulent environment.

A Comparative Study on the Relationship between Organizational Culture, Strategic Activities and Export Performance of Manufacturing SMEs based on the Type of Strategies (중소 제조기업의 전략 유형에 따른 조직문화, 전략적 활동, 수출성과의 관계 비교)

  • Cho, Yeon Sung
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.307-327
    • /
    • 2016
  • This study was conducted to investigate the role of the type of strategies on the relationship organizational culture, strategics activities and the export performance of manufacturing SMEs. This study analyzed the moderated effects of type of strategies between the organizational culture, strategic activities and the export performance of SMEs. This study suggested 20 questions latent variables based on existing research. Organizational culture were divided into adhocracy culture and market culture and strategy types were divided into prospectors and defenders. The sample SMEs be analyzed were 200 firms. The 7 hypotheses including moderated effects were analyzed by using LISREL as structural equation modeling. In the result of empirical analysis, the adhocracy culture indicates a positive effect on customer relationship building activities but product quality assurance activities was not significant. Market culture showed a positive impact on both customer relationship building and quality assurance activities. This study conducted multi-group analysis for the purpose of the moderated effects of type of strategies. Multi-group analysis results showed that there are difference effects between the relationship of adhocracy culture, customer relationship building activities and product quality assurance activities. In addition, the group choice adhocracy culture based on the prospectors strategy had a greater impact than the market culture group on the relationship building activities and export performance.

  • PDF

A Study of Security Threats and Zero Trust based Countermeasures in Smart Cities (스마트시티 보안 위협 분석 및 제로트러스트 기반 대응 전략 연구)

  • ChanYoung Kang;Sokjoon Lee
    • Annual Conference of KIPS
    • /
    • 2023.05a
    • /
    • pp.174-175
    • /
    • 2023
  • 21세기가 도래함에 따라 새로운 도시의 형태인 스마트시티는 다양한 기기들이 네트워크 상에 서로 연결되어 이용자에게 편리함을 제공한다. 하지만 사이버 공격 기법 또한 고도화되고 있다. 많은 IoT 기기들이 상호작용함에 따라 사이버 공격을 당하면 도시 전체가 피해를 입을 수 있다. 이에 따라 본 논문에서는 스마트시티에서 일어날 수 있는 보안 사고에 대해 분석하고 이를 대응하기 위한 제로트러스트 도입 전략에 대해 연구하고자 한다.