• Title/Summary/Keyword: 사이버공간 정보

Search Result 384, Processing Time 0.025 seconds

Mobile Auto questions and scoring system (국가 사이버안보 시스템 관련 법률안 분석과 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.363-365
    • /
    • 2014
  • Internet baking, e-commerce, business processing, etc on smartphone handing could be possible in present days. Ambiguity between cyber and real life has made vulnerability on infrastructure, Gov't Service and National security by cyber terrorism. Especially, Lots of Infrastructure and Gov't Service based on Information Technology were exposed by Cyber terror. Legal system should be improved to keep from these threats. This paper proposed needs of cyber legal system by analyzing proposed cyber related code on Korean National Assembly, issue on Cyber Control Tower, National Cyber Security Industry and Human resource.

  • PDF

사이버대학교와 학습자의 지리적 분포 및 교육 특성에 관한 연구

  • 김은경
    • Proceedings of the KGS Conference
    • /
    • 2002.11a
    • /
    • pp.65-67
    • /
    • 2002
  • 정보통신의 발달에 따라 변화된 생활양식은 사람들을 걸어 다니면서 직접 구매하던 쇼핑방식에서 전자상거래로, 은행창구에서 번호표를 뽑고 기다리며 업무를 보았던 은행업무를 사이버 뱅킹으로 대체하게 하였다. 이렇듯 정보통신의 발달은 시간과 공간의 제약을 뛰어넘어 새로운 개념의 사회공간을 형성하게 되었고, 특히 주목할 점으로 최근에 등장한 사이버교육 공간을 들 수 있다.(중략)

  • PDF

A Study on the Evaluation and Analysis of Congressman Information Service for the People and Websites (국회의원 대 국민 정보서비스와 웹사이트 분석 및 평가)

  • 장우권
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 2001.08a
    • /
    • pp.219-224
    • /
    • 2001
  • 국회는 민의를 대변하는 기관이며 국회의원은 그 대변자이다. 21세기 지식정보시대에 국민은 기존의 오프라인상태에서 나아가 많은 지식정보를 사이버공간에서도 얻기를 원한다. 기존의 국회와 국회의원의 기능과 역할이 다변화되어야한다는 이유도 여기에 있는 것이다. 따라서 국민이 사이버공간에서 얻고자하는 지식정보는 무엇이며 이에 따른 우리나라 국회의원들의 지식정보서비스 현황을 분석하고 평가하여 바람직한 지식정보서비스 평가안과 모델을 제시 해 보고자 한다.

  • PDF

A Meta-Analysis of Cyberethics Research and Critical Evaluation from a Perspective of Information Human Rights (사이버윤리 연구동향 분석과 정보인권 측면에서의 평가)

  • MYUNG, JAEJIN;LEE, HAN TAE
    • Informatization Policy
    • /
    • v.20 no.1
    • /
    • pp.3-21
    • /
    • 2013
  • This study reviewed academic research related to the cyberethics in the field of humanities and social sciences. The most active and vibrant field of cyberethics is Pedagogy, followed by Law, communication, philosophy, social welfare science, sociology, business administration and psychology. In the field of cyberethics every major has different research themes. The research trend of cyberethics does not reflect distinctiveness of cyberspace, remaining in previous ethical philosophy. Further, it just establishes abstract morality. In the overall research of cyberethics lacks recognition of information human rights, therefore, it shows little tendency to living ethics. Moral recognition based on information human rights should be emphasized, and multi-disciplinary study is requested for future studies.

  • PDF

전자녹지공간 개발의 필요성과 관리방향

  • Ha, Won-Gyu
    • 정보화사회
    • /
    • s.133
    • /
    • pp.44-47
    • /
    • 1999
  • 전자녹지공간은 바로 이러한 물리국토의 토지이용 제한개념을 사이버 공간상에 적용시켜, 오염된 정보가 발을 붙일 수 없는 특정정보공간 (도메인 부여 등)을 지정하고, 이 공간을 유지.관리하기 위하여 인증제 및 지속적인 감독 계획을 수립해 보자는 일종의 사이버 청정지역이라고 할 수 있다.

  • PDF

Critical Review on the Arguments for Building Three-dimensional Cyberspace to Realize Ubiquitous (유비쿼터스 실현을 위한 사이버공간상의 3차원 그래픽 공간 구축론에 대한 비판적 고찰)

  • Choi Chang-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.4
    • /
    • pp.81-88
    • /
    • 2006
  • Ubiquitous has been a new issue in information technology field. Some people in GIS(Geographic Information Systems) and urban and regional planning have maintained that not only building three dimensional graphic environment in cyberspace is the key for ubiquitous, but also planners should plan and control the new space. They may believe that ubiquitous would be a mixture or/and combination of real-space and cyberspace. For strengthening their arguments, they should show the character of the space can be related to the three dimensional space and planning the space is possible. This study tried to critically analyze their assertion. After reviewing various articles and studies in multidisciplinary view, this challenging analysis shows those arguments need more sophisticated studies and can limit the character of cyberspace which has made the space prosperous.

  • PDF

A Study on the Worm.Virus Attack Technique of Cyber Warfare (사이버 정보전 웜.바이러스 공격 기술 연구)

  • 김환국;서동일;이상호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.776-779
    • /
    • 2004
  • With the rapid progress of information technique, it is getting more difficult to protect information systems from cyber terrorism, because of bugs and vulnerabilities of software and the properties of cyberspace such as anonymity. furthermore cyber terror techniques are highly developed and complicated and their use for a malicious intent and a military purpose are increasing recently. Therefore a study of warfare attack technology on the cyber space is necessary for establishing trusted society and further national security. Specially, worms/viruses are becoming a more common occurrence on the cyber space. Also, The worm caused a great deal of damage to the large number of networks around the world in a very short period of time. Therefore, we will describe worms/viruses in the warfare attack technique in this paper.

  • PDF

A study on the Application of Effects-based Operation in Cyberspace (사이버공간에서의 효과중심작전 적용방안 연구)

  • Jang, Won-gu;Lee, Kyun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.221-230
    • /
    • 2020
  • The effects-based operation, which would reduce unnecessary efforts and meaningless sacrifices incurred during a war and simultaneously reach the will of the enemy leadership by strategic attacks, was discarded for the reason that it was difficult to apply it to military power except for airpower. However, cyberspace, which can be thoroughly logical and calculated, can be suitable for conducting effects-based operations. This study examined a way to carry out effects-based operations in such cyberspaces. It laid the foundation for overcoming the limitations of effects-based operations revealed in previous battle cases and executing the operations in cyber battlespace where the boundary between physical and cyberspaces gradually disappeared. Futhermore, it demonstrated that effects-based operations could be carried out in cyberspace by establishing a military strategy, which could conduct the operations through an analysis of previous cyber-attack cases.

Cyber forensics domain ontology for cyber criminal investigation (사이버 범죄 수사를 위한 사이버 포렌식 범주 온톨로지)

  • Park, Heum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1687-1692
    • /
    • 2009
  • Cyber forensics is used the process and technology of digital forensics as a criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data in cyber space. Accordingly, it is difficult to determine relational crime types, collect evidence and the legal admissibility of evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. In this paper, we constructed a cyber forensics domain ontology for cyber criminal investigation using the concepts, relations and properties, according to categories of cyber crime, laws, evidence, and information of criminals and crime-cases. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.

A Study for Recent major Cyber incidents and preventive measures (최근 주요 침해사고 유형과 예방 대책)

  • Jung, Ye-bin;Ha, Seong-hyeon;Lee, Se-Ho;Choi, Sang-Yong;Kim, Jeung-Sam;Lee, Jong-Rak
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.99-102
    • /
    • 2020
  • 인터넷 사용 인구가 증가하면서 이제 사이버공간은 우리 생활에서 중요한 인프라가 되었다. 최근 인터넷 침해사고의 추세는 주로 금전적인 이익을 얻기 위하여 발생하고 있으며, 그 수법이 갈수록 지능적이고 복합적인 기법들을 사용하여 대응과 분석이 점점 어려워지고 있다. 인터넷 침해사고는 이제 특정 개인, 기업의 문제가 아닌 사회적, 국가적 이슈가 되고 있다. 이처럼 인터넷 등 정보통신의 발달에 따른 생활의 편리함 등 순기능과 함께 해킹 등과 같은 역기능도 피할 수 없는 상황이다. 침해사고에 대한 대응은 특정 계급에 국한되는 것이 아니라 사이버공간을 이용하든 모든 사용자가 대비를 해야한다. 사이버 위협에 지속적으로 대비하고, 침해사고 예방 및 대응 수준과 사용자들의 보안 인식을 높혀 개인, 기업, 국가의 안전을 보장해야 할 것이다. 이에 본 연구에서는 침해사고 사례를 바탕으로 분석해 개인 인터넷 이용자들에게 인터넷 침해사고 예방 및 대응요령을 제공한다.

  • PDF