• Title/Summary/Keyword: 사이버국토

Search Result 37, Processing Time 0.032 seconds

전자녹지공간 개발의 필요성과 관리방향

  • Ha, Won-Gyu
    • 정보화사회
    • /
    • s.133
    • /
    • pp.44-47
    • /
    • 1999
  • 전자녹지공간은 바로 이러한 물리국토의 토지이용 제한개념을 사이버 공간상에 적용시켜, 오염된 정보가 발을 붙일 수 없는 특정정보공간 (도메인 부여 등)을 지정하고, 이 공간을 유지.관리하기 위하여 인증제 및 지속적인 감독 계획을 수립해 보자는 일종의 사이버 청정지역이라고 할 수 있다.

  • PDF

A Study on the Application of International Conventions to Respond to Cyber Threats in Civil Aviation (민간항공의 사이버위협 대응을 위한 국제협약 적용에 관한 연구)

  • Park, Man-Hui
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2023.11a
    • /
    • pp.41-42
    • /
    • 2023
  • 항공편과 승객의 흐름을 효율적으로 처리하기 위한 디지털 시스템에 대한 의존도 증가와 승객용 기내 와이파이 서비스 등으로 인해 민간항공의 사이버 보안 취약성은 매년 증가하고 있는데 비해 공항에 대한 무장 공격, 항공기에 폭발물 설치 및 납치와 같은 전통적인 테러에 맞춰 마련된 항공보안 관련 국제협약은 사이버 위협에 직접적으로 적용하기 어렵다는 문제를 갖고 있다. 본 연구는 민간항공에 대한 사이버 공격의 예방 및 기소와 관련된 국제협약의 적정성을 검토한 후, 사이버 위협 대응을 위한 기존 국제협약 체계, 잠재적 차이 해석 등을 중점적으로 분석하여 민간항공의 안전을 위협하는 불법방해행위로부터 중요정보 및 시스템을 보호하는 항공 사이버 보안 국제표준 마련 및 이행 촉진을 강조하고자 한다.

  • PDF

A Study on the Need of Unified Cyber Crisis Management System:Around Comparison about Policies and Systems of USA and Korea (통합적 사이버 위기관리 체계의 필요성에 관한 연구 : 미국과 한국의 제도 및 정책 비교를 중심으로)

  • Kim, Min-Sik;Park, Sang-Don;Kwon, Hun-Yeong;Kim, Il-Hwan;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.29-37
    • /
    • 2009
  • According to Homeland Security Act of 2002, DHS in USA is comprehensively responsible for execution of protection methods on the public and private sectors against cyber attack for USA cyber crisis management. There are different laws and organizations according to the sector that is the public, the private, CII(Critical Information Infrastructure, or Non-CII in Korea. In this paper, we show the unified cyber crisis management of USA makes korea realize the importance to integration and systematization for the national cyber crisis management system.

  • PDF

Homeland Security에서의 M2M(사물지능통신) 보안 동향

  • Kim, Woo-Nyon
    • Review of KIISC
    • /
    • v.22 no.1
    • /
    • pp.14-19
    • /
    • 2012
  • 홈랜드 시큐리티는 비군사적 위협으로부터의 국토안보를 의미하며, 정보보호, 물리보안, 무인경비, 산업 및 재해방지시스템 등을 연계하여 사이버 공격, 산업기술 유출 및 국제테러 등에 효과적으로 대응하는 IT 기반의 융 복합 분야를 통칭하고 있다. 홈랜드 시큐리티의 주요 영역은 여러 가지 분류가 가능할 수 있지만, 항공보안, 대량수송보안, 해양보안, 인프라보안, 사이버보안, 국경보안, 대테러 첩보, 비상대응 등으로 구분할 수 있다. 홈랜드 시큐리티의 영역중 사물지능통신이 제한적으로 활용되고 있으며 향후 활용이 확대될 것으로 예상되는 분야 중 하나는 스마트그리드를 포함한 사회기반시설 분야이다. 사회기반시설은 이미 사이버 보안위협에 노출되어 있으며, 향후 사물지능통신이 보편화되면 사회기반시설은 사이버공격의 핵심대상으로 더욱 부각될 것으로 예상된다. 본 고에서는 사회기반시설의 사물지능통신 현황 및 향후 전망을 살펴보고, 사회기반시설에 대한 사이버 보안위협 사례와 대응 현황에 대해서 소개한다.

GIS Viewed from Oriental Philosophical Perspective (동양사상으로 재조명한 GIS)

  • 김영표
    • Spatial Information Research
    • /
    • v.8 no.2
    • /
    • pp.183-189
    • /
    • 2000
  • According to Oriental perspective on Universe, all systems become complete when three elements namely time, space, and human are all present. The only computer technology which can integrate these three elements is GIS. The current GIS database and system architecture, however, mainly concentrate on managing and analyzing spatial data without considering temporal and human elements. Despite the limitations, it is certain that GIS technology will develop into a unity within which the three elements of time, space and human are integrated. On the other hand, with the rapid acceptance of Internet technology, a new small universe that can be called "cyber world" is emerging. However, the current small univers created by internet is only a half-universe which does not include the concept of space. The creation of "cyber nation" which truly reflects our living environment in computer and information communication networks can only be achievedthrough the integration of GIS and Internet. Currently, many countries are heavily investing in GIS. Based on the magnitude of investments, we can expect that the concept of "cyber nation" will further develop into "cyber world" where the search for information on any part of global village is possible with the simple use of mobile phone regardless of time or location. If so, it might be possible to create a "Digitopia", a digital utopia in cyber space. A new world is opening by the integration of GIS and Internet.is opening by the integration of GIS and Internet.

  • PDF

A Scheme of Training the MND Information Security Manpower (국방 정보보호 인력 양성 방안)

  • 박상서;최운호
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.69-81
    • /
    • 2001
  • As soon as possible, our military have to trainning the information security manpower for Cyber Warfare, it should be block the foreign infowarrior to go by way of other country from our system. An emergency, we can protect our military information system and this thesis provide checkpoint about how we consider about trainning the infowarrior for future war.

  • PDF

Study for environmental education Using virtual reality experience (가상현실 체험을 이용한 환경교육에 관한 연구)

  • Lee, Keun-Wang;Kim, Yong-Hwan
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.05a
    • /
    • pp.211-213
    • /
    • 2011
  • 본 연구에서는 도시화, 국토개발 등을 통해 빠르게 달라지고 있는 거주공간 및 자연환경의 원형을 사이버공간에 친환경적으로 표현하여 환경교육 학습자료로 활용하기 위한 컨텐츠로 조선시대 마을의 거주공간 및 자연환경의 원형을 3D기술(가상현실, 3D Max)을 이용하여 사이버공간에 재현하는 환경 교육용 가상체험 프로그램을 개발하고자 한다.

  • PDF

Sharing the Cyber Threat Intelligence on Cyber Crises: The Appropriate Role of the National Intelligence Agency (사이버위기에 대응하기 위한 국가정보기관의 사이버위협정보 공유 역할에 대한 고찰)

  • Kim, Daegeon;Baek, Seungsoo;Yoo, Donghee
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.51-59
    • /
    • 2017
  • The role of government is to defend its lands and people from enemies. The range of that defense has now extended into the cyber domain, regarded as the fourth domain of the conventional defense domains (i.e., land, sea, sky, and universe). Traditionally, a government's intelligence power overrides that of its civilians, and government is exclusively responsible for defense. However, it is difficult for government to take the initiative to defend in the cyber domain because civilians already have a greater means for collecting information, which is known as being "intelligence inverse" in the cyber domain. To this end, we first define the intelligence inverse phenomenon and then analyze its main features. Then we investigate foreign countries' efforts to overcome the phenomenon and look at the current domestic situation. Based on these results, we describe the appropriate role of the National Intelligence Agency to handle cyber threats and offer a cyber threat intelligence model to share with civilians to help protect against these threats. Using the proposed model, we propose that the National Intelligence Agency should establish a base system that will respond to cyber threats more effectively.

Analysis of Strategic Priorities for Strengthening Cybersecurity Capability of Cambodia (캄보디아의 사이버보안 역량강화를 위한 전략적 우선순위 분석)

  • Heng, Mara;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.93-102
    • /
    • 2019
  • This paper aims to set the priorities for the cybersecurity strategy of Cambodian government. To this end, we built a AHP research model by adopting 4 factors from the ITU national interests model and selecting 7 strategies from best practices of 8 countries leading the cyber security. Using a questionnaire, 19 experts evaluated Cambodia's cybersecurity strategy priorities. The key policy factors were evaluated in the order of homeland defense, economic welfare, value promotion and favorable world order. Their strategic alternatives were identified in the order of legislation, capacity building, and cyber attack prevention for critical infrastructure. This study will contribute to setting the strategic priorities and feasible action plans to strengthen Cambodia's cybersecurity capabilities.

The Model to Implement the Cyber Security Policy and Strategy for Azerbaijan Information System (아제르바이잔 정보시스템에 대한 사이버보안 정책과 전략의 실행모델 구축)

  • Aliyeva, Leyla Mehdi;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.23-31
    • /
    • 2019
  • This study aims to build an AHP model that evaluates the priority of cyber security policies for the Azerbaijan information system. For this, 4 factors were constructed from components of ITU National Interest Model, whereas 5 alternatives were based on the best practices of the eight developed countries leading the cyber security field. Using the questionnaire, 24 security experts evaluated the strategic priority of such factors or alternatives. The analysis results using the AHP software showed that homeland defense and economic well-being were the dominant aspects of cyber security policy, whereas capacity building and infrastructure were the main concern of cyber security elements for Azerbaijan. This study presents the strategic priority of cyber security policies that can be adopted by Azerbaijan government. This study can contribute to developing the national cyber security guide of Azerbaijan.