• Title/Summary/Keyword: 사이버 기반

Search Result 1,246, Processing Time 0.027 seconds

Theoretical Implication on Establishing the National Countermeasure System against Cyber Crime - Focusing on a Pattern of Cyber Terror - (사이버범죄에 대한 국가적 대응체계 구축의 이론적 함의 -사이버테러형 범죄를 중심으로-)

  • Kim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.165-171
    • /
    • 2009
  • From the late 20th century, rapidly progressing information communication technology and spreading Internet all over the world cause many reverse functions when there is a conversion into the new information society. One of them is cyber terrorism as cyber crime. Cyber terrorism gradually has had a serious problem in the national security as well as the domestic aspects. Therefore, this study looked into the present condition of cyber terrorism, discussed its prospect, and sought the efficient national countermeasure methods against cyber terrorism by comparing other countries' countermeasure systems currently.

Digital Asset Analysis Methodology against Cyber Threat to Instrumentation and Control System in Nuclear Power Plants (원자력발전소의 디지털계측제어시스템의 사이버보안을 위한 디지털 자산분석 방법)

  • Koo, In-Soo;Kim, Kwan-Woong;Hong, Seok-Boong;Park, Geun-Ok;Park, Jae-Yoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.839-847
    • /
    • 2011
  • Instrumentation & Control(I&C) System in NPP(Nuclear Power Plant) plays a important role as the brain of human being, it performs protecting, controling and monitoring safety operation of NPP. Recently, the I&C system is digitalized as digital technology such as PLC, DSP, FPGA. The different aspect of digital system which use digital communication to analog system is that it has potential vulnerability to cyber threat in nature. Possibility that digital I&C system is defected by cyber attack is increasing day by day. The result of cyber attack can be adverse effect to safety function in NPP. Therefore, I&C system required cyber security counter-measures that protect themselves from cyber threat efficiently and also cyber security design should be taken into consideration at concept stage in I&C system development process. In this study, we proposed the digital asset analysis method for cyber security assessment of I&C system design in NPP and we performed digital asset analysis of I&C system by using the proposed method.

A study on the development of cybersecurity experts and training equipment for the digital transformation of the maritime industry (해양산업 디지털전환을 위한 사이버보안 전문 인력양성 방안연구)

  • Jinho Yoo;Jeounggye Lim;Kaemyoung Park
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.11a
    • /
    • pp.137-139
    • /
    • 2022
  • As cyber threats in the maritime industry increase due to the digital transformation, the needs for cyber security training for ship's crew and port engineers has increased. The training of seafarers is related to the IMO's STCW convention, so cyber security training also managed and certified, and it is necessary to develop a cybersecurity training system that reflects the characteristics of the OT systemof ships and ports. In this paper, with the goal of developing a training model based on the IMO cyber risk management guideline, developing a cyber security training model based on the characteristics of maritime industry threats, and improving the effectiveness of cyber security training using AR/VR and metaverse, A method for developing a system for nurturing cyber security experts is presented.

  • PDF

Development & Operation of Cyber education system for computer courses (전산 교육을 위한 사이버 교육 시스템의 개발 및 운영)

  • 김일민;장은섭
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11b
    • /
    • pp.823-826
    • /
    • 2003
  • 사이버 교육 시스템 기반을 구축하기 위한 일련의 연구의 한 부분으로써, 새로이 개발된 컴퓨터 기술들이 현 가상 교육 시스템과 어떻게 융합되어 더 나은 사이버 교육 시스템을 구축할 것인가를 제시한다. 많은 IT 교육이 사이버를 통하여 이루어지고 있으나, 이는 이론 교육과는 달리 컴퓨터를 이용한 실습이 필요한 경우가 많다. 한성대학교에서 실시한 가상 강좌의 운영 경험을 제시한다. 기존 강좌와 비교하여 전산 교육을 위한 가상 강좌의 문제점과 그 개선점을 제안하고자 한다.

  • PDF

Safe Network Technologies (세이프 네트워크 기술)

  • Song, J.T.;Noh, S.K.;Park, H.S.;Park, J.D.;Kim, S.G.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.6
    • /
    • pp.28-36
    • /
    • 2013
  • 사이버 테러의 급증으로 인해 사이버 공간에서의 네트워크 역할이 중요해 지고 있다. 이러한 사이버 공격, 정보 유출 등에 의한 국가적 차원의 사이버 안보 위협에 적극적으로 대처하고자 세이프 네트워크기술 개발을 추진 중이다. 본고에서는 (1) IP 주소 은닉기반 라우팅 기술, (2) 전역적 제어 관리 시스템 기술 (3) 폐쇄망용 프로텍티드 WiFi시스템기술, (4) 보안을 강화한 네트워크 SW 기술을 주축으로 하는 세이프 네트워크의 핵심기술 및 주요 시스템의 기술개발 동향에 대해 알아본다.

A Multiuser from Virtual Shopping System of Disquisition (다중사용자를 위한 가상 쇼핑 시스템에 대한 연구)

  • 신정길;서영석;이종욱;최성
    • Proceedings of the KAIS Fall Conference
    • /
    • 2000.10a
    • /
    • pp.360-363
    • /
    • 2000
  • 본 논문에서는 사용자가 가상 쇼핑몰에 접속하여 여러 가지 물품에 대하여 구체적인 정보를 얻을 수 있는 사이버 쇼핑 몰 시스템 개발에 대해 소개한다. 또한, 이 시스템은 동일한 가상 쇼핑몰에 여러 사용자가 동시에 접속하여 참여할 수 있도록 설계되었다. 이를 위하여, 제시된 가상 쇼핑 시스템은 웹 서버를 기반으로 한 클라이언트/서버 구조로 구축되었으며, 사이버몰 생성기, 사이버몰 서버, 그리고 사이버몰 플레이어 등으로 구성된다.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.

Usability Evaluation on Cyber Chatting System (사이버 채팅 시스템의 사용성 평가)

  • 한혁수
    • Science of Emotion and Sensibility
    • /
    • v.2 no.2
    • /
    • pp.83-91
    • /
    • 1999
  • 사이버 채팅 시스템(Cyber Chatting System)은 한 명 이상의 참여자들이 사이버 공간에서 대화할 수 있도록 해주는 양방향 이사 소통 시스템이다. 컴퓨터를 통한 통신이 점차 확산되어 가면서 사이버 채팅 시스템도 그 중요도가 새롭게 인식되고 있고, 국내외로 많은 사이버 채팅 시스템이 운영 중에 있다. 사이버 채팅 시스템들도 다른 시스템들과 마찬가지로 사용자들이 원하는 서비스를 제공하고 있는가를 판단하고 개선 방향을 얻기 위해서는 사용성 평가를 받아야 한다. 기존의 일반적인 프로그램 평가 방식이나 웹 페이지 평가 방식만을 적용해서는 사이버 채팅 시스템의 특징을 반영하는 평가를 하기에 충분하지 않다. 그러므로, 본 논문에서는 사용자들이 일반 대화에서 얻은 정신 모형을 바탕으로 사용성 평가 방식을 개발하여 채팅 시스템의실질적 사용성을 분석할 수 있도록 하였다. 이러한 평가 시스템을 적용하면 사용자의 예상과 기대를 기반으로 시스템의 사용성을 평가하여 보다 나은 시스템 개발을 위한 개선 방향을 효과적으로 제시할 수 있다.

  • PDF

Visualization of the Cyber Space for e-Businesses (E-비즈니스를 위한 사이버 공간의 이해)

  • Choi, Se-Ill
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.957-963
    • /
    • 2011
  • This paper proposes a way to visualize the cyber space with respect to the offline space. In general, people have difficulties to understand the cyber space since it is not tangible and not visible. In businesses, both spaces depend on identical proposition of "salse of merchandise goods to customers". Here, 3 merchandise elements of "customers", "merchandise goods" and "salse" in the cyber space are compared to them in the offline spaces in order to visualize the cyber space in terms of businesses.