• Title/Summary/Keyword: 사이버 사회

Search Result 708, Processing Time 0.027 seconds

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

A study on the Development for the National Cybersecurity Capability Assessment Criteria (국가 사이버보안 역량 평가를 위한 평가항목 연구)

  • Bae, Sunha;Park, Sangdon;Kim, So Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1293-1314
    • /
    • 2015
  • As ICT is becoming a major social infrastructure, the need to strengthen cyber capabilities are emerging. In the major advanced countries including the United States, has a continuing interest in strengthening cyber capabilities and has studied in enhancements of cyber capabilities. The cyber capability assessment is necessary in order to determine the current level of the country, establish policy directions and legislations. The selection of criteria has very important meaning to suggest future policy direction as well as an objective assessment of cybersecurity capabilities. But there are variable criteria for national cyber capabilities assessment such as strategy, legislation, technology, society and culture, and human resources. In this paper we perform the analysis of criteria for the other country's cybersecurity assessments including the U.S. and Europe. And we proposed the criteria for the national cybersecurity assessment reflecting the our country's characteristics.

The Suggestion and Validation on the Structural Model of the Causes of Cyber-violence (사이버 폭력의 원인에 대한 구조모델의 제시와 검증)

  • Yoo, Sang-Mi;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.1
    • /
    • pp.23-33
    • /
    • 2011
  • The purpose of the study is to investigate the structural relations between variables which give influences on cyber-violence. On the basis of literal materials, those variables as self-control ability, social identity, and norm consciousness are selected as the variables of having influences on cyber-violence, and the analysis is focused on the influence that anonymity, the representative characteristic of Internet, gives them. The validation of the Model is to be done through AMOS 6.0, and the degree of Model validity is to be estimated through the values of ${\chi}^2$, RMSEA, CFI, NNFI. As the result of the analysis, it is found that social identity and norm consciousness are direct causes of cyber-violence. Anonymity does not have any direct relations with it, but it indirectly gives influences on cyber-violence, for it gives some influences on social identity and norm consciousness. That is, anonymity is a cause of weakening social identity and degrading norm consciousness, by which, it is assumed, cyber-violence is triggered.

  • PDF

The Enhancement Strategy on National Cyber Capability Using Hybrid Methodology of AHP and TOPSIS (AHP와 TOPSIS 융합 방법론을 이용한 국가 사이버 역량 강화 방안)

  • Bae, Sunha;Park, SangDon;Kim, So Jeong
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.43-55
    • /
    • 2015
  • The effective cyber capability assessment methodology does not exist, it's difficult to check the current state of the our country's cyber capabilities and to establish cyber capability enhancement plan based on the result of assessment. The cyber capability assessment is necessary in order to determine the current level of the country, establish policy directions and provide the basis for effective budgeting. But assessment of national cyber capability is multi-criteria decision makink problem. In this paper develops an assessment model based on the AHP and TOPSIS. AHP is used to determine weight of the criteria and TOPSIS method is used to obtain final ranking. We also introduce the result of four major nations cyber capability assessment using the proposed methodology. The experiment used the virtual experimental data. And the result show that the proposed methodology can expand the number of criteria and alternatives for assessment and provide more sophisticated mathematical base for objective assessment comparing methodology using AHP only.

A Study on Countermeasures against North Korea's Cyber Attack (북한 사이버공격에 대한 대응방안에 관한 연구)

  • Jung, Yeong Do;Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.43-50
    • /
    • 2016
  • As North Korea has a sufficient ability to attack our society's vulnerable computer network, various large-scale cyber attacks are expected to be tried. North Korea's cyber military strength is known a world-class level. The number of its cyber agents is increasing consistently. Recently North Korea's cyber attack has been made regardless of trick and target. But up to now North Korea's cyber attack is more of an exploration than a real attack. Its purpose was to check how fast Korea found a problem and recovered from it. In future, cyber attack that damages substantially is highly probable. In case of an attack against national infrastructure like traffic, financial and energy services, the extent of the damage will be great beyond imagination. In this paper, characteristics of recent North Korea's cyber attack is addressed in depth and countermeasures such as the enactment of cyber terror prevention law, simulation training enforcement, private and public cooperation system construction, cyber security infrastructure expansion, etc. are proposed.

A Study on Tasks for the Legal Improvement for the Governance System in Cybersecurity (사이버안보 추진체계의 제도적 개선과제 연구)

  • Park, Sangdon;Kim, Injung
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.3-10
    • /
    • 2013
  • Cyber attacks are threats to national security. Today, cybersecurity threats have various types, the theft or spread of privacy and national secret, the realization of direct attacks to infrastructure and the hacktivism with political or social objectives. Furthermore, There are special situations in South Korea because of North Korea's threats. Thus, It is necessary to handle cybersecurity as a kind of national security problem. It is a time to identify problems of governance system in cybersecurity and to improve related Acts and subordinate statutes. There are several tasks for legal improvement for governance system in cybersecurity. They are improving legal bases for the roles of the relevant authorities in cybersecurity, consolidating national joint response to cyber accidents, establishing and vitalizing information sharing system, constructing foundation of cybersecurity through industry promotion and manpower development, and acquiring defensive tools by enhancement research an development. In order to address these challenges, it is necessary to pay much attention to enactment and to revision laws and to practice legislative procedure.

A Plan for Strengthening Cyber Security Capability toward North Korea: focusing on the Preparation of Cyber Warfare (대북 사이버 안보역량 강화를 위한 방안: 사이버전 대비를 중심으로)

  • Kim, Ho Jung;Kim, Jong-ha
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.123-132
    • /
    • 2018
  • North Korea's cyber warfare capability is becoming a serious security threat to Korea because most of the operational systems of social infrastructure and advanced weapons system are all networked. Therefore, the purpose of this article is to examine what the Korean government should do to strengthen cyber security capabilities toward North Korea. For this purpose, this article analyzed North Korea's cyber attack cases against Korea by categorizing according to threat type and purpose. The research findings are as follows. It is necessary first, to have aggressive cyber protection and attack capabilities; second, to establish an integrated cyber security control tower that can be overseen by the national government; third, to need to legislate domestic cyber- related laws; fourth, to build a multilateral & regional cyber cooperation system. The implication of these findings are that it needs to be strengthened the cyber security capability from the cyber threats of North Korea by minimizing the damage during the peacetime period and for the complete warfare in case of emergency.

  • PDF

Cybersecurity Audit of 5G Communication-based IoT, AI, and Cloud Applied Information Systems (5G 통신기반 IoT, AI, Cloud 적용 정보시스템의 사이버 보안 감리 연구)

  • Im, Hyeong-Do;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.428-434
    • /
    • 2020
  • Recently, due to the development of ICT technology, changes to the convergence service platform of information systems are accelerating. Convergence services expanded to cyber systems with 5G communication, IoT, AI, and cloud are being reflected in the real world. However, the field of cybersecurity audit for responding to cyber attacks and security threats and strengthening security technology is insufficient. In this paper, we analyze the international standard analysis of information security management system, security audit analysis and security of related systems according to the expansion of 5G communication, IoT, AI, Cloud based information system security. In addition, we design and study cybersecurity audit checklists and contents for expanding security according to cyber attack and security threat of information system. This study will be used as the basic data for audit methods and audit contents for coping with cyber attacks and security threats by expanding convergence services of 5G, IoT, AI, and Cloud based systems.

The Effect and Problem on Mathematics Study Through E-Learning (e-러닝을 이용한 수학 학습의 효과 및 문제점)

  • Kang, Hyo-Soon;Jung, Jung-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.413-416
    • /
    • 2012
  • The information technology such as personal computers and the internet has become a critical factor in forming a common and popular culture over the last few decades. Those technical inventions have transformed the educational environment. In the past, the only way to get an education was for students to attend schools or private institutions by themselves. In contrast, the internet enables people to learn from a distance by using cyber-education courses and many e-learning contents are provided. Based on those infrastructures, students can be educated in a convenient and flexible way without totally depending on attending school. The purpose of this paper is to examine what the effect of cyber-learning at home is, and to analyse what the problem is? Lastly, this paper also suggests measures to alleviate the adverse effects of it.

  • PDF

Design of the Template System for Cyber Education (사이버교육을 위한 기반구조 시스템의 설계)

  • 허미영;이종화;김용진;진병문
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2225-2232
    • /
    • 1999
  • We designed the template system for cyber education, which is a software infrastructure for knowledge information society. First, we defined the common functions of our system based on the design principles of cyber education and working results of international standardization group. Second, we think that template system will make a big role in order to deploy the cyber education system. Therefore, we designed the template system for cyber education. Our designed template system is able to implement cyber education system easily such as normal education, technical education, re-education, private education etc. Therefore, This paper describes the practical use environment, configuration of system components, design technique, expected effects on our cyber education template system.

  • PDF