• Title/Summary/Keyword: 사이버 사회

Search Result 708, Processing Time 0.025 seconds

A Study on an Estimation of Adjusted Coefficient for the Maintenance of Information Security Software in Korea Industry (정보보안 소프트웨어 유지보수 대가기준을 위한 보정계수 산정에 관한 연구)

  • Park, You-Jin;Park, Eun-Ju
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.109-123
    • /
    • 2011
  • The maintenance prices in information security industry between Korean companies and foreign companies have been a big difference. Korea Information Security SW maintenance standards were not adequate for the rate, and there was disagreement between domestic companies and governments. This research, therefore, surveyed a standard of information SW and the status of maintenance payment rates. The study suggests an estimation method and verifies the method and an appropriate maintenance cost rate. According to the results of the study, the current maintenance cost should be increased or decreased independent with a kind of information security systems. Based on the study, Korea government is able to change the maintenance policy in information security. And the domestic companies get a theoretical ground for improving the rates of maintenance costs in information security systems and are able to allot the resources effectively.

Host based Feature Description Method for Detecting APT Attack (APT 공격 탐지를 위한 호스트 기반 특징 표현 방법)

  • Moon, Daesung;Lee, Hansung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.839-850
    • /
    • 2014
  • As the social and financial damages caused by APT attack such as 3.20 cyber terror are increased, the technical solution against APT attack is required. It is, however, difficult to protect APT attack with existing security equipments because the attack use a zero-day malware persistingly. In this paper, we propose a host based anomaly detection method to overcome the limitation of the conventional signature-based intrusion detection system. First, we defined 39 features to identify between normal and abnormal behavior, and then collected 8.7 million feature data set that are occurred during running both malware and normal executable file. Further, each process is represented as 83-dimensional vector that profiles the frequency of appearance of features. the vector also includes the frequency of features generated in the child processes of each process. Therefore, it is possible to represent the whole behavior information of the process while the process is running. In the experimental results which is applying C4.5 decision tree algorithm, we have confirmed 2.0% and 5.8% for the false positive and the false negative, respectively.

A Study on the Customized Security Policy for Effective Information Protection System (실효적인 정보보호관리 통제를 위한 맞춤형 보안정책 연구)

  • Son, Young-hwan;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.705-715
    • /
    • 2017
  • Today, the world is evolving into a huge community that can communicate with real-time information sharing and communication based on the rapid advancement of scientific technology and information. Behind this information, the adverse effects of information assets, such as hacking, viruses, information assets, and unauthorized disclosure of information assets, are continually increasing as a serious social problem. Each time an infringement of the invasion and personal information leaks occur, many regulatory policies have been announced, including stricter regulations for protecting the privacy of the government and establishing comprehensive countermeasures. Also, companies are making various efforts to increase awareness of the importance of information security. Nevertheless, information security accidents like the leaks of industrial secrets are continuously occurring and the frequency is not lessening. In this thesis, I proposed a customized security policy methodology that supports users with various business circumstances and service and also enables them to respond to the security threats more confidently and effectively through not a monotonous and technical but user-centered security policy.

Financial Industry Security: A Qualitative Study for Reducing Internal Fraud in Banking Institutions (금융산업보안: 은행권 내부부정 방지를 위한 질적 연구)

  • Suh, Joon Bae
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.165-185
    • /
    • 2018
  • Because financial industry is closely related to the daily lives of people, internal fraud such as embezzlement by the employees can cause serious damage to the national economy, including credit crunch and contagious bankruptcy, as once demonstrated in the Savings Bank Scandal in 2011. Therefore, the importance of financial industry security is being emphasized and developed into converged security that combines physical, human and cyber security. In this study, to prevent fraud caused by internal employees in Korean financial sector, in-depth semi-structured interviews were conducted with a total of 16 participants including bankers, officials of financial regulators, and security experts, who were in charge of risk management in the industry. The collected data were analyzed at three stratification levels such as individual, organization, and socio-cultural factor. Based on this analysis, policy recommendations were suggested for the development of financial industry security and reducing internal fraud in banking institutions.

VPN-Filter Malware Techniques and Countermeasures in IoT Environment (사물인터넷 환경에서의 VPN-Filter malware 기술과 대응방법)

  • Kim, Seung-Ho;Lee, Keun-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.231-236
    • /
    • 2018
  • Recently, a wide variety of IoT environment is being created due to the rapid development of information and communication technology. And accordingly in a variety of network structures, a countless number of attack techniques and new types of vulnerabilities are producing a social disturbance. In May of 2018, Talos Intelligence, the Cisco threat intelligence team has newly discovered 'VPN-Filter', which constitutes a large-scale IoT-based botnet, is infecting consumer routers in over 54 countries around the world. In this paper, types of IoT-based botnets and the attack techniques utilizing botnet will be examined and the countermeasure technique through EXIF metadata removal method which is the cause of connection method of C & C Server will be proposed by examining the characteristics of attack vulnerabilities and attack scenarios of VPN-Filter.

Themes of self-esteem memories in female adults: Achievement or relationship (성인여성의 자기존중기억 주제에 관한 연구: 성취 혹은 관계)

  • Kim, Youngkyoung;Goh, Jinkyung
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.313-321
    • /
    • 2019
  • This study investigated the themes of self-esteem memories in female adults. Self-esteem memories mean memories that are focused on evaluations of the self and the themes of them are classified as achievement or social relationship. Eighteen young adults(M=21.56), fifteen middle aged adults(M=54.13), and twenty older adults(M=74.35), totally fifty three female adults participated. They recalled 4 positive and 4 negative self-esteem memories respectively. The results showed that memories of positive and negative self-worth frequently focused on relationship themes, and this tendency was significant in positive memory of young adults and negative memory of middle aged adults. This suggests that social relationship is a dominant cultural value in Korea. Links between interpersonal relationship and positive/negative self-esteem memories are explained by culture, gender and developmental tasks. Further researches about the differences by sex and life scripts in the content of self-esteem memories are needed.

Factors Affecting Adaptation of North Korean Refugees to South Korean Society: Character Strengths and Psychological Well-being (북한이탈주민의 남한사회적응에 미치는 영향요인 : 성격강점과 심리적 안녕감을 중심으로)

  • Kim, Eun-Mi
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.361-369
    • /
    • 2019
  • The purpose of this study was to investigate the adaptation factor to North Korean refugees by identifying the relationship between character strengths affecting adaptation process and psychological well-being(PWB) in South Korea. The study examined the relationship between PWB and character strength of 117 participants and identified the sub-factors of character strength that affect the settlement period in South Korea. The data were analyzed by using the Model 1 of Process Macro and SPSS 22. The results of this study showed a correlation between PWB and sub-factors of character strength such as wisdom, humanity, courage, justice, temperance, and spirituality. The main effect was to investigate the relationship between PWB and sub-factors of character strength by independent variables. The level of PWB increased with the level of sub-factors of character strength. The moderate effect was showed in the courage of the settling period in relation to PWB. Finally, Limitations and implications of this study was discussed.

Production of fusion-type realistic contents using 3D motion control technology (3D모션 컨트롤 기술을 이용한 융합형 실감 콘텐츠 제작)

  • Jeong, Sun-Ri;Chang, Seok-Joo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.4
    • /
    • pp.146-151
    • /
    • 2019
  • In this paper, we developed a multi-view video content based on real-world technology and a pilot using the production technology, and provided realistic contents production technology that can select a desired direction at a user 's view point by providing users with various viewpoint images. We also created multi-view video contents that can indirectly experience local cultural tourism resources and produced cyber tour contents based on multi-view video (realistic technology). This technology development can be used to create 3D interactive real-world contents that are used in all public education fields such as libraries, kindergartens, elementary schools, middle schools, elderly universities, housewives classrooms, lifelong education centers, The domestic VR market is still in it's infancy, and it's expected to develop in combination with the 3D market related to games and shopping malls. As the domestic educational trend and the demand for social public education system are growing, it is expected to increase gradually.

Adolescent Self-esteem, Career Identity, School Learning Activity and Life Satisfaction Change: From Middle School to High School (중학교에서 고3까지의 자아존중감, 진로정체감, 학습활동과 삶의 만족도 관계연구: 4년간의 변화를 중심으로)

  • Kim, Sunah
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.507-514
    • /
    • 2018
  • This study utilized latent growth curve modeling to investigate the trajectories of adolescent life satisfaction changes in middle and high school students. The effects of self-esteem, career identity, school learning activity, gender, and household earnings on life satisfaction changes were examined. Data was obtained from the Korea Child Youth Panel Survey (KYCPS), a longitudinal study following students for 7 years. Year 3-6 data was utilized. Results found that the life satisfaction trajectory resulted as a quadratic model in which individual differences were significant. Second, school learning activity used as a time variant variable had a positive significant effect on life satisfaction each year. Third, gender and self-esteem as time invariant variables had significant effects on initial levels while self-esteem had effects on the slope and quadratic change. Further implications and research issues are discussed.

Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property (트래픽 자기 유사성(Self-similarity)에 기반한 SCADA 시스템 환경에서의 침입탐지방법론)

  • Koh, Pauline;Choi, Hwa-Jae;Kim, Se-Ryoung;Kwon, Hyuk-Min;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.267-281
    • /
    • 2012
  • SCADA system is a computer system that monitors and controls the national infrastructure or industrial process including transportation facilities, water treatment and distribution, electrical power transmission and distribution, and gas pipelines. The SCADA system has been operated in a closed network, but it changes to open network as information and communication technology is developed rapidly. As the way of connecting with outside user extends, the possibility of exploitation of vulnerability of SCADA system gets high. The methodology to protect the possible huge damage caused by malicious user should be developed. In this paper, we proposed anomaly detection based intrusion detection methodology by estimating self-similarity of SCADA system.