• Title/Summary/Keyword: Cyber Operation

Search Result 261, Processing Time 0.026 seconds

Decision Making Model for Selecting Financial Company Server Privilege Account Operations (금융회사 서버 Privilege 계정 운영방식 결정 모델)

  • Lee, Suk-Won;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1607-1620
    • /
    • 2015
  • The server privilege account must be operated through law and regulation. However, due to regulation non-compliance and inadequate operation on financial company server privilege, an incident that every server data being deleted by hacker occur which is later being named as 'NH Bank Cyber Attack'. In this paper, the current operation status on financial company privilege accounts is being analysed to elicit problems and improvement. From the analysis, important evaluation factors will be also selected and applied generating the decision making model for financial company server privilege account operation. The evaluation factor deducted from privilege account status analysis will be used to present and verify the decision making model and formula through AHP(Analytic Hierarchy process).

Design of the Digital Neuron Processor (디지털 뉴런프로세서의 설계에 관한 연구)

  • Hong, Bong-Wha;Lee, Ho-Sun;Park, Wha-Se
    • 전자공학회논문지 IE
    • /
    • v.44 no.3
    • /
    • pp.12-22
    • /
    • 2007
  • In this paper, we designed of the high speed digital neuron processor in order to digital neural networks. we designed of the MAC(Multiplier and Accumulator) operation unit used residue number system without carry propagation for the high speed operation. and we implemented sigmoid active function which make it difficult to design neuron processor. The Designed circuits are descripted by VHDL and synthesized by Compass tools. we designed of MAC operation unit and sigmoid processing unit are proved that it could run time 19.6 nsec on the simulation and decreased to hardware size about 50%, each order. Designed digital neuron processor can be implementation in parallel distributed processing system with desired real time processing, In this paper.

Analysis of Health Promoting Schools: Focusing on Small-sized Elementary School in Rural Area (건강증진모델학교 분석: 읍면 지역 소규모 초등학교를 중심으로)

  • Kim, Miju
    • Journal of the Korean Society of School Health
    • /
    • v.28 no.2
    • /
    • pp.67-78
    • /
    • 2015
  • The purpose of the study was to present a model of WHO Health Promoting School easily applicable to small-sized schools in rural areas. Methods: The study analyzed data of 11 small-sized schools in rural areas selected from 85 health promoting schools, an initiative led by the Ministry of Education from 2012 to 2014. Results: Through the analysis, the study found out the operation process of health promoting schools consists of five stages: system development, needs survey & survey on current status, school health policy development, program development & execution, and evaluation. In addition, the study was able to discover three key factors in operating health promoting schools: connection with curriculum, connection with community, and consensus among members. While it turned out the schools were following operation manuals faithfully, the biggest problem with operation was that the stages of needs survey, priority setting, and core task development were not closely coordinated. Conclusion: Although the model suggested in the study fails to reflect the characteristics of small-sized schools in rural areas, it is close to a universal model which could serve as a guideline when regular schools adopt the system of health promoting schools.

A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database (취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구)

  • Hyun, Suk-woo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1167-1177
    • /
    • 2019
  • In this paper, the improved security operation model based on the vulnerability database is studied. The proposed model consists of information protection equipment, vulnerability database, and a dashboard that visualizes and provides the results of interworking with detected logs. The evaluation of the model is analyzed by setting up a simulated attack scenario in a virtual infrastructure. In contrast to the traditional method, it is possible to respond quickly to threats of attacks specific to the security vulnerabilities that the asset has, and to find redundancy between detection rules with a secure agent, thereby creating an optimal detection rule.

A Study on CPS-based Mold Life-cycle Management System for Smart Factory (스마트 공장을 위한 CPS 기반 금형 수명 관리 시스템에 관한 연구)

  • Shin, Hyun-Jun;Kim, Sung-Jin;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.816-818
    • /
    • 2016
  • The Industry 4.0 should decide work operation of manufacture facilities by itself. But small and medium sized enterprises(SMEs) still not prepared these work operations. In this paper, we had research that work operation manufacture facilities of a management system of mold life-cycle based on CPS. The management system of mold manages life-cycle using by shot, this information offers users by cloud system. This system will help SMEs products quality improve and business operation more efficiency.

  • PDF

A Study on the Patterns of Ship Trajectory Arriving and Departing from Busan New Port (부산신항 입출항선박의 항적패턴에 관한 연구)

  • Hyeong-Tak Lee;Ik-Soon Cho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.11a
    • /
    • pp.147-148
    • /
    • 2022
  • Recently, as a number of accidents occur while berthing ships, the need for safety measures for ship operation in ports is emphasized. In order to quantitatively analyze the contents of safety measures in Busan New Port, this study collected ship trajectory data,, and based on this data, applied a maritime artificial intelligence algorithm to analyze the trajectory pattern. As a result, the waypoint of the ship arriving and departing Busan New Port was derived and the operation pattern of the ship's speed and course was proposed.

  • PDF

A Study on Economic Operation for Liner-Fleet by Fluctuation of Fuel Oil Price (연료유 가격변동에 따른 컨테이너선대의 경제적 운영방안)

  • Lee, Soo-Dong;Shin, Jeong-Hoon;Kim, Chul-Hyun;Chang, Myung-Hee
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2009.06a
    • /
    • pp.173-174
    • /
    • 2009
  • For container shipping company, fuel oil prise is a considerable expense. In the last 3 years, fuel oil prises have risen considerably. An increasing fuel oil prise in container shipping, in the short term, is only partially compensated through surcharges and will therefore affect earnings negatively. This paper deals with the impact of increasing fuel oil price and capital costs for vessels on the number of vessels on the Asia-Europe trade. As per result of 'H' carrier's operation in 2008, there were no cost difference between 8 and 9 vessels operation in case the fuel oil price is USD 169/tons while adopt USD 31,818 as fixed cost. We can expect that the fuel oil price will not be decreased under USD 200 $/Ton on the basis of current high oil price phenomenon. When the fuel oil price is over USD 200 $/ton, therefore, 9 vessels operation is more economic than 8 vessel operation even if the fixed cost is over USD 35,000.

  • PDF

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.

A study on the effect of virtual reality operations on cyber motion sickness (가상현실(VR)에서 조작행위가 사이버멀미에 미치는 영향)

  • Ko, Yun-Seo;Han, Jung-Wan
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.451-457
    • /
    • 2020
  • In this study, the degree of motion sickness displayed according to actions in virtual reality is measured based on the SSQ tool, a measuring tool, and factors and symptoms affecting cyber motion sickness are investigated through comparative analysis. In the first experiment, the operation method experiment, the simple operation method is measured to be highly affected by the Nausea factor. As symptoms of this, nausea, burp and headache symptoms were developed. In the second experiment, the larger the body rotation radius, the higher the motion sickness was measured, and the greater the influence of Nausea factors. Symptoms of this were the symptoms of burping, headaches, and a full head. In the third experiment, the physical mobility experiment, motion sickness was measured highly in the non-action controller. It was measured to be greatly affected by the Nausea factor. Symptoms of this include fever, headache, and a full head. Through this study, we found that the more fixed and simple the body is operated in virtual reality, the more sensitive the user is to motion sickness, and the larger the radius of rotation, the more sensitive it is to motion sickness. This study is meaningful in identifying factors and symptoms that affect motion sickness and VR manipulation, and is expected to be used by developers in the future to recognize the degree and symptoms of motion sickness of users and to develop content.

This paper asks whether the Republic of Korea (ROK) Navy should Study on ROK Navy's Strategy Planning - Concerning to JOAC, ASB Concept of US Armed Forces - (한국 해군의 전략 수립 방향 연구 - 미군의 JOAC, ASB 개념 분석과 한국 해군에의 함의-)

  • Na, Sung-Min
    • Strategy21
    • /
    • s.32
    • /
    • pp.5-35
    • /
    • 2013
  • The purpose of this thesis is to suggest how to plan ROK(Republic of Korea) Navy's strategy concerning to JOAC(Joint Operation Access Concept) and ASB(Air-Sea Battle) concept of US(United States) armed forces. Since 2006, US armed forces has been developing CONOPS(Concepts of Operations), JOAC & ASB. These concepts will not only affect security environment for Korea Peninsula and West Pacific Area, but also will be affected to ROK Navy's Strategy. Therefore, Korea Navy has to consider and review those concepts and should discuss the way to secure peace of Korea Peninsula. JOAC & ASB have been developed for securing operational access ability of US armed forces against enemy forces. A2/AD(Anti-Access, Area-Denial) is the strategy of possible enemy forces against US forces' approaching into the operation area and impede operations within area. US forces had to overcome enemy's A2/AD strategy in coming century to protect national interest and sustain global leadership. The main concept of JOAC & ASB is "Cross-domain Synergy", which means 'to eliminate duplicate and improve joint operability containing space and cyber operation area.' Korea Navy's acceptance of JOAC & ASB without any revising is not a rational choice. Without the amendment some problems can be occurred by the Korea navy's acceptance for the original version of JOAC & ASB. Those are "Missing differences of operation environment between Korea and US", "Impediment from neighbor nations, especially PRC (People's Republic of China)", and "Impediment inside from Korea armed forces". Therefore, Korea Navy has to evaluate and find out the way to solve for JOAC & ASB to apply for their strategy and minimise those possible problems above. This thesis is expected to be the solution.

  • PDF