• Title/Summary/Keyword: Cyber Operation

Search Result 256, Processing Time 0.028 seconds

Satisfaction on the practical training of public institution's staffs in cyber oral health service (공공기관 근무자의 사이버 구강보건사업실무과정 교육에 대한 만족도)

  • Hwang, Yoon-Sook;Cho, Eun-Pyol
    • Journal of Korean society of Dental Hygiene
    • /
    • v.12 no.1
    • /
    • pp.225-233
    • /
    • 2012
  • Objectives : This thesis aims to provide basic materials for exploring trends and operational strategy of the cyber training. To achieve study purpose, it analyzed the satisfaction of trainees in regard to the education of field training course of Cyber Oral Health Promotion Program, established and operated between 2007 and 2009. Methods : This study conducted questionnaire surveys after the completion of training to utilize the satisfaction level of 989 respondents among 1,310 employees of public institutions who completed the field training course of Cyber Oral Health Promotion Program. Results : Respondents showed satisfaction on the training course throughout three years in terms of satisfaction of instructional methods (screen characteristics, educational techniques, and so on) according to educational contents, the connection and realization of online education and service satisfaction, necessary for learning in association with educational guidance, offered to learners by a tutor and rapidity in questions and answers. A majority of respondents in all years answered that they participated in training program voluntarily for self-development and improvement in work ability, and they thought that the completion of course would be helpful to their current work and future work. In addition, cyber training program was primarily conducted in the working place by 72.5%, and the most difficult thing in cyber training was to combine work and learning by 60.6%. Conclusions : As shown in the results above, workers in public institutions were satisfied with cyber job training and it was evaluated that cyber job training would be helpful to performing their actual work. Therefore, it is needed to collect and evaluate more diverse requirements of trainees with regard to cyber job training, and the development and operation of job training program that reflects these results sufficiently is required.

Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry (전력분야 사이버 위협 분석 및 기반시설 보안 강화를 위한 해외 IP 대역 차단 방안 연구)

  • Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.401-415
    • /
    • 2019
  • Recently, there has been a lot of studies and efforts to strengthen the stability of critical infrastructures against increasing cyber attacks to critical infrastructures. In this thesis, I defined what cyber threats are, after showing you various definitions about what cyber threats are and what the types are. After studying about significant cyber threats from China, I showed you the realities of cyber threats with the analysis about starting points, types of cyber threats, ratios of attacks and so on. At last, I defined guidelines about unnecessary oversea IP range blocking. Also, I proposed unnecessary oversea IP range blocking methodologies with per information system and per network system. Furthermore, I proposed blocking characteristics per security equipment and security operation improvement and blocking effects and service process to normal oversea users.

A Fuzzy Rule-based System for Automatically Generating Customized Training Scenarios in Cyber Security

  • Nam, Su Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.39-45
    • /
    • 2020
  • Despite the increasing interest in cyber security in recent years, the emergence of new technologies has led to a shortage of professional personnel to efficiently perform the cyber security. Although various methods such as cyber rage are being used to cultivate cyber security experts, there are problems of limitation of virtual training system, scenario-based practice content development and operation, unit content-oriented development, and lack of consideration of learner level. In this paper, we develop a fuzzy rule-based user-customized training scenario automatic generation system for improving user's ability to respond to infringement. The proposed system creates and provides scenarios based on advanced persistent threats according to fuzzy rules. Thus, the proposed system can improve the trainee's ability to respond to the bed through the generated scenario.

A practical challenge-response authentication mechanism for a Programmable Logic Controller control system with one-time password in nuclear power plants

  • Son, JunYoung;Noh, Sangkyun;Choi, JongGyun;Yoon, Hyunsoo
    • Nuclear Engineering and Technology
    • /
    • v.51 no.7
    • /
    • pp.1791-1798
    • /
    • 2019
  • Instrumentation and Control (I&C) systems of nuclear power plants (NPPs) have been continuously digitalized. These systems have a critical role in the operation of nuclear facilities by functioning as the brain of NPPs. In recent years, as cyber security threats to NPP systems have increased, regulatory and policy-related organizations around the world, including the International Atomic Energy Agency (IAEA), Nuclear Regulatory Commission (NRC) and Korea Institute of Nuclear Nonproliferation and Control (KINAC), have emphasized the importance of nuclear cyber security by publishing cyber security guidelines and recommending cyber security requirements for NPP facilities. As described in NRC Regulatory Guide (Reg) 5.71 and KINAC RS015, challenge response authentication should be applied to the critical digital I&C system of NPPs to satisfy the cyber security requirements. There have been no cases in which the most robust response authentication technology like challenge response has been developed and applied to nuclear I&C systems. This paper presents a challenge response authentication mechanism for a Programmable Logic Controller (PLC) system used as a control system in the safety system of the Advanced Power Reactor (APR) 1400 NPP.

Cybersecurity Development Status and AI-Based Ship Network Security Device Configuration for MASS

  • Yunja Yoo;Kyoung-Kuk Yoon;David Kwak;Jong-Woo Ahn;Sangwon Park
    • Journal of Navigation and Port Research
    • /
    • v.47 no.2
    • /
    • pp.57-65
    • /
    • 2023
  • In 2017, the International Maritime Organization (IMO) adopted MSC.428 (98), which recommends establishing a cyber-risk management system in Ship Safety Management Systems (SMSs) from January 2021. The 27th International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA) also discussed prioritizing cyber-security (cyber-risk management) in developing systems to support Maritime Autonomous Surface Ship (MASS) operations (IALA guideline on developments in maritime autonomous surface ships). In response to these international discussions, Korea initiated the Korea Autonomous Surface Ship technology development project (KASS project) in 2020. Korea has been carrying out detailed tasks for cybersecurity technology development since 2021. This paper outlines the basic concept of ship network security equipment for supporting MASS ship operation in detailed task of cybersecurity technology development and defines ship network security equipment interface for MASS ship applications.

Web Attack Classification via WAF Log Analysis: AutoML, CNN, RNN, ALBERT (웹 방화벽 로그 분석을 통한 공격 분류: AutoML, CNN, RNN, ALBERT)

  • Youngbok Jo;Jaewoo Park;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.587-596
    • /
    • 2024
  • Cyber Attack and Cyber Threat are getting confused and evolved. Therefore, using AI(Artificial Intelligence), which is the most important technology in Fourth Industry Revolution, to build a Cyber Threat Detection System is getting important. Especially, Government's SOC(Security Operation Center) is highly interested in using AI to build SOAR(Security Orchestration, Automation and Response) Solution to predict and build CTI(Cyber Threat Intelligence). In this thesis, We introduce the Cyber Threat Detection System by analyzing Network Traffic and Web Application Firewall(WAF) Log data. Additionally, we apply the well-known TF-IDF(Term Frequency-Inverse Document Frequency) method and AutoML technology to classify Web traffic attack type.

Preventing Mobile Game Client Memory Manipulation Based on Event Sourcing Patterns and Blockchain (이벤트 소싱 패턴과 블록 체인을 활용한 모바일 게임 클라이언트 메모리 조작 방지 방안)

  • Park, Jihun;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.477-486
    • /
    • 2022
  • This study aims to present a method using event sourcing patterns and blockchain as a way to cope with vulnerabilities in memory manipulation at the client level. To verify the plan, the method of running the memory operation application was analyzed, and the performance was compared and analyzed when the memory operation prevention plan was applied by fabricating a test application. As a result of the analysis, the usage of memory increased compared to the method of XOR operation by storing major data in one memory, but it was possible to prevent the operation of the memory operation program without significantly affecting the performance of the game.

A Study on the Implementation of Cyber Education System into the Associated School of Government Research Institutes (출연(연)연합대학원대학 사이버교육시스템 도입방안 연구)

  • 이상환;정택영;이병민
    • Journal of Korea Technology Innovation Society
    • /
    • v.6 no.1
    • /
    • pp.74-91
    • /
    • 2003
  • Science and Technology University(STU) will be established by twenty-two government institutes next year. STU has latent problems with geographical limitations caused by organizing the faculties and facilities of the government research institutes, which are located all over the country. This study tries to examine the Educational Administration(Opreation) Model of STU and analyse expected problems and further, proposes the introduction of cyber education system which will maximize efficiency of educational operation of the system and enhance learning. It also discusses the practical problems in the implementation of cyber education system.

  • PDF

Analysis Effects for Cyber Group Consultation Using Video Based System (화상교육 시스템을 이용한 사이버 집단 상담의 효과 분석)

  • Nam, Yoon-Hee;Kho, Dae-Ghon
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.213-223
    • /
    • 2007
  • In this paper, we carry out a cyber group consultation by means of the video-based education system, and verify the effects. For the verification of this study, two assumptions were set up. These assumptions were inspected by selecting 45 students of D elementary school located in a big city, and coming up with a test utilizing one of video-based education systems. Following up, a self-respect test form and a questionnaire were made to verify of the group consultation to the video-based education system, and by analyzing the test form and the questionnaire, the conclusion of this study was finally drawn. The conclusion gained through the process adove is as follows: It turned out that real-time video-based cyber group consultation promoted self-respect and enthusiastic participation of consulters as well as formed emotinal stability and a close affinity between the consultant and the consulter through active interaction. The results of this video-based education system operation will be helpful to broaden the area of elementary school cyber group consultation. Further, it is thought that it will contribute to the basic investigation to verify the educational effects of Multi-point imaging system in the run-up to the operation of full-scale real-time video-based education systems.

A Study on the Framework for Analyzing the Effectiveness of Cyber Weapon Systems Associated with Cyberspace and Physical Space (사이버 공간과 물리 공간이 연계된 사이버 무기체계의 효과성 분석 프레임워크 연구)

  • Jang, Ji-su;Kim, Kook-jin;Yoon, Suk-joon;Park, Min-seo;Ahn, Myung-Kil;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.111-126
    • /
    • 2022
  • As operations that were only conducted in physical space in the past change to operations that include cyberspace, it is necessary to analyze how cyber attacks affect weapon systems using cyber systems. For this purpose, it would be meaningful to analyze a tool that analyzes the effects of physical weapon systems in connection with cyber. The ROK military has secured and is operating the US JMEM, which contains the results of analyzing the effects of physical weapon systems. JMEM is applied only to conventional weapon systems, so it is impossible to analyze the impact of cyber weapon systems. In this study, based on the previously conducted cyber attack damage assessment framework, a framework for analyzing the impact of cyber attacks on physical missions was presented. To this end, based on the MOE and MOP of physical warfare, a cyber index for the analysis of cyber weapon system effectiveness was calculated. In addition, in conjunction with JMEM, which is used as a weapon system effect manual in physical operations, a framework was designed and tested to determine the mission impact by comparing and analyzing the results of the battle in cyberspace with the effects of physical operations. In order to prove the proposed framework, we analyzed and designed operational scenarios through domestic and foreign military manuals and previous studies, defined assets, and conducted experiments. As a result of the experiment, the larger the decrease in the cyber mission effect value, the greater the effect on physical operations. It can be used to predict the impact of physical operations caused by cyber attacks in various operations, and it will help the battlefield commander to make quick decisions.