• Title/Summary/Keyword: Cyber Operation

Search Result 253, Processing Time 0.024 seconds

Cyber Terror Threat Elimination Method Study for Safe Smart World (안전한 스마트월드를 위한 사이버 테러위협 제거 방안 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.107-113
    • /
    • 2021
  • Recently, large-scale research and efforts aimed at the smart world such as smart city, smart home, smart transportation, and smart care are continuing. As these smart worlds become more common, the expansion of connectivity with the Internet and the threat of cyber terrorism will be inevitable. Increasing the threat of cyber terrorism is increasing the likelihood of a massive disaster and safety accident. Therefore, in this paper, we examine smart worlds that are expanded in various forms and derive the security threat factors that smart worlds have. In addition, it is proposed to block the threat of terrorism from abroad if access from abroad is not required when constructing a smart world. Through this, we intend to present a method to eliminate cyber terror threats for the establishment and operation of a safe smart world.

Implementation of payment settlement system through Cyber Bank for Electronic Commerce (전자상거래용 사이버뱅크의 지불결제시스템 구축)

  • Kim, Moon-Shik;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.121-130
    • /
    • 2008
  • In line with the enhanced weight and variety of electronic commerce in business activities, new type of payment settlement and banking system which will enable to store, create and transfer values from the existing method of payment settlement is highly required. Cyber Banking system draws strong attention being the solution of there requirements. The existing Cyber Banking system has the difficulty of operation, administration, in addition to the problem of initial facility investment of big amount, resulted from the usage of the current business process. As the existing Cyber Bank system is unable to carry out the function of storing, creating, and transferring values due to the adoption conventional credit card system instead of the application of non-stop payment system between the seller and buyer. As a result, current Cyber Bank system still imply the deficiency of non-performing cash payment function on internet. This paper describes (1) an integrated application process, One Process One Input (OPOI) which is essential for software development of the Cyber Bank, (2) an application process of payment settlement system to be applied to the electronic commerce in Internet. And then, with these for a basis, (3) design and implementation of payment settlement system through CyberBank for Electronic Commerce. Consequently, by means of this suggested process, we could attempt to solve the problem of existing Cyber Bank system and further to explore the possibility of advanced Cyber Banking being the non-stop payment settlement system. The effectiveness of this suggested system has been practically confirmed.

A Study on the Educational Effects of Interactive Cyber Home Study (상호작용적 사이버가정학습의 교육적 효과에 관한 연구)

  • Song, Tae-ok
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.1
    • /
    • pp.33-42
    • /
    • 2005
  • The purpose of this study is to develop MICHS(Models of Interactive Cyber Home Study) for effective cyber home study(CHS) and a prototype system to support realtime and non-realtime interaction tools such as chatting with users, to study a method to connect MICHS with selective curriculum, and to verify the educational effect of the model. MICHS consists of two models. One model is an educational system model, and another model is a teaching-learning model. The major results of this study are summarized as follows. In the viewpoint of learning achievement, there is no significant difference in achievement between the experimental group(33 leaners) and the comparative group(33 leaners), but this fact can be construed as the possibility that CHS is an alternative system of school education. The interests on CHS of learners in the experimental group were increased twice. This result means that the system of CHS for active interaction needs various and important interaction tools, and the educational vision of CHS. In the viewpoint of system operation, CHS needs higher system requirements such as 100 Mbps Fast Ethernet. If an old system can not process streaming services in request, it should be upgraded to a new system.

  • PDF

Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack (사이버공격에 대비한 심층방호 특성을 만족하는 단방향 광통신 구조 설계)

  • Jeong, Kwang Il;Lee, Joon Ku;Park, Geun Ok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.561-568
    • /
    • 2013
  • Instrumentation and control system in nuclear power plant performs protecting, controling and monitoring safety operation of Nuclear Power Plant. As cyber attack to the control equipment of instrumentation and control system can cause reactor shutdown and radiation release, it is required to design the instrumentation and control system considering cyber security in accordance with regulatory guides and industrial standards. In this paper, we proposed a design method of uni-directional communication structure which is required in the design of defense-in-depth model according to regulatory guides and industrial standards and we implemented a communication board with the proposed method. This communication board was tested in various test environments and test items and we concluded it can provide uni-directional communication structure required to design of defense-in-depth model against cyber attack by analyzing the results. The proposed method and implemented communication board were applied in the design of SMART (system-integrated modular advanced reactor) I&C (instrumentation and control) systems.

Analysis of Influencing Factors of Cyber Weapon System Core Technology Realization Period (사이버 무기체계 핵심기술 실현시기의 영향 요인 분석)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.281-292
    • /
    • 2017
  • It is demanded to promote research and development of cyber weapons system and core technology in response to the ongoing cyber attack of North Korea. In this paper, core technologies of the future cyber weapon system are developed and the factors affecting the realization timing of core technologies were analyzed. 9 core technology groups and 36 core technologies are derived. Afterwards, these core technology groups are compared to the operation phase of the joint cyber warfare guideline and the cyber kill chain of Lockheed Martin. As a result of the comparison, it is confirmed that the core technology groups cover all phases of the aforementioned tactics. The results of regression analyses performed on the degree of influence by each factor regarding the moment of core technology realization show that the moment of core technology realization approaches more quickly as factors such as technology level of the most advanced country, technology level of South Korea, technology transfer possibility from the military sector to the non-military sector(spin-off factor), and technology transfer possibility from the non-military sector to the military sector(spin-on factor) increase. On the contrary, the moment of core technology realization is delayed as the degree at which the advanced countries keep their core technologies from transferring decrease. The results also confirm that the moment of core technology realization is not significantly correlated to the economic ripple effect factor. This study is meaningful in that it extract core technologies of cyber weapon system in accordance with revision of force development directive and join cyber warfare guideline, which incorporated cyber weapon system into formal weapon system. Furthermore, the study is significant because it indicates the influential factor of the moment of core technology realization.

Development of Cyber-Physical Production System based Manufacturing Control System for Aircraft Parts Plant (가상물리제조 기반 항공기 부품공장 생산통제시스템 개발)

  • Kim, Deok Hyun;Lee, In Su;Cha, Chun Nam
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.1
    • /
    • pp.143-150
    • /
    • 2020
  • To enhance the effectiveness of the FMS (flexible manufacturing system), it is necessary for the manufacturing control system to be upgraded by integrating the cyber and the physical manufacturing systems. Using the CPPS (Cyber-Physical Production System) concept, this study proposes a 4-stage vertical integration and control framework for an aircraft parts manufacturing plant. In the proposed framework, the process controller prepares the operations schedule for processing work orders generated from the APS (advanced planning & scheduling) system. The scheduled operations and the related control commands are assigned to equipments by the dispatcher of the line controller. The line monitor is responsible for monitoring the overall status of the FMS including work orders and equipments. Finally the process monitor uses the simulation model to check the performance of the production plan using real time plant status data. The W-FMCS (Wing rib-Flexible Manufacturing Control & Simulation) are developed to implement the proposed 4-stage CPPS based FMS control architecture. The effectiveness of the proposed control architecture is examined by the real plant's operational data such as utilization and throughput. The performance improvement examined shows the usefulness of the framework in managing the smart factory's operation by providing a practical approach to integrate cyber and physical production systems.

Blockchain Based Data-Preserving AI Learning Environment Model for Cyber Security System (AI 사이버보안 체계를 위한 블록체인 기반의 Data-Preserving AI 학습환경 모델)

  • Kim, Inkyung;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.12
    • /
    • pp.125-134
    • /
    • 2019
  • As the limitations of the passive recognition domain, which is not guaranteed transparency of the operation process, AI technology has a vulnerability that depends on the data. Human error is inherent because raw data for artificial intelligence learning must be processed and inspected manually to secure data quality for the advancement of AI learning. In this study, we examine the necessity of learning data management before machine learning by analyzing inaccurate cases of AI learning data and cyber security attack method through the approach from cyber security perspective. In order to verify the learning data integrity, this paper presents the direction of data-preserving artificial intelligence system, a blockchain-based learning data environment model. The proposed method is expected to prevent the threats such as cyber attack and data corruption in providing and using data in the open network for data processing and raw data collection.

The Architecture of an Intelligent Digital Twin for a Cyber-Physical Route-Finding System in Smart Cities

  • Habibnezhad, Mahmoud;Shayesteh, Shayan;Liu, Yizhi;Fardhosseini, Mohammad Sadra;Jebelli, Houtan
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.510-519
    • /
    • 2020
  • Within an intelligent automated cyber-physical system, the realization of the autonomous mechanism for data collection, data integration, and data analysis plays a critical role in the design, development, operation, and maintenance of such a system. This construct is particularly vital for fault-tolerant route-finding systems that rely on the imprecise GPS location of the vehicles to properly operate, timely plan, and continuously produce informative feedback to the user. More essentially, the integration of digital twins with cyber-physical route-finding systems has been overlooked in intelligent transportation services with the capacity to construct the network routes solely from the locations of the operating vehicles. To address this limitation, the present study proposes a conceptual architecture that employs digital twin to autonomously maintain, update, and manage intelligent transportation systems. This virtual management simulation can improve the accuracy of time-of-arrival prediction based on auto-generated routes on which the vehicle's real-time location is mapped. To that end, first, an intelligent transportation system was developed based on two primary mechanisms: 1) an automated route finding process in which predictive data-driven models (i.e., regularized least-squares regression) can elicit the geometry and direction of the routes of the transportation network from the cloud of geotagged data points of the operating vehicles and 2) an intelligent mapping process capable of accurately locating the vehicles on the map whereby their arrival times to any point on the route can be estimated. Afterward, the digital representations of the physical entities (i.e., vehicles and routes) were simulated based on the auto-generated routes and the vehicles' locations in near-real-time. Finally, the feasibility and usability of the presented conceptual framework were evaluated through the comparison between the primary characteristics of the physical entities with their digital representations. The proposed architecture can be used by the vehicle-tracking applications dependent on geotagged data for digital mapping and location tracking of vehicles under a systematic comparison and simulation cyber-physical system.

  • PDF

Development and Operation Methods for Minority Optional Curriculum through Cyber Education (사이버교육을 통한 희소선택과목 콘텐츠 개발 및 운영 방안)

  • Jeong, Young-Sik;Ahan, Seong-Hun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.6
    • /
    • pp.444-455
    • /
    • 2009
  • The selective central curriculum, which has been applied to the grades eleven and twelve in the 7th curriculum, has not operated well due to lack of teacher supply. This study analyzes the needs for the contents which are necessary to operate the minority optional curriculum through cyber education. Based on the developed contents, pilot program was performed. As a result of the program, the learning progress ratio of students was high but their satisfaction was very low. It is suggested that the quantity of the content should be reduced and the degree of difficulty lowered in order to address the problems. Another suggestion is to provide students with on-line teachers such as learning planners, tutors, and consultations to systematically manage students' learning. In addition, various elective-courses should be developed to allow students to take the courses of their choice, which in turn requires the establishment of the national operation system for the minority optional curriculum.

Utilization of Ocean Satellites in the field of Ship Operation (선박운항 분야에서의 해양위성 활용 연구 방안)

  • Hyeong-Tak Lee;Hee-Jeong Han;Young-Je Park;Hyun Yang;Ik-Soon Cho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.158-159
    • /
    • 2023
  • With the development and state-of-the-art of ocean satellites, wide-area management of the waters around Korea has become possible. In particular, in the field of ship operation, as autonomous navigation technology based on artificial intelligence and big data is being developed, there is a need for additional analysis and observation through ocean satellite data.. Researches that can combine ship operation with ocean satellite data include ship detection based on ocean satellites and ship navigation assistance using marine weather forecasting.

  • PDF