• Title/Summary/Keyword: Cyber Research

Search Result 1,465, Processing Time 0.03 seconds

A Preliminary Study on the Effectiveness of Cyber Counseling (사이버 상담 활성화를 위한 탐색 연구)

  • 장진경
    • Journal of Families and Better Life
    • /
    • v.20 no.4
    • /
    • pp.135-148
    • /
    • 2002
  • The main purpose of this research was to explore the factors that encourage people to use the cyber counseling in resolving difficulties in their lives. Another purpose of this research was to investigate whether cyber counseling really helps people feel better. For this study, a structured survey questionnaire was distributed both on- and off-line, and 429 respondents returned completed survey forms. The major statistical methods used for data analysis were frequency, factor analysis, 1-test and ANOVA. The results of this study revealed that variables such as gender, age, occupation, internet skills, time of internet use, personality, and the awareness of cyber counseling made a difference in people's use of cyber counseling whenever they felt they needed it. However, cyber counseling seemed to fail to increase feelings of well being in people's lives. The implications of these findings are discussed in this article.

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.24-45
    • /
    • 2012
  • In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.

Development of an evaluation tool model for the effective measurement of cyber motion sickness in immersive virtual reality

  • Kim Seung Uk
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.345-352
    • /
    • 2024
  • We are designed to solve cyber motion sickness, an important task that must be addressed for the growth of the virtual reality content industry. Not only the industry but also academia are paying a lot of attention. However, despite long interest and research on the phenomenon of cyber motion sickness, a solution has not been drawn. This is deeply related to the lack of tools that can effectively measure cyber motion sickness. Therefore, in this paper, prior studies on cyber motion sickness were analyzed to develop a tool that can effectively measure cyber motion sickness when users experience immersive virtual reality. The measurement method of cyber motion sickness used in previous studies, each characteristic and limitation, and common factors related to cyber motion sickness were analyzed. Each of the related factors was derived as sub-factors. Based on the analyzed contents, an effective cyber motion sickness measurement evaluation tool model in immersive virtual reality was presented. It is expected that the evaluation tool model can be used for the study of cyber motion sickness.

Framework Based Smart City Cyber Security Matrix (프레임워크 기반 스마트시티 사이버 보안 메트릭스)

  • Kim, Sung-Min;Jung, Hae-Sun;Lee, Yong-Woo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.23 no.2_2
    • /
    • pp.333-341
    • /
    • 2020
  • In this paper, we introduce a smart city-cyber-security-grid-matrix methodology, as a result of research on overall cyber security of smart cities. The identified cyber security risks that threaten smart cities and smart-city-cyber-security-threat list are presented. The smart-city-cyber-security-requirements necessary to secure the smart city cyber security with the developed smart city-cyber-security-grid-matrix are given in this paper. We show how the developed smart city-cyber-security-grid-matrix methodology can be applied to real world. For it, we interlocked the developed smart city-cyber-security-grid-matrix methodology with the cyber-security-framework of the National Institute of Standards and Technology, and developed a framework-based smart city-cyber-security-grid-matrix. Using it, it is easy and comfortable to check the level of cyber security of the target smart ciy at a glace, and the construction and operation of the smart city security system is systematized.

Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

  • Shin, Jinsoo;Son, Hanseong;Heo, Gyunyoung
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.517-524
    • /
    • 2017
  • Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

The Research Related to Kansei Stimulation Elements in Cyber-Space

  • Dong, Oh-Gi
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2001.05a
    • /
    • pp.68-73
    • /
    • 2001
  • The word "cyber-space" was coined through the developments in communication technology and computers. It became possible to experience disembodied space in practice through a new kind of medium. this research aims to clarify the kansei stimulation elements as realistic sensed by users who use 3-dimensional expressions in cyber-space. The research was carried out by preparing 25 samples of computer graphics, and administering 3 questionnaires to 12 examinees. The Principal Ingredient Analysis method was used for its analysis and assessment. As a result of this research, it can be concluded that materials, reflection and shadow have the strongest effect on human beings' senses in cyber-space.

  • PDF

Consideration of Cyber Security Vulnerability in Power IT (전력 IT Cyber Security 취약성 검토)

  • Kim, Hak-Man;Park, Jae-Se;Joung, Dong-Hyo
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.203-204
    • /
    • 2008
  • Power IT is very important infrastructure in the country. In general, Power IT is disclosed to cyber attacks. To enhance cyber security in Power IT area, first of all, vulnerability in the area should be defined. In this paper, we consider the cyber security vulnerability in Power IT and introduce the vulnerability. Also, we suggest the research areas for enhancing cyber security in Power IT.

  • PDF

A Study on Command and Control Through Cyber Protection Function Analysis (사이버 방호기능 분석을 통한 지휘통제에 관한 연구)

  • Choi, Seho;Oh, Haengrok;Yun, Joobeom
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.537-544
    • /
    • 2021
  • Cyber threats can bypass existing cyber-protection systems and are rapidly developing by exploiting new technologies such as artificial intelligence. In order to respond to such cyber threats, it is important to improve the ability to detect unknown cyber threats by correlating heterogeneous cyber protection systems. In this paper, to enhance cyber-attack response capabilities, we proposed command and control that enables rapid decision-making and response before the attack objectives are achieved, using Lockheed Martin's cyber kill chain and MITRE ATT&CK to analyze the purpose and intention of the attacker.

Development of a Cybersecurity Workforce Management System (사이버 보안 분야 전문가 프로파일 관리 시스템 연구)

  • Ahn, Jun-young;Lee, Seung-hun;Park, Hee-min;Kim, Hyun-chul
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.3
    • /
    • pp.65-70
    • /
    • 2021
  • According to the trend of increasingly sophisticated cyber threats, the need for technology research that can be applied to cyber security personnel management and training systems is constantly being raised not only overseas but also in Korea. Previously, the US and UK have already recognized the need and have been steadily conducting related research from the past. In the United States, by encouraging applications based on related research (NICE Cybersecurity Workforce Framework) and disclosing successful use cases to the outside, it is laying the groundwork for profiling cyber security experts. However in Korea, research on cyber security expert training and profiling is insufficient compared to other countries. Therefore, in this study, in order to create a system suitable for the domestic situation, research and analysis of cases in the United States and the United Kingdom were conducted over the past few years, and based on this, a prototype was produced for the study of profiling technology for domestic cyber security experts.

Research on Cyber Kill Chain Models for Offensive Cyber Operations (공세적 사이버 작전을 위한 사이버 킬체인 모델 연구)

  • Seong Bae Jo;Wan Ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.71-80
    • /
    • 2023
  • Cyberspace has emerged as the fifth domain of warfare, alongside land, sea, air, and space. It has become a crucial focus for offensive and defensive military operations. Governments worldwide have demonstrated their intent to engage in offensive cyber operations within this domain. This paper proposes an innovative offensive cyber kill chain model that integrates the existing defensive strategy, the cyber kill chain model, with the joint air tasking order (ATO) mission execution cycle and joint target processing procedure. By combining physical and cyber operations within a joint framework, this model aims to enhance national cyber operations capabilities at a strategic level. The integration of these elements seeks to address the evolving challenges in cyberspace and contribute to more effective jointness in conducting cyber operations.