• Title/Summary/Keyword: Cyber Transformation

Search Result 49, Processing Time 0.027 seconds

A Survey of Cybersecurity Vulnerabilities in Healthcare Systems

  • Adwan Alownie Alanazi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.155-161
    • /
    • 2023
  • In the process of remarkable progress in the medical and technical field and activating the role of technology in health care services and applications, and since the safety of medical data and its protection from security violations plays a major role in assessing the security of health facilities and the safety of medical servers Thus, it is necessary to know the cyber vulnerabilities in health information systems and other related services to prevent and address them in addition to obtaining the best solutions and practices to reach a high level of cybersecurity against attackers, especially due to the digital transformation of health care systems and the rest of the dealings. This research is about what cyberattacks are and the purpose of them, in addition to the methods of penetration. Then challenges, solutions and some of the security issues will be discussed in general, and a special highlight will be given to obtaining a safe infrastructure to enjoy safe systems in return.

A Study on the Homogeneity of Objects and the Variety of Context in Addition Word Problems (덧셈 문장제에서 대상의 동질성과 상황의 다양성에 대한 소고)

  • Chang, Hye-Won
    • Journal of Educational Research in Mathematics
    • /
    • v.12 no.1
    • /
    • pp.17-27
    • /
    • 2002
  • To solve the addition word problems provides young children the chance to learn about and exercise in problem solving. This paper focuses on two aspects to be considered in addition word problems: the homogeneity of objects and the variety of contexts. The homogeneity of objects involved in addition word problems has to be kept in the following reasons: concept of unit, effectiveness of information, prevention of inappropriate variety, inconsistency of mathematics with real world, continuity between elementary and secondary mathematics. And for the variety of contexts, the additive structure proposed by G. Vergnaud, can be considered: composition, transformation, relation of comparison, composition of two transformations, composition of two relations, transformation of a relation. According to this structure, some examples, which contain homogeneous objects, were extracted from the elementary school mathematics textbooks.

  • PDF

Analysis and New Agenda of e-Government program (전자정부의 의의와 추진실적 및 향후 과제)

  • HwangBo, Yeoul
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.3 no.1
    • /
    • pp.141-158
    • /
    • 2003
  • This paper examines new phenomenon and transformation that arise from the expansion of knowledge-based economy, envisions the meaning of e-government through comparing traditional administration with new governance, formulates the e-government model, and presents a direction for next e-government for the conclusion. These new phenomenon include a transformation to product and service convergence model, cyber sovereignty dilemma, privacy and information security threats, and various others. Also, there is a gradual transformation from government-oriented administrative approach to a new governance model that strengthens the role of NGO. And, e-government must work together to realize this new governance ideology. New e-government must be transformed where government and citizens can implement and manage e-government together. Therefore, expanding applications of Public Key Infrastructure (PKI) technologies, promotion of e-Democracy, and improvement of user interface to improve usability must be emphasized.

Detection of Abnormal Traffic by Pre-Inflow Agent (사전유입 에이전트가 발생하는 이상트래픽 탐지 방안)

  • Cho, Young Min;Kwon, Hun Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1169-1177
    • /
    • 2018
  • Modern society is a period of rapid digital transformation. This digital-centric business proliferation offers convenience and efficiency to businesses and individuals, but cyber threats are increasing. In particular, cyber attacks are becoming more and more intelligent and precise, and various attempts have been made to prevent these attacks from being discovered. Therefore, it is increasingly difficult to respond to such attacks. According to the cyber kill chain concept, the attacker penetrates to achieve the goal in several stages. We aim to detect one of these stages and neutralize the attack. In this paper, we propose a method to detect anomalous traffic caused by an agent attacking an external attacker, assuming that an agent executing a malicious action has been introduced in advance due to various reasons such as a system error or a user's mistake.

A Transformation Method of Polygon Data for Visualization of Height Map in SEDRIS (SEDRIS에서 높이맵의 가시화를 위한 폴리곤 데이터 변환 방법)

  • Son, Hyun-Seung;Kim, Young-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.135-140
    • /
    • 2015
  • The Cyber-Physical Systems (CPS) complexly perform modeling and simulation (M&S) for the various embedded systems. In this case, due to use diverse formatted models, we suggest to apply with the SEDRIS to systematically manage the different formatted data on M&S. The SEDRIS can reduce time and cost with reusing and interoperating environment data developed in the specific domain. To do this, we should input the data transformed the height map for terrain representation in a simulator into raster data of SEDRIS for which interoperate between the existed simulator and the SEDRIS. To solve the problem, we propose the transformation method to transfer the polygon data from RAW file used in terrain representation. With the proposed method, we can provide two advantages. First, it can possibly express the environment data into SEDRIS. Second, we can see the terrain like an image file through a viewer. Therefore, even non-expert easily constructs the terrain environment data.

A study on how the quality of on-line contents influence learning attitudes: Effectiveness of conducting off-line lectures at a Cyber University (콘텐츠 품질이 학습태도 형성에 미치는 영향에 관한 연구 - 온라인 대학에서 오프강의 병행에 대한 효과-)

  • Rhie, Jinny
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.373-377
    • /
    • 2009
  • This research was conducted in order to know how influential the acknowledgment of factors such as the quality of educational contents and the conducting of off-line lectures is in terms of effective learning for leaners. Based on the satisfaction-importance model of the multi-attribute attitude model, this study would like to clarify the degree to which the quality of on-line contents of on-line education and the simultaneous conducting of off-line lectures influences one's learning attitude. On-line contents satisfaction will evaluated through the three categories: audio lectures, video lecture and WBI lectures, which make up the quality of on-line contents. We would also like to do a survey on the transformation of learning attitudes when on-line and off-line lectures were conducted simultaneously.

  • PDF

Comparative Analysis of Information Security Textbooks for Chinese Elementary and Secondary Students (중국의 초·중등학생 대상 정보보호 교재 비교 고찰)

  • Eunsun Choi;Namje Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.183-192
    • /
    • 2023
  • Digital transformation is taking place rapidly around the world. As the development of digital technology becomes very fast, more information is expected to be digitized. Therefore, the possibility of cyber threats is increasing in transmitting and storing sensitive information such as personal and financial information online. In this paper, we compared and analyzed information security textbooks for elementary and secondary school students in China, where the recent development of artificial intelligence and digital transformation are rapidly occurring. After we collected related textbooks, textbooks suitable for analysis were selected. Then, we analyzed the external and internal systems of the textbooks separately. As a result of the external system analysis, all the textbook covers were properly produced, but the quality difference was significant among textbooks. In the case of textbooks for elementary school students, the excellence of layout and content placement was noticed. On the other hand, due to the internal system analysis, various contents were not included evenly when looking at the learning contents based on the "information society responsibility" learning goals presented in China. Through this paper, we hope to provide implications for information security-related education and textbook development research.

A Study on the TradeCard Payment System in the Cyber Trade Era (사이버 무역시대의 TradeCard 결제시스팀에 관한 고찰)

  • 전순환
    • The Journal of Information Technology
    • /
    • v.4 no.4
    • /
    • pp.113-128
    • /
    • 2001
  • The international trade industry is on the brink of a radical Internet-driven transformation. TradeCard is a payment and settlement system that is an alternative to letters of crdeit. That is, TradeCard is a business-to-business e-commerce infrastructure that enables buyers and sellers to conduct and settle international trade transactions securely over the Internet. Paperless, payment-guaranteed international trade transactions - which eliminate the traditional letters of credit with electronic certifications - are widely considered the most difficult B2B transactions to conduct. The TradeCard system was initially built to accommodate and process this complex, cross-border payment type at a US$100 service fee for each transaction of up to US$100,000 since November 1999.

  • PDF

A Study on Mosaic Pattern in Modern Costume (현대복식에 나타난 모자이크풍 패턴에 관한 연구)

  • 남윤숙;김복희
    • Journal of the Korean Society of Costume
    • /
    • v.51 no.2
    • /
    • pp.43-52
    • /
    • 2001
  • The purpose of this research is to study the aesthetic character of a mosaic which is expressed in the Modern Costume. The methods of the research were by literature and it was mainly done with reference to master's theses, doctor's theses, separate volumes, periodicals, domestic and overseas fashion magazines and internet on the subject. The result of the research appears as rhythm, exoticism, abstraction, mystery, recreation by disintegration. First, rhythm appears in a sense of free rhythm with the method of arranging motives and the kinds of materials varying. Second, exoticism gives impression with such motives as Oriental designs, African designs and the geometric designs of nature occupying the surface. Third, abstraction displays motives such as unrealistic fashion. Fourth, mystery gives a cyber-related impression with the help of such scientific materials as fluorescent plastics, metal and glass. Fifth, recreation pelves an aesthetic impression by reorganizing the costume with the disintegration and transformation of Industrial materials such as plastics, metal and glass, etc. based on their unique colors and quality.

  • PDF

CRT-Based Color Image Zero-Watermarking on the DCT Domain

  • Kim, HyoungDo
    • International Journal of Contents
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2015
  • When host images are watermarked with CRT (Chinese Remainder Theorem), the watermark images are still robust in spite of the damage of the host images by maintaining the remainders in an unchanged state within some range of the changes that are incurred by the attacks. This advantage can also be attained by "zero-watermarking," which does not change the host images in any way. This paper proposes an improved zero-watermarking scheme for color images on the DCT (Discrete Cosine Transform) domain that is based on the CRT. In the scheme, RGB images are converted into YCbCr images, and one channel is used for the DCT transformation. A key is then computed from the DC and three low-frequency AC values of each DCT block using the CRT. The key finally becomes the watermark key after it is combined four times with a scrambled watermark image. When watermark images are extracted, each bit is determined by majority voting. This scheme shows that watermark images are robust against a number of common attacks such as sharpening, blurring, JPEG lossy compression, and cropping.