• Title/Summary/Keyword: Cyber effectiveness analysis

Search Result 102, Processing Time 0.029 seconds

Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling

  • Kang, Yong Goo;Yoo, Jeong Do;Park, Eunji;Kim, Dong Hwa;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • With the development of information technology and the growth of the scale of system and network, cyber threats and crimes continue to increase. To cope with these threats, cybersecurity training based on actual attacks and defenses is required. However, cybersecurity training requires expert analysis and attack performance, which is inefficient in terms of cost and time. In this paper, we propose a cyber attack simulator that automatically executes attack techniques. This simulator generates attack scenarios by combining attack techniques modeled to be implemented and executes the attack by sequentially executing the derived scenarios. In order to verify the effectiveness of the proposed attack simulator, we experimented by setting an example attack goal and scenarios in a real environment. The attack simulator successfully performed five attack techniques to gain administrator privileges.

Investigation of H model blended e-learning technique in enhanced effectiveness of class learning (대학 강의실 수업의 효과성 향상을 위한 H형 블렌디드 이러닝 적용 효과 분석)

  • Choi, Byongsu;Yoo, Sang-Mi
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.3
    • /
    • pp.49-60
    • /
    • 2013
  • This study is aimed to investigate that the blended e-learning could enhance the effectiveness compared to the conventional lecture performed in classroom. At first, both the CbE(Class based E-learning) and the EbC(E-learning based Class) mode have been generated in blended e-learning operation method following the process which analyze the various studies of interest. In addition, the instruction structures of Z Type(Zigzag model) and H-Type(Ladder model) were established as proposed model. The H-Blended e-learning based on CbE mode was introduced in the Excel Spread Sheet subject which held in A University to achieve the goal of this study. Learners were categorized and belonged to either the group 1(over 50% of attendance in cyber lecture) or the group 2(the rest of them). The data analysis was performed with $x^2$-test, t -test to compare the achievement of study between groups. The t -test result showed that the academic achievement in learning with group 1 was statistically significant than the learner in group 2. The effectiveness of the blended e-learning has been proved as the logistic regression analysis showed that the rate of the attendance in the cyber lecture functioned as indicator that enable to predict the acceptance.

  • PDF

The Analysis of the Risk of Vehicle Fires in Korea and the Effectiveness of Initial Fire Extinguishing (국내 자동차 관련 화재발생 위험성 분석 및 초기소화의 효과성 연구)

  • Ryu, Juyeol;Lee, Changwoo
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.20-27
    • /
    • 2019
  • Purpose: In this study, the status and the risk of fire occurrence in domestic automobile were evaluated and the damage reduction effect by using the fire extinguishing mechanism was evaluated. Method: The analysis of the risk of the occurrence of Vehicle Fires in Korea and the damage of human and property by the use of fire extinguisher applied to fire extinguisher were investigated and analyzed. Results: The annual damage rate of the damage caused by the automobile fire is 4.74%, which shows an annual increase. As a result of the analysis of the personal injury caused by the passenger car in the car fire situation, the damage amount per 100 cases of the fire occurrence increased from 424.65 million won to 473.06 million won in the past 5 years (2012 ~ 2016). Conclusion: When fire extinguishers are used in the case of passenger Vehicle Fires, the average amount of property damage per fire occurrence is estimated to be about 307.5 million, emphasizing the importance and necessity of the initial fire fighting.

Sharing Information for Event Analysis over the Wide Internet

  • Nagao, Masahiro;Koide, Kazuhide;Satoh, Akihiro;Keeni, Glenn Mansfield;Shiratori, Norio
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.382-394
    • /
    • 2010
  • Cross-domain event information sharing is a topic of great interest in the area of event based network management. In this work we use data sets which represent actual attacks in the operational Internet. We analyze the data sets to understand the dynamics of the attacks and then go onto show the effectiveness of sharing incident related information to contain these attacks. We describe universal data acquisition system for event based management (UniDAS), a novel system for secure and automated cross-domain event information sharing. The system uses a generic, structured data format based on a standardized incident object description and exchange format (IODEF). IODEF is an XML-based extensible data format for security incident information exchange. We propose a simple and effective security model for IODEF and apply it to the secure and automated generic event information sharing system UniDAS. We present the system we have developed and evaluate its effectiveness.

The Effectiveness of Smoking Cessation Program in Adults: Systematic Review of Randomized Controlled Trials (성인 흡연자의 금연 프로그램 효과: 무작위대조군 실험연구의 체계적 문헌고찰)

  • Park, Seong-Hi;Hwang, Jeong-Hae;Choi, Yun-Kyoung;Kang, Chang-Bum
    • Korean Journal of Health Education and Promotion
    • /
    • v.29 no.3
    • /
    • pp.1-14
    • /
    • 2012
  • Objectives: The purpose of this study was to determine if smoking cessation programs (SCPs) are effective for adults through a systematic review of the results of such programs in large randomized controlled trials (RCTs). Methods: The PICO (Patient, Intervention, Comparator, Outcome) strategy was established, 1,160 literature from domestic and foreign electronic databases was reviewed, and 22 references were selected based on the inclusion and exclusion criteria. The quality of each reference was evaluated using the Scottish Intercollegiate Guidelines Network tool, and meta-analysis was carried out. Results: The SCPs were significantly effective for adult smokers. Smoking cessation counseling, education, and smoking cessation medications such as nicotine patch were more effective than the other interventions. However, the results showed short-term effects (within six months), and differences were observed among the SCPs. For the outcome measures for SCPs, the abstinence rate of seven days was mainly used, but differences were identified between the CO level and the cotinine-verified abstinence rate of smoking cessation. Conclusions: For a smoking cessation program for adult smokers, the strength of the evidence of the program's effectiveness in RCTs that provide the identified intervention strategies should be considered.

Analysis of Education Effectiveness by Cognitive Style of elementary School students in Cyber Home Learning System (사이버가정학습 환경에서 초등학생의 인지양식에 따른 교육만족도 분석)

  • Cho, Yeongl-Ho;Seol, Moon-Kyu
    • 한국정보교육학회:학술대회논문집
    • /
    • 2008.01a
    • /
    • pp.154-159
    • /
    • 2008
  • 2005년 사이버가정학습 시스템이 구축되어 운영되고 있지만 많은 학생이 이를 외면하고 사교육에 많은 시간과 비용을 사용하고 있다. 사이버가정학습을 이용하는 학생들의 인지양식 특성을 두 집단으로 나누어 각각 교육만족도를 분석하였다. 그 결과 장독립적인 인지양식 학생들은 학원, 과외 등의 사교육으로 사이버가정학습 이용률이 저조하였고 잘 정리된 자료와 콘텐츠를 사이버가정학습에서 이용하고 싶어 했고 사이버가정학습의 내용과 콘텐츠에 대해서는 긍정적인 의견이 많았다. 장의존적인 인지양식 학생들은 가정에서 컴퓨터 사용 환경이 쉽지 않아 이용하지 못하는 학생이 많았으며 현재 사이버가정학습의 만족도가 높게 나타났으나 만족도 조사에서 사이버선생님에 대한 불만이 비교적 많이 나타났다.

  • PDF

Hybrid Information Hiding Method Based on the Characteristics of Military Images on Naval Combat System (함정 전투체계 군사영상 특성에 기반한 하이브리드 정보은닉 기법)

  • Lee, Joon-Ho;Jung, Ki-Hyun;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.9
    • /
    • pp.1669-1678
    • /
    • 2016
  • There are many kinds of military images used in naval combat system because various sensors are operated. The military images are displayed, analysed and stored with analysed informations according to the tactical purpose on combat system. These images are used to target detection, analysis and classification. Thus the analysed information and images must be secured, the information hiding methods are the most eligible solutions to get secured informations and images. In this paper, the hybrid information hiding method based on the characteristics of the military images is proposed and the effectiveness is shown by experiments.

Designing and Utilizing a Smart Factory Roadmap for CEOs: Leveraging from University-Industry Research Collaboration (경영자를 위한 스마트팩토리 구축 로드맵 설계 및 활용)

  • Park, Jongpil
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.21 no.6
    • /
    • pp.285-299
    • /
    • 2018
  • Recently much attention in building smart factory has been dramatically increased. Despite the growing interest in smart factory, few practical guidelines exist how to successfully build smart factory. The purpose of this study is to postulate and develop a road map for building successful smart factory. To enhance mundane realism, we design the road map through University-Industry research collaboration. Specifically, drawing analysis of University-Industry research collaboration, we design a prototype and detailed road map or building successful smart factory. Moreover, we apply the road map into actual smart factory development. By doing so, we successfully prove the effectiveness of the road map. Therefore, this study provides the valuable guidelines and directions to build a successful smart factory. Ultimately this study is able to help a variety of factories which establish and implement smart factory. Further, we hope that this study will be placed to be an important foundation research on behalf of smart factory building.

A Study of Learning and Performance Goal Orientation in Restaurant Servers' Up-Selling and Its Impact on Sales Behaviors and Sales Performance (레스토랑 직원의 Up-Selling에 대한 목적 지향성이 판매 행동과 판매 성과에 미치는 영향)

  • Kim, Young-Gab;Hong, Jong-Sook
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.20 no.5
    • /
    • pp.776-784
    • /
    • 2010
  • This study investigated causal relationships between goal orientation, sales and performance towards increasing the effectiveness of up-selling in internal promotion methods in family restaurants and provided implications about the hiring and training of sales people. The subjects were 232 sales people in family restaurants. The data were collected by self-administered questionnaires and analyzed by exploratory factor analysis, reliability analysis, comparative analysis of the average, and regression analysis. Results, showed that variations in goal orientation, sales, and performance depended on the age and experience of salespeople and that goal orientation makes adaptive selling more effective. It turned out that effort selling affects up-selling result than adaptive selling. Long-term workers were better than short-term workers in goal orientation, selling, and up-selling results, so human resource management needs to implement a long-term plan to enhance these effects. And, because effort selling is more effective than adaptive selling in up-selling results in family restaurants, effort selling requires training.

Effectiveness of the Internet Real-Name Verification Law: Evidence from Self-censorship and Intention to Detour the Regulation (인터넷실명제와 우회로의 선택: 인터넷 공론장 참여자들의 자기검열과 우회로 선택의향을 중심으로)

  • Han, Hye-Kyung;Kim, Eu-Jong
    • Korean journal of communication and information
    • /
    • v.55
    • /
    • pp.50-73
    • /
    • 2011
  • This paper investigates the effectiveness of Real-Name System on Internet, which has been applied to some Internet service provider bulletin boards in Korea. The goal of the Real-Name system on the Internet is controlling expression of slanderous or abusive language. The effectiveness of the regulation is dependent on the people's perceptions and attitude toward to the legislation. This empirical study examines the antecedents that affect the perceptions and attitude toward the regulation. Further, we investigate the relationships among variables such as internet public sphere participation, attitude to the regulations, and intention to choose detours. Results of regression analysis show that the younger and the more progressive individuals are, the more they oppose the implementation of the law. Also, it was found that people who have more political interest and participate more actively in public sphere via internet, tend to oppose the law. Structural equation models reveal that participation in online public sphere drives negative attitudes about the regulation. In addition, people with negative perceptions about the law tend to choose the detours such as 'cyber asylum' and 'service asylum'.

  • PDF