• Title/Summary/Keyword: Cyber graduate school

Search Result 332, Processing Time 0.027 seconds

Platform design and source coding of AI responsive AR business cards (AI 반응 AR명함의 Platform 설계 및 Source Coding)

  • Choi, Su-Youn;Han, Su-Yeon;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.4
    • /
    • pp.489-493
    • /
    • 2020
  • The technological development of the Fourth Industrial Revolution is accelerating the development of the world and society. Fourth industrial technology is connected to Cyber World to develop national and social infrastructure. The application of the fourth industrial technology can create Cyber-city and Cyber-life systems. In the ICT business industry that connects Cyber with the real world, we need to connect Cyber with real-life work. It is to use AR business cards as one of the ways to connect Cyber business with real business. When an AR business card is recognized as a smartphone, a 3D character appears to introduce the main character of the business card. In addition, AR business cards are reflected in AR for product and service of business operators, enabling promotion of products, services, etc. Using connected wired and wireless 5G communication, real-time e-commerce is also possible. In this paper, AR business card will be produced with Source Coding and AR business card platform will be designed.

Web-based PBL (Problem Based Learning) in Graduate School of Public Health Courses (보건대학원 사이버 수업에서의 문제중심학습)

  • Yoon, Soo-Jin;Hokama, Tomiko;Ho, Seung-Hee;Kim, Min-Kyung;Chae, Young-Moon
    • Korean Journal of Health Education and Promotion
    • /
    • v.24 no.3
    • /
    • pp.129-142
    • /
    • 2007
  • Objectives: This paper is aimed to study the satisfaction level and course effects of web-based PBL of the Graduate school of Public Health. Methods: Web-based PBL was implemented from March 1 to June 22 on 19 students and a survey on the satisfaction level of the lessons was taken and analyzed. For the analysis, SAS 9.1 was carried out. Results: The relation of effectiveness of the lessons according to the satisfaction level of each evaluation items, shows a significance according to satisfaction of professors, whether or not the students were satisfied in evaluating themselves (correlation, p<0.05). The satisfaction level of the evaluation on teachers and whether or not the students were satisfied in evaluating themselves shows significant influence on the effectiveness of the lessons (simple regression, p<0.05), more specifically in active class participation and understanding by the students themselves (stepwise multiple regression, p<0.05). Conclusions: In this study the attitudes of professors and students toward the lessons are major influences on the effectiveness of the lessons. Specifically, active class participation and understanding by the students themselves are the most important influences.

A Study on the Influence of Victimization Experience and Awareness on Cyber Security Behavior - Focusing on Dual Process Theory (침해 경험 및 정보보호 인식이 정보보호 행동에 미치는 영향에 대한 연구 : 이중 프로세스 이론을 중심으로)

  • Kim, Chang-Il;Heo, Deok-Won;Lee, Hye-Min;Sung, Wook-Joon
    • Informatization Policy
    • /
    • v.26 no.2
    • /
    • pp.62-80
    • /
    • 2019
  • The purpose of this study is to investigate the direct effect of victimization experience on cyber security behavior and the indirect effect of information protection awareness through the Dual Process Theory. Baron & Kenny regression analysis was conducted and the results are as follows - first, victimization experience has a positive effect on cyber security behavior; second, the relationship between victimization experience and cyber security behavior is mediated by cyber security awareness; and third, the direct effect of victimization experience on cyber security behavior and the indirect mediating effect of cyber security awareness are both positive (+). The direct effect of victimization experience on cyber security behavior is analyzed to be relatively large compared to the indirect effect that cyber security awareness has on cyber security behavior. Based on these results, It is suggested that periodic cyber security education and campaign policies are needed to enhance cyber security behavior.

Mobile Auto questions and scoring system (국가 사이버안보 시스템 관련 법률안 분석과 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.363-365
    • /
    • 2014
  • Internet baking, e-commerce, business processing, etc on smartphone handing could be possible in present days. Ambiguity between cyber and real life has made vulnerability on infrastructure, Gov't Service and National security by cyber terrorism. Especially, Lots of Infrastructure and Gov't Service based on Information Technology were exposed by Cyber terror. Legal system should be improved to keep from these threats. This paper proposed needs of cyber legal system by analyzing proposed cyber related code on Korean National Assembly, issue on Cyber Control Tower, National Cyber Security Industry and Human resource.

  • PDF

A Study on the Improvement of Capability Assessment and the Plan for Enhancing Cyber Warfare Capability of Korea (사이버전의 역량평가 개선과 역량 강화 방안에 관한 연구)

  • Park, Chan-soo;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1251-1258
    • /
    • 2015
  • Recently, as the development of cyber weapons, the threat of cyber warfare has been increasing. Nations, which experienced cyber warfare already, have been damaged not only in the cyber space as well as in real war field. Therefore, each nation is constantly making efforts to prepare for cyber warfare. First of all, to prepare for cyber warfare, each nation's capability of cyber warfare should be understood. A plan of reaction of cyber warfare should be searched by comparison and analysis of capability of cyber warfare. This paper compares and analyzes established methodology of capability assessment about cyber warfare, and this paper finds a better point to suggest the improvement of capability assessment about cyber warfare. This paper applies capability assessment of cyber warfare to nations, which can influence on Korea with improved capability assessment of cyber warfare. Comparing and analyzing the result of assessment, this paper deducts complementary point of Korean cyber warfare to suggest the plan to enhancing capability of cyber warfare.

New Higher-Order Differential Computation Analysis on Masked White-Box AES (마스킹 화이트 박스 AES에 대한 새로운 고차 차분 계산 분석 기법)

  • Lee, Yechan;Jin, Sunghyun;Kim, Hanbit;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.1-15
    • /
    • 2020
  • As differential computation analysis attack(DCA) which is context of side-channel analysis on white-box cryptography is proposed, masking white-box cryptography based on table encoding has been proposed by Lee et al. to counter DCA. Existing higher-order DCA for the masked white box cryptography did not consider the masking implementation structure based on table encoding, so it is impossible to apply this attack on the countermeasure suggested by Lee et al. In this paper, we propose a new higher-order DCA method that can be applied to the implementation of masking based on table encoding, and prove its effectiveness by finding secret key information of masking white-box cryptography suggested by Lee et al. in practice.

Research on National Cybersecurity Policy Preparing for the Reunification of North Korea and South Korea (남북통일을 대비한 국가사이버안보 정책 연구)

  • Ham, Seung-hyeon;Park, Dae-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.358-361
    • /
    • 2016
  • The North and South Korea for the peaceful reunification of the Republic of Korea, to lead the transformation and reform, and to complement the policy making and negotiations, there is a need for cyber security policy to practice. This paper explores the definition and overseas cyber terrorism and cyber warfare correspondence, correspondence between the versions of the technology between versions. Analysis of cyber security activities in the North and South confrontation, and research the cyber security policy against the unification. In this study, we compared the unification to build and operate a secure cyberspace from cyber threats and cyber security policy suggestions for ways of rational and legal.

  • PDF

A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services (국가 전산망 보안관제업무의 효율적 수행방안에 관한 연구)

  • Kim, Young-Jin;Lee, Su-Yeon;Kwon, Hun-Yeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.103-111
    • /
    • 2009
  • Recently, cyber attacks against public communications networks are getting more complicated and varied. Moreover, in some cases, one country could make systematic attacks at a national level against another country to steal its confidential information and intellectual property. Therefore, the issue of cyber attacks is now regarded as a new major threat to national security. The conventional way of operating individual information security systems such as IDS and IPS may not be sufficient to cope with those attacks committed by highly-motivated attackers with significant resources. As a result, the monitoring and control of cyber security, which enables attack detection, analysis and response on a real-time basis has become of paramount importance. This paper discusses how to improve efficiency and effectiveness of national cyber security monitoring and control services. It first reviews major threats to the public communications network and how the responses to these threats are made and then it proposes a new approach to improve the national cyber security monitoring and control services.

Cyber Weapon Model for the National Cybersecurity (국가사이버안보를 위한 사이버무기 모델 연구)

  • Bae, Si-Hyun;Park, Dae-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.223-228
    • /
    • 2019
  • Recently, the United States has been trying to strengthen its cybersecurity by upgrading its position as an Unified Combatant Command that focuses on the Cyber Command in the United States, strengthening operations in cyberspace, and actively responding to cyber threats. Other major powers are also working to strengthen cyber capabilities, and they are working to strengthen their organization and power. The world demands economic power for its own interests rather than its own borders. But Cyber World is a world without borders and no defense. Therefore, a cyber weapon system is necessary for superiority in cyberspace (defense, attack) for national cybersecurity. In this paper, we analyze operational procedures for cyber weapons operation. And we design cyber weapons to analyze and develop the best cyber weapons to lead victory in cyberwarfare. It also conducts cyber weapons research to solve the confrontation between Cyber World.

A Study on Law and Organization about Cyber Terror Respons (사이버테러대응활동에 대한 근거법률과 대응기관 연구)

  • Lee, Min-Young;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.425-428
    • /
    • 2011
  • 인터넷 인프라와 기술의 발달로 세계가 인터넷으로 연결되면서, 전쟁과 테러공격의 한 방법으로 사이버테러가 발생하고 있다. 2009년 7월 7일 한국의 주요 홈페이지를 공격한 DDoS공격으로 인하여 사이버테러대응활동의 중요성이 더해졌다. 본 논문에서는 사이버테러대응활동에 대한 근거법률과 대응기관에 관한 연구이다. 상위법인 국가보안법과 법률 제8874호 국가안전보장회의법 등을 연구한다. 또한 사이버테러대응활동의 중요기관인 국가정보원법과, 대통령령훈령 제47호의 국가대테러활동지침, 대통령훈령 제267호인 국가사이버안전관리규정을 연구한다. 본 논문의 연구를 통하여 최근의 급격히 증가하는 사이버테러로부터 국가를 안전하게 지키고, 국민의 평안한 생활을 보장하는 기초 연구 자료로 활용될 것이다.

  • PDF