• 제목/요약/키워드: Cyber-University

검색결과 2,774건 처리시간 0.405초

Cyber threats: taxonomy, impact, policies, and way forward

  • Malik, Annas W.;Abid, Adnan;Farooq, Shoaib;Abid, Irfan;Nawaz, Naeem A.;Ishaq, Kashif
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권7호
    • /
    • pp.2425-2458
    • /
    • 2022
  • The continuous evolution and proliferation of computer technology and our increasing dependence on computer technology have created a new class of threats: "cyber threats." These threats can be defined as activities that can undermine a society's ability to maintain internal or external order while using information technology. Cyber threats can be mainly divided into two categories, namely cyber-terrorism and cyber-warfare. A variety of malware programs are often used as a primary weapon in these cyber threats. A significant amount of research work has been published covering different aspects of cyber threats, their countermeasures, and the policy-making for cyber laws. This article aims to review the research conducted in various important aspects of cyber threats and provides synthesized information regarding the fundamentals of cyber threats; discusses the countermeasures for such threats; provides relevant details of high-profile cyber-attacks; discusses the developments in global policy-making for cyber laws, and lastly presents promising future directions in this area.

Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness

  • Youn, Jaepil;Oh, Haengrok;Kang, Jiwon;Shin, Dongkyoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권2호
    • /
    • pp.749-766
    • /
    • 2021
  • Cyber powers around the world are conducting cyber information-gathering activities in cyberspace, a global domain within the Internet-based information environment. Accordingly, it is imperative to obtain the latest information through the cyber intelligence preparation of the battlefield (IPB) process to prepare for future cyber operations. Research utilizing the cyber battlefield visualization method for effective cyber IPB and situation awareness aims to minimize uncertainty in the cyber battlefield and enable command control and determination by commanders. This paper designed architecture by classifying cyberspace into a physical, logical network layer and cyber persona layer to visualize the cyber battlefield using BGP archive data, which is comprised of BGP connection information data of routers around the world. To implement the architecture, BGP archive data was analyzed and pre-processed, and cyberspace was implemented in the form of a Di-Graph. Information products that can be obtained through visualization were classified for each layer of the cyberspace, and a visualization method was proposed for performing cyber IPB. Through this, we analyzed actual North Korea's BGP and OSINT data to implement North Korea's cyber battlefield centered on the Internet network in the form of a prototype. In the future, we will implement a prototype architecture based on Elastic Stack.

프레임워크 기반 스마트시티 사이버 보안 메트릭스 (Framework Based Smart City Cyber Security Matrix)

  • 김성민;정혜선;이용우
    • 한국산업융합학회 논문집
    • /
    • 제23권2_2호
    • /
    • pp.333-341
    • /
    • 2020
  • In this paper, we introduce a smart city-cyber-security-grid-matrix methodology, as a result of research on overall cyber security of smart cities. The identified cyber security risks that threaten smart cities and smart-city-cyber-security-threat list are presented. The smart-city-cyber-security-requirements necessary to secure the smart city cyber security with the developed smart city-cyber-security-grid-matrix are given in this paper. We show how the developed smart city-cyber-security-grid-matrix methodology can be applied to real world. For it, we interlocked the developed smart city-cyber-security-grid-matrix methodology with the cyber-security-framework of the National Institute of Standards and Technology, and developed a framework-based smart city-cyber-security-grid-matrix. Using it, it is easy and comfortable to check the level of cyber security of the target smart ciy at a glace, and the construction and operation of the smart city security system is systematized.

사이버 효과 지표를 활용한 사이버 전투 피해평가 시뮬레이션 도구의 설계 및 구현 (Design and Implementation of Simulation Tool for Cyber Battle Damage Assessment Using MOCE(Measure of Cyber Effectiveness))

  • 박진호;김두회;신동일;신동규
    • 정보보호학회논문지
    • /
    • 제29권2호
    • /
    • pp.465-472
    • /
    • 2019
  • 최근 몇 년 사이에 사이버 공격의 보편화로, 사이버 공간내의 공격을 사이버전이라는 일종의 전쟁으로 간주하고 있다. 그러나 사이버전은 직접적인 피해 식별이 불가하여 공격에 대한 아군의 피해 파악이 어렵다. 사이버전에서 발생할 수 있는 공격에 대한 피해를 효과적으로 평가하기 위해, 본 논문은 MOCE(Measure of Cyber Effectiveness) 산출 식을 활용하여 사이버 공격에 대한 피해를 산출할 수 있는 DEVSim++ 기반의 사이버전의 피해 평가 시뮬레이션을 제시한다. 또한 사이버 지휘 통제 단계에서 지휘관의 판단을 돕기 위해, 공격 분류별 피해 받은 개체 수를 벤 다이어그램 형태로 표현하여 결과를 직관적으로 가시화한다.

A Study on the Relationships between Cyber Money Quality and Usage Intention: Focus on the Moderating Effect of Usage Frequency and Amount of Cyber Money

  • Yoon, Jongsoo
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권5호
    • /
    • pp.179-186
    • /
    • 2019
  • While there have been a lots of studies on the use of cyber money, few researches proposed the results on relationships among quality factors, usage intention, and usage characteristics of cyber money in online business environment. Therefore, this study investigates the relationships between cyber money quality and usage intention of cyber money, and examines whether the usage characteristics(frequency, amount) of cyber money has moderating effect on the relationship between cyber money quality and usage intention of cyber money. Firstly, multiple regression analysis tells significant causal relationship between functional and emotional factors of cyber money quality and usage intention of cyber money. Secondly, dummy regression analysis shows usage characteristics of cyber money has the moderating effect on the relationship between cyber money quality and usage intention of cyber money. This paper concludes with some implications for both theory development and cyber money practice.

사이버대학교의 핵심역량에 관한 연구 : 오프라인 기반 대학에 대한 소비자 지각을 중심으로 (A Study of Cyber University Core Competence: The Consumer's Perception about Off-line Base University)

  • 임양환;권순홍
    • 디지털산업정보학회논문지
    • /
    • 제4권4호
    • /
    • pp.127-138
    • /
    • 2008
  • To study about core capability which becomes the kernel of sustainable competitive advantage (SCA) in cyber university which confronts competition-deepening circumstance, the value and importance of brand and educational services of cyber universities which stand on the basis of offline university were examined. Moreover, core capability based on the importance of cyber university service was searched, and its strategic course were suggested. Within research processes, competition environment of cyber university was forecasted, and importance to build up its core capability was examined. Moreover, conjoint analysis was carried out for three offline cyber universities. As a result of survey analysis, effectiveness of cyber university brand showed greater influence than other characteristics in terms of the influence which affects consumer preference for cyber university. Therefore, to overcome weaknesses of brand asset in low brand power cyber university, establishment of strong core capability which reflects consumer preference is needed to carry out differentiation strategy or concentration strategy, and it is necessary to consider the introduction of new competitiveness structure.

Cyber Education Programs for Pharmacists in Korea

  • Song, Su-Eun;Lee, Suk-Hyang;Cho, Jung-Hwan;Shin, Hyun-Taek
    • 대한약학회:학술대회논문집
    • /
    • 대한약학회 2001년도 Proceedings of International Convention of the Pharmaceutical Society of Korea
    • /
    • pp.321.2-322
    • /
    • 2001
  • PDF

A Study on Priority for Success Factors for Chatting Service of Cyber University and Implementation of Chatting Service

  • Lee, Min Jung;Lim, Hyo Yeon
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권11호
    • /
    • pp.151-158
    • /
    • 2018
  • As the competition of 21 cyber universities in Korea has been on a continual increase, they are focusing on improving the quality of the e-learning education in cyber universities. In this study, we intended to derive the failure factors of the previous chatting system in the 2010s and the success factors from previous studies. Next, we identified priorities among five factors(Reliability, UI Convenience, Usability, Network effect, Operational policy) using AHP and the practical ways to implement the chatting service. We applied the chatting system to all the curriculums of S cyber university. Our study finds that the chat service affects the satisfaction of education. Finally, we propose the utilization plan to improve the e-learning education of cyber university through the findings of this research.

사이버보험의 위험관리 요구사항 (Risk Management Requirements for Cyber Insurance)

  • 이송하;전효정;김태성
    • 정보보호학회논문지
    • /
    • 제27권5호
    • /
    • pp.1233-1245
    • /
    • 2017
  • 지능정보사회를 선도하는 핵심 기술이자 서비스인 사물인터넷의 초연결성으로 인해 사이버리스크가 급증하면서 사이버리스크의 전가(Risk transfer)를 통해 경영환경의 안정성을 높이는 새로운 위험관리 방안으로 사이버보험(Cyber insurance)이 주목받고 있다. 그러나, 사이버보험은 아직 국내에서는 비교적 생소한 개념이다. 이에 본 연구에서는 국내 상황에서 우선적으로 요구되는 보장사항을 도출하여 국내 수요에 적합한 사이버보험의 개념을 제안하고자 하였다. 연구 결과 사이버보험의 수요자들은 사업손실과 배상책임에 가장 많은 필요성을 보이고 있는 것으로 나타났다.

상시학습체제에서 사이버교육 요인이 공무원의 사이버교육 선호도에 미치는 영향 -부산광역시를 중심으로- (The Research of Effect of Cyber Education at Always Learning System in Affinity of Cyber Education for Officials: Focusing on Busan Metropolitan City)

  • 박명규;심선희;김하균
    • 수산해양교육연구
    • /
    • 제23권1호
    • /
    • pp.116-125
    • /
    • 2011
  • In this study, a survey research was conducted on government employees in Busan Metropolitan City to identify the influence of cyber education factors (learning factor, learner factor, and learning system factor) on the preference for government employee cyber education offered by the government always learning system. Analyzed results, recognition of learning factor, learner factor, and always learning system were shown to have significant influence on the preference for cyber education, but no indication of influence by always learning support. This study intends to assist stimulating voluntary participation in cyber education and active commitment in learning activities through improving learning effect and fortifying convenient informatization education, with regard to activation of cyber education and improved preference for cyber education.