• Title/Summary/Keyword: cyber communication

Search Result 787, Processing Time 0.028 seconds

Restrictions on Distance Education in Early Childhood Education in the Era of with Corona, and Proposal for Early Childhood Distance Education Solution Development (위드 코로나 시대에서 유아교육 현장의 원격교육 제한사항과 이에 따른 유아 원격교육 솔루션 개발 제안)

  • Li, Xin Ran;Hong, Pil Tae
    • Journal of Practical Engineering Education
    • /
    • v.13 no.2
    • /
    • pp.251-259
    • /
    • 2021
  • Due to the characteristic that early childhood education is a process of nurturing children's senses by a leader rather than the transfer of knowledge, even in the era of with Corona, early childhood distance education is not one-to-one non-face-to-face education, but rather through distributed materials such as early childhood education packages or media such as TV. Distance education was conducted in a self-care method. Through a review of prior research and intensive parent interviews, the researcher identified the requirements for distance education, such as the expansion and accessibility of educational contents, understanding of basic knowledge of early childhood distance education, and the need to increase children's social skills through real-time distance education. It was identified that the current distance education-related solutions are not suitable for early childhood education. Accordingly, the researcher presents the basic direction (VERI) of the early childhood distance education solution of diversity, ease, real-time communication, and integration, and provides a Web/App platform that allows children, parents, and teachers to share content and communicate in real time and in non-real time. The development of a solution was proposed. This distance education solution is expected to effectively support early childhood distance education in the era of With Corona as infants, parents, and teachers communicate and share the current situation, which is only presenting guidelines and materials.

The mediating effect between the degree to provide emotional labor and personal relationship in the intent to stay for Care worker (돌봄 여성노동자의 감정노동수행정도와 직무지속의사와의 관계에 있어 대인관계의 매개효과)

  • Ji, Eun Gu;Kim, Min Ju;Lee, Won Ju
    • 한국사회정책
    • /
    • v.20 no.3
    • /
    • pp.141-170
    • /
    • 2013
  • The purpose of this study is to find out the relationship among the degree to provide emotional labor, personal relationship and the intent to stay of female care service workers. Specifically, this study focuses on the mediating effect of the personal relationship (client and agency relation). The path analysis and structural equation modeling analysis were performed on the collected data using SPSS18.0. and AMOS 8.0. And Sobel test conducted for examine the mediating effect. The results are the followings. First, the result of the analysis showed that agency relationship was an indirect factor as the partial mediating effect on relationship between the degree to provide emotional labor and the intent to stay for the care women workers. The result suggests that education utilizing various techniques and strategies to overcome the difficulty accompanied by emotional labor such as communication education and the government try to effort managing and controlling the agency which impact on the labor condition of care workers. Second, the government also tries to provide the trust and collaboration network system which construct a good relationship between the care worker and the agency.

Trend Forecasting and Analysis of Quantum Computer Technology (양자 컴퓨터 기술 트렌드 예측과 분석)

  • Cha, Eunju;Chang, Byeong-Yun
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.35-44
    • /
    • 2022
  • In this study, we analyze and forecast quantum computer technology trends. Previous research has been mainly focused on application fields centered on technology for quantum computer technology trends analysis. Therefore, this paper analyzes important quantum computer technologies and performs future signal detection and prediction, for a more market driven technical analysis and prediction. As analyzing words used in news articles to identify rapidly changing market changes and public interest. This paper extends conference presentation of Cha & Chang (2022). The research is conducted by collecting domestic news articles from 2019 to 2021. First, we organize the main keywords through text mining. Next, we explore future quantum computer technologies through analysis of Term Frequency - Inverse Document Frequency(TF-IDF), Key Issue Map(KIM), and Key Emergence Map (KEM). Finally, the relationship between future technologies and supply and demand is identified through random forests, decision trees, and correlation analysis. As results of the study, the interest in artificial intelligence was the highest in frequency analysis, keyword diffusion and visibility analysis. In terms of cyber-security, the rate of mention in news articles is getting overwhelmingly higher than that of other technologies. Quantum communication, resistant cryptography, and augmented reality also showed a high rate of increase in interest. These results show that the expectation is high for applying trend technology in the market. The results of this study can be applied to identifying areas of interest in the quantum computer market and establishing a response system related to technology investment.

A Sanitizer for Detecting Vulnerable Code Patterns in uC/OS-II Operating System-based Firmware for Programmable Logic Controllers (PLC용 uC/OS-II 운영체제 기반 펌웨어에서 발생 가능한 취약점 패턴 탐지 새니타이저)

  • Han, Seungjae;Lee, Keonyong;You, Guenha;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.65-79
    • /
    • 2020
  • As Programmable Logic Controllers (PLCs), popular components in industrial control systems (ICS), are incorporated with the technologies such as micro-controllers, real-time operating systems, and communication capabilities. As the latest PLCs have been connected to the Internet, they are becoming a main target of cyber threats. This paper proposes two sanitizers that improve the security of uC/OS-II based firmware for a PLC. That is, we devise BU sanitizer for detecting out-of-bounds accesses to buffers and UaF sanitizer for fixing use-after-free bugs in the firmware. They can sanitize the binary firmware image generated in a desktop PC before downloading it to the PLC. The BU sanitizer can also detect the violation of control flow integrity using both call graph and symbols of functions in the firmware image. We have implemented the proposed two sanitizers as a prototype system on a PLC running uC/OS-II and demonstrated the effectiveness of them by performing experiments as well as comparing them with the existing sanitizers. These findings can be used to detect and mitigate unintended vulnerabilities during the firmware development phase.

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Research on Basic Concept Design for Digital Twin Ship Platform (디지털트윈 선박 플랫폼 설계를 위한 연구)

  • Yoon, Kyoungkuk;Kim, Jongsu;Jeon, Hyeonmin;Lim, Changkeun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.6
    • /
    • pp.1086-1091
    • /
    • 2022
  • The International Maritime Organization is establishing international agreements on maritime safety and security to prepare for the introduction of autonomous ships. In Korea, the industry is focusing on autonomous navigation system technology development, and to reduce accidents involving coastal ships, research on autonomous ship technology application plans for coastal ships is in progress. Interest in autonomously operated ships is increasing worldwide, and maritime demonstrations for verification of developed technologies are being pursued. In this study, a basic investigation was conducted on the design of a demonstration ship and an onshore platform (remote support center) using digital twin technology for application to coastal ships. To apply digital twin technology, an 8-m small battery-powered electric propulsion ship was selected as the target. The basic design of the twin-integrated platform was developed. The ship navigation and operation data were stored on a server system, and remote-control commands of the electric propulsion ship was achieved through communication between the ship and the onshore platform. Ship performance management, operation and operation optimization, and predictive control are possible using this digital twin technology. This safe and economical digital twin technology is applicable to ships responding to crisis scenarios.

A Convergence Study on the Meaningful Activity Experience of the Elderly (노인의 의미 있는 활동에 관한 융합 연구)

  • Hwang, Hey-Jeong;Kang, Kyung-hee;Kim, Doo-Ree;Chang, Kyung-Hee;Kim, Kwang-Hwan
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.45-52
    • /
    • 2022
  • The purpose of this study, a self-written questionnaire was conducted on 110 people aged 65 or older to analyze the factors of meaningful activities in elderly. As a research methods were student t-test and one-way ANOVA were conducted using the SPSS statistical program, and hierarchical regression analysis was performed to identify factors affecting meaningful activities of the elderly. As a result of the study, the highest score was 3.95±0.64 in "I think my work (activity) with my family is rewarding." As a result of hierarchical regression analysis, the factors affecting the meaningful activities of the elderly were 'resident' in both stages 1(β=-.308, p=.002), 2(β=-.330, p=<.001), and 3(β=-.281, p=<.001), and 'age(β=-.215, p=.026)' in the second stage, indicating that the factors affecting the meaningful activities of the elderly were 'resident' and 'age'. In conclusion, it's necessary to develop and apply a systematic program that prioritizes conversation and communication while working with families for the younger elderly(65-74). In the future, it will be necessary to systematically apply various programs for meaningful activities in old age.

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.

A Study on Application Methodology of SPDL Based on IEC 62443 Applicable to SME Environment (중소기업환경에서 적용 가능한 IEC 62443 기반의 개발 보안 생애주기 프로세스 적용 방안 연구)

  • Jin, Jung Ha;Park, SangSeon;Kim, Jun Tae;Han, Keunhee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.6
    • /
    • pp.193-204
    • /
    • 2022
  • In a smart factory environment in a small and medium-sized enterprise (SME) environment, sensors and actuators operating on actual manufacturing lines, programmable logic controllers (PLCs) to manage them, human-machine interface (HMI) to control and manage such PLCs, and consists of operational technology server to manage PLCs and HMI again. PLC and HMI, which are in charge of control automation, perform direct connection with OT servers, application systems for factory operation, robots for on-site automation, and production facilities, so the development of security technology in a smart factory environment is demanded. However, smart factories in the SME environment are often composed of systems that used to operate in closed environments in the past, so there exist a vulnerable part to security in the current environment where they operate in conjunction with the outside through the Internet. In order to achieve the internalization of smart factory security in this SME environment, it is necessary to establish a process according to the IEC 62443-4-1 Secure Product Development Life cycle at the stage of smart factory SW and HW development. In addition, it is necessary to introduce a suitable development methodology that considers IEC 62443-4-2 Component security requirements and IEC 62443-3 System security requirements. Therefore, this paper proposes an application plan for the IEC 62443 based development security process to provide security internalization to smart factories in an SME environment.

Research on functional area-specific technologies application of future C4I system for efficient battlefield visualization (미래 지휘통제체계의 효율적 전장 가시화를 위한 기능 영역별 첨단기술 적용방안)

  • Sangjun Park;Jungho Kang;Yongjoon Lee;Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.109-119
    • /
    • 2023
  • C4I system is an integrated battlefield information system that automates the five elements of command, control, communications, computers, and information to efficiently manage the battlefield. C4I systems play an important role in collecting and analyzing enemy positions, situations, and operational results to ensure that all services have the same picture in real time and optimize command decisions and mission orders. However, the current C4I has limitations whenever a new weapon system is introduced, as it only provides battlefield visualization in a single area focusing on the battlefield situation for each military service. In a future battlefield that expands not only to land, sea, and air domains but also to cyber and space domains, improved command and control decisions will be possible if organic data from various weapon systems is gathered to quickly visualize the battlefield situation desired by the user. In this study, the visualization technology applicable to the future C4I system is divided into map area, situation map area, and display area. The technological implementation of this future C4I system is based on various data and communication means such as 5G networks, and is expected to enable hyper-connected battlefield visualization that utilizes a variety of high-quality information to enable realistic and efficient battlefield situation awareness.