• Title/Summary/Keyword: 사이버대학교

Search Result 1,193, Processing Time 0.025 seconds

Security Threat Trend based on Drone Embedded System and Network Protocol (드론 임베디드 시스템 및 네트워크 프로토콜 기반 보안위협 동향)

  • Sang-Hyeon Park;In-Su Jung;Jin Kwak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.190-191
    • /
    • 2023
  • IoT(Internet of Things) 기술을 기반으로 한 드론은 사용자의 요청에 따라 데이터 처리, 수집, 송·수신 등에 고도화된 ICT(Information and Communications Technology) 기술을 활용하고 있다. 또한, 드론은 ICT 기술이 발전함에 따라 문화, 소방, 국방 등 다양한 분야에 적용되어 사용자에게 편의를 제공하고 있다. 그러나, 드론에 적용되는 ICT 기술과 드론에 탑재되는 기술들이 고도화됨에 따라 드론 모듈 내 펌웨어 및 무선 네트워크를 대상으로 한 보안위협이 증가하고 있다. 따라서 본 논문은 드론의 보안위협에 대응하기 위하여 드론 임베디드 시스템 및 네트워크 프로토콜을 대상으로한 최신 보안위협 동향을 분석한다.

A Study of the activation learning that apply Ubiquitous (유비쿼터스를 활용한 학습 활성화에 관한 연구)

  • Lee, Soo-In;Lee, Ha-Yong;Yang, Hae-Sool
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.565-568
    • /
    • 2008
  • 우리나라의 경우에서처럼 인터넷 인프라 환경을 이용한 e-러닝은 교육인적자원부의 사이버가정학습을 시작하여, 사설 학원에서 수익모델로 많은 e-러닝 콘텐츠가 개발되어 상용화 되고 있다. 대학에서는 사이버 대학 및 사이버 과목을 수강하여 공식적인 학점으로 인정을 받은 단계는 정착화 되고 있는 실정이지만, 아직 활용도 차원에서는 활발한 활동이 이루어지지는 않는 것으로 본문의 'e-러닝학습의 문제점'을 보면서 알 수 있다. 본 논문에서는 특히 대학교육의 유비쿼터스 컴퓨팅 환경에서 e-러닝을 접목하여 새로운 교육의 패러다임을 적용한 u-러닝 활용방안을 연구하고 앞으로 e-러닝의 발전방향을 연구하고자 한다.

Current Trends in the U.S. Cybersecurity Laws (미국 사이버보안법의 최근 동향 - 「사이버보안 정보공유법」을 중심으로 하여 -)

  • Yang, Chun-Soo;Jee, Yu-Mi
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.155-192
    • /
    • 2018
  • As the 'hyper-connected society' has emerged through the 'Fourth Industrial Revolution, public interests as well as social dangers have increased. Above all, the risk of infringement of information, including confidential personal information, is dramatically increasing. As the hyper-connected society has been realized, even if only one of the internet devices is hacked, there would be a danger that the ripple effect of such a hacking spreads to the whole network. Therefore, the necessity and importance of information security, including cybersecurity, has been increasing. In other words, the stability of cyberspace and internet space is becoming more important. As a result, the Korean government is seeking to build a legal system related to information security, which would be able to cope with the information infringement problem in the hyper-connected society. However, it seems that the government is still struggling with the direction of building such a legal system. In this context, a comparative review examining the legal systems of advanced foreign countries will provide meaningful implications as to what kinds of legal policies we should devise and implement for information security. In particular, the U.S. legislative act that actively responds to the cybersecurity violations is worthy of reference. For this reason, this article systematically analyzes the current status of the U.S. cybersecurity laws. Especially, this article focuses on the "Cybersecurity Information Sharing Act of 2015"(hereinafter "CISA"), that was recently enacted by the U.S. congress. The CISA prescribes the systemic and detailed information-sharing between national and private entities. The CISA, that actively promotes information-sharing, is full of suggestions for us, in that information-sharing is an effective way to properly realize information security in today's hyper-connected society.

A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services (국가 전산망 보안관제업무의 효율적 수행방안에 관한 연구)

  • Kim, Young-Jin;Lee, Su-Yeon;Kwon, Hun-Yeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.103-111
    • /
    • 2009
  • Recently, cyber attacks against public communications networks are getting more complicated and varied. Moreover, in some cases, one country could make systematic attacks at a national level against another country to steal its confidential information and intellectual property. Therefore, the issue of cyber attacks is now regarded as a new major threat to national security. The conventional way of operating individual information security systems such as IDS and IPS may not be sufficient to cope with those attacks committed by highly-motivated attackers with significant resources. As a result, the monitoring and control of cyber security, which enables attack detection, analysis and response on a real-time basis has become of paramount importance. This paper discusses how to improve efficiency and effectiveness of national cyber security monitoring and control services. It first reviews major threats to the public communications network and how the responses to these threats are made and then it proposes a new approach to improve the national cyber security monitoring and control services.

A Study on Threat Detection Model using Cyber Strongholds (사이버 거점을 활용한 위협탐지모델 연구)

  • Inhwan Kim;Jiwon Kang;Hoonsang An;Byungkook Jeon
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2022
  • With the innovative development of ICT technology, hacking techniques of hackers are also evolving into sophisticated and intelligent hacking techniques. Threat detection research to counter these cyber threats was mainly conducted in a passive way through hacking damage investigation and analysis, but recently, the importance of cyber threat information collection and analysis is increasing. A bot-type automation program is a rather active method of extracting malicious code by visiting a website to collect threat information or detect threats. However, this method also has a limitation in that it cannot prevent hacking damage because it is a method to identify hacking damage because malicious code has already been distributed or after being hacked. Therefore, to overcome these limitations, we propose a model that detects actual threats by acquiring and analyzing threat information while identifying and managing cyber bases. This model is an active and proactive method of collecting threat information or detecting threats outside the boundary such as a firewall. We designed a model for detecting threats using cyber strongholds and validated them in the defense environment.

Analysis on Importance of Success Factors to Select for the Cloud Computing System Using AHP at Cyber Universities in Korea (AHP를 이용한 국내 사이버대학교 클라우드 컴퓨팅 시스템 구축 성공 요인의 중요도 분석)

  • Kang, Tae-Gu;Kim, Yeong-Real
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.325-340
    • /
    • 2022
  • Amid the unprecedented situation of COVID-19 around the world, online education has established itself as an essential element in the era of zero contact and the importance of various content and changes of the system that are appropriate for the era of the 4th industrial revolution has increased. Although universities are making their efforts to combine ICT technologies and design and achieve new systems, the recognition and atmosphere for establishing the cloud computing system are falling short. The purpose of this research importance of success factors of "Building a cloud computing system of cyber university in Korea" by classifying the work characteristics and scale, and to derive and analyze the importance cloud rankings considering the organization and individual dimension. Therefore, this study has drawn 14 major factors in the previous researches and models through the survey on experts with knowledge related to the cloud computing. The analysis was conducted to see what differences there are in factors for the successful establishment of the cloud computing system using AHP. It is expected that the factors for success presented through this study would be used as systemic strategies and tools for the purpose of drawing factors for the success of establishing the private cloud computing system for the higher education institutions and public information systems.

A Survey on Public Awareness of Cyber Security (사이버안전에 대한 국민인식 조사 연구)

  • Yun, Young-Sun;An, Gae-il
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.87-95
    • /
    • 2019
  • In this study, we surveyed the public awareness about cyber security. Through the survey, we found the awareness for cyber threats that are easily exposed to the public, the one is felt anxiety by the people, and harmful contents in the online. As a result, we analyzed the various cyber threats, and found the internet usage environments, thoughts on unhealthy contents, person in charge of prevention and its methods. The results of the study can be considered as the bases of the extracting requirements for designing convergence research items in the cyber security, and they also suggested its utilization.

Prioritization Analysis for Cyber Security Enhancement at Busan Port Container Terminal (부산항 컨테이너 터미널 사이버 보안 강화를 위한 우선순위 분석)

  • Ha, Do-Yeon;Kim, Chi-Yeol;Kim, Yul-Seong
    • Journal of Korea Port Economic Association
    • /
    • v.40 no.1
    • /
    • pp.1-14
    • /
    • 2024
  • The port industry has been actively adopting Fourth Industrial Revolution technologies, leading to transformations in port infrastructure, such as automated and smart ports. While these changes have improved port efficiency, they have also increased the potential for Cyber Security incidents, including data leaks and disruptions in terminal operations due to ransomware attacks. Recognizing the need to prioritize Cyber Security measures, a study was conducted, focusing on Busan Port's rapidly automating container terminal in South Korea. The results of the Eisenhower Matrix analysis identified legal and regulatory factors as a top priority in the first quadrant, with educational systems, workforce development, network infrastructure, and policy support in the third quadrant. Subsequently, a Borich Needs Analysis revealed that the highest priority was given to legal improvements in security management systems, while the development of Cyber Security professionals ranked lowest. This study provides foundational research for enhancing Cyber Security in domestic container terminals and offers valuable insights into their future direction.

Influence of SNS Addiction tendency and social support on cyber violence in college students (대학생의 SNS 중독경향성과 사회적지지가 사이버폭력에 미치는 영향)

  • Jung, Eun-Yeong;Yu, Eun-Yeong
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.407-415
    • /
    • 2018
  • The purpose of this study is to investigate the effect of SNS addiction tendency and social support on cyber violence among college students. Data collection was conducted through a structured questionnaire for 330 college students and analyzed through SPSS 18.0 program. As a result of the analysis, SNS addiction tendency was low as $1.81{\pm}0.55$, social support was $4.00{\pm}0.78$ and cyber violence was $1.38{\pm}0.59$. There was a significant positive correlation between SNS addiction tendency and SNS posting frequency, and there was a significant negative correlation between social support and grade. Cyber violence increased as the tendency of SNS addiction increased, as social support decreased, and cyber violence decreased in the second and third graders compared to the first grade. For this purpose, it is necessary to strengthen cyber education and group counseling program suitable for college students and it will be necessary to make effort to raise self - control.

A Study on the Cyber motion sickness of VR Content -Focused on Content Environment- (VR 콘텐츠 사이버 멀미에 관한 연구 -콘텐츠 환경을 중심으로-)

  • Koo, Ja-yoon;Kim, Seung-In
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.135-140
    • /
    • 2019
  • This study is aimed at analyzing cyber motion sickness factors focus on virtual environment-based VR and real-world VR. First literature study of cyber motion sickness, 3D animations and documentaries were conducted. As a measurement tool for the degree of motion sickness, the symptom values were measured in a standardized SSQ (Simulator Sickness Questnire) questionnaire. Following the measurement, an in-depth interview was conducted based on the SSQ questionnaire. The results are as follows, First, actual environment based VR caused bigger cyber motion sickness, second, values of strong saturation of VR contents cause cyber motion sickness. This study is expected to be used as design guidelines for configuring VR early contents and to be used for cyber motion sickness research.