• Title/Summary/Keyword: 사이버대학교

Search Result 1,212, Processing Time 0.027 seconds

Detection Technique of Suspected Piracy Sites based on Image Black List (이미지 블랙리스트 기반 저작권 침해 의심 사이트 탐지 기법)

  • Kim, Eui-Jin;Jung, In-Su;Song, Yu-Rae;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.148-150
    • /
    • 2021
  • 저작권 콘텐츠의 해외 진출과 함께, 국내·외 저작권 시장 규모가 증가하고 있다. 이와 동시에 등장한 저작권 침해사이트는 메인 페이지에 저작권 침해사이트를 대표하는 이미지를 게시하는 특징이 있다. 이러한 저작권 침해사이트는 음악, 영화, 드라마 등의 저작권 콘텐츠를 불법 유통시키며 저작권 시장에 피해를 입히고 있다. 공공기관에서는 저작권 침해를 방지하기 위해 저작권 침해사이트를 차단하는 등의 대응을 하고 있지만, 저작권 침해사이트의 생성 속도에 비해 침해 여부 판단 속도가 상대적으로 느려서 차단에 어려움이 존재한다. 따라서, 본 논문에서는 저작권 침해사이트의 대표 이미지를 활용한 이미지 블랙리스트에 기반하여 저작권 침해 의심 사이트 탐지 기법을 제안하고자 한다.

Analysis of Memory Security Vulnerability in Autonomous Vehicles (자율주행차 메모리 보안 취약점 분석)

  • Seok-Hyun Hong;Tae-Wook Kim;Jae-Won Baek;Yeong-Pil Cho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.116-118
    • /
    • 2023
  • 자율주행차가 제공하는 새로운 시장과 경쟁력, 인력 및 시간 절약, 교통 체증 문제 해결 등의 장점을 다루고, UN 사이버 보안 법률에 따른 자율주행차의 기술적인 요구사항을 준수해야 한다. 하지만 자율주행차에 대한 기술적인 요구사항을 준수하는 것으로는 모든 사이버 공격에 대해서 막을 수 없다. 자율주행차의 법적 요구사항과 사이버 보안 위협에 대처하는 방법을 다룬다. 특히 RTOS(Real Time OS)와 같은 실시간 시스템에 매우 위험할 수 있는 DRAM(Dynamic Random Access Memory)에 대한 로우해머링 공격 기법에 대해 분석하고 로우해머링에 대한 보안 방법을 제시한다. 그리고 자율 주행 시스템의 안전과 신뢰성을 보장하기 위해 하드웨어 기반 또는 소프트웨어 기반 방어 기술을 소개하고 있다.

Disaster Preparedness Method for Tourism-type Smart City using Metaverse (메타버스를 활용한 관광형 스마트시티의 재난 대비 방법)

  • Kim, Sung;Park, Young-Se;Ha, Young-Seok;Seok, Kwang-Ho
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2022.10a
    • /
    • pp.415-416
    • /
    • 2022
  • 전주는 가장 한국적인 도시답게 모든 사적과 여 채가 있는 한옥마을의 건물이 모두 목재와 기와로 지어진 한옥으로 밀집되어 있어서 화재와 지진, 풍수해 시에 소방차나 구조차의 진입에 어려움이 있다. 이로 인해 초기 화재 진압 시간이 지연됨에 따라 인명피해와 함께 국보와 사적지가 전소될 수 있어 인명과 문화재 보전을 위해 소방시설의 확충과 안전관리가 절실하게 필요하다. 이에 재난 대비를 위한 방법으로 소방 드론을 활용하는 것이 최적의 방법이 될 수 있다. 본 논문에서는 메타버스 플랫폼인 로블록스를 활용하여 스마트시티-전주를 구현하였고, 소방드론을 활용할 수 있는 드론 소방서를 제안하였다.

  • PDF

Potential Security Threat Derivation based on Low-Performance Hardware of Smartwatch (스마트워치 저성능 하드웨어에서 발생 가능한 보안위협 도출)

  • Min-Seo Park;In-Su Jung;Deuk-Hun Kim;Jin Kwak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.206-207
    • /
    • 2023
  • 최근 스마트워치는 통화, 문자, 간편 결제, 기타 장치 제어 등 스마트폰의 소형화 및 경량화 형태로 연구되어 여러 서비스를 제공하고 있다. 스마트워치는 스마트폰 대비 작은 물리적 크기로 인해 적용 가능한 하드웨어의 성능이 상대적으로 낮으며, 이로 인해 낮은 수준의 보안 기능을 제공한다. 이는 스마트워치 대상 보안위협으로 이어질 수 있으며, 이에 대응하기 위한 보안위협 분석 및 도출 연구가 필요한 실정이다. 따라서, 본 논문에서는 스마트워치의 하드웨어 적용 한계점으로 인한 스마트워치와 스마트폰의 성능 차이를 분석하고, 이로 인해 발생 가능한 보안위협을 도출한다.

Development of Prediction Model to Improve Dropout of Cyber University (사이버대학 중도탈락 개선을 위한 예측모형 개발)

  • Park, Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.380-390
    • /
    • 2020
  • Cyber-university has a higher rate of dropout freshmen due to various educational factors, such as social background, economic factors, IT knowledge, and IT utilization ability than students in twenty offline-based university. These students require a different dropout prevention method and improvement method than offline-based universities. This study examined the main factors affecting dropout during the first semester of 2017 and 2018 A Cyber University. This included management and counseling factors by the 'Decision Tree Analysis Model'. The Management and counseling factors were presented as a decision-making method and weekly methods. As a result, a 'Dropout Improvement Model' was implemented and applied to cyber-university freshmen in the first semester of 2019. The dropout-rate in freshmen applying the 'Dropout Improvement Model' decreased by 4.2%, and the learning-persistence rate increased by 11.4%. This study applied a questionnaire survey, and the cyber-university students LMS (Learning Management System) learning results were analyzed objectively. On the other hand, the students' learning results were analyzed quantitatively, but qualitative analysis was not reflected. Nevertheless, further study is necessary. The 'Dropout Improvement Model' of this study will be applied to help improve the dropout rate and learning persistence rate of cyber-university.

A Study on the Design of Re-training Courses for Nurturing Cybersecurity Professionals from Other Occupational Groups (타 직업군으로부터의 사이버보안 전문인력으로의 직무전환을 위한 재교육과정 설계 연구)

  • Ji, Juyeon;Park, Sangho;Yu, Harang;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.43-60
    • /
    • 2018
  • Recently, with the arrival of the 4th industrial revolution, the security risks are converging and complexly changing, and the demand of cybersecurity experts is increasing. Therefore, in this paper, it is the largest of the domestic educational institutions, it has the largest number of emissions talent, and selects the representative major field of humanities and society. Then, after analyzing the common curriculum in each major field, compare it with the training course of cybersecurity experts derived through existing previous research. Through analysis results, we try to design a retraining course for cybersecurity professional human resources. Utilizing the results of this research, it is expected that it will be used as the basic material necessary for the subjects of the re-curriculum education. It is also expected to contribute to resolving the supply-demand gap of cybersecurity professionals.

  • PDF

Case Study on the Implementation of the Department of Early Childhood Education in a Cyber University (사이버대학교 유아교육학과의 강의 운영에 관한 사례연구 - H 사이버 대학교 '유아창의성교육' 수업 운영을 중심으로 -)

  • Kwon, Young-Ihm
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.3
    • /
    • pp.87-96
    • /
    • 2007
  • In order to efficiently improve teaching and learning methods of the department of Early Childhood Education in cyber universities, this research analysed and assessed the problems of the current situation of lectures of the department of early childhood education. Firstly, this research examined the characteristics of cyber-education and the lecturer's role in it. Secondly, the types and status of management of online-lectures were investigated. Finally, the student management and the variety of interaction taking place online were examined. The plan to vitalize the cyber-education of early childhood education that was suggested in this study was mainly focused on developing excellent educational contents and continual research of cyber-education's method of teaching and learning. Then for the activation of online interaction, technological support and teaching strategies are needed to activate online interaction.

A research on cyber kill chain and TTP by APT attack case study (APT 공격 사례 분석을 통한 사이버 킬체인과 TTP에 대한 연구)

  • Yoon, Youngin;Kim, Jonghwa;Lee, Jaeyeon;Yu, Sukdea;Lee, Sangjin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.91-101
    • /
    • 2020
  • We analyzed APT attack cases that occurred overseas in the past using a cyber kill chain model and a TTP model. As a result of the analysis, we found that the cyber kill chain model is effective in figuring out the overall outline, but is not suitable for establishing a specific defense strategy, however, TTP model is suitable to have a practical defense system. Based on these analysis results, it is suggested that defense technology development which is based on TTP model to build defense-in-depth system for preparing cyber attacks.

A Research on the Exposure Status of Cybersecurity Risk of Process Control System and Its Counterplan (공정제어시스템의 사이버보안 위험 노출 현황 및 대응방안 연구)

  • Kim, Youngse;Park, Jinhyung;Kim, Sangki;Kim, Byungjick;Lee, Joonwon;Park, Kyoshik
    • Korean Chemical Engineering Research
    • /
    • v.60 no.4
    • /
    • pp.492-498
    • /
    • 2022
  • Process control systems used in most domestic petrochemical corporates today are based on the Windows platforms. As technology leans toward opened environment, the exposure risk of control systems is increasing. However, not many companies are preparing for various cyberattacks due to lack of awareness and misunderstanding of cyber intrusion. This study investigated the extent of how much exposed the petrochemical process control system is to security threats and suggested practical measures to reduce OT cybersecurity vulnerabilities. To identify the cyber threat status of process control systems, vulnerabilities of the Windows platform, a principal cyber threat factor, have been analyzed. For research, three major DCS providers in Korea and the discontinuation of Windows platform of 635 control systems were investigated. It was confirmed that 78% of the survey subjects were still operating in the discontinued windows platforms, and those process control systems were operated in a state vulnerable to cyber intrusions. In order to actively cope with these cyber threats, legal regulations such as designation of critical infrastructure for major petrochemical facilities which is implemented in advanced countries such as the United States are needed. Additionally, it is necessary to take the initiative in eradicating security threats to the process control systems by aggressively introducing security solutions provided from existing DCS suppliers. This paper was submitted to Professor Ko JaeWook's retirement anniversary issue.