• Title/Summary/Keyword: 사이버정보

Search Result 2,488, Processing Time 0.032 seconds

Study of Methodologies for New Vulnerability Checking Module Development Proper to User Level (수준별 신규 취약점 점검 모듈 개발 방법론)

  • Paek, Seung-Hyun;Oh, Hyung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.29-40
    • /
    • 2006
  • Recent trends for cyber threat such as worm and virus exploit vulnerabilities inherent to main information communication infrastructures like the internet to achieve economical and political goals. It needs to develop checking programs for new vulnerabilities published in prompt and apply them to vulnerable systems for the defense of those cyber threats. In this paper, we study of methodologies for new vulnerability checking module development proper to user level. First, we analyze current 7 methodologies for the development of new vulnerability checking modules including GFI LANGuard and Nessus and then compare them. Second, We define and propose the 5 unique methodologies for the development of new vulnerability checking modules in depth. Finally, we induct the best methodology proper to a certain user level by assessing each methodology according to conditions which is set virtually.

  • PDF

A Study on the Development of Secure Communication Channel Using PUF Technology in M-IoT Environment (M-IoT 환경에서 PUF 기술을 활용한 안전한 통신채널 구성 기법)

  • Kim, Sumin;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.107-118
    • /
    • 2019
  • Based on the Internet of Things technology, one of the core technologies of the fourth industrial revolution, our Ministry of Defense is also pushing to establish M-IoT in defense area to improve management efficiency, innovate military culture and strengthen military power. However, devices connected to the Military Internet of Things can be easily exposed to various of cyber threats as most of them are developed and with a focus on improving sensing and communication skills that collect and transmit data. And it is not easy to uniquely identify the numerous heterogeneous devices, and to establish a secure communication channel between devices or between devices and management servers. In this paper, based on PUF technology, we propose a novel key management scheme that can uniquely identify the various devices, and generate the secret keys needed for the establishment of a secure communication channel using non-replicable information generated by the PUF. We also analyze the efficiency of our proposed scheme through comparison with existing key management scheme and verify the logic and security using BAN Logic.

A Legislative Device for the University's Safety Management System in Terms of Crisis Management Perspective (위기관리관점에서 대학의 안전관리 법제 방안)

  • Bae, Dae-Shik
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.183-196
    • /
    • 2008
  • This research will mainly focus on security issues in a university campus and delve into the risk factors and its characteristics due to the extreme polarization growth, and ultimately conduct research on legislative issues regarding safety & security management. A university campus is a miniature of the society, concentrated with human resources, material resources and knowledge information resources. It is also a region in which various underlying risk factors threaten these resources. However, due to the insensibility of danger and carefree indolence, these risk factors have been ignoring, leaving university campus amidst a "dead zone." Currently, a systematic and synthetic measures not only for safety inside the laboratory but also for the new type of crimes such as cyber crimes and motiveless crime due to extreme polarization, stress, uneasiness about the future, increase of mental illnesses, and drug abuse are urgently required. Therefore, I would like to introduce a legislative program in a crisis management perspective that can prevent universities from danger and protect the resources which would ultimately create a new security system.

The Study on Perception of Adoption of Certification System for Smart Factory (스마트공장 표준 인증제도 도입에 관한 인식 조사)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.153-158
    • /
    • 2017
  • The certification for Smart Factory supoort successful management of organization while providing strategic plans to the issue of manufacturing process. In Korea, these standards are prepared as the national standards since 2015, and also, there are actions being taken to adpot the certification for Smart Factory. However, to adopt such certification, it is required that the certification operation system needs to be organized, as well as that the society in general should understand about Smart Factory. Accordingly, it is even more required an review on the adoption of the system. This study has the purpose in surveying a variety of atakeholders' perception for the adoption of Smart Factory certification given the circumstance that the cetitification is implemented through literature review and in-depth interviews. This study will be provide significant implication to build a successful plan for the adoption of Smart Factory certification by reviewing perception of professional and problem, strategy of this certification.

Benefit Analysis of Internet Personal Broadcasting (인터넷 개인 방송의 수익 분석)

  • Jung, Keun-Woong;Park, Seong-Taek;Kim, Jong Uk
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.319-333
    • /
    • 2017
  • This study is aimed at investigating the factors that influence the profits of Internet personal broadcasting to improve unstable benefit structure. 50 viewers of game broadcasting that includes most of internet personal broadcasting's personalities are surveyed, who are watching the broadcasting everyday more than an hour and backing to a broadcast conductor. For investigating Benefit Structure Analysis of Internet Personal Broadcasting, independent variables are composed of Social viewing experience, Parasocial relationship, and Information seeking motive and mediator is composed of viewing satisfaction that influences dependent variable, purchase intention. As a result the study founds that only two independent variables(Parasocial relationship, Information seeking motive) affect to mediator and viewing satisfaction affected to dependent variable.

The Trend and Issues of Sociological Studies of Social Network Service (SNS에 관한 사회학 연구의 동향과 쟁점)

  • Lee, Myoung-Jin;Park, Hyun-Ju
    • Informatization Policy
    • /
    • v.19 no.2
    • /
    • pp.3-20
    • /
    • 2012
  • This study examines the trend and issues of sociological studies of social network service(SNS). For this purpose, the studies were classified into three types. The first type of study concerns spatial characteristics of SNS. It deals with the impact of such SNS usage on individual attitudes and behaviors. The second type of the study focuses on the formation process of interrelationship among users. It is based on sociological concepts such as trust and social capital. The last type of study emphasizes the impact of SNS on society. The study includes the issues of social movement and political participation. In the future study of SNS, more diverse sociological subjects, such as social integration, exclusion, public welfare, and affective support need to be dealt with.

  • PDF

Implementation of Secured Smart-Learning System using Encryption Function (암호기능을 이용한 안전한 스마트-러닝 시스템 구현)

  • Yang, J.S.;Hong, Y.S.;Yoon, E.J.;Choi, Y.J.;Chun, S.K.
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.195-201
    • /
    • 2013
  • The government has invested much budget for 5years to do the Smart-education and operate digital textbook services since 2011. The private enterprises also decided to focus on constructing Smart learning system by investing much budget. If these systems are constructed nationwide and therefore can access to cyber university by using smart devices, we can reduce the information gap and study online lectures to get a grade whenever, whoever and wherever we want to. However, these convenient systems can cause serious problems like falsifying grades by hacking if security systems are weak. In this paper, we formulated cyber university which is secured in terms of security. For this, we simulated the smart-learning system which strengthened the security, considering code algorithm and encryption technique.

A Study on ICT Security Change and CPS Security System in the 4th Industry Age (4차 산업 시대의 ICT 보안 변화와 CPS 보안 시스템에 관한 연구)

  • Joo, Heon-Sik
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.293-300
    • /
    • 2018
  • This study explored the security of Industry 4.0 such as security trends and security threats in Industry 4.0, and security system in Industry 4.0. The threat elements in Industry 4.0 are changing from ICT to IoT and to CPS security, so security paradigm and security System should change accordingly. In particular, environmental and administrative security are more important to solve CPS security. The fourth industry-age security should change to customized security for individual systems, suggesting that the security technology that combines hardware and software in product production design should change from the beginning of development. The security system of the fourth industry proposes design and implementation as a CPS security system as a security system that can accommodate various devices and platforms from a security system in a single system such as a network to an individual system.

The Effect of Motivation of Preliminary Entrepreneur on Entrepreneurial Spirit in Service Industry -Focused on Participant of Cyber University- (예비 서비스 창업자의 동기요인이 기업가정신에 미치는 영향 -사이버대학교 수강자를 중심으로-)

  • Kim, Kyung-Hoe;Kim, Jin-Young
    • Management & Information Systems Review
    • /
    • v.30 no.4
    • /
    • pp.511-537
    • /
    • 2011
  • The start-up program of service company is able to give the positive effect to the job creation and growth but actually the rate of success for start-up program in service industry low and thus the effective support program is required. Recently, it is required that entrepreneurial spirit for success of start-up program in service industry. We examined entrepreneurial spirit between participation motivation in service industry. The results are as follows. As a result of survey for education program participant, it was found that 4 causes of Entrepreneurial Spirit such as innovation thought, market-oriented thought and art-oriented thought, management thought are all significant and especially, the effect of management thought showed somewhat high level in entrepreneurial spirit. Hereafter, this study may help to guide the motivation of preliminary entrepreneurs as food & beverage, restaurant business, retailer, other service industry.

  • PDF

Device Identification System for Corporate Internal Network Visibility in IoT Era (IoT 시대 기업 내부 네트워크의 가시성 확보를 위한 단말 식별 시스템 설계)

  • Lee, Dae-Hyo;Kim, Yong-Kwon;Lee, Dong-Bum;Kim, Hyeob
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.51-59
    • /
    • 2019
  • In this paper, we propose a device identification system for network visibility that can maintain the secure internal network environment in the IoT era. Recently, the area of enterprise network is getting huge and more complicated. Not only desktops and smartphones but also business pads, barcode scanners, APs, Video Surveillance, digital doors, security devices, and lots of Internet of Things (IoT) devices are rapidly pouring into the business network, and there are highly risk of security threats. Therefore, in this paper, we propose the device identification system that includes the process and module-specific functions to identify the exploding device in the IoT era. The proposed system provides in-depth visibility of the devices and their own vulnerabilities to the IT manager in company. These information help to mitigate the risk of the potential cyber security threats in the internal network and offer the unified security management against the business risks.