• Title/Summary/Keyword: 사이버 공간

Search Result 569, Processing Time 0.03 seconds

A Study on the Efficient Information Security Methodology under a Korea War-Game Exercise System (워게임 연습체계에서의 효율적 정보보호 방안 연구)

  • 이강택;이동희;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.219-225
    • /
    • 2004
  • There is increasing tension in the Korean Peninsula from the US' putting the NK's nuclear issue along the line of war in Iraq. However, there is worsening in ROK's field exercise condition from decresing defense financial supports, being difficlut to obtain enough space for volumable exercises, and securities and circumstances issues. With acknowleging those problems, CPX(Command Post Exercise), namely war game exercise which is more economical and scientific exercise has earned its attention as the best alternative measure of field exercise war game exercise has already been applyied to independent, joint, and combined exercises. However, the current war game system contains lots of problems in terms of security. Defense network uses dedicated line isolated with internet and secure data through network level encoding. It is vulerable to get attack during war game exercise or from credited network. System security is also subject to reinforced. This research is performed focusing on network and system level securities, and through it, the author will show the effective and optimized security solution for war game system.

  • PDF

Data Fusion Algorithm based on Inference for Anomaly Detection in the Next-Generation Intrusion Detection (차세대 침입탐지에서 이상탐지를 위한 추론 기반 데이터 융합 알고리즘)

  • Kim, Dong-Wook;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.3
    • /
    • pp.233-238
    • /
    • 2016
  • In this paper, we propose the algorithms of processing the uncertainty data using data fusion for the next generation intrusion detection. In the next generation intrusion detection, a lot of data are collected by many of network sensors to discover knowledge from generating information in cyber space. It is necessary the data fusion process to extract knowledge from collected sensors data. In this paper, we have proposed method to represent the uncertainty data, by classifying where is a confidence interval in interval of uncertainty data through feature analysis of different data using inference method with Dempster-Shafer Evidence Theory. In this paper, we have implemented a detection experiment that is classified by the confidence interval using IRIS plant Data Set for anomaly detection of uncertainty data. As a result, we found that it is possible to classify data by confidence interval.

A Study on Designing an Undergraduate Curriculum in Digital Forensics per Stages for Developing Human Resource (디지털 포렌식 인력 양성을 위한 단계별 대학 교과과정 설계에 관한 연구)

  • Rha, HyeonDae;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.75-84
    • /
    • 2014
  • It is a current situation that a large number of physical and financial damages are increasing due to the growth of intellectual cyber crime and unexpected Internet incidents year by year. In the large scale security incidents, digital forensics techniques for computer crime investigations are essential to secure a place in the field. However, qualified digital forensics investigators who complete with digital security technology are practically insufficient in domestic. In this paper, as one of developing human resources plans regarding to scientific investigation of Internet security incidents, an undergraduate curriculum per stage in digital forensics was proposed. For the effective curriculum per stage, the interviews, group discussion on focused group of existing digital forensics investigators and related research were performed to select curriculum, and then the level of difficulty and practical suitability on each subject designed were analyzed through survey and interview to current investigators and security professionals. After collating the survey, the digital forensic curriculum per level was designed to highly adaptable workforce for the future for working and positive suggestions and proposals are addressed.

  • PDF

The study on the consumer behavior pattern in digital environment (디지털 환경에서의 소비자 유형 구분과 그 특성에 대한 탐색 -디지털 라이프스타일에 대한 코드의 발견-)

  • Whang, Sang-Min;Kim, Jee-Yeon;Ryu, Ki-Tae
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.624-628
    • /
    • 2008
  • The purpose of this study is to investigate the "map of mind" or subjectivity regarding consumption behaviors of consumers in the digital environment. This study investigated the values and psychological and behavioral characteristics that motivate consumption for each types of consumers in digital environment. 76 Statements were selected from literature review and popular press articles that introduced consumption related phenomena. A total of 33 participants included experts on digital consumption and lay person, The results indicated that there are 6 groups representing Korean consumption patterns in digital environment: Digital Modernist, Digital Boomer, Digital Chic, Digital Ludens, Digital Conservative, and Digital Renaissance. This research is meaningful in that it provides a framework to view the diverse consumption behaviors in a more holistic rather than independent perspective, considering psychological aspects such as personal values and lifestyles.

  • PDF

A Study on the Consumers' Trust Factors in Internet Shopping Mall (인터넷 쇼핑몰에 대한 소비자의 신뢰 요인 연구)

  • 박광식
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.44-55
    • /
    • 2002
  • This paper tried to analyse the factors influencing consumer trust and the relationships between cause variables and results in Internet Shopping Mall. In order to do so, this paper tried to analyse the trust factors in TV Home Shopping as well as Internet Shopping Mall in terms of cyber markets both. There found six factors : perceived factor before purchasing, perceived factor after purchasing, perceived and emotional factors in the course of purchasing, positive and negative emotional factors after purchasing. These factors are correlated with Internet shopping variables and we can measure how Internet shopping variables can affect trust to the shopping mall. We can compare the trust factors of TV home shopping with those of Internet shopping mall and then we can activate Internet Shopping Mall. More implications of this study and further researches should be discussed in the future research.

  • PDF

A Study of a Teaching and Learning Process of the Information and Communication Ethics Based on Creative Problem Solving Method (창의적 문제해결 과정 기반의 정보통신 윤리교육 교수-학습과정 연구)

  • Kwon, Jungin;Ahn, Seongjin
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.3
    • /
    • pp.41-48
    • /
    • 2013
  • It is not easy to find out well organized teaching and learning methodology as the adverse effects of the internet have made a lot of problems because we realize the importance of the information/cyber ethic education. In this paper, I suggest the teaching and learning process of the information/cyber ethic education as applying the creative problem solving process of the six-step model proposed by A. Osborn and S. Parnes. We divided fifth grade 54 elementary school students into two groups, a experimental group and a control group, and conducted the the teaching and learning experimental methods. The experimental group, conducted educational teaching and learning methods for information ethics education using creative problem solving process, got a better result compared to the other group. It must be one of the systematic approach to lead changes of learners'; recognition, focusing on the ethics problem-solving process.

  • PDF

Development of an Index Model on the Information and Communication Ethics (정보통신윤리지수 모델 개발)

  • Lee, Jae-Woon;Han, Keun-Woo;Lee, YoungJun;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.3
    • /
    • pp.19-29
    • /
    • 2007
  • The informationization policies undertaken in concentration only on the national economic growth invited the unbalance between technology and social culture, displayed the serious reverse function phenomena, and these problems threatened the personal identity of individual in the cyber space. In this study, we developed an index model on the information and communication ethics where the national level of information and communication ethics can be examined. For this purpose, based on diverse previous research data, the areas of the ethical indicators in information and communication has been developed through the brain storming of the research staff. Through the consultation with experts, the feasibility and representation as index was heightened, and the weighted values to the each index was provided by the AHP method. The outcome of questionnaires from the information users and information providers (great portals) was also reflected in simple average method into the calculation of the weighted value to the each index element.

  • PDF

Anomaly Detection Analysis using Repository based on Inverted Index (역방향 인덱스 기반의 저장소를 이용한 이상 탐지 분석)

  • Park, Jumi;Cho, Weduke;Kim, Kangseok
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.294-302
    • /
    • 2018
  • With the emergence of the new service industry due to the development of information and communication technology, cyber space risks such as personal information infringement and industrial confidentiality leakage have diversified, and the security problem has emerged as a critical issue. In this paper, we propose a behavior-based anomaly detection method that is suitable for real-time and large-volume data analysis technology. We show that the proposed detection method is superior to existing signature security countermeasures that are based on large-capacity user log data according to in-company personal information abuse and internal information leakage. As the proposed behavior-based anomaly detection method requires a technique for processing large amounts of data, a real-time search engine is used, called Elasticsearch, which is based on an inverted index. In addition, statistical based frequency analysis and preprocessing were performed for data analysis, and the DBSCAN algorithm, which is a density based clustering method, was applied to classify abnormal data with an example for easy analysis through visualization. Unlike the existing anomaly detection system, the proposed behavior-based anomaly detection technique is promising as it enables anomaly detection analysis without the need to set the threshold value separately, and was proposed from a statistical perspective.

An analysis of consumption behavior and consumption problem according to the digital convergence (디지털 융복합에 따른 소비행동과 소비문제)

  • Kim, Yeon-Jeong
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.149-156
    • /
    • 2016
  • The purpose of this study is to estimate convergence level of digital device and service and analyze group difference of consumption behavior and problem according to digital convergence level. The research method was survey with digital business expert and 343 samples. ANOVA research method was applied. The results of research are as follows. First, the study suggests that with a self-directed consuming attitude associated with both online and offline, there are the possibility to spread social problem which has unclear boundary, the possibility of intrusion into privacy through the network flow, and the matter of the credibility of information in convergence media. Second, since digital devices are important to connect consumers to the network, consumers have anxious dependence on the devices, which causes the fatigue of information to increase rapidly.

A Study on the Consumers Trust Factors in Internet Shopping Mall (인터넷 쇼핑몰에 대한 소비자의 신뢰 요인 연구)

  • 박광식
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.44-55
    • /
    • 2002
  • This paper tried to analyse the factors influencing consumer trust and the relationships between cause variables and results in Internet Shopping Mall. In order to do so, this paper tried to analyse the trust factors in TV Home Shopping as well as Internet Shopping Mall in terms of cyber markets both. There found six factors: perceived factor before purchasing, perceived factor after purchasing, perceived and emotional factors in the course of purchasing, posit ive and negative emotional factors after purchasing. These factors are correlated with internet shopping variables and we can measure how Internet shopping variables can affect trust to the shopping mall. We can compare the trust factors of TV home shopping with those of Internet shopping Mall. and then we can activate Internet Shopping Mall. More implications of this study and further researches should be discussed in the future research.

  • PDF