• Title/Summary/Keyword: 사이버 기반

Search Result 1,227, Processing Time 0.03 seconds

The Trends and Prospects of Mobile Forensics Using Linear Regression

  • Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.115-121
    • /
    • 2022
  • In this paper, we analyze trends in the use of mobile forensic technology, focusing on cases where mobile forensics are used, and we predict the development of future mobile forensics technology using linear regression used in future prediction models. For the current status and outlook analysis, we extracted a total of 8 variables by analyzing 1,397 domestic and foreign mobile forensics-related cases and newspaper articles. We analyzed the prospects for each variable using the year of occurrence as an independent variable, seven variables such as text (text message usage information), communication information (cell phone communication information), Internet usage information, messenger usage information, stored files, GPS, and others as dependent variables. As a result of the analysis, among various aspects of the use of mobile devices, the use of Internet usage information, messenger usage information, and data stored in mobile devices is expected to increase. Therefore, it is expected that continuous research on technologies that can effectively extract and analyze characteristic information of mobile devices such as file systems, the Internet, and messengers will be needed As mobile devices increase performance and utilization in the future and security technology.

A Case Study on Child-Centered Play Therapy for Inattention and Impulsivity Young Child (산만 및 충동성향의 아동상담 단일사례연구)

  • Kim, Tae-Sun
    • Industry Promotion Research
    • /
    • v.7 no.3
    • /
    • pp.71-75
    • /
    • 2022
  • The purpose of this study was to investigate the child counselling process of a 6-year old girl. The child has showed inattention and impulsity. Her mother had difficulty on caring a child. The researcher conducted 63 session child counseling through play therapy once per week after tested clinical psychological full battery. During the counseling process, a child showed desire of affection and aggressive and impulsive behavior through the child's leading play. As a result the child's inattention and impulsivity decreased, and child-mother relationship improved. The child could express her feelings to their parents in concrete terms. Finally, the child successfully adapted new school life. The mother reported that raising children was much easier than before, and she decided to have a follow-up counseling once a month. This study is meaningful in that it is a case study conducted during 1 year and 8months since she was 6-year old. The young child becomes primary school girl. In this study, it was confirmed that children had an adaptive school life during the first and second grades.

Comparison of SIEM Solutions for Network Security (네트워크 보안을 위한 SIEM 솔루션 비교 분석)

  • Lee, Jong-Hwa;Bang, Jiwon;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.11-19
    • /
    • 2019
  • As technology develops, the latest security threats on the network applied to users are increasing. By attacking industrial or corporate systems with malicious purposes, hackers cause many social problems such as confidential information leakage, cyber terrorism, infringement of information assets, and financial damage. Due to the complex and diversified threats, the current security personnel alone are not enough to detect and analyze all threats. In particular, the Supervisory Control And Data Acquisition (SCADA) used in industrial infrastructures that collect, analyze, and return static data 24 hours a day, 265 days a year, is very vulnerable to real-time security threats. This paper introduces security information and event management (SIEM), a powerful integrated security management system that can monitor the state of the system in real time and detect security threats. Next, we compare SIEM solutions from various companies with the open source SIEM (OSSIM) from AlienVault, which is distributed as an open source, and present cases using the OSSIM and how to utilize it.

The Technological Method for Safe Processing of Sensitive Information in Network Separation Environments (망분리 환경에서 민감정보를 안전하게 처리하기 위한 기술적 방안)

  • Juseung Lee;Ilhan Kim;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.125-137
    • /
    • 2023
  • Companies that handle sensitive information, led by public institutions, establish separate networks for work and the Internet and protect important data through strong access control measures to prevent cyber attacks. Therefore, systems that involve the junction where the Intranet(internal LAN for work purposes only) and the Internet network are connected require the establishment of a safe security environment through both administrative and technical measures. Mobile Device Management(MDM) solutions to control mobile devices used by institutions are one such example. As this system operates by handling sensitive information such as mobile device information and user information on the Internet network, stringent security measures are required during operation. In this study, a model was proposed to manage sensitive information data processing in systems that must operate on the Internet network by managing it on the internal work network, and the function design and implementation were centered on an MDM solution based on a network interconnection solution.

A study on ways to strengthen the new security system through the stipulation of zero trust : legal improvement under the Electronic Financial Transactions Act (제로 트러스트 명문화를 통한 신 보안체계 강화 방안 연구 - 전자금융거래법상 법적 개선을 중심으로 -)

  • Min-won Lee;Hun-yeong Kwon
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.9-17
    • /
    • 2023
  • Due to COVID-19, the concept of Zero Trust, a safe security in a non-face-to-face environment due to telecomm uting, is drawing attention. U.S. President Biden emphasized the introduction of Zero Trust in an executive order to improve national cybersecurity in May 2021, and Zero Trust is a global trend. However, the most difficulty in introd ucing new technologies such as Zero Trust in Korea is excessive regulation of cloud and network separation, which is based on the boundary security model, but is limited to not reflecting all new information protection controls due to non-face-to-face environments. In particular, in order for the government's policy to ease network separation to b ecome an effective policy, the zero trust name culture is essential. Therefore, this paper aims to study legal improve ments that reflect the concept of zero trust under the Electronic Financial Transactions Act.

A Study on The Need for AI Literacy According to The Development of Artificial Intelligence Chatbot (인공지능 챗봇 발전에 따른 AI 리터러시 필요성 연구)

  • Cheol-Seung Lee;Hye-Jin Baek
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.421-426
    • /
    • 2023
  • Among artificial intelligence convergence technologies, Chatbot is an artificial intelligence-based interactive system and refers to a system that can provide interaction with humans. Chatbots are being re-examined as chatbots develop into NLP, NLU, and NLG. However, artificial intelligence chatbots can provide biased information based on learned data and cause serious damage such as privacy infringement and cybersecurity concerns, and it is essential to understand artificial intelligence technology and foster AI literacy. With the continued evolution and universalization of artificial intelligence, AI Literacy will also expand its scope and include new areas. This study is meaningful in raising awareness of artificial intelligence technology and proposing the use of human respect technology that is not buried in technology by cultivating human AI literacy capabilities.

An Influence of the Fourth Industrial Revolution on International Trade and Countermeasure Strategies to Promote Export in Korea (4차 산업혁명이 무역에 미칠 영향과 이에 대비한 수출촉진전략)

  • Lee, Byung-Mun;Jeong, Hee-Jin;Park, Kwang-So
    • Korea Trade Review
    • /
    • v.42 no.3
    • /
    • pp.1-24
    • /
    • 2017
  • This study investigates any possible influences of the fourth industrial revolution on international trade in Korea and suggests strategies to promote export of Korea in order to secure one of the biggest international trade countries. The fourth industrial revolution is the fourth major industrial era since the third industrial revolution in the 18th century which used electronics and information technology to automate production. This can be characterized as a range of emerging technologies that are fusing the physical, digital and biological worlds, and impacting all disciplines, economies and industries. Since this revolution is expected to have effects on international trade as well as whole industrial society, it examines how it may affect international trade of Korea in terms of the subject, the object, markets and forms of international trade. After that, it provides the strategies to promote Korean export in order to overcome the risks around the low economic growth of the recent years and the depressed domestic economy.

  • PDF

A Study on the Development of IT Program for the Introduction of Enterprise Contract Management Model by Franchise Enterprise (프랜차이즈 기업의 전사적 계약관리 (ECM) 모델 도입을 위한 IT 프로그램 개발에 관한 연구)

  • Lee, Sung-Hoon;Lee, Sung-Hee;Jung, Kyu-Sik;Han, Kyu-Chul
    • The Korean Journal of Franchise Management
    • /
    • v.1 no.1
    • /
    • pp.105-131
    • /
    • 2010
  • This practical study is to propose a model for efficiently implementing franchise management by Franchise Enterprise in franchise industry. Franchise system is established and mutual relationship is also fulfilled based on bilateral contract between franchisor and franchisee. After contract and opening the franchisee store, franchisees are continually supervised and administered according to mutually agreed process and procedures. In this regard, franchisor should have well-managed system for supervising and assisting franchisee efficiently and effectively. The purpose of this study is to set-up the concept of enterprise contract management(ECM) in Franchise Enterprise and to promote the systemization of franchise management, and also to present and propose the development tool for franchise-specific IT program which is called " Franchise Contract Management'Supervising System".

A Study on a New Definition of Societal Crisis Based upon Resilience (회복탄력성 측면에서 새로운 사회위기 개념 연구)

  • Sin-Young Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.179-184
    • /
    • 2023
  • Korean society has experienced so-called 'societal crisis' in many aspects of society for a couple of decades and those crises include both natural disasters and tragic catastrophes. Given that, this study purports to investigate, first of all, what is the definition of crisis in general and societal crisis in specific. Next question is what are the major types of societal crises and what are the indicators for those crises. As a result, many areas of societal crisis and corresponding indicators in each area will be introduced. Finally, this study tries to establish a new definition of societal crises based upon a more sociological, more specifically a more phenomenological point of view. For these research purpose, in-depth review for previous research on the subject will be done including psychological and sociological materials. Final outcome of this study will be a new and experimental definition of societal crisis, which will provide the principle base for actual numeric indicators of societal crisis in both macro and micro level.

A Study on Object Recognition Technique based on Artificial Intelligence (인공지능 기반 객체인식 기법에 관한 연구)

  • Yang Hwan Seok
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, in order to build a cyber physical system(CPS) that is a technology related to the 4th industry, the construction of the virtual control system for physical model and control circuit simulation is increasingly required in various industries. It takes a lot of time and money to convert documents that are not electronically documented through direct input. For this, it is very important to digitize a large number of drawings that have already been printed through object recognition using artificial intelligence. In this paper, in order to accurately recognize objects in drawings and to utilize them in various applications, a recognition technique using artificial intelligence by analyzing the characteristics of objects in drawing was proposed. In order to improve the performance of object recognition, each object was recognized and then an intermediate file storing the information was created. And the recognition rate of the next recognition target was improved by deleting the recognition result from the drawing. In addition, the recognition result was stored as a standardized format document so that it could be utilized in various fields of the control system. The excellent performance of the technique proposed in this paper was confirmed through the experiments.