• Title/Summary/Keyword: 초연결 사회

Search Result 77, Processing Time 0.023 seconds

A Case Study of Cognitive Warfare in the Israel-Palestinian Conflict in 2021 (2021년 이스라엘-팔레스타인 분쟁에서의 인지전 사례 연구)

  • Cho, Sang Keun;Choi, Soon Sik;Woo, Seong Ha;Kim, Ki Won;Lee, Seung Hyun;Park, Sang Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.537-542
    • /
    • 2022
  • The "cognitive warfare," which has emerged as a result of the Ukrainian-Russian war, has already existed in the previous war and is now emerging as a major aspect of the war, its meaning and influence are increasing. Recognizing the emergence and importance of cognitive warfare and understanding the meaning and characteristics of cognitive warfare must be accompanied by victory in the modern war. After Russia's alleged involvement in the U.S. presidential election in 2016 drew attention, the Israeli-Palestinian conflict in 2021 confirmed its upward influence. In particular, 'cognitive warfare' using SNS played a major role in leading the war to its advantage and maintaining the initiative by selecting clear purposes and targets such as the international community, the people, and Hamas. This new pattern of war is gradually emerging as the world is hyper connected with the advent of the Fourth Industrial Revolution. It is expected that it will play a leading role in the future battle if it clearly recognizes the main contents of the new war, "Injijeon," and has the ability and ability to actively operate it.

A Study on Efficient IPv6 Address Allocation for Future Military (미래 군을 위한 효율적인 IPv6 주소 할당에 관한 연구)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.613-618
    • /
    • 2023
  • The advancement of Information and Communication Technology (ICT) is accelerating innovation across society, and the defense sector is no exception as it adopts technologies aligned with the Fourth Industrial Revolution. In particular, the Army is making efforts to establish an advanced Army TIGER 4.0 system, aiming to create highly intelligent and interconnected mobile units. To achieve this, the Army is integrating cutting-edge scientific and technological advancements from the Fourth Industrial Revolution to enhance mobility, networking, and intelligence. However, the existing addressing system, IPv4, has limitations in meeting the exponentially increasing demands for network IP addresses. Consequently, the military considers IPv6 address allocation as an essential process to ensure efficient network management and address space provisioning. This study proposes an approach for IPv6 address allocation for the future military, considering the Army TIGER system. The proposal outlines how the application networks of the Army can be differentiated, and IP addresses can be allocated to future unit structures of the Army, Navy, and Air Force, from the Ministry of National Defense and the Joint Chiefs of Staff. Through this approach, the Army's advanced ground combat system, Army TIGER 4.0, is expected to operate more efficiently in network environments, enhancing overall information exchange and mobility for the future military.

Automated Cyber Threat Emulation Based on ATT&CK for Cyber Security Training

  • Kim, Donghwa;Kim, Yonghyun;Ahn, Myung-Kil;Lee, Heejo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.71-80
    • /
    • 2020
  • As societies become hyperconnected, we need more cyber security experts. To this end, in this paper, based on the analysis results of the real world cyber attacks and the MITRE ATT&CK framework, we developed CyTEA that can model cyber threats and generate simulated cyber threats in a cyber security training system. In order to confirm whether the simulated cyber threat has the effectiveness of the actual cyber threat level, the simulation level was examined based on procedural, environmental, and consequential similarities. in addition, it was confirmed that the actual defense training using cyber simulation threats is the same as the expected defense training when using real cyber threats in the cyber security training system.

Trend Analysis of IoT Technology Using Open Source (오픈소스를 이용한 IoT 기술의 동향 분석)

  • Kwon, Yong-Kwang;Kim, Sun-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • The Internet of Things(IoT) is to build a hyper-connected society through interconnection, and on this basis, to improve the quality of life and productivity, including solving social problems, and to become the next growth engine for the nation. The open common eco-system pursued by the IoT can start with the under- standing of the word 'open'. The IoT can achieve the expected effect of lowering the barriers to entry of technology development, and in these changes, OSSW and OSHW play a very important role in accelerating IoT eco-system maturity and breaking the boundaries between industries to promote convergence. Recently, it has developed into an intelligent IoT that combines artificial intelligence (AI) with the connectivity of the IoT. Here, I will analyze the direction of development of the IoT through understanding and analysis of open source.

A Study on the Necessary Factors to Establish for Public Institutions Big Data System (공공기관 빅데이터 시스템 구축 시 고려해야 할 측정항목에 관한 연구)

  • Lee, Gwang-Su;Kwon, Jungin
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.143-149
    • /
    • 2021
  • As the need to establish a big data system for rapid provision of big data and efficient management of resources has emerged due to rapid entry into the hyper-connected intelligence information society, public institutions are pushing to establish a big data system. Therefore, this study analyzed and combined the success factors of big data-related studies and the specific aspects of big data in public institutions based on the measurement of environmental factors for establishing an integrated information system for higher education institutions. In addition, 19 measurement items reflecting big data characteristics were derived from big data experts using brainstorming and Delphi methods, and a plan to successfully apply them to public institutions that want to build big data systems was proposed. We hope that this research results will be used as a foundation for the successful establishment of big data systems in public institutions.

Cyber Attacks and Appropriateness of Self-Defense (사이버 공격과 정당방위의 당위성)

  • Shin, Kyeong-Su
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.21-28
    • /
    • 2019
  • The emergence of a hyper-connected-super-intelligence society, called the era of the Fourth Industrial Revolution, brought about a new change in the security environment. With ICT (Information Communication Technology) convergence and high-tech technologies introduced across the board, the person-centered driving force that moved the real space is replaced by the code-oriented cyberspace, and its dependency is constantly increasing. Paradoxically, however, these technological changes serve as another security vulnerability that threatens our society, and have brought about the justification for building a cyber defense system while simultaneously facing the opportunities and challenges brought by technology. In this study, the theory of self-defense was put forward on the basis of the theoretical basis for actively responding to the increasingly intelligent and mass-evolving cyberattacks, and firstly, the need to enact a cybersecurity law, secondly, and thirdly, the need to develop a response cooperation system with the U.S. and other cyber powers.

Discourse on ICT Virtual Reality Media : Focusing on Immersible Space and Communication Theories (ICT기반 가상현실(VR) 미디어에 대한 담론 :몰입 공간과 소통이론을 중심으로)

  • Kim, Jung Kyu;Kim, Jong Kouk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.333-338
    • /
    • 2021
  • Development of 5th generation mobile telecommunication technology is visualizing ideal hyper-connected social information and communication technology (ICT). In particular, virtual reality (VR) technology is at the starting point for new expansion and leaps. This work defines virtual reality as media in this context and collects and analyzes discourse on its scalability around space and communication theory. We first elaborated the concept, starting with the early discussions of the virtual reality concept in 1990, and discussed the relationship between the physical world and digital information, expression and interaction immersion as a medium, simulation, art creation theory, and finally evolutionary development. In conclusion, beyond the discourse on the technology of virtual reality, academic subjects were required to have theoretical frameworks on cognitive science, neuroscience, social science, and humanities issues (ethics, personality, etc.) for the development and evolution of virtual reality. In other words, it is time for the evolution of virtual reality to be discussed, which can be moved beyond.

Analyses of Security into End-to-End Point Healthcare System based on Internet of Things (사물인터넷 기반의 헬스케어 시스템의 종단간 보안성 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.871-880
    • /
    • 2017
  • Recently, service based on internet is inter-connected and integrated with a variety of connection. This kind of internet of things consist of heterogenous devices such as sensor node, devices and end-to end equipment which used in conventional protocols and services. The representative system is healthcare system. From healthcare appliance used by IoT, patient and doctor can utilize healthcare information with safety and high speed management. It is very convenient management to operate mobility. But it induced security and vulnerability issues because it has small memory capacity, low power supply and low computing power. This made impossible to implement security algorithm with embedded engine based on hardware. Nowdays, we can't realize conventional standard algorithm due to these kinds of reasons. From the critical issues, it occurred security and vulnerability issues. Therefore, we analysed and compared with conventional method and proposed techniques. Finally, we evaluated security issues and requirement for end-to-end point healthcare system based on internet of things.

Appropriate Technology, Responding to the COVID-19 Pandemic - Redefined Roles in a Public Health Crisis (Part I) (COVID-19 대유행에 대응하는 적정기술 : 보건 위기에서 재정의된 역할 - 파트 1)

  • Lee, Sungwoo;Suh, Jungwoo;Kim, Jaeeun;Jang, Dongyoon;Pyun, Nayoon;Shin, Kwanwoo
    • Journal of Appropriate Technology
    • /
    • v.6 no.2
    • /
    • pp.238-255
    • /
    • 2020
  • As COVID-19, which occurred at the end of 2019, has become a global pandemic, it has emerged as an unprecedented event that quickly destroys a nation's medical and healthcare system in both developed and developing countries. In the 21st century, most of the civil society that aimed for hyperconnected society is facing a new crisis that has not been experienced so far. Indeed, lack of personal protective equipment, isolation of clustered communities, disruption of medical systems necessary for diagnosis and treatment, and disruption of educational and economic activities due to social isolation are emerging. Since the COVID-19 has occurred, many of the difficulties that have occurred in the past six months indicate the basic infrastructure a society should have particularly in a pandemic. These include personal protective equipment (PPE), decontamination and quarantine tools essential for effective response, rapid and precise large-scale diagnosis, medical devices required for patient care, and identification and fast and wide on-line networks that can be used in social isolation. In this first part, we would like to introduce some representative examples of 1) personal protective equipment, 2) prevention of personal and community health, 3) social response through big data and networks within the framework of appropriate technology.

Artificial Intelligence Strategy for Advertising and Media Industries: Focused on In-depth Interviews (광고 및 미디어 산업 분야의 인공지능(AI) 활용 전략 : 심층인터뷰를 중심으로)

  • Cha, Young Ran
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.102-115
    • /
    • 2018
  • The world's major countries carry forward strategies for enhancing industrial competitiveness, resulting in the fourth industrial revolution while a new growth engine is required to deal with the slow growth of global economy and declining productivity. Artificial intelligence (AI) is regarded as a core technology of the fourth industrial revolution. AI is expected to be implemented rapidly in advertising and media industries. However, it is hard to find an effective way to implement AI in these industries, especially because of how quickly the AI market changes and develops. Therefore, this study seeks the possible industrial influence of AI in advertising and media industries and invigoration plan for AI, by an in-depth interview with 10 professionals who lead the AI market. First, it was analyzed to explore the macroscopic side of the AI market through P (Politics), E (Economy), S (Society), and T (Technology). Also, the applicability of AI in advertising and media industries was explored by analyzing its S (Strength), W (Weakness), O (Opportunity), and T (Threat).The result indicates that it is necessary to build up a nation-wide construction of infrastructure for the fourth industrial revolution to invigorate AI in advertising and media industries. Moreover, a social environment capable of overcoming a hyper-connected society and social risks should be fostered. Lastly, it is urgent for both the industrial and academic world to diagnose the influence of AI in advertising and media industries, to anticipate the future in accordance with technological advance, set a proper direction, to invest actively for technical development of AI, and to formulate innovative policies.