• Title/Summary/Keyword: Cyber Capability

Search Result 83, Processing Time 0.02 seconds

A Comprehensive Survey of TPM for Defense Systems

  • Cheol Ryu;Jae-Ho Lee;Do-Hyung Kim;Hyung-Seok Lee;Young-Sae Kim;Jin-Hee Han;Jeong-nyeo Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1953-1967
    • /
    • 2024
  • Lately, there has been a notable surge in the defense industry's efforts to develop highly advanced intelligent systems. These systems encompass sophisticated computing platforms that boast an impressive level of autonomy. However, it's important to acknowledge that these very systems are not impervious to vulnerabilities stemming from both hardware and software tampering. Within the context of this discourse, our focus of the survey is directed towards the hardware security module. This component stands out for its capability to offer a significantly heightened level of protection when compared to conventional software-based techniques. Through the lens of this paper, we embark on a comprehensive survey of Trusted Platform Module (TPM), a hardware security module, shedding light on its potential to fortify the defense against threats that emerge from various vectors of attack.

Research on System Architecture and Simulation Environment for Cyber Warrior Training (사이버전사의 훈련을 위한 시스템 구축 방안 연구)

  • Ahn, Myung Kil;Kim, Yong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.533-540
    • /
    • 2016
  • It is important to establish the environment for cyber warrior training, testing support and effectiveness analysis in order to cope with sharply increasing cyber threat. However, those practices cannot be easily performed in real world and are followed with many constraints. In this paper, we propose a live/virtual M&S-based system for training/testing and constructive M&S-based system for effectiveness analysis to provide an environment similar to real world. These can be utilized to strengthen the capability to carry out cyber war and analyze the impact of cyber threat under the large-scale networks.

A Study on Information Literacy Evaluation Standard for Cyber Teacher (사이버 가정교사의 정보 활용능력 평가기준에 관한 연구)

  • Kim, Chul;Kim, Jeong-Rang;Park, Sun-Ju;Ma, Dai-Sung;Cheong, Eun-Ah
    • Journal of The Korean Association of Information Education
    • /
    • v.13 no.3
    • /
    • pp.383-391
    • /
    • 2009
  • The goal of cyber teaching is to reduce the cost of private lessons, dissipate the educational disparity amongst regions, make classes apt to the given level of every group of students, make up for systematic defects of the public education, and ultimately strengthen its role. This study intends to analyze the capabilities of cyber teachers and clarify their qualifications, as the whole new e-Learning system is about to take root. In this study, the activities of cyber teachers are analyzed and some standards of applicability of cyber teachers, or the so-called ISSCT, are presented. Firstly, the activities are divided into teaching, counselling, process management, development of professionality. Based upon these four activities, nine tasks have been formed and the structure of 22 sub-tasks has been completed. This is the way the standards of applicability of cyber teachers are established in consideration with their activities. Secondly, the standards of information capability of cyber teachers have 53 elements in total, and the aforementioned ISSCT are presented in relation to the ISST, based upon the standards of information capability of cyber teachers.

  • PDF

The Effects of Perception Toward Cyber Identity on Loyalty and Purchase Intention (사이버 공간의 자아에 대한 인지가 충성도와 구매의도에 미치는 영향)

  • Kim Su-Yeon;Hwang Hyun-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.4
    • /
    • pp.83-100
    • /
    • 2005
  • In this paper, we investigate the concept of cyber identity built in cyberspace and analyze the effects of general perception toward cyber identity on loyalty and purchase intent. Cyber identity is classified into two types: personal and social cyber identity, and has five components. Avatars and online gaming capability make up personal cyber identity while online communities and instant messenger count as social cyber identity. We regard blog personalities as having both personal and social characteristics. In our survey, we conclude that internet users want to purchase cyber items such as avatars, online game items, and wallpaper pictures to enhance their cyber identities. Based on the survey results , we derive five factors comprising personal cyber identity and social cyber identity using factor analysis and analyze overall effects of cyber identity on loyalty and purchase intention using Structural Equation Model.

  • PDF

Design and Implementation of Cyber Range for Cyber Defense Exercise Based on Cyber Crisis Alert (사이버위기 경보 기반 사이버 방어 훈련장 설계 및 구축 연구)

  • Choi, Younghan;Jang, Insook;Whoang, Inteck;Kim, Taeghyoon;Hong, Soonjwa;Park, Insung;Yang, Jinsoek;Kwon, Yeongjae;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.805-821
    • /
    • 2020
  • Cyber defense exercise should require training on the latest cyber attacks and have a similar process to defense cyber attacks. In addition, it is also important to train on cyber resilience that can perform normal tasks or support equivalent tasks regardless of cyber attacks. In this paper, we proposed and developed a cyber range that can strengthen the elements of cyber resilience by performing cyber defense exercise in real time based on the cyber crisis alert issued when a cyber attack occurs in Korea. When BLUE, YELLOW, ORANGE, and RED warnings are issued according to the cyber crisis, our system performs proactive response, real time response, and post response according to the alarm. It can improve trainee's capability to respond to cyber threats by performing cyber defense exercise in a cyber crisis environment similar to the actual situation of Korea.

A Case Study on Application of Cyber Home Study in Mathematics (수학과 사이버 가정학습 운영에 관한 연구)

  • Lee, In-Sik;Park, Young-Hee
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.13 no.1
    • /
    • pp.51-74
    • /
    • 2009
  • The purpose of this study is to search for various strategies that could self-regulated learning within cyber home study efficiently, to operate the cyber home study based on such strategies, to manage and support students' learning and to investigate what effects it would have on the ability of self-regulated learning and attitude. In this study, an operational strategy for cyber home study according to the compositional elements of self-regulated learning based on prior studies. Then, the study developed the learning contents of cyber home study and operated cyber home study according to the operational strategy. From the results of the analysis obtained in this study, the following conclusions can be drawn as follows. First, A learner's self-regulated learning capability is able to be improved by self-regulated leaning strategies. Cyber home study that would enable students to implement the leaning on their own through learning contents and operating strategies corresponding to them was the environment that could help their self-regulated learning. Second, in order to find out students' satisfaction for the application of cyber home study, the study compared the survey of cyber home study with the frequency and percentage by each question and the mean value of technical statistics. Cyber home study let students have positive recognition on mathematical learning, and especially as shown in the results of the interview, it was helpful to improve students' interest and confidence as well as their mathematical learning.

  • PDF

Impact of Logistics 4.0 Technology Adoption on Logistics Performance: The Mediating Effect of Logistics Innovation Capability and the Mediated Moderation Effect of Firm Size

  • Young-Min Kim
    • Journal of Korea Trade
    • /
    • v.27 no.5
    • /
    • pp.63-90
    • /
    • 2023
  • Purpose - This study aims to identify the relationship between logistics companies' Logistics 4.0 technology adoption with logistics innovation capability and logistics performance, and analyze the mediating effect of logistics innovation capability and the mediated moderation effect of firm size through logistics innovation capability. Design/methodology - Research models and hypotheses were established based on prior research related to Industry 4.0, Logistics 4.0, logistics technology, logistics performance, and firm size. The survey was conducted on the employees of logistics companies, and exploratory factor analysis, reliability analysis, confirmatory factor analysis, discriminant validity analysis, structural equation model analysis, mediation effect, moderation effect, and the mediated moderation effect analysis were performed. Findings - The adoption of Logistics 4.0 technology was found to significantly affect logistics innovation capability and logistics performance. Logistics innovation capability was found to significantly affect logistics performance. Moreover, logistics innovation capability was found to have a significant mediation effect on the relationship between Logistics 4.0 technology adoption and logistics performance. The moderation effect based on firm size was found to have a partial effect on logistics innovation capability and logistics performance, but the mediated moderation effect was not significant. Originality/value - This study is meaningful in that it empirically analyzed the relationship of Logistics 4.0 technology adoption with logistics innovation capability and logistics performance, the mediating effect of logistics innovation capability, the moderation effect of firm size, and the mediated moderation effect of firm size, which were not addressed in previous studies.

A Study on the Concept of the Cyber Warfare and the Plan of Reaction (사이버전의 개념과 대응방안에 관한 연구)

  • Park, Chan-soo;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.521-524
    • /
    • 2014
  • Because of the development of computers and networks, the use of the internet has been rapidly increased. The smart devices, such as smart phones and tablet PCs, have made an epoch-making changes, which have brought people's daily lives to the cyber world and life values have been improved. The cyber world not only just changed individual's lives, but also affected all areas and the world. The recent global trends reside mainly in protection of energy sources, and nation's dependency of the information system such as politic, economic and national security. Since major national infrastructure becomes a stragic attack target, the importance of cyber warfare has rised as an effective way to attact enermy. This article explores the concept of cyber warfare and national cyber capability, and then figure out the plan of reaction to minimize damages with best protection when cyber warfare occurs.

  • PDF

State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis

  • Kookjin Kim;Jaepil Youn;Hansung Kim;Dongil Shin;Dongkyoo Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1273-1300
    • /
    • 2024
  • In the complex virtual environment of cyberspace, comprised of digital and communication networks, ensuring the security of information is being recognized as an ongoing challenge. The importance of 'Cyber Situation Awareness (CSA)' is being emphasized in response to this. CSA is understood as a vital capability to identify, understand, and respond to various cyber threats and is positioned at the heart of cyber security strategies from a defensive perspective. Critical industries such as finance, healthcare, manufacturing, telecommunications, transportation, and energy can be subjected to not just economic and societal losses from cyber threats but, in severe cases, national losses. Consequently, the importance of CSA is being accentuated and research activities are being vigorously undertaken. A systematic five-step approach to CSA is introduced against this backdrop, and a deep analysis of recent research trends, techniques, challenges, and future directions since 2019 is provided. The approach encompasses current situation and identification awareness, the impact of attacks and vulnerability assessment, the evolution of situations and tracking of actor behaviors, root cause and forensic analysis, and future scenarios and threat predictions. Through this survey, readers will be deepened in their understanding of the fundamental importance and practical applications of CSA, and their insights into research and applications in this field will be enhanced. This survey is expected to serve as a useful guide and reference for researchers and experts particularly interested in CSA research and applications.

Research on Cyber-terrorism preparation scheme (사이버테러 대응방안에 관한 연구)

  • Kim, Yeon Jun;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.33-42
    • /
    • 2016
  • While evolving information-oriented society provides a lot of benefits to the human life, new types of threats have been increasing. Particularly, cyber terrorism, happen on the network that is composed of a computer system and information communication network, and the mean and scale of damage has reached a serious level. In other words, it is hard to locate cyber terror since it occurs in the virtual space, not in the real world, so identifying "Who is attacking?" (Non-visibility, non-formulas), or "Where the attack takes place?" (trans-nation) are hard. Hackers, individuals or even a small group of people, who carried out the cyber terror are posing new threats that could intimidate national security and the pace and magnitude of threats keep evolving. Scale and capability of North Korea's cyber terrorism are assessed as world-class level. Recently, North Korea is focusing on strengthen their cyber terrorism force. So improving a response system for cyber terror is a key necessity as North Korea's has emerged as a direct threat to South Korean security. Therefore, Korea has to redeem both legal and institutional systems immediately to perform as a unified control tower for preemptive response to cyber terrors arise from North Korea and neighboring countries.