• Title/Summary/Keyword: Cyber Communication

Search Result 784, Processing Time 0.03 seconds

North Korean Cyber Warfare Threat and South Korean Action (북한의 사이버전 위협분석과 대응방안 고찰)

  • Kim, Doo-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.1-10
    • /
    • 2014
  • In this study, I analyzed the increased threat of cyber warfare and the threat of reality about what is happening around the currently. And to prepare for it, I proposed the fact how main developed countries deal with cyber warfare. Also, I presented North Korea's cyber warfare threat which is equipped with world's top 3 cyber warfare performance and the way how their strategy influence to South Korea's national security. Moreever, I studied the existing North Korea's cyber warfare threat and the way how, how South Korea deal with it and prepare to against expected threat of cyber warfare in future.

A Survey for Vulnerability Attack and Defense Method of Satellite-Link Based Communication System

  • Isaac Sim;Jinwoo Jeong;Sangbom Yun;Yunsik Lim;Junghyun Seo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.128-133
    • /
    • 2023
  • Satellite based communication is networks in which users in a wide area can access without wired-based ground infrastructure. In particular, the need is emerging due to the recent Ukraine-Russia war. Satellite network systems acquire data that is difficult to observe on Earth as well as communication networks and are also used for research and development, which allows additional data to be produced. However, due to the nature of communication networks existing in outer space, certain vulnerabilities are revealed, and attacks based on them can be exposed. In this paper, we analyze vulnerabilities that may arise due to the nature of satellite communication networks and describes current research, countermeasures, and future research directions.

A Road-map for an e-Commerce Development (전자상거래 발전 로드맵 모델)

  • Choi, Se-Ill
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.897-904
    • /
    • 2012
  • This paper proposes a road-map from entering into the cyber spaces to getting to the success of cyber businesses. In order to succeed in cyber businesses, the nature of cyber space, attributes of the businesses and circumstances of the business owner have to be integrated and resolved. This road-map consists of integrated stepwise phases of understanding cyber spaces and developing cyber businesses.

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System (사이버 방어체계를 우회하는 익명통신의 지능형 탐지모델개발을 위한 개념연구)

  • Jung, Ui Seob;Kim, Jae Hyun;Jeong, Chan Ki
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.77-85
    • /
    • 2019
  • As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.

Estimation of the Cyber Lecture System based on XML (XML 3-tier 기반의 가상교육 시스템 평가)

  • Ahn, Yung-Doo;Yim, Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.2
    • /
    • pp.124-133
    • /
    • 2002
  • In this thesis. we present the cyber lecture system based on XML 3-tier that uses the communication network as the internet. The system was designed to analysis the existing cyber lecture system and its details and to examine web system architecture and XML 3-tier model. With the designed system, we developed the cyber lecture system. We tested the existing system for performance and problem, then we improved the method of the cyber lecture system used by XML 3-tier Model. The cyber lecture system is offered the handiness of the cyber lecture system using web interface.

The Research for Cyber Security Experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1137-1142
    • /
    • 2017
  • Cyber hacking attacks and cyber terrorism are damaging to the lives of the people, and in the end, national security is threatened. Cyber-hacking attacks leaked nuclear power cooling system design drawings, cyber accidents such as hacking of Cheongwadae's homepage and hacking of KBS stations occurred. The Act on Information and Communication Infrastructure Protection, Promotion of Information and Communication Network Utilization and Information Protection, and the Personal Information Protection Act remove the responsibility for cyber attacks, but it is difficult to prevent attacks by hackers armed with new technologies. This paper studies the development of cyber security experts for cyber security. Build a Knowledge Data Base for cyber security professionals. Web hacking, System hacking, and Network hacking technologies and evaluation. Through researches on the operation and acquisition of cyber security expert certification, we hope to help nurture cyber security experts for national cyber security.

Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack (사이버공격에 대비한 심층방호 특성을 만족하는 단방향 광통신 구조 설계)

  • Jeong, Kwang Il;Lee, Joon Ku;Park, Geun Ok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.561-568
    • /
    • 2013
  • Instrumentation and control system in nuclear power plant performs protecting, controling and monitoring safety operation of Nuclear Power Plant. As cyber attack to the control equipment of instrumentation and control system can cause reactor shutdown and radiation release, it is required to design the instrumentation and control system considering cyber security in accordance with regulatory guides and industrial standards. In this paper, we proposed a design method of uni-directional communication structure which is required in the design of defense-in-depth model according to regulatory guides and industrial standards and we implemented a communication board with the proposed method. This communication board was tested in various test environments and test items and we concluded it can provide uni-directional communication structure required to design of defense-in-depth model against cyber attack by analyzing the results. The proposed method and implemented communication board were applied in the design of SMART (system-integrated modular advanced reactor) I&C (instrumentation and control) systems.

Summary of Maritime Cyber Attacks and Risk Management

  • Al-Absi, Mohammed Abdulhakim;Al-Absi, Ahmed Abdulhakim;Kim, Ki-Hwan;Lee, Young-Sil;Lee, Hoon Jae
    • International journal of advanced smart convergence
    • /
    • v.11 no.3
    • /
    • pp.7-16
    • /
    • 2022
  • The targets of cyber-attacks are not limited to the websites and internal IT systems of shipping agencies. Ships and ports have become important targets for cyber attackers. This paper examines the current state of ship network security, introduces the International Maritime Organization's resolution on ship network security management, and summarizing the cyber-attacks in maritime so the readers can have a general understanding of maritime environment.

Effect of Information and Communication Ethics Education to Check Cyber Crime on Teenagers (청소년들의 사이버 범죄에 대한 정보통신윤리교육의 효과 분석)

  • Ham, Young-Hee;Park, So-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.967-969
    • /
    • 2010
  • In this paper, we describe the effect of information and communication ethics education to check cyber crime on teenagers. For 97 high school students, we implement the information and communication ethics education about the cyber crime and its corresponding legal knowledge during 30 minutes. And then we analyze the effect of the education focusing on the legal knowledge by comparing the students' pre- and post-questionnaire responses.

  • PDF

The Educational Strategy of Digital Design in Cyber-Space (With compose of teaming Communities through Communicational Function) (Cyber-Space에 있어서의 디지털 디자인 학습전략-커뮤니케이션 기능을 통한 학습공동체의 구성을 중심으로-)

  • 김태환;한영호
    • Archives of design research
    • /
    • v.14 no.2
    • /
    • pp.155-162
    • /
    • 2001
  • Recently, as the increase of internet users and the needs of the new educational paradigm, many educational institutions go into the cyberspace system. Especially, it is increase that the cooperative extension for supplying the degree and the remote lectures in the university itself. Mostly those lectures have the form of discussion with theoretical course in the center. It is needed to the development of educational tools for the other courses. The cyber education systems are due to be developed more and more. So we should consider the effective usage of recent techniques like this. Accordingly, I'd like to say what is the method of using effectively the cyber communication. It would be considered about the part of cyber communications and the educational effects that has classified into three parts: the cyber communication as a educational medium, the communication for the cooperative studies, and the theological background of the cyberspace communication. Moreover it is proposed the two parts of the effective study directions; the constitution of the community study, and the effective study factors.

  • PDF