• 제목/요약/키워드: Cyber Communication

검색결과 790건 처리시간 0.027초

개인정보 손해배상책임 보장제도의 쟁점과 과제 (Issues and Tasks of Personal Information Protection Liability Insurance)

  • 이수연;권헌영
    • 한국IT서비스학회지
    • /
    • 제19권1호
    • /
    • pp.37-53
    • /
    • 2020
  • Today, our society is exposed to cyber threats, such as the leakage of personal information, as various systems are connected and operated organically with the development of information and communication technology. With the impact of these cyber risks, we are experiencing damage from the virtual world to the physical world. As the number of cases of damage caused by cyber attacks has continued to rise, social voices have risen that the government needs to manage cyber risks. Thus, information and telecommunication service providers are now mandatory to have insurance against personal information protection due to amendment of "the Act on Promotion of Information and Communication Network Utilization and Information Protection". However, the insurance management system has not been properly prepared, with information and communication service providers selecting the service operators based on sales volume rather than selecting them based on the type and amount of personal information they store and manage. In order for the personal information protection liability insurance system to be used more effectively in line with the legislative purpose, effective countermeasures such as cooperation with the government and related organizations and provision of benefits for insured companies should be prepared. Thus, the author of this study discuss the current status of personal information protection liability insurance system and the issues raised in the operation of the system. Based on the results of this analysis, the authors propsoe tasks and plans to establish an effective personal information protection liability insurance system.

해상 사이버보안 강화방안 연구 (Study on Strengthening the Maritime Sector Cybersecurity)

  • 유윤자;박한선;박혜리
    • 한국항해항만학회:학술대회논문집
    • /
    • 한국항해항만학회 2019년도 춘계학술대회
    • /
    • pp.238-239
    • /
    • 2019
  • 사이버 공격은 통신기능을 수행하는 모든 장비에서 야기될 수 있으며, 통신기술의 발달로 인한 선박과 육상간 연계는 육상부문과 마찬가지로 선박부문 또한 사이버 위협 취약성에 쉽게 노출될 수 있음을 의미한다. 본 논문에서는 해상분야에서의 사이버보안 취약성을 파악하기 위하여 사이버 위협 트렌드 변화를 분석하고 타 산업 사례연구를 통한 해상 사이버보안 강화방안을 제시하였다.

  • PDF

N세대(Net Generation)의 라이프스타일에 따른 패션구매태도에 관한 연구 (A Study on the Attitudes of Net Generation toward Purchasing fashion Products according to Life-style)

  • 최정선;유태순;오희선
    • 복식
    • /
    • 제50권6호
    • /
    • pp.21-31
    • /
    • 2000
  • The purpose of this study was to characterize the attitudes of Net generation customers toward purchasing fashion products or apparels through Cyber communication media. This study targeted 333 individuals aged from 14 to 24 purchasing fashion apparels through the Interned or PC communication. The data were analyzed by using frequency analysis, factor analysis, t-test, ANOVA by SASS package. The results of this study are as follows : 1. Fashion life-style of Net generation is classified into four groups - Fashion attached type, Web entertainment type, Web information type, Web media purchasing type. Net-Generation shows a little preference for brand. 2. As a result of the statistical analysis of each group's demographic variables, price is not so important when purchasing and according to the analysis of age, it proves that twenties are trendier than teenagers. 3. The most significant factor of information search is watching others' clothes and the most popular place for purchase is wholesale mall. Net-Generation has a little intention to purchase through Cyber communication media.

  • PDF

국내외 사이버보안 훈련 동향 (The Trends of Domestic and Overseas Cyber Security Training)

  • Lee, Daesung
    • 한국정보통신학회논문지
    • /
    • 제25권6호
    • /
    • pp.857-860
    • /
    • 2021
  • The 21st century society has entered the fourth industrial society of machine to machine from the information society of human to machine. Accordingly, countries around the world are always operating efficient crisis management systems that can quickly respond to disasters or crises. As cyber attacks such as cyber warfare are actually progressing, countries around the world are conducting defense training in response to cyber attacks, and reflecting the results of simulation attacks in improving or building security systems. In this paper, we would like to consider the future cyber training development guide by comparing and analyzing the trends of cyber training in domestic and foreign countries.

Cyber Governance를 위한 인터넷 GIS의 활용방안 (Utilizing Internet GIS for Cyber Governance)

  • 김광주
    • 한국지리정보학회지
    • /
    • 제5권3호
    • /
    • pp.68-76
    • /
    • 2002
  • 현대행정에서 정부기관들이 GIS를 바탕으로 한 홈페이지를 구축하여 시민들과의 양방향 대화와 열린 행정서비스를 확대하면서 cyber governance와 인터넷 GIS의 접목이 활발하게 진행되고 있다. 이에 따라 기존의 '행정관리를 위한 GIS'는 'cyber governance를 위한 인터넷 GIS'로 전환하고 있고, 미래에는 인터넷 GIS를 토대로 한 cyber governance가 행정관리의 새로운 패러다임이 될 것이므로 이 연구에서는 cyber governance와 GIS의 결합 및 활용방안을 제시함을 목표로 하고자 있다. 이를 위하여 이 연구는 우선 신공공관리 시대에서 cyber governance와 인터넷 GIS의 개념은 정의하고, 둘째로 cyber governance의 속성과 인터넷 GIS의 속성과 양자간의 공통점을 분석하고, 이를 근거로 cyber governance를 위한 인터넷 GIS의 활용방안을 제시하고 있다.

  • PDF

5G 통신기반 IoT, AI, Cloud 적용 정보시스템의 사이버 보안 감리 연구 (Cybersecurity Audit of 5G Communication-based IoT, AI, and Cloud Applied Information Systems)

  • 임형도;박대우
    • 한국정보통신학회논문지
    • /
    • 제24권3호
    • /
    • pp.428-434
    • /
    • 2020
  • 최근 ICT 기술의 발달로 인해 정보시스템의 융합 서비스 플랫폼에 대한 변화가 고속화되고 있다. 5G 통신, IoT, AI, Cloud가 적용된 사이버 시스템으로 확장된 융합 서비스가 실제 사회에 반영되고 있다. 하지만 사이버 공격과 보안 위협에 대한 대응과 보안기술 강화를 위한 사이버 보안 감리 분야는 미흡한 실정이다. 본 논문에서는 5G 통신, IoT, AI, Cloud 기반의 정보시스템 보안성 확장에 따른 정보보호 관리체계 국제표준 분석, 보안 감리 분석과 관련 시스템들의 보안성을 분석한다. 그리고 정보시스템의 사이버 공격과 보안 위협에 따른 보안성 확장을 위한 사이버 보안 감리 점검 사항과 내용을 설계하고 연구한다. 본 연구는 5G, IoT, AI, Cloud 기반 시스템들의 융합 서비스 확장에 따른 사이버 공격과 보안 위협대응을 위한 감리 방안과 감리 내용의 기초자료로 활용될 것이다.

차세대 사이버 보안 동향 (The Trends of Next Generation Cyber Security)

  • Lee, Daesung
    • 한국정보통신학회논문지
    • /
    • 제23권11호
    • /
    • pp.1478-1481
    • /
    • 2019
  • As core technologies(IoT, 5G, Cloud, Bigdata, AI etc) leading the Fourth Industrial Revolution promote smart convergence across the national socio-economic infrastructure, the threat of new forms of cyber attacks is increasing and the possibility of massive damage is also increasing. Reflecting this trend, cyber security is expanding from simple information protection to CPS(Cyber Physical System) protection that combines safety and security that implements hyper-connectivity and ultra-reliability. This study introduces the recent evolution of cyber attacks and looks at the next generation cyber security technologies based on the conceptual changes of cyber security technologies such as SOAR(Security Orchestration, Automation and Response) and Zero Trust.

CRM 기반의 가상 교육 시스템 (Cyber Education System Based on CRM)

  • 오석;이순미
    • 정보교육학회논문지
    • /
    • 제6권1호
    • /
    • pp.110-116
    • /
    • 2002
  • 본 논문에서는 기존의 사이버 학습이 모든 학습자에게 동일한 교육 과정을 제시함으로써 제한된 교육효과를 가지는 단점을 개선하고자, 마케팅 전략의 하나인 CRM을 WBI에 접목시켜 개별 학습자에게 적합한 학습 방향을 제시하는 새로운 알고리즘을 제안하고, 제안된 알고리즘을 적용한 가상 영어 교육 시스템을 구축하였다. 본 논문에서 제안한 CRM 알고리즘은 학습자의 학습 과정에서 나타난 학습자의 흥미성향을 알고리즘에 내장된 방식에 의해 분석하여 학습 분야별 흥미보유 정도로 서열화하고 이를 사이버 학습에 활용할 수 있도록 하였다. 여기서 제시하는 학습자별 흥미에 기초한 학습 과정 설정방법은 학습자의 학습흥미를 더욱 높일 수 있는 사이버 교육 대안 중 하나가 될 수 있을 것으로 기대된다.

  • PDF

The Coming Cyber Society - Types of Multimedia Applications & Services in Japan -

  • Ichinose, Susumu
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 1998년도 Proceedings of International Workshop on Advanced Image Technology
    • /
    • pp.1-3
    • /
    • 1998
  • The 21st century will see the formation of a“Cyber society”that, while separate form the real world, will cooperate with it, leading to the further expansion and development of world society. Cyber society allows the formation of virtual space through the connection of multiple computers in a network. In this virtual space, multiple users can communicate with each other and can collect and exchange information while moving about freely and engaging in activities. Three main technologies are vital to the construction of the Cyber society: platform technology for converting multimedia information to optical signals and performing digital processing and communication processing on such signals; communications network technology for transferring these signals from one point to another; and application technology for configuring the Cyber society that will be formed on this network. This paper describes platform technology and network technology with an emphasis on their relationship to application technology for configuring the Cyber society, and will also discuss InterSpace, one of the cyber society platform system of the Cyber society.

  • PDF

Key Distribution Process for Encryption of SCADA Communication using Game Theory applied Multiagent System

  • Kim, Hak-Man;Kang, Dong-Joo
    • 조명전기설비학회논문지
    • /
    • 제23권11호
    • /
    • pp.34-43
    • /
    • 2009
  • SCADA (Supervisory Control and Data Acquisition) system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks, SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, flexible key distribution concept is proposed for improving the security of SCADA network using Multiagent System (MAS).