• 제목/요약/키워드: Cyber Communication

검색결과 784건 처리시간 0.021초

빅데이터를 활용한 이상 징후 탐지 및 관리 모델 연구 (A Study on Anomaly Signal Detection and Management Model using Big Data)

  • 권영백;김인석
    • 한국인터넷방송통신학회논문지
    • /
    • 제16권6호
    • /
    • pp.287-294
    • /
    • 2016
  • APT(Advanced Persistent Threat)공격은 기관, 기업의 정보통신 설비에 대한 중단 또는 핵심정보의 획득을 목적으로 장기간 IT인프라, 업무환경, 임직원 정보 등의 다양한 정보를 수집하고, 이를 바탕으로 제로데이 공격, 사회공학적기법 등을 이용하여 공격을 실행한다. 악성 시그니처 탐지 등의 단편적인 사이버 위협대응 방법으로는 APT 공격과 같이 고도화된 사이버 공격에 대응하기 어렵다. 본 논문에서는 APT 공격 대응 방안 중 하나로 이종 시스템 로그(Heterogeneous System Log)를 빅데이터로 활용하고, 패턴기반 탐지 방법과 이상 징후 탐지 방법을 병합하여 사이버 침해시도를 탐지하는 모델을 제시하고자 한다.

Cyber World의 Moving Brand Identity에 관한 연구 (Moving Brand Identity in Cyber World)

  • 황인경
    • 한국정보통신학회논문지
    • /
    • 제20권1호
    • /
    • pp.65-71
    • /
    • 2016
  • Cyber world는 유기적으로 살아 있어, 계속 진화하며, 인간과 상호 소통하면서, 컴퓨팅과 네트워크의 단말을 통하여 가상과 현실의 인간 생활에 직간접적으로 연결된다. Cyber world에서 brand는 심벌과 로고타입 등 디자인으로 표현되는 BI(Brand Identity)를 통해서 창조되며, 디지털 기술의 발전에 맞춰서 발전해 오고 있다. 본 논문은 기업과 조직의 브랜드 가치를 향상시키고, 빠른 속도로 확산되는 cyber world의 mobile 환경에 적응하는 동영상을 개발하여 나타내고자 한다. Brand identity의 개념, brand identity의 구조, 통합적 brand identity 연구를 시작으로, 해외 Swisscom, HP, BBC 사례에서 적용한 brand identity의 개념과 구현을 연구하였다. 그리고, 가치 향상을 위한 moving brand identity를 위해 본인 작품인 ACM SIG CHI 2015, HCI Korea 2014, Aegis Ship 'Yulgok YiYi'의 설계 내용과 개발한 결과물을 통해 moving brand identity에 적용하여 개발하였다. 본 논문은 cyber world에서 moving brand identity를 연구하여 기업가치의 향상과, 우리나라의 브랜딩 향상 전략에 기여 할 것이다.

전력시스템 대상 지능형 사이버공격 동향 분석 (Trend Analysis of Intelligent Cyber Attacks on Power Systems)

  • 홍순민;엄정호;이재경
    • 융합보안논문지
    • /
    • 제23권3호
    • /
    • pp.21-28
    • /
    • 2023
  • 21세기 정보통신기술의 발달은 주요기반시설의 제어시스템에 초연결성과 초지능성을 갖게 하여 운용 효율성을 높였으나, 보안 취약점을 증가시켜 해킹 위협에 노출되고 있다. 그중에서도 일상생활에 필수적으로 사용하는 전력을 공급하는 전력시스템은 국가 중요기반체계로서 사이버공격의 주요 표적이 되고 있다. 최근에는 전력시스템을 보호하기 위해서 다양한 보안체계를 개발하고 실전형 사이버공방훈련을 통해서 전력시스템의 안정성을 유지하고자 한다. 하지만, 사이버공격이 인공지능과 빅데이터 등의 첨단 ICT 기술과 접목되면서 기존의 보안체계로 지능화되고 있는 사이버공격을 방어하기가 쉽지 않게 되었다. 이러한 지능화되는 사이버공격을 방어하기 위해서는 지능형 사이버공격의 유형과 양상을 사전에 파악하고 있어야 한다. 본 연구에서는 첨단 ICT 기술과 접목된 사이버공격의 진화에 대해서 분석하였다.

청소년의 가족 및 학교 관련 요인에 따른 사이버 행동 (Cyber behavior of Adolescents According to Family and School Factors)

  • 황진숙;이은희;나영주;고선주;박숙희
    • 대한가정학회지
    • /
    • 제42권11호
    • /
    • pp.223-235
    • /
    • 2004
  • This study investigated the integrated effects of family and school factors on the cyber behavior of adolescents. Specifically, the purposes of this study were to categorize adolescents into groups by family and school factors and to find investigate differences among the groups regarding cyber behavior (internet use, internet purpose, and internet experience). no study distributed the questionnaires to middle and high school adolescent students of five representative cities in South Korea. The total respondents were 2240 (960 from Seoul/kyongki, and 320 each from Taegu, Pusan, Kwangiu, and Taejon). The response rate w3s 98.7%. no data were analyzed by factor analysis, cluster analysis, ANOVA, and Duncan test. The results showed that Korean adolescents were segmented into four groups (family preference/school preference group, family dissatisfaction/teacher dissatisfaction group, family average/school average group, family average/peer dissatisfaction group). The four groups were significantly different in regard to cyber behavior. For example, the family dissatisfaction/teacher dissatisfaction group u%d internet to relieve stress and used communication more than the other groups. Also, the group had more diverse cyber behavior including internet addiction. The implications of the study were further discussed.

전자상거래 보험의 담보범위에 관한 고찰 (A Study on the coverage of e-commerce insurance)

  • 신건훈
    • 무역상무연구
    • /
    • 제27권
    • /
    • pp.129-161
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

전자상거래 보험의 시장현황 및 쟁점에 관한 고찰 (A Study on the Market Status and Issues of e-Commerce Insurance)

  • 신건훈
    • 통상정보연구
    • /
    • 제7권3호
    • /
    • pp.27-51
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

XML 기반의 가상교육 시스템 설계 및 평가 (Design and Estimation of Cyber Lecture System based on XML)

  • 이병수;안영두;조시용
    • 한국컴퓨터정보학회논문지
    • /
    • 제7권2호
    • /
    • pp.136-142
    • /
    • 2002
  • 컴퓨터 및 초고속 정보통신망의 발전에 따라 사회는 지식 정보화 사회로 거듭나고 있고 이러한 상황에 서 국가의 경쟁력 확보를 위해 창의적이고. 논리적인 사고력을 갖춘 인재양성이 필수적이다. 이와 같은 목표를 달성하기 위해서는 정보통신 기술을 활용하여 다양한 학습방식을 도입한 열린 교육환경을 구축하고, 정보 통신망을 통한 언제, 어디서, 누구나 새로운 지식과 기술을 습득할 수 있는 평생학습 체계의 구축이 필요하다. 본 논문에서는 기존의 가상교육 시스템의 사례 및 구성요소를 고찰하고, 학생 모드, 교수 모드, 관리자 모드에서 필요한 요구사항에 맞게 가상교육 시스템을 설계하였다. 시스템의 아키텍처 및 XML 3-tier 모델의 연구와 설계한 시스템에 적합한 개발 프로그램의 검토, 그리고 데이터베이스를 설계하였다. 또한, n을 기반으로 하여 웹을 통한 서비스를 제공함으로 학생, 교수 및 관리자로 하여금 원활한 가상교육이 이루어질 수 있도록 시스템의 성능 및 장애요인을 평가하여 이를 해결하였다.

  • PDF

Rhyme of Truce, Training Program for moral psychology in Cyberspace

  • Cho, JeongHee;Lim, Chan
    • International journal of advanced smart convergence
    • /
    • 제8권1호
    • /
    • pp.176-183
    • /
    • 2019
  • Rhyme of Truce is an educational program that helps you develop the ability to cope with cyber violence rightly. we aim to produce educational contents that will last a long time in the memory of specially children. By combining the room escape game and Leap motion / VR, the program reflects the user's motion and action in real time. The Keyboard Worrier comes into contact with the user and causes violence, and the user who is attacked by the monster see several negative messages written in red and hears abuses sound. Users enter the virtual space decorated as the cyber world. They can experience cyber-violence indirectly but vividly, and if language violence, which has been overlooked and recognized only as "letters", is executed offline, it will directly wonder if cyber-violence should also be regarded as a means of violence. Users have the opportunity to cope with violence autonomously. When a user is attacked by an in-game monster, there are two ways to choose from. First, fighting against with a keyboard (which is a symbol of language violence) just like a monster. Second, report the abuser to cyber bureau police. Both methods make them to escape the room, but when they get out of the room and return to the home and read the message through the monitor, users can recognize which action was right for.

A Study on Correlation between Age and Information Ethics Using Information Culture Index

  • Jun, Woochun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권2호
    • /
    • pp.81-85
    • /
    • 2016
  • Information ethics is very essential for everyone in the current knowledge-based society. Every citizen in modern society can enjoy various benefits of recent internet technologies. In the meanwhile, everyone also is exposed to the various side effects of information and communication technologies. The typical side effects include copyright violation, cyber crimes, cyber bullying, internet addiction, and so on. The purpose of this paper is to identify correlation between age and information ethics. For this purpose, 3-year national survey works Information Culture Index are analyzed. After thorough statistical analysis work, it is concluded that there is a meaningful correlation between age and information ethics. In other words, the older people are, the higher information ethics they recognize and observe.

Education in Cyberspace: University as Universality

  • Shapoval, Oksana;Kotlyaria, Svitlana;Medvedieva, Alla;Lishafai, Oleksandr;Barabash, Oleh;Oleksyuk, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.333-337
    • /
    • 2021
  • The article reveals the essence of cyber socialization influencing the process of education and development. The general and potential possibilities of cyber socialization in the process of using the cyberspace of the Internet environment are presented. The sudden transition to distance learning in the spring of 2020 put the pedagogical community in the face of problems related to the content, organizational and methodological basis of the educational process. During the training in distance mode, a rich experience was gained in the use of information and communication technologies. The article discusses the techniques and methods of teaching using the capabilities of information and communication and digital technologies.