• Title/Summary/Keyword: Cyber Exercise

Search Result 21, Processing Time 0.027 seconds

Design and Implementation of Cyber Range for Cyber Defense Exercise Based on Cyber Crisis Alert (사이버위기 경보 기반 사이버 방어 훈련장 설계 및 구축 연구)

  • Choi, Younghan;Jang, Insook;Whoang, Inteck;Kim, Taeghyoon;Hong, Soonjwa;Park, Insung;Yang, Jinsoek;Kwon, Yeongjae;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.805-821
    • /
    • 2020
  • Cyber defense exercise should require training on the latest cyber attacks and have a similar process to defense cyber attacks. In addition, it is also important to train on cyber resilience that can perform normal tasks or support equivalent tasks regardless of cyber attacks. In this paper, we proposed and developed a cyber range that can strengthen the elements of cyber resilience by performing cyber defense exercise in real time based on the cyber crisis alert issued when a cyber attack occurs in Korea. When BLUE, YELLOW, ORANGE, and RED warnings are issued according to the cyber crisis, our system performs proactive response, real time response, and post response according to the alarm. It can improve trainee's capability to respond to cyber threats by performing cyber defense exercise in a cyber crisis environment similar to the actual situation of Korea.

A Study on the Defense Cyber Warfare Exercise (국방사이버전 연습체계 개선 방안 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.43-53
    • /
    • 2009
  • In the information society, information security is a critical issue for defense cyber network system. This paper provides a result of a study on the defense cyber exercise system for cyber warfare. So far, defense cyber exercise system has been uneffective and is not systematic even if several exercises has been implemented. In order to overcome these problems, a systematic and integrated cyber exercise process is suggested. Under the suggested system, we expect that cyber exercise for cyber warfare will be implemented with more effective manner.

  • PDF

iRF: Integrated Red Team Framework for Large-Scale Cyber Defence Exercise (iRF: 대규모 사이버 방어 훈련을 위한 통합 레드팀 프레임워크)

  • Jang, In Sook;Cho, Eun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1045-1054
    • /
    • 2021
  • As APT attacks become more frequent and sophisticated, not only the advancement of the security systems but also the competence of the cybersecurity officers of each institution that operates them is becoming increasingly important. In a large-scale cyber defence exercise with many blue teams participating and many systems to simulate and defend against, it should be possible to simulate attacks to generate various attack patterns, network payloads, and system events. However, if one RT framework is used, there is a limitation that it can be easily detected by the blue team. In the case of operating multiple RT frameworks, a lot of time and effort by experts for exercise setup and operation for each framework is required. In this paper, we propose iRF(integrated RT framework) that can automatically operate large-scale cyber defence exercise by integrating a number of open RT frameworks and RT frameworks created by ourselves.

A Proposal of Cybersecurity Technical Response Job Competency Framework and its Applicable Model Implementation (사이버보안 기술적 대응 직무 역량 프레임워크 제안 및 적용 모델 구현 사례)

  • Hong, Soonjwa;Park, Hanjin;Choi, Younghan;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1167-1187
    • /
    • 2020
  • We are facing the situation where cyber threats such as hacking, malware, data leakage, and theft, become an important issue in the perspective of personal daily life, business, and national security. Although various efforts are being made to response to the cyber threats in the national and industrial sectors, the problems such as the industry-academia skill-gap, shortage of cybersecurity professionals are still serious. Thus, in order to overcome the skill-gap and shortage problems, we propose a Cybersecurity technical response Job Competency(CtrJC) framework by adopting the concept of cybersecurity personnel's job competency. As a sample use-case study, we implement the CtrJC against to personals who are charged in realtime cybersecurity response, which is an important job at the national and organization level, and verify the our framework's effects. We implement a sample model, which is a CtrJC against to realtime cyber threats (We call it as CtrJC-R), and study the verification and validation of the implemented model.

Social Factors Affecting Internet Searches on Cyber Bullying in Korea and America Using Social Big Data and Google Search Trends (소셜 빅데이터와 Google 검색트렌드를 활용한 한국과 미국의 사이버불링 검색에 영향을 미치는 요인 분석)

  • Song, Tae-Min;Song, Juyoung;Cheon, Mi-Kyung
    • The Journal of Bigdata
    • /
    • v.1 no.1
    • /
    • pp.67-75
    • /
    • 2016
  • The study analyzed big data extracted from Google and social media to identify factors related to searches on cyber bullying in Korea and America. Korea's cyber bullying analysis was conducted social big data collected from online news sites, blogs, $caf{\acute{e}}s$, social network services and message for between January 1, 2011 and March 31, 2013. Google search trends for the search words of stress, exercise, drinking, and cyber bullying were obtained for January 1, 2004 and December 22, 2013. The main results of this study were as follows: first, the significant factors stress were cyber bullying that Korea more than America. Secondly, a positive relationship was found between stress and drinking, exercise and cyber bullying both Korea and America. Thirdly, significant differences were found all path both Korea and America. The study shows that both adults and teenagers are influenced in Korea. We need to develop online application that if cyber bullying behavior was predicted can intervene in real time because these actual cyber bullying-related exposure to psychological and behavioral characteristic.

  • PDF

Development of a WLAN Based Monitoring System for Group Activity Measurement in Real-Time

  • Tsunoda, Hiroshi;Nakayama, Hidehisa;Ohta, Kohei;Suzuki, Akihiro;Nishiyama, Hiroki;Nagatomi, Ryoichi;Hashimoto, Kazuo;Waizumi, Yuji;Keeni, Glenn Mansfield;Nemoto, Yoshiaki
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.86-94
    • /
    • 2011
  • In recent years, there has been a rise in epidemiological evidence suggesting the health benefits of a physically active lifestyle. However, it is not always easy for individuals to personally recognize the optimal conditions for exercise and physical activity. Wearable acceleration-based pedometers have become widely used in estimating the amount of physical activity, and to a limited extent, providing information regarding exercise intensity, but they have never been used to assess adaptation to exercise. In order to realize simultaneous activity monitoring for multiple users exercising outdoors, we developed a prototype wireless local area network (WLAN) based system. In our system, a WLAN is deployed outside, and a user wearing a smart phone and monitoring device exercises freely within the coverage area of the wireless network. By doing so, the developed system is able to monitor the activity of each user andmeasures various parameters including those related to exercise adaptation. In a demonstration experiment, the developed system was evaluated and used to monitor users enjoying a Nordic walk, after which users were immediately able to receive their exercise report. In this paper, we discuss the requirements and issues in developing an activity monitoring system and report the findings we obtained through the demonstration experiment.

A Full Body Gumdo Game with an Intelligent Cyber Fencer using Multi-modal(3D Vision and Speech) Interface (멀티모달 인터페이스(3차원 시각과 음성 )를 이용한 지능적 가상검객과의 전신 검도게임)

  • 윤정원;김세환;류제하;우운택
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.420-430
    • /
    • 2003
  • This paper presents an immersive multimodal Gumdo simulation game that allows a user to experience the whole body interaction with an intelligent cyber fencer. The proposed system consists of three modules: (i) a nondistracting multimodal interface with 3D vision and speech (ii) an intelligent cyber fencer and (iii) an immersive feedback by a big screen and sound. First, the multimodal Interface with 3D vision and speech allows a user to move around and to shout without distracting the user. Second, an intelligent cyber fencer provides the user with intelligent interactions by perception and reaction modules that are created by the analysis of real Gumdo game. Finally, an immersive audio-visual feedback by a big screen and sound effects helps a user experience an immersive interaction. The proposed system thus provides the user with an immersive Gumdo experience with the whole body movement. The suggested system can be applied to various applications such as education, exercise, art performance, etc.

The Relationship among Trust of Instructors, Exercise Flow and Psychological Happiness for Golf Participants (골프참여자의 지도자신뢰와 운동몰입 및 심리적 행복감의 관계)

  • Baek, Yu-Mi
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.141-148
    • /
    • 2019
  • The purpose of this study is to investigate the relationship between golf leader trust, exercise flow and psychological happiness for golf practice users. This study surveyed 256 golfers. The data were used to examine the causal relationship between variables using SPSS 18.0 and AMOS 18.0. Main findings were as follows: First trust of Instructors had a positive effect on exercise flow. Second, exercise flow had a positive effect on psychological happiness. Third, trust of Instructors had a positive effect on psychological happiness. Fourth, exercise flow mediated the relationship between golf participant trust of Instructors and psychological happiness. If golf participants have higher confidence in their leaders and more commitment to exercise, the quality of life will be higher.

A Study on the Improvement of Cybersecurity Exercise Policy for the Nuclear Facilities (원자력시설 사이버사건 대응훈련 정책 개선을 위한 규제방안 연구)

  • Ryu, Jinho;Kim, Sang-U
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.302-305
    • /
    • 2020
  • 정보처리기술이 발달함에 따라 원자력시설에 대한 사이버침해 가능성이 갈수록 높아지고 있다. 방사능방재법 및 관련 법령에 의거하여 국내 원자력시설은 각 시설 별 사이버사건 비상대응 절차를 수립하고 절차의 유효성 및 비상대응조직의 대응역량을 제고하기 위한 목적의 주기적인 사이버사건 대응훈련을 실시하고 있으며, 규제기관의 독립적인 훈련평가 결과를 통해 많은 개선사항이 도출되고 있다. 본 논문에서는 현행 원자력시설의 사이버사건 대응훈련 체계를 분석하여 사이버사건대응 훈련 정책의 개념에 대해, 국내·외 기준에 따른 사이버사건 대응훈련 정책의 요소를 식별하여 이를 개선하기 위한 구체적인 규제방안을 제시한다.

Issues of Halal Supply Chain Management: Suggestion for Korean Traders

  • Lee, Hee-Yul;Hwang, Hyun-Ju;Kim, Dong-Hwan
    • Journal of Korea Trade
    • /
    • v.23 no.8
    • /
    • pp.132-144
    • /
    • 2019
  • Purpose - The purpose of this paper is to suggest countermeasures to reduce the damage of manufacturers in halal industries and to increase the transparency of the halal market along with raising some problems of halal supply chain management (HSCM). Design/methodology/approach - To achieve to the aim of this research, halal supply chain is categorized as a green zone or a red zone according to the possibility of cross-contamination, and the study introduces 2 examples in Malaysia and Indonesia regarding cross-contamination. Findings - More than 70% of the companies producing halal-certified products are, ironically, non-Muslim suppliers under the halal certificate system and by using halal supply chain. Most Muslim countries do not exercise control over the completed halal supply chain. In most Muslim countries which do not exercise control over halal supply chain properly, there is always a possibility of cross-contamination of products during the processes of distribution. Research limitations/implications - This research has been conducted by accessing cases in halal supply chain. These cases are found in some Muslim countries, not all Muslim countries. Nevertheless, the authors found the possibility of these cross-contaminations in all Muslim countries, and it will damage the halal market. Originality/value - While existing studies have focused on protecting Muslim consumers by ensuring the integrity of halal products in halal supply chain, there is no research on how to protect halal product manufacturers as another important axis of halal SCM.