• Title/Summary/Keyword: Cyber Operation

Search Result 252, Processing Time 0.03 seconds

A Study on the Preparation of National Cyber Warfare (국가 사이버전 대비방안 연구)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.141-151
    • /
    • 2006
  • The destructive power of cyber threat arrived to until the phase which it threatens to direct and seriously in national security undergoes an important national institutuin hacking event of 2004 and Internet paralysis accidents of 2003. 1. 25. So Cyber terror and Cyber warfare is not the hypothetical enemy situation. It is more actual security situation and identify as magnification of warfare concept of incapacitation national important ability include military command system of the adversary, communication, energy, finance and transportation system. consequently, with the progress of cyber threat, it is necessary that looking at a number of general plan to make up for the weak points in cyber warfare operation system. Thus, the focus of this study is to examine new ways of developing a comprehensive cyber security management system.

  • PDF

A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Lee, Cheol-Kwon;Kwon, Kee-Choon;Lee, Dong-Young
    • Nuclear Engineering and Technology
    • /
    • v.44 no.8
    • /
    • pp.919-928
    • /
    • 2012
  • The applications of computers and communication system and network technologies in nuclear power plants have expanded recently. This application of digital technologies to the instrumentation and control systems of nuclear power plants brings with it the cyber security concerns similar to other critical infrastructures. Cyber security risk assessments for digital instrumentation and control systems have become more crucial in the development of new systems and in the operation of existing systems. Although the instrumentation and control systems of nuclear power plants are similar to industrial control systems, the former have specifications that differ from the latter in terms of architecture and function, in order to satisfy nuclear safety requirements, which need different methods for the application of cyber security risk assessment. In this paper, the characteristics of nuclear power plant instrumentation and control systems are described, and the considerations needed when conducting cyber security risk assessments in accordance with the lifecycle process of instrumentation and control systems are discussed. For cyber security risk assessments of instrumentation and control systems, the activities and considerations necessary for assessments during the system design phase or component design and equipment supply phase are presented in the following 6 steps: 1) System Identification and Cyber Security Modeling, 2) Asset and Impact Analysis, 3) Threat Analysis, 4) Vulnerability Analysis, 5) Security Control Design, and 6) Penetration test. The results from an application of the method to a digital reactor protection system are described.

A Study on the Model of Cyber Elementary School (사이버초등학교 모형에 관한 연구)

  • Kim, Jeong-Rang
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.3
    • /
    • pp.385-394
    • /
    • 2004
  • The process for the information society centered on the internet supplied us a space of another life, cyber space. In the reality that the cyber space exercised its influence on the our society outstandingly, this researcher think that it needs to have to discuss about the cyber school in the elementary schools by making use of experience the soft landing of cyber university. This study suggested the model of cyber elementary school applicable to the elementary schools, and discussed with the operational plan by the model. Also, it examined the field teachers' opinions about the model classification and operation through the questionnaire, and analyzed the result. It was divided into the four sorts of cyber elementary schools like the school support type, school associated type, and independent type, and transitional period type. This study researched the concept by the model each, the object and purpose of major education, the operational system, curriculum and contents. As a result of collecting their opinions through the questionnaire, it is desirable to be operated as the transitional period type and the school support type in case of the introduction of cyber elementary schools in the present elementary schools.

  • PDF

Development and Validation of Teaching-Learning Model for Cyber Education of Giftedness (사이버영재교육을 위한 교수-학습 모형의 개발 및 검증)

  • Lee, Jae-Ho;Hong, Chang-Euy
    • Journal of Gifted/Talented Education
    • /
    • v.19 no.1
    • /
    • pp.119-140
    • /
    • 2009
  • This paper examined its possibility and made its new definition by finding relevant bases in order to make a close inquiry into its Identity and direction at this point when cyber-based gifted education academy is established and operated again by its necessity And 4 models which can be used in special education for the gifted were developed making a link with special education for the gifted by collecting and re-classifying cyber educational methods developed by basic research as priority of the educational method which is considered to be the most urgent issue in practical cyber learning. It is a project-type cooperation education model, an information collection-type research education model, a community-type discussion education model, and a problem focus-type e-PBL education model. To apply developed leaching-learning models to reality, students at gifted education academy in Gyeonggi Cyber Gifted Province were imputed models in different ways respectively for 4 months. As a result of analysis and statistical data of activity level and satisfaction level of students who participated in learning activity, it appeared that high level of satisfaction and active activity level were induced compared to the previous method based on tasks. It is expected that this paper will provide the bases when each cyber-based gifted education academy plans operation plan later on, and it will provide proper methods when cyber guidance teachers plan class activities.

A Study on Sizing and Operational Policies for Building the Cloud Training Portal System of Cyber Universities (사이버대학의 클라우드 실습 포털 구축을 위한 규모 산정 및 운영 정책)

  • Park, Jung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.171-178
    • /
    • 2015
  • In these days, the practical training education is getting highlighted in IT curriculum. This study is for the Cloud computing based Virtual Desktop Service Plan of IT education and its efficient operation and management plan. With the implementation of a virtual lab environment system, the training environment which is customized by the curriculum is able to be provided. Also in the case of the limited system, the curriculum is able to be provided for each subject in advance. Therefore if the Cloud Training (or Practicing) Portal system for the multiple cyber universities is implemented according to this study's estimated scale and operation managing policies, the virtual training education service system could be provided in more efficient and more effective ways.

A study on the developing and implementation of the Cyber University (가상대학 구현에 관한 연구)

  • Choi, Sung;Yoo, Gab-Sang
    • Proceedings of the Technology Innovation Conference
    • /
    • 1998.06a
    • /
    • pp.116-127
    • /
    • 1998
  • The Necessity of Cyber University. Within the rapidly changing environment of global economics, the environment of higher education in the universities, also, has been, encountering various changes. Popularization on higher education related to 1lifetime education system, putting emphasis on the productivity of education services and the acquisition of competitiveness through the market of open education, the breakdown of the ivory tower and the Multiversitization of universities, importance of obtaining information in the universities, and cooperation between domestic and oversea universities, industry and educational system must be acquired. Therefore, in order to adequately cope wi th these kinds of rapid changes in the education environment, operating Cyber University by utilizing various information technologies and its fixations such as Internet, E-mail, CD-ROMs, Interact ive Video Networks (Video Conferencing, Video on Demand), TV, Cable etc., which has no time or location limitation, is needed. Using informal ion and telecommunication technologies, especially the Internet is expected to Or ing about many changes in the social, economics and educational area. Among the many changes scholars have predicted, the development and fixations of Distant Learning or Cyber University was the most dominant factor. In the case of U. S. A., Cyber University has already been established and in under operation by the Federate Governments of 13 states. Any other universities (around 500 universities has been opened until1 now), with the help of the government and private citizens have been able to partly operate the Cyber University and is planning on enlarging step-by-step in the future. It could be seen not only as U. S. A. trying to elevate its higher education through their leading information technologies, but also could be seen as their objective in putting efforts on subordinating the culture of the education worldwide. UTRA University in U. S. A., for example, is already exporting its class lectures to China, and Indonesia regions. Influenced by the Cyber University current in the U.S., the Universities in Korea is willing .to arrange various forms of Cyber Universities. In line with this, at JUNAM National University, internet based Cyber University, which has set about its work on July of 1997, is in the state of operating about 100 Cyber Universities. Also, in the case of Hanam University, the Distant Learning classes are at its final stage of being established; this is a link in the rapid speed project of setting an example by the Korean Government. In addition, the department of education has selected 5 universities, including Seoul Cyber Design University for experimentation and is in the stage of strategic operation. Over 100 universities in Korea are speeding up its preparation for operating Cyber University. This form of Distant Learning goes beyond the walls of universities and is in the trend of being diffused in business areas or in various training programs of financial organizations and more. Here, in the hope that this material would some what be of help to other Universities which are preparing for Cyber University, I would 1ike to introduce some general concepts of the components forming Cyber University and Open Education System which has been established by JUNAM University. System of Cyber University could be seen as a general solution offered by tile computer technologies for the management on the students, Lectures On Demand, real hour based and satellite classes, media product ion lab for the production of the multimedia Contents, electronic library, the Groupware enabling exchange of information between students and professors. Arranging general concepts of components in the aspect of Cyber University and Open Education, it would be expressed in the form of the establishment of Cyber University and the service of Open Education as can be seen in the diagram below.

  • PDF

Issues and Tasks of Personal Information Protection Liability Insurance (개인정보 손해배상책임 보장제도의 쟁점과 과제)

  • Lee, Suyeon;Kwon, Hun-Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.37-53
    • /
    • 2020
  • Today, our society is exposed to cyber threats, such as the leakage of personal information, as various systems are connected and operated organically with the development of information and communication technology. With the impact of these cyber risks, we are experiencing damage from the virtual world to the physical world. As the number of cases of damage caused by cyber attacks has continued to rise, social voices have risen that the government needs to manage cyber risks. Thus, information and telecommunication service providers are now mandatory to have insurance against personal information protection due to amendment of "the Act on Promotion of Information and Communication Network Utilization and Information Protection". However, the insurance management system has not been properly prepared, with information and communication service providers selecting the service operators based on sales volume rather than selecting them based on the type and amount of personal information they store and manage. In order for the personal information protection liability insurance system to be used more effectively in line with the legislative purpose, effective countermeasures such as cooperation with the government and related organizations and provision of benefits for insured companies should be prepared. Thus, the author of this study discuss the current status of personal information protection liability insurance system and the issues raised in the operation of the system. Based on the results of this analysis, the authors propsoe tasks and plans to establish an effective personal information protection liability insurance system.

A Study on the Design and Implementation of System for Predicting Attack Target Based on Attack Graph (공격 그래프 기반의 공격 대상 예측 시스템 설계 및 구현에 대한 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.79-92
    • /
    • 2020
  • As the number of systems increases and the network size increases, automated attack prediction systems are urgently needed to respond to cyber attacks. In this study, we developed four types of information gathering sensors for collecting asset and vulnerability information, and developed technology to automatically generate attack graphs and predict attack targets. To improve performance, the attack graph generation method is divided into the reachability calculation process and the vulnerability assignment process. It always keeps up to date by starting calculations whenever asset and vulnerability information changes. In order to improve the accuracy of the attack target prediction, the degree of asset risk and the degree of asset reference are reflected. We refer to CVSS(Common Vulnerability Scoring System) for asset risk, and Google's PageRank algorithm for asset reference. The results of attack target prediction is displayed on the web screen and CyCOP(Cyber Common Operation Picture) to help both analysts and decision makers.

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.

Perception of Science High School Teachers on Cyber Education (사이버 교육에 대한 과학고 교사의 인식 조사)

  • Lee, Jaeho;Chun, Miran;Jin, Sukun
    • Journal of Gifted/Talented Education
    • /
    • v.26 no.4
    • /
    • pp.635-652
    • /
    • 2016
  • This study investigated operation plan for the Cyber Bridge Program based on the survey from teachers of science high schools. Teachers were found to be thinking it positive that cyber programs can be operated free from the time and spatial restrictions. They thought that teacher interactions are hard to occur and teachers' role in learning is limited as well. Also, the geographical, physical, and socio cultural minorities might have benefits from cyber programs either as regular programs or the before entrance programs. Therefore, the detailed plans are needed. Most of all, since the educational contents are the key for the programs, we suggested some contents categories and developmental criteria. As a result, the developments of high quality contents and financial supports for the successful Cyber Bridge Program are essential.