• Title/Summary/Keyword: Cyber Operations

Search Result 121, Processing Time 0.029 seconds

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Decision Making Model for Selecting Financial Company Server Privilege Account Operations (금융회사 서버 Privilege 계정 운영방식 결정 모델)

  • Lee, Suk-Won;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1607-1620
    • /
    • 2015
  • The server privilege account must be operated through law and regulation. However, due to regulation non-compliance and inadequate operation on financial company server privilege, an incident that every server data being deleted by hacker occur which is later being named as 'NH Bank Cyber Attack'. In this paper, the current operation status on financial company privilege accounts is being analysed to elicit problems and improvement. From the analysis, important evaluation factors will be also selected and applied generating the decision making model for financial company server privilege account operation. The evaluation factor deducted from privilege account status analysis will be used to present and verify the decision making model and formula through AHP(Analytic Hierarchy process).

Optimal Routing and Uncertainty Processing using Geographical Information for e-Logistics Chain Execution

  • Kim, Jin Suk;Ryu, Keun Ho
    • Management Science and Financial Engineering
    • /
    • v.10 no.2
    • /
    • pp.1-28
    • /
    • 2004
  • The integrated supply chain of business partners for e-Commerce in cyber space is defined as Logistics Chain if the cooperative activities are logistics-related. Logistics Chain could be managed effectively and efficiently by cooperative technologies of logistics chain execution. In this paper, we propose a routing and scheduling algorithm based on the Tabu search by adding geographical information into existing constraint for pick-up and delivery process to minimize service time and cost in logistics chain. And, we also consider an uncertainty processing for the tracing of moving object to control pick-up and delivery vehicles based on GPS/GIS/ITS. Uncertainty processing is required to minimize amount of telecommunication and database on vehicles tracing. Finally, we describe the Logistics Chain Execution (LCE) system to perform plan and control activities for postal logistics chain. To evaluate practical effects of the routing and scheduling system, we perform a pretest for the performance of the tabu search algorithm. And then we compare our result with the result of the pick-up and delivery routing plan generated manually by postmen.

What Do Learners Do While Planning? Learners' Use and Perceptions of Planning for an Oral Narrative Task

  • Park, Su-Jung
    • English Language & Literature Teaching
    • /
    • v.15 no.3
    • /
    • pp.223-248
    • /
    • 2009
  • Previous research on the impact of pretask planning on subsequent second language (L2) production has mainly focused on the linguistic quality of planned production, while learners' thought processes and perceptions about planning have been relatively less explored. In addition, few previous planning studies have examined whether the learners did in fact follow the pretask instructions, thus leaving the role of pretask instructions in the planning process unexplored. Therefore, the present study investigated whether pretask instructions affect attentional allocation as well as what cognitive operations planners engage in and what their perceptions about planning are. Forty-three Korean EFL classroom learners were divided into two groups: before having time to plan for an oral story retelling task, one group received general instructions, while the other group received specific instructions. The findings, based on both quantitative and qualitative data analysis, indicated no large effects of pretask instructions on the planners' attentional focus. Rather, the qualitative analysis identified a number of other factors that influenced learners' decision making as well as their general processes and approaches to planning and their perceptions about planning and thinking aloud while planning. Implications for L2 teaching as well as limitations of the study are discussed.

  • PDF

A Study on analysis framework development for yield improvement in discrete manufacturing (이산 제조 공정에서의 수율 향상을 위한 분석 프레임워크의 개발에 관한 연구)

  • Song, Chi-Wook;Roh, Geum-Jong;Park, Dong-Jin
    • The Journal of Information Systems
    • /
    • v.26 no.2
    • /
    • pp.105-121
    • /
    • 2017
  • Purpose It is a major goal to improve the product yields during production operations in the manufacturing industry. Therefore, factory is trying to keep the good quality materials and proper production resources, also find the proper condition of facilities and manufacturing environment for yields improvement. Design/methodology/approach We propose the hybrid framework to analyze to dataset extracted from MES. Those data is about the alarm information generated from equipment, both measurement and equipment process value from production and cycle/pitch time measured from production data these covered products during production. We adapt a data warehousing techniques for organizing dataset, a logistic regression for finding out the significant factors, and a association analysis for drawing the rules which affect the product yields. And then we validate the framework by applying the real data generated from the discrete process in secondary cell battery manufacturing. Findings This paper deals with challenges to apply the full potential of modeling and simulation within CPPS(Cyber-Physical Production System) and Smart Factory implementation. The framework is being applied in one of the most advanced and complex industrial sectors like semiconductor, display, and automotive industry.

Study on the Role of Media in the Building of Interpersonal Trust (개인간 신뢰형성 과정에서 미디어의 역할에 관한 연구)

  • Oh, Jinwouk;Cho, Namjae
    • Korean Management Science Review
    • /
    • v.33 no.2
    • /
    • pp.29-47
    • /
    • 2016
  • Trust is formed from the day-to-day and persistent interaction relationship. The trust demands more and more at the age of uncertainty. Human beings are using media interaction. The area of communication with media is extended to virtual space. The purpose of this study is to qualitatively explain trust building process in virtual team by media using. In the pursuit of this purpose, we executed in-depth interview with the person who have experience communicating by media with a man of a complete stranger. They experienced the trust building process. Interview data were analyzed by a Structured Coding Techniques. The derived seven categories were reconstructed in consideration of the cause-and-effect relationship and the flow of events. We have discovered a new trust model that was the result from communication by a media using. The model presented is very useful to Individuals who need a new trust building relationship with stranger or virtual team member.

Cost Analysis of On·OFF-Line Blended Learning (온·오프 라인 블렌디드 러닝의 원가 분석)

  • Kim, Hee-Jin;Yoon, Sung-Yong;Park, Jong-Hyuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.141-148
    • /
    • 2013
  • Traditional face-to-face university education has shifted its course to combine the advantages of both online and offline education in a blended-learning approach. However, there is still much that is unknown about the actual effect of blended learning, particularly it's learning outcomes in terms of cost effectiveness. This study qualitatively examines the costs and the learning outcomes of blended learning at an on-line college and off-line university. Online college level English pedagogy courses and blended with offline operations at an online university were studied across two semesters in terms of the quality of education, and both direct and indirect cost savings. Other causes for various learning outcomes and cost implications are proposed and validated.

A Study on CPS-based Mold Life-cycle Management System for Smart Factory (스마트 공장을 위한 CPS 기반 금형 수명 관리 시스템에 관한 연구)

  • Shin, Hyun-Jun;Kim, Sung-Jin;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.816-818
    • /
    • 2016
  • The Industry 4.0 should decide work operation of manufacture facilities by itself. But small and medium sized enterprises(SMEs) still not prepared these work operations. In this paper, we had research that work operation manufacture facilities of a management system of mold life-cycle based on CPS. The management system of mold manages life-cycle using by shot, this information offers users by cloud system. This system will help SMEs products quality improve and business operation more efficiency.

  • PDF

A Study on Efficient DDoS Protection Techniques using Anycast and BGP ECMP (Anycast 구조와 BGP ECMP를 활용한 효율적인 DDoS 공격 방어 기법에 대한 연구)

  • Hong, Yun Seok;Han, Wooyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.125-128
    • /
    • 2022
  • As the number of online systems based on the internet gradually increases, cyber-scale attacks that interfere with the normal operation of web services are also on the rise. In particular, distributed denial-of-service attacks (DDoS) that interfere with normal web service operations are also increasing. Therefore, this paper presents an efficient DDoS attack defense technique utilizing Equal Cost Multi-Path (BGP ECMP) routing techniques in networks of Anycast type by operating PoP basis of major attack sources and describes how high-availability web services can be operated.

  • PDF

The Effect of ESG Management on Social Welfare Organizations

  • Ha-Yong JUNG;Sun-Kyung KANG
    • The Journal of Industrial Distribution & Business
    • /
    • v.15 no.8
    • /
    • pp.21-27
    • /
    • 2024
  • Purpose: There is a significant opportunity for ESG management to act as a useful guideline for social welfare organizational structures when dealing with sustainability and ethical leadership. The ESG guidelines should allow these companies to improve their business efficacy. This paper aims to explore the specific impacts of ESG management on social welfare. Research design, data and methodology: The systematic review approach ensures that quality work is undertaken in tackling the existing gaps in the literature on ESG management in social welfare organizations. The outcomes of this review will give a useful 'real-life' picture of the consequences of ESG practices and suggestions that can increase the efficiency and sustainability of social welfare organizations. Results: The principal favorable consequences are discussed in this chapter regarding the social welfare organization due to the implementation of ESG management. Subsequently, each effect is posted under different sub-titles and evidence from previously conducted research studies. Conclusions: ESG management is vital for social welfare organizations since it increases their efficiency in operations, public image, and opportunities to receive funds, and it helps improve relations with stakeholders. More so, these organizations can embrace the ESG practices and as a result bring more efficiency to the general welfare of the society.