• Title/Summary/Keyword: Cyber Organization

Search Result 133, Processing Time 0.032 seconds

On the administrative security approaches against spear phishing attacks (스피어 피싱 대응을 위한 관리적 보안대책에 의한 접근)

  • Sohn, Yu-Seung;Nam, Kil-Hyun;Goh, Sung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2753-2762
    • /
    • 2013
  • Recently the paradigm of cyber attacks is changing due to the information security technology improvement. The cyber attack that uses the social engineering and targets the end users has been increasing as the organization's systems and networks security controls have been tightened. The 91% of APT(Advanced Persistent Threat) which targets an enterprise or a government agency to get the important data and disable the critical service starts with the spear phishing email. In this paper, we analysed the security threats and characteristics of the spear phishing in detail and explained why the technical solutions are not enough to prevent spear phishing attacks. Therefore, we proposed the administrative prevention methods for the spear phishing attack.

A Cause-Effect Model for Human Resource Management (정보시스템의 효율적인 인적자원 관리를 위한 Cause-Effect, Model의 활용)

  • Lee, Nam-Hoon;In, Hoh;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.161-169
    • /
    • 2006
  • According to the development of information system, many information system and application soft-ware are develop. However, cyber attack and incident have more increased to the development of them. To defend from cyber attack and incident, many organizations has run information security systems, such as Intrusion Detection System, Firewall, VPN etc, and employed information Security person till now But they have many difficulty in operating these information security component because of the lack of organizational management and analysis of each role. In this paper, We propose the formal Cause-Effect Model related with the information security system and administrative mission per each security. In this model, we regard information system and information system operator as one information component. It is possible to compose the most suitable information component, such as information system, human resource etc., according to the analysis of Cause-Effect Model in this paper. These analysis and approaching methodology can make effective operation of each limited resource in organization and effective defense mechanism against many malicious cyber attack and incident.

  • PDF

Efficient Operation Model for Effective APT Defense (효율적인 APT 대응 시스템 운영 모델)

  • Han, Eun-hye;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.501-519
    • /
    • 2017
  • With the revolution of IT technology, cyber threats and crimes are also increasing. In the recent years, many large-scale APT attack executed domestically and internationally. Specially, many of the APT incidents were not recognized by internal organizations, were noticed by external entities. With fourth industrial revolution(4IR), advancement of IT technology produce large scale of sensitive data more than ever before; thus, organizations invest a mount of budget for various methods such as encrypting data, access control and even SIEM for analyzing any little sign of risks. However, enhanced intelligent APT it's getting hard to aware or detect. These APT threats are too much burden for SMB, Enterprise and Government Agencies to respond effectively and efficiently. This paper will research what's the limitation and weakness of current defense countermeasure base on Cyber Kill Chain process and will suggest effective and efficient APT defense operation model with considering of organization structure and human resources for operation.

A Study on the Function of The Elder Protection Agency for the Protection of Elderly Human Rights (종사자들이 인식하는 노인보호전문기관의 기능에 대한 질적연구)

  • Park, Tae-jeong;Lee, Seo-young;Park, Hyung-won
    • 한국노년학
    • /
    • v.40 no.4
    • /
    • pp.761-779
    • /
    • 2020
  • This study is a qualitative study applied with in-depth interviews and phenomenological analysis. The objective of this study was finding out the function of the elder protection agency by interpreting the meaning developed from the experience of the workers about the role of the elder protective service agency. As a result of the analysis, the essential themes were 'Struggling and working hard', 'Obstacles that cannot be lifted', and 'Reaching the time to be reborn as an organization for the elderly human rights.' The common essence of these themes is 'The road to human rights orientation: a destination that must be reached, though not easy to go.' In order for the meanings to be settled and to fit in to the community, it was suggested it is a situation in which both internal and external renewal of the institution for the protection of the elderly is most needed. In addition, much as it turned out that legal and institutional support must be provided so that the elder protection agency can be reborn as human rights organizations with more professionalism, it was proposed to follow the institutional improvement plan derived from this study.

A Study on Cybersecurity Data Sharing System Model with a Hierarchical Structure for Effective Data Sharing (효과적인 데이터 공유를 위한 계층적 구조를 갖는 사이버 보안 데이터 공유시스템 모델 연구)

  • Ho-jei Yu;Chan-hee Kim;Ye-rim Cho;Sung-sik Im;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.39-54
    • /
    • 2022
  • Recently, the importance of collecting, analyzing, and real-time sharing of various cybersecurity data has emerged in order to effectively respond to intelligent and advanced cyber threats. To cope with this situation, Korea is making efforts to expand its cybersecurity data sharing system, but many private companies are unable to participate in the cybersecurity data sharing system due to a lack of budget and professionals to collect cybersecurity data. In order to solve such problems, this paper analyzes the research and development trends of existing domestic and foreign cyber security data sharing systems, and based on that, propose a cybersecurity data sharing system model with a hierarchical structure that considers the size of the organization and a step-by-step security policy that can be applied to the model. In the case of applying the model proposed in this paper, it is expected that various private companies can expand their participation in cybersecurity data sharing systems and use them to prepare a response system to respond quickly to intelligent security threats.

The Study on the Family-Friendly Organizational Culture for Enhancing the Job Engagement of the Married Female Social Worker in the Social Welfare Organization (사회복지기관 기혼 여성 사회복지사의 일과 가정 양립을 위한 가족 친화적 조직문화에 대한 연구)

  • Song, Yoomee;Lee, Sunja;Lee, Jesang
    • Korean Journal of Social Welfare
    • /
    • v.65 no.4
    • /
    • pp.317-340
    • /
    • 2013
  • The modern society has undergone the fast change of the family structure and labor market. Particularly, the compatibility of work and family life became the era's agenda while the labor force participation rate of the women increased. However, the family-friendly organizational culture was not created and the job engagement of the married female workers was decreased. The married female workers complained of suffering due to the work and family conflict. This research was conducted to study a relationship between family-friendly organizational culture and job engagement of married female social workers, and secondly to investigate if family conflict affect the relationship. From the results of the study, it was known that family-friendly organizational culture has effect on the job engagement, and work and family conflict play an intermediary role between the organizational culture and job engagement. Therefore, it can be explained that family-friendly organizational culture enhances the job engagement of married female social workers, and the culture would be a good measure of the compatibility of work and family life. Based on the study, it is suggested that public relation and education need to be preceded for the spread of family-friendly organizational culture by national initiated programs. Secondly, in terms of welfare organization, related regulations and guidelines need to be prepared, and thirdly, in the view of individual respect, members of family should have their own rights to put forth an opinion grandly with firm faith of the compatibility of work and family life.

  • PDF

Strategy Typology in Turbulent Environment: Cases from the Korean Exporting Organizations (혼란한 환경 하에서의 전략 구분에 따른 전략적 선택과 성과: 한국 수출기업의 경우를 중심으로)

  • Yum, Ji-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.5
    • /
    • pp.1034-1042
    • /
    • 2009
  • The study revisits Miles and Snow's strategy typology to investigate the performance relationship with the strategic behavior. Where the most strategy typology researches discern the typology by the respondent's survey such as choosing the best representative behavior for the organization, we developed the strategic typology by the organization's behavior such as marketing strategy, research and development strategy and members' attitudes to the quality. The financial crisis in Korea has reestablished organizational behavior. The study emphasized the changing attitudes of strategy. The results demonstrate that prospector organizations outperform other strategic behavior organizations.

A New Cryptographic Algorithm for Safe Route Transversal of Data in Smart Cities using Rubik Cube

  • Chhabra, Arpit;Singhal, Niraj;Bansal, Manav;Rizvi, Syed Vilayat
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.113-122
    • /
    • 2022
  • At the point when it is check out ourselves, it might track down various information in each turn or part of our lives. Truth be told, information is the new main thrust of our advanced civilization and in this every day, "information-driven" world, security is the significant angle to consider to guarantee dependability and accessibility of our organization frameworks. This paper includes a new cryptographic algorithm for safe route traversal for data of smart cities which is a contemporary, non-hash, non-straight, 3D encryption execution intended for having information securely scrambled in the interim having a subsequent theoretical layer of safety over it. Encryption generally takes an information string and creates encryption keys, which is the way to unscramble as well. In the interim in another strategy, on the off chance that one can sort out the encryption key, there are opportunities to unravel the information scrambled inside the information string. Be that as it may, in this encryption framework, the work over an encryption key (which is created naturally, henceforth no pre-assurance or uncertainty) just as the calculation produces a "state" in a way where characters are directed into the Rubik block design to disregard the information organization.

An Comparative Study on the Self-regulation of the Digital Game (디지털 게임의 자율규제 방안에 관한 비교분석적 접근)

  • Kang, Shin-Kyu;Kim, Gwang-Jae
    • Journal of Korea Game Society
    • /
    • v.12 no.6
    • /
    • pp.107-120
    • /
    • 2012
  • This study aims at presenting practical self regulation system for digital game, especially optimized to Korea through the comparative analysis of system at home and abroad. For this, this study conducted a comparative analysis about various countries adopted self regulation system, such as America, Japan, and European Union. We drew some implications on the Korean practical policy for the digital game. First, self regulation organization should be consisted of market-friendly form. Second, though self regulation organization is a autonomous system of market, the organization should take rights to regulate illegal case. This would be a good way not only to reduce unnecessary institutional regulations but also to take socially image of reliable media. Third, government should provide self regulation organizations financial assist. This policy means that the organizations make a role fairly and objectively.

Analysis on Importance of Success Factors to Select for the Cloud Computing System Using AHP at Cyber Universities in Korea (AHP를 이용한 국내 사이버대학교 클라우드 컴퓨팅 시스템 구축 성공 요인의 중요도 분석)

  • Kang, Tae-Gu;Kim, Yeong-Real
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.325-340
    • /
    • 2022
  • Amid the unprecedented situation of COVID-19 around the world, online education has established itself as an essential element in the era of zero contact and the importance of various content and changes of the system that are appropriate for the era of the 4th industrial revolution has increased. Although universities are making their efforts to combine ICT technologies and design and achieve new systems, the recognition and atmosphere for establishing the cloud computing system are falling short. The purpose of this research importance of success factors of "Building a cloud computing system of cyber university in Korea" by classifying the work characteristics and scale, and to derive and analyze the importance cloud rankings considering the organization and individual dimension. Therefore, this study has drawn 14 major factors in the previous researches and models through the survey on experts with knowledge related to the cloud computing. The analysis was conducted to see what differences there are in factors for the successful establishment of the cloud computing system using AHP. It is expected that the factors for success presented through this study would be used as systemic strategies and tools for the purpose of drawing factors for the success of establishing the private cloud computing system for the higher education institutions and public information systems.