• Title/Summary/Keyword: Cyber Power

Search Result 250, Processing Time 0.026 seconds

The Role of Cyber in Kim Jong Un's Byungjin Line: North Korea's Political Culture, Hackers, and Maritime Tactics (김정은의 병진노선에서 사이버의 역할: 북한의 정치문화, 해커, 해양전술)

  • Young, Benjamin R.
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.45-72
    • /
    • 2021
  • North Korea's cyber capabilities represent a relatively new threat to global financial institutions and foreign governments, particularly the U.S and South Korean governments. Based primarily on publicly available sources, such as journalistic accounts and scholarly publications, this qualitative paper analyzes the ways in which North Korean leader Kim Jong Un has bolstered his country's asymmetric power and advanced his line of byungjin (dual development in the economy and military). Particularly by merging the cyber and maritime domains, North Korean operatives generate more revenue for the regime and helps keep the heavily sanctioned leadership in power. Despite the increased international attention to North Korean hackers, few analysts have examined the important role of cyber in the DPRK's internal political culture, specifically in advancing Kim Jong Un's byungjin line. Cyber fits into the DPRK's longstanding tradition of irregular warfare and guerilla-based armed struggle. Cyber also further advances Kim's personal reputation in the DPRK as an economic innovator and military strategist. This paper pays particular attention to the role of the DPRK's cyber operations in both ideological and maritime contexts. Recently, North Korean hackers have targeted South Korean shipbuilding industries and developed a blockchain scam, known as Marine Chain. North Korean cyber agents have increasingly paid attention to the nexus of cyber and maritime domains in their activities.

  • PDF

Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry (전력분야 사이버 위협 분석 및 기반시설 보안 강화를 위한 해외 IP 대역 차단 방안 연구)

  • Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.401-415
    • /
    • 2019
  • Recently, there has been a lot of studies and efforts to strengthen the stability of critical infrastructures against increasing cyber attacks to critical infrastructures. In this thesis, I defined what cyber threats are, after showing you various definitions about what cyber threats are and what the types are. After studying about significant cyber threats from China, I showed you the realities of cyber threats with the analysis about starting points, types of cyber threats, ratios of attacks and so on. At last, I defined guidelines about unnecessary oversea IP range blocking. Also, I proposed unnecessary oversea IP range blocking methodologies with per information system and per network system. Furthermore, I proposed blocking characteristics per security equipment and security operation improvement and blocking effects and service process to normal oversea users.

Secure Hardware Implementation of ARIA Based on Adaptive Random Masking Technique

  • Kang, Jun-Ki;Choi, Doo-Ho;Choi, Yong-Je;Han, Dong-Guk
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.76-86
    • /
    • 2012
  • The block cipher ARIA has been threatened by side-channel analysis, and much research on countermeasures of this attack has also been produced. However, studies on countermeasures of ARIA are focused on software implementation, and there are no reports about hardware designs and their performance evaluation. Therefore, this article presents an advanced masking algorithm which is strong against second-order differential power analysis (SODPA) and implements a secure ARIA hardware. As there is no comparable report, the proposed masking algorithm used in our hardware module is evaluated using a comparison result of software implementations. Furthermore, we implement the proposed algorithm in three types of hardware architectures and compare them. The smallest module is 10,740 gates in size and consumes an average of 47.47 ${\mu}W$ in power consumption. Finally, we make ASIC chips with the proposed design, and then perform security verification. As a result, the proposed module is small, energy efficient, and secure against SODPA.

The Factors that Can be Affected by the Function of foundations (파운데이션 기능에 영향을 미치는 인자)

  • Kim, Ju-Duck;Ju, Rhan;Lee, Sun-Young
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.28 no.1
    • /
    • pp.202-213
    • /
    • 2002
  • There have been a lot of research going on for developing a new blend of cosmetic ingredients. such as Porous sphere power, High functional composition power, Ultrafine power, UV sunscreen agent, Flat titanium dioxide etc. It's said that these ingredients will have multi functional effects on foundation users. Regarding foundation products. UV care effect is basic and consumers want special feelings for skin and its'transparency. People also look for a high performance foundation which helps skin stay shineless and flawless with a longlasting beautiful finish. A lot of cosmetics are produced in small quantities resulting in a greater variety depending on consumers'ages, hobbies, trends, season and environment, so more specific cosmetics should be developed. To satisfy more specific clientele, It is expected that special care product will come out. Foundations for the elderly and men are already being considered as well as ones for trans-genders are possibility. It's considered that fecundation is not a makeup but something in skin-care categories based on the development and production of high performonce foundations.

Design and Implement of a Novel Software to Facilitate Customized Cyber-Education (가상교육에서의 맞춤 컨텐츠 제공시스템 설계 및 구현)

  • Lee, Ja-Hee
    • 대한공업교육학회지
    • /
    • v.30 no.1
    • /
    • pp.84-95
    • /
    • 2005
  • With recent advancement in informational sciences, educational systems are undergoing a revolutionary facelift on how students attain their education. These developments have diminished the traditional method of teaching and learning and have improved the overall quality of the educational environment. They have also ignited the birth of cyber-education in which students have the flexibility and responsibility on what and when to study, thus providing a greater freedom to control one's education. Cyber-educational environment not only requires physical hardware but also an organizational structural component and most importantly, a software component that drives and gives the student management power to tailor their studies based upon their educational requirements. Due to the fact that individuals learn and develop at different rates, one of the important features of a cyber-educational program will be its ability to adjust and customized to individual needs and requirements. In this thesis, a novel software which encompasses these ideas was designed and developed. This program allows the individual more flexibility and management of courses based on their ability and needs. Because the software customizes to one's ability and it allows the student to advance at a more comfortable pace, it boosts the student's confidence and desire to learn. In the future, new and improved programs similar to the one developed here will further enhance the cyber-educational environment and will undoubtedly improve the overall quality of student's education.

The Research for cyber security experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.301-304
    • /
    • 2016
  • Cyber world constitute the infrastructure of the country and its people and control. Cyber attacks and leakage of personal information are being threatened damage to the national economy and national security. December 2014 had been cyber hacking attacks on Korea Hydro & Nuclear Power Nuclear cooling system design drawings of a spill, and Cheong Wa Dae website hacked, KBS stations occurred in cyber hacking accidents. As a result, ICT-based Protection Act, Promotion of Information and Communications Network Utilization and Information Act on Protection, etc., privacy laws are being enforced, personal information in the form of requirements from leading high-tech eoryeowoona is to prevent the attacks of armed hackers Internet information society It proposes positive measures to keep your personal information officer and laws.

  • PDF

A Study on the Preparation of National Cyber Warfare (국가 사이버전 대비방안 연구)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.141-151
    • /
    • 2006
  • The destructive power of cyber threat arrived to until the phase which it threatens to direct and seriously in national security undergoes an important national institutuin hacking event of 2004 and Internet paralysis accidents of 2003. 1. 25. So Cyber terror and Cyber warfare is not the hypothetical enemy situation. It is more actual security situation and identify as magnification of warfare concept of incapacitation national important ability include military command system of the adversary, communication, energy, finance and transportation system. consequently, with the progress of cyber threat, it is necessary that looking at a number of general plan to make up for the weak points in cyber warfare operation system. Thus, the focus of this study is to examine new ways of developing a comprehensive cyber security management system.

  • PDF

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

A Study on the Efficient Using Plans of Cyber Logistics Information Service of the Korean Companies (국내 사이버물류정보서비스 구축 현황과 기업의 효율적 활용방안)

  • Kim, Jong-Deuk
    • International Commerce and Information Review
    • /
    • v.5 no.1
    • /
    • pp.103-121
    • /
    • 2003
  • Nowadays, the spread of electronic commerce using internet demands a large changes doing business with company to company and give that company a change to recognize logistics. To support logistics activity, all kinds of companies are using the computer and are recognized that the efficient using of Cyber Logistics Information will mainly play a roll to strength the companies competition power. Accordingly, the purpose of this study is to suggest the following plans, the first plan is to research the companies which is offering the logistics information on the Web site based on the internet and to investigate the contents of Logistics Information, then the second plan is to give companies which is to get the logistics information on Internet, more efficient ways using internet based logistics information systems.

  • PDF

Key Distribution Process for Encryption of SCADA Communication using Game Theory applied Multiagent System

  • Kim, Hak-Man;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.11
    • /
    • pp.34-43
    • /
    • 2009
  • SCADA (Supervisory Control and Data Acquisition) system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks, SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, flexible key distribution concept is proposed for improving the security of SCADA network using Multiagent System (MAS).