• Title/Summary/Keyword: Cyber Research

Search Result 1,449, Processing Time 0.028 seconds

State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis

  • Kookjin Kim;Jaepil Youn;Hansung Kim;Dongil Shin;Dongkyoo Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1273-1300
    • /
    • 2024
  • In the complex virtual environment of cyberspace, comprised of digital and communication networks, ensuring the security of information is being recognized as an ongoing challenge. The importance of 'Cyber Situation Awareness (CSA)' is being emphasized in response to this. CSA is understood as a vital capability to identify, understand, and respond to various cyber threats and is positioned at the heart of cyber security strategies from a defensive perspective. Critical industries such as finance, healthcare, manufacturing, telecommunications, transportation, and energy can be subjected to not just economic and societal losses from cyber threats but, in severe cases, national losses. Consequently, the importance of CSA is being accentuated and research activities are being vigorously undertaken. A systematic five-step approach to CSA is introduced against this backdrop, and a deep analysis of recent research trends, techniques, challenges, and future directions since 2019 is provided. The approach encompasses current situation and identification awareness, the impact of attacks and vulnerability assessment, the evolution of situations and tracking of actor behaviors, root cause and forensic analysis, and future scenarios and threat predictions. Through this survey, readers will be deepened in their understanding of the fundamental importance and practical applications of CSA, and their insights into research and applications in this field will be enhanced. This survey is expected to serve as a useful guide and reference for researchers and experts particularly interested in CSA research and applications.

A Study on the Capability of Cyber Security Education and Training Professional Personnel (사이버보안 교육훈련 전문 인력의 역량에 관한 연구)

  • Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.43-51
    • /
    • 2019
  • This research proposed the necessary capability of cyber security professional personnel for cyber security education and training. Cyber security professional personnel were required specialized capability because the curriculum of cyber security education and training is structured around practice and training. Based on the knowledge, skills, and attitudes of professors, we derive candidate capabilities and index through the results of precedent research. As a result, we derived capability such the candidate capability group as teaching qualification, expert knowledge, practical ability, lecture ability, and research ability, and detailed capability index was derived accordingly. Finally, based on the questionnaire results of the professors related to the information security, it was determined that the capability required for the cyber security education and training professional personnel were expert knowledge, practical ability, and lecture ability. Among the capabilities, executive ability means that they have to fulfil abundant executive experience due to the high proportion of practical training due to the characteristics of cyber security education and training.

A Study on the Present Conditions and the Characteristics of Design Courses of Cyber Universities in Korea (한국의 사이버 대학 현황과 개설된 디자인 강좌에 대한 연구)

  • 이동훈
    • Archives of design research
    • /
    • v.16 no.1
    • /
    • pp.271-280
    • /
    • 2003
  • This research describes the definition of the characteristics and the role of cyber education through examination of the general situations of sixteen cyber Universities which have been operated in 2003. This research argued about problems and improvements of cyber university in terms of present registration condition of each University. Through the analysis of the data of Korean Ministry of Education & Human Resources Development in 2002. This research also analyzed qualitative aspects of design education that consist in cyber university through comparative analysis of characteristics, department names, a curriculum, a taxonomy of lecture type which are related to design major in each University. As a conclusion, this research emphasized the importance and the meaning of interaction between an instructor and students for successful cyber lecture.

  • PDF

A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations (사회공학 사이버작전을 고려한 사회공학 사이버킬체인 개념정립 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1247-1258
    • /
    • 2018
  • The Cyber Kill Chain originally proposed by Lockheed Martin defines the standard procedure of general cyber attacks and suggests tailored defensive actions per each step, eventually neutralizing the intent of the attackers. Defenders can effectively deal with Advanced Persistent Threat(APT)s which are difficult to be handled by other defensive mechanisms under the Cyber Kill Chain. Recently, however, social engineering techniques that exploits the vulnerabilities of humans who manage the target systems are prevail rather than the technical attacks directly attacking the target systems themselves. Under the circumstance, the Cyber Kill Chain model should evolve to encompass social engineering attacks for the improved effectiveness. Therefore, this paper aims to establish a definite concept of Cyber Kill Chain for social engineering based cyber attacks, called Social Engineering Cyber Kill Chain, helping future researchers in this literature.

Intrinsic and Extrinsic Factors Impacting Individuals' Cyber Ethics Awareness and Behavior Intention (사이버윤리 준수인식과 행동의도에 영향을 미치는 사용자의 내·외적요인)

  • Kim, Sanghyun;Park, Hyunsun
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.111-138
    • /
    • 2014
  • As the Internet is widely used worldwide, Cyber world has become a part of daily life. On the other hand, the adverse effects of Internet, such as abusive comments, illegal harmful contents, rumor diffusion, infringement on a right have emerged with the increase. Researchers recognized the important of cyber ethics as an effective means of coping with the adverse effects on Internet. But, Little empirical research has been related to cyber ethics in management information systems. Thus, the purpose of this research is to identify multidimensional motivation factors that cyber ethics awareness and compliance behavior Intention. For this, this study investigated the factors that might influence Internet users to compliance cyber ethics. Using university students as a sample, one hundred and ninety six are collected for further analysis. The results of this study are as follows; First, self-esteem, Moral Obligation, self-control, cyber ethics education and Social Influence are significantly related to cyber ethics awareness, while punishment is not significantly related. Second, cyber ethics awareness have a positive effect on cyber ethics compliance behavior Intention. Third, the moderating effect of ego strength is also significant. This study is significant in that it established a behavior model to understand the compliance of cyber ethics with internet user in Korea.

The Research of Effect of Cyber Education at Always Learning System in Affinity of Cyber Education for Officials: Focusing on Busan Metropolitan City (상시학습체제에서 사이버교육 요인이 공무원의 사이버교육 선호도에 미치는 영향 -부산광역시를 중심으로-)

  • Park, Myung-Kyu;Sim, Sun-Hee;Kim, Ha-Kyun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.23 no.1
    • /
    • pp.116-125
    • /
    • 2011
  • In this study, a survey research was conducted on government employees in Busan Metropolitan City to identify the influence of cyber education factors (learning factor, learner factor, and learning system factor) on the preference for government employee cyber education offered by the government always learning system. Analyzed results, recognition of learning factor, learner factor, and always learning system were shown to have significant influence on the preference for cyber education, but no indication of influence by always learning support. This study intends to assist stimulating voluntary participation in cyber education and active commitment in learning activities through improving learning effect and fortifying convenient informatization education, with regard to activation of cyber education and improved preference for cyber education.

Implementation of PQC-based Secure Channel for Drone Services (드론 서비스를 위한 PQC 기반 보안채널 통신기술 구현)

  • Seungyong Yoon;Joungil Yun;Byoungkoo Kim;Keonwoo Kim;Yousung Kang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.1177-1178
    • /
    • 2023
  • 드론은 초기에 주로 군사적 목적으로 사용되었으나, ICT 기술이 발전함에 따라 다양한 산업 서비스에 활용되고 있다. 그러나 드론이 네트워크에 연결됨으로써 많은 보안위협과 취약점에 노출되었으며, 이는 드론 탈취, 정보유출, 서비스 장애 등의 심각한 피해를 야기할 수 있다. 따라서, 본 논문에서는 기존 드론의 보안위협 뿐만 아니라 다가올 양자시대의 보안위협에 대비하여 안전한 드론 서비스를 제공할 수 있는 PQC 기반 보안채널 통신기술을 제안하고 구현한다.

Case Study on the Implementation of the Department of Early Childhood Education in a Cyber University (사이버대학교 유아교육학과의 강의 운영에 관한 사례연구 - H 사이버 대학교 '유아창의성교육' 수업 운영을 중심으로 -)

  • Kwon, Young-Ihm
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.3
    • /
    • pp.87-96
    • /
    • 2007
  • In order to efficiently improve teaching and learning methods of the department of Early Childhood Education in cyber universities, this research analysed and assessed the problems of the current situation of lectures of the department of early childhood education. Firstly, this research examined the characteristics of cyber-education and the lecturer's role in it. Secondly, the types and status of management of online-lectures were investigated. Finally, the student management and the variety of interaction taking place online were examined. The plan to vitalize the cyber-education of early childhood education that was suggested in this study was mainly focused on developing excellent educational contents and continual research of cyber-education's method of teaching and learning. Then for the activation of online interaction, technological support and teaching strategies are needed to activate online interaction.

The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training (사이버전 훈련을 위한 ATT&CK 기반 모의 위협 발생기 설계 및 구현)

  • Hong, Suyoun;Kim, Kwangsoo;Kim, Taekyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.6
    • /
    • pp.797-805
    • /
    • 2019
  • Threats targeting cyberspace are becoming more intelligent and increasing day by day. To cope with such cyber threats, it is essential to improve the coping ability of system security officers. In this paper, we propose a simulated threat generator that automatically generates cyber threats for cyber defense training. The proposed Simulated Threat Generator is designed with MITRE ATT & CK(Adversarial Tactics, Techniques and Common Knowledge) framework to easily add an evolving cyber threat and select the next threat based on the threat execution result.

A Study on Security Metrics and Research Trend Analysis on Cyber Resilence (보안메트릭과 사이버 내성에 대한 연구동향분석에 관한연구)

  • Lee, Sujin;Ahn, Seongjin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.3-11
    • /
    • 2018
  • The emerging field of Science of Security (SoS) is a new paradigm that emerged in the field of security as a research field that applied the scientific approach to cyber security. It is a direction to study the formal model and automation field to secure the security of such a network environment in the present that dynamic change of complex, large scale network environment and a lot of protocol and mechanism environment exists. Therefore, this study analyzes the latest cyber security research trends such as SoS and examines the research trends of advanced countries to examine a new approach to cyber security development direction in Korea. We also analyze the current state of domestic scientific research on the scientific security research methods for various cyber security paradigms and present directions for revitalizing domestic cyber security.

  • PDF