• Title/Summary/Keyword: Cyber Research

Search Result 1,449, Processing Time 0.029 seconds

Trends in Cyber Range Technology in the Field of Information Security (정보보호 분야에서의 사이버 레인지 기술 동향)

  • Yu, Jaehak;Koo, Kijong;Kim, Ikkyun;Moon, Daesung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.208-211
    • /
    • 2022
  • 최근 COVID-19 팬데믹 시대 도래로 ICT 기술 기반의 지능화된 사회실현에 대한 관심이 높아지고 있지만, 사이버 위협의 다변화로 그 범위와 피해 또한 확대되고 있다. 특히, 개인의 민감 데이터뿐만 아니라, 산업체와 공공기관의 사이버 위험성 및 노출은 심각한 문제가 발생할 수 있다. 본 논문에서는 이러한 정보보호 분야에서의 위협행위 등을 탐지, 분석, 대응할 수 있는 교육 프로그램 개발과 전문 인력양성을 위한 사이버 레인지의 국내·외 기술 동향을 살펴보고자 한다. 마지막으로, 더욱 지능화되고 발전하는 사이버 위협으로부터 이를 방지하고 대응하기 위한 사이버 레인지의 발전 방향을 논하고자 한다.

Study on Strengthening the Maritime Sector Cybersecurity (해상 사이버보안 강화방안 연구)

  • Yoo, Yun-Ja;Park, Han-Seon;Park, Hye-Ri
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.238-239
    • /
    • 2019
  • Cyber attacks can be caused by all equipment that perform communication functions, and the link between ship and land due to the development of communication technology means that the ship sector as well as the land sector can be easily exposed to cyber threat vulnerability. In this paper, we analyze cyber threat trend changes to identify cyber security vulnerabilities in the maritime sector and propose measures to enhance cyber security through other industry case studies.

  • PDF

A Study on Cybersecurity Risk Assessment in Maritime Sector (해상분야 사이버보안 위험도 분석)

  • Yoo, Yun-Ja;Park, Han-Seon;Park, Hye-Ri;Park, Sang-Won
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.11a
    • /
    • pp.134-136
    • /
    • 2019
  • The International Maritime Organization (IMO) issued 2017 Guidelines on maritime cyber risk management. In accordance with IMO's maritime cyber risk management guidelines, each flag State is required to comply with the Safety Management System (SMS) of the International Safety Management Code (ISM) that the cyber risks should be integrated and managed before the first annual audit following January 1, 2021. In this paper, to identify cyber security management targets and risk factors in the maritime sector and to conduct vulnerability analysis, we catagorized the cyber security sector in management, technical and physical sector in maritime sector based on the industry guidelines and international standards proposed by IMO. In addition, the Risk Matrix was used to conduct a qualitative risk assessment according to risk factors by cyber security sector.

  • PDF

Research and Direction of Cyber Operation Education System for Fostering Common Situation Awareness about Cyber Operation -Focusing on non-Cyber Operations Unit Officer Education- (사이버작전에 대한 공통상황인식 함양을 위한 군(軍) 사이버작전 교육체계 연구 및 방향성 제안 -비(非)사이버작전부대 장교 교육을 중심으로-)

  • Lee, Sangwoon;Park, Yongsuk
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.13-22
    • /
    • 2019
  • The purpose of this study is to suggest the educational system and direction of cyber operations officers of non-cyber operations forces who do not specialize in cyber operations. In order to carry out cyber operations as a joint operation, non-Cyber Operations officers must also know about cyber operations, but there is no education system for them at present, Since there is almost no previous research on this, research in the relevant field is necessary. Therefore, the education system was developed based on the prior literature review, that is, the education system, that is, the necessity of education, the object of education, the goals and contents of the education, and the curriculum. In addition, the relevant experts confirmed the validity of each item with Delphi method, and as a result, some improvement was needed, but it was shown to be suitable as a whole. In addition, detailed educational program development can be developed based on this in the future.

On the Formative Feature Characteristics of Cyber Character's Fashion in the Cyber-space Game (가상공간 게임에 나타난 사이버 캐릭터 의상의 조형성)

  • 서정립;진경옥
    • Journal of the Korean Society of Costume
    • /
    • v.54 no.3
    • /
    • pp.99-112
    • /
    • 2004
  • The purpose of this research is to examine the relation between the cyber environment and the contemporary fashion design by studying the formative feature characteristics of cyber character's fashion in the on-line game from the point of the contemporary fashion design. The research method is to understand the general concept of the cyber-space and characters and then is to contemplate characteristics and formative features of game character's fashion of the cyber-space mainly with cyber characters that were closely linked with features of the contemporary fashion design. As a result, the formative feature of game character's fashion of the cyber-space was to be classified into four categories; reactionism, mechanism, futurism, sensualism. First, reactionism takes traditional elements with symbolical and compromising form. Second, mechanism has a tendency of deconstruction due to its vitality and sense of velocity for objects through employing geometrical forms and new materials. Third, futurism deviates from the established framework. It makes use of high-tech materials and has surrealistic and futuristic features. Fourth, sensualism does emphasize sensual parts of the body and intends to convey aesthetic atmosphere through association of ideas. Character's fashion of the cyber on-line game is unnatural and artificial in its forms and wear for the lack of knowledge for costume's structure, and it shows just simplified design that accept extremely partial fragment of features in the contemporary fashion design.

Maritime Cyber Security Status and Establishment of Maritime Cyber Security System (해사 사이버보안 동향 분석 및 해사 사이버보안 시스템 구축)

  • Ahn, Jong-Woo;Lim, Jeoung-Kyu;Park, Kae-Myoung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.29-32
    • /
    • 2019
  • The development of Information and Communication Technology facilitates exchange of information and communication between system in ships or between ships and land facilities, thereby improving the efficiency of their work. However, these changes in the working environment of companies and ships increased the likelihood of cyber security incidents occurance like unauthorized access to company and ship systems or infection of malicious code, which results in significant safety, environmental and business damage to company and ships. Therefore, a cyber-risk-based approach was required to identify and respond to an increasing cyber threats. In this paper, the analysis of maritime cyber security status and guidelines for establishment of maritime cyber security system are provided.

  • PDF

Exploratory Study on Perceptions and Relationships Among Dominants of Deviant Behavior in Cyber Space (사이버 일탈행위에 영향을 미치는 요인에 관한 탐색적 연구)

  • Kim, Mi-Ryang;Um, Myoung-Yong;Kim, Tae-Ung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.27-35
    • /
    • 2007
  • The purpose of this research is to explore gender differences in perceptions and relationships among dominants affecting deviant behavior of adolescent in cyber space. This study developed a research model to analyze the factors explaining the intensity level of cyber deviant behavior, employing internet usage, awareness of anonymity, fear of cyber crime, and perceived seriousness as major research variables, and collected 478 survey responses from college students in Seoul.

Significance and Research Challenges of Defensive and Offensive Cybersecurity in Smart Grid

  • Hana, Mujlid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.29-36
    • /
    • 2022
  • Smart grid (SG) software platforms and communication networks that run and manage the entire grid are increasingly concerned about cyber security. Characteristics of the smart grid networks, including heterogeneity, time restrictions, bandwidth, scalability, and other factors make it difficult to secure. The age-old strategy of "building bigger walls" is no longer sufficient given the rise in the quantity and size of cyberattacks as well as the sophisticated methods threat actor uses to hide their actions. Cyber security experts utilize technologies and procedures to defend IT systems and data from intruders. The primary objective of every organization's cybersecurity team is to safeguard data and information technology (IT) infrastructure. Consequently, further research is required to create guidelines and methods that are compatible with smart grid security. In this study, we have discussed objectives of of smart grid security, challenges of smart grid security, defensive cybersecurity techniques, offensive cybersecurity techniques and open research challenges of cybersecurity.

A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Lee, Cheol-Kwon;Kwon, Kee-Choon;Lee, Dong-Young
    • Nuclear Engineering and Technology
    • /
    • v.44 no.8
    • /
    • pp.919-928
    • /
    • 2012
  • The applications of computers and communication system and network technologies in nuclear power plants have expanded recently. This application of digital technologies to the instrumentation and control systems of nuclear power plants brings with it the cyber security concerns similar to other critical infrastructures. Cyber security risk assessments for digital instrumentation and control systems have become more crucial in the development of new systems and in the operation of existing systems. Although the instrumentation and control systems of nuclear power plants are similar to industrial control systems, the former have specifications that differ from the latter in terms of architecture and function, in order to satisfy nuclear safety requirements, which need different methods for the application of cyber security risk assessment. In this paper, the characteristics of nuclear power plant instrumentation and control systems are described, and the considerations needed when conducting cyber security risk assessments in accordance with the lifecycle process of instrumentation and control systems are discussed. For cyber security risk assessments of instrumentation and control systems, the activities and considerations necessary for assessments during the system design phase or component design and equipment supply phase are presented in the following 6 steps: 1) System Identification and Cyber Security Modeling, 2) Asset and Impact Analysis, 3) Threat Analysis, 4) Vulnerability Analysis, 5) Security Control Design, and 6) Penetration test. The results from an application of the method to a digital reactor protection system are described.

A Preliminary Study on the Effectiveness of Cyber Counseling (사이버 상담 활성화를 위한 탐색 연구)

  • 장진경
    • Journal of Families and Better Life
    • /
    • v.20 no.4
    • /
    • pp.135-148
    • /
    • 2002
  • The main purpose of this research was to explore the factors that encourage people to use the cyber counseling in resolving difficulties in their lives. Another purpose of this research was to investigate whether cyber counseling really helps people feel better. For this study, a structured survey questionnaire was distributed both on- and off-line, and 429 respondents returned completed survey forms. The major statistical methods used for data analysis were frequency, factor analysis, 1-test and ANOVA. The results of this study revealed that variables such as gender, age, occupation, internet skills, time of internet use, personality, and the awareness of cyber counseling made a difference in people's use of cyber counseling whenever they felt they needed it. However, cyber counseling seemed to fail to increase feelings of well being in people's lives. The implications of these findings are discussed in this article.