• Title/Summary/Keyword: Cyber Space

Search Result 482, Processing Time 0.02 seconds

Vulnerabilities and Mitigation Strategies in Communication Protocols of Small Satellites in New Space

  • Jinwoo Jeong;Isaac Sim;Woohyun Jang;Sangbom Yun;Jungkyu Rho
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.87-99
    • /
    • 2024
  • We explore the latest trends and future directions in network security system development, with a focus on emerging technologies aimed at strengthening defenses against increasing cyber threats. Our study reviews recent advancements across critical areas such as encryption, intrusion detection, and secure communication protocols. Additionally, we examine the potential challenges and practical applications of these technologies, especially in the context of satellite networks. Through this research, we provide new insights into how these technologies might evolve to address future security needs, contributing a unique perspective on the practical deployment of these security measures.

The Disparity of Identity Between the Self of the Cyber-space and the Self of the Virtual-space (사이버공간과 실공간에서의 자아 정체의 불일치)

  • 이순형
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.4
    • /
    • pp.59-71
    • /
    • 2002
  • This study investigated the self wrapping made possible through the anonymity of cuber-space. According to the analysis of the data, which were collected from the online for 2 days, 2,168 respondents were grouped into three types: Those maintaining the strong sense of identity achievement), 53.8%, those experiencing confusion(identity diffusion), 38.3%, and those losing the sense of identity(foreclosure), 7.9%. Among the general respondents, it was reported that the case of sex wrapping was 11.4%, that of occupation, 40.1%, and that of marital status, 60.6%. Specially 11.4% of the sex wrapper took heterogeneous gender identity, while 7% performed dual sex roles. The rate of gender wrapping of female respondents was higher than that of male ones, which reflects female respondents' longing for male sex. Self-disparity between cyber-space and virtual-space was related with the type of self-identity and gender-identity. The rate of self-disparity between cuber-space and virtual-space was 9%. If it occurred continuously, it may cause individual mental division and maladjustment.

3D FACE RECONSTRUCTION FROM ROTATIONAL MOTION

  • Sugaya, Yoshiko;Ando, Shingo;Suzuki, Akira;Koike, Hideki
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.714-718
    • /
    • 2009
  • 3D reconstruction of a human face from an image sequence remains an important problem in computer vision. We propose a method, based on a factorization algorithm, that reconstructs a 3D face model from short image sequences exhibiting rotational motion. Factorization algorithms can recover structure and motion simultaneously from one image sequence, but they usually require that all feature points be well tracked. Under rotational motion, however, feature tracking often fails due to occlusion and frame out of features. Additionally, the paucity of images may make feature tracking more difficult or decrease reconstruction accuracy. The proposed 3D reconstruction approach can handle short image sequences exhibiting rotational motion wherein feature points are likely to be missing. We implement the proposal as a reconstruction method; it employs image sequence division and a feature tracking method that uses Active Appearance Models to avoid the failure of feature tracking. Experiments conducted on an image sequence of a human face demonstrate the effectiveness of the proposed method.

  • PDF

Countermeasure by Cyber Infringement Accident Present Condition Analysis of Public and Private Section (공공 및 민간부문의 사이버침해사고 현황분석에 따른 대응방안)

  • Cho, Ho-Dae;Shin, Dong-Il
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.331-338
    • /
    • 2009
  • We live was operates the life which is the Internet and became infra is very important. In order minimizes like this disfunction from will be applied the new order must take a position in cyber space. The cyber infringement most the information society brings about is serious concern middle one. The biggest thing is anonymous characteristic with cause of cyber crime. Also well cannot know becomes the cause where commits a crime that about cyber crime. Cyber crime the guilty conscience is thin. And the criminal who commits a cyber crime sense of insecurity is few. This paper which sees cyber infringement accident dividing came in public section, and analyzed presented a present condition and a confrontation plan.

A Study of International Confrontation on the Prevention of Cyber Crime (사이버범죄에 대한 국제적 대응방안)

  • Jeong, Jeong-Ile
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.323-354
    • /
    • 2005
  • As with the vast array of computer technology and its rapid development, along with the entry of the internet as one of the necessities of life, the so-called cyber space has become a vital component of our modern day living. While such cyber space has provided the society with much convenience and utility as to the gathering and acquiring of information, crimes involving cyber space has accordingly increased in both number and form, Nevertheless, the conventional law as existed before the development of the cyber space were unable to meet the demands of this new breed of crime, which inevitably led to the gap in the government ability to punish such criminals, Thus, in response to the rising number of cyber crimes, a large number of nations have either created or is in the process of committing human and financial resources to strengthen the investigative powers relating to cyber crimes and creating a new area of prohibiting such crimes. As a overview of cyber crime, (1)defines the terms, describes features of cyber crime, (2)explains the international prevention necessity of cyber crime, and (3)the necessity of legislating the cyber crime Fundamental Act (4)the recognition of the evidential values on the confiscated electronic records and reviews types of cyber crime including cyberterror. Lastly, emphasizes necessity on international cooperation for prevention of cyber crime as usual.

  • PDF

A Study on the Direction of Cyber Forces Development in the Korean military through Changes in Germany's Cyber Warfare Response Policy (독일의 사이버전 대응 정책변화를 통해 본 한국군 사이버전력 발전 방안에 관한 연구)

  • Sangjun Park;Taesan Kim;Jee-won Kim;Chan-gi Jung
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.59-68
    • /
    • 2021
  • The Future Battlefield includes the main areas of modern warfare, including the ground, sea, and air, as well as cyberspace and space. Cyberspace consists of computers, wired and wireless networks, and spans the ground, sea, air, and space domains. Cyber warfare takes place in cyberspace, so it is not easy for people without expertise in cyber to recognize the cyber situation. Therefore, training personnel with professional knowledge and skills in cyber is paramount in preparation for cyber warfare. In particular, the results of cyber warfare will vary greatly depending on the ability of cyber combatants to carry it out, the performance of cyber systems, and the proficiency of cyber warfare procedures. The South Korean military has power to respond to cyber warfare at various levels, centering on the Cyber Operations Command, but there is a limit to defending all the rapidly expanding cyberspace. In this paper, to overcome these limitations, we looked at the changes in Germany's cyber warfare response policy. Based on them, the organization structure, weapon system, and education and training system of future Korean military cyber forces are presented separately.

A Study on the Application of 3D Digital Technology to Producing Cyber Fashion Gallery (3D 디지털 기술을 활용한 패션 갤러리 제작에 관한 연구)

  • Kim, Ji-Eon
    • The Research Journal of the Costume Culture
    • /
    • v.15 no.3 s.68
    • /
    • pp.446-460
    • /
    • 2007
  • This study shows that digital technology is adapted practical method in fashion design process and virtual simulation and cyber fashion gallery based on virtual reality are researched. This study is proposed the 3D fashion design simulation in the virtual space used on 3D studio max, poser, photoshop program according to fashion design process. The main design concept is "temporary bridge" from rainbow. This study is supposed six fashion design in accordance with three sub-theme under main concept by changing color and texture used on 3D simulation. The results of this study are as follows: 1. This study produced Cyber Fashion Gallery in virtual space to the form of CD Rom title and web title by Macromedia Director 8.5, Macromedia Flash, Sound Forge. And it is enlarged the field of expression in aspect of Fashion Exhibition, beyond restriction of time and space. 2. Clothes modelling tools is able to easily adapt to various textiles and patterns in 3D dynamic virtual mannequin before making clothes. Digital technology is able to express image changed color and texture, especially new material, multi-finishing material and brilliant material and so on. So this study is able to develop tools for study of fashion coordination. 3. Cyber Fashion Gallery consists of gallery, story, painting, symbolism, example, image, quit. This study is enlarged the range of clothing expression by digital technology and open to possibility customized-manufacture.

  • PDF

Exploratory Study on Perceptions and Relationships Among Dominants of Deviant Behavior in Cyber Space (사이버 일탈행위에 영향을 미치는 요인에 관한 탐색적 연구)

  • Kim, Mi-Ryang;Um, Myoung-Yong;Kim, Tae-Ung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.27-35
    • /
    • 2007
  • The purpose of this research is to explore gender differences in perceptions and relationships among dominants affecting deviant behavior of adolescent in cyber space. This study developed a research model to analyze the factors explaining the intensity level of cyber deviant behavior, employing internet usage, awareness of anonymity, fear of cyber crime, and perceived seriousness as major research variables, and collected 478 survey responses from college students in Seoul.

A Systematic Review on Human Factors in Cybersecurity

  • Alghamdi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.282-290
    • /
    • 2022
  • A huge budget is spent on technological solutions to protect Information Systems from cyberattacks by organizations. However, it is not enough to invest alone in technology-based protection and to keep humans out of the cyber loop. Humans are considered the weakest link in cybersecurity chain and most of the time unaware that their actions and behaviors have consequences in cyber space. Therefore, humans' aspects cannot be neglected in cyber security field. In this work we carry out a systematic literature review to identify human factors in cybersecurity. A total of 27 papers were selected to be included in the review, which focuses on the human factors in cyber security. The results show that in total of 14 identified human factors, risk perception, lack of awareness, IT skills and gender are considered critical for organization as for as cyber security is concern. Our results presented a further step in understanding human factors that may cause issues for organizations in cyber space and focusing on the need of a customized and inclusive training and awareness programs.