• 제목/요약/키워드: Cyber Trend

검색결과 163건 처리시간 0.022초

A Study on the Current Status of Domestic and International Cybersecurity Education and the Importance of Regular Cybersecurity Education for Teenagers according to the Development of AI (국내외 정보보안 교육의 현황 및 인공지능의 발전에 따른 청소년 정보보안 정규교육의 중요성에 대한 연구)

  • Dahye Jeong;Sanghoon Jeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제34권3호
    • /
    • pp.527-536
    • /
    • 2024
  • In the digital age, the growth of AI and digital technologies brings opportunities and cybersecurity risks. At the forefront of this change are teenagers, referred to as 'digital natives'. However, they may have difficulty using technology safely without proper information security knowledge. This paper highlights the need for information security education for teenagers in South Korea by referring to cases in the UK, Australia, and the US. These countries are already providing education that prepares young people for cyber threats and future societal needs. Reflecting this trend, South Korea should also establish comprehensive information security education for teenagers to equip them for the digital age.

A Study of the Safety & Effect of Products Containing Ceramide, Glucan for Atopic Dermatitis (아토피 피부염 환자에 적용한 글루칸과 세라마이드 제제의 유효성 및 안전성에 대한 연구)

  • Yu Chang-Seon;Kim Seon-Hee;Kim Ju-Duck
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • 제30권4호
    • /
    • pp.533-541
    • /
    • 2004
  • Atopic dermatitis, also called congenital fever, is a allergic eczema of chronic itching disease. It is a recurrent and familial disease and appears on a wide age group from infant to adult. It is very common, and the ratio of occurrence is about $9{\~}l2\%$ of a child. However. it is showing trend of continuous increase by social and natural environment, food culture, and life style, recently. The human skin plays a barrier role against a physical and chemical stimulus from external environment. According to the latest study, the decreased amount of ceramide in horny layer impairs the bier function and moisture-maintaining function of skin in atopic dematitis patient. Ceramide is a kind of the sphingolipid in which a fatty acid is connected to sphingosin. Ceramide constitutes about $40\%$ of total lipid between keratinocytes and has the function of defense wall and building regular structure to suppress moisture vaporization in horny layer. In horny layer of skin a comified cell is composed of multi-layer structure of a brick shape, and, as for this cornified cell, it is strongly connected by ceramide, cholesterol, and free fatty acid. Here, we described the effects of a cream containing ceramide on the recovery of skin harrier function of atopic dermatitis patient. The safety and efficacy of latex and liquid formula were evaluated as cosmetics for atopic dermatitis. The latex products was composed of intercellular lipid components-ceramide, cholesterol, and free fatty acid-to restore skin barrier function in atopic dermatitis patients. The liquid one contained beta-glucan, magnolia extracts, and licolice extracts, which have skin immunomodulatory and anti-inflammatory effects. It is also confirmed that their possibility on new cosmetic market of atopic dermatitis.

Study on gout screening programme in province (통풍검사 결과연구)

  • Kang, Kyung-Hee;Hwang, Hye-Jeong;Hong, Su-Min;Lim, Yeon-Hwan;Lee, Young-Hee
    • Journal of Digital Convergence
    • /
    • 제11권12호
    • /
    • pp.615-620
    • /
    • 2013
  • This research is a data analysis result of a future gout treatment was carried out in order to take advantage of basic data by Planned Population Federation of Korea in 2012, classified by gender. Using SPSS 18.0 analysis, frequency analysis, chi-squared analysis and logistic regression analysis were conducted. As a result, there were exceptional number of male subjects that required hyperuricemia thorough complete examination, and in case of hypouricemia, it is notable to find much more female subjects (p<0.001). Subjects that required thorough complete examination per age group and hypouricemia were significantly higher in those above the age of 70 years(p<0.001). Conclusions that required hyperuricemia thorough complete examination were a bit higher in the city areas and hypouricemia was a bit higher in the county areas, hyperuricemia was a bit higher in ratio in inland areas and hypouricemia was a bit higher in ratio in the coastal areas. I believe that continuous observation of gout prevalence rate based on this research by year, age group, and gender, would be extremely useful in making decisions regarding the changing trend of gout prevalence rate. In addition, hyperuricemia increased in postmenopausal women, as well as research on the causes of hypouricemia study.

A Study on Detecting Black IPs for Using Destination Ports of Darknet Traffic (다크넷 트래픽의 목적지 포트를 활용한 블랙 IP 탐지에 관한 연구)

  • Park, Jinhak;Kwon, Taewoong;Lee, Younsu;Choi, Sangsoo;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제27권4호
    • /
    • pp.821-830
    • /
    • 2017
  • The internet is an important infra resource that it controls the economy and society of our country. Also, it is providing convenience and efficiency of the everyday life. But, a case of various are occurred through an using vulnerability of an internet infra resource. Recently various attacks of unknown to the user are an increasing trend. Also, currently system of security control is focussing on patterns for detecting attacks. However, internet threats are consistently increasing by intelligent and advanced various attacks. In recent, the darknet is received attention to research for detecting unknown attacks. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. In this paper, we proposed an algorithm for finding black IPs through collected the darknet traffic based on a statistics data of port information. The proposed method prepared 8,192 darknet space and collected the darknet traffic during 3 months. It collected total 827,254,121 during 3 months of 2016. Applied results of the proposed algorithm, black IPs are June 19, July 21, and August 17. In this paper, results by analysis identify to detect frequency of black IPs and find new black IPs of caused potential cyber threats.

The Grotesque Fashion in modern Fashion (현대 패션에 나타난 그로테스크)

  • 최정화;유영선
    • Journal of the Korean Society of Costume
    • /
    • 제40권
    • /
    • pp.151-170
    • /
    • 1998
  • The purpose of this study is to examine the value of grotesque fashion and to predict the future fashion trend. The grotesque originates the formative art. It emerges towards of a century or transitional period in most case. In particular, it was used as the expressive method of an individual's inside and a satire on society through the work of artists in the Middle Age, the renaissance, the sym-bolism, the dadaism, the surrealism, the pop art, the technology art, and the post-modernism, etc. The grotesque in fashion is represented in the work of avant-garde fashion designers who lead the high fashion. The grotesque fashion which was combined with an image of non-formality, non-rationality, an absurdity and reality. It has been begun shape of female dress in the renaissance. Afterwards, it was represented in extremely exaggerated and distorted pop art, hippies' fashion in the 1960's. In the 1970's, it was reflected in genderless rock star and destructive punk fashion. It was also represented in the androgynous fashion which was combined with both sexes, the goth/gothic fashion which was expressed with a realistic and fanciful shape and the tattoo of skin-head in the 1980's. In the 1990's, the grungy look which was dirty and the cyber punk fashion. In general, it was also expressed by the avant-garde fashion designers. To sum up, a grotesque fashion which is expressed by experimental designers is classified into four shapes. 1, Union of some extraneous is expressed as different kinds of fashion theme, such as abnormality of texture, uses of surrealistic elements and chaos of sex. Although it appears that the abnormal union of grotesque has only discord and collision, it also shows a feeling of freedom for the tension. 2. Introduction of real and fanciful image is expressed as a cyborg, realistic description of disgusting animal skin and aggressive shape. Especially, it is worth while to notice Tierre Mugler and Alexander Macqueen's work which expressed the shape of mingling human of Middle Age. 3. distortion or exaggeration is expressed as an unformed shape, the exaggeration of a clothing size, the abnormal exaggeration of human body and the ignorance of clothing form. 4. Introduction of a disgusting image is expressed as an extremity of reality, motifs of death, clothing material of disgusting hair and the ostentation of sex. Motto which leads modern fashion is something new and shocking. The grotesque fashion is an expression of eagerness for something new. It often show something ironic in the form of humor which is embedded in an abnormal and shocking pattern. The grotesque fashion is represented as an extreme beauty. It will stand as an important element of the future fashion and as a particular style with the change and fluidity.

  • PDF

Diadochokinetic Skills in Typically developing Children Aged 4-6 Years : Pilot Study (학령전기 정상발달 아동의 자모음 교대운동특성 : 예비연구)

  • Jeong, Han-Jin;Lee, Ok-Bun;Sehr, Kyeung-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제12권7호
    • /
    • pp.3149-3155
    • /
    • 2011
  • The purpose of this study was to know the characteristics of DDK performance between CV(e.g. 'pa') and VV(e.g., 'ai') syllables in typically developing children aged 4 to 6 years old. 12 TD children performed DDK with CV structure(/pʰə/, /tʰə/, /kʰə/, /pʰətʰə/, /tʰəkʰə?/, /pʰətʰəkʰə/) and with VV structure(/ai/, /ɔi/, /ɑɔi/). Spoken syllables were counted in one second, and all spoken DDK were measured by PC-quirer. The results showed that all spoken DDK became faster as the age of children were increased. This trend was also appeared in both CV and VV syllables repetition. In addition, there was no differences in DDK rate with CV and VV syllables. The frequency of articulatory error during DDK performance was very high in the age of 3, and there was no pattern in the frequency of articulatory error according to the developmental age.

CYBERCRIME AS A THREAT TO UKRAINE'S NATIONAL SECURITY

  • Varenia, Nataliia;Avdoshyn, Ihor;Strelbytska, Lilia;Strelbytskyy, Mykola;Palchyk, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.73-83
    • /
    • 2021
  • The information space, the main components of which are information resources, means of information interaction, and information infrastructure, is a sphere of modern social life in which information communications play a leading role. The objective process is the gradual but stable entry of the national information space into the European and world information sphere, in the context of which there is a legitimate question of its protection as one of the components of the national security of Ukraine. However, the implementation of this issue in practice immediately faces the need to respect the rights and fundamental freedoms guaranteed by international regulations and the Constitution of Ukraine, especially in the field of cybersecurity. The peculiarity of the modern economy is related to its informational nature, which affects the sharp increase in cyber incidents in the field of information security, which is widespread and threatening and affects a wide range of private, corporate, and public interests. The problem of forming an effective information security system is exacerbated by the spread of cybercrime as a leading threat to information security both in Ukraine and around the world. The purpose of this study is to analyze the state of cybersecurity and on this basis to identify new areas of the fight against cybercrime in Ukraine. Methods: the study is based on an extensive regulatory framework, which primarily consists of regulatory acts of Ukraine. The main methods were inductions and deductions, generalizations, statistical, comparative, and system-structural analysis, grouping, descriptive statistics, interstate comparisons, and graphical methods. Results. It is noted that a very important component of Ukraine's national security is the concept of "information terrorism", which includes cyberterrorism and media terrorism that will require its introduction into the law. An assessment of the state of cybersecurity in Ukraine is given. Based on the trend analysis, further growth of cybercrimes was predicted, and ABC analysis showed the existence of problems in the field of security of payment systems. Insufficient accounting of cybercrime and the absence in the current legislation of all relevant components of cybersecurity does not allow the definition of a holistic system of counteraction. Therefore, the proposed new legal norms in the field of information security take into account modern research in the field of promising areas of information technology development and the latest algorithms for creating media content.

A Study on Geospatial Information Role in Digital Twin (디지털트윈에서 공간정보 역할에 관한 연구)

  • Lee, In-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제22권3호
    • /
    • pp.268-278
    • /
    • 2021
  • Technologies that are leading the fourth industrial revolution, such as the Internet of Things (IoT), big data, artificial intelligence (AI), and cyber-physical systems (CPS) are developing and generalizing. The demand to improve productivity, economy, safety, etc., is spreading in various industrial fields by applying these technologies. Digital twins are attracting attention as an important technology trend to meet demands and is one of the top 10 tasks of the Korean version of the New Deal. In this study, papers, magazines, reports, and other literature were searched using Google. In order to investigate the contribution or role of geospatial information in the digital twin application, the definition of a digital twin, we investigated technology trends of domestic and foreign companies; the components of digital twins required in manufacturing, plants, and smart cities; and the core techniques for driving a digital twin. In addition, the contributing contents of geospatial information were summarized by searching for a sentence or word linked between geospatial-related keywords (i.e., Geospatial Information, Geospatial data, Location, Map, and Geodata and Digital Twin). As a result of the survey, Geospatial information is not only providing a role as a medium connecting objects, things, people, processes, data, and products, but also providing reliable decision-making support, linkage fusion, location information provision, and frameworks. It was found that it can contribute to maximizing the value of utilization of digital twins.

A Trend Analysis of in the U.S. Cybersecurity Strategy and Implications for Korea (미국 사이버안보 전략의 경향 분석과 한국에의 함의)

  • Sunha Bae;Minkyung Song;Dong Hee Kim
    • Convergence Security Journal
    • /
    • 제23권2호
    • /
    • pp.11-25
    • /
    • 2023
  • Since President Biden's inauguration, significant cyberattacks have occurred several times in the United States, and cybersecurity was emphasized as a national priority. The U.S. is advancing efforts to strengthen the cybersecurity both domestically and internationally, including with allies. In particular, the Biden administration announced the National Cybersecurity Strategy in March 2023. The National Cybersecurity Strategy is the top guideline of cybersecurity and is the foundation of other cybersecurity policies. And it includes public-privates as well as international policy directions, so it is expected to affect the international order. Meanwhile, In Korea, a new administration was launched in 2022, and the revision of the National Cybersecurity Strategy is necessary. In addition, cooperation between Korea and the U.S. has recently been strengthened, and cybersecurity is being treated as a key agenda in the cooperative relationship. In this paper, we examine the cyber security strategies of the Trump and Biden administration, and analyze how the strategies have changed, their characteristics and implications in qualitative and quantitative terms. And we derive the implications of these changes for Korea's cybersecurity policy.

Fraud Detection System Model Using Generative Adversarial Networks and Deep Learning (생성적 적대 신경망과 딥러닝을 활용한 이상거래탐지 시스템 모형)

  • Ye Won Kim;Ye Lim Yu;Hong Yong Choi
    • Information Systems Review
    • /
    • 제22권1호
    • /
    • pp.59-72
    • /
    • 2020
  • Artificial Intelligence is establishing itself as a familiar tool from an intractable concept. In this trend, financial sector is also looking to improve the problem of existing system which includes Fraud Detection System (FDS). It is being difficult to detect sophisticated cyber financial fraud using original rule-based FDS. This is because diversification of payment environment and increasing number of electronic financial transactions has been emerged. In order to overcome present FDS, this paper suggests 3 types of artificial intelligence models, Generative Adversarial Network (GAN), Deep Neural Network (DNN), and Convolutional Neural Network (CNN). GAN proves how data imbalance problem can be developed while DNN and CNN show how abnormal financial trading patterns can be precisely detected. In conclusion, among the experiments on this paper, WGAN has the highest improvement effects on data imbalance problem. DNN model reflects more effects on fraud classification comparatively.