• Title/Summary/Keyword: Cyber University

Search Result 2,766, Processing Time 0.033 seconds

Cyber threats: taxonomy, impact, policies, and way forward

  • Malik, Annas W.;Abid, Adnan;Farooq, Shoaib;Abid, Irfan;Nawaz, Naeem A.;Ishaq, Kashif
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2425-2458
    • /
    • 2022
  • The continuous evolution and proliferation of computer technology and our increasing dependence on computer technology have created a new class of threats: "cyber threats." These threats can be defined as activities that can undermine a society's ability to maintain internal or external order while using information technology. Cyber threats can be mainly divided into two categories, namely cyber-terrorism and cyber-warfare. A variety of malware programs are often used as a primary weapon in these cyber threats. A significant amount of research work has been published covering different aspects of cyber threats, their countermeasures, and the policy-making for cyber laws. This article aims to review the research conducted in various important aspects of cyber threats and provides synthesized information regarding the fundamentals of cyber threats; discusses the countermeasures for such threats; provides relevant details of high-profile cyber-attacks; discusses the developments in global policy-making for cyber laws, and lastly presents promising future directions in this area.

Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness

  • Youn, Jaepil;Oh, Haengrok;Kang, Jiwon;Shin, Dongkyoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.749-766
    • /
    • 2021
  • Cyber powers around the world are conducting cyber information-gathering activities in cyberspace, a global domain within the Internet-based information environment. Accordingly, it is imperative to obtain the latest information through the cyber intelligence preparation of the battlefield (IPB) process to prepare for future cyber operations. Research utilizing the cyber battlefield visualization method for effective cyber IPB and situation awareness aims to minimize uncertainty in the cyber battlefield and enable command control and determination by commanders. This paper designed architecture by classifying cyberspace into a physical, logical network layer and cyber persona layer to visualize the cyber battlefield using BGP archive data, which is comprised of BGP connection information data of routers around the world. To implement the architecture, BGP archive data was analyzed and pre-processed, and cyberspace was implemented in the form of a Di-Graph. Information products that can be obtained through visualization were classified for each layer of the cyberspace, and a visualization method was proposed for performing cyber IPB. Through this, we analyzed actual North Korea's BGP and OSINT data to implement North Korea's cyber battlefield centered on the Internet network in the form of a prototype. In the future, we will implement a prototype architecture based on Elastic Stack.

Framework Based Smart City Cyber Security Matrix (프레임워크 기반 스마트시티 사이버 보안 메트릭스)

  • Kim, Sung-Min;Jung, Hae-Sun;Lee, Yong-Woo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.23 no.2_2
    • /
    • pp.333-341
    • /
    • 2020
  • In this paper, we introduce a smart city-cyber-security-grid-matrix methodology, as a result of research on overall cyber security of smart cities. The identified cyber security risks that threaten smart cities and smart-city-cyber-security-threat list are presented. The smart-city-cyber-security-requirements necessary to secure the smart city cyber security with the developed smart city-cyber-security-grid-matrix are given in this paper. We show how the developed smart city-cyber-security-grid-matrix methodology can be applied to real world. For it, we interlocked the developed smart city-cyber-security-grid-matrix methodology with the cyber-security-framework of the National Institute of Standards and Technology, and developed a framework-based smart city-cyber-security-grid-matrix. Using it, it is easy and comfortable to check the level of cyber security of the target smart ciy at a glace, and the construction and operation of the smart city security system is systematized.

Design and Implementation of Simulation Tool for Cyber Battle Damage Assessment Using MOCE(Measure of Cyber Effectiveness) (사이버 효과 지표를 활용한 사이버 전투 피해평가 시뮬레이션 도구의 설계 및 구현)

  • Park, JinHo;Kim, DuHoe;Shin, DongIl;Shin, DongKyoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.465-472
    • /
    • 2019
  • In recent years, the cyber attack has become a universal phenomenon, and the attacks in cyberspace are regarded as a kind of war, cyber-warfare. However, cyber-warfare is difficult to identify the damage caused by the attack. In order to effectively evaluate the damage to the attack that may occur in the cyber-warfare, this paper describes the damage evaluation simulation of the cyber-warfare based on DEVSim++, which can calculate the damage to the cyber attack using the MOCE (Measure of Cyber Effectiveness). Also, in order to help the commander in the cyber Command&Control phase, the number of victims by attack classification is expressed in the form of Venn diagram.

A Study on the Relationships between Cyber Money Quality and Usage Intention: Focus on the Moderating Effect of Usage Frequency and Amount of Cyber Money

  • Yoon, Jongsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.179-186
    • /
    • 2019
  • While there have been a lots of studies on the use of cyber money, few researches proposed the results on relationships among quality factors, usage intention, and usage characteristics of cyber money in online business environment. Therefore, this study investigates the relationships between cyber money quality and usage intention of cyber money, and examines whether the usage characteristics(frequency, amount) of cyber money has moderating effect on the relationship between cyber money quality and usage intention of cyber money. Firstly, multiple regression analysis tells significant causal relationship between functional and emotional factors of cyber money quality and usage intention of cyber money. Secondly, dummy regression analysis shows usage characteristics of cyber money has the moderating effect on the relationship between cyber money quality and usage intention of cyber money. This paper concludes with some implications for both theory development and cyber money practice.

A Study of Cyber University Core Competence: The Consumer's Perception about Off-line Base University (사이버대학교의 핵심역량에 관한 연구 : 오프라인 기반 대학에 대한 소비자 지각을 중심으로)

  • Lim, Yang Whan;Kwon, Soon Hong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.4
    • /
    • pp.127-138
    • /
    • 2008
  • To study about core capability which becomes the kernel of sustainable competitive advantage (SCA) in cyber university which confronts competition-deepening circumstance, the value and importance of brand and educational services of cyber universities which stand on the basis of offline university were examined. Moreover, core capability based on the importance of cyber university service was searched, and its strategic course were suggested. Within research processes, competition environment of cyber university was forecasted, and importance to build up its core capability was examined. Moreover, conjoint analysis was carried out for three offline cyber universities. As a result of survey analysis, effectiveness of cyber university brand showed greater influence than other characteristics in terms of the influence which affects consumer preference for cyber university. Therefore, to overcome weaknesses of brand asset in low brand power cyber university, establishment of strong core capability which reflects consumer preference is needed to carry out differentiation strategy or concentration strategy, and it is necessary to consider the introduction of new competitiveness structure.

A Study on Priority for Success Factors for Chatting Service of Cyber University and Implementation of Chatting Service

  • Lee, Min Jung;Lim, Hyo Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.151-158
    • /
    • 2018
  • As the competition of 21 cyber universities in Korea has been on a continual increase, they are focusing on improving the quality of the e-learning education in cyber universities. In this study, we intended to derive the failure factors of the previous chatting system in the 2010s and the success factors from previous studies. Next, we identified priorities among five factors(Reliability, UI Convenience, Usability, Network effect, Operational policy) using AHP and the practical ways to implement the chatting service. We applied the chatting system to all the curriculums of S cyber university. Our study finds that the chat service affects the satisfaction of education. Finally, we propose the utilization plan to improve the e-learning education of cyber university through the findings of this research.

Risk Management Requirements for Cyber Insurance (사이버보험의 위험관리 요구사항)

  • Lee, Song-ha;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1233-1245
    • /
    • 2017
  • Cyber risk is rapidly increasing due to the hyperconnectivity of the IoT in the intelligent information society. Therefore cyber insurance has been attracting attention as a new risk management countermeasure by transferring cyber risk. However, cyber insurance is still a new concept in South Korea. The purpose of this study is to propose the concept of cyber insurance suitable for domestic demand by deriving the priority of cyber insurance coverage. Research results suggest that the most requisite cyber insurance types are business interruption and liability.

The Research of Effect of Cyber Education at Always Learning System in Affinity of Cyber Education for Officials: Focusing on Busan Metropolitan City (상시학습체제에서 사이버교육 요인이 공무원의 사이버교육 선호도에 미치는 영향 -부산광역시를 중심으로-)

  • Park, Myung-Kyu;Sim, Sun-Hee;Kim, Ha-Kyun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.23 no.1
    • /
    • pp.116-125
    • /
    • 2011
  • In this study, a survey research was conducted on government employees in Busan Metropolitan City to identify the influence of cyber education factors (learning factor, learner factor, and learning system factor) on the preference for government employee cyber education offered by the government always learning system. Analyzed results, recognition of learning factor, learner factor, and always learning system were shown to have significant influence on the preference for cyber education, but no indication of influence by always learning support. This study intends to assist stimulating voluntary participation in cyber education and active commitment in learning activities through improving learning effect and fortifying convenient informatization education, with regard to activation of cyber education and improved preference for cyber education.