• Title/Summary/Keyword: Cyber effectiveness analysis

Search Result 102, Processing Time 0.021 seconds

Implementation of abnormal behavior detection system based packet analysis for industrial control system security (산업 제어 시스템 보안을 위한 패킷 분석 기반 비정상행위 탐지 시스템 구현)

  • Kim, Hyun-Seok;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.47-56
    • /
    • 2018
  • National-scale industrial control systems for gas, electric power, water processing, nuclear power, and traffic control systems increasingly use open networks and open standards protocols based on advanced information and communications technologies. The frequency of cyberattacks increases steadily because of the use of open networks and open standards protocols, but follow-up actions are limited. Therefore, the application of security solutions to an industrial control system is very important. However, it is not possible to apply security solutions to a real system because of the characteristics of industrial control systems. And a security system that can detect attacks without affecting the existing system is imperative. Therefore, in this paper, we propose an intrusion detection system based on packet analysis that can detect anomalous behaviors without affecting the industrial control system, and we verify the effectiveness of the proposed intrusion detection system by applying it in a test bed simulating a real environment.

Application of Importance-Performance Analysis in Highway Service Area's Performance (IPA를 활용한 고속도로 휴게소의 활성화 방안)

  • Jung, Nam-ho;Ha, Jae-Hyeok;Yoon, Nam-Soo
    • Journal of Distribution Science
    • /
    • v.7 no.1
    • /
    • pp.71-90
    • /
    • 2009
  • Recently, highway service becomes a very important service in highways. Highway service is considered as a positive interaction method between highway service companies and customers. From this perspective, this study was to investigate the relationships between influencing factors of highway service and user satisfaction. And, this research was to examine the differences between importance and performance of highway service factors using IPA (Importance-Performance Analysis). The result of this study has categorised the 22 highway service attributes into seven highway service selection factors: food, culture, kindness and health, products, large space, employee and Phone, facility. Using IPA, this study has compared the importance and performance of highway service selection factors, as perceived highway service customers. The empirical findings suggest that strategic framework using IPA gives guidelines that improve effectiveness of highway service.

  • PDF

Analysis of Dose Distribution on Critical Organs for Radiosurgery with CyberKnife Real-Time Tumor Tracking System (사이버나이프 실시간 종양추적 시스템을 이용한 방사선수술 시 주요 장기의 선량분포 분석)

  • Huh, Hyun-Do;Choi, Sang-Hyoun;Kim, Woo-Chul;Kim, Hun-Jeong;Kim, Seong-Hoon;Ji, Young-Hoon;Kim, Kum-Bae;Lee, Sang-Hoon;Choi, Jin-Ho;Lee, Re-Na;Shin, Dong-Oh
    • Progress in Medical Physics
    • /
    • v.20 no.1
    • /
    • pp.14-20
    • /
    • 2009
  • We measured the dose distribution for spinal cord and tumor using Gafchromic film, applying 3D and 4D-Treatment Planning for lung tumor within the phantom. A measured dose distribution was compared with a calculated dose distribution generated from 3D radiation treatment planning and 4D radiation treatment planning system. The agreement of the dose distribution in tumor for 3D and 4D treatment planning was 90.6%, 97.64% using gamma index computed for a distance to agreement of 1 mm and a dose difference of 3%. However, a gamma agreement index of 3% dose difference tolerence of and 2 mm distance to agreement, the accordance of the dose distribution around cord for 3D and 4D radiation treatment planning was 57.13%, 90.4%. There are significant differences between a calculated dose and a measured dose for 3D radiation treatment planning, no significant differences for 4D treatment planning. The results provide the effectiveness of the 4D treatment planning as compared to 3D. We suggest that the 4-dimensional treatment planning should be considered in the case where such equipments as Cyberknife with the real time tracking system are used to treat the tumors in the moving organ.

  • PDF

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

The Relations of Aging Anxiety and Depression Focused on Middle Aged People of Digital University (디지털대학 중년기 재학생의 노화불안과 우울에 관한 연구)

  • Jeon, Hye Seong;Lee, Hee Youn
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.417-422
    • /
    • 2014
  • This paper was to explore the effect of aging anxiety of the middle-aged on depression in aging society. This survey was conducted from September, 2013 to December, 2013 and 302responses from the survey were used for the analysis. The data was analyzed by descriptive statistics, t-test, ANOVA, pearson correlation and Multiple Regression. The research findings could be summarized as the followings. First, the mean scores of aging anxiety and depression were lower than average. Second, aging anxiety was the significant predictor to explain depression. Third, income also was the significant predictors which have the effectiveness to the depression.

A study of the effect analysis and development of informatics ethics education program based on subject integrations (교과융합 정보윤리교육 프로그램의 개발과 효과 분석)

  • Kim, SungYul;Lee, OkHwa
    • The Journal of Korean Association of Computer Education
    • /
    • v.19 no.4
    • /
    • pp.21-31
    • /
    • 2016
  • As the science and technology advances, the side effects of information and communications technology use become a social issue and the social demands to strengthen the informatics ethics in the curriculum of elementary and secondary schools becomes great. The contents of informatics ethics education is included in the current curriculum for elementary and secondary school, but they are embedded in multiple subjects without the holistic guidelines for the informatics ethics curriculum. Therefore it can have duplications of the contents or missing among subjects as those subjects are elective in the secondary school. In this study, we proposed a holistic curriculum for informatics ethics education and developed the education program based on subject integrated curriculum model and the cyber internet ethics education model to solve problems of informatics ethics education. The program was practised for 291 students of $10^{th}$ graders for 5 months and effectiveness was proven by the high attainment of ethics understanding. This subject integrated education program is proposed to solve the structural problems of informatics ethics education in 2015 curriculum.

The Effect of Maladaptive Perfectionism and Core Self-Evaluation on Body Dissatisfaction of female college student (여대생의 부적응적 완벽주의와 핵심자기평가가 신체불만족에 미치는 영향)

  • Jeon, Hye-Seong;Kim, Ju-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.557-564
    • /
    • 2016
  • This paper was to explore the effect of maladaptive perfectionism and core self-evaluation on body dissatisfaction of female college student. This survey was conducted from March, 2016 to May, 2016 and 315 responses from the survey were used for the analysis. Maladaptive Perfectionism and core self-evaluation were set as independent variables, and body dissatisfaction was set as an dependent variable. The data was analyzed by descriptive statistics, t-test, ANOVA, Pearson correlation and Multiple Regression. As a result, core self-evaluation was the significant predictor to explain body dissatisfaction, but maladaptive perfectionism didn't have the effectiveness to the body dissatisfaction of female college student. In conclusion, to reduce body dissatisfaction, female university students' positive view regarding core self-evaluation should be increased.

The Development of Internet-addiction Healing Program Using Video Communications (화상 통신을 이용한 인터넷중독 치료프로그램 개발)

  • Kwon, Chang-Oh;Kim, Kil-Mo;Cho, Seong-Hwan;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.5
    • /
    • pp.23-33
    • /
    • 2009
  • In order to help them to use the Internet properly, a study on development and application of Internet-addiction healing program using video communications was conducted and proved fruitful. The eight-session program was performed on students categorized into the high risk group for about three weeks(three times a week). After the completion of the program, the students took a self-test and the changes of the scores were analyzed. Furthermore, qualitative analysis was performed on counseling process to compensate for the reliability reduction posed by limited sampling. This study can be summarized as follows. First, the symptoms of teen Internet addiction were alleviated. The effectiveness of the application of the program was verified by the fact that all the subjects were categorized into the general user group from the high risk group. Second, in the six sub-regions of the Internet-addiction self-testing, the scores changed positively. Third, the students were actively engaged in the counseling process due to the fact that the Internet addiction healing program by means of video communications had aroused their interests.

  • PDF

Development of Lifecycle Model for Copyright Infringement Site (저작권 침해 사이트 생애 주기 모델 개발)

  • Kim, Deuk-Hun;Jeong, Hae-Seon;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.101-121
    • /
    • 2020
  • Technology and culture are converging with various industries to create added value of contents. In addition, the country is creating a foundation environment for grafting new technologies onto the cultural content. However, copyright infringement by voice demand and supply is continuously occurring for cultural contents with copyright, and more and more recently, there have been increasing cases of creating and operating sites with servers overseas to bypass monitoring on infringement sites. To prevent this, various copyright protection studies are under way in many areas, but the current detection and prevention technologies are largely reactive and therefore have problems of effectiveness. Accordingly, this paper proposes a model of the lifecycle of copyright infringement site to lay the foundation for preemptive response to the distribution of illegal copies through analysis of the lifecycle of copyright infringement site.

A Study on Factors Affecting the Acceptance of E-Learning Class Using Technology Acceptance Model (기술수용모델을 이용한 사이버강의 수용의 영향요인)

  • Chang, Chung-Moo;Kim, Tae-Ung;Lee, Won-Jun
    • Journal of Technology Innovation
    • /
    • v.12 no.3
    • /
    • pp.1-24
    • /
    • 2004
  • E-Learning is another way of teaching and learning. E-learning is a networked phenomenon allowing for instant revisions and distribution, and goes beyond training and instruction to the delivery of information and tools to improve performance. The benefits of e-learning are many, including cost-effectiveness, enhanced responsiveness to change, consistency, timely content, flexible accessibility, and providing customer value. The proponents of e-learning stress the importance of using communities of interest to support and enhance the learning process. They also emphasizes that people learn more effectively when they interact and are involved with other people participating in similar endeavors. Although the role of e-learning in higher education has significantly increased, the resistance to new technology by professors and lecturers in university and colleges worldwide remains high. The purpose of this study is to identify the determinants of attitude and planned behavior toward e-learning class in universities. A survey methodology was used to investigate a proposed model of influence, and structural equation modeling was used to analyze the results. The hypothesized model was largely supported by this analysis, and the overall results indicate that attitude toward e-learning systems is mostly influenced by the perceived ease of use as well as the level of perceived usefulness, where both factors are influenced by years of experiences in using cyber system and the technical support level. As in other TAM related research, it can be concluded that the perceived ease of use and perceived usefulness contribute to the future use of e-learning system.

  • PDF