• Title/Summary/Keyword: Cyber intelligence

Search Result 243, Processing Time 0.024 seconds

A Method for Deriving a Security Threat Response System in Smart Factory Area and Layer (스마트팩토리 영역 및 계층별 보안위협 대응체계 도출 기법)

  • In-Su Jung;Deuk-Hun Kim;Jin Kwak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.187-189
    • /
    • 2023
  • IoT(Internet of Things), 빅데이터, AI(Artificial Intelligence), 클라우드와 같은 ICT(Information and Communications Technology) 기술이 발전함에 따라 ICT와 제조기술이 융합된 스마트팩토리가 발전하고 있다. 이는 2개의 영역과 5개의 계층으로 구성되어 기타 환경들과 상이한 구조를 가지고 있으며, 각 영역·계층별 발생 가능한 보안위협도 상이하다. 또한, 각 영역과 계층이 연결됨에 따라 발생 가능한 보안위협이 증가하고 있으며, 이에 대한 효율적인 대응을 위하여 스마트팩토리 영역·계층별 환경을 고려한 대응체계 마련이 필요한 실정이다. 따라서, 본 논문에서는 스마트팩토리 영역·계층별 발생 가능한 보안위협을 분석하고, 이에 대응하기 위한 대응체계 도출 기법을 제안한다.

Study On Safety management system in manufacturing sites using image processing (영상처리를 이용한 제조현장내 안전관리 시스템에 관한 연구)

  • Soo-Yeong Lee;Na-Young Kim;Pyeong-Hwa Kim;Eig-Seub Han
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.882-883
    • /
    • 2023
  • 최근 문제가 제조 현장에서 안전 조치 의무 미준수로 인한 산업재해가 이슈가 되고 있다. 산업 재해는 대부분의 경우 관리 부실이 가장 큰 요인이다. 따라서 관리적 부분에서 머신 비전과 행동인식, 유사도 검색 알고리즘을 도입하여 제조현장에서 발생하는 불상사를 예방하고자 한다. 가이드라인 접근, 위험한 행동, 안전 장비 착용 수칙을 미 준수할 경우 사전에 입력된 가이드라인에 따라 관리자와 노동자에게 알림 및 경고하는 시스템을 제안하는 것을 요지로 한다.

A Study on Improving Availability of Open Data by Location Intelligence (위치지능화를 통한 공공데이터의 활용성 향상에 관한 연구)

  • Yang, Sungchul
    • Journal of Cadastre & Land InformatiX
    • /
    • v.49 no.2
    • /
    • pp.93-107
    • /
    • 2019
  • The open data portal collects data created by public institutions and opens and shares them according to related laws. With the activation of the Fourth Industrial Revolution, all sectors of our society are demanding high quality data, but the data required by the industry has not been greatly utilized due to the lack of quantity and quality. Numerous data collected in the real world can be implemented in cyber physical systems to simulate real-world problems, and alternatives to various social issues can be found. There is a limit to being provided. Location intelligence is a technology that enables existing data to be represented in space, enabling new value creation through convergence. In this study, to present location intelligence of open data, we surveyed the status of location information by data in open data portal. As a result, about 60% of the surveyed data had location information and the representative type was address. Appeared. Therefore, by suggesting location intelligence of open data based on address and how to use it, this study aimed to suggest a way that open data can play a role in creating future social data-based industry and policy establishment.

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

A study on national cybersecurity policy agenda in Korea using national cyber capability assessment model (국가 사이버 역량평가 모델을 활용한 국내 사이버안보 정책 의제 도출 연구)

  • Song, Minkyoung;Bae, Sunha;Kim, So-Jeong
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.89-100
    • /
    • 2021
  • The National Cyber Capability Assessment(NCCA) could be used as meaningful information for improving national cyber security policy because it provides information on the elements necessary for strengthening national cyber capabilities and the level of each country. However, there were few studies on improving cyber capabilities using the NCCA result in Korea. Therefore, we analyzed the result of National Cyber Power Index(NCPI) conducted by Belfer Center of Harvard Univ. by applying modified-IPA method to derive cybersecurity policy agendas for Korea. As a result, the need to set agendas on surveillance and offensive cyber capability and improve the effectiveness of policy implementation for intelligence and defense was drawn. Moreover, we suggested need for in-depth study of each policy agenda deduced from preceding research data as a future tasks. And it is expected to increase practical use of NCCA for domestic policy analysis by developing and using our own NCCA model which considered analysis framework proposed in this study.

Design of Evaluation Index System for Information Experience based on B2C e-Commerce Bigdata and Artificial Intelligence

  • KANG, Jangmook;HU, Haibo;CHEN, Yinghui;LEE, Sangwon
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.1-8
    • /
    • 2019
  • The online retail market continues to grow, especially in China, as e-commerce has developed rapidly in recent years in many countries. Meanwhile, the development and use of new network information technology provides consumers with various contact and experience environments for online shopping. Based on the theory of media weakness, the study began to focus consumer experience on the nature of commercial transactions. The study proposed and designed an initial measure of the consumer information evaluation index, which combines previous findings with implications. Finally, the five-dimensional B2C system was established to evaluate consumers' information experience providing information display, information interaction, information support and information personalization. We researched on evaluation index system for information experience of B2C e-commerce consumers based on samples of Chinese consumers.

Affective Computing Among Individuals in Deep Learning

  • Kim, Seong-Kyu (Steve)
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.115-124
    • /
    • 2020
  • This paper is a study of deep learning among artificial intelligence technology which has been developing many technologies recently. Especially, I am talking about emotional computing that has been mentioned a lot recently during deep learning. Emotional computing, in other words, is a passive concept that is dominated by people who scientifically analyze human sensibilities and reflect them in product development or system design, and a more active concept that studies how devices and systems understand humans and communicate with people in different modes. This emotional signal extraction, sensitivity, and psychology recognition technology is defined as a technology to process, analyze, and recognize psycho-sensitivity based on micro-small, hyper-sensor technology, and sensitive signals and information that can be sensed by the active movement of the autonomic nervous system caused by human emotional changes in everyday life. Chapter 1 talks about overview and Chapter 2 shows related research. Chapter 3 shows the problems and models of real emotional computing and Chapter 4 shows this paper as a conclusion.

OSINT기반의 활용 가능한 사이버 위협 인텔리전스 생성을 위한 위협 정보 수집 시스템

  • Kim, KyeongHan;Lee, Seulgi;Kim, Byungik;Park, SoonTai
    • Review of KIISC
    • /
    • v.29 no.6
    • /
    • pp.75-80
    • /
    • 2019
  • 2018년까지 알려진 표적공격 그룹은 꾸준히 증가하여 현재 155개로 2016년 대비 39개가 증가하였고, 침해사고의 평균 체류시간(dwell-time)은 2016년 172일에서 2018년 204일로 32일이 증가하였다. 점점 다양해지고 심화되고 있는 APT(Advanced Persistent Threat)공격에 대응하기 위하여 국내외 기업들의 사이버 위협 인텔리전스(CTI; Cyber Threat Intelligence) 활용이 증가하고 있는 추세이다. 현재 KISA에서는 글로벌 동향에 발맞춰 CTI를 활용할 수 있는 시스템을 개발 중에 있다. 본 논문에서는 효율적인 CTI 활용을 위한 OSINT(Open Source Intelligence)기반 사이버 위협 정보 수집 및 연관관계 표현 시스템을 소개하고자 한다.

Object detection technology trend and development direction using deep learning

  • Kwak, NaeJoung;Kim, DongJu
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.119-128
    • /
    • 2020
  • Object detection is an important field of computer vision and is applied to applications such as security, autonomous driving, and face recognition. Recently, as the application of artificial intelligence technology including deep learning has been applied in various fields, it has become a more powerful tool that can learn meaningful high-level, deeper features, solving difficult problems that have not been solved. Therefore, deep learning techniques are also being studied in the field of object detection, and algorithms with excellent performance are being introduced. In this paper, a deep learning-based object detection algorithm used to detect multiple objects in an image is investigated, and future development directions are presented.

Implementation of A Cyber-doctor system and Intelligence Electronic medical examination chart (사이버닥터시스템과 지능형 전자진료차트 구현)

  • 김석주;황대준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.685-687
    • /
    • 2001
  • 본 논문은 IIS 4.0 웹서버상에서는 ASP와 SQL을 연동한 웹프로그래밍을 통하여 효율적인 자료처리와 환자와 의사간의 on-line 상담, 그리고 off-line 상에서의 진료와 환자가 지정한 약사로의 처방전 전송 및 조제, 그리고 진료데이터의 저장 및 검색으로 인한 반영구적인 진료데이터저장 등 3자(환자, 의사, 약사)간의 상호대화형 원격진료 시스템구현에 대한 내용이다. 또한 본 시스템은 인터넷 기반에서의 3차(환자, 의사, 약사)간의 효율적인 진료와 빠른 처리를 위한 전자진료 차트 및 자료처리에 관한 내용을 제시하고 있다.

  • PDF