• Title/Summary/Keyword: Cyber intelligence

Search Result 239, Processing Time 0.022 seconds

Learning Model Development of utilizing a Tutor to study cyber-terrorism (사이버테러에 대비한 국가정보보안 현장 튜터를 활용한 교수-학습 모형 개발)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.49-57
    • /
    • 2015
  • Changes in the national intelligence security industry is becoming increasingly rapidly changing due to the development of the network and the use of the Internet. Information also can be called by critical information assets, as well as social infrastructure of the country's reality is that individuals at risk. These professionals make to prevent terrorists to destroy national defense system and network was absolutely necessary. But, Cyber Terror Response NCOs to be responsible for cyber terrorism requires a professional NCOs with advanced knowledge. National Competency Standards(NCS) using a national information security field tutors to conduct training courses teaching - learning model to develop and to apply.

Developing Self-awareness Through Cyber Study and Cyber Reading Activities: A Case Study with the Electronic Library 'Booktoby' (사이버 학습을 활용한 학생의 자아정체성 확인에 관한 연구: 북토비 사례를 중심으로)

  • Kang, Hyon-Sook
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.485-494
    • /
    • 2014
  • This study has been conducted with $1^{st}$ grade elementary students where the purpose was to develop students' interest in themselves and to cultivate their self-awareness as the first step toward establishing a suitable course and career for their start-up features. Students have conducted the cyber study through "Incheon e-School" and cyber reading "Booktoby" and recorded three types of outcomes - affective self-awareness, social self-awareness and intelligence self-awareness - on each side of the Pyramid, thus constructing their own self-awareness pyramids of the system. According to the results, after such activities were undertaken during the $1^{st}$ semester, their opinion toward their self-control and study ability has improved as much as about 67% compared to that of the beginning of the last semester. Regarding the effects of cyber reading, their interest, spontaneity and understanding toward reading books have also improved as much as 54% and 50%, 33% respectively along with positive answers of as much as 75% with regard to self-awareness. When it comes to the results of the SCI-II test (used to evaluate self-awareness), the total average has improved by as much as 3 points and the three components of self-awareness - affective, social, and intelligence - have improved by as much as 4points, 1point, and 5points, respectively.

Artificial intelligence (AI) based analysis for global warming mitigations of non-carbon emitted nuclear energy productions

  • Tae Ho Woo
    • Nuclear Engineering and Technology
    • /
    • v.55 no.11
    • /
    • pp.4282-4286
    • /
    • 2023
  • Nuclear energy is estimated by the machine learning method as the mathematical quantifications where neural networking is the major algorithm of the data propagations from input to output. As the aspect of nuclear energy, the other energy sources of the traditional carbon emission-characterized oil and coal are compared. The artificial intelligence (AI) oriented algorithm like the intelligence of a robot is applied to the modeling in which the mimicking of biological neurons is utilized in the mathematical calculations. There are graphs for nuclear priority weighted by climate factor and for carbon dioxide mitigation weighted by climate factor in which the carbon dioxide quantities are divided by the weighting that produces some results. Nuclear Priority and CO2 Mitigation values give the dimensionless values that are the comparative quantities with the normalization in 2010. The values are 1.0 in 2010 of the graphs which are changed to 24.318 and 0.0657 in 2040, respectively. So, the carbon dioxide emissions could be reduced in this study.

Application of Integrated Security Control of Artificial Intelligence Technology and Improvement of Cyber-Threat Response Process (인공지능 기술의 통합보안관제 적용 및 사이버침해대응 절차 개선 )

  • Ko, Kwang-Soo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.59-66
    • /
    • 2021
  • In this paper, an improved integrated security control procedure is newly proposed by applying artificial intelligence technology to integrated security control and unifying the existing security control and AI security control response procedures. Current cyber security control is highly dependent on the level of human ability. In other words, it is practically unreasonable to analyze various logs generated by people from different types of equipment and analyze and process all of the security events that are rapidly increasing. And, the signature-based security equipment that detects by matching a string and a pattern has insufficient functions to accurately detect advanced and advanced cyberattacks such as APT (Advanced Persistent Threat). As one way to solve these pending problems, the artificial intelligence technology of supervised and unsupervised learning is applied to the detection and analysis of cyber attacks, and through this, the analysis of logs and events that occur innumerable times is automated and intelligent through this. The level of response has been raised in the overall aspect by making it possible to predict and block the continuous occurrence of cyberattacks. And after applying AI security control technology, an improved integrated security control service model was newly proposed by integrating and solving the problem of overlapping detection of AI and SIEM into a unified breach response process(procedure).

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

Cyber Attacks and Appropriateness of Self-Defense (사이버 공격과 정당방위의 당위성)

  • Shin, Kyeong-Su
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.21-28
    • /
    • 2019
  • The emergence of a hyper-connected-super-intelligence society, called the era of the Fourth Industrial Revolution, brought about a new change in the security environment. With ICT (Information Communication Technology) convergence and high-tech technologies introduced across the board, the person-centered driving force that moved the real space is replaced by the code-oriented cyberspace, and its dependency is constantly increasing. Paradoxically, however, these technological changes serve as another security vulnerability that threatens our society, and have brought about the justification for building a cyber defense system while simultaneously facing the opportunities and challenges brought by technology. In this study, the theory of self-defense was put forward on the basis of the theoretical basis for actively responding to the increasingly intelligent and mass-evolving cyberattacks, and firstly, the need to enact a cybersecurity law, secondly, and thirdly, the need to develop a response cooperation system with the U.S. and other cyber powers.

A Study on the Website Evaluation and Improvement of Korean Cyber University Websites (국내 사이버대학교 웹사이트 평가 및 개선방안 연구)

  • Moon, Tae-Eun;Moon, Hyung-Nam
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.2
    • /
    • pp.137-156
    • /
    • 2008
  • The purpose of this study is to implement evaluation on domestic cyber University web site to analyze web usability and web accessibility in order to present how much cyber University provides various personalized services and qualitative contents to users on web site. And also with this result, I hope to contribute in qualitative development of web site and reliability of remote education. For this purpose, I developed checklist suitable to remote University by applying SM-ABCDE assessment method of Moonhyeongnam, the professor in Sookmyung Women's University, and implemented evaluation on web sites of 17 cyber University over the five aspects of attraction, business, contents, design, and engineering. As the result of this study, it was found that Busan Digital University was best in the respect of attraction, both Kyunghee Cyber University and Cyber University of foreign studies were best in the respect of business, Kyunghee University was best in the respect of contents, and Hanyang Cyber University was best in the respect of design. It was also evaluated in the comprehensive view and the order was found that Kyunghee Cyber University, Busan Cyber University, and Hanyang Cyber University. However in the respect of engineering, it came out that all the sites did not observe the regulation on web accessibility. If domestic Cyber Universities are to observe the regulation on web accessibility with the long term view, on the base of this study, web usability would be increasing. Then they can secure various classes of customers as well as ordinary people so that they will be able to take the real place of educational institution orienting the most advanced educational method in the society of knowledge and information in addition to advance in themselves.

  • PDF

Cyber Threat Intelligence Traffic Through Black Widow Optimisation by Applying RNN-BiLSTM Recognition Model

  • Kanti Singh Sangher;Archana Singh;Hari Mohan Pandey
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.99-109
    • /
    • 2023
  • The darknet is frequently referred to as the hub of illicit online activity. In order to keep track of real-time applications and activities taking place on Darknet, traffic on that network must be analysed. It is without a doubt important to recognise network traffic tied to an unused Internet address in order to spot and investigate malicious online activity. Any observed network traffic is the result of mis-configuration from faked source addresses and another methods that monitor the unused space address because there are no genuine devices or hosts in an unused address block. Digital systems can now detect and identify darknet activity on their own thanks to recent advances in artificial intelligence. In this paper, offer a generalised method for deep learning-based detection and classification of darknet traffic. Furthermore, analyse a cutting-edge complicated dataset that contains a lot of information about darknet traffic. Next, examine various feature selection strategies to choose a best attribute for detecting and classifying darknet traffic. For the purpose of identifying threats using network properties acquired from darknet traffic, devised a hybrid deep learning (DL) approach that combines Recurrent Neural Network (RNN) and Bidirectional LSTM (BiLSTM). This probing technique can tell malicious traffic from legitimate traffic. The results show that the suggested strategy works better than the existing ways by producing the highest level of accuracy for categorising darknet traffic using the Black widow optimization algorithm as a feature selection approach and RNN-BiLSTM as a recognition model.

The Mediating Effect of Ego-Resilience and Emotional Intelligence on the Relationship between Growth Mindset and Problem-Solving Ability of Middle and High School Students (중·고등학생의 성장 마인드셋과 문제해결능력의 관계에서 자아탄력성과 정서지능의 매개효과)

  • Cho, Byeonghun;Kim, Hyunjin
    • The Korean Journal of Coaching Psychology
    • /
    • v.5 no.2
    • /
    • pp.101-125
    • /
    • 2021
  • This study tried to identify the psychological mechanisms that middle and high school students can adaptively solve various problems, and to identify differences according to gender and school level. To this end, the growth mindset was set as an independent variable predicting the problem-solving ability of middle and high school students, and ego-resilience and emotional intelligence were set as the mediating variables. As for the research data, responses of 94 middle school students(40 males, 54 females) and 134 high school students(63 males, 71 females) who participated through mobile and off-line were analyzed using SPSS 24.0 and AMOS 18.0. The results are as follows. First, differences according to gender and school level were significant only in emotional intelligence. Second, ego-resilience and emotional intelligence mediated the relationship between growth mindset and problem-solving ability respectively. Third, the dual mediation effect of ego-resilience and emotional intelligence was significant in the relationship between growth mindset and problem-solving ability. Based on these results, theoretical and practical discussions and implications for improving problem-solving ability of middle and high school students are presented.

  • PDF

A Study on ICS Security Information Collection Method Using CTI Model (CTI 모델 활용 제어시스템 보안정보 수집 방안 연구)

  • Choi, Jongwon;Kim, Yesol;Min, Byung-gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.471-484
    • /
    • 2018
  • Recently, cyber threats are frequently occurring in ICS(industrial control systems) of government agencies, infrastructure, and manufacturing companies. In order to cope with such cyber threats, it is necessary to apply CTI to ICS. For this purpose, a security information collection system is needed. However, it is difficult to install security solution in control devices such as PLC. Therefor, it is difficult to collect security information of ICS. In addition, there is a problem that the security information format generated in various assets is different. Therefore, in this paper, we propose an efficient method to collect ICS security information. We utilize CybOX/STIX/TAXII CTI models that are easy to apply to ICS. Using this model, we designed the formats to collect security information of ICS assets. We created formats for system logs, IDS logs, and EWS application logs of ICS assets using Windows and Linux. In addition, we designed and implemented a security information collection system that reflects the designed formats. This system can be used to apply monitoring system and CTI to future ICS.