• Title/Summary/Keyword: Cyber world

Search Result 374, Processing Time 0.02 seconds

Cybersecurity Audit of 5G Communication-based IoT, AI, and Cloud Applied Information Systems (5G 통신기반 IoT, AI, Cloud 적용 정보시스템의 사이버 보안 감리 연구)

  • Im, Hyeong-Do;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.428-434
    • /
    • 2020
  • Recently, due to the development of ICT technology, changes to the convergence service platform of information systems are accelerating. Convergence services expanded to cyber systems with 5G communication, IoT, AI, and cloud are being reflected in the real world. However, the field of cybersecurity audit for responding to cyber attacks and security threats and strengthening security technology is insufficient. In this paper, we analyze the international standard analysis of information security management system, security audit analysis and security of related systems according to the expansion of 5G communication, IoT, AI, Cloud based information system security. In addition, we design and study cybersecurity audit checklists and contents for expanding security according to cyber attack and security threat of information system. This study will be used as the basic data for audit methods and audit contents for coping with cyber attacks and security threats by expanding convergence services of 5G, IoT, AI, and Cloud based systems.

Measures to Strengthen Korea-Japan Cyber Security Cooperation: Focusing on Joint Response to North Korean Cyber Threats (북한 사이버 위협에 대응하기 위한 한일사이버 안보협력 강화방안)

  • Tae Jin Chung
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.199-208
    • /
    • 2023
  • South Korea and Japanese governments have never responded cooperatively to North Korea cyber threats in the past 10 years or even before that. There are two reasons: First, The historical and political conflicts between the two countries were so deep that they did not discuss their mutual needs. Second, officially, Japan had not been subjected to a North Korean cyberattack until 2022 . In particular, the issues of comfort women and forced labor during World War II were holding back the reconciliation between the two countries. With the inauguration of the Yoon Seok-yeol administration, Korea-US relati ons improved dramatically. Tensions in Northeast Asia reached their peak due to the conflict between the US and China. It has become a situation where peace cannot be garaunteed without close cooperation between Korea and Japan led by the United States.

A Study of Technological Standard for Sharing e-Learning Contents among Cyber Universities (원격대학간 콘텐츠 공동활용을 위한 기술 표준화 방안 연구)

  • Lee, June;Seo, YooKyeong;Cho, YongSang
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.3
    • /
    • pp.87-98
    • /
    • 2003
  • In recent years, e-Learning has taken an important position in the field of education. In turn, as the number of e-Learning contents continue to grow, many institutions are facing difficulty how to cut down the cost for content development and to reuse contents once made for the future courses. On of the way to solve this problem is to create technological standard for e-Learning contents and platform, for which e-Learning experts are actively participating around the world. The purpose of the study was to suggest technological standard for sharing e-Learning contents, especially among cyber universities which were established with the Life-long Education Act. To achieve the research objective, at first, we reviewed literatures related to the e-Learning standard, surveyed content management policies in cyber universities, and then made suggestions what to do for the standardization.

  • PDF

Advances in Cyber-Physical Systems Research

  • Wan, Jiafu;Yan, Hehua;Suo, Hui;Li, Fang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1891-1908
    • /
    • 2011
  • Cyber-physical systems (CPSs) are an emerging discipline that involves engineered computing and communicating systems interfacing the physical world. The widespread applications of CPSs still face enormous challenges because of the lack of theoretical foundations. In this technical survey, we review state-of-the-art design techniques from various angles. The aim of this work is to provide a better understanding of this emerging multidisciplinary methodology. The features of CPSs are described, and the research progress is analyzed using the following aspects: energy management, network security, data transmission and management, model-based design, control technique, and system resource allocation. We focus on CPS resource optimization, and propose a system performance optimization model with resource constraints. In addition, some classic applications (e.g., integrating intelligent road with unmanned vehicle) are provided to show that the prospects of CPSs are promising. Furthermore, research challenges and suggestions for future work are outlined in brief.

Development of Convergence Security Industry Knowledge Map for the 4th Industrial Revolution Security Infrastructure (4차 산업혁명의 보안 인프라 구축을 위한 융합보안산업 지식 맵 개발)

  • Lee, Daesung
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.173-180
    • /
    • 2019
  • As the 4th Industrial Revolution(Industry 4.0), symbolized as CPS(Cyber Physical System), spreads around the world, it is essential to establish a converged security infrastructure to secure technical stability and reliability of various cyber systems to be implemented in the future. In this study, we will investigate the phenomenon of broad convergence security industry and technology including the concept of life safety in relation to the spread of the 4th industrial revolution, and analyze the possibility of linkage between related knowledge to promote academic-industrial cooperation necessary for the convergence of security. we would like to propose a comprehensive development policy on human resource development, technology development and policy improvement.

Research on the Trend of Utilizing Emulab as Cyber Security Research Framework (사이버 보안 연구 프레임워크로써의 Emulab 활용 동향 연구)

  • Lee, Man-Hee;Seok, Woo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1169-1180
    • /
    • 2013
  • Emulab is a research framework developed by Utah university, proving on-demend research environment service so that researchers can set up and use the environment at anytime. The main advantage of Emulab over other research methodologies like simulation or virtualization is to use real systems and networks using real operating systems, making the research environment much similar to the real world. Even though Emulab has been actively used in many areas such as security and network, there has been little use in Korea research community. As KISTI recently constructed a small Emulab, it is expected that many researchers and educators would make use of the Emulab. In this study, we introduce Emulab to Korea research community and give an overview of utilization trend of Emulab as a cyber security research framework.

Design of The Cyber Shipping Exchange (사이버 해운거래소 구축 방안)

  • 최형림;박남규;김현수;박영재;황성원;박용성
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2002.03a
    • /
    • pp.39-51
    • /
    • 2002
  • Online exchange is a cost-effective approach to trade goods and information among multiple sellers and buyers. Shipping industry includes lots of global entities such as shippers, liners, ship owners and shipping agents. Marine insurance companies and ship repairers and many other groups are also supporting the industry. However, international shipping exchanges are located on few cities in the world. Its our motivation that a shipping market can be online so that market participants do the dealing while sitting where they are with more efficient manner, preferable price and larger pool of candidates of trading partners. This paper presents Korean governmental project of building a cyber shipping exchange. The exchange covers ship sale and purchase, charter, insurance, freight futures, repairs, supplying of ships oil and database service. The workflows of each business were analyzed and designed to fit for online environment. The project includes design of trading mechanism, online documents, data flow, data storage and security. Online match making and trading mechanisms such as auction, reverse auction, bid are used. The whole trading process involves multiple organizations and business processes. So, this Paper focuses on how each organization would play their roles so that users can complete transactions with integrated and transparent view. The online exchange selves also as maritime portal site that links to other sites for cooperation vertically or horizontally, and serves database and information in global perspective. This paper also issues and discusses the justification of an online shipping exchange

  • PDF

Development of a Scenario-based WBT System of Electronic Commerce (전자상거래 교육을 위한 시나리오 WBT (Web-Based Training)형 프로그램 개발에 관한 연구)

  • 임춘성;김훈태;최석현;신범일
    • The Journal of Society for e-Business Studies
    • /
    • v.3 no.2
    • /
    • pp.37-55
    • /
    • 1998
  • This study describes the works on development of a scenario-based WBT system of electronic commerce to introduce and activate electronic commerce in our society because it is mostly required to correctly understand electronic commerce and timely educate its users and technicians for entering into global electronic commerce that binds every commercial area regardless of the borders and nationalities. This system, WBT(Web - Based Training of Electronic commerce), consists of two parts. The one part provides a general concept of EC. This is developed to meet the needs of beginner for EC. The other is a simulator for cyber shopping mall. It is designed for teaching how to shop at cyber shopping mall based on various scenarios. In addition, we can simulate ourselves for EDI, which enables trading partners to conduct routine business transaction, such as purchase orders, invoices and shopping notices with it. Our commitment to the development of this application is consistent with the objectives of being easy to learn electronic commerce and its applications in real world.

  • PDF

A Study of the Characteristics of Make-up in the W-Generation (W세대 메이크업 특성에 관한 연구)

  • Kwon Hyun-Ah
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.6 s.105
    • /
    • pp.132-144
    • /
    • 2006
  • 21C, the age of culture, has the effects on the whole aspects in society with its cultural features, and the social changes become the foundation to create the new culture. The W generation, which accounts for Woman, World, Well-being, and Web, etc, leads the trend as 'a new group of powerful consumers' of establishing a new pattern. The W generation prefers psychidelic make-up using pearl through the cyber space, a space for communication like the N generation. In addition, through the Internet, leading the society of fusion or hybrid, with gender and age broken-up, the feminine as well as kidult-like make-up has emerged. On the other hand, with the influence of well-being on the whole society, well-looking appears outside, and lohas inside. The W generation prefers glossy make-up in order to make the skin healthy and polished, and eco-friendly products with lohas.

A Negative Understanding about Digital Contents in the Multimedia Circumstance (디지털 콘텐츠에 대한 비판적 접근 - 멀티미디어에 의해 형성되는 환경을 중심으로 -)

  • Kim, Kyung-Il
    • Journal of Digital Contents Society
    • /
    • v.7 no.3
    • /
    • pp.133-137
    • /
    • 2006
  • The advent of multimedia as the new media was caused popularization of personal computer and evolution of technology. The age of multimedia instigated the coming of new paradigm. The computer have been changed reality as a human culture to simulation culture. And it have been developed as a connector between real world and cyber space. As a result, a man who have used a computer has a possibility of danger of immersion or addiction. Therefore we must have the media competence.

  • PDF