• Title/Summary/Keyword: Cyber world

Search Result 372, Processing Time 0.024 seconds

Implementation and Performance Analysis of Partition-based Secure Real-Time Operating System (파티션 기반 보안 실시간 운영체제의 구현 및 성능 분석)

  • Kyungdeok Seo;Woojin Lee;Byeongmin Chae;Hoonkyu Kim;Sanghoon Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.99-111
    • /
    • 2022
  • With current battlefield environment relying heavily on Network Centric Warfare(NCW), existing weaponary systems are evolving into a new concept that converges IT technology. Majority of the weaponary systems are implemented with numerous embedded softwares which makes such softwares a key factor influencing the performance of such systems. Furthermore, due to the advancements in both IoT technoogies and embedded softwares cyber threats are targeting various embedded systems as their scope of application expands in the real world. Weaponary systems have been developed in various forms from single systems to interlocking networks. hence, system level cyber security is more favorable compared to application level cyber security. In this paper, a secure real-time operating system has been designed, implemented and measured to protect embedded softwares used in weaponary systems from unknown cyber threats at the operating system level.

Cyber-Lecture Management System based on XML (XML 기반의 사이버 강좌관리 시스템)

  • Kim, Hye-Young;Kim, Hwa-Sun;Kim, Heung-Sik;Kim, Sang-Gyun;Choi, Heung-Kook
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.529-538
    • /
    • 2003
  • The speedy development of the world-wide web is rapidly growing the internet-based tools for the remote instruction. In interchanging and expressing the information of one another on the web, it is produced through the form of HTML(Hyoertext Text Markup Language). However, the structural disadvantage of the HTML is becoming to require a powerful XML(eXtensible Markup Language) which can store all the sphere of data, and transform them into another form. Nevertheless, because the powerful XML(eXtensible Markup Language). However necessary that XML standard should be applied appropriately. Because existing lecture data of cyber education sites cannot be shared, the users should passively use only the functions offered by cyber school. To solve the problem of this limit, in this study, the standardized data structure for XML is defined, and system model for processing between the server and the client is provided. By storing the lecture data of cyber education sites as XML on the web, stored data came to be reused without changing on any site. In the view of Users, they could used the Internet service with equipment that they want at any place and any time. To control any kinds of CK\LMS(Cyber Lecture Management System) for Administrator and Users, we offered a variety of Multimedia applications and an easy interface and built a new style of CLMS. Therefore, by strong and extracting the data related with the virtual education of the secondary school through the form of XML, for the effective interchange and sharing of the information, maximum utilization of the information can be achieved.

Analyzing the Positive and the Negative SNS Behaviors of the Elementary and Middle School Students (초.중학생의 SNS에서의 긍정적.부정적 행동 분석)

  • Lee, Soojung;Yeon, Jeong-Hwa
    • Journal of The Korean Association of Information Education
    • /
    • v.17 no.1
    • /
    • pp.1-8
    • /
    • 2013
  • SNS is a social networking service that removes the barrier between cyber spaces and the real world and helps people who have common interests to have a two-way communication, manage their interpersonal relationships and share information. The domestic and international SNS markets have attained a steady growth, and their growth is being more accelerated in recent days. However, studies on SNS have just examined adults, and it's required to research the use of SNS and cyber behaviors via SNS among elementary and middle school students. This study attempted to analyze the relationship of the use of SNS, motivation of using SNS, the use of active SNS functions, SNS-dependent tendency and SNS awareness to cyber behaviors via SNS among elementary and middle school students. As a result, regardless of gender and grade, stealing private information was the most frequent activity and the frequency of 'contacting strangers' activity increased most rapidly with the usage time and grade. SNS dependency turned out to be the most highly correlated with the negative cyber behavior. Moreover, the difference of gender was not significant to the overall negative cyber behavior, whereas that of grade was.

  • PDF

한국과 캐나다의 정보화 추진정책 비교분석

  • 이홍재
    • Proceedings of the Technology Innovation Conference
    • /
    • 1999.12a
    • /
    • pp.240-254
    • /
    • 1999
  • In the knowledge-based society of the new millenium, major countries have implemented computer literacy. Recently the Korean government announced 'CyberKorea21'and established 5 year information & communication technology development plan. In Canada, project CANARIE represents a contribution to building the communications infrastructure of the high-speed communications networks of the 21st century. Countries around the world are looking to Canada as the model for Internet research network(Ca*net3) and 'connecting Canadian'. The purpose of this paper is on the strategic implications through comparative analysis of computer literacy between Canada and Korea.

  • PDF

Design of Cyber Tour System by Virtual Reality (가상현실을 이용한 가상여행 시스템 연구)

  • Kim, Seoung-Chan;Park, Jin-Ho;Choi, Sung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.949-952
    • /
    • 2001
  • 본 논문은 인터넷의 발달로 가능해진 가상현실의 구현과 가상현실세계에서의 자아를 대신한 아바타(AVATAR)를 이용하여 가상 여행 System 설계에 대해서 연구하였다 가상현실(Virtual Reality) 기술은 컴퓨터 그래픽을 이용하여 가상세계(Virtual World)를 구현하고 아바타를 이용하여 인간이 실제로 여행하는것과 같은 몰입감을 부여하는 것이 목적이다. 더 나아가서 인간의 시각을 통해 전해지는 영상을 이용하여 가상현실을 조정함으로서 현실에서 인간이 느끼는 상태를 가상세계에 적용하여 더욱 완벽한 현실 대체를 연구하였다.

  • PDF

Design of Cyber Tour System (가상여행 시스템 연구)

  • 김승찬;최성;신정길
    • Proceedings of the KAIS Fall Conference
    • /
    • 2001.05a
    • /
    • pp.326-329
    • /
    • 2001
  • 본 논문은 인터넷의 발달로 가능해진 가상현실의 구현과 가상현실세계에서의 자아를 대신한 아바타(AVATAR)를 이용하여 가상 여행 System 설계에 대해서 연구하였다. 가상현실(Virtual Reality) 기술은 컴퓨터 그래픽을 이용하여 가상세계(Virtual World)를 구현하고 아바타를 이용하여 인간이 실제로 여행하는 것과 같은 몰입감을 부여하는 것이 목적이다. 더 나아가서 인간의 시각을 통해 전해지는 영상을 이용하여 가상현실을 조정함으로서 현실에서 인간이 느끼는 상태를 가상세계에 적용하여 더욱 완벽한 현실 대체를 연구하였다.

A Study on Socio-technical System for Sustainability of the 4th Industrial Revolution: Machine Learning-based Analysis

  • Lee, Jee Young
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.204-211
    • /
    • 2020
  • The era of the 4th industrial revolution is a complex environment in which the cyber world and the physical world are integrated and interacted. In order to successfully implement and be sustainable the 4th industrial revolution of hyper-connectivity, hyper-convergence, and hyper-intelligence, not only the technological aspects that implemented digitalization but also the social aspects must be recognized and dealt with as important. There are socio-technical systems and socio-technical systems theory as concepts that describe systems involving complex interactions between the environmental aspects of human, mechanical and tissue systems. This study confirmed how the Socio-technical System was applied in the research literature for the last 10 years through machine learning-based analysis. Eight clusters were derived by performing co-occurrence keywords network analysis, and 13 research topics were derived and analyzed by performing a structural topic model. This study provides consensus and insight on the social and technological perspectives necessary for the sustainability of the 4th industrial revolution.

실시간 분산 제어시스템 보안

  • Shin, Incheol
    • Review of KIISC
    • /
    • v.24 no.5
    • /
    • pp.39-45
    • /
    • 2014
  • 최근, 에너지, 정보통신, 방위산업, 정부, 금융 등 국가기반시설(national critical infrastructures)들에 대한 사이버 보안 위협이 급격히 증가하고 있으며 이에 대응하기 위해 미국을 비롯한 주요 국가에서는 감시제어 및 데이터 취득 시스템(SCADA: Supervisory Control and Data Acquisition)에 대한 사이버 보안에 많은 노력을 기울이고 있다. 특히, 주요 국가 기반시설은 다양한 실시간 분산 제어시스템 및 네트워크를 통해 사이버 세계(cyber world)와 물리적 세계(physical world)를 연계한다. 하지만 이 같은 역동성(dynamic), 확장성(scalability), 다양성(diversity)으로 특징지어질수 있는 실시간 분산 제어시스템간의 상호연결과 연동을 통해 구성되는 해당시설은 기존의 보안기술 적용을 통해 보안성향상을 기대할 수 없다. 따라서 본고에서는 실시간 분산 제어시스템과 다양한 네트워크로 구성되는 기반시설들을 대상으로 하는 여러 가지 보안 위협 및 특징을 소개하고 이에 대응하기 위한 전략 및 연구기술 동향을 간략히 서술한다.

Do North Korean Social Media Show Signs of Change?: An Examination of a YouTube Channel Using Qualitative Tagging and Social Network Analysis

  • Park, Han Woo;Lim, Yon Soo
    • Journal of Contemporary Eastern Asia
    • /
    • v.19 no.1
    • /
    • pp.123-143
    • /
    • 2020
  • This study examines the interplay between the reactions of YouTube users and North Korean propaganda. Interesting enough, the study has noticed changes in the strict media environment under young leader Kim. Messages delivered by the communist regime to the outside world appeared to resemble those of 'normal' countries. Although North Korean YouTube was led mainly by the account operator, visitors from different nations do comment on the channel, which suggests the possibility of building international communities for propaganda purposes. Overall, the study observed a sparsely connected social network among ordinary commenters. However, the operator did not exercise tight control over peer-to-peer communication but merely answered questions and tried to facilitate mass participation. In contrast to the many news clips, the documentary content on North Korea's YouTube channel did not explicitly advocate for North Korea's current political positions.

An Analysis of Security Protocol in Internet (인터넷에서 정보보호 프로토콜 분석)

  • 김상춘;권기현
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.21-32
    • /
    • 2003
  • The development of Internet has created a new world called the Cyber world. However, because of the weakness in the security service, Internet service users still reluctant to use Internet to accomplish high value business transactions. To overcome this situation we must develop various security services so that the Internet service users can use any services freely As the development of Internet, the corresponding technologies are available for the general public and this makes the security services more important than ever before. In this paper, we analyze the security protocols that are supposed to solve the Internet security problems.

  • PDF