• Title/Summary/Keyword: Cyber world

Search Result 372, Processing Time 0.03 seconds

Research on the Information Architecture and its Structure of Cyber Museums (사이버 전시관의 INFORMATION ARCHITECTURE와 그 구성에 관한 기초적 연구)

  • 송정화;임채진
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2001.05a
    • /
    • pp.112-116
    • /
    • 2001
  • We are facing the new revolutionary age which industrialism and capitalism have been disappearing at tile transition period of civilization. This revolution means the internet, a communication system that is free from the limits of time and space through the establishment of global network. This research aims at finding how the structure of museums and galleries are designed and expressed in the cyber world. It is also intended to analyse factors of their composition.

  • PDF

Development of Java Applets for Understanding the Principles of Electronic Circuits and its Applications to Cyberlectures (효율적인 사이버 강의를 위한 전자회로 원리 이해용 자바 애플릿의 개발)

  • Kim Dong-Sik;Seo Sam-Jun
    • Journal of Engineering Education Research
    • /
    • v.3 no.2
    • /
    • pp.38-43
    • /
    • 2000
  • The World-Wide Web provides new opportunities for cyber education over the internet. The web, when combined with other network tools, can be used to provide useful educational information to learners. Thus, the objective of this paper is to develop Java applets for understanding the principles of electronic circuits on the internet. Some sample Java applets are illustrated as an example. The results of this paper can be widely used to improve the efficiency of cyberlectures in the cyber university.

  • PDF

Development of an Efficient Web-based Virtual Lab System for Basic Electrical Circuits Using Java Applets (자바에플릿을 이용한 효율적인 웹기반 전기회로 가상실험실 구현)

  • Kim, Dong-Sik;Seo, Sam-Jun;Lee, Yong-Soon;Yoo, Ji-Yoon
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.3109-3111
    • /
    • 2000
  • Recently. internet applications for efficient cyber education have drawn much interests. The world-wide web provides new opportunities for cyber education over the internet. This paper presents a virtual lab system which can be used on the world-wide web. The proposed virtual lab system provides the improved learning methods which can enhance the educational efficiency in electrical engineering experiments. If the students enter the virtual lab system on the web. they can make experiments on basic electrical and electronic principles through simple mouse manipulation. Since proposed virtual lab system is implemented to describe the actual lab system. the students can obtain similar experimental data through it. Several sample Java applets are illustrated as examples.

  • PDF

UAV Path Creation Tool for Wildfire Reconnaissance in CPS Environment (CPS환경에서 산불 정찰을 위한 무인기 비행경로 생성 도구)

  • Ji-Won Jeong;Chang-Hui Bae;EuTeum Choi;SeongJin Lee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.6
    • /
    • pp.327-333
    • /
    • 2023
  • Existing studies on the UAV (Unmanned Aerial Vehicle)-based CPS (Cyber Physical System) environment lack forest fire monitoring and forest fire reconnaissance using real-world UAVs. So, it is necessary to monitor forest fires early through CPS based on real-world UAVs with high reliability and resource management efficiency. In this paper presents an MFG (Misstion File Generater) that automatically generates a flight path of an UAV for forest fire monitoring in a CPS environment. MFG generates flight paths based on a hiking trail with a high fire probability due to a true story of an entrant. We have confirmed that the flight path generated by MFG can be applied to the UAV. Also, we have verified that the UAV flies according to the flight path generated by MFG in simulation, with a negligible error rate.

A Study on the Worm.Virus Attack Technique of Cyber Warfare (사이버 정보전 웜.바이러스 공격 기술 연구)

  • 김환국;서동일;이상호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.776-779
    • /
    • 2004
  • With the rapid progress of information technique, it is getting more difficult to protect information systems from cyber terrorism, because of bugs and vulnerabilities of software and the properties of cyberspace such as anonymity. furthermore cyber terror techniques are highly developed and complicated and their use for a malicious intent and a military purpose are increasing recently. Therefore a study of warfare attack technology on the cyber space is necessary for establishing trusted society and further national security. Specially, worms/viruses are becoming a more common occurrence on the cyber space. Also, The worm caused a great deal of damage to the large number of networks around the world in a very short period of time. Therefore, we will describe worms/viruses in the warfare attack technique in this paper.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Suggestions for Business Cooperation Utilizing the Cyber Culture Trends between Korea and China (한중 사이버 문화 협력과 비즈니스 발전방안)

  • Park, Moon-Suh
    • International Commerce and Information Review
    • /
    • v.7 no.1
    • /
    • pp.261-282
    • /
    • 2005
  • In the 21st century, both globalization and e-Transformation trends of business in China have been in progress simultaneously and very rapidly. Due to those phenomena, there is consequently big change not only in the field of political-economy but also in the cultural trend of the world. But, despite of the importance of mutual cooperation between Korea and China, the research about Chinese cyber culture is neglected relatively. The purpose of this study is to review the cyber cultural aspect of business between two countries, and to devise proper measures for cultural cooperation not only reengineering the role of two countries but developing mutual benefit in East Asia in the era of global competition. The methodology used in this study is basically depending on theoretical study. Major findings are as follows: China has some cyber-cultural characteristics like very big size of netizen, heaven on earth of counterfeit, deepening in digital divide, etc. And Chinese traditional off-line culture has changed as the cyber culture spreaded over in cyberspace recently. But, on the other hand, cultural trends are changed to homogeneity both in nation-side which is between Korea and China and in space-side which is between online and offline culture. It is recommended that Korea and China have to endeavor to understand mutual culture, and to utilize the cyber culture in the respect of business cooperation. Consequently, two countries should effort to prepare exchange program for both netizen group, to design culture-networking system, to strengthen cyber-cultural marketing, and to make good use of both Korean Cultural Wave(said Han-Ryu) and Chinese Cultural Wave(said Hwa-Ryu).

  • PDF

Cyber In-Service Training Contents Development Regarding Environmental Literacy for Entry-Level Environmental Public Servants (신임환경공무원을 위한 환경소양 사이버 연수 콘텐츠 개발)

  • Seo, Woo-Seok;Kim, Su-Wook;Kim, Jae-Ho;Lee, Yoon-Jo
    • Hwankyungkyoyuk
    • /
    • v.21 no.2
    • /
    • pp.25-39
    • /
    • 2008
  • The purpose of the study was to develop cyber in-service training contents regarding environmental literacy for entry-level environmental public servants. The blended type of contents were developed, through literature review, contents analysis of other programs, and expert conferences. The validity of the contents developed was ensured experts in environment. Major research findings were as followings: First, there is a lack of time for entry-level environmental public servants to participate in the environmental in-service training programs. Therefore, cyber training can be a good solution to the problems with environmental training courses. It improves access to educational opportunities as it overcomes the limitations of time and space and provides hands-on experiences through multimedia materials that reflect the real world. Second, directions for developing cyber environmental education contents were represented in three parts; 1) strategies for developing cyber environmental education contents, 2) Models for developing cyber environmental education contents, 3) Contents selection for developing cyber environmental education contents Third, the developed contents for entry-level environmental officers consist of 4 domains: (1) the introduction to environment; (2) the natural scientific understanding of environment; (3) the humanistic understanding of environment; and (4) the social scientific understanding of environment. Fourth, the program developed was evaluated by 7 environmental education experts according to 10 evaluation items of total contents and contents development structure. In result, the validity of the program was ensured. Based on the results, some recommendations were suggested.

  • PDF

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.