• Title/Summary/Keyword: Cyber world

Search Result 374, Processing Time 0.026 seconds

Research on Wireless Sensor Networks Security Attack and Countermeasures: Survey (무선 센서 네트워크 보안 위협 및 대응책 연구)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.1-6
    • /
    • 2014
  • A wireless sensor network is being actively researched around the world that are connected to the mesh are a plurality of sensor nodes in a wireless manner that span different regions of the techniques. However, wireless communications use the limitation of resources, so it is very weak due to the properties of the network itself secure in comparison to the normal network. Wireless sensor network is divided into tapped-based attacks, forgery based attacks, denial of service attacks based largely by securities laws must defend against various attacks such as insertion of the wrong information being sent eavesdropping or modification of information, which is usually sensor network applications need to do. The countermeasure of sensor network attack is described in this research, and it will contribute to establish a secure sensor network communication.

  • PDF

Risk Analysis and Monitoring Model of Urban SCADA Network Infrastructure (도시 기반시설 SCADA 망의 위험분석 및 모니터링 모델 연구)

  • Kim, Wan-Jib;Lee, Kyung-Ho;Kim, Huy-Kang;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.67-81
    • /
    • 2011
  • In recently years, there are cyber-weapon aim to national infrastructure such as 'stuxnet'. Security experts of the world are paying attention to this phenomenon. The networks which controls traffic, subway, waterworks of the city are safe from threats such as computer virus, malware, because the networks were built on closed-networks. However, it's about time to develop countermeasure for the cyber-weapon. In this paper, we review status-quo of the control systems for metropolitan infrastructure and analyze the risk of industrial control system in SCADA(Supervisory Control And Data Acquisition) network. Finally, we propose a security model for control systems of metropolitan infrastructure.

The Impact of Social Network Service, Trust and Cognition on Customer Loyalty in Internet Shopping

  • Sun, Han-Gil
    • Journal of Information Management
    • /
    • v.42 no.2
    • /
    • pp.211-234
    • /
    • 2011
  • The development of information technology improves the globalization of the world economy. This change was able to expand the cyber space, and the online community known as the cyber community is made within the existing offline community. From the cyber community's activity, the concept of social network services created, and recently developed social computing. Social computing is the current situation and the next step in the online community. Currently, most CIOs are using social computing for workplace empowerment. As online transactions become more active, the strategy to increase customer loyalty in Internet shopping is an effective tool to increase profit for the company, and as a method to maintain competitive. With the growth of electronic commerce, through insurance of customer loyalty on the Internet, a company can establish a long-term relationship with customers, so for this, it is important to have reliable relationship with customers. Also, through advertisement and commercial information, the cognition of Internet shopping looks can be effective in retaining customers. In this study, it explores how social computing and trust and cognition of Internet shopping are effective in maintaining customer loyalty. As the result of study, the trust and cognition of Internet shopping are significantly effective on customer loyalty, but the sense of social computing. Still, social computing has not matured enough to be as effective in retaining customer loyalty. However, it does indicate that social computing has significantly increased the trust and cognition in Internet shopping. In this study, as the concepts of the social network service and social computing are applied in Internet shopping, which are actively discussed by scholars, it is expected that the basis of the study could improve and present the idea of social shopping.

The Legal Problems and Policy Suggestions for Vitalizing Cyber Trade Transactions (사이버무역거래에 관한 법적 문제와 활성화방안)

  • 이신규
    • The Journal of Information Technology
    • /
    • v.4 no.3
    • /
    • pp.1-17
    • /
    • 2001
  • This study is to examine some legal problems of cyber trade transactions and to suggest some policy implications to vitalize cyber trade by internet accomplishes electronic business from all process integration of production, marketing and customer service. However, there are some legal problems for the electronic commerce to be used in international trade activities such as trade contract transport documents and payment systems by internet. First international trade rules have to be legislated so that electronic documents has same legal function like traditional documents. Also electronic signature must has authenticity, integrity, non-repudiation, writing and confidentiality. Second, traditionally international payment systems such as letters of credits, remittance, documentary collections and open account have been operated as an important and popular method of payment. In the modern world of electronic commerce, information technology has made it possible to pay for the sale of goods and services over the internet. The payment methods such as Credit Card, Debit Card, Electronic Cash, Electronic Fund Transfers enable partly sellers, buyers and service providers to settle payment electronically through the internet. To settle the problems of payment systems, the security requirements for safe electronic Payments such as authenticity, integrity, non-repudiation have to be guaranteed. Also, electronic data interchange in transport documents has to be adopted and negotiability of electronic bills of lading has to be guaranteed. Electronic payment systems through SWIFT enable the sellers and the buyers to conduct and settle international business-to-business electronic commerce in case of solving the above problems and harmonizing the Bolero project.

  • PDF

A Study on Embodiment of Conversational Agent on the Cyber Lecture Site (가상 강좌 사이트에서 대화형 에이전트의 적용에 관한 연구)

  • 유연수
    • Archives of design research
    • /
    • v.16 no.1
    • /
    • pp.117-126
    • /
    • 2003
  • The human computer interaction has gone through diverse changes along with the technical progress of computers. With the spread of the world wide web, attempts of various forms and methods of interactions reflecting the characteristics of the web are being made. Among the diverse concepts of interaction, Conversational Agent uses a character as the visual perceptional object and through the interaction based on conversation it suggests a natural, human, intuitive interaction. In this study, Conversational Agent was suggested and applied on a cyber lecture website and the appropriateness was verified. The fundamental structure and method needed in constructing a conversation was examined through the study on conversation. After that the characteristics of the conversation used on the web was identified and hereby and the coherence and conversation structure was deducted. After the characteristics of the conversational agent were observed, it was applied to the previously deducted web sites logical connection and conversation structure. Lastly, the conversational agent suitable for the web site was proposed and realized.

  • PDF

Analysis of Strategic Priorities for Strengthening Cybersecurity Capability of Cambodia (캄보디아의 사이버보안 역량강화를 위한 전략적 우선순위 분석)

  • Heng, Mara;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.93-102
    • /
    • 2019
  • This paper aims to set the priorities for the cybersecurity strategy of Cambodian government. To this end, we built a AHP research model by adopting 4 factors from the ITU national interests model and selecting 7 strategies from best practices of 8 countries leading the cyber security. Using a questionnaire, 19 experts evaluated Cambodia's cybersecurity strategy priorities. The key policy factors were evaluated in the order of homeland defense, economic welfare, value promotion and favorable world order. Their strategic alternatives were identified in the order of legislation, capacity building, and cyber attack prevention for critical infrastructure. This study will contribute to setting the strategic priorities and feasible action plans to strengthen Cambodia's cybersecurity capabilities.

Integrated Ship Cybersecurity Management as a Part of Maritime Safety and Security System

  • Melnyk, Oleksiy;Onyshchenko, Svitlana;Pavlova, Nataliia;Kravchenko, Oleksandra;Borovyk, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.135-140
    • /
    • 2022
  • Scientific and technological progress is also fundamental to the evolving merchant shipping industry, both in terms of the size and speed of modern ships and in the level of their technical capabilities. While the freight performance of ships is growing, the number of crew on board is steadily decreasing, as more work processes are being automated through the implementation of information technologies, including ship management systems. Although there have been repeated appeals from international maritime organizations to focus on building effective maritime security defenses against cyber attacks, the problems have remained unresolved. Owners of shipping companies do not disclose information about cyberattack attempts or incidents against them due to fear of commercial losses or consequences, such as loss of image, customer and insurance claims, and investigations by independent international organizations and government agencies. Issues of cybersecurity of control systems in the world today have gained importance, due to the fact that existing threats concern not only the security of technical means and devices, but also issues of environmental safety and safety of life at sea. The article examines the implementation of cyber risk management in the shipping industry, providing recommendations for the safe ship operation and its systems in order to improve vulnerability to external threats related to cyberattacks, and to ensure the safety and security of such a technical object as a seagoing ship.

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

A Study on the Multiculturalism Phenomena Expressed in Contemporary Fashion of the End twentieth century (20세기말 현대패션에 나타난 다문화주의(Multiculturalism) 현상에 관한 연구)

  • 최혜정;임영자
    • Journal of the Korean Society of Costume
    • /
    • v.51 no.2
    • /
    • pp.149-167
    • /
    • 2001
  • Today, every culture has taken on the compromise form by means of the cultural difference, variety, and pluralism according to the internationalization and the advance so that it has been developed toward the half-blooded and multilayered the aspect. In accordance with this current of the times, this thesis observed the feminism found in the multiculturism of the end of the 20th century, the third world, and technology with the side of the tendency of modern fashion, considered the hybride phenomenon which is pulling down the wall between culture and genre due to the social diversification. and predicted the fashion trend do 21st century serf on it. Multiculturism is the movement that began to arise in the academic world of America and the literary world form the close of 1980's in accepting the variety of culture and regarding the culture with the more balanced and wide view and just as it is, it means the attitude of accepting one or more cultures of variely and the position of taking interest in the culture of minority race not the culture of a governing race. It is the fashion of feminism adapts dualism like unisex, androgynous look, etc of bisexual lendency in the 1980's, it shows new style with crossover of liberal sense because there is not the difference of sex in fashion. The eco-feminism pursues the natural sexuality not being instrumental and dismantling and expressed it in the Gender expression of an integrated human being. The trend of ethnic fashion in the close of 20th century is that the element of hippie is working so strongly. By adding embroidery of Oriental style, accessories of Indian style, feathers, beads, a hempen hood to the ethnic costumes of Asia and Latin, is shows the figure of ethnic hippie. As the cycler fashion is the future clothes through technology of computer, it uses a cool glass material bringing up the image of a spacesuit in order to expresses cyber image through artificial color combination of sheen colors, Though this techno-color fashion has established the fresh stimulation and the innovative aspect with ultramodern materials and image of futurism, it transmits a hope of estranged people and the natural elements. Hybride means a cross and mixture of animal and plant in Korean and is also called fusion. The phenomenon of hybrid predicts to comes the period of a cross and variation because something completely new comes into the world by contamination, mixture and compromise through meeting something different each other and it has on advantage of developing something existing to one more stage. It is prospected that in the society of 21st century, the borderline of traditional gender will be disappeared, variety and individuality will determine the individual behavior, and the masculine value will be substituted by feminine value. In the society giving priority to feminine value, a fashion stuck closely to women is what must reflect lives of woman under the proposition of woman's beauty, being on original function. So, it is considered that a fashion with added convenience and practicality having the function which is easy to put on, comfortable to act, able to express solves so much, and able to show various appearances according to T.P.O will get into the spotlight.

  • PDF

A study on specializing the University Museum in the Perspective of Culture, Arts, and Science (문화.예술.과학의 관점에서 대학박물관의 특성화를 위한 기초연구)

  • Choe, Jong-Ho
    • KOMUNHWA
    • /
    • no.68
    • /
    • pp.25-39
    • /
    • 2006
  • This article attempts to define identity, role and functions of a university museum and to suggest specialization of the university museum in the perspective of culture, arts, and science. A university museum is defined as a center for the service of the university community and its development which acquires, researches, communicates, exhibits and educates, for purposes of eduinfotainment,29 material evidence of people and their environment. The target user of the today's university museum are not only professors, students, university workers, but also university neighbourhood such as the related professionals, patrons, parents, school children and villagers. A multi-dimensional and multi-purpose university museum can be established and managed in a real world and / or a cyber world in the perspective of culture, arts, and science. Based on a ubiquitous system30 in a cyber world vis-a-vie a real world, the university museum can be easily utilized by users anywhere, anytime and any device. In order to specialize the university museum in the perspective of culture, arts and science, it is desirable that the university museum director with the CEO of the university community promote the specialization of the university museum based on philosophy and strategies of university community management after they definitely evaluate the components and resources of the university museum such as human powers, museum collections, organizational, technological, capital, spacial and symbolic resources, The specialization of the university museum should be projected and executed in the direction of maintaining the typical scope of museum activities and managing the effective museum management. Specializing the university museum in the perspective of culture, arts, and science can contribute not only to establish the identity of the university community and to perform role and functions of the university museum but also to encourage academic development, to revaluate the brand of the university community and to promote the marketing for the university.

  • PDF