• Title/Summary/Keyword: Cyber world

Search Result 372, Processing Time 0.026 seconds

Towards Open Interfaces of Smart IoT Cloud Services

  • Kim, Kyoung-Sook;Ogawa, Hirotaka
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.235-238
    • /
    • 2016
  • With the vision of Internet of Things (IoT), physical world itself is becoming a connected information system on the Internet and cyber world is computing as a physical act to sense and respond to real-world events collaboratively. The systems that tightly interlink the cyber and physical worlds are often referred to as Smart Systems or Cyber-Physical Systems. Smart IoT Clouds aim to provide a cyber-physical infrastructure for utility (pay-as-you-go) computing to easily and rapidly build, modify and provision auto-scale smart systems that continuously monitor and collect data about real-world events and automatically control their environment. Developing specifications for service interoperability is critical to enable to achieve this vision. In this paper, we bring an issue to extend Open Cloud Computing Interface for uniform, interoperable interfaces for Smart IoT Cloud Services to access services and build a smart system through orchestrating the cloud services.

  • PDF

A Study on the Concept of the Cyber Warfare and the Plan of Reaction (사이버전의 개념과 대응방안에 관한 연구)

  • Park, Chan-soo;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.521-524
    • /
    • 2014
  • Because of the development of computers and networks, the use of the internet has been rapidly increased. The smart devices, such as smart phones and tablet PCs, have made an epoch-making changes, which have brought people's daily lives to the cyber world and life values have been improved. The cyber world not only just changed individual's lives, but also affected all areas and the world. The recent global trends reside mainly in protection of energy sources, and nation's dependency of the information system such as politic, economic and national security. Since major national infrastructure becomes a stragic attack target, the importance of cyber warfare has rised as an effective way to attact enermy. This article explores the concept of cyber warfare and national cyber capability, and then figure out the plan of reaction to minimize damages with best protection when cyber warfare occurs.

  • PDF

Cyber Terror Threat Elimination Method Study for Safe Smart World (안전한 스마트월드를 위한 사이버 테러위협 제거 방안 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.107-113
    • /
    • 2021
  • Recently, large-scale research and efforts aimed at the smart world such as smart city, smart home, smart transportation, and smart care are continuing. As these smart worlds become more common, the expansion of connectivity with the Internet and the threat of cyber terrorism will be inevitable. Increasing the threat of cyber terrorism is increasing the likelihood of a massive disaster and safety accident. Therefore, in this paper, we examine smart worlds that are expanded in various forms and derive the security threat factors that smart worlds have. In addition, it is proposed to block the threat of terrorism from abroad if access from abroad is not required when constructing a smart world. Through this, we intend to present a method to eliminate cyber terror threats for the establishment and operation of a safe smart world.

Classification of Cyber Terror & Counterplan against It (Cyber Terror의 체계분류 및 경호경비대책 방안)

  • Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.33-60
    • /
    • 2000
  • I study on the classification of cyber terror & counterplan against cyber terror The paper, purporting to consider security counterplans, comprise five chapters. Chapter I which introduction is followed by chapter II, dealing largely with the general definition and classification of cyber terror. Chapter III concerns the domestic & foreign cases of damages by cyber terror. Chapter III consider the condition of world nations against cyber terror and its actual condition. It is followed by concluding observation made in chapter V.

  • PDF

Research on System Architecture and Simulation Environment for Cyber Warrior Training (사이버전사의 훈련을 위한 시스템 구축 방안 연구)

  • Ahn, Myung Kil;Kim, Yong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.533-540
    • /
    • 2016
  • It is important to establish the environment for cyber warrior training, testing support and effectiveness analysis in order to cope with sharply increasing cyber threat. However, those practices cannot be easily performed in real world and are followed with many constraints. In this paper, we propose a live/virtual M&S-based system for training/testing and constructive M&S-based system for effectiveness analysis to provide an environment similar to real world. These can be utilized to strengthen the capability to carry out cyber war and analyze the impact of cyber threat under the large-scale networks.

Study on Timing Failures in Cyber-Physical Systems

  • Kong, Joon-Ik
    • International journal of advanced smart convergence
    • /
    • v.11 no.3
    • /
    • pp.56-63
    • /
    • 2022
  • Cyber-physical systems (CPSs) can solve real problems by utilizing closely connected resources in the cyber world. Most problems arise because the physical world is uncertain and unpredictable. To address this uncertainty, information pouring from numerous devices must be collected in real-time, and each interconnected device must share the information. At this time, CPS must meet timing-related techniques and strict timing constraints that can deliver accurate information within predefined deadlines in order to interact closely beyond simply connecting the cyber and physical worlds. Timing errors in safety-critical systems, such as automobiles, aviation, and medical systems, can lead to catastrophic disasters. In this paper, we classify timing problems into two types: real-time delay and synchronization problems. The results of this study can be used in the entire process of CPS system design, implementation, operation, verification, and maintenance. As a result, it can contribute to securing the safety and reliability of CPS.

Study Tendency of Cyber Security in Power IT Area (전력 IT Cyber Security 연구 동향)

  • Kim, Hak-Man;Park, Jae-Sae;Kim, Sang-Nam
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.205-206
    • /
    • 2008
  • Electrical Power System is very important infrastructure in the country. The functions of control, monitoring and so on in the electrical power system are implemented by information technologies(IT) through cyber space. Recently, many activities for enhancing cyber security in the world. In this paper, we introduce the study tendency of cyber security in power IT areas.

  • PDF

Vulnerabilities, Threats and Challenges on Cyber Security and the Artificial Intelligence based Internet of Things: A Comprehensive Study

  • Alanezi, Mohammed Ateeq
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.153-158
    • /
    • 2022
  • The Internet of Things (IoT) has gotten a lot of research attention in recent years. IoT is seen as the internet's future. IoT will play a critical role in the future, transforming our lifestyles, standards, and business methods. In the following years, the use of IoT in various applications is likely to rise. In the world of information technology, cyber security is critical. In today's world, protecting data has become one of the most difficult tasks. Different type of emerging cyber threats such as malicious, network based and abuse of network have been identified in the IoT. These can be done by virus, Phishing, Spam and insider abuse. This paper focuses on emerging threats, various challenges and vulnerabilities which are faced by the cyber security in the field of IoT and its applications. It focuses on the methods, ethics, and trends that are reshaping the cyber security landscape. This paper also focuses on an attempt to classify various types of threats, by analyzing and characterizing the intruders and attacks facing towards the IoT devices and its services.

Design of Target Cyber Counseling System using Counseling Assistance Agent

  • Pi, Su-Young
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.3
    • /
    • pp.311-315
    • /
    • 2004
  • Because of the characteristics of the cyber world, such as usefulness, anonymousness, patency, economic performance, rapidness, etc., cyber counseling has great possibility. Because he or she may not meet a consultant directly, a client can expose his/her inside problems or secret personal problems, keeping anonymousness. However, existing cyber counseling has the limit in durability of counseling because target counseling appropriate to a client is impossible and a counseling activity is done by one time counseling. In this paper, we attempt to develop a target cyber counseling system in which target cyber counseling is possible. The system will use a counseling assistance agent who can play the role of a counseling supporter as well as a counselor in the cyber space. If target counseling becomes possible, it can heighten efficiency of cyber counseling because a client is satisfied with the result of counseling and thus counseling activities can be continued.