• Title/Summary/Keyword: Cyber-world

Search Result 372, Processing Time 0.026 seconds

A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems

  • Gunes, Volkan;Peter, Steffen;Givargis, Tony;Vahid, Frank
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4242-4268
    • /
    • 2014
  • The Cyber-Physical System (CPS) is a term describing a broad range of complex, multi-disciplinary, physically-aware next generation engineered system that integrates embedded computing technologies (cyber part) into the physical world. In order to define and understand CPS more precisely, this article presents a detailed survey of the related work, discussing the origin of CPS, the relations to other research fields, prevalent concepts, and practical applications. Further, this article enumerates an extensive set of technical challenges and uses specific applications to elaborate and provide insight into each specific concept. CPS is a very broad research area and therefore has diverse applications spanning different scales. Additionally, the next generation technologies are expected to play an important role on CPS research. All of CPS applications need to be designed considering the cutting-edge technologies, necessary system-level requirements, and overall impact on the real world.

A Method of Establishing the National Cyber Disaster Management System (국가 사이버재난관리 시스템 구축 방안)

  • Kim, Sang-Wook;Shin, Yong-Tae
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.351-362
    • /
    • 2010
  • In Korea, national information infrastructure has been grown well because of the rapid growth and supply of Internet, but threats of cyber terror and cyber war are also increasing. Cyber attacks on knowledge information society threaten industry, economy and security. Major countries realize that cyber attacks can cause national heavy loss. So, they are trying to adopt policy on their cyber safe. And natural environmental crisises are increasing around the world. Countries such as India and Philippine in which tsunami, typhoon and earthquake are often occurring have national systematic disaster management system that can prevent and recover. We need systematic management for prevention and recovery from cyber terror, and need to establish national cyber disaster management system. Therefore, in this paper, we analyze major countries's cyber security policy and suggest a method of establishing the national cyber disaster management system.

Cyber threat intelligence sharing system (사이버 위협 인텔리전스 공유 체계 연구)

  • Yang, Jun-ho;Kim, Chan-jin;Kim, Mee-yeon;Kim, Ji-hye;Kim, Jong-hyun;Youm, Heung-youl
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.647-650
    • /
    • 2018
  • With the advent of advanced technologies in the real world, the cyber domain has become wider and cyber threats are increasing. A cyber threat intelligence sharing system is needed to more effectively defend and respond to such cyber threats. Through the definition of cyber threat information expression standard, it enables rapid sharing, consistent analysis, and automated interpretation of cyber threat information possessed by individual security control providers or organizations.

  • PDF

An Ethnographic Study on Cyber-Delinquency among Adolescents (게임방 청소년의 사이버일탈 과정에 관한 문화기술적 연구)

  • Sung, Yun Sook;Lee, So Hee
    • Korean Journal of Child Studies
    • /
    • v.24 no.3
    • /
    • pp.109-134
    • /
    • 2003
  • Playing online games is popular among adolescents and may contribute to such social issues as game addiction and cyber-delinquency. The present study conducted an ethnographic analysis that addressed basic descriptive questions around the social significance of online games. The main findings were that peer pressure plays an important role; that is, adolescents play the games to fulfill their need to occupy higher levels of cyber-status among game players and build special relationships. They like to make money and buy what they want with money earned from game item deals. Game scenarios and mechanisms play an important role in game addiction. Adolescents sometimes exhibit social delinquency in cyberspace or the real world. Thus, adolescents' needs, game addiction and cyber-delinquency are intertwined.

  • PDF

Construction of 3D Virtual City on the Web (Web 3D 가상도시 구축)

  • Lee, Jong-Ki;Lim, Il-Sik;Kim, Byung-Guk
    • Journal of Korea Spatial Information System Society
    • /
    • v.5 no.1 s.9
    • /
    • pp.83-89
    • /
    • 2003
  • The GIS which is analysis of the real world to construction of 3D virtual city develop s in rapid growth. 3D virtual city is simulated by use of a GIS, Computer graphics, virtual reality and Spatial database. In this paper 3D topographical basemap which have the geographic coordinate of world was constructed by digital map. And build the Cyber city with combining the building that have elevation and 3D topographical basemap. By using server/client system for the cyber city. 3D cyber city web service implemented. We proposed the hybrid base web service method rather than the image or vector base web service. By the spatial and attribute search in the 3D Cyber City, overcome the existing simple visibility of Web 3D technology, and exhibited development direction to the Web 3D GIS.

  • PDF

A Method of Anonymity Authentication using the Public Certificate (공인인증서를 이용한 익명인증 방법)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.115-129
    • /
    • 2010
  • As the fixed mobile communication tools using the internet are developed, the off-line services are serviced through on-line on the internet. our society is divided into the real world and the cyber world. In the cyber world, the authentication to the user is absolutely required. The authentication is divided into the real-name authentication and the anonymous authentication by the kind of the internet service provider. There are some ISPs needed the real-name authentication and there are others ISPs needed the anonymity authentication. The research about the anonymity authentication is steadily established to these days. In this paper, we analyze the problem about blind signature, group signature, ring signature, and traceable signature. And we propose a method of anonymity authentication using the public certificate. In the proposal, the anonymity certificate have the new structure and management. Certificate Authority issues several anonymity certificates to a user through the real-name authentication. Several anonymity certificates give non-linked and non-traceability to the attacker.

Immersion Experience of the Cyber World of Adolescents (청소년의 사이버세계 몰입경험)

  • 박남희;조영란;최원희;문남진;안혜경;신재신
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.1
    • /
    • pp.15-24
    • /
    • 2004
  • Purpose: The purpose of this research was to explore the cyber world immersion experience of adolescents. Method: Multiple strategies for data collecting were used: an in depth face-to-face interview; analysis of adolescent' writings; and analysis of examples of phenomenon in the realistic world. The sample group consisted of 10 adolescents. Results: Although the experience was different for all adolescent interviewed, the essential themes of experience emerged: "fill up", "homoeologous feeling", "the older generation has a conflicting negative opinion", "change in social character", "become habitually skeptic", "have bad health", "mean of superiority and getting everything solved", "ease of access", "monetary benefit", "addiction to the computer", "forget real life solved stress", "do harm to society", "take comfort", or "new job". Conclusion: Accordingly this paper suggests that contact with various software is necessary in adolescents, and good quality contents function to prepare and activate adolescents to apply the internet for good use.

Automated Cyber Threat Emulation Based on ATT&CK for Cyber Security Training

  • Kim, Donghwa;Kim, Yonghyun;Ahn, Myung-Kil;Lee, Heejo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.71-80
    • /
    • 2020
  • As societies become hyperconnected, we need more cyber security experts. To this end, in this paper, based on the analysis results of the real world cyber attacks and the MITRE ATT&CK framework, we developed CyTEA that can model cyber threats and generate simulated cyber threats in a cyber security training system. In order to confirm whether the simulated cyber threat has the effectiveness of the actual cyber threat level, the simulation level was examined based on procedural, environmental, and consequential similarities. in addition, it was confirmed that the actual defense training using cyber simulation threats is the same as the expected defense training when using real cyber threats in the cyber security training system.

A Study about problem and a correspondence strategy along a beauty culture-Ubiquitous implementation (미용 부분의 유비쿼터스 구현에 따른 문제점과 대응전략에 관한 연구)

  • Lim Jin-Sook;Kang Jang-Mook
    • Journal of Digital Contents Society
    • /
    • v.5 no.3
    • /
    • pp.163-170
    • /
    • 2004
  • Ubiquitous is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the informatization revolution that Cyber Space saw a prime while world wide web service was expended was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous technology. Also, I presented the plan that derivation tried a problem about Ubiquitous, and can solve an each problem. Specially, infringement about personal privacy very has a lot of possession to occur in the world that radio communication between all appliances is possible. It is Ubiquitous by becoming the data which is useful to thorough preparation about the Ubiquitous world to come with presenting policy a little technical solution plan about this to the future Republic of Korea. many company has been cracked by crackers information security and everyday new computer virus come out.

  • PDF

Cyber Security Attacks and Challenges in Saudi Arabia during COVID-19

  • Nourah Almrezeq;Mamoona Humayun;Madallah Alruwaili;Saad Alanazi;NZ Jhanjhi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.179-187
    • /
    • 2023
  • The outbreak of COVID-19 had affected almost every part of the world and caused disastrous results, the number of reported COVID-19 cases in past few months have reached to more than 29 million patients in the world globally. This pandemic has adversely affected all the activities of life, ranging from personal life to overall economic development. Due to the current situation, routinely turned to online resources, and people have relied on technology more than they have been before. Since cybercriminals are an opportunist and they utilized this entirely, by targeting the online services for all sectors of life. This fortnight online dependency of the community over the internet opened several easy doors for the cybercriminals. This causes exponential attacks over internet traffic during this epidemic situation. The current Covid-19 pandemic situation appeared at once, and no one was ready to prevail this. However, there is an urgent need to address the current problem in all means. . KSA is among one of the countries most affected by these CA and is a key victim for most cyber-crimes. Therefore, this paper will review the effects of COVID-19 on the cyber-world of KSA in various sectors. We will also shed light on the Saudi efforts to confront these attacks during COVID -19. As a contribution, we have provided a comprehensive framework for mitigating cybersecurity challenges.