• Title/Summary/Keyword: Cyber-world

Search Result 374, Processing Time 0.025 seconds

A Study on the Market Status and Issues of e-Commerce Insurance (전자상거래 보험의 시장현황 및 쟁점에 관한 고찰)

  • Shin, Gun-Hoon
    • International Commerce and Information Review
    • /
    • v.7 no.3
    • /
    • pp.27-51
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

The Research for cyber security experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.301-304
    • /
    • 2016
  • Cyber world constitute the infrastructure of the country and its people and control. Cyber attacks and leakage of personal information are being threatened damage to the national economy and national security. December 2014 had been cyber hacking attacks on Korea Hydro & Nuclear Power Nuclear cooling system design drawings of a spill, and Cheong Wa Dae website hacked, KBS stations occurred in cyber hacking accidents. As a result, ICT-based Protection Act, Promotion of Information and Communications Network Utilization and Information Act on Protection, etc., privacy laws are being enforced, personal information in the form of requirements from leading high-tech eoryeowoona is to prevent the attacks of armed hackers Internet information society It proposes positive measures to keep your personal information officer and laws.

  • PDF

Rhyme of Truce, Training Program for moral psychology in Cyberspace

  • Cho, JeongHee;Lim, Chan
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.176-183
    • /
    • 2019
  • Rhyme of Truce is an educational program that helps you develop the ability to cope with cyber violence rightly. we aim to produce educational contents that will last a long time in the memory of specially children. By combining the room escape game and Leap motion / VR, the program reflects the user's motion and action in real time. The Keyboard Worrier comes into contact with the user and causes violence, and the user who is attacked by the monster see several negative messages written in red and hears abuses sound. Users enter the virtual space decorated as the cyber world. They can experience cyber-violence indirectly but vividly, and if language violence, which has been overlooked and recognized only as "letters", is executed offline, it will directly wonder if cyber-violence should also be regarded as a means of violence. Users have the opportunity to cope with violence autonomously. When a user is attacked by an in-game monster, there are two ways to choose from. First, fighting against with a keyboard (which is a symbol of language violence) just like a monster. Second, report the abuser to cyber bureau police. Both methods make them to escape the room, but when they get out of the room and return to the home and read the message through the monitor, users can recognize which action was right for.

A practical challenge-response authentication mechanism for a Programmable Logic Controller control system with one-time password in nuclear power plants

  • Son, JunYoung;Noh, Sangkyun;Choi, JongGyun;Yoon, Hyunsoo
    • Nuclear Engineering and Technology
    • /
    • v.51 no.7
    • /
    • pp.1791-1798
    • /
    • 2019
  • Instrumentation and Control (I&C) systems of nuclear power plants (NPPs) have been continuously digitalized. These systems have a critical role in the operation of nuclear facilities by functioning as the brain of NPPs. In recent years, as cyber security threats to NPP systems have increased, regulatory and policy-related organizations around the world, including the International Atomic Energy Agency (IAEA), Nuclear Regulatory Commission (NRC) and Korea Institute of Nuclear Nonproliferation and Control (KINAC), have emphasized the importance of nuclear cyber security by publishing cyber security guidelines and recommending cyber security requirements for NPP facilities. As described in NRC Regulatory Guide (Reg) 5.71 and KINAC RS015, challenge response authentication should be applied to the critical digital I&C system of NPPs to satisfy the cyber security requirements. There have been no cases in which the most robust response authentication technology like challenge response has been developed and applied to nuclear I&C systems. This paper presents a challenge response authentication mechanism for a Programmable Logic Controller (PLC) system used as a control system in the safety system of the Advanced Power Reactor (APR) 1400 NPP.

Tracking the Source of Cascading Cyber Attack Traffic Using Network Traffic Analysis (네트워크 트래픽 분석을 이용한 연쇄적 사이버공격 트래픽의 발생원 추적 방법)

  • Goo, Young-Hoon;Choi, Sun-Oh;Lee, Su-Kang;Kim, Sung-Min;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1771-1779
    • /
    • 2016
  • In these days, the world is getting connected to the internet like a sophisticated net, such an environment gives a suitable environment for cyber attackers, so-called cyber-terrorists. As a result, a number of cyber attacks has significantly increased and researches to find cyber attack traffics in the field of network monitoring has also been proceeding. But cyber attack traffics have been appearing in new forms in every attack making it harder to monitor. This paper suggests a method of tracking down cyber attack traffic sources by defining relational information flow of traffic data from highest cascaded and grouped relational flow. The result of applying this cyber attack source tracking method to real cyber attack traffic, was found to be reliable with quality results.

A Dream into Reality: Smart Internet of Things

  • Islam, Md. Motaharul;Hossain, Al Amin;Hasan, Md. Sabbir;Aazam, Mohammad;Morales, Mauricio Alejandro Gomez;Lee, Seung-Jin;Hung, Pham Phuoc;Huh, Eui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.869-870
    • /
    • 2013
  • Once upon a time people dreamt for a connected world. But most of the people consider dream as simple as a dream. But when this dream come into reality, the dreamer sometimes alive and sometimes not. But the later generations get outcome from the visionary dream of the former. This is the way of life. If we consider the whole world as a cyber physical system, if everything connects everything, how do we feel then? It is the smart Internet of things that may connect the whole world. This paper addresses few challenges and opportunities of this envisioned connected World. We identify different systems as cyber physical system and it ultimately contribute to the cloud infrastructure.

The Cyber world of the Matrix as a typical type of 'Simulacre' (시뮬라크르의 전형(典型)으로서 매트릭스(Matrix)의 가상 세계)

  • 이종한
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.339-346
    • /
    • 2004
  • Matrix, produced by Larry & Andy Wachowski, was relatively precisely dealt with the cyber world. After the movie was released, it had a mania for the movie and was adopted into a various forms of cultural products. It was remade not only into the parodies of the other movies and TV programs, but also the clothes and miscellaneous items of the movie were reincarnated as an unique cultural trend. The cause of the popularity is the fresh storyline as well as the sophisticated visual effects and good-looking actors. The agony of the protagonist was connected with the people outside the movie who are yearning for the ideal world. He was confused at the fact that his circumstances which were believed as the real world were not tortally true, complicated between the sensually phisical truth and the spiritual truth and had an will for the freedom that would ransack the truth and save the other people from the fictitious world. Consequently, the movie has got sympathies with many audiences suggesting the situation that has no a firm belief of the reality, the difference between the real and the cyber world is meaningless and the faked images of the high-technology are overturned This thesis tries to study the present that the real images are excessly duplicated and consumed, related to the Jean Baudrillard's theory, 'Hyperreel'. Replaced the real objects by a technical programming in the Matrix world, there happens the image-violence that the true nature is slaughterred by images. In the world where the reproducts are more actual than the reality and pretends to be real, only semiotics are consumed and produced. That is to say, the tortally programmed images has no references and aims, therefore should be produced in an 'impediment-strategy' like a faked crisis. That is the step of 'Simulation' that artificially reincarnates the real. Based upon the Baudrillard's theory, 'Simulacre', this study tries to research today's post-modern situation that the boundary of the real world and the faked copy is vague and vanishing, through the analysis of the cyber world of the movie 'Matrix'.

  • PDF

Enhancing Cyber-Physical Systems Security: A Comprehensive SRE Approach for Robust CPS Methodology

  • Shafiq ur Rehman
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.40-52
    • /
    • 2024
  • Cyber-Physical Systems (CPS) are introduced as complex, interconnected systems that combine physical components with computational elements and networking capabilities. They bridge the gap between the physical world and the digital world, enabling the monitoring and control of physical processes through embedded computing systems and networked communication. These systems introduce several security challenges. These challenges, if not addressed, can lead to vulnerabilities that may result in substantial losses. Therefore, it is crucial to thoroughly examine and address the security concerns associated with CPS to guarantee the safe and reliable operation of these systems. To handle these security concerns, different existing security requirements methods are considered but they were unable to produce required results because they were originally developed for software systems not for CPS and they are obsolete methods for CPS. In this paper, a Security Requirements Engineering Methodology for CPS (CPS-SREM) is proposed. A comparison of state-of-the-art methods (UMLSec, CLASP, SQUARE, SREP) and the proposed method is done and it has demonstrated that the proposed method performs better than existing SRE methods and enabling experts to uncover a broader spectrum of security requirements specific to CPS. Conclusion: The proposed method is also validated using a case study of the healthcare system and the results are promising. The proposed model will provide substantial advantages to both practitioners and researcher, assisting them in identifying the security requirements for CPS in Industry 4.0.

Consideration on the Revision Direction of National Cyber Security Management Legislation (국가 사이버안전 관리 법제의 개정방향에 관한 소고)

  • Oh, Tae-Kon;Seoung, Gwan-Sil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.3
    • /
    • pp.163-170
    • /
    • 2014
  • Cyberspace is closely related with one another, transcending the spacetime throughout the world, and is already located in the most important area of our lives. However, if the organizational cyber terror happens like the national paralysis crisis of major information network such as the previous 1.25 the Internet crisis, the possibility of cyber crisis highly damaging our whole society such as the leakage of the national secrecy and advanced technology is increasing. But we haven't set up the institutional procedure systematically performing the national cyber security management affairs yet. So, in case of cyber crisis, this is highly likely to damage the aspects of national and personal level. On this point, this study looks into the examples of legislation related to our cyber security, and suggests the implication on the revision direction of national cyber security management regulations through relative examination about the examples of legislation in major countries.

A Case Study on the Development and Evaluation of an Web-based Learning Program (웹기반 교육 프로그램의 개발과 프로그램 운영에 따른 효과 고찰)

  • 이영미;장정옥;오유진
    • Journal of Nutrition and Health
    • /
    • v.35 no.8
    • /
    • pp.886-895
    • /
    • 2002
  • Introduction and application of virtual education has been rapidly increased in these days. A variation of information communication technology has an effect on education in interconnect with network as internet in the world that exceed the limit of time and regional. Computer and network communication technology through the medium of internet make an entrance cyber education as a new education paradigm. It must be affective on learner who have various educational characteristics and requirements. It begins to appear quality, quantity improvements of knowledge and the development of information technology that web based cyber education. This study was conducted to develop the web based education program and to evaluate the effectiveness of learning satisfaction and accomplishment and to compare the cyber lecture system with the traditional lecture system During the second semester of 2001, this study was investigated 317 registered students in a "Food and Culture" class at Kyungwon University. The data were obtained from pre and post-study with self-administered questionnaire. The evaluation and satisfaction score of students who were registered in cyberclass was negative tendency to compare pre with post-test scores, because of insuffciency of computer-aided lecture system. The major problem was inconvenient in checking system for connecting times in cyberclass which was one of evaluation point in final score. Another problem was frequently disconnection during cyber studying and not to concentrate each time in the cyber lecture because of eye fatigue, boring due to less interesting contents than other newly developed web-site. The students was prefer to mix type of the cyber and traditional lecture type class. The result of final score an each class, the score of cyber class (71.36 $\pm$ 22.44) was significantly lower than other groups (mixed type : 76.66 $\pm$ 19.99, traditional type :79.17 $\pm$ 15.72) (p < 0.05). Cyber class was attempted to present a useful and interesting teaching and learning tool which can be applied successfully in a longer term. The result suggest that various teaching and learning strategies should be developed considering the fact that the student learn alone most in time.t in time.