• Title/Summary/Keyword: Hacking

Search Result 764, Processing Time 0.036 seconds

Proposal for Phenomena-based Experimental Education through Reconsidering the Meaning of Experimentation: Based on Ian Hacking's Creation of Phenomena (실험의 의미 재고를 통한 현상중심의 실험교육의 필요성 제안 -이언 해킹(Ian Hacking)의 현상의 창조를 중심으로-)

  • Jinhyeon Choi;Sang-Hak Jeon
    • Journal of The Korean Association For Science Education
    • /
    • v.44 no.1
    • /
    • pp.29-38
    • /
    • 2024
  • In this study, we explored the philosophical perspective of Ian Hacking on experimentation and discussed its potential impact on science education in schools. Traditionally, many philosophers have advocated a theory-driven view of experimentation, emphasizing its importance primarily in validating theories. Similarly, in the context of education, the prevailing perspective has been to focus on experimentation primarily as a means of confirming and proving theories. However, in contrast to this theory-driven perspective, philosophers like Hacking have proposed that experimentation itself possesses autonomy and vitality. Through their discussions, they have brought to light the significance of previously overlooked elements in experiments, such as tool usage, materials, and the involvement of scientists. They have prompted a reevaluation of the role and importance of experiments in scientific activities. Therefore, in this study, we consider the application of this philosophical standpoint to school experimental education. We anticipate that the phenomenon-centered perspective we propose in this research will be beneficial for teaching scientific practices, including tool usage, the involvement of experimenters, and modeling activities.

Influence of Motivational, Social, and Environmental Factors on the Learning of Hackers (동기적, 사회적, 그리고 환경적 요인이 해커의 기술 습득에 미치는 영향)

  • Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.57-78
    • /
    • 2016
  • Hacking has raised many critical issues in the modern world, particularly because the size and cost of the damages caused by this disruptive activity have steadily increased. Accordingly, many significant studies have been conducted by behavioral scientists to understand hackers and their practices. Nonetheless, only qualitative methods, such as interviews, meta-studies, and media studies, have been employed in such studies because of hacker sampling limitations. Existing studies have determined that intrinsic motivation was the dominant factor influencing hackers, and that their techniques were mainly acquired from online hacking communities. However, such results have yet to be causally proven. This study attempted to identify the causal factors influencing the motivational and environmental factors encouraging hackers to learn hacking skills. To this end, hacker community members using the theory of planned behavior were observed to identify the causal factors of their learning of hacking skills. We selected a group of students who were developing their hacking skills. The survey was conducted over a two-week period in May 2015 with a total of 227 students as respondents. After list-wise deletion, 215 of the responses were deemed usable (94.7 percent). In summary, the hackers were aware that hacking skills are considered socially unethical, and their attitudes toward the learning of hacking skills were affected by both intrinsic and extrinsic motivations. In addition, the characteristics of the online hacking community affected their perceived behavioral control. This study introduced new concepts in the process of conducting a causal relationship analysis on a hacker sample. Moreover, this research expanded the discussion on the causal direction of subjective norms in unethical research, and empirically confirmed that both intrinsic and extrinsic motivations affect the learning of hacking skills. This study also made a practical contribution by raising the educational and policy response issues for ethical hackers and demonstrating the necessity to intensify the punishment for hacking.

A Novel Cost-Effective Firewall Token for Hacking Protection on TCP/IP Based Network (TCP/IP를 이용하는 전산망의 해킹방지를 위한 경제적인 방화벽 토큰 설계 방안)

  • 고재영
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.2 no.1
    • /
    • pp.159-169
    • /
    • 1999
  • Recently a firewall is being employed to protect hacking by controlling the traffics. The security services in the firewall include authentication, access control, confidentiality, integrity, and audit trail. A token is adapted for authentication to the firewall. A token has a small battery within which has restricted power capacity, This paper proposes a novel cost-effective firewall token for hacking protecting on transmission control protocol/internet protocol (TCP/IP) based network. This paper proposes a fast exponentiation method with a sparse prime that take a major operation for a public-key crypto-system and a major power consumption in the token. The proposed method uses much less amount of modular operations in exponentiation that is reduced of battery's capacity or CPU's price in the token.

  • PDF

Hacking Aattack Trends Analysis of Mobile Smishing and Security Measures (Mobile Smishing 해킹 공격 동향 분석 및 보안대책)

  • Park, Dea-Woo;Yang, Sung-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.283-284
    • /
    • 2015
  • Smartphone, tablet PC, notebook, such as the Internet banking and electronic commerce using a mobile device, as well as process and to their work. While going to high availability and convenience of mobile devices castle, SNS, letters, using an email Smishing financial fraud and leakage of personal information such as crime has occurred many. Smishing smartphone accidents increased sharply from 2013, MERS infection cases, landmine provocative events, such as the delivery of Thanksgiving has occurred cleverly using social engineering techniques. In this paper, i analyze the trends in Smishing hacking attacks on mobile devices since 2014. With regard to social issues, it analyzes the process of hacking attacks Smishing leading to financial fraud to mobile users.

  • PDF

A Study of Hacking Attack Analysis for IP-PBX (IP-PBX에 대한 해킹 공격 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Yoon, Kyung-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.273-276
    • /
    • 2011
  • Voice over Internet Protocol(VoIP) compared to the traditional PSTN communications costs and because of the ease of use has been widespread use of VoIP. Broadband Convergence Network (BCN) as part of building with private Internet service provider since 2010, all government agencies are turning to the telephone network and VoIP. In this paper, we used the Internet on your phone in the IETF SIP-based IP-PBX is a hacking attack analysis studies. VoIP systems are built the same way as a test bed for IP-PBX hacking attacks and vulnerabilities by analyzing the results yielded. Proposes measures to improve security vulnerabilities to secure VoIP.

  • PDF

A Study of Communications Security by Using Key Generation and File Encryption (파일 암호화와 키 생성을 이용한 통신보안 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.316-319
    • /
    • 2010
  • File security is typically protected by encryption methods. The development of a network environment, such as the Internet according to the sharing of information between systems become commonplace, while providing convenience to users, individuals or organizations that facilitate access to sensitive information caused by hacking the system to attack the rapidly growing is a trend. This paper is the latest generation file system caused by the hacking attacks on the Sniffing for users using file encryption and key generation, Packet Sniffing Tool IP and data through the analysis are discussed. Through this study, the importance of protecting personal information by imprinting Proactive in the hacking incident, and what users will contribute to increase the level of security awareness.

  • PDF

A Study on the Risk and Countermeasures of Hacking Cable

  • Hea-Jun Kim;Young-Bok Cho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.75-81
    • /
    • 2023
  • Since the introduction of smartphones, the introduction of charging cable infrastructure that can be used for public use is underway. Thanks to this, people use public cables comfortably without doubt, but most people are not aware of the dangers of public cables. These public cables can lead to infringement accidents such as personal information exposure due to the development of hacking cables, and in the worst case, hackers can take control of smartphones and laptops. This study analyzed the operating principles and attack principles of hacking cables that seem like these general charging cables, but contain malicious scripts or hardware inside. In addition, physical and logical countermeasures were considered based on the analysis.

Extraction of Forensic Evidence and Hacking Attacks about IP-PBX (IP-PBX에 대한 해킹공격과 포렌식 증거 추출)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1360-1364
    • /
    • 2013
  • Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LGU+) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect.

Prediction Model for Deviant Hacking Behavior and Hacking Type in Hackers Based on Psychological Variable (해커들의 심리변인에 기반한 탈선적 해킹활동 및 해킹타입 예측 모델)

  • Park, Chan Hyun;Song, In Uk;Kim, Min Ji;Chang, Eun Hee;Heo, Jun;Kim, Hyun Taek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.489-498
    • /
    • 2016
  • Despite the extant quantum communication technology that does not allow copying, wiretapping, and/or monitoring, cyber-terror-attempts from hackers with unconscientious purposes and motives are prospected to persist. Hence, it is imperative and necessary to invest in studies geared toward understanding the psychology of hackers. The current study referred to Beebe & Clark (2006) and sought out the psychological variables in hackers involved in deviant hacking activities, measured the purpose of hacking and actual hacking experiences, and constructed a predictive model that can categorize hacker types based on their intentions.

Detection of Car Hacking Using One Class Classifier (단일 클래스 분류기를 사용한 차량 해킹 탐지)

  • Seo, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.33-38
    • /
    • 2018
  • In this study, we try to detect new attacks for vehicle by learning only one class. We use Car-Hacking dataset, an intrusion detection dataset, which is used to evaluate classification performance. The dataset are created by logging CAN (Controller Area Network) traffic through OBD-II port from a real vehicle. The dataset have four attack types. One class classification is one of unsupervised learning methods that classifies attack class by learning only normal class. When using unsupervised learning, it difficult to achieve high efficiency because it does not use negative instances for learning. However, unsupervised learning has the advantage for classifying unlabeled data, which are new attacks. In this study, we use one class classifier to detect new attacks that are difficult to detect using signature-based rules on network intrusion detection system. The proposed method suggests a combination of parameters that detect all new attacks and show efficient classification performance for normal dataset.