• Title/Summary/Keyword: cyber

Search Result 4,530, Processing Time 0.034 seconds

A Study on the Defense Cyber Warfare Exercise (국방사이버전 연습체계 개선 방안 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.43-53
    • /
    • 2009
  • In the information society, information security is a critical issue for defense cyber network system. This paper provides a result of a study on the defense cyber exercise system for cyber warfare. So far, defense cyber exercise system has been uneffective and is not systematic even if several exercises has been implemented. In order to overcome these problems, a systematic and integrated cyber exercise process is suggested. Under the suggested system, we expect that cyber exercise for cyber warfare will be implemented with more effective manner.

  • PDF

A Study on Command and Control Through Cyber Protection Function Analysis (사이버 방호기능 분석을 통한 지휘통제에 관한 연구)

  • Choi, Seho;Oh, Haengrok;Yun, Joobeom
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.537-544
    • /
    • 2021
  • Cyber threats can bypass existing cyber-protection systems and are rapidly developing by exploiting new technologies such as artificial intelligence. In order to respond to such cyber threats, it is important to improve the ability to detect unknown cyber threats by correlating heterogeneous cyber protection systems. In this paper, to enhance cyber-attack response capabilities, we proposed command and control that enables rapid decision-making and response before the attack objectives are achieved, using Lockheed Martin's cyber kill chain and MITRE ATT&CK to analyze the purpose and intention of the attacker.

The Trends of Domestic and Overseas Cyber Security Training (국내외 사이버보안 훈련 동향)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.857-860
    • /
    • 2021
  • The 21st century society has entered the fourth industrial society of machine to machine from the information society of human to machine. Accordingly, countries around the world are always operating efficient crisis management systems that can quickly respond to disasters or crises. As cyber attacks such as cyber warfare are actually progressing, countries around the world are conducting defense training in response to cyber attacks, and reflecting the results of simulation attacks in improving or building security systems. In this paper, we would like to consider the future cyber training development guide by comparing and analyzing the trends of cyber training in domestic and foreign countries.

A Study on the Impact of the Attitude of Cyber Home Study using Structural Equation Model on the Effectiveness of Cyber Home Study (구조방정식 모형을 이용한 사이버가정학습에 대한 태도가 학습 성과에 미치는 영향에 관한 연구)

  • Kim, Byung-Jue;Baek, Hyeon-Gi
    • Journal of Digital Contents Society
    • /
    • v.9 no.3
    • /
    • pp.449-460
    • /
    • 2008
  • The result of analysis is summarized as follows. First, the cyber home study motivation has a positive effect on the cyber home study attitude. Secondly, the cyber home study Content of Ease use has no positive effect on the cyber home study attitude. Thirdly, the cyber home study Content of Usefulness has negative effect on the cyber home study attitude. Fourth, the cyber home study Content of quality has a positive effect on the cyber home study attitude. Fifth, the cyber home study the attitude a positive effect on has result that a positive effect on learning effectiveness.

  • PDF

Web-based Cyber Instruction for EFL Learning

  • Cha Mi-Yang
    • Journal of Digital Contents Society
    • /
    • v.6 no.4
    • /
    • pp.209-216
    • /
    • 2005
  • The aim of this study is to examine the effects of web-based cyber instruction on EFL learning from the viewpoint of learners` perceptions and needs. Data was collected through a questionnaire survey that was carried out with 709 undergraduate student enrolled in three cyber English courses offered at N university during the secind semester in 2004. The results of the study indicated that the learners exhibited a positive attitude towards web-based cyber instruction and considered it a paper educational method in the cyber age. However, the students perceived that web-based cyber instruction was not greatly satisfactory in terms of cultivating their English communicative competence or improving the language skills they needed. It was also found that cyber instruction was still teacher-dominant, lacking in interaction, which made the students passive recipients of informaton presented. In comparison with off-line instruction, cyber instruction was not particularly better in enhancing their motivation interest or concentration on class. To be more effective, cyber instruction needs to be equipped not only with a large variety of contents and class activities, but also with more exposure to authentic language by native English speakers. The finding of the investigation yield some implications for the design and development of web-based cyber EFL programs.

  • PDF

Risk Management Requirements for Cyber Insurance (사이버보험의 위험관리 요구사항)

  • Lee, Song-ha;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1233-1245
    • /
    • 2017
  • Cyber risk is rapidly increasing due to the hyperconnectivity of the IoT in the intelligent information society. Therefore cyber insurance has been attracting attention as a new risk management countermeasure by transferring cyber risk. However, cyber insurance is still a new concept in South Korea. The purpose of this study is to propose the concept of cyber insurance suitable for domestic demand by deriving the priority of cyber insurance coverage. Research results suggest that the most requisite cyber insurance types are business interruption and liability.

A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations (사회공학 사이버작전을 고려한 사회공학 사이버킬체인 개념정립 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1247-1258
    • /
    • 2018
  • The Cyber Kill Chain originally proposed by Lockheed Martin defines the standard procedure of general cyber attacks and suggests tailored defensive actions per each step, eventually neutralizing the intent of the attackers. Defenders can effectively deal with Advanced Persistent Threat(APT)s which are difficult to be handled by other defensive mechanisms under the Cyber Kill Chain. Recently, however, social engineering techniques that exploits the vulnerabilities of humans who manage the target systems are prevail rather than the technical attacks directly attacking the target systems themselves. Under the circumstance, the Cyber Kill Chain model should evolve to encompass social engineering attacks for the improved effectiveness. Therefore, this paper aims to establish a definite concept of Cyber Kill Chain for social engineering based cyber attacks, called Social Engineering Cyber Kill Chain, helping future researchers in this literature.

A Method of Establishing the National Cyber Disaster Management System (국가 사이버재난관리 시스템 구축 방안)

  • Kim, Sang-Wook;Shin, Yong-Tae
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.351-362
    • /
    • 2010
  • In Korea, national information infrastructure has been grown well because of the rapid growth and supply of Internet, but threats of cyber terror and cyber war are also increasing. Cyber attacks on knowledge information society threaten industry, economy and security. Major countries realize that cyber attacks can cause national heavy loss. So, they are trying to adopt policy on their cyber safe. And natural environmental crisises are increasing around the world. Countries such as India and Philippine in which tsunami, typhoon and earthquake are often occurring have national systematic disaster management system that can prevent and recover. We need systematic management for prevention and recovery from cyber terror, and need to establish national cyber disaster management system. Therefore, in this paper, we analyze major countries's cyber security policy and suggest a method of establishing the national cyber disaster management system.

Cyber Weapon Model for the National Cybersecurity (국가사이버안보를 위한 사이버무기 모델 연구)

  • Bae, Si-Hyun;Park, Dae-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.223-228
    • /
    • 2019
  • Recently, the United States has been trying to strengthen its cybersecurity by upgrading its position as an Unified Combatant Command that focuses on the Cyber Command in the United States, strengthening operations in cyberspace, and actively responding to cyber threats. Other major powers are also working to strengthen cyber capabilities, and they are working to strengthen their organization and power. The world demands economic power for its own interests rather than its own borders. But Cyber World is a world without borders and no defense. Therefore, a cyber weapon system is necessary for superiority in cyberspace (defense, attack) for national cybersecurity. In this paper, we analyze operational procedures for cyber weapons operation. And we design cyber weapons to analyze and develop the best cyber weapons to lead victory in cyberwarfare. It also conducts cyber weapons research to solve the confrontation between Cyber World.

Juvenile Cyber Deviance Factors and Predictive Model Development Using a Mixed Method Approach (사이버비행 요인 파악 및 예측모델 개발: 혼합방법론 접근)

  • Shon, Sae Ah;Shin, Woo Sik;Kim, Hee Woong
    • The Journal of Information Systems
    • /
    • v.30 no.2
    • /
    • pp.29-56
    • /
    • 2021
  • Purpose Cyber deviance of adolescents has become a serious social problem. With a widespread use of smartphones, incidents of cyber deviance have increased in Korea and both quantitative and qualitative damages such as suicide and depression are increasing. Research has been conducted to understand diverse factors that explain adolescents' delinquency in cyber space. However, most previous studies have focused on a single theory or perspective. Therefore, this study aims to comprehensively analyze motivations of juvenile cyber deviance and to develop a predictive model for delinquent adolescents by integrating four different theories on cyber deviance. Design/methodology/approach By using data from Korean Children & Youth Panel Survey 2010, this study extracts 27 potential factors for cyber deivance based on four background theories including general strain, social learning, social bonding, and routine activity theories. Then this study employs econometric analysis to empirically assess the impact of potential factors and utilizes a machine learning approach to predict the likelihood of cyber deviance by adolescents. Findings This study found that general strain factors as well as social learning factors have positive effects on cyber deviance. Routine activity-related factors such as real-life delinquent behaviors and online activities also positively influence the likelihood of cyber diviance. On the other hand, social bonding factors such as community commitment and attachment to community lessen the likelihood of cyber deviance while social factors related to school activities are found to have positive impacts on cyber deviance. This study also found a predictive model using a deep learning algorithm indicates the highest prediction performance. This study contributes to the prevention of cyber deviance of teenagers in practice by understanding motivations for adolescents' delinquency and predicting potential cyber deviants.