• Title/Summary/Keyword: cyber

Search Result 4,503, Processing Time 0.03 seconds

A Study on the Necessity of Establishing the National Cyber Security Act through a Comparative Legal Analysis (국내 관련 법과 비교 분석을 통한 국가사이버안보법안의 제정 필요성 연구)

  • Kim, Sung-Hyun;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.9-35
    • /
    • 2018
  • During the recent years, cyber attacks have been increasing both in the private sector and the government. Those include the DDOS cases in 2009, the Blue House cyber attack, bank hackings etc. Cyber threats are becoming increasingly serious. However, there is no basic law related to cyber security at present, and regulations related to cyber security are scattered in various domestic laws. This can lead to confusion in the application of the law and difficult to grasp the regulations related to cyber security. In order to overcome this situation, the bill on the prevention and countermeasures against cyber crisis was initiated in 2006, but it has been abrogated. Since then, it has been repeatedly proposed, but it has been abrogated repeatedly due to the overlapping of existing laws and concerns about infringement of personal information. The most recent initiative was the National Cyber Security Act, which was initiated by the government in January 2017. The act focuses on resolving the absence of a basic law related to cyber security, strengthening its responsiveness in the event of a cyber security crisis, and fostering security strength. Therefore, this study seeks to contribute to the establishment of National Cyber Security legislation as a basic law of cyber security by examining the necessity of National Cyber Security legislation through comparative legal analysis with existing domestic laws related to cyber security and suggesting policy implications.

A Study on Improving the Visibility of Cyber Spaces for Cyber Businesses (사이버비즈니스를 위한 사이버공간의 가시성 증진에 관한 연구)

  • Choi, S.I.
    • Smart Media Journal
    • /
    • v.1 no.1
    • /
    • pp.80-83
    • /
    • 2012
  • This paper deals with the problems that entrepreneurs are facing while launching the cyber businesses. They are afraid of getting into cyber spaces due to the lack of visibilities. This paper adopts the relation concept in the mathematics to improve the visibility of cyber spaces. This research shows the competitiveness in cyber businesses comes from the clear understanding of visibility and reliability problems naturally embodied in the cyber space.

  • PDF

A Road-map for an e-Commerce Development (전자상거래 발전 로드맵 모델)

  • Choi, Se-Ill
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.897-904
    • /
    • 2012
  • This paper proposes a road-map from entering into the cyber spaces to getting to the success of cyber businesses. In order to succeed in cyber businesses, the nature of cyber space, attributes of the businesses and circumstances of the business owner have to be integrated and resolved. This road-map consists of integrated stepwise phases of understanding cyber spaces and developing cyber businesses.

Cyber-attack group analysis method based on association of cyber-attack information

  • Son, Kyung-ho;Kim, Byung-ik;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.260-280
    • /
    • 2020
  • Cyber-attacks emerge in a more intelligent way, and various security technologies are applied to respond to such attacks. Still, more and more people agree that individual response to each intelligent infringement attack has a fundamental limit. Accordingly, the cyber threat intelligence analysis technology is drawing attention in analyzing the attacker group, interpreting the attack trend, and obtaining decision making information by collecting a large quantity of cyber-attack information and performing relation analysis. In this study, we proposed relation analysis factors and developed a system for establishing cyber threat intelligence, based on malicious code as a key means of cyber-attacks. As a result of collecting more than 36 million kinds of infringement information and conducting relation analysis, various implications that cannot be obtained by simple searches were derived. We expect actionable intelligence to be established in the true sense of the word if relation analysis logic is developed later.

A Study on the Method for Activation of Cyber Class by Classification of Contents (콘텐츠 분류에 따른 사이버 수업 활성화 방안에 관한 연구)

  • Kim, kyung-hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.920-923
    • /
    • 2007
  • Cyber Educations of University are increasing in development of Contents and spreading Internet Network. We need to classify a cyber education by the type, and analyze environment. In addition, We need a measurement of effectiveness and the research of method for activation of cyber education. In this paper, we classify into partial cyber which is mixed face-to face lecture and cyber lecture and full cyber which is organized all cyber lecture, and investigate a satisfaction of learner. We analysis also the problem in cyber classes according to their types, and propose a plan for activation.

  • PDF

Management Education by Utilizing the Cyber Education Learning System (웹기반 원격교육시스템을 활용한 경영학 교육)

  • Hong Yong-Gee
    • Management & Information Systems Review
    • /
    • v.5
    • /
    • pp.249-285
    • /
    • 2000
  • This paper discusses management education by utilizing the cyber education learning system in a web-based. New learning system tools offer great promise for a new contents of management learning. The cyber education learning system a shift from face-to-face lecturing to interactive learning. The situation changes profoundly when information technology becomes develope and education paradigm is shift. By exploiting the digital media. educations, and students, managers can shift to a new, more effect cyber education learning system. The following shift from classic educations to cyber educations learning system: from instruction to construction, from teacher-centered to learner-centered, from school to lifelong, from one-size-fits-all to customized, from teacher as transmitter to teacher as facilitator. Cyber education learning system has an important role to play in management education. Web-based technology is regarded as a general solution to cyber education learning. This study discussed many factors of implementation in cyber education systems and provide utilizing the learning system at main, detail functions. Lastly, management implications of these cyber education utilize are discussed in more detail.

  • PDF

Design of Target Cyber Counseling System using Counseling Assistance Agent

  • Pi, Su-Young
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.3
    • /
    • pp.311-315
    • /
    • 2004
  • Because of the characteristics of the cyber world, such as usefulness, anonymousness, patency, economic performance, rapidness, etc., cyber counseling has great possibility. Because he or she may not meet a consultant directly, a client can expose his/her inside problems or secret personal problems, keeping anonymousness. However, existing cyber counseling has the limit in durability of counseling because target counseling appropriate to a client is impossible and a counseling activity is done by one time counseling. In this paper, we attempt to develop a target cyber counseling system in which target cyber counseling is possible. The system will use a counseling assistance agent who can play the role of a counseling supporter as well as a counselor in the cyber space. If target counseling becomes possible, it can heighten efficiency of cyber counseling because a client is satisfied with the result of counseling and thus counseling activities can be continued.

The Research of Effect of Cyber Education at Always Learning System in Affinity of Cyber Education for Officials: Focusing on Busan Metropolitan City (상시학습체제에서 사이버교육 요인이 공무원의 사이버교육 선호도에 미치는 영향 -부산광역시를 중심으로-)

  • Park, Myung-Kyu;Sim, Sun-Hee;Kim, Ha-Kyun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.23 no.1
    • /
    • pp.116-125
    • /
    • 2011
  • In this study, a survey research was conducted on government employees in Busan Metropolitan City to identify the influence of cyber education factors (learning factor, learner factor, and learning system factor) on the preference for government employee cyber education offered by the government always learning system. Analyzed results, recognition of learning factor, learner factor, and always learning system were shown to have significant influence on the preference for cyber education, but no indication of influence by always learning support. This study intends to assist stimulating voluntary participation in cyber education and active commitment in learning activities through improving learning effect and fortifying convenient informatization education, with regard to activation of cyber education and improved preference for cyber education.

The Trends of Next Generation Cyber Security (차세대 사이버 보안 동향)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1478-1481
    • /
    • 2019
  • As core technologies(IoT, 5G, Cloud, Bigdata, AI etc) leading the Fourth Industrial Revolution promote smart convergence across the national socio-economic infrastructure, the threat of new forms of cyber attacks is increasing and the possibility of massive damage is also increasing. Reflecting this trend, cyber security is expanding from simple information protection to CPS(Cyber Physical System) protection that combines safety and security that implements hyper-connectivity and ultra-reliability. This study introduces the recent evolution of cyber attacks and looks at the next generation cyber security technologies based on the conceptual changes of cyber security technologies such as SOAR(Security Orchestration, Automation and Response) and Zero Trust.

A Study on Cyber Sickness according to Shader Application of 3D Objects in Virtual Reality Content (가상현실(VR) 콘텐츠에서 3D 객체의 셰이더 적용에 따른 사이버 멀미 연구)

  • Lee, SuYeol;Bak, Seon-Hui;Bae, Jong-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.11
    • /
    • pp.1560-1566
    • /
    • 2021
  • Cyber Sickness, which occurs when using Virtual Reality contents, is the most serious problem in immersive Virtual Reality contents. The purpose of this study is to identify the effects and causes of graphic environmental factors on Cyber Sickness in Virtual Reality contents. To this end, cyber sickness experiments were conducted according to the light source and material settings, which are most commonly used in graphical environmental elements. Cyber Sickness measurements were based on the Simulator Sickness Question(SSQ) tool to derive an index that causes Cyber Sickness As a result of the analysis, the smaller the surface roughness, the higher the degree of Cyber Sickness, and the smaller the surface roughness, the smoother the surface of the 3D object, and many specular reflections from the light source occurred, which was confirmed to be the cause of great Cyber Sickness.