• Title/Summary/Keyword: cyber IR

Search Result 8, Processing Time 0.021 seconds

KOSDAQ Firm's Cyber IR Activity and Stock Price Behavior (코스닥 기업의 사이버 IR과 주가행태)

  • Song, Myung-Gyu;Cho, Jun-Hee;Kim, Chan-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.388-397
    • /
    • 2012
  • Recently, KOSDAQ company's cyber IR activities has increased. Major advantages offered by the Internet include low cost and high accessibility the Internet is used as a strategic tool of many KOSDAQ companies in IR activity. Thus, this study tried to empirically analyze the overall impact of cyber IR. And this study examine the difference in impact of cyber IR activity on stock prices in the period before and after depending on ownership structure and venture or not. The main result of the study can be summarized as follows. First, IR activities have a positive impact on KOSDAQ firms stock price. This means that the investors are recognizing IR activity of KOSDAQ firm as a good news. Second, The lower stock ownership have great impact on stock prices. The act of reporting and monitoring system are performing effectively to lower stock ownership as compared with higher stock ownership. Third, The return rate of KOSDAQ venture firms with IR enforcement effect appears high than KOSDAQ firms with IR enforcement.

A Study on the Measures for the Development of Electronic Security in the 4th Industrial Revolution Era (4차 산업혁명 시대 Electronic Security 발전 방안에 관한 연구)

  • Kim, Min Su
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.109-114
    • /
    • 2020
  • Currently, in the 4th industrial revolution era(4IR), the convergent infrastructure has been established by actively utilizing data based on the existing digital technological innovation in the 3rd industrial revolution. Thus, the technological innovation based on the knowledge-information society needs to put innovative efforts for creating new business models in various areas. Thus, this study aims to present an Electronic Security Framework by suggesting the Cyber-Physical Security System(CPSS) that could more accurately predict and efficiently utilize it based on structured data obtained by collecting, analyzing, and processing an enormous amount of unstructured data which is a core technology distinguished from the 3rd industrial revolution.

A Research on the Design and Implementation of LED Display-based Light Gun Systems

  • Byong-Kwon Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.85-91
    • /
    • 2024
  • With the current surge in leisure sports activities involving firearms and the costly shooting practices in the military, there's a growing interest in using virtual reality as a cost-effective alternative. This study proposes a system that addresses the drawbacks of existing shooting practice setups, such as dim spaces and high installation costs, by making it feasible on large display screens. The system integrates IR receivers and guns for practice, ensuring usability and efficiency through an application. Additionally, an accuracy adjustment feature enhances precise coordination recognition. As a result, this cyber light gun system offers an affordable solution for outdoor training.

EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception

  • Li, Huanruo;Guo, Yunfei;Huo, Shumin;Ding, Yuehang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1891-1908
    • /
    • 2021
  • Cyber deception defense mitigates Advanced Persistent Threats (APTs) with deploying deceptive entities, such as the Honeyfile. The Honeyfile distracts attackers from valuable digital documents and attracts unauthorized access by deliberately exposing fake content. The effectiveness of distraction and trap lies in the enticement of fake content. However, existing studies on the Honeyfile focus less on this perspective. In this work, we seek to improve the enticement of fake text content through enhancing its readability, indistinguishability, and believability. Hence, an enticing deceptive-content generator, EDGE, is presented. The EDGE is constructed with three steps: extracting key concepts with a semantics-aware K-means clustering algorithm, searching for candidate deceptive concepts within the Word2Vec model, and generating deceptive text content under the Integrated Readability Index (IR). Furthermore, the readability and believability performance analyses are undertaken. The experimental results show that EDGE generates indistinguishable deceptive text content without decreasing readability. In all, EDGE proves effective to generate enticing deceptive text content as deception defense against APTs.

Efficient Operation Model for Effective APT Defense (효율적인 APT 대응 시스템 운영 모델)

  • Han, Eun-hye;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.501-519
    • /
    • 2017
  • With the revolution of IT technology, cyber threats and crimes are also increasing. In the recent years, many large-scale APT attack executed domestically and internationally. Specially, many of the APT incidents were not recognized by internal organizations, were noticed by external entities. With fourth industrial revolution(4IR), advancement of IT technology produce large scale of sensitive data more than ever before; thus, organizations invest a mount of budget for various methods such as encrypting data, access control and even SIEM for analyzing any little sign of risks. However, enhanced intelligent APT it's getting hard to aware or detect. These APT threats are too much burden for SMB, Enterprise and Government Agencies to respond effectively and efficiently. This paper will research what's the limitation and weakness of current defense countermeasure base on Cyber Kill Chain process and will suggest effective and efficient APT defense operation model with considering of organization structure and human resources for operation.

Microprocessor On-line Contents using Simulator

  • Lim, Dong Kyun;Oh, Won Geun
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.299-305
    • /
    • 2020
  • With the advancement of the 4th Industrial Revolution(4IR), microprocessor education is on the rise due to the explosive demand for IoT (Internet of Things) and M2M devices. However, it is difficult due to many constraints to efficiently transfer training on hardware assembly and implementation through online training. Thus, we developed a cost-effective online content based on Arduino simulations, Atmel Studio 7, and WinAvr simulator that are required for the utilization of AVR 128. These Camtasia videos overcame the limitation of theory focused on-line education by visually introducing the practical utilization of an actual AVR 128. In this paper, the proposed educational content was provided to university students, and the results of student feedback show that it has a strong effect.

Gemological Characteristics of Rubies and Sapphires from Tanzania (탄자니아산 루비 및 사파이어의 보석광물학적 특성)

  • Park Hee-Yul;Sung Kyu-Youl
    • Journal of the Mineralogical Society of Korea
    • /
    • v.18 no.4 s.46
    • /
    • pp.313-323
    • /
    • 2005
  • XRD, XRF, EPMA, FT-IR, and SEM-CL studies were carried out in order to characterize gemological features of corundum from Tanzania. Fluorescence reaction of the Tanzanian corundum to short and long wave ultraviolet rays was weakly detected. Inclusions in Tanzanian corundum are divided into five types, Type I is fluid-rich inclusion, Type II is gas-rich inclusion, Type III is liquid $CO_{2}$ inclusion, Type IV is solid-rich inclusion, and Type V is a mixture of fluid and solid inclusion and daughter minerals. SEM-CL images show twin structure with growth texture, microphenocryst of spinel solid inclusions, massive and growth texture. Ruby and sapphire from Tanzania are distinctly distinguished by concentrations of Fe and Cr, and plotted in the particular field at $Al_{2}O_{3}/100-Cr_{2}O_{3}-Fe_{2}O_{3}$ diagram. According to FT-IR analysis, all corundum specimens from Tanzania showed the similar patterns, and absorption peaks of $455.09\~459.23\;cm^{-1},\;603.15\~611.71\;cm^{-1},\;1509.00\~1655.05\;cm^{-1}\;and\;3436.41\~3468.87\;cm^{-1}$. These distinctive characteristics mentioned above can be used to identify the locality and source of corundum stones from Tanzania.

Proposal on for Response System to International Terrorism (국제 테러리즘의 대응체제 구축방안)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.99-131
    • /
    • 2005
  • Terrorism which became today's common phenomena over the world is one of the most serious threats the world confront. Although International society make and operate outstanding anti-terrorism system, terror would never end without solving fundamental problems. The main body of terrorism converts from nation to organization and from organization to cell, which makes it difficult for us to recognize the main body. Since the target of today's new terrorism is many and unspecified persons, terrorists will never hesitate to use mass destruction weapons such as nuclear, biological, chemical weapons, and also use cyber-technique or cyber-terrorism. So, effective counter-terrorism measures should be performed as follows. First, it must be better for international society should make long-time plan of solving fundamental problems of terrorism other than to operate directly on terror organization and its means. Second, preventive method should be made. The most effective method of eradicating terrorism is prevention. For this, it is necessary to remove environmental elements of terrorism and terrorist bases, and to stop inflow of money and mass destruction weapons to terrorists. Third, integrated anti-terror organization should be organized and operated for continuous counter-terrorism operations. Also international alliance for anti-terrorism should be maintained to share informations and measures. Fourth, concerned department in the government should prepare counter-terrorism plans in their own parts as follows and make efforts to integrate the plans. - Ministry of Government Administration and Home Affairs : conventional terror - Ministry of Health and Welfare : bio-terror - Ministry of Science and Technology : nuclear-terror Especially, they should convert their policy and operation from post-terror actions to pre-terror actions, designate terror as national disaster and organize integrated emergency response organization including civil, government, and military elements. In conclusion, pre-terror activities and remedy of fundamental causes is the best way to prevent terror. Also, strengthening of intelligence activities, international cooperations, and preventive and comprehensive counter-measures must not ignored.

  • PDF