• Title/Summary/Keyword: cyber communication

Search Result 787, Processing Time 0.026 seconds

Regulatory Requirements Analysis for Development of Nuclear Power Plants Cyber Security Vulnerability Inspection Tool (원전 사이버 보안 취약점 점검 도구 개발을 위한 규제요건 분석)

  • Kim, Seung-Hyun;Lim, Su-Chang;Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.725-730
    • /
    • 2017
  • The use of general IT resources in the Instrumentation and Control system(I&C) for the safety of Nuclear Power Plants(NPPs) is increasing. As a result, potential security vulnerabilities of existing IT resources may cause cyber attack to NPPs, which may cause serious consequences not only to shutdown of NPPs but also to national disasters. In order to respond to this, domestic nuclear regulatory agencies are developing guidelines for regulating nuclear cyber security regulations and expanding the range of regulatory targets. However, it is necessary to take measures to cope with not only general security problems of NPPs but also attacks specific to NPPs. In this paper, we select 42 items related to the vulnerability inspection in the contents defined in R.G.5.71 and classify it into 5 types. If the vulnerability inspection tool is developed based on the proposed analysis, it will be possible to improve the inspection efficiency of the cyber security vulnerability of the NPPs.

A Study on the Scope of Protection for Freedom of Expression on Internet: Focused on the Analysis of Judicial Precedents on Cyber Conflicts (인터넷에서 표현의 자유 보호 법리에 관한 연구: 사이버 분쟁에 대한 법원 판례 분석을 중심으로)

  • Yun, Sung-Oak
    • Korean journal of communication and information
    • /
    • v.50
    • /
    • pp.29-49
    • /
    • 2010
  • Various opinions are expressed about the Internet Regulation. Some people argue that it is impossible to control because of the technical characteristics of Internet, while other people argue that it is easy to control. Recently in Korea, a move to reinforce the Internet Regulation through the extension of cyber real-name system is emerging, whereas the concern for its excessive infringement of the Freedom of Expression is increasing. This paper was intended to draw a reasonable direction for Internet Regulation in our society. And accordingly this paper tried to suggest a desirable direction of Internet Control in the future and to draw a criterion for domestic court judgement by analyzing cases of cyber defamation so far. The result of this study proposed that the Freedom for Expression be widely secured in the case of cyber defamation of criticism and political comments upon public officials and that the legitimacy and effectiveness of Internet Regulation be ensured. This result of study is expected to help establish the direction and principle of Internet Regulation in the future around Korea Communications Commission and Korea Communications Standards Commission.

  • PDF

A study on the Establishment of a Digital Healthcare Next-Generation Information Protection System

  • Kim, Ki-Hwan;Choi, Sung-Soo;Kim, Il-Hwan;Shin, Yong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.57-64
    • /
    • 2022
  • In this paper, the definition and overview of digital health care that has emerged recently, core technology, and We would like to propose a plan to establish a next-generation information protection system that can protect digital healthcare devices and data from cyber attacks. Various vulnerabilities exist for digital healthcare devices and data, and cyber attacks are possible for those vulnerabilities. Through an attack on digital health care devices and information and communication networks, it can directly adversely affect human life and health, Since digital healthcare data contains sensitive and personal information, it is essential to safely protect it from cyber attacks. In the case of this proposal, for continuous safe management of data and cyber attacks on equipment and communication networks for digital health devices, It is expected to be able to respond more effectively and continuously through the establishment of the next-generation information protection system.

Digital Camera Consumers' Self-Expression and Communication in Cyberspace Using Ethnographic Interviews (가상공간에서의 디지털 카메라 소비자의 자기표현과 의사소통 :문화기술적 방법을 이용하여)

  • Lee, Mee-Hye;Yoon, Jung-Hai
    • Journal of Families and Better Life
    • /
    • v.25 no.2 s.86
    • /
    • pp.71-87
    • /
    • 2007
  • It is necessary to understand a self-expression and communication in cyberspace using digital photography We have studied the digital camera consumer's self-expression and communication skills and strategy through ethnographic interviews. In this study, we have used ethnographic interviews of 7 informants who had personal web site and are using digital cameras. As a result, It has turned out that informants expressed their self taking pictures of their daily life, friends, and family. Also they imply meaning and feeling in the pictures that had been taken to express their lives. The communication in cyberspace has turned out that informants communicate with other people with digital pictures to show their life. They communicated each other and give information. It means that they made information by themselves to give and share with other people as prosumer. Digital photography to express themselves and communicate in cyberspace enhanced human relationship that had made in cyber space. And it helps to form their self identity. They express their cyber identity with digital photography and it is similar to their self identity that expresses in real life.

Future Cyber Information Warfare (사이버 정보전 준비 해야)

  • 오제상
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.31-35
    • /
    • 2001
  • Currently if we are to make a thought to depend on our fast developing information technology, a future war is necessarily to be made a situation of a cyber information warfare. A attacker in the cyber information warfare is able to make attack a military or a civil information and communication system, especially if a attack of a hacker, a virus or a electromagnetic pulse bomb at a military C4ISR system is able to make a confusion or a interruption in military operations, they are available to attack as a real time with non restrictions of physical distance, time, weather and space. While a expenditure of carrying out the cyber information warfares is the lowest expenditure, a effect of carrying out the cyber information warfares is the greatest effect in side of a interruption of information, a confusion, a terror, a pillage and crime of the people. This paper is to introduce "weapons of cyber information warfares", "offence capability of cyber information warfares about several nations" and to propose "a cyber information warfare organization" or the future knowledge warfare. the future knowledge warfare.

  • PDF

Services analysis and improvement of MKE(Ministry of Knowledge Economy) Cyber Security Center (지식경제사이버안전센터의 대응활동분석과 개선방안)

  • Lee, Seung-Won;Roh, Young-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.249-258
    • /
    • 2012
  • Cyber attacks expose sensitive information and cause fatal damage in both the public and the private sectors. Therefore, MKE (Ministry of Knowledge Economy) Cyber Security Center was founded on July 25, 2008, to perform three major roles. First, it detects and analyzes cyber attacks for the both sectors. Second, its ISAC (Information Sharing & Analysis Center) service analyzes and evaluates the vulnerability of the communication and network infrastructure to security threats, including control systems. Third, it provides CERT/CC (Computer Emergency Response Team Coordination Center) service to prevent and to respond to computer security incidents. This study focuses on the MKE Cyber Security Center's service analysis, which is playing an increasingly larger role in the both sectors. Based on this analysis, after grasping the response services activity and pointing out the problems, this study suggests improvements to the MKE Cyber Security Center.

An Intelligent Game Theoretic Model With Machine Learning For Online Cybersecurity Risk Management

  • Alharbi, Talal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.390-399
    • /
    • 2022
  • Cyber security and resilience are phrases that describe safeguards of ICTs (information and communication technologies) from cyber-attacks or mitigations of cyber event impacts. The sole purpose of Risk models are detections, analyses, and handling by considering all relevant perceptions of risks. The current research effort has resulted in the development of a new paradigm for safeguarding services offered online which can be utilized by both service providers and users. customers. However, rather of relying on detailed studies, this approach emphasizes task selection and execution that leads to successful risk treatment outcomes. Modelling intelligent CSGs (Cyber Security Games) using MLTs (machine learning techniques) was the focus of this research. By limiting mission risk, CSGs maximize ability of systems to operate unhindered in cyber environments. The suggested framework's main components are the Threat and Risk models. These models are tailored to meet the special characteristics of online services as well as the cyberspace environment. A risk management procedure is included in the framework. Risk scores are computed by combining probabilities of successful attacks with findings of impact models that predict cyber catastrophe consequences. To assess successful attacks, models emulating defense against threats can be used in topologies. CSGs consider widespread interconnectivity of cyber systems which forces defending all multi-step attack paths. In contrast, attackers just need one of the paths to succeed. CSGs are game-theoretic methods for identifying defense measures and reducing risks for systems and probe for maximum cyber risks using game formulations (MiniMax). To detect the impacts, the attacker player creates an attack tree for each state of the game using a modified Extreme Gradient Boosting Decision Tree (that sees numerous compromises ahead). Based on the findings, the proposed model has a high level of security for the web sources used in the experiment.

Exploratory Analysis of Cyber Community for Elementary School Children (초등학생을 위한 사이버 커뮤니티의 교육적 활용 방안에 관한 탐색적 연구)

  • Han, Kwang-Hyun;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.2
    • /
    • pp.69-78
    • /
    • 2002
  • Cyber school community appears to have essentially emerged from the needs for interactive communication, which would not be easy in normal school environments. Message board, chatting rooms and e-mails allow students to connect with each others, share news, find ways to help study, or post personal stories. The purpose of this paper is to give a set of guidelines, based upon the direct observations and questionnaire analysis, for utilizing the cyber school community of elementary school children. The following conclusions are provided; the appropriate ate goal needs to be set before the cyber school community is to be developed; the balance between the off-line and on-line interaction needs to be maintained; actions for motivating students to participate in the cyber community need to be taken by teachers.

  • PDF

A substantial study on the Relationship between students' variables and dropout in Cyber University (사이버대학 학습자관련 변인과 중도탈락 간의 관계 규명을 위한 실증적 연구)

  • Im, Yeon-Wook
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.2
    • /
    • pp.205-218
    • /
    • 2007
  • This study investigates the reasons of dropout in a survey of 348 dropouts from a cyber university located in Seoul, Korea. Most common reasons are time constraints due to work or family-related needs. Difficulties in adjusting to online learning environment and uncertainties regarding the value of a cyber university degree also played important roles. Drop-out students who pointed to these two reasons also suffered from lack of communication and interaction with other students and professors. Efforts to address these issues are in order as well as the development of time-efficient learning strategies and financial aids.

  • PDF

Learner's Satisfaction Survey and Analysis in the University Cyber Education (대학 사이버 교육에서 학습자의 만족도 조사 및 분석)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1476-1481
    • /
    • 2010
  • Cyber education community in the digital era is going on across all areas of knowledge accumulation rate of acceleration of the demand for retraining and lifelong learning can effectively accommodate. Therefore, new teaching methods in the future as consumer-driven 21st century is expected to settle into the main education system. However, to properly interact with people due to lack of feedback delay, reading and writing intensive courses is detrimental to the environment caused by a particular student, and Computer skills are based on computer-related technology to disadvantage poor students, and many have problems. In this paper, recent university education and cyber education requires a paradigm shift is required in an environment that factors affecting students' satisfaction were evaluated, and Improvement of cyber education will be studied.