• Title/Summary/Keyword: cyber electronic

Search Result 304, Processing Time 0.023 seconds

Prevention Methods of Cyber-crimes using the Private Security (민간경비를 활용한 사이버범죄 예방 방안)

  • Kim, Sang-Woon;Jo, Hyun-Bin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.141-151
    • /
    • 2013
  • With the spread of Personal Computers(PC) in the 1980's, many people started to deal businesses with PC. From late 1990's, the Internet age with PC have started and many people have showed keen interest in cyber-space and now they are utilizing it. Since 2000's the use of cyber-space have skyrocketed and it caused significant changes to humans' life. There was a huge prosperity to us but the new kind of crime, cyber-crime, was raised. Unlike past physical type of crimes, those cyber-crimes take place in the cyber-space and they have special features of non-facing, anonymity, specialty, technologic, repetition, continuation. Those cyber-crimes are continually growing since 2003 and in 2010 it almost doubled compared to 2003. General cyber-crimes like phishing-scam pornography circulation was most of them and notably perpetrators of them are younger generation. Recently cyber-crimes are showing the trend of advancing more and more and cyber-bullying, fraud like phishing scam are on the rise. The police are responding by making 'Cyber Terror Response Center', but it does not work effectively with the problems of breakup of prevention and investigation unit, procedure of investigation and the system itself. So, I suggest practical use of private security to remedy our police's weakness and to prevent cyber-crimes. Preventing solutions of cyber-crime with private security are physical defense of large-scale servers and vital computers, building of Back-up system to prevent vital data loss, and building of cyber-crime preventing system combining software and hardware.

A Study on Improving Cyber Liability Insurance for Electronic Financial Incident in Easy Payment System (간편결제 서비스에서 전자금융사고 시 국내 사이버 배상책임보험의 한계 및 개선방안에 대한 연구)

  • Lee, Han-Jun;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2016
  • A convergence of finance and information technology brought a remarkable development in Fin-Tech industry. On the other hand, currently existing laws seemed inappropriate to address the liability of financial institutions, Fin-tech enterprises and consumers in case of financial accidents due to its ambiguity. The minimum insurance obligation by financial institutions specified under the Electronic Financial Transaction Act 2006 is not keeping with current reality, considering transaction volume, frequency of incidents, and security investments. This paper aims to lay stress on the need of cyber liability insurance by understanding the domestic financial incidents and management, and the limit of existing insurance policy.

Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities (보안책임과 규제가 기업의 보안활동에 미치는 영향 분석)

  • Shim, Woo-Hyun
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.53-73
    • /
    • 2011
  • Many governments have tried to develop a liability and compliance law that can improve cyber security in a sustainable way. This paper explores whether a liability and compliance law is effective in motivating firms' information security activities. In particular, I empirically investigate the impact of the 2007 Electronic Financial Transaction Act (EFTA), a liability and compliance law in Korea, on the information security activities of financial institutions and services providers. In spite of various criticisms of the effectiveness of EFTA, the empirical findings of this study clearly show that EFTA is having a positive impact on information security activities. From these findings, this article concludes that a liability and compliance law is likely to contribute to a certain degree to the achievement of sustainable development of cyber security.

Hacking Detection Mechanism of Cyber Attacks Modeling (외부 해킹 탐지를 위한 사이버 공격 모델링)

  • Cheon, Yang-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.9
    • /
    • pp.1313-1318
    • /
    • 2013
  • In order to actively respond to cyber attacks, not only the security systems such as IDS, IPS, and Firewalls, but also ESM, a system that detects cyber attacks by analyzing various log data, are preferably deployed. However, as the attacks be come more elaborate and advanced, existing signature-based detection methods start to face their limitations. In response to that, researches upon symptom detection technology based on attack modeling by employing big-data analysis technology are actively on-going. This symptom detection technology is effective when it can accurately extract features of attacks and manipulate them to successfully execute the attack modeling. We propose the ways to extract attack features which can play a role as the basis of the modeling and detect intelligent threats by carrying out scenario-based modeling.

Fish Schooling Simulator Using Crowd Behavior Patterns (군중 행동 패턴을 이용한 Fish 군중 시뮬레이터)

  • Kim, Jong-Chan;Cho, Seung-Il;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.2
    • /
    • pp.106-112
    • /
    • 2007
  • Recently the crowd environment in the department of the animation is necessary to the digital industry. The goal of researching a proper crowd animation is to design character animation that is defined by the reality of scenes, performance of system and interaction with users to show the crowd vividly and effectively in cyber underwater. It is important to set up the crowd behavior patterns to represent for moving crowd naturally in cyber space. In the paper, we expressed the behavior patterns for flocks of fish in cyber underwater, and compared with the number of mesh, the number of fish, the number of frame, elapsed time, and resolution and analyzed them with the fish behavior simulating system.

  • PDF

A Study of International Confrontation on the Prevention of Cyber Crime (사이버범죄에 대한 국제적 대응방안)

  • Jeong, Jeong-Ile
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.323-354
    • /
    • 2005
  • As with the vast array of computer technology and its rapid development, along with the entry of the internet as one of the necessities of life, the so-called cyber space has become a vital component of our modern day living. While such cyber space has provided the society with much convenience and utility as to the gathering and acquiring of information, crimes involving cyber space has accordingly increased in both number and form, Nevertheless, the conventional law as existed before the development of the cyber space were unable to meet the demands of this new breed of crime, which inevitably led to the gap in the government ability to punish such criminals, Thus, in response to the rising number of cyber crimes, a large number of nations have either created or is in the process of committing human and financial resources to strengthen the investigative powers relating to cyber crimes and creating a new area of prohibiting such crimes. As a overview of cyber crime, (1)defines the terms, describes features of cyber crime, (2)explains the international prevention necessity of cyber crime, and (3)the necessity of legislating the cyber crime Fundamental Act (4)the recognition of the evidential values on the confiscated electronic records and reviews types of cyber crime including cyberterror. Lastly, emphasizes necessity on international cooperation for prevention of cyber crime as usual.

  • PDF

Information Security and Its Aapplications on the Portal of the Deanship of Library Affairs at Northern Border University

  • Al Eawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.183-188
    • /
    • 2021
  • The study aimed to assess the state of electronic security for the website of the Deanship of Library Affairs at Northern Border University, as one of the university's electronic portals, which provides distinguished knowledge services to faculty members, through the Saudi Digital Library, and the integrated automated system for libraries (Symphony) with the definition of cyber security of the university, and the most important threats The study sought to analyze the opinions of a wide sample of faculty members, towards evaluating the state of electronic security for the Deanship of Library Affairs portal, through the use of both the analytical method, as well as the survey, using the questionnaire tool, and the study sample consisted of 95 A faculty member of all academic categories and degrees, and university faculties, and the study concluded that it is necessary to work to overcome the relative slowness of the university's Internet, with the faculty members notifying the information security services through e-mail and SMS service, with the continuous updating of operating systems, Apply and use the latest anti-spyware, hacking, and antivirus software at the university, while conducting extensive research studies towards information security services, and contracting It aims to introduce information security risks, and ways to combat and overcome them, and spread the culture of information security among faculty members.

A Study on Cyber Security Requirements of Ship Using Threat Modeling (위협 모델링을 이용한 선박 사이버보안 요구사항 연구)

  • Jo, Yong-Hyun;Cha, Young-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.657-673
    • /
    • 2019
  • As various IT and OT systems such as Electronic Chart Display and Information System and Automatic Identification System are used for ships, security elements that take into account even the ship's construction and navigation environment are required. However, cyber security research on the ship and shipbuilding ICT equipment industries is still lacking, and there is a lack of systematic methodologies through threat modeling. In this paper, the Data Flow Diagram was established in consideration of stakeholders approaching the ship system. Based on the Attack Library, which collects the security vulnerabilities and cases of ship systems, STRIDE methodologies and threat modeling using the Attack Tree are designed to identify possible threats from ships and to present ship cyber security measures.

A Study on the Necessity of Cybersecurity Legislation and Policies in Response to the Use of EFB by Flight Crew (운항승무원 전자비행정보장치(EFB) 사용에 따른 사이버보안 법률 및 정책 필요성 연구)

  • Minho Kang;Sanghoon Jeon;Howon Hwang
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.4
    • /
    • pp.72-81
    • /
    • 2023
  • The use of EFB (Electronic Flight Bag) has expanded, providing convenience to flight crews by minimizing paper usage within aircraft and offering the latest information, operability, and convenience related to aircraft operations. EFBs provide flight-sensitive information such as aircraft performance calculations, airport diagrams, routes, and approach procedures. For these information, EFBs connect to the cyber environment through Wi-Fi or self-contained data communication, allowing access to cloud-based systems for information updates, with administrators uploading the latest information for retrieval. However, in contrast to the evolving aviation technology, there is currently no legislation or security policy in place to maintain the security of EFBs, leaving them exposed to potential cyber threats. Therefore, improvements such as revising relevant laws to address potential cyber threats targeting EFBs and establishing and implementing EFB management systems are necessary. This paper aims to present the necessity for amending laws related to EFB security in response to cyber threats and suggests methods for enhancement.

The Effects of Cyber Education in RN-BSN's Courses (RN-BSN 과정에서 사이버교육의 효과)

  • Kim, Hee-Soon;Oh, Ka-Sil;Lee, Kyung-Ja;Chang, Hwa-Kyoung
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.9 no.2
    • /
    • pp.212-221
    • /
    • 2003
  • The purpose of this study was to evaluate the effects and define the educational strategies of the cyber education offered to students for Bachelor of Science degree program(RN-BSN). The participants in this study were 67 students in two courses, Growth and Development, and Nursing Process. The main components of the cyber classes were the electronic board and on-line discussion board. The study was conducted from March 4, 2001 to July 23, 2001 at Y University in Seoul, Korea. To examine the effects of the cyber education, learning motivation, and learning satisfaction were measured by questionnaires to the students before the initial class and after completing the class. Learning achievement was measured by the grades for each course. The data were analyzed using frequencies, t-test, and paired t-test. The specific results of the course evaluation were compared and analysis was done to examine differences between traditional classroom teaching and cyber teaching. The study results are as follows: 1. There were no significant differences on total scores for learning motivation between pre-cyber education and post-cyber education. However, there were significant decreases in the post test compared to the pre test for the items, ' I'd like to get as high a score as possible compared to other students (t=-2.20, p=.03)' and ' I'm sure to acquire good grades(t=-5.22, p=.00) '. 2. The average score for learning satisfaction using cyber education was high at 3.52. 3. To define learning achievement using cyber education, grades for students taking cyber classes this year were compared to student grades for a class using traditional lassroom teaching last year. The score was significantly higher for classroom students in the 'Growth and Development' course (t=-3.5, p<.001), and the score was significantly higher for the cyber education students in the 'Nursing Process' course (t=4.3, p<.000). 4. The average of post scores on computer competency was significantly higher on six items, general knowledge about computers, data management and data research, ability to communicate using computer, and internet surfing. On the basis of the above findings, this study suggests that cyber education in nursing courses is effective and readily available. However, it is recommended that consideration be given to characteristics of the course when developing cyber education programs for nursing courses.

  • PDF