• Title/Summary/Keyword: cyber electronic

Search Result 304, Processing Time 0.025 seconds

A Study on Analysis of Cyber Security Companies Superiority-securing strategy in Competition and Problem-solving Strategy (국내 사이버 증권사의 경쟁우위 전략요인 및 문제점 분석에 관한 연구)

  • 양경훈;김도일;이태호;송병희
    • The Journal of Society for e-Business Studies
    • /
    • v.5 no.2
    • /
    • pp.1-25
    • /
    • 2000
  • The utilization of Internet, which started only at the level of advertisement, has been gradually expanding its application areas as the trial commercial transaction becomes successful, the password-coding technology which removes the risks on the cyber transaction develops, the electronic money appears and other various related technologies progress. Following this trend the securities industry has been experiencing changes along with efforts to use it commercially. This study is to analyze the work of cyber securities companies on the basis of the theoretical background through preceding studies and literature and also analyze the common and different reasons for superiority-securing strategy in competition along with problems and their reasons. And also the objective of this study is to offer new superiority-securing strategy in competition and problem-solving strategy.

  • PDF

A Study on Analysis of Cyber Security Companies Superiority-securing strategy in Competition and Problem-solving Strategy (국내 사이버 증권사의 경쟁우위 전략요인 및 문제점 분석에 관한 연구)

  • 양경훈;김도일;이태호;송병희
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.289-296
    • /
    • 2000
  • The utilization of Internet, which started only at the level of advertisement, has been gradually expanding its application areas as the trial commercial transaction becomes successful, the password-coding technology which removes the risks on the cyber transaction develops, the electronic money appears and other various related technologies progress. Following this trend the securities industry has been experiencing changes along with efforts to use it commercially. This study is to analyze the work of cyber securities companies on the basis of the theoretical background through preceding studies and literature and also analyze the common and different reasons for superiority-securing strategy in competition along with problems and their reasons. And also the objective of this study is to offer new superiority-securing strategy in competition and problem-solving strategy.

  • PDF

An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.35-42
    • /
    • 2019
  • In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system's attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.

A Study on Vulnerability of Cyber Electronic Warfare and Analysis of Countermeasures for swarm flight of the NBC Reconnaissance Drones (화생방 정찰 드론의 군집비행 시 사이버전자전 취약점 및 대응방안 분석)

  • Kim, Jee-won;Park, Sang-jun;Lee, Kwang-ho;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.133-139
    • /
    • 2018
  • The 5 Game changer means the concepts of the army's operation against the enemy's asymmetric threats so that minimize damage to the public and leads to victory in war in the shortest time. A study of network architecture of Dronebot operation is a key study to carry out integrated operation with integrated C4I system by organically linking several drones battle groups through ICT. The NBC reconnaissance drones can be used instead of vehicles and humans to detect NBC materials and share situations quickly. However, there is still a lack of research on the swarm flight of the NBC reconnaissance drones and the weaknesses of cyber electronic warfare. In this study, we present weaknesses and countermeasures of CBRNs in swarm flight operations and provide a basis for future research.

  • PDF

DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION (전자증거 관리시스템의 설계)

  • 김종섭;하옥현;김귀남
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2001.05a
    • /
    • pp.275-280
    • /
    • 2001
  • DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION Digital evidence will be used as a term, which means the electronic form of information which is necessary to confirm or prove the factum of all kinds of behaviors committed through the devices which have data processing ability including computer. It is expected that there will be the increase of legal conflicts surrounding electronic commerce activities as well as the increase of cyber crimes, as the number of Internet users are getting bigger. In order to solve the problems of conflicts derived from electronic commerce, the factum of electronic commerce activities must be confirmed. In order to confirm the factum of electronic commerce activities, the evidence is prerequisite. Almost all evidences relating to the electronic commerce activities exist in digital form. For the reason that the digital evidence can be easily damaged and changed, special management is required to collect, analyze, and preserve the digital evidence. In order to meet this requirement, this study proposes a basic model of digital evidence management system applying computer forensics and electronic authentication.

  • PDF

Conference Review on Electronic Payment of Cyber Trade (Cyber 무역의 전자결제에 관한 논의 동향)

  • Park, Chong-Don;Kang, Chang-Nam;Lee, Je-Hong
    • International Commerce and Information Review
    • /
    • v.2 no.1
    • /
    • pp.1-28
    • /
    • 2000
  • IT 혁명으로 전자적인 활동이 전 사회의 중심 축으로 이루어지고, 또한 컴퓨터를 이용한 정보처리와 통신기술의의 눈부신 발달에 힘입어 기업의 Business에 커다란 변화를 초래하게 되었다. 특히, 인터넷이라는 환경하에서 전자상거래는 급속하게 성장하고 있으며, 기업은 전자상거래 모델을 앞다투어 개발하면서 새로운 E-Business 환경을 수용하고 있다. 또한 기업은 무역업무에 이러한 전자상거래를 도입하면서 국제간 거래의 활성화를 위해 노력하고 있지만, 국채간 사이버 무역이 안고 있는 여러 가지 애로점을 가지고 있다. 그 중에서 국제간 전자결제에 과한 문제이다. 인터넷을 이용한 무역업무를 실행시키고, 활성화하기 위한 하나의 결제방안을 제시해 보면 제3자에 의한 결제 시스템으로서 인터넷 서비스 제공업자, S/W 개발업체, 은행과 신용카드회사를 비롯한 금융기관 등은 결제시스템을 구축하는 방안이 강구될 수 있다. 또한 이 시스템에서는 다양한 판매자의 제품을 소개하고 일정 시간간격 또는 특정 구매자의 총누적 거래대금이 일정수준에 이를 때에 결제함으로써 신용카드를 지불수단으로 사용하는 경우에도 소액거래를 지원할 수 있다. 또한 전자결제제도가 성립되기 위해서는 전자자금거래의 규제를 위한 법 제도적인 측면의 정비가 시급하다. 따라서 각종 거래의 결제에 관한 법적관계는 물론 금융관련 법률을 기본으로 하여 새로운 접근방안을 마련해야 할 것이다. 이와 같은 사항들을 고려함으로써 사이버 환경의 활성화를 도모할 수 있다.

  • PDF

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

Cyber trade : ROADMAP for success (사이버무역의 성공적인 수행을 위한 ROADMAP 구축)

  • Cho Won-Gil
    • The Journal of Information Technology
    • /
    • v.6 no.3
    • /
    • pp.169-188
    • /
    • 2003
  • Roadmap of cyber trade offers members the opportunity to interact electronically with like-mined individuals and to both create and buyer relevant to a topic of interest. Roadmap of cyber trade was conduct on the economic effect of electronic commerce according to the method of constructing the Internet. Firms using cyber trade have difficulty enjoying a uniformly identical effect. That is, since the improvement effect of the intrafirm business method, unnecessary repeated manual paperwork and the use effect of being able to maintain the close relationship with to the parties to trades in the process of prompt receipt and delivery of documents are long-term and indirect effects, they have some limitation in that they can not be measured as coefficients but only as scales. In terms of business management, the intensification of corporate competitiveness improved by $10.00\%$ in case of less than 10 times and by $11.53\%$ in case of 50 to less than 50 times. And it was found that the effect of profit increase as the number of inquiries was large. That is, it was found that the effect of profit increase was $10.88\%$ when the number of inquiries was less than 10 times but it increased to $14.00\%$ in case of 50$\∼$less than 100 times. Therefore, to revitalize cyber trade, it is thought that government, the academic community and the business world all need to make much research into and sustained investment in cyber trade.

  • PDF

A Study on the Construction of an Ideal Internet Fashion Cyber Mall Focused on Web Design, Merchandising and Management

  • Hong, In-Sook;Ryu, Jin-Kyeung;Park, Eun-Jung;Lee, Kyung-Ah;Lee, Keum-Hee;Kim, Moon-Sook
    • The International Journal of Costume Culture
    • /
    • v.3 no.3
    • /
    • pp.201-211
    • /
    • 2000
  • The purpose of this study is to pinpoint currently arising issues concerning cyber fashion mall by analysing present status and contents of its web design, management and planning within the limits o business to customer (B2C) commerce, and to suggest a direction for building an ideal fashion mall on the internet. As for the study method, conceptual definitions were given based on previous studies. And a positive study was implemented, in which the cases of 23 chosen cyber fashion malls among 60 or so domestic and foreign malls selling fashion products were found by internet search engines and analysed. Results of the case analysis of cyber fashion malls are as follows : 1) cybermall must provide customers with an integrated service as well as e-commerce. 2) various products assortment and price differentiation must be developed, 3) the techniques of graphics, coloring and texturing, and layout design must be adopted to process and express product information, 4) the legislative system is needed to deal with the security, and 5) design and management of customer oriented interface are needed to process and express product information matter of electronic payment and customer protection. Considering the issues in internet fashion cybermalls, are suggested the important factors that are necessary or web design, planning and management to build an ideal cyber fashion mall. These results will contribute to the development of fashion e-commerce.

  • PDF

Developing Self-awareness Through Cyber Study and Cyber Reading Activities: A Case Study with the Electronic Library 'Booktoby' (사이버 학습을 활용한 학생의 자아정체성 확인에 관한 연구: 북토비 사례를 중심으로)

  • Kang, Hyon-Sook
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.485-494
    • /
    • 2014
  • This study has been conducted with $1^{st}$ grade elementary students where the purpose was to develop students' interest in themselves and to cultivate their self-awareness as the first step toward establishing a suitable course and career for their start-up features. Students have conducted the cyber study through "Incheon e-School" and cyber reading "Booktoby" and recorded three types of outcomes - affective self-awareness, social self-awareness and intelligence self-awareness - on each side of the Pyramid, thus constructing their own self-awareness pyramids of the system. According to the results, after such activities were undertaken during the $1^{st}$ semester, their opinion toward their self-control and study ability has improved as much as about 67% compared to that of the beginning of the last semester. Regarding the effects of cyber reading, their interest, spontaneity and understanding toward reading books have also improved as much as 54% and 50%, 33% respectively along with positive answers of as much as 75% with regard to self-awareness. When it comes to the results of the SCI-II test (used to evaluate self-awareness), the total average has improved by as much as 3 points and the three components of self-awareness - affective, social, and intelligence - have improved by as much as 4points, 1point, and 5points, respectively.