• Title/Summary/Keyword: cyber society

Search Result 2,480, Processing Time 0.032 seconds

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.24-45
    • /
    • 2012
  • In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.

Analysis on Cyber Security and Its Challenges to Society

  • Shashank Mishra;Raghav Sandhane
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.141-152
    • /
    • 2024
  • Cyber security plays an important role in the field of IT industry and other industry too. Whenever we talk about cyber security, the word cybercrime pops out. Cybercrime is the biggest issues we are facing right now. Every 39 seconds an attacker is hacking something. Since 2008 to 2019 there are more than 8800 data breach cases is being found or filed. Even as we are aware of cybercrime and its stats, only 5% organization are fully secured and other 95% are not fully secured. According to survey 56% organization have weak controls. Basically they are not secured. Apart from taking measures cyber security are facing huge challenges or disturbs to many. This paper mainly focuses on dare to cyber security and also center of attraction is cyber security expertise, morals with changing in technology with time. [1]

Platform design and source coding of AI responsive AR business cards (AI 반응 AR명함의 Platform 설계 및 Source Coding)

  • Choi, Su-Youn;Han, Su-Yeon;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.4
    • /
    • pp.489-493
    • /
    • 2020
  • The technological development of the Fourth Industrial Revolution is accelerating the development of the world and society. Fourth industrial technology is connected to Cyber World to develop national and social infrastructure. The application of the fourth industrial technology can create Cyber-city and Cyber-life systems. In the ICT business industry that connects Cyber with the real world, we need to connect Cyber with real-life work. It is to use AR business cards as one of the ways to connect Cyber business with real business. When an AR business card is recognized as a smartphone, a 3D character appears to introduce the main character of the business card. In addition, AR business cards are reflected in AR for product and service of business operators, enabling promotion of products, services, etc. Using connected wired and wireless 5G communication, real-time e-commerce is also possible. In this paper, AR business card will be produced with Source Coding and AR business card platform will be designed.

A Study on an Extended Cyber Attack Tree for an Analysis of Network Vulnerability (네트워크 취약성 분석을 위한 확장된 사이버 공격 트리에 관한 연구)

  • Eom, Jung Ho;Park, Seon Ho;Chung, Tai M.
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.49-57
    • /
    • 2010
  • We extended a general attack tree to apply cyber attack model for network vulnerability analysis. We defined an extended cyber attack tree (E-CAT) which extends the general attack tree by associating each node of the tree with a transition of attack that could have contributed to the cyber attack. The E-CAT resolved the limitation that a general attack tree can not express complex and sophisticate attacks. Firstly, the Boolean expression can simply express attack scenario with symbols and codes. Secondary, An Attack Generation Probability is used to select attack method in an attack tree. A CONDITION-composition can express new and modified attack transition which a aeneral attack tree can not express. The E-CAT is possible to have attack's flexibility and improve attack success rate when it is applied to cyber attack model.

국내 17개 사이버대학교 웹사이트 평가 및 개선방안 연구

  • Mun, Tae-Eun;Mun, Hyeong-Nam
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2007.05a
    • /
    • pp.111-120
    • /
    • 2007
  • Recently the importance of website becomes confident in realizing the long distance education (teleeducation) as web. The purpose of this research is evaluating the websites of cyber university and analyzes web usability and web accessibility and analyzes to suggest the good quality content and several personalized service. Also we tried to improve website quality and contribute the reliability of the long distance education with all these. For these we applied the of professor Hyung Nam Moon's SM-ABCDE website evaluation model and developed the check list suitable for cyber university and evaluated websites in the five views of Attraction, Business, Content, Design, Engineering. Totally Kyunghee Cyber University, Busan Digital University, Hanyang Cyber University is selected best in sequence. But every website doesn't keep the basic observation rule of the web accessibility.

  • PDF

Automatic malware generation system design using EA (진화알고리즘을 이용한 악성코드 자동생성 시스템 설계)

  • Kwon, Se-Hoon;Kown, Jae-Yeong;Lee, Seung-Hun;Lee, Hyun-Woo;Lee, Jong-Rak;Won, Il-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.193-196
    • /
    • 2017
  • 본 연구는 기존의 변종 악성코드와는 달리 진화알고리즘을 기반으로 한 악성코드 자동 생성 프레임워크에 대한 것이다. 우리가 제안하는 시스템은 소스가 알려지지 않는 바이너리 상태의 악성코드를 역공학적 기법을 이용하여 소스 상태로 복원하고 복원된 소스를 이용하여 다양한 변종 악성코드를 생성하는 것이다. 진화 연산을 적용하기 위해 평가함수의 설계가 중요한데, 우리는 행동 기반 분석 기반의 평가 함수를 포함하는 프레임워크를 제안하였다.

Dance Costumes Design for "Adieu 1999" - Focused on the Techno-Cyber Fashion - (현대무용 "아듀 1999"의 무용의상 디자인 - 테크노-사이버 패션 응용을 중심으로)

  • 정삼호;이은규;이현정;서지성
    • Journal of the Korean Society of Costume
    • /
    • v.53 no.7
    • /
    • pp.1-7
    • /
    • 2003
  • The purpose of this study contains evaluation of techno-cyber fashion, specifically in the area of dancing costume which symbolize the stage performing art of techno-cyber fashion's formative elements. The way of study is to make foundation with the theory and picture backgrounds to analyze the fashion trends and finally produce symbolic dance costume which applies modern dance stage costume design to techno-cyber elements. The 'Adieu 1999' is the modern dance work contains social mood in retrospect of 20 century and prepare 21 century. To make design of dance costume, apply the simple geometrical pattern design which utilize techno-cyber element like hi-tech fabrics, see-through and image of band and finally produce costume both 20 and 21 century.

A Countermeasures on the Cyber Terror for the National Key Organizations (정부 주요기관에 대한 사이버 공격의 대처 방법)

  • Lee, Young-Gyo;Park, Joong-Soon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.39-47
    • /
    • 2008
  • As internet is spreaded widely, the number of cyber terror using hacking and virus is increased. Also the international cyber terror to the national key organizations go on increasing. If the national key organizations is attacked by the attack, the national paper, document and records are exposed to the other nations. The national paper, document and records can give damage to the nation. Especially, the unknown attack can give much damage to the nation. Therefore, this paper suggested a countermeasures on the cyber terror for the national key organizations provided the inner of the organization is safe. The uneffective item and invasion privacy item are included among the countermeasures. However the countermeasures can protect only one cyber terror to the national key organizations.

Study on Cyber Fashion for the Proposal of the Future Fashion (미래 패션 제안을 위한 사이버 패션 연구)

  • Lee, Su-Aa;Park, Hyun
    • Fashion & Textile Research Journal
    • /
    • v.1 no.3
    • /
    • pp.239-245
    • /
    • 1999
  • The purpose of this study is to suggest the direction of the future fashion by grasping the cyber fashion, which is discussed outstandingly in the recent fashion world, into internal expression and external features. The result of this study is as follows: Cyber fashion means the application of the electronic image, dynamic phenonmenon of machine, and the effects of light to fashion, and it has some external features of geometrical pattern, dynamic structure, and high-tech material and color: Aside from this noticeable characteristics, cyber fashion has some internal features of the direction toward future, the anti-culture, and the surreal. In this cyber fashion, first, computer will be introduced and used as the means to realize a dream of human being. Second, it will be designed with the ideal feature of future society. Third, it will be possible to develope material and design to solve ecological issue of human beings. Fourth, the fashion to give the peace and stability to human being will be popular.

  • PDF

A Poisonous Plants Classification System Using Data Augmentation And Transfer Learning (데이터 확장과 전이학습을 이용한 독초 분류 시스템)

  • Kim, Min-Je;Lee, Su-Min;Park, Ju-Chan;Lee, Hye-Won;Kwon, Chan-Min;Won, Il-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.660-663
    • /
    • 2018
  • 최근 5년간 식용 나물과 독초를 구별하지 못한 채 섭취하여 다수의 환자가 발생하였다. 본 논문에서는 인체에 치명적인 결과를 일으킬 수 있는 독초를 CNN을 통해 분류하는 시스템을 제안한다. 부족한 양의 샘플 데이터는 데이터 확장 기법을 통해 확보하였고, 연구에 사용된 하드웨어의 한계를 극복하기 위해 전이학습을 적용하였다. 실험은 데이터 확장과 전이 학습 적용 여부에 따라 4가지 유형별로 진행되었으며, 각 유형은 20회씩 반복한 테스트의 결과를 종합하여 평균을 내었다. 이와 같은 실험에서 의미 있는 결과를 얻었다. 본 논문의 시스템을 이용한 독초 섭취 사고의 예방이 기대된다.