• 제목/요약/키워드: cyber-university

검색결과 2,795건 처리시간 0.041초

원전 계측제어시스템에 대한 사이버보안성 평가 방법론 개발 (Development of Cyber Security Assessment Methodology for the Instrumentation & Control Systems in Nuclear Power Plants)

  • 강영두;정길도
    • 한국산학기술학회논문지
    • /
    • 제11권9호
    • /
    • pp.3451-3457
    • /
    • 2010
  • 사이버보안성 평가는 대상이 되는 시스템이 사이버보안의 목적에 효과적으로 부합하는지 여부를 판단하는 방법이다. 사이버보안성 평가는 시스템의 사이버보안에 대한 신뢰 수준을 측정하고, 관리적 기술적 운영 측면에서의 사이버보안 척도가 요구된 바와 같이 이행되는지를 확인하는 데 필요하다. 최근 원전 계측제어시스템은 디지털 기술의 적용으로 인해 사이버보안에 관한 기술적 및 관리적 대책이 수립되도록 요구되고 있으나, 동 시스템의 사이버보안성 평가 방법론을 포함한 전반적인 사이버보안 프로그램이 마련되어 있지 않은 실정이다. 본 논문은 원전 계측제어 시스템에 적합한 정성적 사이버보안성 평가 방법론을 제시한다. 제안되는 방법론은 원전 계측제어 시스템의 사이버보안에 대한 강점과 취약점을 평가함으로써 원전 계측제어 시스템의 사용자에게 도움이 될 수 있다. 또한, 이 방법론은 원전 계측제어 시스템의 개발자, 감사자 및 규제자가 사이버보안의 관리적, 운영적 및 기술적 통제 항목을 검토하는 지표로 활용될 수 있을 것으로 판단된다.

AI 반응 AR명함의 Platform 설계 및 Source Coding (Platform design and source coding of AI responsive AR business cards)

  • 최수연;한수연;박대우
    • 한국정보통신학회논문지
    • /
    • 제24권4호
    • /
    • pp.489-493
    • /
    • 2020
  • 4차 산업혁명의 기술 발달은 세계와 사회의 발전을 가속화 시키고 있다. 4차 산업기술은 Cyber World와 연결되어 국가와 사회 인프라를 발전시키고 4차 산업기술의 응용은 Cyber-city와 Cyber-life system을 창조할 수 있다. Cyber 세계와 현실 세계를 연결시키는 ICT 비즈니스 업계에서는 Cyber 업무와 현실의 업무를 연결시켜야 한다. Cyber 업무와 현실의 업무의 연결 방법 중 한 가지로 AR명함을 사용하는 것이다. AR명함을 스마트폰으로 인식하면 3D 캐릭터가 등장하여 명함 주인공을 소개하도록 한다. 또한, AR 명함은 사업자의 상품·제품·서비스가 AR로 반영되어 제품, 서비스 등에 대한 홍보가 가능하도록 한다. 연결된 유무선 5G 통신을 이용하면, 실시간 전자상거래도 가능하다. 본 논문에서는 Source Coding으로 AR명함 제작하고 AR 명함 platform을 설계할 것이다.

Analysis of the 2013.3.20 South Korea APT Attack

  • ;김기환;박제훈;김창균;이훈재
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.249-252
    • /
    • 2013
  • The recent cyber attacks paralyzed several major banking services, broadcasters, and affected the services of a telecommunications provider. Media outlets classified the attack as cyber terror and named it an Advanced Persistant Threat. Although the attack significantly disrupted these services for at least one day, various components used in the attack were not new. Previous major cyber attacks towards targets in South Korea employed more advanced techniques thus causing greater damage. This paper studies the anatomy of the recent 2013.3.20 attack, studies the technical sophistication of the malware and attack vectors used compared with previous attacks.

  • PDF

Hybrid Feature Selection Method Based on a Naïve Bayes Algorithm that Enhances the Learning Speed while Maintaining a Similar Error Rate in Cyber ISR

  • Shin, GyeongIl;Yooun, Hosang;Shin, DongIl;Shin, DongKyoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.5685-5700
    • /
    • 2018
  • Cyber intelligence, surveillance, and reconnaissance (ISR) has become more important than traditional military ISR. An agent used in cyber ISR resides in an enemy's networks and continually collects valuable information. Thus, this agent should be able to determine what is, and is not, useful in a short amount of time. Moreover, the agent should maintain a classification rate that is high enough to select useful data from the enemy's network. Traditional feature selection algorithms cannot comply with these requirements. Consequently, in this paper, we propose an effective hybrid feature selection method derived from the filter and wrapper methods. We illustrate the design of the proposed model and the experimental results of the performance comparison between the proposed model and the existing model.

대학생의 진로교육을 위한 웹기반 사이버강의 콘텐츠 개발 및 효과검증 (The Study on Development and Effectiveness of Web-based Cyber Class Contents for University Student's Career Education)

  • 한미희
    • Journal of Information Technology Applications and Management
    • /
    • 제23권2호
    • /
    • pp.225-238
    • /
    • 2016
  • The purpose of this study is to develop cyber class contents on website and to verify the effectiveness of the program to reinforce a career education. The participants of the experiment in this study are from Namseoul University who took the cyber class 'Self management and creation of vision.' of the second semester in 2015. They took the class fifty-sixty minutes a week. The control group also includes the students who took the classes 'Theory and practice of school violence prevention' and 'Youth Education theory.' To verify the effectiveness of career education, the data processing in performing this study utilized t-test for homogeneity with the effective variable of career identity and career decision and the result was proved by using paired t-test. The result suggests that the experiment group significantly shows improvement compared with the control group in the view of career identity and career decision level. Therefore we recognize that the web based cyber course has its effect on content development and career education and we anticipate the continuous development and activation of effective cyber education on website for university students in future.

사이버 보안 분야 전문가 프로파일 관리 시스템 연구 (Development of a Cybersecurity Workforce Management System)

  • 안준영;이승훈;박희민;김현철
    • 반도체디스플레이기술학회지
    • /
    • 제20권3호
    • /
    • pp.65-70
    • /
    • 2021
  • According to the trend of increasingly sophisticated cyber threats, the need for technology research that can be applied to cyber security personnel management and training systems is constantly being raised not only overseas but also in Korea. Previously, the US and UK have already recognized the need and have been steadily conducting related research from the past. In the United States, by encouraging applications based on related research (NICE Cybersecurity Workforce Framework) and disclosing successful use cases to the outside, it is laying the groundwork for profiling cyber security experts. However in Korea, research on cyber security expert training and profiling is insufficient compared to other countries. Therefore, in this study, in order to create a system suitable for the domestic situation, research and analysis of cases in the United States and the United Kingdom were conducted over the past few years, and based on this, a prototype was produced for the study of profiling technology for domestic cyber security experts.

원격근무 환경에서의 사이버 보안 위협 분석 (The Analysis for Cyber Security Threats in Remote Working Environment)

  • 김소연;하영민;김성율;최상용;이종락
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2020년도 제62차 하계학술대회논문집 28권2호
    • /
    • pp.97-98
    • /
    • 2020
  • 코로나19의 확산은 기업의 근무환경에 변화를 가져오고 있다. 최신 IT기술을 활용한 재택근무, 이동원격근무, 원격근무센터와 같은 원격근무가 대표적인 사례이다. 하지만 원격근무는 특성상 기업의 보안정책의 적용범위를 벗어나 사이버위협에 상대적으로 더 많은 노출을 동반한다. 본 논문에서는 최근 국제사회에 대규모 확산이 일어나고 있는 코로나19와 같은 감염병 확산의 영향 또는 조직의 필요에 의해 정보통신기술을 기반으로 원격근무로의 근무형태로 전환하려는 기업이나 기관 등에서 보다 안전한 근무환경을 구추하기 위한 방법의 하나로 원격근무에 대한 위협 및 위험을 분석한다. 분석결과를 활용하여 조직의 보안담당자는 안전한 보안체계를 구축하기 위한 솔루션 선택에 도움을 줄 수 있을 것으로 기대한다.

  • PDF

사이버 쇼핑몰 의류 제품 BEST 100의 제품명 분석 (A Study for Fashion Product Name of BEST 100 in Cyber Shopping Mall)

  • 심준영;김선영
    • 복식문화연구
    • /
    • 제16권5호
    • /
    • pp.955-962
    • /
    • 2008
  • This article is about the naming method for fashion product in cyber shopping mall. For two months, the name of fashion product is listed and analyzed, from BEST 100 category in cyber shopping mall. SPSS ver.10.0 is used and frequency, spearman raw test and t-test are done. The fashion product names are arranged in naming method. There are four kinds of methods for fashion product naming; describing, associating, bundling and style numbering. Describing is most used method both cyber shopping mall. Between marketplace cyber shopping mall and merchant, there is significant difference in composition of naming. Bundling naming method is more used in marketplace cyber shopping mall, and describing and style numbering method is used often in merchant. The words which are composed the name of fashion product are divided in a single word and arranged. The words for describing are classified in noun and adjective. Noun is used for depicting textile and construction and adjective is for touch and image. There is no difference for using words between marketplace and merchant.

  • PDF

사이버 공격 훈련 시나리오 표현을 위한 Stage 기반 플로우 그래프 모델 연구 (A study on Stage-Based Flow Graph Model for Expressing Cyber Attack Train Scenarios)

  • 김문선;이만희
    • 정보보호학회논문지
    • /
    • 제31권5호
    • /
    • pp.1021-1030
    • /
    • 2021
  • 본 논문은 현대의 복잡한 사이버 공격을 모사하는 훈련 시나리오를 효과적으로 표현하기 위한 모델인 S-CAFG(Stage-based Cyber Attack Flow Graph)를 제안하고 평가한다. 이 모델은 더 복잡한 시나리오 표현을 위해 기존 그래프 및 트리 모델을 결합하고 stage 노드를 도입했다. 평가는 기존 모델링 기법으로는 표현하기 어려운 시나리오를 제작하고 이를 S-CAFG로 모델링하는 방식으로 진행했다. 평가 결과, S-CAFG는 동시 공격, 부가적 공격, 우회 경로 선택 등 매우 복잡한 공격 시나리오를 효과적으로 표현할 수 있음을 확인했다.

신임환경공무원을 위한 환경소양 사이버 연수 콘텐츠 개발 (Cyber In-Service Training Contents Development Regarding Environmental Literacy for Entry-Level Environmental Public Servants)

  • 서우석;김수욱;김재호;이윤조
    • 한국환경교육학회지:환경교육
    • /
    • 제21권2호
    • /
    • pp.25-39
    • /
    • 2008
  • The purpose of the study was to develop cyber in-service training contents regarding environmental literacy for entry-level environmental public servants. The blended type of contents were developed, through literature review, contents analysis of other programs, and expert conferences. The validity of the contents developed was ensured experts in environment. Major research findings were as followings: First, there is a lack of time for entry-level environmental public servants to participate in the environmental in-service training programs. Therefore, cyber training can be a good solution to the problems with environmental training courses. It improves access to educational opportunities as it overcomes the limitations of time and space and provides hands-on experiences through multimedia materials that reflect the real world. Second, directions for developing cyber environmental education contents were represented in three parts; 1) strategies for developing cyber environmental education contents, 2) Models for developing cyber environmental education contents, 3) Contents selection for developing cyber environmental education contents Third, the developed contents for entry-level environmental officers consist of 4 domains: (1) the introduction to environment; (2) the natural scientific understanding of environment; (3) the humanistic understanding of environment; and (4) the social scientific understanding of environment. Fourth, the program developed was evaluated by 7 environmental education experts according to 10 evaluation items of total contents and contents development structure. In result, the validity of the program was ensured. Based on the results, some recommendations were suggested.

  • PDF