• Title/Summary/Keyword: cyber-university

Search Result 2,837, Processing Time 0.027 seconds

Analysis of Response Status Based on Cyber Crisis Scenario (사이버 위기 시나리오 기반 대응 현황 분석)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.296-297
    • /
    • 2019
  • An effective crisis management system capable of responding early in the event of a major disaster or cyber crisis is needed not only within the organization but also with the partner organizations and the outside. In this paper, we review the domestic and international countermeasures against major disasters and cyber crises, and discuss the emerging crisis responses and future prospects along with the development of ICT technology.

  • PDF

FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention

  • Alwi M Bamhdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.179-192
    • /
    • 2023
  • The widespread use of Cloud Computing, Internet of Things (IoT), and social media in the Information Communication Technology (ICT) field has resulted in continuous and unavoidable cyber-attacks on users and critical infrastructures worldwide. Traditional security measures such as firewalls and encryption systems are not effective in countering these sophisticated cyber-attacks. Therefore, Intrusion Detection and Prevention Systems (IDPS) are necessary to reduce the risk to an absolute minimum. Although IDPSs can detect various types of cyber-attacks with high accuracy, their performance is limited by a high false alarm rate. This study proposes a new technique called Fuzzy Logic - Objective Risk Analysis (FLORA) that can significantly reduce false positive alarm rates and maintain a high level of security against serious cyber-attacks. The FLORA model has a high fuzzy accuracy rate of 90.11% and can predict vulnerabilities with a high level of certainty. It also has a mechanism for monitoring and recording digital forensic evidence which can be used in legal prosecution proceedings in different jurisdictions.

Conceptual Analysis of Cyber Electronic Warfare by OSI Reference Model (OSI 참조 모델에 의한 사이버전자전 개념 분석)

  • Lee, Minwoo;Lee, Jongkwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.600-601
    • /
    • 2021
  • The cyberspace, which is the fifth battle field, should be utilized for multi-domain maneuvering between the cyberspace and the physical space using an electromagnetic spectrum. This becomes a major concept of cyber electronic warfare that combines the characteristics of cyber warfare and electronic warfare. In this study, the concept of cyber electronic warfare is analyzed by using the OSI reference model and examining the threats of the two-layer data link layer.

  • PDF

Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems

  • Woo, Pil Sung;Kim, Balho H.;Hur, Don
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.888-894
    • /
    • 2015
  • This paper presents a unified model based assessment framework to quantify threats and vulnerabilities associated with control systems, especially in the SCADA (Supervisory Control and Data Acquisition) system. In the past, this system was primarily utilized as an isolated facility on a local basis, and then it started to be integrated with wide-area networks as the communication technology would make rapid progress. The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. However, an up-to-date power system often requires the real-time operations, which clearly implies that the cyber security would turn out to be a complicated but also crucial issue for the power system. In short, the purpose of this paper is to streamline a comprehensive approach to prioritizing cyber security risks which are expressed by the combination of threats, vulnerabilities, and values in the SCADA components.

Design of Event Processing in Monitoring System using Sensor Network (센서 네트워크를 활용한 모니터링 시스템에서의 사건 처리)

  • Jung, Young-Jin;Lee, Yang-Koo;Lee, Dong-Gyu;Nam, Kwang-Woo;Kim, Kyu-Jin;Jin, Du-Seok;Lee, Jong-Suk Ruth;Cho, Kum-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06c
    • /
    • pp.29-32
    • /
    • 2011
  • 센서 네트워크는 원격지의 상태를 실시간으로 파악하기 위하여 각종 모니터링 시스템에서 활발히 활용된다. 시스템은 원격지에 일어난 사건을 인식하고 사용자에게 유용한 정보를 제공하기 위하여 각종 시뮬레이션 모델 및 분석 기법과 함께 수집된 센서 데이터를 분석한다. 이 논문에서는 모니터링 시스템에서 원격지의 사건을 인식하기 위하여 사건을 등록하고 처리하는 과정을 설계하였다. 이 과정에는 사건 정보 등록, 센서 데이터로부터 사건 정보 추출, 데이터 종류 별 테마(theme) 생성, 연산자를 통한 테마 결합, 시뮬레이션 모델을 활용한 사건 진행 예측, 영향 분석이 포함된다. 그리고, 실제 센서 네트워크를 활용하여 등록된 사건이 처리됨을 보인다.

Mediation Effect of Motivation and Immersion for Learning in the Relation between Tutor and Learning Effectiveness of Cyber Home Learning

  • Baek, Hyun-Ki;Kang, Jung-Hwa;Ha, Tai-Hyun
    • Journal of Digital Convergence
    • /
    • v.7 no.1
    • /
    • pp.137-147
    • /
    • 2009
  • The main purpose of cyber home education in public sector is to promote public education and restrain expensive private education expenses. The primary purpose of this study is to explore the effects of motivation, immersion and tutor on the effectiveness of cyber home learning. The variables of motivation, immersion and tutor participation were incorporated in this study as follows: 1) tutor participation was classed as a single independent variable, which has interaction and also effects passion; 2) motivation and 3) immersion were classed as two mediatory variables: motivation which include relevance and confidence; and immersion which includes attention and controllability. 4) learning effect was classed as a single dependent variable of learning influence factor which has learning attitude and learning satisfaction. The results show that a tutor had a direct influence on the effects of the learners' study but motivation and immersion had an indirect influence on the effects of learners' study independently. Based on these findings a tutor should provide motivation and immersion with various learning methods and contents for learners to get maximum benefits from cyber home learning.

  • PDF

Perception on Career Barriers among Cyber University Students: Focusing on Demographic Characteristics (사이버대학생의 진로장벽 지각 -배경변인별 차이를 중심으로-)

  • Lee, Ji Hye;Gwak, Yoon Jung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.46-54
    • /
    • 2018
  • The purpose of this study is to compare and analyze differences of perceived career barriers based on demographic characteristics of cyber university students. The results of this study will provide a valuable basis for guiding adult learners in their career development. Subjects included 937 adult learners at cyber universities in Seoul, Korea, aged 20 and above. Results were as follows: The level of career barriers perceived by females aged 20-29 who were unemployed and single were higher than that of males aged 30 to 59 who were employed and married. Female students were higher in 'anxiety of future', 'lack of interest', 'lack of job information', 'interpersonal difficulty'. The only component in which subjects aged 50-59 perceived higher than other age groups was 'conflict with important people'. There was no significant differences by grade. These results imply that the perception of the career barriers of adult learners should be considered in customizing career development programs and career counselling.

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

The Recognition of Cyber Education and Development Plan of Chungcheongnam-do Civil Servants (충청남도 정예공무원의 사이버교육 인식과 발전방안)

  • Song, Seung-hun;Kim, Eui-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2184-2190
    • /
    • 2017
  • In the age of knowledge informationization, various educational programs utilizing cyber education were introduced to schools, corporate education, military service, lifelong education facilities as well as public education and training programs. In the case of the national government officials, the education and local government officials, which are organized by cyber center in the national civil service personnel development center, are organized by 15 cities and provincial public service training institutes. In 2008, it became to be mandatory for them to receive education and training over a certain period of a year through the introduction of the regular learning system of public officials, and cyber education got active in the education and training of public officials. The purpose of this study is to suggest the development plan of cyber education based on the results of the analysis of the trainees of the civil servants of Chungcheongnam-do who participated in the cyber education in the viewpoint of the public education and training system.