• Title/Summary/Keyword: cyberspace

Search Result 348, Processing Time 0.023 seconds

Sexual Intercourse Related Factors of Adolescents (청소년의 성관계 경험 관련요인)

  • Kim, Jong-Gun
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.9 no.1
    • /
    • pp.59-67
    • /
    • 2021
  • Purpose : This study examined the factors related to sexual intercourse among adolescents in South Korea. Methods : The study sample was comprised of 65,528 middle and high school students aged 12 to 18 years in 2016. For this study, using the data from the 12th Korea youth risk behavior web-based survey, a chi-squared test, and hierarchical logistic regression analysis we reconducted with the SPSS 22.0 program considering personal, family, school, and regional characteristics. Results : The proportion of adolescents who had sexual intercourse was 6.0 % of boys and 2.7 % of girls, and 6.3 % of high school students and 2.4 % of middle school students. The statistically significant related factors of sexual intercourse were gender, grade, attempted suicide, ever drinking, ever smoking, habitual or purposeful drug use, weekly allowance, and coed school in the final model 4. Adolescents with suicide attempts had 2.49 times more sexual intercourse than adolescents with no experience of suicide attempts. Compared to adolescents without alcohol, smoking, and habitual drug use, those who have experienced alcohol, smoking, habitual or purposeful drug use were 2.22 times, 3.76 times, and 3.39 times more likely to have had sexual intercourse, respectively. Adolescents with a weekly allowance of more than 100,000 won per week and adolescents in coed schools were 2.84 times and 1.40 times more likely to have had sexual intercourse, respectively. Conclusion : Multi-level interventions should be considered in school sexual education programs while considering the substantiality of sex education and the actual adolescents' needs. In addition, sexual health interventions in cyberspace for high-risk groups may be needed to consider the emotional and mental characteristics, given the factors related to sexual intercourse in adolescents.

Comparative Analysis of Cyber Attacks of Korea Government and Policy Countermeasures (한국의 사이버공격 비교 분석과 정책적 대응방안)

  • Kwon, Hyeokchun;Lee, Youngjun;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.19-26
    • /
    • 2020
  • The purpose of this paper is to ccompare and analyze North Korean cyber attacks and our responses by government, from the Roh Moo-hyun administration to the Moon Jae-in administration. The current conflict of interests on the Korean peninsula, such as the United States, China, and Russia, is leading to a conflict for the leadership of a new world order in cyberspace. Cyber attacks are accelerating and threats are rising. Cyber threats exhibit several characteristics. Above all, it is difficult to identify or track the subject of the threat. Also, with the development of information and communication technology, attack technology has become more intelligent, and it is not easy to prepare a means to respond. Therefore, it is necessary to improve continuous and preemptive response capacity for national cybersecurity, and to establish governance among various actors, such as international cooperation between countries or private experts.

Bidirectional LSTM based light-weighted malware detection model using Windows PE format binary data (윈도우 PE 포맷 바이너리 데이터를 활용한 Bidirectional LSTM 기반 경량 악성코드 탐지모델)

  • PARK, Kwang-Yun;LEE, Soo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.87-93
    • /
    • 2022
  • Since 99% of PCs operating in the defense domain use the Windows operating system, detection and response of Window-based malware is very important to keep the defense cyberspace safe. This paper proposes a model capable of detecting malware in a Windows PE (Portable Executable) format. The detection model was designed with an emphasis on rapid update of the training model to efficiently cope with rapidly increasing malware rather than the detection accuracy. Therefore, in order to improve the training speed, the detection model was designed based on a Bidirectional LSTM (Long Short Term Memory) network that can detect malware with minimal sequence data without complicated pre-processing. The experiment was conducted using the EMBER2018 dataset, As a result of training the model with feature sets consisting of three type of sequence data(Byte-Entropy Histogram, Byte Histogram, and String Distribution), accuracy of 90.79% was achieved. Meanwhile, it was confirmed that the training time was shortened to 1/4 compared to the existing detection model, enabling rapid update of the detection model to respond to new types of malware on the surge.

An Intelligent Game Theoretic Model With Machine Learning For Online Cybersecurity Risk Management

  • Alharbi, Talal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.390-399
    • /
    • 2022
  • Cyber security and resilience are phrases that describe safeguards of ICTs (information and communication technologies) from cyber-attacks or mitigations of cyber event impacts. The sole purpose of Risk models are detections, analyses, and handling by considering all relevant perceptions of risks. The current research effort has resulted in the development of a new paradigm for safeguarding services offered online which can be utilized by both service providers and users. customers. However, rather of relying on detailed studies, this approach emphasizes task selection and execution that leads to successful risk treatment outcomes. Modelling intelligent CSGs (Cyber Security Games) using MLTs (machine learning techniques) was the focus of this research. By limiting mission risk, CSGs maximize ability of systems to operate unhindered in cyber environments. The suggested framework's main components are the Threat and Risk models. These models are tailored to meet the special characteristics of online services as well as the cyberspace environment. A risk management procedure is included in the framework. Risk scores are computed by combining probabilities of successful attacks with findings of impact models that predict cyber catastrophe consequences. To assess successful attacks, models emulating defense against threats can be used in topologies. CSGs consider widespread interconnectivity of cyber systems which forces defending all multi-step attack paths. In contrast, attackers just need one of the paths to succeed. CSGs are game-theoretic methods for identifying defense measures and reducing risks for systems and probe for maximum cyber risks using game formulations (MiniMax). To detect the impacts, the attacker player creates an attack tree for each state of the game using a modified Extreme Gradient Boosting Decision Tree (that sees numerous compromises ahead). Based on the findings, the proposed model has a high level of security for the web sources used in the experiment.

Improvement Plan for Public Institution Remote Security Model in the New-Normal Era (뉴노멀 시대의 공공기관 원격보안 모델 개선방안)

  • Shin, SeungWoo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.104-112
    • /
    • 2022
  • The pandemic caused by the COVID-19 virus, which has lasted for the past three years, has changed society and the way people live in many ways. These changes also affect cyberspace, so the pre-pandemic information security model and standards have limitations when applied to the current situation. In this paper, a new method to improve the information security model of public institutions was proposed in consideration of various situations in the new normal era. In other words, through the proposed information security model, the possibility of external intrusion is blocked in advance through the policy and technical supplementation of remote work, which is a weakness of the existing information security operation of public institutions. Also, how to prevent abnormal authentication attempts by building a secure VPN environment, how to prevent social engineering cyber attacks targeting fear and uncertainty caused by COVID-19, and how to use a smooth network and create a remote work environment. For this purpose, methods for securing service availability were additionally presented.

Image Steganography for Hiding Hangul Messages in Hybrid Technique using Variable ShiftRows (가변 ShiftRows를 이용한 하이브리드 기법에서 한글 메시지 은닉을 위한 이미지 스테가노그래피)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.217-222
    • /
    • 2022
  • Information plays an important role in modern society. Most of the information is processed and moved in the digital space. In cyberspace, confidential communication based on resistance and security is fundamental. It is essential to protect the information sent and received over the network. However, information may be leaked and forged by unauthorized users. The effectiveness of the existing protection system decreases as an innovative technique is applied to identify the communication contents by a third party. Steganography is a technique for inserting secret information into a specific area of a medium. Stegganography and steganalysis techniques are at odds with each other. A new and sophisticatedly implemented system is needed to cope with the advanced steganalysis. To enhance step-by-step diffusion and irregularity, I propose a hybrid implementation technique of image steganography for Hangul messages based on layered encryption and variable ShiftRows. PSNR was calculated to measure the proposed steganography efficiency and performance. Compared to the basic LSB technique, it was shown that the diffusion and randomness can be increased even though the PSNR decreased by 1.45%.

A Study on the Model for Preemptive Intrusion Response in the era of the Fourth Industrial Revolution (4차 산업혁명 시대의 선제적 위협 대응 모델 연구)

  • Hyang-Chang Choi
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.27-42
    • /
    • 2022
  • In the era of the Fourth Industrial Revolution, digital transformation to increase the effectiveness of industry is becoming more important to achieving the goal of industrial innovation. The digital new deal and smart defense are required for digital transformation and utilize artificial intelligence, big data analysis technology, and the Internet of Things. These changes can innovate the industrial fields of national defense, society, and health with new intelligent services by continuously expanding cyberspace. As a result, work productivity, efficiency, convenience, and industrial safety will be strengthened. However, the threat of cyber-attack will also continue to increase due to expansion of the new domain of digital transformation. This paper presents the risk scenarios of cyber-attack threats in the Fourth Industrial Revolution. Further, we propose a preemptive intrusion response model to bolster the complex security environment of the future, which is one of the fundamental alternatives to solving problems relating to cyber-attack. The proposed model can be used as prior research on cyber security strategy and technology development for preemptive response to cyber threats in the future society.

A study on the Development of a Hybrid Library Model based on Information Commons (Information Commons기반 하이브리드(Hybrid)도서관 모형 개발에 관한 연구)

  • Chung, Jae-Young
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.20 no.2
    • /
    • pp.59-73
    • /
    • 2009
  • The library could get infinite possibilities of the space, if people had recognized that the library was not only the space for the reading and collecting of the books but also a special space for accomplishment of the investigation, learning, communication, and culture. Also, it can be desirable way for implementing the hybrid library. It means that combine with the traditional library which is the most important thing is a real space and the digital library, in contrast, the which is that the most important thing is the cyberspace. The purpose of this study is to develop a practical model for hybrid library based on the concept of information commons which is cooperation of the space, information technology and information services. This study intends to figure out the core elements involved in operative aspect of hybrid library through comparative analysis of domestic and foreign cases applied Information commons concepts to the library.

The Moderating Effect of Peer Attachment on the Relationship between School Violence Victimization and Cyber Violence Victimization in Children (아동의 학교폭력 피해경험이 사이버폭력 피해경험에 미치는 영향에서 또래애착의 조절효과 검증)

  • Sang woo Kim;So ra Lim
    • Journal of Korean Physical Therapy Science
    • /
    • v.30 no.3
    • /
    • pp.91-104
    • /
    • 2023
  • Background: The purpose of this study is to investigate whether peer attachment serves as a positive emotional resource for children who have experienced school violence and cyber violence victimization. In addition, we aim to present alternative programs to reduce school violence and promote positive peer attachment among children. Design: We utilized data from the 13th year(2020) of the Panel Study on Korean Children for this study. Methods: The survey was conducted through a questionnaire administered by surveyors, and the total number of cases was 1,357. Results: First, the effects of school violence and cyber violence victimization experiences were confirmed. Second, it can be inferred that children with isolation in peer relationships may ultimately be more vulnerable to cyber violence victimization, as their interactions in cyberspace may also be undermined, highlighting the potential impact of social relationships on cyber violence victimization. Third, it can be observed that children with high levels of peer attachment are emotionally stable, even when exposed to school violence and cyberviolence victimization, which may enable them to regulate the degree of victimization they experience. Conclusion: School violence experience and cyber violence experience interact with each other, and in this relationship, positive peer attachment is a positive resource. Therefore, it emphasizes the importance of the relationship between friends in preventing and overcoming school violence and provides suggestions for solutions based on this understanding.

A Digital Forensic Framework Design for Joined Heterogeneous Cloud Computing Environment

  • Zayyanu Umar;Deborah U. Ebem;Francis S. Bakpo;Modesta Ezema
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.207-215
    • /
    • 2024
  • Cloud computing is now used by most companies, business centres and academic institutions to embrace new computer technology. Cloud Service Providers (CSPs) are limited to certain services, missing some of the assets requested by their customers, it means that different clouds need to interconnect to share resources and interoperate between them. The clouds may be interconnected in different characteristics and systems, and the network may be vulnerable to volatility or interference. While information technology and cloud computing are also advancing to accommodate the growing worldwide application, criminals use cyberspace to perform cybercrimes. Cloud services deployment is becoming highly prone to threats and intrusions. The unauthorised access or destruction of records yields significant catastrophic losses to organisations or agencies. Human intervention and Physical devices are not enough for protection and monitoring of cloud services; therefore, there is a need for more efficient design for cyber defence that is adaptable, flexible, robust and able to detect dangerous cybercrime such as a Denial of Service (DOS) and Distributed Denial of Service (DDOS) in heterogeneous cloud computing platforms and make essential real-time decisions for forensic investigation. This paper aims to develop a framework for digital forensic for the detection of cybercrime in a joined heterogeneous cloud setup. We developed a Digital Forensics model in this paper that can function in heterogeneous joint clouds. We used Unified Modeling Language (UML) specifically activity diagram in designing the proposed framework, then for deployment, we used an architectural modelling system in developing a framework. We developed an activity diagram that can accommodate the variability and complexities of the clouds when handling inter-cloud resources.