• Title/Summary/Keyword: information assets

Search Result 877, Processing Time 0.026 seconds

A Study on the Policy Measures for the Prevention of Industrial Secret Leakage in the Metaverse (메타버스 내 산업기밀 유출 대응을 위한 정책 및 제도에 관한 연구)

  • Jeon, So-Eun;Oh, Ye-Sol;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.377-388
    • /
    • 2022
  • Metaverse, realistic virtual space technology has become a hot topic. However, due to the lack of an institutional system to the metaverse environment, concerns are rising over the leakage of industrial confidentiality, including digital assets produced, stored, processed, and transferred within the metaverse. Digital forensics, a technology to defend against hacking attacks in cyberspace, cannot be used in metaverse space, and there is no basis for calculating the extent of damage and tracking responsibility, making it difficult to respond to human resources leakage and cyberhacking effectively. In this paper, we define the scope of industrial confidentiality information and leakage scenario and propose policy and institutional measures based on problems in each metaverse scenario. As a result of the study, it was necessary to prepare a standardized law on Extra-territorial search and seizure issues and a system for collecting cryptocurrency evidence to respond to industrial confidentiality leaks in the metaverse. The study expects to contribute to industrial technology development by preparing in advance for problems that may arise in metaverse technology.

A Study on the Framework for Analyzing the Effectiveness of Cyber Weapon Systems Associated with Cyberspace and Physical Space (사이버 공간과 물리 공간이 연계된 사이버 무기체계의 효과성 분석 프레임워크 연구)

  • Jang, Ji-su;Kim, Kook-jin;Yoon, Suk-joon;Park, Min-seo;Ahn, Myung-Kil;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.111-126
    • /
    • 2022
  • As operations that were only conducted in physical space in the past change to operations that include cyberspace, it is necessary to analyze how cyber attacks affect weapon systems using cyber systems. For this purpose, it would be meaningful to analyze a tool that analyzes the effects of physical weapon systems in connection with cyber. The ROK military has secured and is operating the US JMEM, which contains the results of analyzing the effects of physical weapon systems. JMEM is applied only to conventional weapon systems, so it is impossible to analyze the impact of cyber weapon systems. In this study, based on the previously conducted cyber attack damage assessment framework, a framework for analyzing the impact of cyber attacks on physical missions was presented. To this end, based on the MOE and MOP of physical warfare, a cyber index for the analysis of cyber weapon system effectiveness was calculated. In addition, in conjunction with JMEM, which is used as a weapon system effect manual in physical operations, a framework was designed and tested to determine the mission impact by comparing and analyzing the results of the battle in cyberspace with the effects of physical operations. In order to prove the proposed framework, we analyzed and designed operational scenarios through domestic and foreign military manuals and previous studies, defined assets, and conducted experiments. As a result of the experiment, the larger the decrease in the cyber mission effect value, the greater the effect on physical operations. It can be used to predict the impact of physical operations caused by cyber attacks in various operations, and it will help the battlefield commander to make quick decisions.

Structural Assets of Local Broadcasting Networks and Regional Gap: Foucsing on Local MBC stations in South Korea (지역 방송국 네트워크의 구조적 자산(asset)과 지역 간 격차: 지역MBC를 중심으로)

  • Son, Ji-Hoon;Lee, Jung-Min;Kim, Jae-Hun;Park, Han-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.194-204
    • /
    • 2022
  • This study examined the social capital and geographical gaps of local television stations using web data gathered through website crawling. URLs for 16 local MBC websites were collected. MBC is an abbreviation for Munhwa Broadcasting Corporation, one of South Korea's largest television and radio broadcasters. Munhwa is a Sino-Korean term that means "culture." It initially determined which institutions local broadcasting stations were linked to using a Web Impact Report. To investigate the specific connection type, URL information was classified using the n-tuple helix model, followed by 2-mode network analysis. The n-tuple helix model is an analysis method that extends the standard university-business-government triple-helix model by including a new network innovation originator. As a result, local broadcasting stations relied heavily on activities like as festivals, performances, and exhibitions to engage the local community. Local stations in Daegu-Gyeongbuk area and the Busan-Ulsan-Gyeongnam area were identified as having the most diverse connections to the local population among other regions.

The 2019 Hong Kong-Mainland China Arrangement on Mutual Assistance in Court-ordered Interim Measures: A Major Breakthrough for Hong Kong-seated International Arbitral Proceedings

  • Jun, Jung Won
    • Journal of Korea Trade
    • /
    • v.24 no.6
    • /
    • pp.101-114
    • /
    • 2020
  • Purpose - This paper examines the "Arrangement Concerning Mutual Assistance in Court-ordered Interim Measures in Aid of Arbitral Proceedings by the Courts of the Mainland and of the Hong Kong Special Administrative Region" (the Arrangement), which became effective on October 1, 2019, calling on courts of mainland China and Hong Kong for reciprocal commitment in support of court-ordered interim measures in aid of arbitral proceedings. Because the Hong Kong courts have granted interim measures in aid of arbitral proceedings seated in and outside of Hong Kong even prior to the Arrangement becoming effective, this paper focuses on the significance of the Arrangement making Hong Kong the first and only seat outside of mainland China from which parties to arbitral proceedings may successfully obtain interim measures to preserve of assets, properties, and/or evidence from Chinese courts to be enforced in China. Design/methodology - The significance of interim measures in international arbitration and the existing circumstances of interim measures in support of international arbitral proceedings in mainland China and Hong Kong are discussed first in this paper. Due to the confidential nature of arbitral proceedings, while the details of applications for interim measures pursuant to the Arrangement cannot be discussed, in examining the implications of the Arrangement, the relevant and necessary information was made available from the Hong Kong International Arbitration Centre, as it is one of the six qualified arbitral institutions under the Arrangement. Findings - This groundbreaking Arrangement provides a mechanism for parties with China-related matters to more effectively resolve their disputes, the opportunity for Hong Kong to become an unparalleled seat of arbitration, and for mainland China to overcome some of its negative perceptions in international arbitration. Because the Arrangement also allows parties to directly apply for interim measures from mainland Chinese courts, parties with China-related matters should take note of this potential bypassing of the procedural hurdle, which usually requires an arbitral institution to submit such applications in China, and make strategic decisions accordingly as may be appropriate. Originality/value - Because the Arrangement is a recent yet a significant agreement calling on courts of mainland China and Hong Kong for reciprocal commitment in support of court-ordered interim measures in aid of arbitral proceedings, this study will provide useful guidance for parties with China-related matters all over the world, especially in light of China's rapid economic growth and extensive and prominent trade relationships in today's world. Parties who foresee the need for interim measures from mainland Chinese courts should designate Hong Kong as their seat of arbitration and select one of the six qualified arbitral institutions under the Arrangement to administer their arbitral proceedings in order to benefit from the Arrangement.

A Code Clustering Technique for Unifying Method Full Path of Reusable Cloned Code Sets of a Product Family (제품군의 재사용 가능한 클론 코드의 메소드 경로 통일을 위한 코드 클러스터링 방법)

  • Kim, Taeyoung;Lee, Jihyun;Kim, Eunmi
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.1
    • /
    • pp.1-18
    • /
    • 2023
  • Similar software is often developed with the Clone-And-Own (CAO) approach that copies and modifies existing artifacts. The CAO approach is considered as a bad practice because it makes maintenance difficult as the number of cloned products increases. Software product line engineering is a methodology that can solve the issue of the CAO approach by developing a product family through systematic reuse. Migrating product families that have been developed with the CAO approach to the product line engineering begins with finding, integrating, and building them as reusable assets. However, cloning occurs at various levels from directories to code lines, and their structures can be changed. This makes it difficult to build product line code base simply by finding clones. Successful migration thus requires unifying the source code's file path, class name, and method signature. This paper proposes a clustering method that identifies a set of similar codes scattered across product variants and some of their method full paths are different, so path unification is necessary. In order to show the effectiveness of the proposed method, we conducted an experiment using the Apo Games product line, which has evolved with the CAO approach. As a result, the average precision of clustering performed without preprocessing was 0.91 and the number of identified common clusters was 0, whereas our method showed 0.98 and 15 respectively.

Industrial Technology Leak Detection System on the Dark Web (다크웹 환경에서 산업기술 유출 탐지 시스템)

  • Young Jae, Kong;Hang Bae, Chang
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.46-53
    • /
    • 2022
  • Today, due to the 4th industrial revolution and extensive R&D funding, domestic companies have begun to possess world-class industrial technologies and have grown into important assets. The national government has designated it as a "national core technology" in order to protect companies' critical industrial technologies. Particularly, technology leaks in the shipbuilding, display, and semiconductor industries can result in a significant loss of competitiveness not only at the company level but also at the national level. Every year, there are more insider leaks, ransomware attacks, and attempts to steal industrial technology through industrial spy. The stolen industrial technology is then traded covertly on the dark web. In this paper, we propose a system for detecting industrial technology leaks in the dark web environment. The proposed model first builds a database through dark web crawling using information collected from the OSINT environment. Afterwards, keywords for industrial technology leakage are extracted using the KeyBERT model, and signs of industrial technology leakage in the dark web environment are proposed as quantitative figures. Finally, based on the identified industrial technology leakage sites in the dark web environment, the possibility of secondary leakage is detected through the PageRank algorithm. The proposed method accepted for the collection of 27,317 unique dark web domains and the extraction of 15,028 nuclear energy-related keywords from 100 nuclear power patents. 12 dark web sites identified as a result of detecting secondary leaks based on the highest nuclear leak dark web sites.

Market in Medical Devices of Blockchain-Based IoT and Recent Cyberattacks

  • Shih-Shuan WANG;Hung-Pu (Hong-fu) CHOU;Aleksander IZEMSKI ;Alexandru DINU;Eugen-Silviu VRAJITORU;Zsolt TOTH;Mircea BOSCOIANU
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.2
    • /
    • pp.39-44
    • /
    • 2023
  • The creativity of thesis is that the significance of cyber security challenges in blockchain. The variety of enterprises, including those in the medical market, are the targets of cyberattacks. Hospitals and clinics are only two examples of medical facilities that are easy targets for cybercriminals, along with IoT-based medical devices like pacemakers. Cyberattacks in the medical field not only put patients' lives in danger but also have the potential to expose private and sensitive information. Reviewing and looking at the present and historical flaws and vulnerabilities in the blockchain-based IoT and medical institutions' equipment is crucial as they are sensitive, relevant, and of a medical character. This study aims to investigate recent and current weaknesses in medical equipment, of blockchain-based IoT, and institutions. Medical security systems are becoming increasingly crucial in blockchain-based IoT medical devices and digital adoption more broadly. It is gaining importance as a standalone medical device. Currently the use of software in medical market is growing exponentially and many countries have already set guidelines for quality control. The achievements of the thesis are medical equipment of blockchain-based IoT no longer exist in a vacuum, thanks to technical improvements and the emergence of electronic health records (EHRs). Increased EHR use among providers, as well as the demand for integration and connection technologies to improve clinical workflow, patient care solutions, and overall hospital operations, will fuel significant growth in the blockchain-based IoT market for linked medical devices. The need for blockchain technology and IoT-based medical device to enhance their health IT infrastructure and design and development techniques will only get louder in the future. Blockchain technology will be essential in the future of cybersecurity, because blockchain technology can be significantly improved with the cybersecurity adoption of IoT devices, i.e., via remote monitoring, reducing waiting time for emergency rooms, track assets, etc. This paper sheds the light on the benefits of the blockchain-based IoT market.

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

Analyzing Research Trends in Blockchain Studies in South Korea Using Dynamic Topic Modeling and Network Analysis (다이나믹 토픽모델링 및 네트워크 분석 기법을 통한 블록체인 관련 국내 연구 동향 분석)

  • Kim, Donghun;Oh, Chanhee;Zhu, Yongjun
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.3
    • /
    • pp.23-39
    • /
    • 2021
  • This study aims to explore research trends in Blockchain studies in South Korea using dynamic topic modeling and network analysis. To achieve this goal, we conducted the university & institute collaboration network analysis, the keyword co-occurrence network analysis, and times series topic analysis using dynamic topic modeling. Through the university & institute collaboration network analysis, we found major universities such as Soongsil University, Soonchunhyang University, Korea University, Korea Advanced Institute of Science and Technology (KAIST) and major institutes such as Ministry of National Defense, Korea Railroad Research Institute, Samil PricewaterhouseCoopers, Electronics and Telecommunications Research Institute that led collaborative research. Next, through the analysis of the keyword co-occurrence network, we found major research keywords including virtual assets (Cryptocurrency, Bitcoin, Ethereum, Virtual currency), blockchain technology (Distributed ledger, Distributed ledger technology), finance (Smart contract), and information security (Security, privacy, Personal information). Smart contracts showed the highest scores in all network centrality measures showing its importance in the field. Finally, through the time series topic analysis, we identified five major topics including blockchain technology, blockchain ecosystem, blockchain application 1 (trade, online voting, real estate), blockchain application 2 (food, tourism, distribution, media), and blockchain application 3 (economy, finance). Changes of topics were also investigated by exploring proportions of representative keywords for each topic. The study is the first of its kind to attempt to conduct university & institute collaboration networks analysis and dynamic topic modeling-based times series topic analysis for exploring research trends in Blockchain studies in South Korea. Our results can be used by government agencies, universities, and research institutes to develop effective strategies of promoting university & institutes collaboration and interdisciplinary research in the field.

The Planting and Occurrence Status of Exotic Plants of the Folk Village as National Cultural Heritage - Focus in Hahoe.Yangdong.Hangae Villages - (국가지정 문화재 민속마을의 외래식물 식재 및 발생현황 - 하회.양동.한개마을을 대상으로 -)

  • Rho, Jae-Hyun;Oh, Hyun-Kyung;Han, Yun-Hee;Park, Kyung-Uk;Byun, Moo-Sup;Huh, Joon;Choi, Yung-Hyun;Shin, Sang-Sup;Lee, Hyun-Woo;Kim, Hyo-Jung
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.31 no.2
    • /
    • pp.1-19
    • /
    • 2013
  • This study was carried out to analyze distribution situation of alien plants and to propose management plan in the 3 Folk village in Gyeongsangbuk-do which is Cultural property designated by the State; Hahoe, Yangdong and Hangae. This research is for improve of sincerity of historical site and provide basic information which use about administration of preservation. The results are as follows. 1. Overall flora and alien plants appearance The total flora in the 3 folk villages were listed total 752 taxa including 127 families, 430 genera, 614 species, 5 subspecies, 100 varieties and 33 forms. Among them, woody plants take 263 taxa(35.0%) and herbaceous plants take 489 taxa (65.0%). Flora in the Hahoe, Yangdong and Hangae village were total 534, 479 taxa and 408 taxa and exotic plant index was 30.1%, 38.2% and 37.0% respectively. In types of exotic plants, ornamental exotic plants were 135 taxa, deciduous exotic plants were 21 taxa, cultivating exotic plants were 64 taxa, and naturalized exotic plants were 80 taxa and those result lead that the ornamental exotic plants is the highest ratio. According to the villages, Hahoe village had 161 taxa(30.1%), Yangdong Village had 183 taxa(38.2%), and Hangae village had 151 taxa(37.0%) that Yangdong village showed the most number of exotic plants. 2. Planting of landscape exotic plants in the unit cultural assets Meanwhile, Ornamental exotic plants in old house's gardens in Andong Hahoe village which is designated as a unit assets, those are total 30 taxa; followed by the Okyeon house(8 taxa) is highest and the Yangjindang(7), the Hadong house(6) and the Chunghyodang(5). Magnolia denudata appears the most as for 4 times and Campsis grandiflora etc. each took 2 times. Based on the Yangdong village, Gyeongju, that are found total 51 taxa; followed by the Dugok house(16 taxa) the Sujoldang(14), the Mucheondang(13), and the Sangchunheon (12). High appearance rate of ornamental exotic plants were Viburnum opulus for. hydrangeoides, Lycoris squamigera, Caragagna sinica and Magnolia denudata etc. Based on the Hangae village, Seongju, that are designated total 62 taxa; followed by the Jinsa house(35 taxa), the Gyori house(25), the Hanju head family house(20), and the Hahoe house(16). Taxa with high appearance rates were Caragana sinica, Juniperus chinensis var. horizontalis, Magnolia denudata, Viburnum opulus for. hydrangeoides, Chaenomeles speciosa etc. 3. Problems of exotic plant landscapes in the outer spaces of the folk villages Problems of exotic plant landscapes in the outer spaces of the Hahoe village are as follows. In lower of the Mansongjeong forest, Ambrosia artemisifolia, which are ecosystem disturbance plants designated by the Ministry of Environment, live with high dominance value. This should be have a remove with Sicyos angulatus immediately. In the Nakdong river bed around the Mansongjeong forest is covered with a riparian vegetation forest belt of Robinia pseudoacacia L. forest, Populus nigra var. italic community, and Populus x tomentiglandulosa community colony. Based on the Yangdong village, the planted or naturally distributed Ailanthus altissima colony, sporadically distributed Robinia pseudoacacia as well as Amorpha fruticosa are detected all over the village and ecotones. Based on the Hangae village, Ailanthus altissima and Robinia pseudoacacia are sporadically distributed around the village and there is a sign of spreading. similarity of exotic plantsis 47.0% to 48.6% and a reason why this happened is all of research site in Gyeongsanbuk-do and that is why growth norm of plant is similar, exotic plant which is sales for ornamental and it infer to require related countermeasure of each villages and joint related countermeasure.