• Title/Summary/Keyword: 보안사건

Search Result 217, Processing Time 0.02 seconds

A Study on the Preventive Measures of Criminal Behaviors and Criminal Damages of North Korean Defectors (북한이탈주민의 범죄행위 및 범죄피해에 대한 효과적인 예방대책)

  • Lim, Chang-Ho
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.217-246
    • /
    • 2016
  • Most of the North Korean defectors are the socially disadvantaged, and formed the lowest class in South Korean society. Their main objectives are to achieve economic wealth. In this process, North Korean defectors have often committed the crime or have been criminal victims. The purpose of this study was to propose the effective preventive measures after analyzing the actual situation of North Korean defectors in criminal behaviors and criminal damages. This research has studied of the literature on the criminal behavior and the criminal damage by North Korean defectors, utilized the relevant statistical data, cited the news for the relevant cases, and proposed the effective preventive measures of criminal behaviors and criminal damages of North Korean defectors by doing in-depth interviews with personal protection officer First, in order to prevent criminal activity by North Korean defectors, we should uplift the identity as the members of Korean society, systemize the initial adapt education, enlarge the employment protection and the resettlement helper system, manage North Korean defectors according to adaptive type, develop the network, establish the management department for the defectors, strengthen the training of prison inmates, and strengthen the management of unprotected people. Next, in order to prevent the criminal damages of North Korean refugees, we should manage vulnerable North Korean defectors effectively, maintain the liaison between the personal protection officer and North Korean defector, arrange the personal safety measures in advance when traveling abroad, enhance the legal education for usual living in Korean society, and perform the re-education for the female socialization.

  • PDF

A Study on the Protection for Original Technology and Improved Patent when Research Institutes or Universities Transfer their Research Outputs (출연연 및 대학에서 연구성과물의 기술이전 시 개량특허와 원천기술의 보호에 관한 검토 : H대학교와 D제약사의 신약후보물질 관련 개량특허 탈취논쟁여부를 중심으로 (대상판결: 서울중앙지방법원 2014.12.24. 선고 2013가합85597 판결))

  • Kang, Sun Joon;Kim, Min Ji;Won, Yoo Hyung;Oh, Keon Taek
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.2
    • /
    • pp.313-333
    • /
    • 2017
  • As science and technology advanced, specialized and massive, development through mutual cooperation or research based on patent licensing such as material transfer contract, technology transfer contract etc are actively taking place to minimize or separate the cost and risk of R&D. In R&D, such mutual work can enjoy the merit of division of labor by effectively allocating resources and manpower to accomplish its goal. Inevitably, however, there are also many possibilities of disputes regarding the ownership and use of intellectual property rights resulting from such mutual/post-studies, or inventions upgraded by using prior patents. The case reviewed by this paper is noticeable regarding the recent trend of upgraded inventions. In the case, a pharmaceutical company conducted tests/assessments on the complete technology of patent owned by a university on the premise of transferring the technology, and then terminated the technology transfer contract due to reasons of toxicity. The university then filed a damage claim suit against the company for infringing the contract. This is a dispute case betw een a university which developed a potential ingredient for new medicine and a pharmaceutical company which agreed to transfer and receive the technological later on. Regarding the upgraded inventions of source patents, this case has many implications on the protection of prior patents, research contract, and research security to protect the accomplishment of research. This paper reviews the subject ruling and the protection of upgraded patents and source technologies. As critical notes, the paper also summarizes the major issues of case ruling to observe the standard of ruling patent infringement related to the extortion of upgraded patents. Then, through the ruling of the case above, the paper suggests implications and future strategies.

The national limits and issues of disaster response and management capabilities (국가의 재난대처 및 관리능력의 한계와 문제점)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.99-109
    • /
    • 2014
  • Disaster is when, where, and how uncertainties, which might occur. Thus, for disaster response and management at the national and local governments have been made. Korea has established the Disaster and Safety Management Basic Act. Disaster Management has been made at the national level which is to prevent disasters and countries in order to protect citizens from harm and dangerous. Korean Disaster management system is well equipped with advanced countries. The Organization of national and local government are well-maintained substantially for the disaster activities and step-by-step manuals activities. Despite that uncertainty, due to the nature of the disaster, while infrequent, causing large-scale tragedy. Minimize the damage of the disaster as a disaster management efforts are needed. Normally a real disaster, a disaster situation, efforts are to be utilized efficiently, the effectiveness of the system will appear. But while the number of large-scale disasters, including the sinking of Sewol this time for the government and local governments see the response process, the system did not work and the manual existed in the cabinet. There was no Prevention and preparation activities, there was no integrated organization for the response management with expertise in the professional staff. Whenever a large disaster raised repeatedly as a problem, but there was a substantial change in formal but no improvement. It will not reduce the damage if the disaster management is not prepared for a revolutionary turning point.

Implementation of a Network Simulator for Cyber Attacks and Detections based on SSFNet (SSFNet 기반 사이버 공격 및 탐지를 위한 네트워크 시뮬레이터의 구현)

  • Shim, Jae-Hong;Jung, Hong-Ki;Lee, Cheol-Won;Choi, Kyung-Hee;Park, Seung-Kyu;Jung, Gi-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.457-467
    • /
    • 2002
  • In order to simulate cyber attacks and predict network behavior by attacks, we should represent attributes of network components in the simulation model, and should express characteristics of systems that carry out various cyber attacks and defend from these attacks. To simulate how network load may change under the cyber attacks, we extended SSF[9, 10] that is process-based event-oriented simulation system. We added a firewall class and a packet manipulator into the SSFNet that is a component of SSF. The firewall class, which is related to the security, is to simulate cyber attacks, and the packet manipulator is a set of functions to write attack programs for the simulation. The extended SSFNet enables to simulate a network with the security systems and provides advantages that make easy to port already exsiting attack programs and apply them to the simulation evironment. We made a vitual network model to verify operations of the added classes, and simulated a smurf attack that is a representative denial of sevive attack, and observed the network behavior under the smurf attack. The results showed that the firewall class and packet manipulator developed in this paper worked normaly.

A Study on the Changing Factors of the Power Transition among the Gov ernments of Somalia and Terrorisms (소말리아 정부와 테러조직 간 권력구도 변화 영향요인 연구)

  • Lee, Pyo-Kyu
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.137-147
    • /
    • 2021
  • The purpose of this study is to summarize the variables for making the power expansion of terrorist organizations possible by analyzing the power transitions among the Somalia governments and terrorisms. For this, I created a framework after extracting the independent variables affecting the power transition using the theories of Hans J. Morgenthau, A.F.K Organski, K.J. Holsti. On the basis of these, I analyzed the power transitions among the organizations from August 2012(the foundation of Federal government) to August 2019. According to the results, the power area of the federal government is extremely narrowed, whereas the power areas of al-Shabaab, ISIS, and neutral conflict are largely expanded. The factors in the framework were embodied as the delay of powerful federal government foundation, the shortage of national military forces, the limitation of effective use of foreign forces, the continuation of cooperation and antagonism among armed terrorist organization, sanctuary environment of terrorists using the Sharia law, advantages of force recruitment resulted from the bad economic conditions, public support suitable for the Somalia environment. All of these factors work the causes of lasting anarchy condition of the federal government of Somalia by making the settlement of conflict against terrorist organizations.

Verification of Human Error Factors for Access Control of Bodyguards through Multiple Risk Case Analysis

  • Kim, Jin-Hwan;Kim, Sang-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.143-150
    • /
    • 2020
  • The purpose of this study is to investigate the human error of bodyguards caused in the process of performing access control activities between security missions, focusing on multiple risk cases, and to suggest countermeasures accordingly. To verify this, after arranging the sequence of events in a time series, the VTA technique and Why-Why analysis technique that can easily identify the problem centered on the variable node were used. In addition, environmental factors and personal factors that cause human errors were extracted through M-SHEL Metrix. As a result of analyzing multiple risk cases through such a method, the security environment factors that cause access control accidents include lack of time (impatience), prejudice against visitors, intensive work methods, lack of security management, unattended travel, and familiar atmosphere. (Relaxation), formal work activities, convenience provision, and underestimation were surveyed. In addition, human errors caused by personal security guards were investigated as low alertness, formal work, negligence of inspection, and comfortable coping.

Two-Dimensional Face Recognition Algorithm using Outlet Information based on the FDP (FDP 정보를 이용한 2차원 얼굴영상정보 복원기법)

  • Jo, Nam-Chul;Lee, Ki-Dong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.333-338
    • /
    • 2004
  • Today CCTV can be come across easily in public institutions, banks and etc. These CCTV plays very important roles for preventing many kinds of crimes and resolving those crime affairs. But in the case of recording a image of a specific person far from the CCTV, the original image needs to be enlarged and recovered in order to identify the person more obviously. The interpolation is usually used for the enlargement and recovery of the image. This interpolation has a certain limitation. As the magnification of enlargement is getting bigger, the quality of the original image can be worse than before. This paper uses FDP(Face Definition Parameter) of MPEG-4 SNHC FBA group and introduces a new algorithm that the face outline of a face image using Vector Descriptor based on the FDP makes possible better image recovery than the known methods until now.

  • PDF

A Study on the Feasibility of Developing a Nationwide Cyber Risk Management System utilizing Social-Science Analytic Theories (사회과학적 위기관리이론을 활용한 국가사이버안보 평가체계 구축 가능성 고찰)

  • 이상호
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.259-265
    • /
    • 2004
  • Since the 2003.1.25 Internet Crisis, the government has been looking at a number of options to strengthen national cyber-security/crisis management capability to guard against ever increasing threat of cyber-war and terror. Thus, the focus of this study was to explorer new ways of developing a comprehensive cyber-security/crisis management system, in particular by combining modern social-science analytic theories. As a result, although there has to be more in-depth researches into incorporating advanced techniques to generate more detailed and object-specific indexes and protocols, the use of 'event data system,' which has been widely utilized in many recent social science researches to assess a wide-range of socio-political risks and crises, could be adopted as a basis for a comprehensive nationwide cyber-risk management system.

  • PDF

Design and Implementation of Internet Worm Spreading Prevention System (인터넷 웜 확산방지 시스템의 설계 및 구현)

  • 최양서;서동일
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.327-331
    • /
    • 2004
  • The new cyber world has created by Internet that is prosperous rapidly. But with the expansion of Internet the hacking and intrusion are also increased very much. Actually there were many incidents in Internet, but the damage was restricted within a local area and local system. However, the Great 1.25 Internet Disturbance has paralyzed the national wide Internet environment. It because the Slammer Worm. The worm is a malformed program that uses both of the hacking and computer virus techniques. It autonomously attacks the vulnerability of Windows system, duplicates and spreads by itself. Jus like the Slammer Worm, almost every worms attack the vulnerability of Windows systems that installed in personal PC. Therefore, the vulnerability in personal PC could destroy the whole Internet world. So, in this paper we propose a Internet Worm Expanding Prevention System that could be installed in personal PC to prevent from expanding the Internet Worm. And we will introduce the results of developed system.

  • PDF

Anomaly Intrusion Detection using Fuzzy Membership Function and Neural Networks (퍼지 멤버쉽 함수와 신경망을 이용한 이상 침입 탐지)

  • Cha, Byung-Rae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.595-604
    • /
    • 2004
  • By the help of expansion of computer network and rapid growth of Internet, the information infrastructure is now able to provide a wide range of services. Especially open architecture - the inherent nature of Internet - has not only got in the way of offering QoS service, managing networks, but also made the users vulnerable to both the threat of backing and the issue of information leak. Thus, people recognized the importance of both taking active, prompt and real-time action against intrusion threat, and at the same time, analyzing the similar patterns of in-trusion already known. There are now many researches underway on Intrusion Detection System(IDS). The paper carries research on the in-trusion detection system which hired supervised learning algorithm and Fuzzy membership function especially with Neuro-Fuzzy model in order to improve its performance. It modifies tansigmoid transfer function of Neural Networks into fuzzy membership function, so that it can reduce the uncertainty of anomaly intrusion detection. Finally, the fuzzy logic suggested here has been applied to a network-based anomaly intrusion detection system, tested against intrusion data offered by DARPA 2000 Intrusion Data Sets, and proven that it overcomes the shortcomings that Anomaly Intrusion Detection usually has.