• Title/Summary/Keyword: 불법 해고

Search Result 82, Processing Time 0.026 seconds

A Study on Origin of Coastal-Offshore Illegal Fisheries and some Establishment Devices of Fishery Order in Korea (우리나라 연근해 불법어업의 유형별 발생원인과 어업질서 확립방안에 관한 연구)

  • CHOI, Jong-Hwa;JEONG, Do-Hun;CHA, Cheol-Pyo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.14 no.2
    • /
    • pp.191-212
    • /
    • 2002
  • The economic and social bad influences of the illegal fishery bring about the results of the fishery resources exhaustion, of the fishery disorder and of the obstruction to sound management for fishery. The typical illegal fishery conducted in the coastal and offshore area of Korea can be divided as follows; fishery conducted by legally unauthorized method, fishery without permission from the Government, and fishery conducted in contravention of the laws and regulations concerning the fishing vessel, fishing gear and fishing method etc. The major reasons of origination of the illegal fishery in the coastal and offshore area of Korea are; Firstly, almost of the fishermen are poorly equipped in economical scale, Secondly, it is very easy to approach the illegal fishery because the domiciliation condition of the fishing village is deteriorated. Thirdly, almost of the fishermen are lacking in lawabiding spirit. Fourthly, the insolvent and unstable fisheries management policy with the lukewarm enforcement of the fisheries laws and regulations by the Government. Fifthly, the small scale family supporting fisheries are widespreaded. Sixthly, to retrieved the economical difficulties the fishermen are easily led astray the illegal fishery. As a conclusion the authors made some suggestions to stamp out the illegal fishery by this study. For the first, temptation fishermen into lawabiding fishery through intensification of the penal regulations is required. Second, simplification of the fishery type through combination of resemble fishing methods is required. Third, actual improvement of the fundamental fishery permission regime is required. Fourth, Introduction of the self-regulating or co-management system for the fishery management is required.

An Efficient Authentication Mechanism Strengthen the Privacy Protection in 3G Network (3G 네트워크에서 프라이버시 보호를 강화한 효율적인 인증 메커니즘)

  • Jeon, Seo-Kwan;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.5049-5057
    • /
    • 2010
  • As communication technologies are developed and variety of services to mobile devices are provided, mobile users is rapidly increasing every year. However, mobile services running on wireless network environment are exposed to various security threats, such as illegal tampering, eavesdropping, and disguising identity. Accordingly, the secure mobile communications services to 3GPP were established that the standard for 3GPP-AKA specified authentication and key agreement. But in the standard, sequence number synchronization problem using false base station attack and privacy problem were discovered through related researches. In this paper, we propose an efficient authentication mechanism for enhanced privacy protection in the 3G network. We solve the sequence number synchronization existing 3GPP authentication scheme using timestamp and strengthen a privacy problem using secret token. In addition, the proposed scheme can improve the bandwidth consumption between serving network and home network and the problem of authentication data overhead for the serving network because it uses only one authentication vector.

Improving the Performance of Mutual Authentication and Session Key Agreement Protocols for Mobile Communication (이동 통신 환경에서의 상호인증 및 세션키 공유 프로토콜의 성능 향상)

  • Lee, Seung-Won;Hong, Seong-Min;Yun, Hyeon-Su;Jo, Yu
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1391-1400
    • /
    • 1999
  • 이동 통신은 대기를 전달매체로 하고 이동단말기를 사용하기 때문에 가로채기나 불법사용과 같은 공격에 취약하다. 이를 극복하기 위해, 이동 통신 환경에서 이동단말기와 기지국 사이에 안전한 통신을 제공하기 위한 많은 프로토콜들이 제안되어왔다. 그러나 이동단말기의 부족한 계산능력과 전력량 때문에 공개키를 이용한 프로토콜들은 많은 장점에도 불구하고 충분히 활용되지 못했다. 본 논문에서는 이동 통신 환경에서 기지국과 이동단말기 사이의 상호인증 및 세션키 공유 프로토콜들의 성능을 향상시킬 수 있는 기법을 제안한다. 본 논문에서 제안하는 기법은 이동단말기의 비밀 정보를 기지국에게 드러나게 하지 않으면서 많은 계산을 기지국으로 하여금 대신 수행하도록 하는 것이다. 제안된 기법은 기존의 프로토콜들을 최대 5배까지 성능을 향상시키며 해당하는 만큼 이동단말기의 전력량 소모를 감소시킬 수있다.Abstract Mobile communication is more vulnerable to security attacks such as interception and unauthorized access than fixed network communication. To overcome these problems, many protocols have been proposed to provide a secure channel between a mobile station and a base station. However, these public-key based protocols have not been fully utilized due to the poor computing power and small battery capacity of mobile stations. In this paper, we propose techniques for accelerating public-key based key establishment protocols between a mobile station and a base station. The proposed techniques enable a mobile station to borrow computing power from a base station without revealing its secret information. The proposed schemes accelerate the previous protocols up to five times and reduce the amount of power consumption of mobile stations.

A GOSST Heuristic Mechanism for the Design of a Physical Multiple Security Grade Network (물리적 다중 보안 등급 네트워크 설계를 위한 GOSST 휴리스틱 메커니즘)

  • Kim, In-Bum;Kim, Chae-Kak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.728-734
    • /
    • 2007
  • In this paper, we propose a GOSST(Grade Of Services Steiner minimum Tree) heuristic mechanism for the design of a physical multiple security grade network with minimum construction cost. On the network, each node can communicate with other nodes by its desiring security grade. Added to the existing network security methods, the preventing method from illegal physical access is necessary for more safe communication. To construct such network with minimum cost, the GOSST problem is applied. As the GOSST problem is a NP-Hard problem, a heuristic with reasonable complexity is necessary for a practical solution. In this research, to design the physical multiple security grade network with the minimum construction cost, the reformed our previous Distance Direct GOSST heuristic mechanism is proposed. The mechanism brings average 29.5% reduction in network construction cost in comparison with the experimental control G-MST.

A Protection Technique for Kernel Functions under the Windows Operating System (윈도우즈 운영체제 기반 커널 함수 보호 기법)

  • Back, Dusung;Pyun, Kihyun
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.133-139
    • /
    • 2014
  • Recently the Microsoft Windows OS(operating system) is widely used for the internet banking, games etc. The kernel functions provided by the Windows OS can perform memory accesses, keyboard input/output inspection, and graphics output of any processes. Thus, many hacking programs utilizes those for memory hacking, keyboard hacking, and making illegal automation tools for game programs. Existing protection mechanisms make decisions for existence of hacking programs by inspecting some kernel data structures and the initial parts of kernel functions. In this paper, we point out drawbacks of existing methods and propose a new solution. Our method can remedy those by modifying the system service dispatcher code. If the dispatcher code is utilized by a hacking program, existing protection methods cannot detect illegal operations. Thus, we suggest that protection methods should investigate the modification of the dispatcher code as well as kernel data structures and the initial parts of kernel functions.

Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks (무선 센서 네트워크에서 행위 기반 공격 탐지를 위한 감시 노드의 연결성과 일반 노드의 커버리지 분석)

  • Chong, Kyun-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.27-34
    • /
    • 2013
  • In wireless sensor networks, sensors need to communicate with each other to send their sensing data to the administration node and so they are susceptible to many attacks like garbage packet injection that cannot be prevented by using traditional cryptographic approaches. A behavior-based detection is used to defend against such attacks in which some specialized monitoring nodes overhear the communications of their neighbors to detect bad packets. As monitoring nodes use more energy, it is desirable to use the minimal number of monitoring nodes to cover the whole or maximal part of the network. The monitoring nodes can either be selected among the deployed normal nodes or differ in type from normal nodes. In this study, we have developed an algorithm for selecting the predefined number of monitoring nodes needed to cover the maximum number of normal nodes when the different types of normal nodes and monitoring nodes are deployed. We also have investigated experimentally how the number of monitoring nodes and their transmission range affect the connection ratio of the monitoring nodes and the coverage of the normal nodes.

An Improved Model Design for Traceback Analysis Time Based on Euclidean Distance to IP Spoofing Attack (IP 스푸핑 공격 발생 시 유클리드 거리 기반의 트레이스 백 분석시간 개선 모델)

  • Liu, Yang;Baek, Hyun Chul;Park, Jae Heung;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.11-18
    • /
    • 2017
  • Now the ways in which information is exchanged by computers are changing, a variety of this information exchange method also requires corresponding change of responding to an illegal attack. Among these illegal attacks, the IP spoofing attack refers to the attack whose process are accompanied by DDoS attack and resource exhaustion attack. The way to detect an IP spoofing attack is by using traceback information. The basic traceback information analysis method is implemented by comparing and analyzing the normal router information from client with routing information existing in routing path on the server. There fore, Such an attack detection method use all routing IP information on the path in a sequential comparison. It's difficulty to responding with rapidly changing attacks in time. In this paper, all IP addresses on the path to compute in a coordinate manner. Based on this, it was possible to analyze the traceback information to improve the number of traceback required for attack detection.

A Study on the Improvement of Pedestrian Environment for the Mobility Handicapped on the Use of Personal Mobility Vehicle (개인형 이동수단의 이용에 따른 교통약자의 보행환경 개선에 관한 연구)

  • Lee, Joo-Hyung;Lee, Kyoo-Il
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.2
    • /
    • pp.201-213
    • /
    • 2021
  • Recently, personal mobility has been spreading and using increasing, but the pedestrian environment is getting worse and accidents are also rapidly increasing. Therefore, this study conducts a status survey related to the elements of pedestrian disturbances in personal mobility and identifies the problems. The following measures are presented to improve the pedestrian environment for the mobility handicapped through expert opinion surveys. The movement of individual mobility means in the walking space is prohibited, and the speed limit shall be stipulated to enable the mobility handicapped to walk safely and conveniently. Parking spaces will have to create obstacle zones in the parking area next to the roadway or at the border of sidewalks and roads, and regulations are needed to collect illegally parked vehicles. It is necessary to switch from the existing automobile-oriented road to the road structure considering the use of low and medium-speed vehicles.

US-China Hegemony Competition and Gray-Zone Conflict in the Post-Coronavirus Era: Response strategies of the Korean Navy and Coast Guard (포스트 코로나시대 미중 패권경쟁과 회색지대갈등: 한국 해군·해경의 대응전략)

  • Lee, Shin-wha;Pyo, Kwang-min
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.149-173
    • /
    • 2020
  • While the United States and other Western states are in trouble with COVID-19 crisis, China is continuing its aggressive ocean expansion with its Gray-zone strategy. The Gray-zone strategy, which China uses around the South China Sea, refers to a strategy that promotes a change in international politics by creating an unclear state, neither war or peace. China, which is trying to expand its influence across East Asia, will also try to project a Gray zone strategy on the Korean Peninsula. The possible scenarios are as follows: 1) South Korea is accidentally involved in a dispute in the South China Sea, 2) Military conflicts between South Korea and China is caused by illegal fishing of Chinese boats in Yellow Sea, 3) China tries to interfere with Socotra Rock, 4) Unlikely, but possible in the future that China induce the military conflicts between Korea and Japan on the Dokdo issue. In order to cope with these scenarios, Korea should prepare the following measures from a long-term perspective: the creation of an Asian maritime safety fleet, the integ rated operation of the navy and the coast guard in the framework of the national fleet, and strengthening the conflict control system for China's provocations.

  • PDF

The China Coast Guard Law (2021): A New Tool for Intimidation and Aggression (중국해안경비법(Coast Guard Law)(2021): 위협과 공격을 위한 도구)

  • Pedrozo, Raul (Pete)
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.1-44
    • /
    • 2021
  • China's new Maritime Policy Law (MPL) purports to regulate the duties of China's maritime police agencies, including the China Coast Guard, and safeguard China's sovereignty, security, and rights and interest. The MPL has potentially far-reaching application, as China claims extensive maritime areas off its mainland and in the South China Sea. This expansive application of maritime law enforcement jurisdiction is problematic given that most of China's maritime claims are inconsistent with international law. To the extent that the MPL purports to assert jurisdiction over foreign flagged vessels in disputed areas or on the high seas, it contravenes international law. Numerous provisions of the MPL regarding the use of force are also inconsistent with international rules and standards governing the use of maritime law enforcement jurisdiction, as well as the UN Charter's prohibition on the threat or use of force against the territorial integrity or political independence of any state. China could use the MPL as a subterfuge to advance its illegal territorial and maritime claims in the South and East China Seas and interfere with coastal State resource rights in their respective exclusive economic zone.

  • PDF