• Title/Summary/Keyword: 사전취약

Search Result 361, Processing Time 0.024 seconds

Basic Principles for Establishing Legal Regime of Environmental Health in Korea (환경보건 관련 법제도 수립의 기본원칙에 관한 고찰)

  • Shim, Young-Gyoo;Park, Jeong-Im
    • Journal of Environmental Policy
    • /
    • v.5 no.4
    • /
    • pp.127-154
    • /
    • 2006
  • It has been widely accepted that the environment is an important determining factor of human health. Appreciating the relationship between the environment and human health, Korean government has begun to deal with issues of environmental health. The government proclaimed the year of 2006 to be the first year of Environmental Health and established "The Environmental Health Plan for the next 10 Year". In order to achieve the goals in the plan, there are necessary considerations such as support systems for environment health related research, investigation, law, institution, administration, and so forth. This study suggests basic principles required to establish a legal regime of environmental health which is to implement the environmental health policies in Korea. Several cases of foreign legislation and policy relevant to environmental health are reviewed. Also, existing related legal system in Korea are analysed considering legal and institutional elements for establishing an effective environmental health policy. The main purpose of amending legal system related environmental health is to protect both public health and the soundness of ecosystem. To reach the goals effectively, the concept of 'environmental health' should be clearly established and presented. In addition, an advanced prevention system, including investigation and prevention of the cause of environmental diseases and risk assessment based on the precautionary principle, are substantial in the environmental health legislation. Also the environmental health law should guarantee public participation in decision making as well as the first consideration of susceptible or vulnerable population. This study concludes that the expected legislation related to environmental health should be a nonnative instrument not only for integrating each environmental protection scheme but also for establishing and implementing the policy.

  • PDF

A Key Pre-distribution Scheme Using Double Hash Chain for Strong Security Strength of Wireless Sensor Node (무선 센서 노드의 강한 보안 강도를 위해 이중 해쉬 체인을 적용한 키 사전 분배 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8C
    • /
    • pp.633-641
    • /
    • 2008
  • Since WSNs encounter attacks, such as jamming or eavesdropping without physical access occurs, security is one of the important requirements for WSNs. The key pre-distribution scheme that was recently researched for advance of security in WSNs distributes the keys and probability with the use of q-composite random key pre-distribution method, but there is a high probability that no key shared between sensor nodes, and it takes a lot of time and energy to find out the shared key. Therefore, it is not suitable for WSNs. In order to enhance stability of a node that plays a role of gateway without depending on probabilistic key, this paper proposesa key pre-distribution scheme combined with random key pre-distribution scheme and double hash chain. Since the proposed scheme can maintain a small storage place and strong security strengths, it is more efficient than the existing schemes with the same security strengths. In addition, since it uses a small size of key generation key set, it can reduce a great deal of storage overhead.

Anomaly Detection Mechanism based on the Session Patterns and Fuzzy Cognitive Maps (퍼지인식도와 세션패턴 기반의 비정상 탐지 메커니즘)

  • Ryu Dae-Hee;Lee Se-Yul;Kim Hyeock-Jin;Song Young-Deog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.9-16
    • /
    • 2005
  • Recently, since the number of internet users is increasing rapidly and, by using the Public hacking tools, general network users can intrude computer systems easily, the hacking problem is setting more serious. In order to prevent the intrusion. it is needed to detect the sign in advance of intrusion in a Positive Prevention by detecting the various forms of hackers intrusion trials to know the vulnerability of systems. The existing network-based anomaly detection algorithms that cope with port-scanning and the network vulnerability scans have some weakness in intrusion detection. they can not detect slow scans and coordinated scans. therefore, the new concept of algorithm is needed to detect effectively the various. In this Paper, we propose a detection algorithm for session patterns and FCM.

  • PDF

Application of GIS to Typhoon Risk Assessment (지리정보시스템을 이용한 태풍 위험 평가)

  • Lee, Sung-Su;Chang, Eun-Mi
    • Spatial Information Research
    • /
    • v.17 no.2
    • /
    • pp.243-249
    • /
    • 2009
  • Damages from typhoon events have contributed more than 60 percent of total economic and social loss and the size of loss have been increased up to 800 million dollars per year in Korea, It is therefore necessary to make an effort to mitigate the loss of natural disasters. To facilitate the evaluation of damages in advance and to support the decision making to recover the damages, scientific methods have been adopted. With the effort, GIS data can provide various tools. Three components of hazard mapping are estimation of hazard, inventory for vulnerable features, and fragility of each feature. Vulnerability of natural disaster can be obtained by relation between loss and meteorological data such as precipitation and wind speed. Features can be categorized from other GIS data of public facilities and private properties, and then social and economic loss can be estimated. At this point, GIS data conversions for each model are required. In this study, we build a method to estimate typhoon risk based on GIS data such as DEM, land cover and land use map, facilities.

  • PDF

초기재혼부부의 결혼생활유지에 자기분화, 부부갈등대처방식에 미치는 영향

  • Byeon, Sang-Hae;Park, Hui-Jeong
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2018.04a
    • /
    • pp.137-142
    • /
    • 2018
  • 본 연구는 초기재혼부부의 결혼생활유지에 자기분화, 부부갈등대처방식에 미치는 효과의 프로그램을 개발하기 위한 사전 연구로서 재혼부부를 대상으로 자기분화, 부부갈등대처방식이 어떤 영향을 미치는지를 연구하고자 한다. 요구도 조사를 위한 포커스 인터뷰 대상은 서울과 경기도 수도권에 사는 부부이고 나이는 30세 이상에서 62세 미만을 선정하였으며, 재혼생활 기간이 1년 이상 6년 미만의 실질적 경험이 있는 부부를 선정하였으며, 부부 한쪽이라도 배우자가 전혼관계를 통해 자녀가 있는 복합가정을 선정하였다. 본 연구는 재혼부부를 대상으로 2017년 4월 4일부터 5월 25일까지 포커스 인터뷰를 실시하였다. 1회기에 100분씩 총 2회기로 개별적 인터뷰를 실시하였다. 포커스 인터뷰를 실시한 결과, 재혼부부들은 원가족에서 형성된 미분화로 역기능적인 습관들이 삼각관계를 형성하고 불안을 더욱 증폭시켰다. 부부가 문제해결을 하는 상황에서 낮은 자아분화 수준으로 표현하며 갈등을 더욱 고조시켰다. 낮은 자기분화수준은 갈등관계에서 자신을 이성과 감정을 분리하지 못하고 감정적으로 반응하기도 하며, 환경에 흡수되는 부정적 갈등 대처방식에도 영향을 미쳤다. 재혼부부에게 가장 취약한 면이 부부간 친밀감이며 유대관계이다. 전혼에서 상처와 부정적 정서로 인해 부부 신뢰감이 취약하였다. 비교적 짧은 재혼기간의 영향과 여러 갈등 요소 인 경제적 갈등, 계부모-친부모의 갈등, 계부모-계자녀의 갈등, 전 배우자와의 갈등, 부부간 잠재적 갈등 등으로 인해 친근한 부부유대관계를 맺지 못하는 어려움을 호소하기도 하였다. 특히 전혼관계의 배우자에 대한 부정적 경험이 남아 있을 경우 현재 배우자를 신뢰하지 못하는 갈등이 영향을 주고 있었다. 그로 인한 부부갈등의 악순환을 초래하는 것으로 나타났다. 본 연구는 재혼부부의 결혼생활유지를 돕는 자기분화, 갈등대처방식에 미치는 통합적 프로그램을 구성하려고 하는 필요성을 시사하는 것이다. 점진적으로 재이혼은 증가하여 부부 및 가족 구성원인 또 다시 부정적 영향을 미치고, 사회문제로 확산될 수 있음을 시사한다. 예방적 차원에서 재혼부부의 결혼생활유지 프로그램에 대한 필요성을 시사한다.

  • PDF

A study on User Authentication Technology of Numeric based Pattern Password (숫자기반의 패턴 형식 패스워드 사용자인증 기술)

  • Ju, Seung-Hwan;Seo, Hee-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.65-73
    • /
    • 2012
  • The traditional text-based password is vulnerable guessing, dictionary attacks, keyloggers, social engineering, stole view, etc. these vulnerability effect more serious problem in a mobile environment. In this study, By using the pattern number to enter the password of an existing four-digit numeric password, User easily use to new password system. The technology on pattern based numerical password authorization proposed in this paper would intensify the security of password which holds existing 10 numbers of cases by authorizing a user and would not invade convenience of use by providing high security and making users memorize only four numbers like old method. Making users not have inconvenience and raising complexity, it would have a strength to an shoulder surfing attack of an attacker. So I study password system that represents the shape-based of number. I propose the new password system to prevent peeking attacks and Brute-force attack, and this proposal is to review the security and usability.

A Robust Pair-wise Key Agreement Scheme based on Multi-hop Clustering Sensor Network Environments (멀티홉 클러스터 센서 네트워크 환경 기반에서 견고한 키 교환)

  • Han, Seung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.251-260
    • /
    • 2011
  • In this paper, we proposed a scheme that it safely exchanges encrypted keys without Trust Third Party (TTP) and Pre-distributing keys in multi-hop clustering sensor networks. Existing research assume that it exists a TTP or already it was pre-distributed a encrypted key between nodes. However, existing methods are not sufficient for USN environment without infrastructure. Some existing studies using a random number Diffie-Hellman algorithm to solve the problem. but the method was vulnerable to Replay and Man-in-the-middle attack from the malicious nodes. Therefore, authentication problem between nodes is solved by adding a ��TESLA. In this paper, we propose a modified Diffie-Hellman algorithm that it is safe, lightweight, and robust pair-wise agreement algorithm by adding One Time Password (OTP) with timestamp. Lastly, authentication, confidentiality, integrity, non-impersonation, backward secrecy, and forward secrecy to verify that it is safe.

A Planning Direction of Resilient Waterfront City considering Technological and Social Meaning (기술·사회적 특성을 고려한 워터프론트 도시의 리질리언트 공간계획)

  • Lee, Kum-Jin;Choi, Jin-Hee
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.352-359
    • /
    • 2018
  • Purpose: This study aims to suggest new strategy of planning water management and land use in response to abnormal weather which allow waterfront to be the cities through the experience of Netherlands resilient project. Method: A planning direction is developed based on Dutch national resilient policy and strategy as well as resilient theory of technical and social aspects, focusing on a new waterfront development that responds to abnormal weather. Results: The water control strategy, for flexibly responding to the sea level rise and flooding caused by the climate change through the experience of Dutch resilience, is as follows: 1)Customized prevention plan according to the local property 2)Creating spatial planning by considering disaster risk level and fragility 3)Establishing urban planning by considering the flood risk level. Conclusion: A new urban development method, particularly a resilience strategy based on the waterfront space where is most vulnerable to climate change, is required to cope with the abnormal climate beyond the conventional planning.

Zero-knowledge Based User Remote Authentication Over Elliptic Curve (타원곡선상의 영지식기반 사용자 원격인증 프로토콜)

  • Choi, Jongseok;Kim, Howon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.517-524
    • /
    • 2013
  • Although password-based authentication as known as knowledge-based authentication was commonly used but intrinsic problems such as dictionary attack remain unsolved. For that the study on possession-based authentication was required. User remote authentication using smartcard is proceeding actively since Lee et al. proposed user remote authentication using knowledge-based information(password) and possession-base information(smartcard) in 2002. in 2009, Xu et al. proposed a new protocol preserving user anonymity and Shin et al. proposed enhanced scheme with analysis of its vulnerabilities on user anonymity and masquerading attack in 2012. In this paper, we analyze Shin et al. scheme on forward secrecy and insider attack and present novel user authentication based on elliptic curve cryptosystem which is secure against forward secrecy, insider attack, user anonymity and masquerading attack.

Hash-based SSDP for IoT Device Security (IoT 기기 보안을 위한 해시 기반의 SSDP)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.9-16
    • /
    • 2021
  • Due to the prolonged infectious disease of COVID-19 worldwide, there are various security threats due to network attacks on Internet of Things devices that are vulnerable to telecommuting. Initially, users of Internet of Things devices were exploited for vulnerabilities in Remote Desktop Protocol, spear phishing and APT attacks. Since then, the technology of network attacks has gradually evolved, exploiting the simple service discovery protocol of Internet of Things devices, and DRDoS attacks have continued to increase. Existing SSDPs are accessible to unauthorized devices on the network, resulting in problems with information disclosure and amplification attacks on SSDP servers. To compensate for the problem with the authentication procedure of existing SSDPs, we propose a hash-based SSDP that encrypts server-specific information with hash and adds authentication fields to both Notify and M-Search message packets to determine whether an authorized IoT device is present.