• Title/Summary/Keyword: 사전취약

Search Result 362, Processing Time 0.025 seconds

A Study on 8-Stage Loading Method of the Scaffolding Module for LNG Carriers (LNG 운반선 비계 모듈의 8단 탑재 방안 연구)

  • Shin, Sang-Hoon;Ko, Dae-Eun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.78-85
    • /
    • 2020
  • The scaffolding system, which is a construction workbench of the cargo containment for a membrane LNG carrier, is a large truss structure composed of various members. To shorten the installation period and process of the scaffolding system, it is effective to enlarge the mounting unit from the existing two stages to eight stages. Owing to the increase in lifting load according to the large size of the module, the stresses around the pin and hole will be increased significantly. In this study, a tensile strength test and contact stress analysis were performed to confirm the structural safety. The relatively large hole deformation was observed visually near the average load generated in the vertical pipe at the top through tensile strength tests. A contact stress calculation confirmed the stress distribution around the hole. The contact problem was dealt with in terms of the Herzian contact stress. The possibility of 8-stage loading was examined by comparing the yield strength and contact stresses of failure critical locations. As a result, the 8-stage loading method of the existing scaffolding material was inadequate, and a new loading method with proper safety is proposed.

Key Bit-dependent Attack on Side-Channel Analysis-Resistant Hardware Binary Scalar Multiplication Algorithm using a Single-Trace (부채널 분석에 안전한 하드웨어 이진 스칼라 곱셈 알고리즘에 대한 단일 파형 비밀 키 비트 종속 공격)

  • Sim, Bo-Yeon;Kang, Junki;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1079-1087
    • /
    • 2018
  • Binary scalar multiplication which is the main operation of elliptic curve cryptography is vulnerable to the side-channel analysis. Especially, it is vulnerable to the side-channel analysis which uses power consumption and electromagnetic emission patterns. Thus, various countermeasures have been studied. However, they have focused on eliminating patterns of data dependent branches, statistical characteristic according to intermediate values, or the interrelationships between data. No countermeasure have been taken into account for the secure design of the key bit check phase, although the secret scalar bits are directly loaded during that phase. Therefore, in this paper, we demonstrate that we can extract secret scalar bits with 100% success rate using a single power or a single electromagnetic trace by performing key bit-dependent attack on hardware implementation of binary scalar multiplication algorithm. Experiments are focused on the $Montgomery-L{\acute{o}}pez-Dahab$ ladder algorithm protected by scalar randomization. Our attack does not require sophisticated pre-processing and can defeat existing countermeasures using a single-trace. As a result, we propose a countermeasure and suggest that it should be applied.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Extraction of Landslide Risk Area using GIS (GIS를 이용한 산사태 위험지역 추출)

  • Park, Jae-Kook;Yang, In-Tae;Park, Hyeong-Geun;Kim, Tai-Hwan
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.26 no.1
    • /
    • pp.27-39
    • /
    • 2008
  • Landslides cause enormous economic losses and casualties. Korea has mountainous regions and heavy slopes in most parts of the land and has consistently built new roads and large-scale housing complexes according to its industrial and urban growth. As a result, the damage from landslides becomes greater every year. In summer, landslides frequently occur due to local torrential rains and storms. It is critical to predict the potential areas of landslides in advance and to take preventive measures to minimize consequences and to protect property and human life. The previous study on landslides mostly focused on identifying the causes of landslides in the areas where they occurred, and on analyzing landslide vulnerability around the areas without considering rainfall conditions. Thus there were not enough evaluations of the direct risk of landslides to human life. In this study, potentially risky areas for landslides were identified using the GIS data in order to evaluate direct risk on farmlands, roads, and artificial structures that were closely connected to human life. A map of landslide risk was made taking into account rainfall conditions, and a land use map was also drawn with satellite images and digital maps. Both maps were used to identify potentially risky areas for landslides.

A Study on the Optimal Location of the Inclinometer and Strain Gauge in Small-Scale Underground Excavation (소규모 지하굴착에서 지중경사계와 변형률계의 최적 위치 선정에 대한 연구)

  • Gichun Kang;Jinuk Park;Byeongjin Roh;Jiahao Sun;Seong-Kyu Yun
    • Journal of the Korean Geosynthetics Society
    • /
    • v.22 no.2
    • /
    • pp.23-33
    • /
    • 2023
  • Currently, there are cases in Korea where economic damage has occurred due to the ambiguity instrument installation and operation standards in the construction of temporary earth retaining wall, failing to prevent collapse of temporary earth retaining wall at the construction site in advance. Therefore, in this study, a numerical analysis was conducted to find the appropriate installation location of the inclinometer and strain gauge among the installed instruments shown in the design drawing of the temporary earth retaining wall. As a results, It was found that the installation position of the underground inclinometer is the corner of the retaining wall in the case of plane-deformation analysis, and the most displacement occurs in the center of the excavation surface in the case of 3D analysis. When the stress and moment are comprehensively analyzed, the corner is judged to be a vulnerable point. In the case of the strain gauge, In plane-deformation analysis and 3D analysis, the maximum bending stress occurred at the wale connection where the end of the strut and the counter strut are in contact. At this point, it is analyzed that it is necessary to focus on installing and managing the connection to prevent accidents from being vulnerable.

Review on Prior Evaluation for Terrorism Risk of High-rise Buildings (초고층건축물의 테러 위험도 사전평가에 관한 연구)

  • Seong, Bin;Lee, Yoon-Ho
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.293-316
    • /
    • 2013
  • Today's high-rise buildings are increasing concern about the safety and evacuation of people related to the fire and threat from outside. Terrorism breaking out in high-rise buildings, a symbol of the national economy results in a number of casualties, economic loss, social fear and damage to national status. That's why high-rise building has also emerged as a target of major terrorist attacks, compared to other types of buildings. We have 54 high-rise buildings in 15 regions over the country. The Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government have offered the guidelines to prevent terrorist attacks toward high-rise buildings. Since the 9/11 terrorist attacks, the U.S. Federal Emergency Management Agency (FEMA) has developed and taken advantage of the Risk Management Manual Series. According to this manual, pre-assessment is conducted for the prevention of terrorism and particularly in FEMA 455, risk of the surrounding areas, vulnerability, possibility from terrorist attacks are checked. After the check, experts classify the risk of terrorist attacks toward the high-rise buildings and according to the risk classification, architects, security experts and structure engineers can carry out terrorism prevention program for high-rise buildings. The U.K. NaCTSO has also offered the terrorism prevention guidelines. Therefore, the Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government should make more concrete guidelines for high-rise buildings such as what U.S. FEMA and U.K. NaCTSO implement, including prior evaluation technique for terrorism risk.

  • PDF

Application Method of Remote Site Monitoring in Public Road Construction Projects (공공 도로건설사업에서의 원격 현장모니터링 적용방안에 관한 연구)

  • Ok, Hyun;Kim, Seong-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.12
    • /
    • pp.6550-6557
    • /
    • 2013
  • The public road construction projects awarded by the regional construction and management office, which is an affiliate of the Ministry of Land, Infrastructure and Transport, are managed by construction supervision officers. These officials frequently visit a large number of construction sites to conduct inspections and supervision tasks. Therefore, the site management efficiency is essential in terms of the time and money spent in travelling to the sites. The introduction of a site monitoring management system is considered necessary to minimize the number of site visits and enable remote monitoring of the construction progress to enhance the business efficiency of the construction supervision officers. In this study, a remote site monitoring system was constructed using web cameras for public road construction works. The trial applications were implemented by selecting ten constructions sites. The effectiveness of the system was analyzed to assess its applicability. In an assessment of the applicability of the verification results, remote site monitoring showed cost savings of approximately 35% compared to the existing site management. The guidelines for applying the site monitoring management system were provided, the introduction plan was investigated, and the improvement method was presented. The results showed that the system is likely to minimize the unnecessary site visits, remove the risk factors at vulnerable areas in the sites beforehand, and prevent a range of disasters and accidents. In addition, the quality of the infrastructures is likely to improve through the prevention of accidents and the elimination of substandard and faulty construction work.

Proposal on for Response System to primary leaders' Terrorism (국가요인 테러리즘의 대응체제 구축방안)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.61-86
    • /
    • 2006
  • Various terrorism in modern society against nation's dignitaries are constantly existing. They damage severely to the society and the nation's security, and they cause disorganizations of social and national rule orders. In order to provide the key figures' perfect protection, the threatening terroizing environment for primary leaders and the route of terrorism should be intercepted. Effective methods of these are summarized as follow. First, recent terrorism against the primary leaders are mostly assassinations, bomb attacks, and suicide bomb attacks, which terminate in a moment. Therefore, security service agents should keep in mind that protection is the best, and government's anti-terrorism agencies should develop policies and set the directions within a new paradigm to the advance anti-terrorism. Second, advance prevention activities against nation's VIP terrorism should be strengthened, such as strengthening security informational activities, constructing cooperative systems of domestic and international facilities, considering continuous system to prevent terrorism, and intensifying safety counterplans of human and material weak points. Third, international cooperative system should be set to apply economical and political sanctions to nations which support terror organizations in direct or indirect ways, and this system needs to strengthen the punishment against terrorists. Fourth, security systems to protect nation's primary leaders should complement, and developing programs for coping with the terrorism and establishing laws for anti-terrorism should be made. Also, educational training of agents who perform anti-terrorism duties should be strengthened, and scientific techniques and equipment for security should be made to protect primary leaders from terrorism.

  • PDF

Effectiveness of Intervention for the Caregivers of Long-term Care Elderly (장기요양보호대상노인 가족부양자에 대한 개입의 효과성)

  • Kim, Soo-Young
    • Korean Journal of Social Welfare
    • /
    • v.56 no.2
    • /
    • pp.285-310
    • /
    • 2004
  • The major purpose of this study is to examine effectiveness of an intervention program which aims at education/training caregivers of the dementia and/or stroke elderly. This program was conducted at group level. Participants of this program were the primary caregivers who have taken care of the elderly with dementia and/or stroke. To test the effectiveness of the caregiver education/training program, this study employed an quasi-experimental design: to compare pretest score with posttest ones for the same participants. Total forty two primary caregivers have completed the program. Seventeen caregivers were in experimental group, whereas twenty five ones belonged to control group. Our data suggest that, for the primary caregivers, subjective quality of life was more important than cargiving burden. Subjective quality of life among the caregivers significantly improved, after completing the program. This result suggests that a short-term intervention program at group level is not effective to reduce caregiving burden because an infra structure of community resources, to which the caregivers and their family access, did not remain at sufficient level. However, participants have showed improved mutual solidarity, and they have exposed to wider spectrum of a variety of information. As a result, they have perceived that the level of subjective quality of life has positively changed. Additional factors have influenced on determining the quality of life among the caregivers. The caregivers, whose demented elderly showed lower level of ADL and IADL, or who have experienced the short period of caregiving, were more likely to belong to higher level of quality of life. The quality of life among the caregivers were even more improved in the following group: being young, and highly educated, man. One of the contributions from this study is that we have found caregiver's characteristics, which need an intervention most. In addition, our study implies that specific contents of the caregivers' education/training program should be conducted based on each family's unique characteristics.

  • PDF

Analysis of Investment in Domestic Disaster Prevention and Planning (국내 재해예방투자 현황 및 계획 분석)

  • Kim, Dae-Gon;Park, Jong-Ryul
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.815-815
    • /
    • 2012
  • 우리나라의 경우 1조원 이상 피해를 입힌 자연재해가 '98년 이후 집중적으로 발생하는 등 최근 급격한 도시화 산업화 및 범지구적인 이상기후 현상으로 자연재해로 인한 피해가 점차 대형화 다양화되는 추세이다. 그에 따른 국내 재해관리 및 사전예방의 중요성은 그 동안 여러 차례 기획사업 및 재정계획을 통해 제시된 바 있으나, 대부분 추진계획 수립에 그치고 실질적인 예산 편성시에는 충분히 반연되지 못한 실정이다. 따라서 본 연구에서는 우리나라의 재해예방투자사업의 규모와 구체적 계획에 대하여 살펴보고자 한다. 재해사전예방 분야의 기존 투자계획으로는 "제1차 국가안전관리 5개년 기본계획"과 "2005-2009 국가재정운용계획", "수해방지대책 백서" 등이 있었으며 그 중 "제1차 국가안전관리 5개년 기본계획"은 정부역사상 처음으로 시행하는 중 장기 국가재난관리정책으로, 풍수해대책, 설해대책 등의 자연재해를 비롯하여 총 17개의 재난유형별 재난관리대책을 포괄하고 있으며, 11개 부처 및 시도에 대해 27개 사업, 36조 8천억원을 투자하는 계획을 제시하였다. 가장 최근에는 2010년 8월에 국무총리실 주도 재난관리 개선 민관합동 TF팀을 구성하여 기후변화 및 기상이변에 선제적 대응 및 기존 방재체계에 대한 근본 패러다임 전환을 통한 선진적 방재시스템 구축을 추진하기 위하여 기후변화대응 재난관리 개선 종합대책을 마련하였다. 일선 경험이 많은 민간전문가 주도로 철저히 현장 중심의 문제점과 대안을 검토하고 대책을 준비함으로서 기존의 재난관리대책 구축방법과 차별성을 띄었다고 할 수 있다. 이번 재난관리 개선 종합대책에서는 5개 시 도의 현장조사와 기존대책을 분석하고, 전문가 의견 등을 검토하여 도시유역종합치수계획, 소하천 및 사방댐 정비, 소규모 시설 정비 등 26건을 포함한 '99년부터 3회에 걸쳐 추진한 재해관련 범정부 종합대책을 검토하여 필요성이 있으나 추진이 미흡했던 과제는 포함시켰다. 또한 기후변화 대응에 필요한 신규과제 및 재해취약요인이 드러난 도시방재를 위한 개선과제를 집중 검토하도록 하였다. 다수부처 관련 쟁점과제에 대해서는 주관부처를 정하거나 민간 전문가가 참여하는 조정회의 및 세미나, 공청회를 통해 보완 검토하였다. 그 결과로서 2011년 전년대비 재해예방 관련 사업에 대한 국고 투자규모는 도시침수방지 17%, 수자원 관리 25%, 항만 정비 17%, 산사태 예방 24%, 농업기반시설 정비 20%, 위험지 정비 19%, 재난 예측 및 대응시스템 개선 16% 증가하여 투자계획이 수립되었으며 전체적으로는 약 21% 증가된 투자계획이 수립되었다.

  • PDF