• Title/Summary/Keyword: 사회적 위협

Search Result 670, Processing Time 0.03 seconds

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

Quantitative EC Signal Analysis on the Axial Notch Cracks of the SG Tubes (SG Tube 축방향 노치 균열의 정량적 EC 신호평가)

  • Min, Kyong-Mahn;Park, Jung-Am;Shin, Ki-Seok;Kim, In-Chul
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.29 no.4
    • /
    • pp.374-382
    • /
    • 2009
  • Steam generator(SG) tube, as a barrier isolating primary to the secondary coolant system of nuclear power plants(NPP), must maintain the structural integrity far the public safety and its efficient power generation capacity. And SG tubes bearing defects must be timely detected and taken repair measures if needed. For the accomplishment of these objectives, SG tubes have been periodically examined by eddy current testing(ECT) on the basis of administrative notices and intensified SG management program(SGMP). Stress corrosion cracking(SCC) on the SG tubes is not easily detected and even missed since it has lower signal amplitude and other disturbing factors against its detection. However once SCC is developed, that can cause detrimental affects to the SG tubes due to its rapid propagation rate. Accordingly SCC is categorized as prime damage mechanism challenging the soundness of the SG tubes. In this study, reproduced EDM notch specimens are examined for the detectability and quantitative characterization of the axial ODSCC by +PT MRPC probe, containing pancake, +PT and shielded pancake coils apart in a single plane around the circumference. The results of this study are assumed to be applicable fur providing key information of engineering evaluation of SCC and improvement of confidence level of ECT on SG tubes.

Research on Measures to Enhance Railroad Security Checks of Railroad Police Officers to Prevent Terrorist Attacks (철도테러 예방을 위한 철도경찰 보안검색 강화 방안 연구)

  • Gwon, Hyeon-Shik
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.157-183
    • /
    • 2016
  • Countries across the globe, including those in Europe, are waging a "war against terrorism" as international terrorist groups such as ISIS and lone-wolf terrorists have unleashed various large-scale attacks on rail infrastructure. Anti-South Korean sentiment exists in Muslim-majority countries because the nation has cooperated with the US for its military interventions in the Middle East, and ISIS has threatened to target South Korea four times since September 9, 2015. In addition, North Korea has been left isolated in the international community with its missile and nuclear tests, while further escalating inter-Korean tension and threatening to strike major facilities and attack important figures in the South. These situations imply that South Korea is no longer immune to terrorist attacks. If the nation fails to prevent or deter such terrorist attacks against rail networks, massive casualties, property damage and social confusion would be unavoidable, deteriorating national and international trust in its counter-terrorism policies. This may lead to a national crisis involving decreases in the number of tourists, dampened interest of foreign investors, and capital flight. This study aims to propose policy measures to enhance railroad security checks, based on the work of railroad police officers, for the sake of protecting citizens and public safety. The suggestions include an incremental expansion of railroad security checks; growth of the railroad police force and adjustment of their policing distribution with other police officers; enhancement of security systems across important rail networks; improvement of the Railroad Safety Act; Southeast Asia, including the corresponding strengthening of the national crackdown illegal immigrants, and plans for pre-emptive and regular cooperation among organizations related to the promotion of security checks and the prevention of terrorist attacks.

  • PDF

Violence against Nursing Students during Clinical Practice: Experiences, Perception, Responses and Coping with Violence (임상실습 중 간호대학생에 대한 폭력: 폭력에 대한 경험, 인식, 대응 및 대처)

  • Park, Jung-Eun;Kim, Dong-Hee;Park, Jung-Ha
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.10
    • /
    • pp.652-662
    • /
    • 2017
  • This study was conducted to evaluate nursing students' experiences with violence, as well as their responses and behaviors subsequent to being subjected to violence. A descriptive survey was conducted and data were collected from April 30 to July 6, 2012. Responses were obtained from the 290 nursing students studying at six universities in four cities using self-administered questionnaires. About 91% of the students were subjected to violence. Verbal violence (85.2%) was the most frequently encountered type of violence, followed by physical threats (74.8%), sexual violence (41.0%), and physical violence (26.2%). Participants were abused by patients or patients' family members, as well as clinical staff, such as nurses and doctors. After the nursing students were exposed to violence, they responded more negatively to psychological aspects than to biophysical or social aspects. Most students did "not react to the person inflicting violence and continued clinical practice" (51.7%), and this response was cited by students as their most frequently used method of coping (79.5%) after violent confrontations. Strategies should be taken to prevent the violence inflicted upon nursing students in clinical settings, and nursing students should be provided with information related to communication and methods to cope with violence during their education.

A Study about The Motivational Theory-Based Types of Security Guard's Martial Art Training on Job Performance (경호원의 무도수련이 직무수행에 미치는 영향에 대한 실증분석)

  • Park, Hee-Suk;Lee, Young-Oh
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.179-198
    • /
    • 2009
  • This study aims to find out what affects on performance of private security service guards' duty regarding the security service martial arts. To achieve its goal, object of this study was set as private security service guards of private security service enterprise. Here are some conclusions that have been found. First of all, it was revealed that Hapgido, Judo, Taekwondo, kumdo and fencing are in order of the martial arts that help security service the most. Second, the relation of the ability to perform private security service guards' duty between the security service martial art of security guards and the types of them appeared that ones who had been trained were found to be more affirmative than ones who had not, and showed a significant difference. On the other hand, there was no significant difference found on the type of performance of private security service guards' duty. However, ones with a longer career seemed to be more affirmative on the side of work quality and duty, and it also showed a significant difference statistically. complishment relation between the security service martial art of security guards and the types of them appeared that ones who had been trained were found to be more affirmative than ones who had not, and showed a significant difference. Seventh, the relation of mental and the types of them appeared that ones who had been trained were found to be more affirmative than ones who had not, and showed a significant difference. On the other hand, there was no significant difference found on the type of performance of private security service guards' duty.

  • PDF

The Influence of Senior Entrepreneurial Decision Making Types and Entrepreneurial Supporting Policy on Start-up Performance (시니어 창업의사결정유형과 창업지원사업이 창업성과에 미치는 영향)

  • Ryu, Sang-Jung;Yang, Hae-Sool
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.106-121
    • /
    • 2016
  • While economic crises are happening internationally due to the global financial crisis and the long-term recession of the domestic economy, South Korea is also experiencing an aging society with the retirement of the baby-boomers and a low birth-rate. The rapid retirement of baby-boomers, which is one of the essential parts of the Korean economy, is ongoing. Consequently, the number of seniors showing interest in entrepreneurship, as a way to avoid the economic threat, is increasing. Therefore, this study examined the correlation between two factors and its success, which can be stated as the influence of decision making in entrepreneurship and the influence of promotion policies to entrepreneurship. A survey was taken from 393 people, who received academic and managerial assistance from the Senior-Founded Support Center of Small Business Market Corporation and Adults Incubators of Seoul-Business Agency. and 'Hypothesis 1-1' and 'Hypothesis 2-2' were selected, because a positive effect was derived at each verification process. As a result, under the decision making types of entrepreneurship, only a reasonable type showed a positive effect at both the financial outcome and non-financial outcome of success, and the intuitive type was affected positively by the non-financial outcome. In addition, under the entrepreneur supporting business, among financial support, managerial support and educational support only managerial support had a positive effect.

A Study on Formation and Dissolution of Ownership Restriction System within Newspaper Act (신문법 내 소유규제 제도의 형성과 해체에 관한 연구)

  • Lee, Yong-Sung
    • Korean journal of communication and information
    • /
    • v.56
    • /
    • pp.71-85
    • /
    • 2011
  • This thesis reviews the process in which the regulation systems against ownership concentration of newspapers established with the opportunity of legislation of the periodical act in 1987 was reinforced as they were all amended to the newspaper act in 2005 and as they were again amended in 2009 it came to confront crisis in the aspect of press law legislation history. The regulation systems against ownership concentration of newspapers established based on the principle of legality of newspaper function in the Clause 3, the Article 21 of Constitution was reinforced as the newspaper act in 2005 and in 2006 they began to shrink following the Constitution Court decision against newspaper act. As newspaper act and broadcast act are revised in 2009, regulation against combining the management of newspapers with broadcast and regulation against owning multiple number of newspapers came not to exist. Because in this process, the opposition party also allowed limited cross-ownership of newspaper and broadcast, it can be said that the system of newspaper ownership regulation confronted the crisis of dissolution. The instruction of regulation alleviation in a short period of time in spite of the fact that regulation alleviation which allows cross-ownership of newspaper and broadcast is the matter of policy that should be decided after long-term review of the change of media environment and the progress of the power of domination of public opinion is dangerous. Newspapers are strong media with terrestrial broadcast in formation of public opinion on politics. It's because it is difficult to ignore the worry that the power of domination of public opinion of the newspapers which are in oligopoly of newspaper public opinion market can be spreaded to the territory of report broadcast. From the point of view that there is probability for democracy to be ultimately threatened due to the shrink of political Darwinism caused by concentration of media ownership, the alleviation of ownership concentration of newspapers should have premise of long-term social discussion.

  • PDF

Burglary Prevention Effect of Target Hardening through Certified Security Products by WDQ Analysis (WDQ분석을 통한 타겟하드닝 CPTED의 침입범죄 예방효과 검증: 안산시 사례 중심으로)

  • Park, Hyeonho;Kim, Kang-Il;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.9-30
    • /
    • 2018
  • Crime prevention strategies are introduced to reduce the loss caused by crimes, and Target hardening against domestic burglary attacks is broadly accepted as one of such physical security strategies. In terms of business and home security, target hardening is one of the suite of protective measures that are included in crime prevention through environmental design(CPTED). This can include ensuring all doors and windows are sourced and fitted in such a way that they can resist forcible and surreptitious from the attack of intruder. Target hardening with certified security doors, security windows and secure locks are revealed to be much more effective to deter burglary attacks than other security devices, such as CCTV, lightings and alarms which have largely psychological and indirect impact. A pilot program of target hardening utilizing certified security window and locks was carried out in Ansan city, South Korea in 2016. This study is based on the quasi-experimental design of this program for a residential area. The researchers tried to verify the crime displacement effect of the target hardening program and the diffusion effects of crime prevention benefits by analysing the crime statistics. The evaluation utilized WDQ(Weighted Displacement Quotient) technique to analyze whether the crime displacement occurred, compared the crime statistics of the experimental area with that of buffer zone and controlled areas. The result showed that the target hardening program was significantly effective in crime prevention. The number of burglary in the experimental site with target hardening intervention reduced by 100%, although the areas without the intervention showed reduction in the burglary. The crime displacement was not found at all, and the number of burlary at the buffer zone also reduced significantly.

Current Trends in the U.S. Cybersecurity Laws (미국 사이버보안법의 최근 동향 - 「사이버보안 정보공유법」을 중심으로 하여 -)

  • Yang, Chun-Soo;Jee, Yu-Mi
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.155-192
    • /
    • 2018
  • As the 'hyper-connected society' has emerged through the 'Fourth Industrial Revolution, public interests as well as social dangers have increased. Above all, the risk of infringement of information, including confidential personal information, is dramatically increasing. As the hyper-connected society has been realized, even if only one of the internet devices is hacked, there would be a danger that the ripple effect of such a hacking spreads to the whole network. Therefore, the necessity and importance of information security, including cybersecurity, has been increasing. In other words, the stability of cyberspace and internet space is becoming more important. As a result, the Korean government is seeking to build a legal system related to information security, which would be able to cope with the information infringement problem in the hyper-connected society. However, it seems that the government is still struggling with the direction of building such a legal system. In this context, a comparative review examining the legal systems of advanced foreign countries will provide meaningful implications as to what kinds of legal policies we should devise and implement for information security. In particular, the U.S. legislative act that actively responds to the cybersecurity violations is worthy of reference. For this reason, this article systematically analyzes the current status of the U.S. cybersecurity laws. Especially, this article focuses on the "Cybersecurity Information Sharing Act of 2015"(hereinafter "CISA"), that was recently enacted by the U.S. congress. The CISA prescribes the systemic and detailed information-sharing between national and private entities. The CISA, that actively promotes information-sharing, is full of suggestions for us, in that information-sharing is an effective way to properly realize information security in today's hyper-connected society.

Machine- and Deep Learning Modelling Trends for Predicting Harmful Cyanobacterial Cells and Associated Metabolites Concentration in Inland Freshwaters: Comparison of Algorithms, Input Variables, and Learning Data Number (담수 유해남조 세포수·대사물질 농도 예측을 위한 머신러닝과 딥러닝 모델링 연구동향: 알고리즘, 입력변수 및 학습 데이터 수 비교)

  • Yongeun Park;Jin Hwi Kim;Hankyu Lee;Seohyun Byeon;Soon-Jin Hwang;Jae-Ki Shin
    • Korean Journal of Ecology and Environment
    • /
    • v.56 no.3
    • /
    • pp.268-279
    • /
    • 2023
  • Nowadays, artificial intelligence model approaches such as machine and deep learning have been widely used to predict variations of water quality in various freshwater bodies. In particular, many researchers have tried to predict the occurrence of cyanobacterial blooms in inland water, which pose a threat to human health and aquatic ecosystems. Therefore, the objective of this study were to: 1) review studies on the application of machine learning models for predicting the occurrence of cyanobacterial blooms and its metabolites and 2) prospect for future study on the prediction of cyanobacteria by machine learning models including deep learning. In this study, a systematic literature search and review were conducted using SCOPUS, which is Elsevier's abstract and citation database. The key results showed that deep learning models were usually used to predict cyanobacterial cells, while machine learning models focused on predicting cyanobacterial metabolites such as concentrations of microcystin, geosmin, and 2-methylisoborneol (2-MIB) in reservoirs. There was a distinct difference in the use of input variables to predict cyanobacterial cells and metabolites. The application of deep learning models through the construction of big data may be encouraged to build accurate models to predict cyanobacterial metabolites.