• Title/Summary/Keyword: 소규모 위협

Search Result 38, Processing Time 0.03 seconds

C-store의 위협으로 다급해진 신기술 개발

  • 한국자동판매기공업협회
    • Vending industry
    • /
    • v.2 no.6 s.7
    • /
    • pp.148-153
    • /
    • 2003
  • 현재 미국 전역을 쉽쓸고 있는 C-Store가 고객의 이동로를 쫓아 다니며 자판기 사업자들의 수익을 가로채고 있지만, 이들은 고작 가격과 이윤을 조정함으로써 이러한 추세에 대항할 수 있을 뿐이다 (주 : C-Store는 자판기와 경쟁관계에 있는 소규모 편의점을 말함.)

  • PDF

Nuclear Weapons and Extended Deterrence in the U.S.-ROK Alliance (핵무기와 한·미 핵 확장억제 능력)

  • Huntley, Wade L.
    • Strategy21
    • /
    • s.34
    • /
    • pp.236-261
    • /
    • 2014
  • The future role of nuclear extended deterrence in the security alliance between the United States and the Republic of Korea is currently a central concern. The gradually lessening role of reliance on nuclear weapons in US security policies broadly, combined with increasing North Korean nuclear capabilities and belligerence, raise fresh questions about the sufficiency of the "nuclear umbrella" as a pillar of the US-ROK defense posture. This article addresses the current and future role of nuclear extended deterrence in Korea in this dynamic context. The article reviews the longstanding trend toward reducing the overall size of the US nuclear arsenal, and assesses developments in US-ROK outlooks toward extended deterrence in response to the Obama administration's nuclear policies and North Korea's recent smaller-scale aggressions. The analysis finds that the challenges of deterrence credibility and allied reassurance are difficult and long-term. The analysis explains how these challenges emerge less from a shrinking US numerical arsenal size than from the sufficiency of specific nuclear and non-nuclear capabilities to meet emerging smaller-scale threats. The analysis also highlights the importance of broader strategic and political interaction in sustaining allied confidence in any joint security posture. The evaluation concludes that a strong US-ROK alliance relationship can be maintained while the size of the US nuclear arsenal continues to decline, in part because nuclear weapons in any deployment configuration are relatively ineffective means for deterring smaller-scale aggression. Nevertheless, continuing adjustment of the US-ROK extended deterrence posture to the evolving, complex and uncertain Korean peninsula security environment will remain an ongoing challenge. Finally, the article encourages further examination of the potential specific role ROK maritime forces might serve in enhancing deterrence of smaller-scale threats while minimizing risks of conflict escalation.

A Fundamental Study on the Fire Protection Management for Private Museum (사립박물관 소방분야 관리 실태에 관한 기초 연구)

  • Song, Chang-Young;Lee, Jong-Hoon
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2015.11a
    • /
    • pp.331-334
    • /
    • 2015
  • 박물관은 예술과 과학 분야에서 귀중한 문화유산적 가치가 있는 소장품을 보관 전시하는 등 교양, 조사연구, 예술활동 등에 이바지하고 있다. 이러한 박물관의 소장품을 위협하는 요소 중 화재로 인한 피해는 소장품을 순식간에 파괴하여 복구 불능 상태가 될 수도 있어 가장 위험이 큰 재해라고 해도 과언이 아니다. 재난 및 안전관리 기본법 제34조의 6에서는('15년 12월 31일 시행), 다중이용시설 등의 소유자 관리자 또는 점유자는 대통령령으로 정하는 바에 따라 위기상황에 대비한 매뉴얼을 작성 관리토록 되어있다. 하지만 연면적 $3,000m^2$ 이상의 대규모 사립박물관만 해당되며 대다수 사립박물관은 재정적으로 취약하고 소규모 시설로 인해 화재를 비롯한 각종 재난안전관리에 매우 취약하여 소중한 문화적 가치를 지닌 유물들이 소실될 수 있는 높은 위험성을 지니고 있다. 이에 따라 본 연구에서는 중 소규모의 사립박물관 50개소를 선정하여 화재안전에 대비한 소방분야의 관리실태를 점검하고 향후 안전관리 교육 훈련 프로그램 또는 안전관리 매뉴얼 개발에 기초 자료로서 활용 될 수 있는 연구를 수행하였다.

  • PDF

무선공유기에 대한 보안공격의 탐지 및 대응

  • Jeong, U-Hyeok;Lee, Seung-Hyeong
    • Information and Communications Magazine
    • /
    • v.33 no.3
    • /
    • pp.87-93
    • /
    • 2016
  • 무선공유기에 대한 공격은 오픈 소스(Open Source) 소프트웨어 도구(Software Tool)가 널리 공개되어 실행하기 수월해진 반면, 이러한 보안 위협에 대한 탐지 및 대응 기술은 알려진 바가 적다. 본고에서는 무선공유기에 대한 보안 공격의 유형과 그에 대한 무선네트워크의 취약성을 알아봄으로써 무선 침입 탐지시스템의 필요성을 살펴보고, 소규모 네트워크에는 적합하지 않은 상용 무선침입방지시스템의 대안으로 오픈 소스 소프트웨어 도구를 제시하였다. 모의 침투를 통해 오픈 소스 소프트웨어 도구의 성능을 분석하고 상용도구와 비교함으로써 추후의 개발 방향과 가능성을 제시하였다.

Research on Cyber-terrorism preparation scheme (사이버테러 대응방안에 관한 연구)

  • Kim, Yeon Jun;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.33-42
    • /
    • 2016
  • While evolving information-oriented society provides a lot of benefits to the human life, new types of threats have been increasing. Particularly, cyber terrorism, happen on the network that is composed of a computer system and information communication network, and the mean and scale of damage has reached a serious level. In other words, it is hard to locate cyber terror since it occurs in the virtual space, not in the real world, so identifying "Who is attacking?" (Non-visibility, non-formulas), or "Where the attack takes place?" (trans-nation) are hard. Hackers, individuals or even a small group of people, who carried out the cyber terror are posing new threats that could intimidate national security and the pace and magnitude of threats keep evolving. Scale and capability of North Korea's cyber terrorism are assessed as world-class level. Recently, North Korea is focusing on strengthen their cyber terrorism force. So improving a response system for cyber terror is a key necessity as North Korea's has emerged as a direct threat to South Korean security. Therefore, Korea has to redeem both legal and institutional systems immediately to perform as a unified control tower for preemptive response to cyber terrors arise from North Korea and neighboring countries.

Development of Small HSSF Constructed Wetland for Urban Green space (도시내 녹지공간 조성을 위한 소규모 HSSF 인공습지 개발)

  • Lee, Jeong-Young;Kang, Chang-Guk;Gorme, Joan B.;Kim, Soon-Seok;Kim, Lee-Hyung
    • Journal of Wetlands Research
    • /
    • v.13 no.2
    • /
    • pp.199-208
    • /
    • 2011
  • Scarcity of water worldwide, increasing greenhouse gas emissions, increased energy consumption due to the Earth is threatened. Existing in the process of urban planning and development of forests, rivers and other natural ecosystems have been destroyed and that there was increased impervious pavement. Impervious pavement increase water circulation system to destroy the natural and urban water retention, infiltration and decreased evaporation. Nonpoint source pollution(NPS) occurs when rainfall impervious pavement and appeal directly to the river water inflow is adversely impacts of the situation. In this study, rainfall occurs impervious pavement NPS pollution reduction and temperature increase due to the increase in urban areas, and to solve heat island phenomenon is to develop small HSSF constructed wetland technology. The small HSSF constructed wetland sedimentation, filtration, adsorption, absorption by vegetation, including such mechanisms. Techniques for verification of the pilot-scale test was conducted. In the future domestic urban heat island phenomenon and restore the natural water cycle for the facilities will be used as a basis to develop.

A Study on Smart Grid and Cyber Security Strategy (지능형 전력망 도입과 사이버보안 전략)

  • Lee, Sang-Keun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.95-108
    • /
    • 2011
  • Smart Grids are intelligent next generating Electric Power System (EPS) that provide environment-friendliness, high-efficiency, and high-trustworthiness by integrating information and communication technology with electric power technology. Smart grids help to supply power more efficiently and safely than past systems by bilaterally exchanging information between the user and power producer. In addition, it alleviates environmental problems by using renewable energy resources. However, smart grids have many cyber security risks because of the bilateral service, the increase of small and medium-sized energy resources, and the installation of multi-sensors or control devices. These cyber risks can cause critical problems within a national grid through even small errors. Therefore, in order to reduce these risks, it is necessary to establish a cyber security strategy and apply it from the developmental stage to the implementation stage. This thesis analyzes and recommends security strategy in order to resolve the security risks. By applying cyber security strategy to a smart grid, it will provide a stepping-stone to creating a safe and dependable smart grid.

국내 중파 비컨 R-Mode 활용의 필요성 분석

  • Park, Sang-Hyeon;Han, Yeong-Hun;Lee, Sang-Heon;Hwang, Tae-Hyeon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2018.05a
    • /
    • pp.3-4
    • /
    • 2018
  • 과거 3-4년 전까지 위성전파항법시스템의 백업 시스템으로 유일하게 논의되고 있었던 현실적 대안은 eLoran이었다. eLoran은 기존에 활용성이 낮아져 서비스가 점차 중단되고 있는 로란-C 시설을 개선하여 보다 높은 PNT 성능을 제공하도록 고안되었다. 기존에 로란-C 시설이 있는 국가나 지역에서는 위성전파항법시스템의 백업 시스템으로 eLoran을 효과적으로 확보할 수 있는 것이다. 그러나 기존 로란-C 시설을 이미 철거하였거나, 로란-C 시설을 가지고 있지 않았던 국가 입장에서는 eLoran을 확보하기 위해 로란-C 시설을 보유한 국가보다 더 많은 시설구축 비용이 필요하게 된다. 반면에 R-Mode는 현재 해상에서 활용되고 있는 전파신호를 이용하므로 신규 전파항법 인프라 구축에 따른 큰 투자 없이 적은 비용으로 위성전파항법시스템의 백업 시스템을 구현할 수 있다는 장점을 갖는다. 대한민국은 세계에서 유일하게 국가안보적 측면에서 GPS 전파간섭의 위협을 받고 있는 국가이다. 대한민국이 직면한 GPS 전파간섭은 해외에서 보고되고 있는 좁은 지역에서의 개인적 소규모 전파간섭과는 차원이 다르다. 특히 지난 2016년 3월 말, 우리나라는 약 엿새간 수도권과 강원지역 등이 동시에 GPS 전파간섭의 영향권 안에 든 바 있다. 이때 GPS 전파간섭은 과거에 발생한 GPS 전파간섭보다 더 넓은 지역에 영향을 주었고, 어선과 같은 소규모 선박의 조업까지 방해하는 피해를 안겼다. 본 논문은 대한민국이 하루 속히 해결해야 할 현안으로 인식되고 있는 위성전파항법시스템의 백업 시스템으로 중파 비컨 R-Mode를 적용할 필요가 있는지 논하고자 한다.

  • PDF

A Study on Detection of Small Size Malicious Code using Data Mining Method (데이터 마이닝 기법을 이용한 소규모 악성코드 탐지에 관한 연구)

  • Lee, Taek-Hyun;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.11-17
    • /
    • 2019
  • Recently, the abuse of Internet technology has caused economic and mental harm to society as a whole. Especially, malicious code that is newly created or modified is used as a basic means of various application hacking and cyber security threats by bypassing the existing information protection system. However, research on small-capacity executable files that occupy a large portion of actual malicious code is rather limited. In this paper, we propose a model that can analyze the characteristics of known small capacity executable files by using data mining techniques and to use them for detecting unknown malicious codes. Data mining analysis techniques were performed in various ways such as Naive Bayesian, SVM, decision tree, random forest, artificial neural network, and the accuracy was compared according to the detection level of virustotal. As a result, more than 80% classification accuracy was verified for 34,646 analysis files.

Design Method of Things Malware Detection System(TMDS) (소규모 네트워크의 IoT 보안을 위한 저비용 악성코드 탐지 시스템 설계 방안 연구)

  • Sangyoon Shin;Dahee Lee;Sangjin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.459-469
    • /
    • 2023
  • The number of IoT devices is explosively increasing due to the development of embedded equipment and computer networks. As a result, cyber threats to IoT are increasing, and currently, malicious codes are being distributed and infected to IoT devices and exploited for DDoS. Currently, IoT devices that are the target of such an attack have various installation environments and have limited resources. In addition, IoT devices have a characteristic that once set up, the owner does not care about management. Because of this, IoT devices are becoming a blind spot for management that is easily infected with malicious codes. Because of these difficulties, the threat of malicious codes always exists in IoT devices, and when they are infected, responses are not properly made. In this paper, we will design an malware detection system for IoT in consideration of the characteristics of the IoT environment and present detection rules suitable for use in the system. Using this system, it will be possible to construct an IoT malware detection system inexpensively and efficiently without changing the structure of IoT devices that are already installed and exposed to cyber threats.