• Title/Summary/Keyword: 전자 공격

Search Result 809, Processing Time 0.032 seconds

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Sohn, Hong;Jo, In-June;Ju, Young-Ki;Lee, Dal-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.357-364
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can peep through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working (:roup is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, 1 design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

A Study on the Kinetics and Mechanism of the Hydrolysis of Dihydro-1,4-oxathiin Derivatives (Dihydro-1,4-oxathiin 유도체의 가수분해 Mechanism과 반응속도론적 연구)

  • Lee, Kwang Il;Kwak, Chun Geun;Jang, Byung Man;Kim, Young Ju;Hahn, Hoh Gyu;Nam, Kee Dal;Lee, Ki Chang
    • Journal of the Korean Chemical Society
    • /
    • v.40 no.2
    • /
    • pp.128-134
    • /
    • 1996
  • The kinetics of the hydrolysis of dihydro-1, 4-oxathiin derivatives were investigated by ultraviolet spectrophotometry in H2O at $25^{\circ}C.$ A rate equation which can be applied over a wide pH range was obtained. The substituent effects on the hydrolysis of dihydro-1, 4-oxathiin derivatives were studied and the rate of hydrolysis was shown to be accelerated by electron accepting groups. Final product of the hydrolysis was 2-(2-hydroxyethylthio)acetoacet-anilide enol form. On the basis of rate equations derived and judging from hydrolysis products obtained and from general base effect and substituent effects, plausible mechanism of the hydrolysis in various pH range have been proposed. Below pH 3.5, the hydrolysis was initiated by the protonation and followed by the addition of water to 2-carbon. Above pH 10.0, the hydrolysis was proceeded by the addition of hydroxide to 2-carbon. In the range of pH 4.0∼10.0, the addition of water to dihydro-1,4-oxathiin is rate controlling step.

  • PDF

Study on security method for scenario-based smartphone vulnerability (시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구)

  • Lee, Jaeho;Son, Minwoo;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.835-844
    • /
    • 2018
  • Recently, as the number of smartphone users has been increasing worldwide, various services such as electronic payment, internet use, and financial settlement are being used as a smartphone. In addition, researches for home appliance control and automobile control using smartphone are conducted. As such, smartphone users can enjoy a more convenient life, but by hacking smartphones, tapping texts and conversations on smartphones, tracking location through spy apps, DDoS attacks using smartphones, and malicious apps When a message is received at a specific telephone number when using a micropayment, the corresponding text message is transmitted to a remote server, thereby increasing the risk of leakage of personal information and the like. Therefore, in this paper, we define the risk factors of the smartphone that are caused by the internal and external environmental, physical, contents (apps) of the smartphone through the smartphone that we use in real life, We propose a method to check vulnerability of smartphone security solution such as CC evaluation and the most effective response technique for each risk of smartphone by defining the technique.

Designing female-oriented computer games: Emotional expression

  • Shui, Lin-Lin;Lee, Won-Jung
    • Cartoon and Animation Studies
    • /
    • s.20
    • /
    • pp.75-86
    • /
    • 2010
  • Recently, as the number of female players has increased rapidly, the electronic gaming industry has begun to look at ways to appeal to the largely untapped female market. According to the latest game market investigative report by China Internet Network Information Center (CNNIC), the total number of game players in China increased by 24.8% in 2009, reached 69,130,000 people, and 38.9% of them are female players. This growth in the number of female player is corroborated by a series of investigative reports from IResearch Company in Shanghai, China: from 2003 to 2009, the number of female players grew from 8% to more than 49%. Therefore, no matter how much attention the game production companies have given to male players or how they have ignored the female players before, the companies would be sensible to face up this reality and adjust their marketing policy a bit more. This article analyzes gender preferences in video games which shows that male players are more likely to be attracted to elements of aggression, violence, competition and fast action in electronic game-playing, while female players are drawn to emotional and social aspects of the games such as an understanding of character relationships. The literatures cited indicates that female players also show apparent preference for games with familiar environments, games that allow players to work together, games that have more than one way to win, and games in which characters do not die. It also discusses the characteristics of female-friendly games from the aspect of emotion, pointing out that the simulation games involving pet, dressing-up, and social simulation games are very popular with female players. Because these are the most suitable game types to fill with emotions of love, share, jealousy, superiority, mystery, these are absolutely attractive to female players. Finally, in accord with the above, I propose some principles of designing female-oriented games, including presenting a good-looking leading character, making the story interesting with "live" NPCs(Non-Playing Characters), and finding ways to satisfy female nature instincts such as taking care of others and the inborn interest of classifying and selecting.

  • PDF

Militarization and Weaponization of Outer Space in International Law

  • Kim, Han-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.1
    • /
    • pp.261-284
    • /
    • 2018
  • The current international legal system does not provide a safeguard against the militarization and the weaponization of outer space. Although the term "peaceful use of outer space" in the 1967 Outer Space Treaty(OST) appears in official government statements or in multilateral space treaties, it is still without an authoritative definition in reviewing national practices. The ambiguous ban on weapons in Article IV of the OST allows countries to loophole on the deployment of other weapons other than nuclear weapons. Meanwhile "Draft Treaty on the Prevention of the Placement of Weapon in Outer Space and of the Threat or Use of Force against Outer Space Objects(PPWT)" to Conference on Disarmament (CD) commissioned by the UN General Assembly's Special Session jointly submitted by China and Russia in 2008 and later revised in 2014, attempting to define and prohibit the proliferation of weapons in outer space and provided definitions of prohibited weapons, are opposed by the US on the grounds that currently there is no arms race in outer space. Some experts support a hard law approach in which binding laws aimed at ultimately creating integrated and binding legal instruments in all aspects of the use of outer space should be adopted to regulate the military use of space. However as a temporary measure the soft law guidelines should be developed for the non liquiet, a situation where there is no applicable law. The soft law could be used to create support for the declaration of the treaties and to create international customary law. For example, the 1963 Declaration of Legal Principles Governing the Activities of States in the Exploration and Use of Outer Space that regulates the activities of the state in the exploration and use of the universe, and the 1992 Principles Relevant to the Use of Nuclear Power Sources in Outer Space will illustrated. While substantial portions of the former was codified later in the 1967 OST, the latter which, although written in somewhat mandatory terms, have been consistently complied with by states, have arguably become part of customary international law. On November 12, 1974, the General Assembly reaffirmed that the development of international law may be reflected inter alia, by declarations and resolutions of the General Assembly which may to that extent be taken into consideration by the International Court of Justice.

A Study on the Legislative Conception of Terror of the Advanced European Nations (유럽 선진국의 법제적 테러 개념에 관한 고찰)

  • Kwon, Jeong-Hun;Kim, Tae-Hwan
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.29-50
    • /
    • 2008
  • Many countries throughout the world have enacted laws on terrorism in the light of the changes that time has brought to them, geographical features, cultural values, and environmental elements. Especially some advanced European nations prescribe the definition of terrorism, the purpose of terrorism, the behavior of terrorism, and the types of crimes related to terrorism and so on for the following reason that it is more vital for the authorities concerned to investigate and punish terrorists after the rise of terrorism. In this regard, this paper analyzes legislative countermoves against terrorists of advanced countries such as France, Germany, and England and through this sheds light on the need of future anti-terrorism bills. The legislative basic guidelines directly to manipulate future terrors based on theories derived from this study could be summarized as follows. In the first place, providing laws on direct investigative power and harsher punishment to those involved in terrorism is a prerequisite for social security and thus the presidential directive of the state anti-terrorism action guidelines just deals with administrative measures without any effective response to terrorism. Hence it is urgent to make anti-terrorism bill concerning investigation and punishment of terrorists. In the second place, it is associated with the objectives of terror. The expression "all sorts of" stated in Korean law is so quite unclear that it can not fulfill the required conditions for naming it "crime". Comprehending provisoes of the crime that meets the purpose of the terrorists is necessary in order to investigate and inflict punishment on them. Therefore, it is advisable to establish specific and precise principles such as political, social, ideological, and religious purpose of terrorists in the bill. In the third place, to meet the flow of times of technicalization, informatization, such provisoes as destruction of electronic data system, crimes related to nuclear materials, purchases of weapons by terrorists, tax administration for prohibition of sale, and arson should be considered in terror bill. In the fourth place, nonselective attack toward unspecified individuals has become a serious issue in our society. Terrorists leave poisonous foods or beverages to crowded place or dump toxic chemicals into river intentionally. Therefore more strict regulations must be included in terror bill to prevent possible terrorist attacks.

  • PDF

Elemental analysis of the fluoride varnish effects on root caries initiation (불소 바니쉬 도포 후 초기 치근 우식 발현에 대한 정량원소분석)

  • Park, Se-Eun;Yi, Kee-Wook;Kim, Hae-Young;Son, Ho-Hyun;Chang, Ju-Hea
    • Restorative Dentistry and Endodontics
    • /
    • v.36 no.4
    • /
    • pp.290-299
    • /
    • 2011
  • Objectives: The usage of fluoride varnish for a moderate to low caries-risk group has not been well validated. This study aimed to evaluate the preventive and therapeutic efficacies of fluoride varnish on the initiated root caries. Materials and Methods: Ten premolars were sectioned into quarters, further divided into two windows, one of which was painted with Fluor Protector (1,000 ppm fluoride, Ivoclar Vivadent). An initial lesion with a well-preserved surface layer was produced by pH cycling. Scanned line analysis using energy dispersive spectrometry determined the weight percentages of Ca and P in the demineralized layer. Scanning Electron microscopy and confocal laser scanning microscopy (CLSM) evaluated the varnish-applied root surfaces. Results: The mean lesion depth (SD) was 12.3 (2.6) ${\mu}m$ (single cycling) and 19.6 (3.8) ${\mu}m$ (double cycling). Double cycling extended the lesion depth, but induced no more mineral loss than single cycling (p < 0.05). The mean weight percentages of Ca and P between groups with and without varnish were not significantly different (p < 0.05). A CLSM showed varnish remained within 15 ${\mu}m$ of the surface layer. Conclusions: When a mild acid challenge initiated root tissue demineralization, the application of low-concentration fluoride varnish did not influence the lesion depth or the mineral composition of the subsurface lesion.

A study on the changes of the Screen quota system as a Film policy in Korea (한국의 영화정책과 스크린 쿼터제의 변천에 대한 연구)

  • Cho, Hee-Moon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.5
    • /
    • pp.982-991
    • /
    • 2006
  • The screen quota system is one of the most controversial issues in the Korean film industry. There are two different points of view regarding the system. Some say it is highly effective to protect and nurture Korean movies. However, others argue that it hurts the duality of the Korean movies. The number of days, for which Korean movies have to play on local screens, has been reduced to 73, starting on July 1st, 2006. Actually, it is 50 percent fewer than the previous year. In facL Korea has implemented the screen quota. system two times. First, it was practiced from 1935 to 1945, during the Japanese colonial period. This was to regulate imported movies, especially American ones, as the Japanese government was to use movies for the political propaganda. In 1935, the number of foreign movies screened had to be less than three fourths of the total. And they gradually reduced the size by two thirds in 1936, and again by half in 1937. After the attack on Pearl Harbor when the Pacific War happened, Japan completely banned importing American movies in Korea. The reason why it regulated the imported foreign films is to increase the number of domestic movies, both Japanese and Korean. It was for making propaganda films fur carrying the war. The second practice of the screen quota is from 1967 to the present year. It was designed to boom the Korean film industry. However, the competitive power of Korean films has not been improved in spite of the practice of the system. Moreover, the film industry has gone through the depression. Korean film agencies have occupied the Korean film market thanks to the protection by government. The founding of the film agencies has been strongly regulated. So has importing foreign movies. Under the special protection like this, Korean film agencies have been enjoying the monopoly In the mean time, they have pursued income not by making quality movies but by importing foreign movies. As a result, cinema audiences turn away form Korean films and prefer foreign movies. Furthermore, the screen quota system hurts the relationship between film producers and distributors, imposing the duties only on theaters. In short, the screen quota system has satisfied neither film producers, theater runners, nor film goers. In other words. the excessive protection has weakened the competitive power of Korean film industry.

  • PDF

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF