• Title/Summary/Keyword: 준사고

Search Result 391, Processing Time 0.028 seconds

A Study of the Secondary School Science Teachers' Perceptions Related to Basic Particles (중등 과학 교사들의 기본 입자에 대한 사고 조사)

  • Nam, Cho-Yi;Park, Kyu-Suk;Paik, Seoung-Hey
    • Journal of the Korean Chemical Society
    • /
    • v.53 no.6
    • /
    • pp.774-783
    • /
    • 2009
  • The purpose of this study was to survey the secondary science teachers' viewpoints of basic particles conceptions addressed in science course. The first content of this study was to analyze the secondary science teachers conceptions related to basic particles founded on scientific history viewpoints. The second content was to investigate their understanding of relations between atom, element, and molecule concepts. The third content was to search the factors influenced on basic particles conceptions of science teachers. For this study, 96 secondary science teachers were selected. The data of this study were collected through a questionnaire developed for this study and were analysed using the method of constant comparative analysis. The results showed that their viewpoints towards basic particles were similar to each other regardless of their majors and their conceptions belonged to the past viewpoints. The teachers lacked linking understand among basic particles conceptions because they applied different viewpoints on different problems. Most of the teachers were influenced on science textbooks, guidebooks for teachers, and reference books to form confusing viewpoints of basic particles.

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

Design and Implementation of Cyber Range for Cyber Defense Exercise Based on Cyber Crisis Alert (사이버위기 경보 기반 사이버 방어 훈련장 설계 및 구축 연구)

  • Choi, Younghan;Jang, Insook;Whoang, Inteck;Kim, Taeghyoon;Hong, Soonjwa;Park, Insung;Yang, Jinsoek;Kwon, Yeongjae;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.805-821
    • /
    • 2020
  • Cyber defense exercise should require training on the latest cyber attacks and have a similar process to defense cyber attacks. In addition, it is also important to train on cyber resilience that can perform normal tasks or support equivalent tasks regardless of cyber attacks. In this paper, we proposed and developed a cyber range that can strengthen the elements of cyber resilience by performing cyber defense exercise in real time based on the cyber crisis alert issued when a cyber attack occurs in Korea. When BLUE, YELLOW, ORANGE, and RED warnings are issued according to the cyber crisis, our system performs proactive response, real time response, and post response according to the alarm. It can improve trainee's capability to respond to cyber threats by performing cyber defense exercise in a cyber crisis environment similar to the actual situation of Korea.

Hazard Evaluation of Gas Processes Using a Multi-distinction Equipment Screening Algorithm (다중판별 장치 스크리닝 기법을 이용한 가스공정의 위험성 평가)

  • Yoon En Sup;Park Jeong Su;Ahn Sung Joon;Han Kyounghoon;Yoon Jong Phil;Kim Ku Hwoi;Shin Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.7 no.1 s.18
    • /
    • pp.1-9
    • /
    • 2003
  • A Multi-distinction Equipment Screening Algorithm (MESA) is proposed. It selectively integrates Dow's F&EI as its process hazard index technique and ESA (Equipment Screening Algorithm) as qualitative hazard classification technique, and retrieves a detailed list of hazardous equipments with the total hazard indices of those equipments. The inherent expert system, which includes the accident scenarios of the equipments and processes and experts' views of them, narrows further down the list of hazardous equipments and recommends only the most notable candidates. Through the case study of distinguishing the hazardous ranking of the equipments of the LPG underground storage process, using the expert system or not, the applicability of MESA has been validated. Taking the characteristics of the process equipments with hazardous ranking in the point of process intrinsic safety, this proposed algorithm would contribute to providing engineers or managers with information on constructing safely devices and mitigation devices and on scheduling emergency response planning.

  • PDF

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Study on the improvements for Managerial Efficiency of the Designated Lane Law (지정차로제의 합리적 운영방안에 대한 연구)

  • Lee, Seung-Jun;Lee, Choul-Ki;Lee, Yong-Ju;Kim, Yong-Man
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.2
    • /
    • pp.85-94
    • /
    • 2016
  • Lane Designation is defined as reasonable road management to ensure the road safety and enhance road efficiency. While the lane designation system was abolished in 1999, it was redefined because of the increasing number of large vehicles in the passing lane, violent on driving and traffic accidents in 2000. The needs of improvement on operating the lane designation has been increasing more in recent due to the low ratio of compliance with the system and difficulties to keep the right lane due to need of turning and demand of widening of designates lane for two-wheeled vehicles and truck. In this study, we presented the improvement plan through the question survey, simulation analysis, safety evaluation. It found a problem that the low-speed vehicle is to use the upper level roadway, difficulties of supervision, the imbalance in the lane use, imbalance traffic and does not match the international standards. This study suggested five different alternatives through the survey. micro simulation has used in order to examine each alternative by management effectiveness and feasibility. It analyzed the traffic speed, efficiency, traffic balance of alternatives. Also, safety evaluation conducted in terms of the range of field-of-view to ensure the easiness of field of view by various configurational difference between the vehicles. By the analysis results of such indicators, This study presents proposals for improvement in operating designated lane that low-speed-big-sized vehicles keep to the right lane, and high-speed-small sized vehicles keep to the left lane.

Flash Flood Risk Assessment using PROMETHEE and Entropy Method (PROMETHEE와 Entropy 기법을 이용한 돌발홍수 위험도 평가)

  • Lee, Jung-Ho;Jun, Hwan-Don;Park, Moo-Jong;Jung, Jae-Hak
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.11 no.3
    • /
    • pp.151-156
    • /
    • 2011
  • Previously most of flood prevention efforts have been made for relatively large watersheds near to channel flow. However, as economical development and the expansion of leisure areas to mountainous region, human casualty by flash flood occurs frequently, requiring additional prevention activity. Therefore, to reduce the damage of human lives and property by flash flood, we develop an assessment method for flash flood occurrence for mountainous areas considering various factors involving it. PROMETHEE(Preference Ranking Organization METHod for Enrichment Evaluations) which is one of the MCDM(Multi-Criteria Decision Making) was adopted to assess the contribution of each factor to the risk of the flash flood in the mountainous area. The main evaluation criteria are classified into three categories, namely, the regional and rainfall characteristics, and geographical features. Also, the Entropy method is used to determine the weight of each evaluation criteria without survey. The suggested method based on PROMETHEE with Entropy method is applied to BongHwa region to verify its applicability. After applied, the method successfully assesses the relative risk of flash flood occurrence of each sub region in the BongHwa region. Out of the seventeen sub-regions, five, seven and five of them are evaluated as high-risk, medium-risk, and low-risk, respectively. To verify the results, we searched the historical data of flash flood and the flash flood had occurred in one of high-risk sub-regions at 2008.

The modality and the symbol of the reform in donghak and the declaration in K. Marx (칼 맑스 선언문과 폐정 개혁문의 모달리떼와 그 상징성)

  • Sun, Mira
    • 기호학연구
    • /
    • no.57
    • /
    • pp.155-176
    • /
    • 2018
  • This article is a study of Karl Marx's manifesto and the reform in donghak for the modality and their symbolism. As a text, Karl Marx and Friedrich Engels' declaration on the Communist Alliance and the reform program of the peasant Donghak were choose. This Declaration and the Reformation are the works of philosophical practice discourse of the 1800s in this article, which unfolds paradigmatically, deriving its common symbolic meaning in the semiotic sense, and evolving ideologically towards a democracy free of property. In the end, these two historical incident which are published in the contemporary breath, constitute an accusation against a nonhuman policy of surveillance and punishment. Twice a day, the space of the church is transformed into a factory, the act of dividing into two categories by capitalist and work and divorcing by accident is embodied as a social ethic. It is against the phenomenon that the structure of which no man exists is no longer institutionalized. The revolutionary movement aimed at breaking the framework of this hunt manifests itself in the two manifestos mentioned above, and Karl Marx completes the culmination of the utopia that must be achieved through the Declaration of the Communist Alliance by placing his being in the position of "eternal refugee". By choosing to die in his freedom developed during Jeon Bong-joon's trial, he also completes the people's spirit of revolution. In the case of simultaneous exploitation in East and West, the form of oppression is the withdrawal of capital from domination and power, and a new alternative to this is the philosophical context that allows the establishment of a new paradigm with "man is the greatest capital".

Proposal for 2-WAY Trade Verification Model that Based on Consensus between Trading Partners (거래당사자간 합의에 기반하는 온라인 전자금융 2-WAY 거래인증 모델 제안)

  • Lee, Ig-jun;Oh, Jae-sub;Youm, Heung-youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1475-1487
    • /
    • 2018
  • To verify remitter's identity when the remitter transfers money to a recipient using an electronic financial service provided by the financial institution, the remitter inputs the information; such as the withdrawal account number, the withdrawal amount, the password pre-registered with the financial company, or the information from authenticating medium that is previously distributed by the financial institution. However, the 1-Way transaction between the financial institution and the remitter is exposed to a great risk of accidents such as an anomaly remittance or a voice phishing fraud. Therefore, in this study, we propose a 2-WAY trade verification model for electronic financial transaction that can be mutually agreed by allowing the recipient to share the transaction information with the remitter and the financial company. We have improved the traditional electronic financial transaction's method by replacing it to 2-WAY trade method, and it is used for various purposes; such as preventing an error within the remittance or voice phishing fraud, enhancing loan transaction and contract transaction, etc. Through these variety of applications, we are expecting to reduce the inconveniences while improving the convenience of financial transaction and vitalizing the P2P transaction of financial institution.

A Study of Classical Literature Interpretation in Variety and Application - With 『Sunzibingfa(孫子兵法)』 by Sunzi - (『손자병법(孫子兵法)』의 응용술(應用術)을 통해 본 고전가용성(古典可用性) 고찰)

  • Choi, Young-jun;Kim, chung-hwan
    • (The)Study of the Eastern Classic
    • /
    • no.33
    • /
    • pp.193-230
    • /
    • 2008
  • We apply The classics of the Orient as a way of solving the problems calling for immediate solution in the changes of these times by reconstructing a wisdom from the Oriental literature which are complementary cooperation and great capacity on the basis of convenient scientific knowledge and thought of the Western. In this context, I would like to search the inflection and application about The classics of the Orient throughout the leaders all ages and countries who make use of "Sunzibingfa", the art of war by Sunzi. So, It is charged with a mission in translation of the oriental thoughts and values how to make a shining example its way in the current of time. In this aim to introduce the classics of the Orient. We can see the classics publication which is translated by many scholars. I recommended "Sunzibingfa" among the classics in this my thesis. Because I want to look into how to use of this book which has the thoughts by the leaders all ages and countries. Under this intention, I will introduce three leaders who are famous for using the book "Sunzibingfa" in "Sanguozhi(三國志)"-Records of Three Kingdoms, Caocao(曹操), Zhugeliang(諸葛亮) and Simayi(司馬懿) in ancient times and Luiz Felipe Scolari and Liddel hart, one is famous for using the book as the coach of the Republic of Portugal soccer team the 2006 World Cup Soccer and the other is a strategist of England in these modern days. We can see how to use this "Sunzibingfa" in their places and circumstances. Therefore We can have a chance how to use The classics of the Orient. This is my purpose to write this thesis.