• Title/Summary/Keyword: 탈취

Search Result 437, Processing Time 0.023 seconds

A Study on the Durability of Manure Composting Facilities (축분 퇴비화 시설 내구성에 관한 조사연구)

  • Hong, Ji-Hyung
    • Journal of Animal Environmental Science
    • /
    • v.16 no.1
    • /
    • pp.13-20
    • /
    • 2010
  • Manure compost is a main product from animal wastes in Korea. Solid manure is usually treated by aerobic composting at manure composting facilities for land reinforcement. Agricultural use of manure compost as organic fertilizer resources, mainly manure compost, is now recommended in Korea. This study investigated the evaluation of durability about the manure composting machinery and structures which was controlled by aeration and periodic agitating. The questionnaire addressed three main topics as follows: operating practices, machinery and maintenance of the manure composting facilities are being operated. A total of the 22 manure composting facilities in an agricultural cooperative were surveyed. The results obtained in this survey were summarized as follow: The major causes of manure composting apparatus trouble were corrosion and wear, overloading and foreign matter etc. The highly trouble frequency of the agitator, packer and conveyor were chain, agitating blade and shaft, motor and screw vane, respectively. These analytical results can be used as basic information to establish the maintenance control methods and durability standard of manure composting facility.

Storage of Kimchi in LDPE Film Containg Antibiotic Ceramic (항균 세라믹 충전 LDPE필름의 김치 저장성)

  • Kim, Kwang-Sub;Kang, Young-Ku;Kim, Jong-Dae;Eun, Jong-Bang;Park, Chan-Young
    • Korean Journal of Food Science and Technology
    • /
    • v.30 no.4
    • /
    • pp.811-816
    • /
    • 1998
  • A fermented vegetable kimchi swells in package bags often during distribution to comsumer after storage. The swelling has been prohibited by packaging the kimchi in a modified LDPE film that has been made by filling a ceramic powders disinfecting to lactic acid bacteria and growth enhancing to vegetables. The film exhibited higher permeability to carbon dioxide and ethylene than LDPE film. The tastes of kimchi in the film sustained its optical quality longer than that in LDPE film at room temperature.

  • PDF

Research for improving vulnerability of unmanned aerial vehicles (무인항공기 보안 취약점 개선을 위한 연구)

  • Lee, Kyung-Hwan;Ryu, Gab-Sang
    • Smart Media Journal
    • /
    • v.7 no.3
    • /
    • pp.64-71
    • /
    • 2018
  • Utilization of unmanned aerial vehicles (UAVs) are rapidly expanding to various fields ranging from defense, industry, entertainment and personal hobbies. Due to the increased activities of unmanned airplanes, many security problems have emerged, including flight path errors to undesired destinations, secondary threats due to exposed securities caused by the capture of unmanned airplanes in hostile countries. In this paper, we find security vulnerabilities in UAVs such as GPS spoofing, hacking captured video information, malfunction due to signal attenuation through jamming, and exposure of personal information due to image shooting. In order to solve this problem, the stability of the unstructured data is secured by setting the encryption of the video shooting information section using the virtual private network (VPN) to prevent the GPS spoofing attack. In addition, data integrity was ensured by applying personal information encryption and masking techniques to minimize the secondary damage caused by exposure of the UAV and to secure safety. It is expected that it will contribute to the safe use and stimulation of industry in the application field of UAV currently growing.

Analysis of Smart Grid Network Vulnerability Using Smart Phone (Smart Phone을 통한 Smart Grid 네트워크 접속에서 취약성)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.240-243
    • /
    • 2010
  • Smart Phone supplies are diffused and substitute the Internet PC with Mobile communications which they are applied. Smart Phone in Smart Grid where electric power watch and the IT of existing amalgamate are used with business. Consequently from Smart Grid network connections which lead Smart Phone in about connection and control in about security vulnerabilities and Smart Grid networks the research is necessary in about vulnerability. It uses Smart Phone from the present paper and when approaching electric power watch systems which lead Smart Grid networks, it researches in about connection vulnerability. Also it uses Smart Phone and after connecting in Smart Grid networks a vulnerability in seizure possibility and, electric power information and control information, about private data etc. access authority it analyzes with the problem point which occurs it confronts it researches. And the research direction for a security reinforcement under presenting boil in about Smart Grid network security vulnerabilities which lead Smart Phone.

  • PDF

Mechanical Properties and Flexural Behavior of Recycled PET Fiber Reinforced Eco-Friendly Hwang-toh Concrete (재생 PET 섬유로 보강된 친환경 황토 콘크리트의 역학적 특성과 휨 거동)

  • Kim, Sung-Bae;Yi, Na-Hyun;Kim, Hyun-Young;Kim, Jang-Ho Jay
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.14 no.3
    • /
    • pp.152-159
    • /
    • 2010
  • Recently, the public interest in eco-friendly material and structure has been increasing and many Hwang-toh researches are being actively performed. Hwang-toh is one of the traditional environment friendly construction materials used as a construction and plastering material. Hwang-toh has many advantages as construction material due to its high heat storage capacity, auto-purification, antibiotic ability, and infrared ray emission characteristics. But, currently it has not been developed into construction material and used in modern construction due to its low strength and dry shrinkage cracking prone characteristics. According to the recent researches and study results, Hwang-toh can be used as a natural pozzolanic material like fly-ash or pozzolan. In this study, mechanical properties and structural flexure behavior experiments of slag, recycled PET fiber, and Hwang-toh added concrete are carried out. The test results showed that drying shrinkage of concrete mixed with Hwang-toh has lower compressive strength and elastic modulus than those of control cement concrete specimen, but it has the similar flexural behavior in reinforced concrete beams.

An Analysis of Security Problem against Wireless Network in Smartphone (스마트폰 상에서 무선 네트워크 보안 문제점 분석)

  • Kim, Ki-Hawn;Lee, Young Sil;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.383-386
    • /
    • 2014
  • Due to the development of communication technology, a conventional major business through PC, laptop or Tablet PC can be performed via a smartphone and it is increasing the user's convenience. At this point, the user prefers to connect to the Internet using the wireless network because it occurs an additional charge according to the amount of data to be transmitted when using a data communication through 3G or 4G. However, when using a wireless network, there is a possibility of several attacks such as easily steal or modulate the information from the outside or to gain access to personal information stored in the user's smartphone with man-in-the-middle attacks by using the fake AP. IIn this paper, we describe how you can detect the AP when you use LAN of the smartphone, were analyzed for this vulnerability, has not been approved. Furthermore, Also, we discuss ways which can enhance the security when user the access to the internet services (i.e., internet, public/private cloud service, etc.) via wireless network in smartphone.

  • PDF

Secure Storage and Management of Vaccination Records Allowing Restrictive Access upon Users' Consent (사용자 동의로 제한적 접근을 허용하는 백신 접종 기록의 안전한 보관 및 관리)

  • Park, Jun-Cheol
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.100-109
    • /
    • 2021
  • As the COVID-19 vaccination begins, it is necessary to safely store and manage the vaccination history for vaccinated people, as well as provide only the minimal information for the requested purpose, not in the form of all or nothing, to the institution requesting vaccination personal information. This paper proposes a scheme to safely store and manage the people's vaccination records in a non-forgeable blockchain, and to ensure that users provide only the minimal information necessary to the verifier from their vaccination personal information. A user authorizes the verifier to access the information he has consented with by entering the fingerprint on his smartphone, and in this process, no personal information or secrets can be exposed to an attacker. In addition, it is guaranteed that it is neither possible to impersonate the user nor to steal user personal information even in the case of theft or loss of the smartphone, or leakage of information from the vaccination history management institution. Using the scheme, users have no fear on external exposure of personal information and follow-up damage due to excessive information provision by giving out only the minimal information suited to the verifier.

Secure Distributed Cryptocurrency Transaction Model Through Personal Cold Wallet (개인용 보안장치를 통한 안전한 분산형 암호 화폐 거래 모델)

  • Lee, Chang Keun;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.187-194
    • /
    • 2019
  • Ever since the world's largest Bitcoin Echange, (Mt. Gox), was closed in March 2014 due to the series of hacking, still many other Exchages incl. recent Coinale in Korea have been attacked. Those hacking attempts never stopped and have caused significant threats to the overall industry of Crypto Currency and resulted in the loss of individual investors' asset. The DEX (Decentralized Exchange) has been proposed as a solution to fix the security problem at the Exchange, but still it is far away to resolve all issues. Therefore, this paper firstly analyzes security threats against existing Crypto Currency Exchanges and secondly derives security requirements for them. To do that it proposes a secure and distributed Crypto Currency Transaction Model through Personal Security devices as a solution. The paper also proves this new attempt by demonstrating its unique modelling; ultimately by adopting this modeling into Crypto Exchange is to avoid potential security threats.

A Study on the Interrelationship between DISC Personality Types and Cyber Security Threats : Focusing on the Spear Phishing Attacks (DISC 성격 유형과 사이버 보안 위협간의 상호 연관성에 관한 연구 : 스피어피싱 공격 사례를 중심으로)

  • Kim, Mookjung;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.215-223
    • /
    • 2019
  • The recent trend of cyber attack threat is mainly APT (Advanced Persistent Threat) attack. This attack is a combination of hacking techniques to try to steal important information assets of a corporation or individual, and social engineering hacking techniques aimed at human psychological factors. Spear phishing attacks, one of the most commonly used APT hacking techniques, are known to be easy to use and powerful hacking techniques, with more than 90% of the attacks being a key component of APT hacking attacks. The existing research for cyber security threat defense is mainly focused on the technical and policy aspects. However, in order to preemptively respond to intelligent hacking attacks, it is necessary to study different aspects from the viewpoint of social engineering. In this study, we analyze the correlation between human personality type (DISC) and cyber security threats, focusing on spear phishing attacks, and present countermeasures against security threats from a new perspective breaking existing frameworks.

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.