• Title/Summary/Keyword: Breach Process

Search Result 55, Processing Time 0.034 seconds

FAIR-Based Loss Measurement Caused by Personal Information Breach of a Company (FAIR를 통한 개인정보 유출에 따른 기업의 손해금액 산출에 대한 연구)

  • Kim, Jeong-Gyu;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.129-145
    • /
    • 2017
  • This study proposes a methodology to estimate the financial damages by personal information breach of a company and to analyse risk systematically through a case study of a company which experiences private information breach. Using FAIR(Factor Analysis of Information Risk) model, estimate the loss amount and to analyse risk objectively of a company by personal information breach. This study estimates adequacy and importance of corresponding factors applying AHP(Analytic Hierarchy Process) on each factors for assessing loss amount. By adopting proposed methodology in this study, the person in charge of actual work can assess and prove the loss amount though the latest risk estimation methodology. In addition, the person in charge can select the proper parameters for the corresponding company and can obtain the objective quantitative estimation. Hence it can be reported to the management by accurately assessing loss amount caused by personal information breach.

Development of Numerical Model to Analyze Levee Break (하천제방붕괴 해석모형의 개발)

  • Park, Jae-Hong;Han, Kun-Yeun;Ahn, Ki-Hong
    • Journal of Korea Water Resources Association
    • /
    • v.42 no.7
    • /
    • pp.571-578
    • /
    • 2009
  • Levee-break Analysis model is developed to predict the variation of breach width according to time and to estimate inundation area and depth in protected lowland. This Model calculate flood depth using 4 point implicit finite difference method in river channel and analyze breach flow based on physical theory introducing soil transport equation and erosion process. Breach analysis model and channel flood model are combined into Levee-Break Model and this model is applied to actual levee break case. Then, this model can simulate reasonably many levee-break parameters such as river stage, breach width, breach formation and so on. If the applicability of this model is proved through applications to more various actual levee-break cases, the suggested model is expected to do more accurate flood analyses on levee break site.

Effects of Gap Resistance and Failure Location on prompt Fission Gas Release from a Cladding Breach

  • Tak, Nam-Il;Chun, Moon-Hyun;Ahn, Hee-Jin;Park, Jong-Kil;Rhee, In-Hyoung
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1997.05a
    • /
    • pp.184-189
    • /
    • 1997
  • A prompt fission gas release model incorporating the resistance to gas flow in the gap was developed and the effects of gap resistance and failure location on prompt fission gas release from the cladding breach were assessed. The process of prompt fission gas release from the plenum and gap into the coolant was modeled in accordance with three major phenomena: (1) transient gas flow in the gap, (2) the growth of the fission gas bubble while it is still attached to the breach, and (3) the detachment of the fission gas bubble from the breach and mixing with the coolant. The cumulative mass release fraction by the present model was calculated for the case of Young-Gwang 3 & 4 nuclear fuel rod as a typical example. The results showed that the release behavior of prompt fission gas with time was different from the frictionless model which has frequently been used in a simplified approach, and that the location of cladding failure was another key factor for the prompt fission gas release process due to the resistance in the gap.

  • PDF

Estimation of damage area on membrane surface by application of fluorescent particles as a surrogate (형광입자를 이용한 분리막 표면 검측과 손상 면적 추정 오차에 대한 연구)

  • Choi, Yunkyeong;Kim, Choah;Kim, Heejun;Cho, Jinwoo
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.28 no.2
    • /
    • pp.171-179
    • /
    • 2014
  • In this study, a novel method was proposed to test the integrity of water treatment system specifically equipped with membrane filtration process. We applied the silica particles coated with a fluorescent agent (rhodamine B isothiocyanate) as a surrogate to detect a membrane process integrity and evaluate the reliability of effluent quality in the system. Additionally, a series of experiments was conducted to evaluate the sensitivity of the method through the laboratory scale experiment. The laboratory scale experiments showed that the feasibility of application of proposed method to detect a breach or damaged part on the membrane surface. However, the sensitivity on predicting the area of a breach was significantly influenced by the testing conditions such as a concentration of surrogate, filtration flux, and detection time. The lowest error of predicting the area of breach was 3.5% at the testing condition of surrogate concentration of 80 mg/L injected with flux of $20L/m^2/hr$ for 10 minutes of detection time for the breach having the actual area of $7.069mm^2$. However, the error of estimation was increased at the small breach with area less than $0.785mm^2$. A future study will be conducted to estimate a damaged area with more accuracy and precision.

A Quantitative Assessment Model of Private Information Breach (기업의 개인정보 유출로 인한 경제적 피해규모 산출방법)

  • Han, Chang-Hee;Chai, Seung-Wan;Yoo, Byung-Joon;Ahn, Dae-Hwan;Park, Chae-Hee
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.17-31
    • /
    • 2011
  • Damage caused by private information breach causes serious problems and huge social losses. In order to make a better policy that prevents society from suffering from the damage, we have to know about the actual size of damage. So it is needed to develop a quantitative model of private information breach that helps catching the more accurate size of damage. In our study, we suggest a method which calculate not only the costs of damage from firms' perspective but also those from individual and social perspectives. In this process, we refer to methods adopted by JNSA(Japan Network Security Association) and Ponemon Research Institue and modify it with considering our current situation. Also we try to make a new model by using new methods(web traffic analysis, survey, indirect comparison, etc.) and verify it with theories and methods from econometrics, cost accounting and theory of producer.

A Study on the Gradual Brench of Earth Dam (흙댐의 점진적 파괴에 관한 연구)

  • 오남선;선우중호
    • Water for future
    • /
    • v.22 no.2
    • /
    • pp.213-221
    • /
    • 1989
  • Gradual failure of an earth dam is caused by piping or overtopping. In this gradual failure, a breach will form and grow gradually under the erosive action of the waters. The process involved during an earth dam failure is very dynamic and complicated. The physical model of Fread and mathmatical model of Singh and Scarlatos are verified and compared in this study. Fread's model(BREACH) simulates dam failure well when sufficient data are given, and Singh and Scarlatos' model simulates it appoximately with a few simple data.

  • PDF

Breach of international sales contract and Exemption possibility due to customs clearance impediment (통관차질(通關蹉跌)로 인한 무역계약(貿易契約) 위반(違反)과 면책(免責)의 가능성(可能性))

  • Chung, Jae-Wan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.20
    • /
    • pp.241-265
    • /
    • 2003
  • The purpose of this paper is to examine the customs clearance impediment and trade parties breaches of international sales contract by the impediment. Customs clearance impediment arises when (a)clearance is not permitted, (b) importation goods are confiscated, (c)clearance delay without expectation, and (d) additional excessive trade cost caused in the process of clearance. This kind of clearance impediment may cause the breach of international sales contract. And it depends on its contents of contract and causal sequence i.e. cause and effect respectively in determining who is liable for it. If one party exemptions by Article 79 CISG, next three elements must be proved. (a)The failure was due to an impediment beyond his control; (b)the impediment was reasonably unforeseeable at the time of the conclusion of the contract, and (c)the impediment was reasonably impossible to overcome. But the customs clearance impediment is not easy to prove these three elements, the party who is responsible the customs clearance may not be exemptions by Article 79 CISG. And, according to review, it is concluded that the buyer, rather than seller, is liable for the damage which is caused in the process of clearance. It is also confirmed that the seller is sometimes liable for depending on clauses of contracts i.e. quality conditions.

  • PDF

Evaluating Local Damages and Blast Resistance of RC Slabs Subjected to Contact Detonation (접촉 폭발 하중을 받는 RC 슬래브의 국부 손상 및 내폭 성능 평가)

  • Li, Ling;Lee, Jin Young;Min, Kyung Hwan;Yoon, Young Soo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.17 no.1
    • /
    • pp.37-45
    • /
    • 2013
  • In this study, the resistance of various reinforced concrete (RC) slabs subjected to contact detonation was assessed. In order to enhance the blast resistance, fibers and external FRP sheets were reinforced to RC slabs. In the experiment, the $2,000{\times}1,000{\times}100mm$ sized RC slabs were fabricated using normal concrete (NC), steel fiber reinforced concrete (SFRC), polyvinyl alcohol fiber reinforced cementitious composite (PVA FRCC), and ultra-high performance cementitious composites (UHPCC). The damage levels of RC slabs subjected to contact detonation were evaluated by measuring the diameter and depth of crater, spall and breach. The experimental results were compared to the analyzed data using LS-DYNA program and three different prediction equations. The diameter and depth of crater, spall and breach were able to be predicted using LS-DYNA program approximately. The damage process of RC slabs under blast load was also well expressed. Three prediction equations suggested by other researchers had limitations to apply in terms of empirical approaches, therefore it needs further research to set more analytical considerations.

Alternative Breaching Methods of the TRISO Fuels

  • Lee Jong-Hyeon;Shim Joon-Bo;Ahn Byung-Gil;Kwon Sang-Woon;Kim Eung-Ho;Yoo Jae-Hyung;Park Seong-Won
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2005.11b
    • /
    • pp.92-106
    • /
    • 2005
  • The head-end processes of spent TRISO fuel have been reviewed to understand the current status and the limitations of the reported processes. The main concerns in the TRISO treatment are to effectively breach and separate the carbon and SiC layers composing the TRISO particles. The crush-bum scheme which was considered in the early stages of the development has been replaced by the crush-leach or $CO_2$ burning and the succeeding CO decomposition process because of a sequestration problem of $CO_2$ containing $^{14}C$. However there are still many obstacles to overcome in the reported processes. Hence, innovative thermomechanical and pyrochemical concepts to breach the coating layers of the TRISO particle with a minimized amount of second waste are proposed in this paper and their principles are described in detail.

  • PDF

An Analysis of Privacy and Accuracy for Privacy-Preserving Techniques by Matrix-based Randomization (행렬 기반 랜덤화를 적용한 프라이버시 보호 기술의 안전성 및 정확성 분석)

  • Kang, Ju-Sung;An, A-Ron;Hong, Do-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.53-68
    • /
    • 2008
  • We study on the practical privacy-preserving techniques by matrix-based randomization approach. We clearly examine the relationship between the two parameters associated with the measure of privacy breach and the condition number of matrix in order to achieve the optimal transition matrix. We propose a simple formula for efficiently calculating the inverse of transition matrix which are needed in the re-construction process of random substitution algorithm, and deduce some useful connections among standard error and another parameters by obtaining condition numbers according to norms of matrix and the expectation and variance of the transformed data. Moreover we give some experimental results about our theoretical expressions by implementing random substitution algorithm.