• Title/Summary/Keyword: Countermeasure research

Search Result 553, Processing Time 0.034 seconds

A Research on Process of Estimation about Frequency and Loss of Risk by distribution of Probability (확률분포에 의한 리스크 빈도수와 손실규모 추정 프로세스 연구)

  • Lee, Young-Jai;Lee, Seong-Il
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.2
    • /
    • pp.67-82
    • /
    • 2008
  • Risk that breed large size disaster is happening variously for cause at social. natural a management. Incidence and damage scale are trend that increase rapidly than past. In these circumstance, to keep operational continuity of organization, area, society, risk management action that establish systematic counter measure estimating and analyze occurrence possibility and expectation damage of risk is essential indispensable issue and the best countermeasure. Risk management action does by main purpose establish optimum disaster reduction countermeasure. To deduce various countermeasure, process that estimate and analyze occurrence possibility and expectation damage of risk is essential indispensable issue. Therefore, this paper studies process design that can presume risk occurrence frequency and damage scale through distribution of probability.

  • PDF

A Blinding-Based Scalar Multiplication Algorithm Secure against Power Analysis Attacks (전력분석공격에 대한 블라인딩 기반의 상수배 알고리즘)

  • Kim, Chang-Kyun;Ha, Jae-Cheol;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.117-121
    • /
    • 2007
  • Most existing countermeasures against classical DPA are vulnerable to new DPA, e.g., refined power analysis attack (RPA), zero-value point attack (ZPA), and doubling attack. More recently, Mamiya et al proposed a new countermeasure (so-called BRIP) against RPA, ZPA, classical DPA and SPA. This countermeasure, however, also has a vulnerability of scalar multiplication computations by exploiting specially chosen input message. Therefore, to prevent various power analysis attacks like DPA and new SPA, we propose an enhanced countermeasure by developing a new random blinding technique.

Study of Stability Analysis and Countermeasure Tunnel Portal Failure using Dipole-Dipole Investigation (쌍극자(Dipole-Dipole)탐사를 활용한 터널붕괴사면 조사 및 대책방안 제시 연구)

  • Baek, Yong;Rhee, Jong-Hyun;Koo, Ho-Bon;Bae, Gyu-Jin
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2003.03a
    • /
    • pp.493-498
    • /
    • 2003
  • In case of slope failure by planted protection is constructed on the slope according to of the choice trend of a recently environmental-friendly countermeasure, there has a limitation about diagnosis and preparation of measure. Also, collapse of tunnel pithead department slope has maximum in construction and countermeasure method of construction choice unlike cut-slope. In this study, analyzed inside circumstance of slope using geophysical exploration for stability analysis and countermeasure inside presentation of tunnel pithead department slope which collapse happens. geophysical exploration used dipole(Dipole-Dipole) method that is based to distribution principle does specific resistance, goes side by side with on-the-spot observation and draws base strength parameter and executed stability analysis, and presented stabilization countermeasure inside of collapse slope on this. I wish to conduce in development and research for use technical development of geophysical exploration technique hereafter by executing geophysical exploration in road collapse spot applying through this study.

  • PDF

Construction of Efficient and Secure Pairing Algorithm and Its Application

  • Choi, Doo-Ho;Han, Dong-Guk;Kim, Ho-Won
    • Journal of Communications and Networks
    • /
    • v.10 no.4
    • /
    • pp.437-443
    • /
    • 2008
  • The randomized projective coordinate (RPC) method applied to a pairing computation algorithm is a good solution that provides an efficient countermeasure against side channel attacks. In this study, we investigate measures for increasing the efficiency of the RPC-based countermeasures and construct a method that provides an efficient RPC-based countermeasure against side channel attacks. We then apply our method to the well-known $\eta_T$ pairing algorithm over binary fields and obtain an RPC-based countermeasure for the $\eta_T$ pairing; our method is more efficient than the RPC method applied to the original $\eta_T$ pairing algorithm.

A Study on the Test and Evaluation Methodology for the Precise Encountering Scenario between Ammunitions (탄약 간 정밀교전을 위한 시험평가기법 연구)

  • Ha, Jongsoo;Park, Youngsik;Lee, Hanjin;Kim, Yongjae;Kwak, Yoon;Park, Minkyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.776-783
    • /
    • 2018
  • This paper proposes an improved test and evaluation methodology to be conducted for a in-flight threat-countermeasure encounter scenario. Although the conventional test method adopted in the precedent researches allows high precision and safety, such full-scale method is practically not appropriate to apply to small-scale test rounds for evaluating the subparts of the ammunition. To address this problem, this study suggests a readily-applicable, small-scale test and evaluation method of the subpart of the ammunition in firing test. In the threat-countermeasure encounter scenario, the results of several tests demonstrate that the proposed technique does not deteriorate the precision when the engagement point should be adjusted.

Cyber attack taxonomy for digital environment in nuclear power plants

  • Kim, Seungmin;Heo, Gyunyoung;Zio, Enrico;Shin, Jinsoo;Song, Jae-gu
    • Nuclear Engineering and Technology
    • /
    • v.52 no.5
    • /
    • pp.995-1001
    • /
    • 2020
  • With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead to an accident involving the release of radioactive materials cyber-attacks. However, cyber security research on industrial control systems (ICSs) and supervisory control and data acquisition (SCADA) systems is relatively inadequate compared to information technology (IT) and further it is difficult to study cyber-attack taxonomy for NPPs considering the characteristics of ICSs. The advanced research of cyber-attack taxonomy does not reflect the architectural and inherent characteristics of NPPs and lacks a systematic countermeasure strategy. Therefore, it is necessary to more systematically check the consistency of operators and regulators related to cyber security, as in regulatory guide 5.71 (RG.5.71) and regulatory standard 015 (RS.015). For this reason, this paper attempts to suggest a template for cyber-attack taxonomy based on the characteristics of NPPs and exemplifies a specific cyber-attack case in the template. In addition, this paper proposes a systematic countermeasure strategy by matching the countermeasure with critical digital assets (CDAs). The cyber-attack cases investigated using the proposed cyber-attack taxonomy can be used as data for evaluation and validation of cyber security conformance for digital devices to be applied, and as effective prevention and mitigation for cyber-attacks of NPPs.

Field Evaluation of Scour Countermeasure Using Geobag (지오백 세굴보호공법의 현장 적용성 평가)

  • Park, Jae-Hyun;Kwak, Ki-Seok;Lee, Ju-Hyung;Chung, Moon-Kyung
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2006.03a
    • /
    • pp.1251-1258
    • /
    • 2006
  • Field evaluation of new scour countermeasure using geobag and aggregate is performed to prepare for the basis of design and construction standard in Korea. Polyester non-woven geotextile is determined as a geobag material and tire cord is used to sew up the geobag which contain aggregate. Hwasang-gyo(bridge) is selected as a pilot test site through office review and field investigation. According to the design flood of Hwasang-gyo(bridge), the size and volume of geobag are calculated and construction area and required number of geobags are computed by considering the specification of the pier and foundation of the bridge. After construction, scour depth around geobag construction area is measured and the stability of geobag is ascertained by using pole and digital camera.

  • PDF

The Hazard Grade Classification Criterion using Character of Collapsed Cut Slope by Rainfall (강우에 의해 붕괴된 절토사면의 특성을 이용한 절토사면 위험등급 분류기준)

  • Yoo, Ki-Jeong;Koo, Ho-Bon;Baek, Yong
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2004.03b
    • /
    • pp.600-605
    • /
    • 2004
  • The road construction with horizontal expansion of country using and augmentation of traffic demand is advanced actively and it accompanies hereupon, the above of 70% of the country is formed at the mountain in our country where the hazard cut slope has been created. In this study, It is prepared a effective management countermeasure of cut slope introduced priority investigation decision method against hazard cut slope which is influenced by abnormally rainfall by an unusual change in the weather such as a guerilla rainfall character. In meaning link, It was executed collapse cause by failure character analysis in the cut slope which has failed for the last five years and it is prepared the hazard grade criterion from E to A grade according to collapse cause. It is decided that a maintenance management grade by the hazard grade classification criterion of cut slope. So It is possible to hazard cut slope. It is established failure protection counter countermeasure by effective maintenance management through the hazard grade c1assification criterion and it will be able to dispose to advanced nation level like Hong Kong and Japanese.

  • PDF

An Analysis of Required Technologies for Developing Unmanned Mine Countermeasure System Based on the Unmanned Underwater Vehicle (무인잠수정 기반 기뢰대항전체계 개발을 위한 소요기술 분석)

  • Lee, Ki-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.4
    • /
    • pp.579-589
    • /
    • 2011
  • One of the most significant UUV(Unmanned Underwater Vehicle) applications is MCM(Mine Countermeasure), which makes good use of UUV characteristics to provide covert, rapid, controlled and efficient survey of a potential minefield without risking a human operator. In this paper, a survey of the today's MCM missions where UUVs will play a role, the vehicle systems that are either under development or planned in the future are presented. And examines principal technical challenges and outline new enabling technologies. Particularly, this paper analyses current approaches to tacking these technologies and technological limitation of UUVs as a MCM platform, and research efforts to develop the technology necessary to meet the domestic MCM mission needs.

The Study about Countermeasure against Rockfall in resort, Jeju island (제주 관광지의 낙석 방재에 대한연구)

  • Lee, Su-Gon;Lee, Kyung-Su;Jung, Sang-Hun
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.565-568
    • /
    • 2008
  • This study area, Sanbang mountain located in southern part of Jeju island, is famous for its scenic with increasing foreigners and visitors. However, rockfall frequently occurred because of the meteorological characteristic and geological features with trachyte, a sort of volcanic rock, is distributed through Sanbang mountain area and also additional rockfalls are being existed all the time. Therefore this research is to see reasonable countermeasure against rockfall with the subject of a roundabout way of Sanbang mountain, through field investigation and following analysis.

  • PDF