• Title/Summary/Keyword: Cyber Safety

Search Result 272, Processing Time 0.028 seconds

A Study on Vulnerability Assessment for the Digital Assets in NPP Based on Analytical Methods (분석적 방법을 적용한 원전디지털자산 취약점 평가 연구)

  • Kim, In-kyung;Kwon, Kook-heui
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1539-1552
    • /
    • 2018
  • The necessity of establishing a more secure cyber security system is emerging to protect NPP against cyber attacks as nuclear facilities become increasingly reliant on digital system. Proper security measures should be established through periodic analysis and evaluation of vulnerabilities. However, as Nuclear facilities has safety characteristics as their top priority and it requires a lot of time and cost to construct regarding the activities for vulnerability analysis, it is difficult to apply the existing vulnerability analysis environment and analysis tools. In this study, We propose a analytical vulnerability assessment method to overcome the limitations of existing vulnerability analysis methods through analysis the existing vulnerability analysis methods and the issues to be considered when applying the vulnerability analysis method.

Effects of an Online Imagery-Based Treatment Program in Patients with Workplace-Related Posttraumatic Stress Disorder: A Pilot Study

  • Lee, Won Joon;Choi, Soo-Hee;Shin, Jung Eun;Oh, Chang Young;Ha, Na Hyun;Lee, Ul Soon;Lee, Yoonji Irene;Choi, Yoobin;Lee, Saerom;Jang, Joon Hwan;Hong, Yun-Chul;Kang, Do-Hyung
    • Psychiatry investigation
    • /
    • v.15 no.11
    • /
    • pp.1071-1078
    • /
    • 2018
  • Objective We developed easily accessible imagery-based treatment program for patients with post-traumatic stress disorder (PTSD) related to workplace accidents and investigated the effects of the program on various PTSD related symptoms. Methods The program was based on an online platform and consisted of eight 15-min sessions that included script-guided imagery and supportive music. Thirty-five patients with workplace-related PTSD participated in this program 4 days per week for 4 weeks. Its effects were examined using self-report questionnaires before and after the take-home online treatment sessions. Results After completing the 4-week treatment program, patients showed significant improvements in depressed mood (t=3.642, p=0.001) based on the Patient Health Questionnaire-9 (PHQ-9), anxiety (t=3.198, p=0.003) based on the Generalized Anxiety Disorder seven-item (GAD-7) scale, and PTSD symptoms (t=5.363, p<0.001) based on the Posttraumatic Stress Disorder Check List (PCL). In particular, patients with adverse childhood experiences exhibited a greater degree of relief related to anxiety and PTSD symptoms than those without adverse childhood experiences. Conclusion The present results demonstrated that the relatively short online imagery-based treatment program developed for this study had beneficial effects for patients with workplace-related PTSD.

The direction of application of the RMF-based risk management system considering interoperability (상호운용성을 고려한 RMF 기반의 위험관리체계 적용 방향)

  • Kwon, Hyuk-Jin;Kim, Sung-Tae;Joo, Ye-na
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.83-89
    • /
    • 2021
  • The RMF (Cyber Security Risk Management Framework) is a more strengthened U.S. defense cybersecurity framework that is currently used throughout the U.S. federal government beyond the defense sector. In the past decade, the proportion of cyber warfare in non-regular warfare encountered by the United States, especially cyberattacks caused by China and North Korea, has been increasing. In the end, the U.S. is newly establishing an RMF system to prepare a more strengthened cybersecurity policy at the pan-government level, and the U.S. Department of Defense aims to expand the U.S. defense RMF evaluation policy beyond the federal government level. The South Korean military has already applied RMF at the request of the U.S. that notified the policy to apply RMF when obtaining F-35A. The application of RMF by the Korean military is no longer inevitable. Now is the time for the Korean military to seriously think about what to prepare for the early establishment of a successful Korean RMF system.

Analysis of the Evacuation Safety in a Fire at Welfare Center for Disabled (장애인복지관 화재 시 피난안전성 분석)

  • Park, Sunah;Lee, Jai Young
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.315-322
    • /
    • 2021
  • This study analyzes the Required Safe Egress Time (RSET), in the event of a fire at a welfare center for the disabled, using the emergency passage according to the floor arrangement of users to evaluate the safety and the difference in RSET for each emergency passage using the Pathfinder simulation program to suggest an efficient evacuation method. As a result of RSET, it was found that there is no problem in evacuation safety for the current state of the facility's personnel allocation by satisfying the standard RSET in case of fire, and evacuation can be completed safely by evacuating through stairs rather than using elevators if possible. It is necessary for employees to be provided sufficient education and training in advance so that they can evacuate effectively with the disabled in case of fire. This study gives significance in saving many precious lives and safely evacuate in case of fire as evacuation routes were secured through the design, construction and operation of facilities for the disabled and the RSET was shortened through regular evacuation practices. It is necessary to discuss the further RSET studies based on the automatic fire shutters open or not when a fire occurs at a specific location following the installation of automatic fire shutter at the entrance of each floor of the facilities.

DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION (전자증거 관리시스템의 설계)

  • 김종섭;하옥현;김귀남
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2001.05a
    • /
    • pp.275-280
    • /
    • 2001
  • DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION Digital evidence will be used as a term, which means the electronic form of information which is necessary to confirm or prove the factum of all kinds of behaviors committed through the devices which have data processing ability including computer. It is expected that there will be the increase of legal conflicts surrounding electronic commerce activities as well as the increase of cyber crimes, as the number of Internet users are getting bigger. In order to solve the problems of conflicts derived from electronic commerce, the factum of electronic commerce activities must be confirmed. In order to confirm the factum of electronic commerce activities, the evidence is prerequisite. Almost all evidences relating to the electronic commerce activities exist in digital form. For the reason that the digital evidence can be easily damaged and changed, special management is required to collect, analyze, and preserve the digital evidence. In order to meet this requirement, this study proposes a basic model of digital evidence management system applying computer forensics and electronic authentication.

  • PDF

A Study on the Damage of Red and Blue Painting of the Wooden Cultural Assets by Using the Loaded Stream Extinguishant (강화액 소화약제에 의한 목조 문화재 단청의 훼손에 관한 연구)

  • Lee, Chang-Woo;Choi, Don-Mook
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.1
    • /
    • pp.59-65
    • /
    • 2009
  • The aim of these studies is to confirm the red and blue painting damages during the fire suppression of wooden cultural assets by using the loaded stream charge extinguishant. As a results of these experiments, the ingredients of extinguishant existing on the surface of wooden cultural assets were perfectly eliminated by the water washing only. Any changes on the surface of wooden cultural assets couldn't be detected. Moreover, any color changes of the red and blue painting didn't occur.

A Phenomenological Studies on Ignition Characteristics of Wires by Local Impact, Over Loading and Overcurrent (국부적 충격, 과부하 및 과전류에 의한 전선의 발화특성에 관한 현상학적 연구)

  • Lee, Jeong-Jin;Lee, Chang-Woo;Choi, Don-Mook
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.4
    • /
    • pp.53-60
    • /
    • 2010
  • When a fire breaks out, it is difficult to find out the causes of the fire, because combustible things around fire scene are usually burnt away. Among many causes of fires are electronic wires, this thesis deal with the destroyed sheath of electronic wires caused by fire. It was studied with the use of measurement devices focusing on the distinctions of wires and conductors. This study especially emphasized the process of deterioration, burning pattern, and composition of electronic wire conductor. It also has a phenomenological approach to the distinctive cause of fire by some partial force. The fire prevention methods have been suggested through the analysing results of fire patterns. This study is expected to be a useful material for analyzing various electrical fires.

A Study on the Development of Cyber Bond Site with CRM (CRM을 활용한 사이버 채권사이트 구축에 관한 연구)

  • 유태윤;김영민
    • Journal of the Korea Safety Management & Science
    • /
    • v.4 no.2
    • /
    • pp.113-122
    • /
    • 2002
  • The marketing environment of recent security business has been changed as goods and service have been changed variously. Under this condition, the security corporations have been trying to have good relationship with customers and to have high gains as well. But the management of the customers in the bond marketing is not enough. Then, this paper suggests some methods to promote the CRM at bond brokerage in order to make profits in the security corporation. First, the customers will know the earning rate of the bond that they have and also they can analysis the difference selling the bond and keeping it until the due date. The developed bond management system analyzes customers' preference from questionaire which is responded by customers. It also can make customers actively sell and buy the bond through recommendations corresponding with customers' preference. Moreover, this paper suggests the video conference consulting system for close relationship with corporation and customers. We have tested this bond management system and we expect that this system activates the buying and selling of the bond that non-experts can easily invest bonds and the security corporations can increase profit.

A Study on the Patterns of New Terrorism through the Comparative Analysis with Conventional Terrorism (고전적 테러리즘과의 비교 분석을 통한 뉴 테러리즘 양상에 대한 연구)

  • Song, Jae-Hyeong
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.113-154
    • /
    • 2003
  • We can feel the fear through the reports of outbreaking centers of terror. Also, we noticed through "the 9.11 terror" that there exists no safety zone from terrorism. However, we should question ourselves whether we are relaxing attention or ceasing anxiety too much in the perimeter, as in the peninsula of Korea. Through "the 9.11 terror", the vulnerability of the United State's homeland security has been exposed, giving a serious damage to the national pride. President Bush started the war against terror to strengthen global joints of anti-terrorism, identify terrorists and contribute to the global peace, adopting offensive realism including preemptive attack concept which means to remove the threat preemptively. In today's reality of international politics, where the inhuman, indiscriminate, and anti-civilizational international terror became greater, extending to the stage of war, the international societies' agony and focus lies on how to banish it. The 9.11 terrorism, which is a new form of terrorism, is being distinguished from conventional terrorism into new terrorism. New terrorism is a new form of terrorism meaning that you do not know the enemy, the goal does not exist and they conscientiously use the weapons of mass destruction. This paper is a work meant to help understanding new terrorism, the new form, by a comparative analysis with the conventional terrorism. Therefore the origin, concept and general characteristics new terrorism is picked out and the representative forms of it, which are suicide bombing, cyber, biochemical and nuclear terrorism, are analyzed in detail in theoretical manner.

  • PDF

A Study on the Direction of the Formulation of "Safe Country" Laws and Regulations due to the Development of Information Technology (정보사회에 있어서 '안전국가' 법규의 정립방향에 관한 소고)

  • Kim, Hyun-Kyung
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.151-163
    • /
    • 2013
  • It is no doubt that information technology is the key factor of national safety. Information technology is positively useful for national security such as crime prevention and detection, criminal investigation, disaster management, and national defense. However, it might be a threat to the security as we saw in the examples such as '3.4 DDoS attacks' and 'Nong-hyup Computer Network Failure.' Although the effect that information technology makes upon the national security is immense, the current legal system does not reflect these changes well. National security should be kept during 'prevention-response-recovery' process regardless it is in the online on offline. In addition, public administration for national security should be based on laws. However, the current legal system is lack of legislative basis on cyber and physical disaster, and the laws on the response to disaster might cause confusing. Therefore, this study examines the limitation of the current legal system on national security, and suggests directions for the development of the system based on the new establishment of the legal concept for 'national security'.