• Title/Summary/Keyword: Cyber Safety

Search Result 272, Processing Time 0.022 seconds

Periodic-and-on-Event Message-Aware Automotive Intrusion Detection System (Periodic-and-on-Event 메시지 분석이 가능한 차량용 침입탐지 기술)

  • Lee, Seyoung;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.373-385
    • /
    • 2021
  • To provide convenience and safety of drivers, the recent vehicles are being equipped with a number of electronic control units (ECUs). Multiple ECUs construct a network inside a vehicle to share information related to the vehicle's status; in addition, the CAN protocol is normally applied. As the modern vehicles provide highly convenient and safe services, it provides many types of attack surfaces; as a result, it makes them vulnerable to cyber attacks. The automotive IDS (Intrusion Detection System) is one of the promising techniques for securing vehicles. However, the existing methods for automotive IDS are able to analyze only periodic messages. If someone attacks on non-periodic messages, the existing methods are not able to properly detect the intrusion. In this paper, we present a method to detect intrusions including an attack using non-periodic messages. Moreover, we evaluate our method on the real vehicles, where we show that our method has 0% of FPR and 0% of FNR under our attack model.

Design Study of a Brazed Plate Heat Exchanger Condenser Through Two-Phase Flow Analysis (이상유동 해석을 통한 브레이징 판형 응축기 설계 연구)

  • Hwang, Dae-jung;Oh, Cheol;Park, Sang-kyun;Jee, Jae-hoon;Bang, Eun-shin;Lee, Byeong-gil
    • New & Renewable Energy
    • /
    • v.18 no.2
    • /
    • pp.73-81
    • /
    • 2022
  • This study was aimed at designing a condenser, as a component of the organic Rankine cycle system for ships. The condenser was manufactured through press molding to achieve a bent shape to enhance the heat transfer performance, considering the shape of the heat transfer plate used in a brazing plate heat exchanger. The heat transfer plate was made of copper-nickel alloy. The required heat transfer rate for the condenser was 110 kW, and the maximum number of layers was set as 25, considering the characteristics of high-temperature brazing. Computational fluid dynamics techniques were used to perform the thermal fluid analysis, based on the ANSYS CFX (v.18.1) commercial program. The heat transfer rate of the condenser was 4.96 kW for one layer (width and length of 0.224 and 0.7 m, respectively) of the heat transfer exchanger. The fin efficiency pertaining to the heat transfer plate was approximately 20%. The heat flow analysis for one layer of the heat exchanger plate indicated that the condenser with 25 layers of heat transfer plates could achieve a heat transfer rate of 110 kW.

Analysis of Psychological Factors Inducing Cybercrime (사이버범죄를 유발하는 심리적요인 분석)

  • Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2021
  • This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.

Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques

  • Gadde, Swetha;Amutharaj, J.;Usha, S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.342-347
    • /
    • 2022
  • On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.

A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel (군장병 휴대전화 사용제도 시행에 따른 개인정보 안정성 확보 방안 연구)

  • Hwangbo, Wongyu;Shin, Dong-Kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • As military service members are fully permitted to use mobile phones for sickness after work, it is time to minimize the direct collection of personal information from telecommunication companies when opening mobile phones to secure the safety of military service personnel's personal information. Prior to introducing the use of mobile phones by soldiers after work, the Ministry of National Defense established a security control system such as blocking the mobile phone shooting function to prevent security accidents and concerns about some adverse functions such as illegal cyber gambling, game addiction, and viewing pornography. come. Mobile telecommunications companies entrust personal information processing tasks, such as opening mobile phones, to telecommunications agencies and carry out management and supervision, such as checking the status of personal information protection measures. When a military service member opens a mobile phone, a personal information management agency is newly established using the right to portability of personal information, and a system for requesting the transmission of personal information from the military service member is proposed.

A Study on the Actual Situation of Domestic Violence and the Problems of Victims of Domestic Violence and Preventive Measures (가정폭력의 실태 및 피해 가정 문제와 예방대책에 관한 연구)

  • Bae, Na Rae
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.187-193
    • /
    • 2022
  • Domestic violence in our society is where the abuser and the abuser live in the same space. Problems are left unresolved in families where abuse is reproducing. Domestic violence can be viewed as a crime that violates and tramples human rights. They rely solely on family support networks for solutions to domestic violence. The physical, emotional, and psychological pain and wounds that victims of domestic violence must endure are too deep. In order to help victims of domestic violence, case management services that can provide long-term and attentive help in the neighborhood or community are needed. For this, prevention and treatment of domestic violence should be considered together. And the interest and professional role of the community must follow.

Analysis of Institutional Limitations on Evacuation of Urban Railway Station Facilities and Guidelines (도시철도역 시설의 피난에 대한 제도적 한계점 분석과 가이드라인)

  • Yekyeong Shin;Okkyung Yuh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.4
    • /
    • pp.1-9
    • /
    • 2022
  • This study analyzes the institutional status related to 'evacuation' and 'firefighting' in underground subway stations, derives institutional limitations for 'evacuation' in underground subway stations, and proposes guidelines in terms of architectural space based on this. As a result of the study, the following points were derived. First, since similar standards are separately enacted in individual laws and it is difficult to grasp the standards and they are dualized, it is necessary to standardize and regulate the space where users stay according to the movement of urban railway users, limited to urban railways. Second, in order to use trains, a special procedure called 'ticketing' must be considered, and regulations on evacuation safety zones and evacuation stairs between the waiting room and the platform are required. Finally, if there is a platform at a depth of more than 30m underground, it is necessary to install an evacuation floor in accordance with standards similar to the current building law.

A Study on the Security Threat Response in Smart Integrated Platforms (스마트 통합플랫폼 보안위협과 대응방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.129-134
    • /
    • 2022
  • A smart platform is defined as an evolved platform that realizes physical and virtual space into a hyper-connected environment by combining the existing platform and advanced IT technology. The hyper-connection that is the connection between information and information, infrastructure and infrastructure, infrastructure and information, or space and service, enables the realization and provision of high-quality services that significantly change the quality of life and environment of users. In addition, it is providing everyone with the effect of significantly improving the social safety net and personal health management level by implementing smart government and smart healthcare. A lot of information produced and consumed in these processes can act as a factor threatening the basic rights of the public and individuals by the informations themselves or through big data analysis. In particular, as the smart platform as a core function that forms the ecosystem of a smart city is naturally and continuously expanded, it faces a huge security burden in data processing and network operation. In this paper, platform components as core functions of smart city and appropriate security threats and countermeasures are studied.

Assessment of Apartment Building Construction Workers' Noise Exposure (아파트 건설노동자 소음 노출평가)

  • Taesun Kang
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.33 no.3
    • /
    • pp.308-316
    • /
    • 2023
  • Objectives: The aim of this study is to measure and assess the occupational noise exposure levels among construction workers at apartment building construction sites in South Korea. Methods: Noise exposure assessments were conducted for 139 construction workers across 10 different trades at 53 apartment building construction sites in the northern part of Gyeonggi-do. Assessments were carried out using a noise dosimeter set with a 90 dB criterion, an 80 dB threshold, and a 5 dB exchange rate over a period of more than 6 hours(LMOEL) Results: The mean LMOEL (equivalent continuous noise level over 8 hours) for the 139 dosimeter samples was 87.8 ± 4.3 dBA. The mean noise exposure level for each construction trade, referred to as the trade mean, was also calculated. Significant differences in noise exposure levels were observed between construction trades (ANOVA, p < 0.001). The highest LMOEL values were recorded for concrete chippers (93.2 ± 2.6 dBA), followed by ironworkers (88.4 ± 0.7 dBA), concrete finishers (88.3 ± 2.7 dBA), masonry workers (87.7 ± 1.9 dBA), pile driver operators (85.6 ± 1.7 dBA), concrete carpenters (84.9 ± 2.4 dBA), interior carpenters (83.5 ± 2.1 dBA), and other groups (81.4 ± 2.2 dBA). Conclusions: The findings suggest that nearly all construction workers in this study are at risk of Noise-Induced Hearing Loss (NIHL). Moreover, the study establishes that construction trades can serve as a useful metric for assessing noise exposure levels at apartment construction sites.

The Design Research on ICT Security Concepts and Domains (ICT기반 보안개념 정의와 범위에 관한 설계연구)

  • Minseo Jeon;Hangbae Chang
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.49-61
    • /
    • 2019
  • As the number of security incidents and damages increase steadily, interest in the security of society is growing, and the amount of academic interest and research is steadily increasing. However, despite these concerns and the quantitative increase in research, the terms 'security' and 'safety' have been mixed and studies have been conducted without the conceptual definition of various security terms being clearly defined. As a result, various forms of security concepts based on ICT environments have been misused. Therefore, we tried to derive the consensus of experts among the various security terms which are mixed in this study, and to summarize the concepts based on the analysis of domestic and foreign documents based on the concept of the terms. Through this research, we intend to contribute to the establishment of the academic identity of security by preventing related mistakes caused by the mixed use of terminology.