• Title/Summary/Keyword: Cyber crisis

Search Result 45, Processing Time 0.025 seconds

Digital Evidence Acquisition Scheme using the Trusted Third Party in Smart Grid Infrastructure (스마트그리드 환경에서 공증기관을 이용한 디지털 증거 수집 기법)

  • Cho, Youngjun;Choi, Jaeduck;Kim, Sinkyu;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.319-328
    • /
    • 2013
  • Considerable number of major countries have put great efforts to leverage the efficiency of power consumption using Smart Grid in order to resolve the critical issues with drastical growing demands regarding electricity, the crisis of environmental pollution and so on. There has been increasing number of researches to construct Smart Grid in Korea as well. The threats of cyber terror attacks which might cause national crisises in terms of economy and society have been climbing up because of the fact that Smart Grid employs bi-directional communications embedding the cyber threats from existing/legacy communication networks. Consequently, it is required to build concrete response processes including investigation and analysis on cyber breaches into Smart Grid. However, the digital evidence acquisition techniques do not suffice to be deployed in Smart Grid systems despite of the fact that the techniques, against cyber breaches into well-known networks, have been studied in plenty of time. This work proposes a novel digital evidence acquisition scheme appropriate to Smart Grid systems through intensive investigation of the evidence acquisition requirements in Smart Grid and the historical evidence acquisition methods.

A Study on Law and Standards for Promotion of Aftermarket (애프터시장(판매후시장) 활성화를 위한 국내외 법률 및 표준에 대한 연구)

  • Choi, Sun;Hwang, SangKyu
    • Journal of Environmental Science International
    • /
    • v.22 no.8
    • /
    • pp.1063-1072
    • /
    • 2013
  • To overcome the ecosystem-crisis of resource depletion and climate change, we should maintain and develop a 'Sustainability' of our society. 'After-market' is defined like this : any market where customers who buy one product or service are likely to buy a related follow-on product. This is related to a automotive, electric and electronic, and remanufacturing industry. 'After-market' will be helpful for reuse and recycling of resources aspects, cost and economic efficiency, low-carbon, climate protection, and new industries and job creation effects, To promote 'After-Market', we need to guarantee the quality of products. In this regard, we refer and introduce a new standard, for example, BS8887, PAS141 and ISO20245 etc. In order to promote 'After-Market', first of all, product quality assurance and safety must be demonstrated in the process of reuse. Second, many aspects of a device that protects the rights of consumers to be provided. And third, the related laws and standards should be reviewed. Finally, original manufacturer's awareness for environmental protection and resource conservation and government's institutional support are needed.

A Study on Family Caregiver Support Programs in the U.S.A.: The Case of the State of Georgia

  • Cho, Kyungjin;Kim, Yun-Jung
    • International Journal of Human Ecology
    • /
    • v.17 no.2
    • /
    • pp.1-15
    • /
    • 2016
  • This is a descriptive study that introduces programs that support family caregivers looking after the elderly, by focusing on the case of Georgia, in the United States. The U.S. is one of the few countries that support family caregivers by law. In this study, we focus on the evidence-based interventions implemented through the Alzheimer's Disease Supportive Services Program (ADSSP), a federal policy that complements the National Family Caregiver Support Program (NFCSP). Our findings show that one-on-one evidence-based programs (EBPs) for family caregivers are both economical and effective in assisting caregivers. In our discussion, we highlight how the implementation of the latest EBPs can build an infrastructure to support family caregivers. ADSSP funding is useful as it constructs a caregiver support through the implementation of programs in the local community. The result is the creation of a well-coordinated division of labor among government agencies, academia and NGOs, which produces a synergetic effect in funding, research and development, translation and implementation of programs, and staff training. We conclude that the implementation of EBPs funded by the government is a useful reference for Korea and other rapidly aging countries, if we are to create an infrastructure for caregiver support, which can effectively prevent a crisis in caregiving.

A Legislative Device for the University's Safety Management System in Terms of Crisis Management Perspective (위기관리관점에서 대학의 안전관리 법제 방안)

  • Bae, Dae-Shik
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.183-196
    • /
    • 2008
  • This research will mainly focus on security issues in a university campus and delve into the risk factors and its characteristics due to the extreme polarization growth, and ultimately conduct research on legislative issues regarding safety & security management. A university campus is a miniature of the society, concentrated with human resources, material resources and knowledge information resources. It is also a region in which various underlying risk factors threaten these resources. However, due to the insensibility of danger and carefree indolence, these risk factors have been ignoring, leaving university campus amidst a "dead zone." Currently, a systematic and synthetic measures not only for safety inside the laboratory but also for the new type of crimes such as cyber crimes and motiveless crime due to extreme polarization, stress, uneasiness about the future, increase of mental illnesses, and drug abuse are urgently required. Therefore, I would like to introduce a legislative program in a crisis management perspective that can prevent universities from danger and protect the resources which would ultimately create a new security system.

The psychological consequences of indirect trauma exposure through the news on the Sewol ferry disaster (세월호 뉴스 노출을 통한 간접 외상의 심리적 영향)

  • Heung Pyo Lee;Yun Kyeung Choi;Jae Ho Lee;Hong Seock Lee
    • Korean Journal of Culture and Social Issue
    • /
    • v.22 no.3
    • /
    • pp.411-430
    • /
    • 2016
  • The purpose of the present study was to examine psychological consequences of indirect trauma exposure through the disaster news. Participants(N=439) completed some self-report questionnaires such as Posttraumatic Risk Checklist(PRC), Impact of Event Scale-Revised(IES-R), and Multidimensional Fear of Death Scale(MFODS) at 68.11(±18.47) days after the Sewol ferry disaster. The data were analyzed with structural equation modeling by AMOS 23.0 program. The results showed that fear of death and periand post-traumatic crisis factors mediated the association of news exposure immediately after disaster and posttraumatic stress symptoms. Findings in this study indicated that news exposure immediately after disaster influenced fear of death which led to the peri- and post-traumatic crisis, and these crisis factors increased posttraumatic stress symptoms. Finally, limitations of this study and suggestions for future study were discussed.

  • PDF

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

A Study on the Critical Defense Information Resources Mobilization for Information Warfare (정보전 대비 국방부문 핵심정보자원 동원 방안에 관한 연구)

  • 이승구;김화수
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.2
    • /
    • pp.131-142
    • /
    • 2000
  • The emergence of computer-based information society has fundamentally changed the paradigms of everyday human life and will continue its trend in the 21st century when resources of information technology become more and more important because they can be directly transformed into military use. Future warfare will include such high-tech weapon systems as precision-guided munitions and satellite. But, with the spread of internet and advances in information technology, cyber space appears to be resources can be deciding factor in winning future war. In this paper we proposed to identify core information technology in national defense, improve mobilizing method of information resources in time of crisis, come up with combat effective measures utilizing information technology by estimating future information technological developments.

  • PDF

Study On Masked Face Detection And Recognition using transfer learning

  • Kwak, NaeJoung;Kim, DongJu
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.294-301
    • /
    • 2022
  • COVID-19 is a crisis with numerous casualties. The World Health Organization (WHO) has declared the use of masks as an essential safety measure during the COVID-19 pandemic. Therefore, whether or not to wear a mask is an important issue when entering and exiting public places and institutions. However, this makes face recognition a very difficult task because certain parts of the face are hidden. As a result, face identification and identity verification in the access system became difficult. In this paper, we propose a system that can detect masked face using transfer learning of Yolov5s and recognize the user using transfer learning of Facenet. Transfer learning preforms by changing the learning rate, epoch, and batch size, their results are evaluated, and the best model is selected as representative model. It has been confirmed that the proposed model is good at detecting masked face and masked face recognition.

A Study on the Analysis and Countermeasures of Industrial Accident Deaths of Foreign Workers in the Manufacturing Industry (산업재해로 인한 외국인근로자의 제조업 사망사고 실태분석 및 대응방안에 관한 연구)

  • Jung-Duck Kim;Young-Soo Yu;Beom-Suk Go;Won-Baek Yang
    • Journal of the Korea Safety Management & Science
    • /
    • v.25 no.2
    • /
    • pp.39-48
    • /
    • 2023
  • Recently, the crisis of demographic extinction is rising in Korea more than any other country, and it is difficult for industrial sites to maintain without 'foreign workers'. Industrial accidents and accident deaths of foreign workers account for 7.6% and 12.3% of the total, through an in-depth analysis of fatal accidents in the manufacturing industry, differences and similarities between fatal accidents of foreign workers and all fatal accidents were confirmed in terms of occurrence type, workplace size, length of service, employment type, etc. In this study, customized countermeasures were found.

A Study on the Relationship between Job Characteristics and Individual Learning Agility and Learning Satisfaction (군 직무특성 및 개인 학습민첩성과 학습만족도 간의 관계 연구)

  • Choi, Soonwon;Jeon, Ki Seok
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.6
    • /
    • pp.197-210
    • /
    • 2020
  • Learning agility is the will and ability to flexibly change thoughts and behaviors by quickly learning in new environments and experiences, and is a core competency to overcome crisis and solve organizational problems. It is a concept that can be used in the same organization group. Based on the previous research, a study was conducted to investigate how the job characteristics and personal learning agility of the army deputy officers influence learning satisfaction. After receiving a questionnaire survey of 216 business and yarn companies, SPSS 24.0 was used to verify the reliability and validity of the measurement variables, and the hypothesis was verified by regression analysis. It was found that some of the sub-categories of personal learning agility (self-awareness, active change pursuit) had a positive effect on learning satisfaction. This means that in order to enhance the effectiveness of military cyber education, measures should be taken to avoid overload in the field, and in order to increase performance in military organizations, personal learning agility pursuing positive change based on self-awareness and feedback must be developed.