• Title/Summary/Keyword: Data Leakage Prevention

Search Result 80, Processing Time 0.027 seconds

A Study on the Transient State Characteristics of TFR-8 Cable caused by Over Current (과전류에 의한 TFR-8 케이블의 과도상태 특성에 관한 연구)

  • Kim, Byeong-Jo;Kim, Jae-Ho
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.29 no.1
    • /
    • pp.57-63
    • /
    • 2015
  • The incidence of fires caused by electrical factors has increased with the growth in domestic electrical consumption. According to the national fire data system of national emergency management agency, electrical fires accounted for 20% of all domestic fires in the last 10 years. Electrical fires are mainly caused by short circuit, leakage current, defect in an electrical equipment, over load, utility fault, etc. The fault current can be several times larger than the nominal current, thereby exceeding the rated current of cable. Consequently, the cable conductor, typically copper wire, heats up to a temperature that ignites surrounding combustibles. This paper describes the transient characteristics of the 0.6/1kV, TFR-8 cable have been investigated, and analyzed under the over current conditions for reduce the risk of electrical fire by experimental and FEM analysis. The experimental and FEM(Finite Element Method) analysis results of temperature and resistance variation according to the over current in copper wires were analyzed. The experimental results coincide well with the FEM analysis.

A Study on the Standardization of Smart Distribution Board for Electrical Safety (전기안전을 위한 스마트분전반 표준화 연구)

  • Moon, Hyun-Wook;Lim, Young-Bea;Kim, Dong-Woo;Lee, Sang-Ick;Choi, Myeong-Il
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.227-231
    • /
    • 2016
  • Electrical disasters have not been greatly reduced despite continuous prevention efforts until now. However, the smart distribution board which can be measured information about general electrical condition such as current, voltage, power, power factor etc. and electrical safety condition such as over-current, leakage current, arc etc. and communicated analysis information about electrical condition with server will be helpful for the prevention of electrical disasters through real-time surveillance and data analysis under smart grids based on the two-way communication. In this paper, the proposal standard of smart distribution board for electrical safety is suggested about the structure, functional requirements of compositions, communication, security and so on.

Toxic Concentration(T-LOC) Endpoint Distance Study for Fire Brigade Protection in Response to Chemical Accidents (화학사고 초기대응 소방대 보호를 위한 독성농도(T-LOC) 끝점거리 연구)

  • Jong Chan Yun;Chul Hee Cho;Jeong Hun Won
    • Journal of the Korean Society of Safety
    • /
    • v.38 no.6
    • /
    • pp.60-71
    • /
    • 2023
  • The purpose of this study is to propose a quantitative toxicity endpoint distance suitable for the initial response of firefighters by comparing and analyzing the commonly applied toxic level of concern (T-LOC), specifically emergency response planning guidelines (ERPG), acute exposure guideline levels (AEGL), and immediately dangerous to life or health (IDLH). This is to protect the fire brigade, which responds to toxic chemical accidents first during the golden time. Using areal locations of hazardous atmospheres, a damage prediction program, the amount of leakage for both acidic and basic substances, along with the endpoint distance, were analyzed for alternative accident and worst-case accident scenarios. The results showed that the toxicity endpoint distance, serving as a compromise between Level-3 and Level-2 of T-LOC, was longer than ERPG-3 and shorter than ERPG-2 with IDLH, while its values were analyzed in the order of ERPG-2, AEGL-2, IDLH, AEGL-3, and ERPG-3. It is suggested that the application of IDLH in an emergency (red card) and ERPG-2 endpoint distance in a non-emergency (non-red card) can be utilized for the initial response of the fire brigade.

Outcomes Based on Risk Assessment of Anastomotic Leakage after Rectal Cancer Surgery

  • Gong, Jian-Ping;Yang, Liu;Huang, Xin-En;Sun, Bei-Cheng;Zhou, Jian-Nong;Yu, Dong-Sheng;Zhou, Xin;Li, Dong-Zheng;Guan, Xin;Wang, Dong-Feng
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.2
    • /
    • pp.707-712
    • /
    • 2014
  • Purpose: Anastomotic leakage (AL) is associated with high morbidity and mortality, high reoperation rates, and increased hospital length of stay. Here we investigated the risk factors for AL after anterior resection for rectal cancer with a double stapling technique. Patients and Methods: Data for 460 patients who underwent primary anterior resection with a double stapling technique for rectal carcinoma at a single institution from 2003 to 2007 were prospectively collected. All patients experienced a total mesorectal excision (TME) operation. Clinical AL was defined as the presence of leakage signs and confirmed by diagnostic work-up according to ICD-9 codes 997.4, 567.22 (abdominopelvic abscess), and 569.81 (fistula of the intestine). Univariate and logistic regression analyses of 20 variables were undertaken to determine risk factors for AL. Survival was analysed using the Cox regression method. Results: AL was noted in 35 (7.6%) of 460 patients with rectal cancer. :Median age of the patients was 65 (50-74) and 161 (35%) were male. The diagnosis of AL was made between the 6th and 12th postoperative day (POD; mean 8th POD). After univariate and multivariate analysis, age (p=0.004), gender (p=0.007), tumor site (p<0.001), preoperative body mass index (EMI) (p<0.001), the reduction of TSGF on 5th POD less than 10U/ml (p=0.044) and the pH value of pelvic dranage less than or equal to 6.978 on 3rd POD (p<0.001) were selected as 6 independent risk factors for AL. It was shown that significant differences in survival of the patients were AL-related (p<0.001), high ASA score related (p=0.036), high-level EMI related (p=0.007) and advanced TNM stage related

Flicker Prevention and Noise Reduction Using Edge-Spike Modulation in Visible Light Communication

  • Lee, Seong-Ho
    • Journal of Sensor Science and Technology
    • /
    • v.27 no.3
    • /
    • pp.143-149
    • /
    • 2018
  • In this paper, we introduce an edge-spike modulation method for visible light communication (VLC). This method is effective in preventing LED flicker and 120 Hz noise interference in base-band VLC. In the VLC transmitter, edge-spikes are generated by passing the digital data through a simple RC-high pass filter (HPF). The LED modulation of the edge-spikes does not change the average power of the LED light; thus it prevents LED flicker. In the VLC receiver, the 120 Hz noise from other lighting lamps is easily eliminated by RC-HPF, while the edge-spike signal is detected normally. In our experiment, the message of an air-quality sensor was successfully transmitted using edge-spike modulation. This structure is useful in constructing, e.g., wireless gas monitoring sensor systems to warn and prevent harmful gas leakage accidents in buildings using LED light.

A Study on Internal Information Leakage Detection System by User Grouping (사용자 그룹화를 통한 내부 정보 유출 탐지 시스템에 관한 연구)

  • Shin, Hee Jin;Seo, Min Ji;Kim, Myung Ho;Park, Jin Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.771-772
    • /
    • 2017
  • 내부 정보 유출 사고의 빈도가 높아지게 되면서 이러한 내부 정보 유출을 막기 위해 DLP(Data Loss Prevention), DRM(Digital Rights Management), DB 접근 통제 솔루션, 인터넷 접근 차단 솔루션과 같은 여러 가지 보안 솔루션을 적용하고 있으나, 내부 정보 유출을 시도하는 개인의 행동을 기반으로 개인을 탐지한다는 문제점을 가지고 있다. 본 논문에서는 개인이 아닌 조직으로 이루어진 내부 정보 유출의 행위를 탐지하고 대응하기 위해 보안로그를 위험 사용자들끼리 그룹화 하여 내부 정보 유출 여부를 판단하는 시스템을 제안한다.

Methodology to analyze insider risk for the prevention of corporate data leakage (기업 내 정보유출방지를 위한 내부자 위험도 분석 방법론 연구)

  • Shin, Hye-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.295-297
    • /
    • 2012
  • 내부자에 의한 위협이 증가됨에 따라, 기업 내 핵심기술이 유출되어 큰 피해가 발생하고 있다. 내부자들이 합법적인 권한을 통한 불법적인 정보유출을 시도하는 위험을 예측 관리하기 위하여, 본 논문에서는 내부자들의 위험도를 평가하기 적합한 위험분석 방법론 ISMS-AIR(ISMS - Against Insider Risk)을 제안하였다. 내부자 위협의 정의와 위험도 평가를 위한 기존 위험분석 방법론들을 연구하였으며, 기존 자산 중심의 위험분석 방법론인 ISMS에 사용자 중심의 행위 모니터링을 강화하여 위험도 산출하는 방법을 제안하였다. 이를 위하여 사용자 행위에 따른 프로파일링 데이터와 이상징후 시나리오를 적용하여 내부자들의 위험도를 산출하고, 주요 모니터링 대상을 선정하여 내부자들의 불법적인 정보유출 시도행위를 모니터링 할 수 있다.

Secure Data Management System for Prevention Leakage by Insider (내부자에 의한 정보 유출 방지를 위한 안전한 데이터 관리 시스템)

  • Kim, Kyung Tae;Youn, Hee Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1181-1184
    • /
    • 2004
  • 최근 정보 시스템의 활용도가 높아지고 인터넷을 통한 공간의 제약 없이 네트워크를 통해 먼 거리의 컴퓨터에 원격으로 접속하고 상호간에 자유롭게 데이터를 공유하게 됨으로써 정보유출 위험성이 날로 증가하고 있다. 현재 정보 유출 방지를 위해 다양하고 효율적인 방법들이 연구되어 오면서, 수많은 정보 시스템들은 사용자 인증 및 암호화 기술을 사용하여 보안성이 크게 강화되었다. 그러나 여전히 내부관리자나 사용자에 의한 정보 유출에 대해서는 취약한 실정이다. 본 논문에서는 커버로스 인증 시스템 및 접근제어목록을 이용하여 대부분의 암호화 파일시스템에서 문제로 제기되는 파일 공유 문제를 해결하고, 사용자 단위로 관리할 필요가 없는 시스템수준의 키 관리를 하는 안전한 데이터 관리 시스템을 제안함으로써 내부자에 의한 정보 유출 방지 및 외부자 침입을 탐지할 수 있는 방안을 제시한다.

  • PDF

Blockchain applied Military Electronic Secret Document Management Scheme (focused on C4i) (블록체인을 적용한 군(軍) 전자적 비밀관리 개선방안 (전장관리정보체계 중심으로))

  • Hong Yoon;Yeong Gyun Cha;Jong Beom Park
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.181-187
    • /
    • 2023
  • Recently, military operations have been aimed at winning using various information, analysis, weapons, and operation systems. These systems should consist of integrated composition and the function of analyzing and sharing data. Accordingly, military C4I collects and analyzes a lot of data and produces and shares secrets to perform effective operations. However, C4I cannot operate in electronic form from secret production to disposal. And as it is managed based on the output, problems such as difficulty in management and loss/leakage arise. Therefore, in this paper, we propose an ESDMB(Electronic Secret Document Management whit Bloockchain) plan based on blockchain technology to manage all secrets in electronic document format and provide integrity and denial prevention. In particular, the blockchain-based proposal method will be suitable as a protection measure against manipulation and leakage, from secret production to destruction.

Design and Implementation of a Personal Health Record Platform Based on Patient-consent Blockchain Technology

  • Kim, Heongkyun;Lee, Sangmin;Kwon, Hyunwoo;Kim, Eunmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4400-4419
    • /
    • 2021
  • In the 4th Industrial Revolution, the healthcare industry is undergoing a paradigm shift from post-care and management systems based on diagnosis and treatment to disease prevention and management based on personal precision medicine. To optimize medical services for individual patients, an open ecosystem for the healthcare industry that allows the exchange and utilization of personal health records (PHRs) is required. However, under the current system of hospital-centered data management, it is difficult to implement the linking and sharing of PHRs in practice. To address this problem, in this study, we present the design and implementation of a patient-centered PHR platform using blockchain technology. This platform achieved transparency and reliability in information management by eliminating the risk of leakage and tampering/altering personal information, which could occur when using a PHR. In addition, the patient-consent system was applied to a PHR; thus, the patient acted as the user with ownership. The proposed blockchain-based PHR platform enables the integration of personal medical information with scattered distribution across multiple hospitals, and allows patients to freely use their health records in their daily lives and emergencies. The proposed platform is expected to serve as a stepping stone for patient-centered healthcare data management and utilization.