• Title/Summary/Keyword: Defense Technology Security

Search Result 345, Processing Time 0.026 seconds

A Study on Damage caused by Space Activity (우주활동으로 인한 손해배상에 관한 법적 고찰)

  • Cho, Hong-Je;Shin, Dong-Chun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.1
    • /
    • pp.103-122
    • /
    • 2012
  • Nowadays, advanced countries and international community in which provide many services and profits due to rapid progress space science and technology whereas there is rising possibility of damage by collision of space object and increase of space debris. I will propose the concept and range of damage in the basis of review of space treaty and space liability convention as form of international order to fair and complete compensate to victim of accident and hazardous space activity. And, I will try to discuss possibility of compensation on personal damage and mental damage, scope of material damage, possibility of compensation about environmental contamination, issue of satellite data sending, place of damage, and so on. Also, I would like to propose establishment of space tribunal and regional cooperative agency.

  • PDF

Ransomware attack analysis and countermeasures of defensive aspects (랜섬웨어 공격분석 및 방어적 측면의 대응방안)

  • Hong, Sunghyuck;Yu, Jin-a
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.139-145
    • /
    • 2018
  • Ransomeware is a kind of malware. Computers infected with Ransomware have limited system access. It is a malicious program that must provide a money to the malicious code maker in order to release it. On May 12, 2017, with the largest Ransomware attack ever, concerns about the Internet security environment are growing. The types of Ransomware and countermeasures to prevent cyber terrorism are discussed. Ransomware, which has a strong infectious nature and has been constantly attacked in recent years, is typically in the form of Locky, Petya, Cerber, Samam, and Jigsaw. As of now, Ransomware defense is not 100% free. However, it can counter to Ransomware through automatic updates, installation of vaccines, and periodic backups. There is a need to find a multi-layered approach to minimize the risk of reaching the network and the system. Learn how to prevent Ransomware from corporate and individual users.

Enhanced Stream Cipher Rabbit Secure Against Power Analysis Attack (전력분석 공격에 안전한 개선된 스트림 암호 Rabbit)

  • Bae, KiSeok;Ahn, MahnKi;Park, YoungHo;Moon, SangJae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.64-72
    • /
    • 2013
  • Recently, stream cipher Rabbit was selected for the final eSTREAM portfolio organized by EU ECRYPT and as one of algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization. However, a feasibility of practical power analysis attack to algorithm in experiment was introduced. Therefore, we propose appropriate methods such as random masking and hiding schemes to secure against power analysis attack on stream cipher Rabbit. We implement the proposed method with increment of 24% operating time and 12.3% memory requirements due to maintaining a high-speed performance. We use a 8-bit RISC AVR microprocessor (ATmegal128L chip) to implement our method for practical experiments, and verify that stream cipher Rabbit with our method is secure against power analysis attack.

Attacker Response Framework using Mobile Code (이동 코드를 이용한 공격자 대응 프레임워크)

  • Bang Hyo-Chan;Him Jin-Oh;Na Jung-Chan;Jang Joong-Su;Lee Young-Suk
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.959-970
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current so curity mechanisms just have passive defense functionalities. In this paper, we propose new network suity architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We im-plemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

Design of Hybrid Communication Structure for Video Transmission in Drone Systems (드론 영상 전송용 하이브리드 통신 구조의 설계)

  • Kim, Won
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.9-14
    • /
    • 2019
  • In modern society drones are actively utilized in the fields of security, defense, agriculture, communication and so on. Smart technology and artificial intelligence software have been developed with convergence, and the field of use is expected to expand further. On the point of the excellent performance of drones one of the essential technologies is the wireless communication that make the ground facility receive the video streaming obtained by the drones in the air. In the research the concept of communication region is proposed to cover the both the low altitude region for Wi-Fi communication and the high altitude region for LTE communication for the sake of video transmission. Also the hybrid communication structure is designed along the proposed concept and the proposed system is implemented as a communication system in the small size which can be mounted in a small size of drone. It is confirmed that the proposed system contains the effectiveness by showing the ability to successfully transmit HD video streaming in the range of 500 meters and the transfer time between two different communication systems is measured in 200msec by the experiments.

Research on Countermeasure of SQL Injection Attack (SQL Injection 공격을 효율적으로 방어하는 대응책 연구)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.10
    • /
    • pp.21-26
    • /
    • 2019
  • At present, it is indispensable to utilize data as an information society. Therefore, the database is used to manage large amounts of data. In real life, most of the data in a database is the personal information of a group of members. Because personal information is sensitive data, the role of the database administrator who manages personal information is important. However, there is a growing number of attacks on databases to use this personal information in a malicious way. SQL Injection is one of the most known and old hacking techniques. SQL Injection attacks are known as an easy technique, but countermeasures are easy, but a lot of efforts are made to avoid SQL attacks on web pages that require a lot of logins, but some sites are still vulnerable to SQL attacks. Therefore, this study suggests effective defense measures through analysis of SQL hacking technology cases and contributes to preventing web hacking and providing a secure information communication environment.

Hacking attack and vulnerability analysis for unmanned reconnaissance Tankrobot (무인정찰 탱크로봇에 대한 해킹 공격 및 취약점 분석에 관한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1187-1192
    • /
    • 2020
  • The dronebot combat system is a representative model of the future battlefield in the 4th industrial revolution. In dronebot, unmanned reconnaissance tankrobot can minimize human damage and reduce cost with higher combat power than humans. However, since the battlefield environment is very complex such as obstacles and enemy situations, it is also necessary for the pilot to control the tankrobot. Tankrobot are robots with new ICT technology, capable of hacking attacks, and if there is an abnormality in control, it can pose a threat to manipulation and control. A Bluetooth sniffing attack was performed on the communication section of the tankrobot and the controller to introduce a vulnerability to Bluetooth, and a countermeasure using MAC address exposure prevention and communication section encryption was proposed as a security measure. This paper first presented the vulnerability of tankrobot to be operated in future military operations, and will be the basic data that can be used for defense dronebot units.

A Study on the Characteristics of Underwater Explosion for the Development of a Non-Explosive Test System (무폭약 시험 장치 개발을 위한 수중폭발 특성에 대한 연구)

  • Lee, Hansol;Park, Kyudong;Na, Yangsub;Lee, Seunggyu;Pack, Kyunghoon;Chung, Hyun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.57 no.6
    • /
    • pp.322-330
    • /
    • 2020
  • This study deals with underwater explosion (UNDEX) characteristics of various non-explosive underwater shock sources for the development of non-explosive underwater shock testing devices. UNDEX can neutralize ships' structure and the equipment onboard causing serious damage to combat and survivability. The shock proof performance of naval ships has been for a long time studied through simulations, but full-scale Live Fire Test and Evaluation (LFT&E) using real explosives have been limited due to the high risk and cost. For this reason, many researches have been tried to develop full scale ship shock tests without using actual explosives. In this study, experiments were conducted to find the characteristics of the underwater shock waves from actual explosive and non-explosive shock sources such as the airbag inflators and Vaporizing Foil Actuator (VFA). In order to derive the empirical equation for the maximum pressure value of the underwater shock wave generated by the non-explosive impact source, repeated experiments were conducted according to the number and distance. In addition, a Shock Response Spectrum (SRS) technique, which is a frequency-based function, was used to compare the response of floating bodies generated by underwater shock waves from each explosion source. In order to compare the magnitude of the underwater shock waves generated by each explosion source, Keel Shock Factor (KSF), which is a measure for estimating the amount of shock experienced by a naval ship from an underwater explosionan, was used.

UNSC Resolution against North Korea and ROKN's Reactions (유엔 안보리 대북제재 결의와 우리 해군의 대응)

  • Park, Chang Kwoun
    • Strategy21
    • /
    • s.39
    • /
    • pp.82-113
    • /
    • 2016
  • This paper analyzes the contents and the effects of the UNSC 2270, and its implications to South Korea's defense strategy and navy. The UN Security Council passed strong sanctions against North Korea which punish North Korea's 4th nuclear test. The sanctions compared to the previous ones require international society to take practical actions such as comprehensive trade bans as well as diplomatic isolation which will put significant pains on North Korea. Especially, these measures would greatly hamper economic development policy of Kim Joung-un regime. Because Kim Jung-un regime has inherent legitimacy problems which stems from the third family succession of the power, economic difficulties may play an important cause on the regime instability in the long term. In fact, the United States sees this possibility as an option to coerce North Korea in which North Korea choose denuclearization for its regime survival. Nevertheless, the prospects of the UN sanctions are not so optimistic. Considering North Korea's willingness for nuclear development and its level of nuclear technology, North Korea will try to play a gambit with the US and South Korea by exploiting its strategic advantages. North Korea's response will have three following strategies. First, it would actively pursue political and economic survival strategy by using China's support for the regime, strengthening its power grip in the name of countering US hostile policy, and enhancing peace propaganda. Second, North Korea will accelerate efforts to position its status as a nuclear de facto state. For this purpose, it could create nuclear crisis on the peninsula. Third, it would exploit local provocations as an exit strategy to get over the current situation. In order to counter North Korea's actions and punish North Korea's behavior strongly, South Korea needs following strategies and efforts. It should first make all the efforts to implement the UN sanctions. Strong and practical nuclear deterrence strategy and capability with the U.S. should be developed. Effective strategy and capabilities for the prevention and deterrence of North Korea's provocation should be prepared. For this purpose, North Korea's provocation strategy should be thoroughly reviewed. Active international cooperation is needed to punish and coerce North Korea's behavior. Finally, South Korea should prepare for the possible occurrence of North Korea's contingency and make use of the situation as an opportunity to achieve unification. All these strategies and efforts demand the more active roles and missions of South Korea's navy and thus, nullify North Korea's intention militarily.

A Study on the Activation·Specification of 119 Rescue & Care in JeJu (제주도 119구조·구급대의 활성화 및 전문화 방안)

  • Koh, Jae-Moon;Kim, Tae-Min;Kim, Hyo-Sik;Lee, Young-A
    • The Korean Journal of Emergency Medical Services
    • /
    • v.6 no.1
    • /
    • pp.153-168
    • /
    • 2002
  • Since 1992, conventional fire fighting businesses have been converted into a metropolitan autonomous fire fighting system to be ready for a variety of disasters. However, the corresponding investment has been overlapped due to the non-integration of businesses to prevent any potential disasters, and a series of collaborative systems have been not functioning so well. In the meantime, our fire fighting sector has been trying to set up its own clean and faithful position by abolishing any inconvenient system or outsourcing private sectors, and expanded its work scope from conventional fire fighting even to rescue and emergency works. While focusing on handling disaster, the fire fighting sector has been widely trusted and reliable throughtout our nation. Moreover, our fire fighting sector has secured nation wide mobile organizations, technical personnel by field, special equipments and independent communication network. In addition, the fire fighting sector has knowledges, expertise and capabilities required for managing disasters, while in charge of almost every disaster management works including fire, explosion, collapse, disaster and flood. It becomes an organization for comprehensive disaster management under an absolute national trust, which is based on the system for prevention, preparation and countermeasure against a variety of disasters. Thus, our fire fighting sector must make many efforts and try to modernize conventional education and training. The ways to facilitate rescue and emergency works may include the nurture of technical fire fighting personnel along with modernized equipments, the reinforcement of rescue and emergency education, the facilitation of operating civil defense corps, the facilitation of operating volunteer fire fighting corps, the better arrangement of 119 briefing room for public healthcare in provincial offices, the sterilization of rescue instruments and equipments the better repair education for emergency rescue member, the establishment of regional emergency assistant system and the expansion of fire fighting personnel and equipments. In terms of reinforcing the functions and services of rescue 119 and emergency corps, we must review the following considerations: Building up security system along with operational expansion, building up a system for emergency medical treatment, building up a comprehensive information management system for rescue and emergency, constructing a provincial safety museum and so forth. For the ways to better the works of rescue 119 we can review the following considerations : Improving the education for fire fighting training corps under Jeju Provincial Fire and Disaster Management Department, providing rescue members with more opportunities for clinical practices, enhancing the morale of rescue members, installing a comprehensive briefing room for emergency rescue members, building up medical networks along with reasonable policies for information service, operating the consulting system for rescue 119 and so on. If these requirements are met, it is expected that the fire fighting departments in Jeju province can cope with every accident and disaster a little more rapidly and quickly in compliance with local needs, so that they can keep their own position as a public fire fighting organization which may be trusted by the public.

  • PDF