• Title/Summary/Keyword: E-terrorism

Search Result 18, Processing Time 0.024 seconds

The limits in legislating and the methods for improving the current 'National Guidelines on Anti-Terror Activities' (현행 '국가대테러활동지침'의 문제점과 입법적 개선방안에 관한 연구)

  • Kim, Soon-Seok;Shin, Jae-Chul
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.95-117
    • /
    • 2009
  • Ever since the 9/11 terror attack, all the world has perceived the need and taken actions to make an anti-terror law, however The Republic of Korea has not yet come up with any relevant output. Currently, the Korean government apportions duties to each related government agency and sets up systems for cooperation among them to make preparations against and cope with terror threats, according to The National Guidelines on Anti-Terror Activities (the presidential directive number 47 given on January 21, 1982). However, the directive has many limits and shortcomings in coping with national emergencies. In this situation, this research aims to compare the national anti-terror laws of others countries with Korea's, in order to understand the problems in Korea, i.e., that The National Guidelines on Anti-Terror Activities, which are the only anti-terror regulations in Korea do not clearly describe the concept and range of a terror, that national anti-terror meetings and the anti-terror standing committee have problems with their operation, that the Terrorism Information Integration Center has also its own problems, and that Korea lacks in preparatory actions against terror crimes and there are still problems about investigations into terror incidents. In order to solve these problems for the future, the present author suggests that the purpose of the law on The National Guidelines on Anti-Terror Activities shall be re-established so as to meet the current anti-terror conditions of Korea, the concept of a terror and anti-terror activities shall be clarified, anti-terror organizations shall be unified, the chair of the anti-terror standing committee shall be appointed legally and automatically according to the relevant rule and be given more rights so as to have free access to private information for anti-terror activities and terror-related information, and systems shall be supplemented for reporting terror-involved persons and funds.

  • PDF

A security study for Control Network: Security Threat Using Control Protocol (제어 네트워크의 프로토콜을 이용한 보안 위협 연구)

  • Choi, DongJun;Lee, JaeWoo
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.99-108
    • /
    • 2020
  • Unlike a general IT environment, an industrial control system is an environment where stability and continuity are more important than security. In the event of a security accident in the industrial control system, physical motion can be controlled, so physical damage can occur and physical damage can even result in personal injury. Cyber attacks on industrial control systems are not simply cyber damage, but terrorism. However, the security of industrial control systems has not been strengthened yet, and many vulnerabilities are actually occurring. This paper shows that the PLC can be remotely controlled by analyzing the connection process and packets for the PLC protocol used in the industrial control system and bypassing the security mechanism existing in the protocol. Through this, we intend to raise the security awareness of the industrial control system.

An Analysis of Vulnerabilities and Performance on the CCTV Security Monitoring and Control (CCTV 보안관제 취약성 및 성능 분석)

  • Seo, Tae-Woong;Lee, Sung-Ryoul;Bae, Byung-Chul;Yoon, E-Joong;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.1
    • /
    • pp.93-100
    • /
    • 2012
  • Recently, the security monitoring and control systems based on spatial information in various field are operated and being developed according to evolve the spatial information technology. Especially, the CCTV monitoring and control system can be used in various field as a typical system. However, the security vulnerability problems have become an issue because the system connected by computer network and getting bigger than before. Therefore we studied security vulnerabilities of CCTV monitoring and control system which is being developed and operated. In addition, it is important to consider disaster and terrorism with unauthorized changes on location information. Therefore we analyzed the performance of observation when the cameras are break down as a result by hacking to CCTV monitoring and control system.

Plant Extracts and Plant-Derived Compounds: Promising Players in Countermeasure Strategy Against Radiological Exposure: A Review

  • Kma, Lakhan
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.6
    • /
    • pp.2405-2425
    • /
    • 2014
  • Radiation exposure leads to several pathophysiological conditions, including oxidative damage, inflammation and fibrosis, thereby affecting the survival of organisms. This review explores the radiation countermeasure properties of fourteen (14) plant extracts or plant-derived compounds against these cellular manifestations. It was aimed at evaluating the possible role of plants or its constituents in radiation countermeasure strategy. All the 14 plant extracts or compounds derived from it and considered in this review have shown some radioprotection in different in vivo, ex-vivo and or in vitro models of radiological injury. However, few have demonstrated advantages over the others. C. majus possessing antioxidant, anti-inflammatory and immunomodulatory effects appears to be promising in radioprotection. Its crude extracts as well as various alkaloids and flavonoids derived from it, have shown to enhance survival rate in irradiated mice. Similarly, curcumin with its antioxidant and the ability to ameliorate late effect of radiation exposure, combined with improvement in survival in experimental animal following irradiation, makes it another probable candidate against radiological injury. Furthermore, the extracts of P. hexandrum and P. kurroa in combine treatment regime, M. piperita, E. officinalis, A. sinensis, nutmeg, genistein and ginsan warrants further studies on their radioprotective potentials. However, one that has received a lot of attention is the dietary flaxseed. The scavenging ability against radiation-induced free radicals, prevention of radiation-induced lipid peroxidation, reduction in radiation cachexia, level of inflammatory cytokines and fibrosis, are some of the remarkable characteristics of flaxseed in animal models of radiation injury. While countering the harmful effects of radiation exposure, it has shown its ability to enhance survival rate in experimental animals. Further, flaxseed has been tested and found to be equally effective when administered before or after irradiation, and against low doses (${\leq}5Gy$) to the whole body or high doses (12-13.5 Gy) to the whole thorax. This is particularly relevant since apart from the possibility of using it in pre-conditioning regime in radiotherapy, it could also be used during nuclear plant leakage/accidents and radiological terrorism, which are not pre-determined scenarios. However, considering the infancy of the field of plant-based radioprotectors, all the above-mentioned plant extracts/plant-derived compounds deserves further stringent study in different models of radiation injury.

Numerical modelling of internal blast loading on a rock tunnel

  • Zaid, Mohammad;Sadique, Md. Rehan
    • Advances in Computational Design
    • /
    • v.5 no.4
    • /
    • pp.417-443
    • /
    • 2020
  • Tunnels have been an integral part of human civilization. Due to complexity in its design and structure, the stability of underground structures under extreme loading conditions has utmost importance. Increased terrorism and geo-political conflicts have forced the engineers and researchers to study the response of underground structures, especially tunnels under blast loading. The present study has been carried out to seek the response of tunnel structures under blast load using the finite element technique. The tunnel has been considered in quartzite rock of northern India. The Mohr-Coulomb constitutive model has been adopted for the elastoplastic behaviour of rock. The rock model surrounding the tunnel has dimensions of 30 m x 30 m x 35 m. Both unlined and lined (concrete) tunnel has been studied. Concrete Damage Plasticity model has been considered for the concrete lining. Four different parameters (i.e., tunnel diameter, liners thickness, overburden depth and mass of explosive) have been varied to observe the behaviour under different condition. To carry out blast analysis, Coupled-Eulerian-Lagrangian (CEL) modelling has been adopted for modelling of TNT (Trinitrotoluene) and enclosed air. JWL (Jones-Wilkins-Lee) model has been considered for TNT explosive modelling. The paper concludes that deformations in lined tunnels follow a logarithmic pattern while in unlined tunnels an exponential pattern has been observed. The stability of the tunnel has increased with an increase in overburden depth in both lined and unlined tunnels. Furthermore, the tunnel lining thickness also has a significant effect on the stability of the tunnel, but in smaller diameter tunnel, the increase in tunnel lining thickness has not much significance. The deformations in the rock tunnel have been decreased with an increase in the diameter of the tunnel.

Design and Analysis of the Web Stegodata Detection Systems using the Intrusion Detection Systems (침입탐지 시스템을 이용한 웹 스테고데이터 검출 시스템 설계 및 분석)

  • Do, Kyoung-Hwa;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.39-46
    • /
    • 2004
  • It has been happening to transfer not only the general information but also the valuable information through the universal Internet. So security accidents as the expose of secret data and document increase. But we don't have stable structure for transmitting important data. Accordingly, in this paper we intend to use network based Intrusion Detection System modules and detect the extrusion of important data through the network, and propose and design the method for investigating concealment data to protect important data and investigate the secret document against the terrorism. We analyze the method for investigating concealment data, especially we use existing steganalysis techniques, so we propose and design the module emphasizing on the method for investigating stego-data in E-mail of attach files or Web-data of JPG, WAVE etc. Besides, we analyze the outcome through the experiment of the proposed stego-data detection system.

A Study on procedure of Criminal Cases related to the Security (안보형사법제도의 바람직한 개선방향 제시 - 안보사례분석을 중심으로 -)

  • Joo, Seong-Bhin
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.231-257
    • /
    • 2015
  • Today, the international community make every effort to suppress security crimes, to provide numerous institutional strategies and to prevent security crimes such as the terrorism and spy. Particularly, developed countries in the field of security are strengthening related legislation under new-security conditions. Things work a little differently about security crimes because the nation's benefit and protection of the law is the basis of individual benefit and protection of the law under investigation procedure of the security crimes. Therefore they have policy that permits major investigative agency under the arrest and detention procedure(e.g. security and communication monitoring ${\ldots}$). Criminal procedure's improvement and reinforcement are very important for events related security. But, The investigation procedure between criminal offense and security crimes makes no odds in the Korea. Continuance of such a national mood will accuse of not responding appropriately in preparation for new-security conditions recently. To revise with international best security legislation, We should institute a proper registration system in Korea's situation. This study have been discussing how to improve related legislation under new-security conditions through the cases analysis of the arrest and detention procedure in Korea.

  • PDF

A Hybrid Modeling Method for RCS Worm Simulation (RCS 웜 시뮬레이션을 위한 Hybrid 모델링 방법)

  • Kim, Jung-Sik;Park, Jin-Ho;Cho, Jae-Ik;Choi, Kyoung-Ho;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.43-53
    • /
    • 2007
  • Internet becomes more and more popular, and most companies and institutes use web services for e-business and many other purposes. With the explosion of Internet, the occurrence of cyber terrorism has grown very rapidly. Simulation is one of the most widely used method to study internet worms. But, it is quite challenging to simulate very large-scale worm attacks because of various reasons. In this paper, we propose a hybrid modeling method for RCS(Random Constant Spreading) worm simulation. The proposed hybrid model simulates worm attacks by synchronizing modeling network and packet network. So, this model will be both detailed enough to generate realistic packet traffic, and efficient enough to model a worm spreading through the Internet. Moreover, our model have the capability of dynamic updates of the modeling parameters. Finally, we simulate the hybrid model with the CodeRed worm to show validity of our proposed model for RCS worm simulation.