• Title/Summary/Keyword: Inside Attack

Search Result 106, Processing Time 0.024 seconds

Crevice Corrosion Behavior by Measuring the Potential Inside the Crevice and Repassivation Characteristics of Alloy 600 and Alloy 690 (틈 내 전위측정을 통한 Alloy 600 및 Alloy 690의 틈부식 거동과 재부동태 특성)

  • Oh, Se-Jung;Lee, Jae-Bong
    • Journal of the Korean institute of surface engineering
    • /
    • v.40 no.2
    • /
    • pp.82-90
    • /
    • 2007
  • Crevice corrosion is the accelerated attack occurred in the occluded cell under a crevice on the metal surface. Crevice corrosion behaviors of nickel-based alloys such as Alloy 600 and Alloy 690 were investigated in acidic solution with different chloride ion concentrations. Tests were carried out using the specially designed crevice cell with a very narrow Luggin capillary assembly to measure the potential inside the crevice. It is believed that crevice corrosion in active/passive system like nickel-based alloys has much to do with the properties of passive film and its repassivation characteristics, investigated by the capacitance measurement and by the abrading electrode technique, respectively. An attempt was made to elucidate the relationship between crevice corrosion behaviors, properties of passive film and its repassivation kinetics. Results showed that repassivation rate parameter $n1{\leq}0.6$ and/or $n2{\leq}0.5$ indicated the possible occurrence of crevice corrosion.

A Study for Key Generation and Access Control Protocol in BYOD Environments (BYOD환경에서 키 생성 및 접근 제어 프로토콜에 관한 연구)

  • Min, So-Yeon;Jin, Byung-Wook;Lee, Kwang-Hyoung;Lee, Keun-Wang
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.27-35
    • /
    • 2015
  • Depending on the smart device user growth and development of communication technology, the area about working environment was extended without constraints of time and places. It is introducing to work using user's devices and this environment is called 'BYOD(Bring Your On Device)'. But it is vulnerable to security threat that happened in existing wireless environment and its security threat issue which is caused by inside information leak by an inside job and lost or stolen terminal which is caused by careless user is getting heated. So we studied about access control protocol by user rights under the BYOD situation make a session key based on the user information. We make a session key based on the user information and user device information, after that we design an access control protocol. The protocol we suggest can protect from attack under the BYOD situation and wireless communication situation and also safety and security requirement from inside information leak because it controls user rights.

Solar concentrator optimization against wind effect

  • Sayyed Hossein Mostafavi;Amir Torabi;Behzad Ghasemi
    • Wind and Structures
    • /
    • v.38 no.2
    • /
    • pp.109-118
    • /
    • 2024
  • A solar concentrator is a reflective surface in the shape of a parabola that collects solar rays in a focal area. This concentrator follows the path of the sun during the day with the help of a tracking system. One of the most important issues in the design and construction of these reflectors is the force exerted by the wind. This force can sometimes disrupt the stability of the concentrator and overturn the entire system. One of the ways to estimate the force is to use the numerical solution of the air flow in three dimensions around the dish. Ansys Fluent simulation software has been used for modeling several angles of attack between 0 and 180 with respect to the horizon. From the comparison of the velocity vector lines on the dish at angles of 90 to - 90 degrees, it was found that the flow lines are more concentrated inside the dish and there is a tendency for the flow to escape around in the radial direction, which indicates the presence of more pressure distribution inside the dish. It was observed that the pressure on the concave surface was higher than the convex one. Then, the effect of adding a hole with various diameter of 200, 300, 400, 500, and 600 mm on the dish was investigated. By increasing the diameter up to the optimized size of 400 mm, a decrease in the maximum pressure value in the pressure distribution was shown inside the dish. This pressure drop decreased the drag coefficient. The effect of the hole on the dish was also investigated for the 30-degree angled dish, and it was found that the results of the 90-degree case should be considered as the basis of the design.

'Study on Oui-Ga-Sil( 胃家實 )' (위가실(胃家實)에 관(關)한 연구(硏究))

  • Han, Gyu-Eon;Ryu, Bong-Ha;Park, Dong-Won;Ryu, Gi-Won;Jang, In-Gyu
    • The Journal of Internal Korean Medicine
    • /
    • v.10 no.1
    • /
    • pp.65-80
    • /
    • 1989
  • About Oui-Ga-Sil(胃家實) in order to considerate the contents recorded in Nai-Gyung Sang-Han-Lon and latter literature, definition, etiopathology, syndrome, differential diagnosis, therapy, Prognosis and prevention were classified. And the results were as follows: 1. Oui-Ga(胃家)was a term which indicated the whole digestive system such as stomach, small intestine, large intestine, rectum and anus. Sil(實)could be defined as the peculiar concept pertaining to the acute and last stage which was invaded to inside bowels because of abundance with evil influence. 2. Eliology of Oui-Ga-Sil was abunt gastric fever originally, injured mucus because of mistreatment, the invasion to inside of outside evil influence through meridian. Pathology was the opening and shutting appearance of gastric abundance with intestinal emptiness, and intestinal abundance with gastric emptiness, Oui-Ga-Sil could be occurred because of gastric abundant dryness and splenic humidifying capacity decrease. 3. Symptom of Oui-Ga-Sil was classified as for the sunlight outside syndrome and the inside abundant syndrome. The sunlight outside syndrome was body fever, sweating, no chilling, on the contrary hatred of fever. The chief complaint of inside abundant syndrome was daily fever, talking in delirium, hand and foot sweating, abdominal distention, difficult defection and those could be pertained to sunlight bowel syndrome. 4. Diagnostic views of Oui-Ga-Sil were that pulse was descending abundant large strong and smooth quick, a coated tongue was yellow, deep yellow, old yellow, thick, scorching dry rough or gray black. On abdominal diagnosis, pressing by hand, patient was conscious of pain, excessive pain, rejection against press, impossible press or intermittent abdominal pain and bowel cutting pain without press. 5. Differential diagnosis was that the sunlight of Nai-Gyung-Fever-Theory was outside desease making meridian the prime object, Baik-Ho-Tang syndrome was making figureless abundant fever the pivotal point. And important differential standard of splenic shrink syndrome was that a daily fever, an irritation with fever were not occurred. 6. Theory of Oui-Ga-Sil was that Seng-Gi-Tang classes had been used in attacking downward or making balance, and moxibustion on Jung-Wan, honey boiling induction theory had been also used. Attacking downward therapy was invigorating method to preserve mucus, and if mucus had been exausted with complicating emptiness prognosis had been appeared badly. 7. Preventing from Oui-Ga-Sil diet by rule, fitness to cold and warmth may be needed to prevent outside evil influence attack and inside evil influence occurrence. Prudence with being very busy, fatigue, wine and woman may be also needed not to be an injury to splanic and gastric spirit.

  • PDF

Cytochrome c and Chloroplast were Used for an Artificial Approach to Confirming the Irreversible Catalysis by Mitochondrial Cytochrome Oxidase

  • Song, Ji-Young;Lee, Jae-Yang;Lee, Sang-Jik
    • BMB Reports
    • /
    • v.33 no.3
    • /
    • pp.285-288
    • /
    • 2000
  • Ferricytochrome c was artificially made to receive the aqueous electrons evolved through the influence of illuminated chloroplast. This ferricytochrome c, which was bombarded by electrons, was reduced to ferrocytochrome c by making sure that a certain cytochrome is reduced. This may require an electronic attack that is created by the chloroplast inside the plant cell. The possibility of reversing the oxidation of ferrocytochrome c by cytochrome oxidase was examined using a contrived redox system composed of cytochrome oxidase, ferricytochrome c and chloroplast with illumination. We recognized that the oxidase is unserviceable for the reversibleness in spite of the existence of chloroplast.

  • PDF

Design of Lavatory Emergency Detection System (열차화장실 내의 응급상황 감지시스템 설계에 관한 연구)

  • Chang, Duk-Jin;Seo, Dong-Ki;Kang, Song-Hee;Song, Dahl-Ho
    • Proceedings of the KSR Conference
    • /
    • 2009.05b
    • /
    • pp.285-291
    • /
    • 2009
  • If an urgent situation, such as a stroke, faint, heart attack, happens in a lavatory, it is hard to recognize and perform an immediate emergency treatment unless the patient inside of the lavatory calls for help. If a system that can detect an emergency in a lavatory and report to the relevant personnel is developed, it would be an excellent installation case demonstrating how a train is nicely designed to take care passenger's safety. In this paper, we showed a design of lavatory emergency detection system (LEDS) that detects an urgent situation in a lavatory by using sensors and timers and reports to proper personnel. This system can be installed not only on a train but also in a building where visual monitoring is not possible.

  • PDF

Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services

  • Jin Kim;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.173-184
    • /
    • 2024
  • The connected car services are one of the most widely used services in the Internet of Things environment, and they provide numerous services to existing vehicles by connecting them through networks inside and outside the vehicle. However, although vehicle manufacturers are developing services considering the means to secure the connected car services, concerns about the security of the connected car services are growing due to the increasing number of attack cases. In this study, we reviewed the research related to the connected car services that have been announced so far, and we identified the threats that may exist in the connected car services through security threat modeling to improve the fundamental security level of the connected car services. As a result of performing the test to the applications for connected car services developed by four manufacturers, we found that all four companies' applications excessively requested unnecessary permissions for application operation, and the apps did not obfuscate the source code. Additionally, we found that there were still vulnerabilities in application items such as exposing error messages and debugging information.

A Study on Resistance of Chloride Ion Penetration in Ground Granulated Blast-Furnace Slag Concrete (고로슬래그 미분말 콘크리트의 염화물 침투 저항성에 관한 연구)

  • Song, Ha-Won;Kwon, Seung-Jun;Lee, Suk-Won;Byun, Keun-Joo
    • Journal of the Korea Concrete Institute
    • /
    • v.15 no.3
    • /
    • pp.400-408
    • /
    • 2003
  • Chloride ion inside concrete destroys the so-called passive film surrounding reinforcing bars inside concrete so that the so-called salt attack accelerates corrosion which is the most critical factor for durability as well as structural safety of reinforced concrete structures. Recently, as a solution of the salt attack, the ground granulated blast-furnace slag(GGBFS) have been used as binder or blended cement more extensively. In this paper, characteristics of chloride ion diffusion for the GGBFS concrete, which is known to possess better resistance to damage due to the chloride ion penetration than ordinary portland cement(OPC) concrete possesses, are analyzed and a chloride ion diffusion model for the GGBFS concrete is proposed by modifying an existing diffusion model for the OPC concrete. The proposed model is verified by comparing diffusion analysis results using the model accelerated chloride penetration test results for concrete specimens as well as field test results for an RC bridge pier. Then, an optimal resistance condition to chloride penetration for the GGBFS concrete is obtained according to degrees of fineness and replacement ratios of the GGBFS concrete. The result shows that the GGBFS concrete has better resistance to chloride ion penetration than OPC concrete has and the resistance is more affected by the replacement ratio than the degree of fineness of the GGBFS.

Cryptanalysis using Fault Injection and Countermeasures on DSA (오류주입을 이용한 DSA 서명 알고리즘 공격 및 대응책)

  • Jung, Chul-Jo;Oh, Doo-Hwan;Choi, Doo-Sik;Kim, Hwan-Koo;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.3045-3052
    • /
    • 2010
  • The international standard signature algorithm DSA has been guaranteed its security based on discrete logarithm problem. Recently, the DSA was known to be vulnerable to some fault analysis attacks in which the secret key stored inside of the device can be extracted by occurring some faults when the device performs signature algorithm. After analyzing an existing fault attack presented by Bao et al., this paper proposed a new fault analysis attack by disturbing the random number. Furthermore, we presented a countermeasure to compute DSA signature that has its immunity in the two types of fault attacks. The security and efficiency of the proposed countermeasure were verified by computer simulations.

A Study on Enterprise and Government Information Security Enhancement with Information Security Management System (정보보호관리체계를 통한 기업 및 정부 정보보안 강화 방안에 관한 연구)

  • Park, Chung-Soo;Lee, Dong-Bum;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1220-1227
    • /
    • 2011
  • According to the development of IT technology, life itself is becoming the change to Knowledge-based systems or information-based systems. However, the development of IT technology, the cyber attack techniques are improving. And DDoS a crisis occurs frequently, such as cyber terrorism has become a major data leakage. In addition, the various paths of attack from malicious code entering information in the system to work for your company for loss and damage to information assets is increasing. In this environment, the need to preserve the organization and users of information assets to perform ongoing inspections risk management processes within the organization should be established. Processes and managerial, technical, and physical systems by establishing an information security management system should be based. Also, we should be introduced information security product for protecting internal assets from the threat of malicious code incoming to inside except system and process establishment. Therefore we proposed enterprise and government information security enhancement scheme through the introduction of information security management system and information security product in this paper.