• Title/Summary/Keyword: Internal leakage

Search Result 331, Processing Time 0.026 seconds

Failure Examples for Parasitic Current Leakage of Starting System in Automotive (자동차 시동시스템의 암전류 누설에 의한 고장사례연구)

  • Lee, Il-Kwon;Kim, Chung-Kyun;Cho, Seung-Hyun
    • Tribology and Lubricants
    • /
    • v.26 no.5
    • /
    • pp.277-282
    • /
    • 2010
  • The purpose of this paper is to study and analysis the failure examples for parasitic current leakage produced in starting system on gasoline engine. It verified the discharge of battery by electric leakage because of internal wiring damage problem for CD auto changer installed in car. Also, it verified the no-stating phenomenon because of deposit forming by chemical reaction of battery fluid between battery post and cable fixing parts. It verified the damage for brush holder and commutator mixing by internal short phenomenon because of brush carbon a particle and engine oil that was flowed into internal of starting motor. It verified the working phenomenon of audio by a point of contact even if the driver turn to "LOCK" position the key.

An Exploratory Study for Clustering of Technology Leakage Activitie (기술유출행위 군집화를 위한 탐색적 연구)

  • Kim, Jaesoo;Kim, Jawon;Kim, Jeongwook;Choi, Yurim;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.3-9
    • /
    • 2019
  • Most of security countermeasures have been implemented to cope with continuous increase leakage of technology, but almost security countermeasures are focused on securing the boundary between inside and outside. This is effective for detecting and responding to attacks from the outside, but it is vulnerable to internal security incidents. In order to prevent internal leakage effectively, this study identifies activities corresponding to technology leakage activities and designes technology leakage activity detection items. As a design method, we analyzed the existing technology leakage detection methods based on the previous research and analyzed the technology leakage cases from the viewpoint of technology leakage activities. Through the statistical analysis, the items of detection of the technology leakage outcomes were verified to be appropriate, valid and reliable. Based on the results of this study, it is expected that it will be a basis for designing the technology leaking scenarios based on future research and leaking experiences.

H Observer Design for Detecting Internal Oil Leakage in a Hydraulic Cylinder (유압실린더 내부 누유 검출을 위한 H 관측기 설계)

  • Jee, Sung Chul;Kang, Hyungjoo;Lee, Mun-Jik;Li, Ji-Hong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.2
    • /
    • pp.117-125
    • /
    • 2016
  • This paper presents the internal oil leakage detection problem for a hydraulic double-rod cylinder. We represent the dynamics of the hydraulic cylinder as a convex combination of linear equations. To detect oil leakage, we propose a model-based fault detection observer design scheme. The observer is designed to be robust against disturbance. Sufficient design conditions are derived in the form of linear matrix inequalities. A numerical example is provided to verify the proposed techniques.

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.

A Study on Insider Behavior Scoring System to Prevent Data Leaks

  • Lim, Young-Hwan;Hong, Jun-Suk;Kook, Kwang Ho;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.77-86
    • /
    • 2015
  • The organization shall minimize business risks associated with customer information leaks. Enhance information security activities through voluntary pre-check and must find a way to detect the personal information leakage caused by carelessness and neglect accident. Recently, many companies have introduced an information leakage prevention solution. However, there is a possibility of internal data leakage by the internal user who has permission to access the data. By this thread it is necessary to have the environment to analyze the habit and activity of the internal user. In this study, we use the SFI analytical technique that applies RFM model to evaluate the insider activity levels were carried out case studies is applied to the actual business.

Internal pressures in buildings with a dominant opening and background porosity

  • Kim, P.Y.;Ginger, J.D.
    • Wind and Structures
    • /
    • v.16 no.1
    • /
    • pp.47-60
    • /
    • 2013
  • A dominant opening in a windward wall, which generates large internal pressures in a building, is a critical structural design criterion. The internal pressure fluctuations are a function of the dominant opening area size, internal volume size and external pressure at the opening. In addition, many buildings have background leakage, which can attenuate internal pressure fluctuations. This study examines internal pressure in buildings for a range of dominant opening areas, internal volume sizes and background porosities. The effects of background porosity are incorporated into the governing equation. The ratio of the background leakage area $A_L$ to dominant opening area $A_W$ is presented in a non-dimensional format through a parameter, ${\phi}_6-A_L/A_W$. Background porosity was found to attenuate the internal pressure fluctuations when ${\phi}_6$ is larger than 0.2. The dominant opening discharge coefficient, ${\kappa}$ was estimated to lie between 0.05 to 0.40 and the effective background porosity discharge coefficient ${\kappa}^{\prime}_L$, was estimated to be between 0.05 to 0.50.

Piosk : A Practical Kiosk To Prevent Information Leakage

  • Lee, Suchul;Lee, Sungil;Oh, Hayoung;Han, Seokmin
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.77-87
    • /
    • 2019
  • One of important concerns in information security is to control information flow. It is whether to protect confidential information from being leaked, or to protect trusted information from being tainted. In this paper, we present Piosk (Physical blockage of Information flow Kiosk) that addresses both the problems practically. Piosk can forestall and prevent the leakage of information, and defend inner tangible assets against a variety of malwares as well. When a visitor who carries a re-writable portable storage device, must insert the device into Piosk installed next to the security gate. Then, Piosk scans the device at the very moment, and detects & repairs malicious codes that might be exist. After that, Piosk writes the contents (including sanitized ones) on a new read-only portable device such as a compact disk. By doing so, the leakage of internal information through both insiders and outsiders can be prevented physically. We have designed and prototyped Piosk. The experimental verification of the Piosk prototype implementation reveals that, Piosk can accurately detect every malware at the same detection level as Virus Total and effectively prevent the leakage of internal information. In addition, we compare Piosk with the state-of-the-art methods and describe the special advantages of Piosk over existing methods.

Measures to Prevent the Leakage of Military Internal Information through the Analysis of Military Secret Leakage Cases: Focusing on Insider Behaviors (군사기밀 유출 사례 분석을 통한 군 내부정보 유출 방지 방안 : 내부자 행위 중심으로)

  • Eom, Jung-Ho;Kim, Nam-Uk
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.85-92
    • /
    • 2020
  • None of the recent cases of military secret leakages have leaked internal information using networks. This is because the Internet and the Intranet are physically separated, and has a difficult process when transmitting and receiving data through the Internet. Therefore, most of the leaked paths are to copy and hand over secrets, shoot and send them with a smartphone, or disclose after remembering them. So, the technology of blocking and detecting military secret leakages through the network is not effective. The purpose of this research is to propose a method to prevent information leakage by focusing on the insider behaviors, the subject of leakage, rather than the military secret. The first is a preventive measure to prevent the leakage behavior of military secrets, the second is to block suspicious access to the military secret data, and the last is to detect the leakage behavior by insiders.

Analysis of leakage factors affecting ECV performance in variable compressor

  • Mahmud, Md. Iqbal;Cho, Haeng Muk
    • Journal of Energy Engineering
    • /
    • v.23 no.4
    • /
    • pp.183-188
    • /
    • 2014
  • Solenoid operated electromagnetic control valve (ECV) using in an external variable displacement swash plate type compressor is widely used for air conditioning control system because of its low energy consumption and high efficient characteristics. ECV controls the entire vehicle air conditioning system by means of a pulse width modulation (PWM) system that supplied from an external controller. Different pressure ports located within ECV has important functions to control the air/refrigerant flow through its internal passages. The flow paths are preciously maintained with acceptable ranges of leakage (gap) between the parts inside it which is followed by effective design and critical dimensioning of its internal features. Therefore, it saves energy losses from the solenoid operation as well as ensures the balance of forces within it. The research paper highlights analysis of the leakages (at different pressure ports) and dimensioning tolerance factors that affects the ECV performance.

A Study on DLP System for Preventing Internal Information Leakage (내부정보유출방지를 위한 DLP시스템 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.121-126
    • /
    • 2018
  • The development of modern ICT and network technologies has made the business environment smart.and under such circumstances, a great deal of data is being generated, stored and used. The important information that becomes an energy source for corporate management creates economic profit and value and is also utilized as a basis for strong influence. Therefore, important information must ensure its availability and convenience while ensuring confidentiality and integrity, which is the basic objective of information protection. However, most companies are seeing more and more incidents of serious damage due to the leakage of important internal information. In this study, we deal with the Data Loss Prevention (DLP) technologies and solutions to prevent internal information leakage and establish stable data security and information protection management.

  • PDF