• Title/Summary/Keyword: Leakage risk

Search Result 424, Processing Time 0.034 seconds

Cyber Insurance and Distribution Channels

  • Kwak, Young-Arm;Cho, Young-Sang
    • Journal of Distribution Science
    • /
    • v.16 no.5
    • /
    • pp.61-70
    • /
    • 2018
  • Purpose - These days, an individual user, private entity, hears everyday news of hacking and personal information leakage in the era of a most-connected society. This study investigates cyber attack, cyber insurance and distribution channels for insurance goods in South Korea by analyzing various cases of cyber attacks in domestic and overseas case. Research design, data and methodology - This study adopted various study cases instead of the one large case for deep quality analysis, and focused on various cases of domestic and overseas cyber attacks with insurance. Result - As a result of analyzing the cases that were hacked, types of massive losses and damages arising out of internet blackout due to cyber risks are paralyzation of public and private website and portal, electronic administrative system, public infrastructure, and consequently a normal operation of nation is impossible. These losses and damages however can be coverable under cyber insurance. Conclusions - This paper suggests insurance carriers, as suppliers, should provide multiple channels to sell to the customer and should expand the strategy of advertisement and promotion in order for them to change their mind and compare the price and value of the information of individual users and private entity in view of cost savings.

The Survey of Fire Hazard of Fan in Manufacturing Industries (제조 사업장의 환풍기 화재위험성 조사)

  • Kim, Sung-Sam
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.27 no.10
    • /
    • pp.21-29
    • /
    • 2013
  • The short circuit and overload is presented by main cause of electrical fire. However, 85% of the fan directly connected the outlet box without switch in total 110 fans as a research in manufacturing industries. In installation direction of vertical type fans which was placed on the horizontal surface, only 39 vertical type fans were placed on vertical surface and 71 fans were placed on the horizontal type. The installation direction of the fans warns of the risk of the fire hazard due to the motor stall to the user manual of the maker. However, it is the representative nonconformity example of construction which the people or builder disregards. In addition, the condition of ground connection with the earth leakage prevention was investigated in grounding of 5 fans, non-grounding of 105 fans. The double insulation structure is generally used for small fan and it can't connect ground wire as electric plug of non-grounding type. However, industrial iron fan needs ground wire for electric leakage and to protect against electric shock.

The Construction of Logical, Physical Network Separation by Virtualization (가상화를 이용한 논리적, 물리적 망분리 구축)

  • Lee, YongHui;Yoo, SeungJae
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.25-33
    • /
    • 2014
  • With the development of information and communication, public institutions and enterprises utilize the business continuity using the Internet and Intranet. In this environment, public institutions and enterprises is to be introduced the number of solutions and appliances equipment to protect the risk of leakage of inside information. However, this is also the perfect external network connection is not enough to prevent leakage of information. To overcome these separate internal and external networks are needed. In this paper, we constructed the physical and logical network separation is applied to the network using the virtualization and thus the network configuration and network technical review of the various schemes were proposed for the separation.

Development of Ceramic Humidity Sensor for the Korean Next Generation Reactor

  • Lee, Na-Young;Hwang, Il-Soon;Song, Chang-Rock;Yoo, Han-Ill;Park, Sang-Duk;Yang, Jun-Seong
    • Nuclear Engineering and Technology
    • /
    • v.30 no.5
    • /
    • pp.435-443
    • /
    • 1998
  • Leak-before-break(LBB) approach has been shown to be both cost effective and risk reductive when applied to high energy Piping in nuclear Power Plants. For the Korean Next Generation Reactor (KNGR) development, LBB application is considered for the Main Steam Line(MSL) piping inside containment. Unlike the primary system leakages, the MSL leak detection systems must be based on principles other than radioactivity measurements. Among humidity, heat and acoustic noise currently being considered as indicators of leakage, we explored humidity as an effective one and developed ceramic-based humidity sensor which can be qualified for LBB applications. The ceramic material, sintered and annealed MgCr$_2$O$_4$-TiO$_2$, is shown to increase its electrical conductivity drastically upon water vapor adsorption over the entire temperature range of interest. With this ceramic sensor specimen, we suggested installation-inside-the-piping method by which we can detect leakage more rapidly and sensitively. In this paper, we describe the progress in the development and characterization of ceramic humidity sensor for the LBB application to the MSL of KNGR.

  • PDF

A Study on Estimation of Liquid Leakage Using Wide Angle Camera Based Angled of Arrival Algorithm in Bio Plant

  • Shin, Jaekwon;Mariappan, Vinayagam;Woo, Deokgun;Lee, Junghoon;Lee, Jisung;Kim, Minsoo;Kim, Jintae
    • International journal of advanced smart convergence
    • /
    • v.7 no.1
    • /
    • pp.1-6
    • /
    • 2018
  • In addition to the instability of energy import costs caused by the depletion of petroleum resources, which is a representative energy resource, and the strengthening of various regulations such as the convention on climate change, the plant for bio energy production, which is being watched as the next generation energy, and became subject of various complaints. In order to solve this problem, the bio-plant is underground and the ground is parked, making the convenience and accessibility of citizens more and more accessible. In this situation, the development of bioenergy production technology also increases the risk factor in bioenergy production process. Accordingly this paper explains method about apply the wide angle camera based AOA algorithm to the bio plant to prevent the accidents from spreading due to the lack of facilities and safety devices and the aging of the facilities and suggests a technique that can quickly identify the location and direction when it occurs.

Implementation of Film Type Sensor for Synthetic Lube Oil and High Pressure Hydraulic Fluid Leak Detection (합성 윤활유 및 고압 작동유 누출감지 필름형 센서의 구현)

  • Park, No-Jin;Yu, Dong-Kuen;Yu, Hong-Kuen
    • Journal of Sensor Science and Technology
    • /
    • v.23 no.4
    • /
    • pp.266-271
    • /
    • 2014
  • Chemical sensors are used in various industrial facilities such high-risk and prevent the leakage of substances, important in life and environmental protection and the safe use of industry, used for management. In particular, high-temperature environments such as power generation equipment of the rotating part due to leakage generated by the various oil, power plants Shut Down, fire, work environment (exposure to various chemical solution and gas leak) and various water, air and soil pollution causes. Thus, over the long term through various channels such as crops and groundwater contamination caused by the slow, serious adverse effect on the ecosystem. In this paper, synthetic lube oil and high pressure hydraulic fluid leakage and immediately detect a new Printed Electronic implementation of technology-based film-type sensors, and its performance test. Thus, industrial accidents and environmental pollution and for early detection of problems, large accidents can be prevented. Experimental results of the synthetic lube oil and high pressure hydraulic fluid solution after the contact time depending on the experiment and the oil solution of the sensor material of the conductive porous PE resistance value by a chemical reaction could be confirmed that rapid increase. Also implemented in the film-type oil sensor electrical resistance change over time of the reaction rate and the synthetic lube oil is about 2 minutes or less, the high pressure hydraulic fluid is less than about 1 minute was. Therefore, more high-pressure hydraulic fluid such as a low volatility synthetic lube oils are the resistance change and the reaction rate was confirmed to be the slowest.

Design and Implementation of DB Protection System through Critical Query Signature (핵심 쿼리 결제를 통한 DB 보호 시스템 설계 및 구현)

  • Kim, Yang-Hoon;Kwon, Hyuk-Jun;Lee, Jae-Pil;Park, Chun-Oh;Kim, Jun-Woo;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.228-237
    • /
    • 2011
  • The risk of leakage or theft of critical data which is stored in database is increasing in accordance with evolution of information security paradigm. At the same time, needs for database security have been on the rapid increase due to endless leakage of massive personal information. The existing technology for prevention of internal information leakage possesses the technical limitation to achieve security goal completely, because the passive control method including a certain security policy, which allows the only authorized person to access to DBMS, may have a limitation. Hence in this study, we propose Query Signature System which signatures the queries accessing to the critical information by interrupting and passing them. Furthermore this system can apply a constant security policy to organization and protect database system aggressively by restricting critical query of database.

A Decision-Making Model for Handling Personal Information Using Metadata (메타데이터를 활용한 개인정보 처리에 대한 의사결정 모델)

  • Kim, Yang-Ho;Cho, In-Hyun;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.259-273
    • /
    • 2016
  • After realizing through the three large-scale data leakage incidents that intentional or accidental insider jobs are more serious than external intrusions, financial companies in Korea have been taking measures to prevent data leakage from occuring again. But, the IT system architecture reflecting the domestic financial environment is highly complicated and thereby difficult to grasp. It is obvious that despite administrative, physical, and technical controls, insider threats are likely to cause personal data leakage. In this paper, we present a process that based on metadata defines and manages personally identifiable attribute data, and that through inter-table integration identifies personal information broadly and controls access. This process is to decrease the likelihood of violating compliance outlined by the financial supervisory authority, and to reinforce internal controls. We derive and verify a decision-making model that reflects the proposed process.

A Study on Conversion Security Control System for Industrial Security (산업보안을 위한 융합보안관제시스템에 관한 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.1-6
    • /
    • 2009
  • Current paradigm of industrial security is changing into the effective operation and management from simple establishment of security equipments. If the physical security system(entry control system, video security system, etc.) and the IT integrated security control system are conversed, it makes us possible to prevent, disrupt and track afterwards the insider's information leakage through the risk and security management of enterprise. That is, Without the additional expansion of the existing physical security and IT security manpower, the establishment of systematic conversion security management process in a short time is possible and can be expected the effective operation of professional organization system at all times. Now it is needed to build up integrated security management system as an individual technique including the security event collection and integrated management, the post connected tracking management in the case of security accident, the pattern definition and real time observation of information leakage and security violation, the rapid judgement and response/measure to the attempt of information leakage and security violation, the establishment of security policy by stages and systematically and conversion security.

  • PDF

A Study on the Correlation between Leak Hole Size, Leak Rate, and the Influence Range for Hydrochloric Acid Transport Vehicles (염산 운송차량의 누출공 크기와 누출률 및 영향범위간 상관관계 연구)

  • Jeon, Byeong-Han;Kim, Hyun-Sub
    • Journal of Environmental Health Sciences
    • /
    • v.47 no.2
    • /
    • pp.175-181
    • /
    • 2021
  • Objectives: The correlation between the size of a leak hole, the volume of the leakage, and the range of influence was investigated for a hydrochloric acid tank-lorry. Methods: For the case of a tank-lorry chemical accident, KORA (Korea Off-site Risk Assessment Supporting Tool) was used to predict the leak rate and the range of influence according to the size of the leak hole. The correlation was studied using R. Results: As a result of analyzing the leak rate change according to the leak hole size in a 35% hydrochloric acid tank-lorry, as the size of the leak hole increased from 1 to 100 mm, the leak rate increased from 0.008 to 83.94 kg/sec, following the power function. As a result of calculating the range of influence under conditions ranging from 1 to 100 mm in size and 10 to 60 minutes of leakage time, it was found that the range spanned from a minimum of 5.4 m to a maximum of 307.9 m. As a result of multiple regression analysis using R, the quadratic function model best explained the correlation between the size of the leak hole, the leak time, and the range of influence with an adjected coefficient of determination of 0.97 and a root mean square error of 22.33. Conclusion: If a correlation database for the size of a leak hole is accumulated for various substances and under various conditions, the amount of leakage and the range of influence can easily be calculated, facilitating field response activities.