• Title/Summary/Keyword: Leakage risk

Search Result 424, Processing Time 0.031 seconds

A Plan for Construction of the National Electrical Safety Grid to Prevent the Fires Caused by Electrical Faults (전기화재 예방을 위한 국가전기안전망 구축 방안)

  • Bae, Seok-Myeong;Jeon, Jeong-Chay;Park, Chan-Eom;Bae, Seok-Myeong;Ko, Won-Sig
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2267-2273
    • /
    • 2009
  • In this paper, in order to monitor and manage an electrical risk factor like as leakage current, load current, and arc-fault, a real time monitoring and management system being operated in the ubiquitous environment was developed, and a plan of construction of an electrical safety grid using the system was proposed. For confirmation of usefulness and reliability of the proposed safety system and grid, the developed intelligent panels were applied to 28 Korean traditional houses in Jeonjoo city, and the grid including the panels was operated. If the proposed National Electrical Safety Grid is completely constructed in the houses of general electrical users, the Grid will have an effect on that a main manager on electrical safety transfers from management system by general people to real-time management system by expert. As a result, the electrical fires caused by an over-load, an arc-fault, and an earth-fault will be prevented.

Development of Unmanned Aircraft in the Fourth Industrial Revolution (4차 산업혁명시대 우리나라 드론의 발전 방향)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.3-10
    • /
    • 2018
  • The drone is an unmanned aircraft that can be steered and controlled using radio waves on the ground, and the pilot moves unmanned without boarding. The history of the unmanned airplane began with military use, and the first unmanned aerial flight was the first successful flight of the 'Sperry Aerial Torpedo' drones built in the United States in 1917 with a bomb. With the development of unmanned aerial technology, the use of military drones has expanded to a wider field. Recently, the use of drones has been utilized in various fields such as agriculture, industry, logistics, broadcasting, and safety, and the scale of the market is also expanding. Although the drones are becoming indispensable to penetrate our lives, they can be used for bad purposes depending on the intended use of the user, but the risk factors are overlooked. Therefore, technical defects related to drones and accidents caused by operator's mistakes can not be completely prevented. However, privacy infringement, security leakage, and terrorism, which may be caused by illegal use of drones, It will not be inhibited and will accelerate.

  • PDF

A Study on the Research Security System of the Researcher-Centric (연구자 중심의 연구보안 체계 개선방안 연구)

  • Lee, Jeakyun;Na, Onechul;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.65-84
    • /
    • 2018
  • The government is continuously expanding its national R&D investment to actively respond to the advent of the $4^{th}$ industrial revolution era and to develop the national economy. The R&D structure is likely to be liberalized as the paradigm shifts from the pursuit type R&D to the leading type R&D, and R&D capacity enhancement that focuses on researchers' creativity is emphasized. Such changes in R&D environment will increase the risk of security accidents such as leakage of research information. In addition, security policy for protection of research result should be the Researcher-Centric Security and security policy should be changed. This study explored transforming the research security system into the Researcher-Centric Security system so that researchers can voluntarily implement necessary security measures in the course of conducting research.

The Effect of Bojungikgi-tang on Stress Urinary Incontinence: A Systematic Review and Meta-Analysis (복압성 요실금에 대한 보중익기탕의 효과 : 체계적 문헌고찰과 메타분석)

  • Nam, Hyun-seo;Baek, Tae-hyun
    • The Journal of Internal Korean Medicine
    • /
    • v.42 no.3
    • /
    • pp.293-307
    • /
    • 2021
  • Objectives: This study investigates the effects and safety of Bojungikgi-tang for stress urinary incontinence by systemic review and meta-analysis of randomized controlled trials (RCTs). Methods: RCTs were selected from articles published until December 2019 in seven domestic and foreign databases. The quality of the literature was evaluated using Cochrane's risk of bias (RoB) tool, and RevMan 5.3 was used to synthesize the results. Results: A total of 694 patients with stress urinary incontinence participated in eight RCTs. Meta-analysis showed that the total effective rate of treatment that combines pelvic floor muscle training (PFMT) and Bojungikgi-tang was significantly higher than that of PFMT alone. The volume of urine leakage per hour after the combined treatment was significantly lower than that of PFMT alone. The International Consultation on Insurance Questionnaire-Short Form (ICIQ-SF) scores from combining PFMT and Bojungikgi-tang were significantly lower than those for PFMT alone. Conclusion: This study suggests that Western medical treatment combined with Bojungikgi-tang for urinary incontinence from stress might be more effective in improving symptoms than conventional Western medical treatment alone. However, the number of studies included in the meta-analysis was insufficient, and the quality of the selected literature was generally low. Therefore, high-quality clinical studies on herbal medicine treatment for urinary incontinence would be required in the future.

Configuration Method of AWS Security Architecture for Cloud Service (클라우드 서비스 보안을 위한 AWS 보안 아키텍처 구성방안)

  • Park, Se-Joon;Lee, Yong-Joon;Park, Yeon-Chool
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.7-13
    • /
    • 2021
  • Recently, due to the many features and advantages of cloud computing, cloud service is being introduced to countless industries around the world at an unbelievably rapid pace. With the rapid increase in the introduction of multi-cloud based services, security vulnerabilities are increasing, and the risk of data leakage from cloud computing services are also expected to increase. Therefore, this study will propose an AWS Well-Architected based security architecture configuration method such as AWS standard security architecture, AWS shared security architecture model that can be applied for personal information security including cost effective of cloud services for better security in AWS cloud service. The AWS security architecture proposed in this study are expected to help many businesses and institutions that are hoping to establish a safe and reliable AWS cloud system.

Intelligent Video Surveillance Incubating Security Mechanism in Open Cloud Environments (개방형 클라우드 환경의 지능형 영상감시 인큐베이팅 보안 메커니즘 구조)

  • Kim, Jinsu;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.105-116
    • /
    • 2019
  • Most of the public and private buildings in Korea are installing CCTV for crime prevention and follow-up action, insider security, facility safety, and fire prevention, and the number of installations is increasing each year. In the questionnaire conducted on the increasing CCTV, many reactions were positive in terms of the prevention of crime that could occur due to the installation, rather than negative views such as privacy violation caused by CCTV shooting. However, CCTV poses a lot of privacy risks, and when the image data is collected using the cloud, the personal information of the subject can be leaked. InseCam relayed the CCTV surveillance video of each country in real time, including the front camera of the notebook computer, which caused a big issue. In this paper, we introduce a system to prevent leakage of private information and enhance the security of the cloud system by processing the privacy technique on image information about a subject photographed through CCTV.

Research on technical protection measures through risk analysis of pseudonym information for life-cycle (가명정보 Life-Cycle에 대한 위험 분석을 통한 관리적/기술적 보호조치 방안에 대한 연구)

  • Cha, Gun-Sang
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.53-63
    • /
    • 2020
  • In accordance with the revision of the Data 3 Act, such as the Personal Information Protection Act, it is possible to process pseudonym information without the consent of the information subject for statistical creation, scientific research, and preservation of public records, and unlike personal information, it is legal for personal information leakage notification and personal information destruction There are exceptions. It is necessary to revise the pseudonym information in that the standard for the pseudonym processing differs by country and the identification guidelines and anonymization are identified in the guidelines for non-identification of personal information in Korea. In this paper, we focus on the use of personal information in accordance with the 4th Industrial Revolution, examine the concept of pseudonym information for safe use of newly introduced pseudonym information, and generate / use / provide / destroy domestic and foreign non-identification measures standards and pseudonym information. At this stage, through the review of the main contents of the law or the enforcement ordinance (draft), I would like to make suggestions on future management / technical protection measures.

Comparative Exploratory Research to Improve the Research Security System: Focusing on U.S Research Security Cases (연구보안제도 개선을 위한 비교탐색적 연구: 미국의 연구보안 사례를 중심으로)

  • Han, So Young;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.111-126
    • /
    • 2022
  • As the technology hegemony war between the United States and China develops and the importance of R&D increases, countries around the world are increasing their R&D investment. In Korea, the size of R&D investment by the government and companies has steadily increased every year, and cutting-edge technologies are being developed in various fields as it shifts to the direction of creative technology development. However, the number of cases in which high-tech core technologies in Korea, which have invested a lot of budget, time, and effort, are illegally leaked overseas is also steadily increasing. Research security is an activity to safely protect protected objects in the research environment from risk factors such as leakage and deodorization, and laws and systems for research security are being reorganized not only in Korea but also in the United States and other countries around the world. In this paper we aims to derive Korea's research security policy direction, focusing on US research security cases which ranks first in R&D expenses around the world to improve the R&D system and actively discusses R&D policies and laws.

Factors to Affect Acceptance of Open Banking from Information Security Perspectives (정보보호 관점에서의 오픈뱅킹 수용도에 대한 영향요인)

  • Go, Jeunghyeun;Lee, Woonboo
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.63-81
    • /
    • 2021
  • Joint financial network of Korea Financial Telecommunications and Clearings Institute, which is an essential facility with a natural monopoly, maintained its closedness as monopoly/public utility model, but it has evolved in the form of open banking in order to obtain domestic fintech competitiveness in the rapidly changing digital financial ecosystem such as the acceleration of Big Blur. In accordance with digital transformation strategy of financial institutions, various ICT companies are actively participating in the financial industries, which has been exclusive to banks, through the link technology called Open API. For this reason, there has been a significant change in the financial service supply chain in which ICT companies participate as users. The level of security in the financial service supply chain is determined based on the weakest part of the individual components according to the law of minimum. In addition, there is a perceived risk of personal information and financial information leakage among the main factors that affect users' intention to accept services, and appropriate protective measures against perceived security risks can be a catalyst, which increases the acceptance of open banking. Therefore, this is a study on factors affecting the introduction of open banking to achieve financial innovation by developing an open banking security control model for financial institutions, as a protective measures to user organizations, from the perspectives of cyber financial security and customer information protection, respectively, and surveying financial security experts. It is expected, from this study, that effective information protection measures will be derived to protect the rights and interests of financial customers and will help promote open banking.

Smoke Rendering Method in Post-processing for Safety-Training Contents (안전 훈련 콘텐츠에 적합한 포스트 프로세싱 단계에서의 연기 렌더링 방법)

  • Park, Sanghyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1644-1652
    • /
    • 2022
  • In the case of safety training where practical training is impossible due to risk problems, training contents using realistic media such as virtual reality or augmented reality are becoming a new alternative. In this paper, we propose a smoke modeling method that can be applied to safety-training contents implemented with realistic media technology. When an accident occurs in a hazardous area such as a petrochemical plant, visibility is not secured due to gas leakage and fire. In order to create such a situation, it is important to realistically express smoke. The proposed method is a smoke model implementation technique that can be effectively applied to the background of complex passages and devices such as petrochemical plants. In the proposed method, the smoke is expressed using volumetric rendering in the post-processing stage for the resulting image of scene rendering. Implementation results in the background of the factory show that the proposed method produces models that can express the smoke realistically.